Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Obviously Malware... [CLOSED]


  • This topic is locked This topic is locked

#1
lpkm79

lpkm79

    New Member

  • Member
  • Pip
  • 2 posts
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 20:46:08, on 5.20.2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
C:\WINDOWS\Explorer.EXE
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\Program Files\McAfee\MSK\MskSrver.exe
C:\WINDOWS\System32\svchost.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\Uniblue\RegistryBooster 2\RegistryBooster.exe
C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WUSB54GC.exe
C:\Program Files\SiteAdvisor\6172\SiteAdv.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Outlook Express\msimn.exe
C:\Documents and Settings\default\Desktop\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://desktop.presa...e...C01&lc=0409
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.c...rch/search.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.c...//www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://mail.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.c...//www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.c...rch/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.c...//www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://search.presar...c...C01&lc=0409
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://search.presar...c...C01&lc=0409
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.c...//www.yahoo.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Elledge Internet Explorer
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
N3 - Netscape 7: user_pref("browser.startup.homepage", "http://johnpaulelled...lue/index.html"); (C:\Documents and Settings\DEFAULT\Application Data\Mozilla\Profiles\default\616dyoqo.slt\prefs.js)
N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\DEFAULT\Application Data\Mozilla\Profiles\default\616dyoqo.slt\prefs.js)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {089FD14D-132B-48FC-8861-0048AE113215} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
O2 - BHO: (no name) - {2022F1EA-3069-4BB7-BCEB-0ECD11A28D2A} - (no file)
O2 - BHO: McAntiPhishingBHO - {377C180E-6F0E-4D4C-980F-F45BD3D40CF4} - c:\PROGRA~1\mcafee\msk\mcapbho.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: UberButton Class - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: YahooTaggedBM Class - {65D886A2-7CA7-479B-BB95-14D1EFB7946A} - C:\Program Files\Yahoo!\Common\YIeTagBm.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\windows\downloaded program files\googletoolbar4.dll
O2 - BHO: (no name) - {BDF3E430-B101-42AD-A544-FADC6B084872} - (no file)
O2 - BHO: {6e7e5a15-7ab2-baeb-2434-8478d00b3c6c} - {c6c3b00d-8748-4342-beab-2ba751a5e7e6} - (no file)
O2 - BHO: (no name) - {E9383002-FC55-4330-B9C9-67E03BC5C840} - (no file)
O3 - Toolbar: (no name) - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - (no file)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\windows\downloaded program files\googletoolbar4.dll
O3 - Toolbar: McAfee SiteAdvisor - {0BF43445-2F28-4351-9252-17FE6E806AA0} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKLM\..\Run: [mcagent_exe] C:\Program Files\McAfee.com\Agent\mcagent.exe /runkey
O4 - HKLM\..\Run: [McENUI] C:\PROGRA~1\McAfee\MHN\McENUI.exe /hide
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\RunServices: [upddat'egon] Ad-Aware.exe
O4 - HKCU\..\Run: [Uniblue RegistryBooster 2] C:\Program Files\Uniblue\RegistryBooster 2\RegistryBooster.exe /S
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User '?')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User '?')
O4 - HKUS\S-1-5-21-725345543-1563985344-854245398-1004\..\Run: [Uniblue RegistryBooster 2] C:\Program Files\Uniblue\RegistryBooster 2\RegistryBooster.exe /S (User '?')
O4 - HKUS\S-1-5-21-725345543-1563985344-854245398-500\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User '?')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User '?')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\Office2K\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O15 - Trusted Zone: http://*.att.net
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - http://tools.ebayimg...l_v1-0-3-17.cab
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - https://scan.safety....lscbase3401.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {9059F30F-4EB1-4BD2-9FDC-36F43A218F4A} (Microsoft RDP Client Control (redist)) - http://sssd.k12.ar.u...s_tsc/msrdp.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/...ro.cab32846.cab
O16 - DPF: {E855A2D4-987E-4F3B-A51C-64D10A7E2479} (EPSImageControl Class) - http://tools.ebayimg...ntrol_v1-32.cab
O16 - DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} (Hotmail Attachments Control) - http://lw11fd.law11....ex/HMAtchmt.ocx
O20 - Winlogon Notify: awtturp - awtturp.dll (file missing)
O23 - Service: McAfee Application Installer Cleanup (0118581211110825) (0118581211110825mcinstcleanup) - McAfee, Inc. - C:\WINDOWS\TEMP\011858~1.EXE
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Autodesk Licensing Service - Autodesk - C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS\IA\command.exe (file missing)
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
O23 - Service: McAfee Anti-Spam Service (MSK80Service) - McAfee, Inc. - C:\Program Files\McAfee\MSK\MskSrver.exe
O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe (file missing)
O23 - Service: WUSB54GCSVC - GEMTEKS - C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe

