Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

IE Pop-Ups


  • Please log in to reply

#1
rbzane

rbzane

    New Member

  • Member
  • Pip
  • 5 posts
Hello G2G Staff,

I've followed the instructions listed in this forum and you will find my Hijackthis Log below. I ran CleanUp, Ad-Aware, SpyBot and Housecall. I'm still getting these annoying pop-ups while I browse with IE.

Thank you for your help,
Rob

Logfile of HijackThis v1.99.1
Scan saved at 3:13:34 AM, on 7/10/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\NavNT\defwatch.exe
C:\WINDOWS\system32\inetsrv\inetinfo.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\NavNT\rtvscan.exe
C:\WINDOWS\system32\MsgSys.EXE
C:\WINDOWS\Explorer.EXE
C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\Program Files\NavNT\vptray.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Cisco Systems\Aironet Client Monitor\ACUMon.Exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\WINDOWS\system32\urlnpr.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Microsoft Money\System\mnyexpr.exe
C:\anti-spy\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.msnbc.msn.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://companyweb
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = about:blank
R3 - Default URLSearchHook is missing
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {243B17DE-77C7-46BF-B94B-0B5F309A0E64} - C:\Program Files\Microsoft Money\System\mnyside.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [ACUMon] "C:\Program Files\Cisco Systems\Aironet Client Monitor\ACUMon.Exe" -a
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
O4 - HKLM\..\Run: [KavSvc] C:\WINDOWS\system32\urlnpr.exe reg_run
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\INetRepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\INetRepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\INetRepl.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://companyweb
O16 - DPF: {3299935F-2C5A-499A-9908-95CFFF6EF8C1} (Quicksilver Class) - http://scpwhc.ops.pl...quicksilver.cab
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} (Microsoft RDP Client Control (redist)) - https://www.tarantul...emote/msrdp.cab
O16 - DPF: {BF116476-3238-4EDA-A2D7-6D6814EF0DEC} (Quicksilver Class) - http://scpwbf.ops.pl...quicksilver.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = tarantulatech.local
O17 - HKLM\Software\..\Telephony: DomainName = tarantulatech.local
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = tarantulatech.local
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = tarantulatech.local
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\NavNT\defwatch.exe
O23 - Service: Norton AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\NavNT\rtvscan.exe
  • 0

Advertisements


#2
Wizard

Wizard

    Retired Staff

  • Retired Staff
  • 5,661 posts
Hi rbzane and Welcome to GeekstoGo!

I will need to see 3 Scans please

Download Pfind:
http://www.bleepingc...r/pfind-new.zip

Right Click the Zip Folder and Select "Extract All"
So make sure all those files remain in the same folder.

Don't use it yet!

Reboot into SAFE MODE(Tap F8 when restarting)
Here is a link on how to boot into Safe Mode:
http://service1.syma...src=sec_doc_nam


Doubleclick pfind.bat
It will scan for a while, so please be patient.
Wait till the doswindow closes.


Run MSCONFIG and enable everything in the startup area. To get to MSCONFIG, click on Start -> Run -> type in MSCONFIG -> click OK!

Under the "General" Tab
Make Sure Normal Startup is Checked!!

Click Apply>>OK>>Follow the Prompts to Restart!


Restart in Normal Mode and Open HijackThis and Generate a Startup List Report


Hijackthis StartUp Log:
Open HijackThis,Select Config(Bottom Right)>>>Select Misc Tools>>> Select Generate StartUpList log and make sure that both Boxes beside it are checked:

Put a check by:
List all minor sections(Full)
and
List Empty Sections(Complete)

It will produce a NotePad Page,I need you to post the entire contents of that page to the next post!


Next,Download TrackQoo from Here

Double Click on "Track qoo.vbs"

If you Antivirus has Script Blocking,you will get a Pop Up Windows asking you what to do

Allow this Entire Script to Run,its harmless!

Wait a few seconds and a notepad page will pop up,Copy&Paste those results in the next post!


Post the Results of Pfind (C:\pfind.txt)-> Results of Startup List log-> TrackQoo Results!
  • 0

#3
rbzane

rbzane

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
Cretemonster,

Thanks for the instructions. Unfortunately, I have not been able to get passed step one. When I follow the link to pfind-new.zip, I receive a 404 error stating the page is no longer on the server. Is there another site where I could download the appropriate pfind tool.

Thanks again,
Rob
  • 0

#4
Wizard

Wizard

    Retired Staff

  • Retired Staff
  • 5,661 posts
Well lets use this one instead

please download rkfiles.zip and unzip it to its own permanent folder.
http://skads.org/special/rkfiles.zip

Restart the computer in Safe Mode

Locate the rkfiles.bat file and double-click it to run it. It will start scanning your computer and could take a little while so be patient.