--
End of file - 12977 bytes


Uninstall List

Ad-Aware 2007
Adobe Flash Player ActiveX
Adobe Flash Player Plugin
Compatibility Pack for the 2007 Office system
EasyWorship 2006
HijackThis 2.0.2
Hotfix for Windows Internet Explorer 7 (KB947864)
McAfee SecurityCenter
Microsoft .NET Framework 2.0 Service Pack 1
Microsoft Office XP Professional with FrontPage
Mozilla Firefox (2.0.0.14)
Panda ActiveScan 2.0
Security Update for Windows XP (KB941693)
Security Update for Windows XP (KB945553)
Security Update for Windows XP (KB948590)
Security Update for Windows XP (KB948881)
Security Update for Windows XP (KB950749)
SpywareBlaster 4.0
Uniblue RegistryBooster 2
Windows Live installer
Windows Live Mail
Windows Live Messenger
Windows Live Sign-in Assistant
  • 0

Advertisements


#2
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Hello lpkm79 and Welcome to Geeks to Go!

Sorry for the long wait, busy week.

After checking your log, I found signs of malware on your system. Please stick with me until we get you cleaned up. :)
Please read this post completely before proceeding with the fix. If you have questions, don't hesitate to ask.

Let's start.

First,

Please download Malwarebytes' Anti-Malware from Here or Here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Next,

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
  • Under "Configuration and Preferences", click the Preferences button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Finally,

Post back with the following logs.

- MBAM log
- SuperAntispyware log
- New HijackThis log
  • 0

#3
lpkm79

lpkm79

    New Member

  • Topic Starter
  • Member
  • Pip
  • 2 posts
Malwarebytes' Anti-Malware 1.12
Database version: 788

Scan type: Quick Scan
Objects scanned: 72203
Time elapsed: 1 hour(s), 4 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 7
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\Network Monitor (Trojan.DNSChanger) -> Quarantined and deleted successfully.
C:\Program Files\MalwareAlarm (Rogue.Malware.Alarm) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\iDlo01 (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\default\Local Settings\Temp\NI.UGA6P_0001_N122M2802 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Application Data\NetMon (Trojan.NetMon) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Rabio\Search Enhancer (Adware.SearchEnhancer) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Rabio (Adware.Rabio) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\SYSTEM32\DRIVERS\core.cache.dsk (Malware.Trace) -> Delete on reboot.


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/26/2008 at 05:24 PM

Application Version : 4.1.1046

Core Rules Database Version : 3468
Trace Rules Database Version: 1459

Scan type : Complete Scan
Total Scan Time : 04:40:46

Memory items scanned : 420
Memory threats detected : 0
Registry items scanned : 8703
Registry threats detected : 19
File items scanned : 111155
File threats detected : 305

Adware.MyWay
HKU\S-1-5-21-725345543-1563985344-854245398-1004\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{0494D0D9-F8E0-41AD-92A3-14154ECE70AC}

Adware.Tracking Cookie
C:\Documents and Settings\default\Cookies\default@specificclick[2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@adlegend[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@realmedia[3].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@atwola[1].txt
C:\Documents and Settings\default\Cookies\default@adbrite[1].txt
C:\Documents and Settings\default\Cookies\default@systemerrorfixer[1].txt
C:\Documents and Settings\default\Cookies\default@goclick[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@awola[1].txt
C:\Documents and Settings\default\Cookies\default@adecn[2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@shopica[2].txt
C:\Documents and Settings\default\Cookies\default@altastat[1].txt
C:\Documents and Settings\default\Cookies\[email protected][4].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@247realmedia[2].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\default@statsgod[2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@pro-market[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@adultfriendfinder[1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@mediaplex[1].txt
C:\Documents and Settings\default\Cookies\default@precisionclick[1].txt
C:\Documents and Settings\default\Cookies\default@insightexpressai[3].txt
C:\Documents and Settings\default\Cookies\default@2o7[4].txt
C:\Documents and Settings\default\Cookies\default@incentaclick[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@atdmt[4].txt
C:\Documents and Settings\default\Cookies\default@statcounter[3].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@xiti[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@tacoda[3].txt
C:\Documents and Settings\default\Cookies\default@serving-sys[1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@revsci[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][5].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\default@azjmp[2].txt
C:\Documents and Settings\default\Cookies\[email protected][4].txt
C:\Documents and Settings\default\Cookies\default@overture[2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@bfast[2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@apmebf[3].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@clickarrows[2].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@directtrack[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@burstnet[3].txt
C:\Documents and Settings\default\Cookies\default@freefind[1].txt
C:\Documents and Settings\default\Cookies\default@casalemedia[3].txt
C:\Documents and Settings\default\Cookies\default@toplist[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@cpvfeed[2].txt
C:\Documents and Settings\default\Cookies\default@indiads[2].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\default@questionmarket[3].txt
C:\Documents and Settings\default\Cookies\default@adrevolver[2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@redorbit[1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@interclick[1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@media6degrees[1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@trafficmp[2].txt
C:\Documents and Settings\default\Cookies\default@adinterax[1].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@advertising[5].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@revenue[2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@hitbox[2].txt
C:\Documents and Settings\default\Cookies\default@googleadservices[1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@dealtime[2].txt
C:\Documents and Settings\default\Cookies\default@toseeka[2].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\default@antispywaremaster[1].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@hypertracker[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\default@lynxtrack[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@adrevolver[3].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@apmebf[2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@insightexpressai[2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@tripod[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@adserver[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@maxserving[2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@realmedia[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@belnk[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@keywordmax[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@adknowledge[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@roiservice[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@tacoda[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@atwola[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@adrevolver[2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@wTracker[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@burstnet[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@statcounter[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@nextag[2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@serving-sys[2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@admarketplace[1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@starware[2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\default@casalemedia[2].txt
C:\Documents and Settings\default\Local Settings\Temp\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@tacoda[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@toseeka[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@clicksfeed[2].txt
C:\Documents and Settings\default\Cookies\default@primeclickz[2].txt
C:\Documents and Settings\default\Cookies\default@atdmt[2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@overture[1].txt
C:\Documents and Settings\default\Cookies\default@hornymatches[2].txt
C:\Documents and Settings\default\Cookies\default@mediaplex[2].txt
C:\Documents and Settings\default\Cookies\default@adecn[1].txt
C:\Documents and Settings\default\Cookies\default@tradedoubler[2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@revenue[1].txt
C:\Documents and Settings\default\Cookies\default@advertising[2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@adnetserver[1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@superstats[1].txt
C:\Documents and Settings\default\Cookies\default@redorbit[2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@247realmedia[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@serving-sys[2].txt
C:\Documents and Settings\default\Cookies\default@hitbox[1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@cpvfeed[1].txt
C:\Documents and Settings\default\Cookies\default@yadro[2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@advertising[3].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@realmedia[2].txt
C:\Documents and Settings\default\Cookies\default@enhance[2].txt
C:\Documents and Settings\default\Cookies\default@webtraffic20[2].txt
C:\Documents and Settings\default\Cookies\default@adultobserver[2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@interclick[2].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@oklahomacounty[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@hitbox[3].txt
C:\Documents and Settings\default\Cookies\default@trafficmp[1].txt
C:\Documents and Settings\default\Cookies\default@apmebf[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@oddcast[1].txt
C:\Documents and Settings\default\Cookies\default@atdmt[3].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@revsci[2].txt
C:\Documents and Settings\default\Cookies\default@partner2profit[1].txt
C:\Documents and Settings\default\Cookies\default@indextools[2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@dealtime[1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@casalemedia[2].txt
C:\Documents and Settings\default\Cookies\[email protected][3].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@statcounter[2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@interclick[3].txt
C:\Documents and Settings\default\Cookies\default@2o7[2].txt
C:\Documents and Settings\default\Cookies\default@burstnet[2].txt
C:\Documents and Settings\default\Cookies\default@adlegend[2].txt
C:\Documents and Settings\default\Cookies\default@insightexpressai[1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@clicksor[2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@insightexpressai[2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@adbrite[2].txt
C:\Documents and Settings\default\Cookies\default@directtrack[2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@linksynergy[1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@clickbank[1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][2].txt
C:\Documents and Settings\default\Cookies\default@questionmarket[1].txt
C:\Documents and Settings\default\Cookies\default@clickonhealth[2].txt
C:\Documents and Settings\default\Cookies\default@adinterax[2].txt
C:\Documents and Settings\default\Cookies\default@media6degrees[2].txt
C:\Documents and Settings\default\Cookies\default@advertising[1].txt
C:\Documents and Settings\default\Cookies\default@2o7[3].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@serving-sys[3].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt
C:\Documents and Settings\default\Cookies\default@precisionclick[2].txt
C:\Documents and Settings\default\Cookies\[email protected][4].txt
C:\Documents and Settings\default\Cookies\[email protected][1].txt