When the DOS window closes, reboot back to normal mode.

Post the contents of C:\log.txt

Use those instead of the Pfind Instructions!
  • 0

#5
rbzane

rbzane

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
Cretemonster,

Here are the logs of the three scans.

Thank you for looking at these,
Rob

>>>>> Results of rkfiles (C:\log.txt)<<<<<

C:\anti-spy\rkfiles

PLEASE NOTE THAT ALL FILES FOUND BY THIS METHOD ARE NOT BAD FILES, THERE MIGHT BE LEGIT FILES LISTED AND PLEASE BE CAREFUL WHILE FIXING. IF YOU ARE UNSURE OF WHAT IT IS LEAVE THEM ALONE.
Files Found in system Folder............
------------------------
C:\WINDOWS\system32\opngrpg.dll: UPX!
C:\WINDOWS\system32\supdate.dll: UPX!
C:\WINDOWS\system32\urlnpr.exe: UPX!
C:\WINDOWS\system32\wqgvk.dat: UPX!
C:\WINDOWS\system32\dfrg.msc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAAwGpEc213

Files Found in all users startup Folder............
------------------------
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rdut.exe: UPX!
Files Found in all users windows Folder............
------------------------
C:\WINDOWS\qool.exe: UPX!
C:\WINDOWS\qool.exe: UPX!
C:\WINDOWS\qool.exe: UPX!
C:\WINDOWS\ssk.exe: UPX!
C:\WINDOWS\tsc.exe: UPX!
C:\WINDOWS\vsapi32.dll: UPX!t4
Finished
bye



>>>>>Results of Startup List log<<<<<

StartupList report, 7/10/2005, 8:18:37 PM
StartupList version: 1.52.2
Started from : C:\anti-spy\HijackThis.EXE
Detected: Windows XP SP2 (WinNT 5.01.2600)
Detected: Internet Explorer v6.00 SP2 (6.00.2900.2180)
* Using default options
* Including empty and uninteresting sections
* Showing rarely important sections
==================================================

Running processes:

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\NavNT\defwatch.exe
C:\WINDOWS\system32\inetsrv\inetinfo.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\NavNT\rtvscan.exe
C:\WINDOWS\system32\MsgSys.EXE
C:\WINDOWS\Explorer.EXE
C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\Program Files\NavNT\vptray.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Cisco Systems\Aironet Client Monitor\ACUMon.Exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
C:\WINDOWS\system32\urlnpr.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft Money\System\mnyexpr.exe
C:\anti-spy\HijackThis.exe

--------------------------------------------------

Listing of startup folders:

Shell folders Startup:
[C:\Documents and Settings\Administrator\Start Menu\Programs\Startup]
*No files*

Shell folders AltStartup:
*Folder not found*

User shell folders Startup:
*Folder not found*

User shell folders AltStartup:
*Folder not found*

Shell folders Common Startup:
[C:\Documents and Settings\All Users\Start Menu\Programs\Startup]
*No files*

Shell folders Common AltStartup:
*Folder not found*

User shell folders Common Startup:
*Folder not found*

User shell folders Alternate Common Startup:
*Folder not found*

--------------------------------------------------

Checking Windows NT UserInit:

[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
UserInit = C:\WINDOWS\system32\userinit.exe,

[HKLM\Software\Microsoft\Windows\CurrentVersion\Winlogon]
*Registry key not found*

[HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
*Registry value not found*

[HKCU\Software\Microsoft\Windows\CurrentVersion\Winlogon]
*Registry key not found*

--------------------------------------------------

Autorun entries from Registry:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run

AdaptecDirectCD = "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
vptray = C:\Program Files\NavNT\vptray.exe
TkBellExe = "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
ACUMon = "C:\Program Files\Cisco Systems\Aironet Client Monitor\ACUMon.Exe" -a
QuickTime Task = "C:\Program Files\QuickTime\qttask.exe" -atboottime
SunJavaUpdateSched = C:\Program Files\Java\jre1.5.0_02\bin\jusched.exe
KavSvc = C:\WINDOWS\system32\urlnpr.exe reg_run

--------------------------------------------------

Autorun entries from Registry:
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce

*No values found*

--------------------------------------------------

Autorun entries from Registry:
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx

*No values found*

--------------------------------------------------

Autorun entries from Registry:
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices

*Registry key not found*

--------------------------------------------------

Autorun entries from Registry:
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce

*Registry key not found*

--------------------------------------------------

Autorun entries from Registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run

ctfmon.exe = C:\WINDOWS\system32\ctfmon.exe
MoneyAgent = "C:\Program Files\Microsoft Money\System\mnyexpr.exe"

--------------------------------------------------

Autorun entries from Registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce

*No values found*

--------------------------------------------------

Autorun entries from Registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnceEx

*Registry key not found*

--------------------------------------------------

Autorun entries from Registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices

*Registry key not found*

--------------------------------------------------

Autorun entries from Registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce

*Registry key not found*

--------------------------------------------------

Autorun entries from Registry:
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Run

*Registry key not found*

--------------------------------------------------

Autorun entries from Registry:
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Run

*Registry key not found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run

[OptionalComponents]
*No values found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
*No subkeys found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
*No subkeys found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
*Registry key not found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
*Registry key not found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
*No subkeys found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
*No subkeys found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
*Registry key not found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
*Registry key not found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
*Registry key not found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Run
*Registry key not found*

--------------------------------------------------

Autorun entries in Registry subkeys of:
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Run
*Registry key not found*

--------------------------------------------------

File association entry for .EXE:
HKEY_CLASSES_ROOT\exefile\shell\open\command

(Default) = "%1" %*

--------------------------------------------------

File association entry for .COM:
HKEY_CLASSES_ROOT\comfile\shell\open\command

(Default) = "%1" %*

--------------------------------------------------

File association entry for .BAT:
HKEY_CLASSES_ROOT\batfile\shell\open\command

(Default) = "%1" %*

--------------------------------------------------

File association entry for .PIF:
HKEY_CLASSES_ROOT\piffile\shell\open\command

(Default) = "%1" %*

--------------------------------------------------

File association entry for .SCR:
HKEY_CLASSES_ROOT\scrfile\shell\open\command

(Default) = "%1" /S

--------------------------------------------------

File association entry for .HTA:
HKEY_CLASSES_ROOT\htafile\shell\open\command

(Default) = C:\WINDOWS\System32\mshta.exe "%1" %*

--------------------------------------------------

File association entry for .TXT:
HKEY_CLASSES_ROOT\txtfile\shell\open\command

(Default) = %SystemRoot%\system32\NOTEPAD.EXE %1

--------------------------------------------------

Enumerating Active Setup stub paths:
HKLM\Software\Microsoft\Active Setup\Installed Components
(* = disabled by HKCU twin)

[4945aad7-311d-4525-865c-c5d8b7377e32] *
StubPath = C:\WINDOWS\system32\dcxomco.exe

[>{22d6f312-b0f6-11d0-94ab-0080c74c7e95}]
StubPath = C:\WINDOWS\inf\unregmp2.exe /ShowWMP

[>{26923b43-4d38-484f-9b9e-de460746276c}] *
StubPath = %systemroot%\system32\shmgrate.exe OCInstallUserConfigIE

[>{60B49E34-C7CC-11D0-8953-00A0C90347FF}MICROS] *
StubPath = RunDLL32 IEDKCS32.DLL,BrandIE4 SIGNUP

[>{881dd1c5-3dcf-431b-b061-f3f88e8be88a}] *
StubPath = %systemroot%\system32\shmgrate.exe OCInstallUserConfigOE

[{2C7339CF-2B09-4501-B3F3-F3508C9228ED}] *
StubPath = %SystemRoot%\system32\regsvr32.exe /s /n /i:/UserInstall %SystemRoot%\system32\themeui.dll

[{44BBA840-CC51-11CF-AAFA-00AA00B6015C}] *
StubPath = "%ProgramFiles%\Outlook Express\setup50.exe" /APP:OE /CALLER:WINNT /user /install

[{44BBA842-CC51-11CF-AAFA-00AA00B6015B}] *
StubPath = rundll32.exe advpack.dll,LaunchINFSection C:\WINDOWS\INF\msnetmtg.inf,NetMtg.Install.PerUser.NT

[{4b218e3e-bc98-4770-93d3-2731b9329278}] *
StubPath = %SystemRoot%\System32\rundll32.exe setupapi,InstallHinfSection MarketplaceLinkInstall 896 %systemroot%\inf\ie.inf

[{5945c046-1e7d-11d1-bc44-00c04fd912be}] *
StubPath = rundll32.exe advpack.dll,LaunchINFSection C:\WINDOWS\INF\msmsgs.inf,BLC.QuietInstall.PerUser

[{6BF52A52-394A-11d3-B153-00C04F79FAA6}] *
StubPath = rundll32.exe advpack.dll,LaunchINFSection C:\WINDOWS\INF\wmp.inf,PerUserStub

[{7790769C-0471-11d2-AF11-00C04FA35D02}] *
StubPath = "%ProgramFiles%\Outlook Express\setup50.exe" /APP:WAB /CALLER:WINNT /user /install

[{89820200-ECBD-11cf-8B85-00AA005B4340}] *
StubPath = regsvr32.exe /s /n /i:U shell32.dll

[{89820200-ECBD-11cf-8B85-00AA005B4383}] *
StubPath = %SystemRoot%\system32\ie4uinit.exe

[