Trojan.NetMon/DNSChange
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#DeviceDesc

Trojan.cmdService
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#DeviceDesc

RootKit.TnCore/Trace
C:\WINDOWS\system32\drivers\core.cache.dsk

Rootkit.TNCore-Variant/A
C:\WINDOWS\SYSTEM32\DRIVERS\DRMKK.SYS

Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\MCRH.TMP

Trojan.Unknown Origin
C:\FOUND.015\FILE0022.CHK
C:\FOUND.015\FILE0026.CHK

Trojan.Downloader-Gen/FakeAlert-A
C:\DOCUMENTS AND SETTINGS\DEFAULT\LOCAL SETTINGS\TEMP\RAYIOU.EXE


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 21:46:12, on 5.26.2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16640)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
C:\WINDOWS\Explorer.EXE
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\Program Files\McAfee\MSK\MskSrver.exe
C:\WINDOWS\System32\svchost.exe
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\Uniblue\RegistryBooster 2\RegistryBooster.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WUSB54GC.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Documents and Settings\default\Desktop\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://desktop.presa...e...C01&lc=0409
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.c...rch/search.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.c...//www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://mail.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.c...//www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.c...rch/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.c...//www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://search.presar...c...C01&lc=0409
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://search.presar...c...C01&lc=0409
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.c...//www.yahoo.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Elledge Internet Explorer
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src"); (C:\Documents and Settings\DEFAULT\Application Data\Mozilla\Profiles\default\616dyoqo.slt\prefs.js)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {089FD14D-132B-48FC-8861-0048AE113215} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
O2 - BHO: (no name) - {2022F1EA-3069-4BB7-BCEB-0ECD11A28D2A} - (no file)
O2 - BHO: McAntiPhishingBHO - {377C180E-6F0E-4D4C-980F-F45BD3D40CF4} - c:\PROGRA~1\mcafee\msk\mcapbho.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: UberButton Class - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: YahooTaggedBM Class - {65D886A2-7CA7-479B-BB95-14D1EFB7946A} - C:\Program Files\Yahoo!\Common\YIeTagBm.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\windows\downloaded program files\googletoolbar4.dll
O2 - BHO: (no name) - {BDF3E430-B101-42AD-A544-FADC6B084872} - (no file)
O2 - BHO: {6e7e5a15-7ab2-baeb-2434-8478d00b3c6c} - {c6c3b00d-8748-4342-beab-2ba751a5e7e6} - (no file)
O3 - Toolbar: (no name) - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - (no file)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\windows\downloaded program files\googletoolbar4.dll
O3 - Toolbar: McAfee SiteAdvisor - {0BF43445-2F28-4351-9252-17FE6E806AA0} - C:\Program Files\SiteAdvisor\6253\SiteAdv.dll
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKLM\..\Run: [mcagent_exe] C:\Program Files\McAfee.com\Agent\mcagent.exe /runkey
O4 - HKLM\..\Run: [McENUI] C:\PROGRA~1\McAfee\MHN\McENUI.exe /hide
O4 - HKLM\..\RunServices: [upddat'egon] Ad-Aware.exe
O4 - HKCU\..\Run: [Uniblue RegistryBooster 2] C:\Program Files\Uniblue\RegistryBooster 2\RegistryBooster.exe /S
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User '?')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User '?')
O4 - HKUS\S-1-5-21-725345543-1563985344-854245398-1004\..\Run: [Uniblue RegistryBooster 2] C:\Program Files\Uniblue\RegistryBooster 2\RegistryBooster.exe /S (User '?')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User '?')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\Office2K\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O15 - Trusted Zone: http://*.att.net
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - http://tools.ebayimg...l_v1-0-3-17.cab
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - https://scan.safety....lscbase3401.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {9059F30F-4EB1-4BD2-9FDC-36F43A218F4A} (Microsoft RDP Client Control (redist)) - http://sssd.k12.ar.u...s_tsc/msrdp.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/...ro.cab32846.cab
O16 - DPF: {E855A2D4-987E-4F3B-A51C-64D10A7E2479} (EPSImageControl Class) - http://tools.ebayimg...ntrol_v1-32.cab
O16 - DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} (Hotmail Attachments Control) - http://lw11fd.law11....ex/HMAtchmt.ocx
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: awtturp - awtturp.dll (file missing)
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Autodesk Licensing Service - Autodesk - C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
O23 - Service: McAfee Anti-Spam Service (MSK80Service) - McAfee, Inc. - C:\Program Files\McAfee\MSK\MskSrver.exe
O23 - Service: WUSB54GCSVC - GEMTEKS - C:\Program Files\Compact Wireless-G USB Adapter Wireless Network Monitor\WLService.exe

--
End of file - 12478 bytes
  • 0

#4
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Good. It took care of some now let's target the rest. :)

Next,

Please download VundoFix.exe to your desktop
  • Double-click VundoFix.exe to run it.
  • Click the Scan for Vundo button.
  • Once it's done scanning, click the Remove Vundo button.
  • You will receive a prompt asking if you want to remove the files, click YES
  • Once you click yes, your desktop will go blank as it starts removing Vundo.
  • When completed, it will prompt that it will reboot your computer, click OK.
  • Please post the contents of C:\vundofix.txt and a new HiJackThis log in a reply to this thread.
Note: It is possible that VundoFix encountered a file it could not remove. In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the Scan for Vundo button" when VundoFix appears upon rebooting.

Then,

Download SDFix and save it to your Desktop.

Double click SDFix.exe and it will extract the files to %systemdrive%
(Drive that contains the Windows Directory, typically C:\SDFix)

Please then reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, the Advanced Options Menu should appear;
  • Select the first option, to run Windows in Safe Mode, then press Enter.
  • Choose your usual account.
  • Open the extracted SDFix folder and double click RunThis.bat to start the script.
  • Type Y to begin the cleanup process.
  • It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
  • Press any Key and it will restart the PC.
  • When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
  • Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
    (Report.txt will also be copied to Clipboard ready for posting back on the forum).
  • Finally paste the contents of the Report.txt back on the forum with a new HijackThis log



Please post back with

-Vundofix log
-Sdfix log
  • 0

#5
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please contact a staff member. This applies only to the original topic starter. Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP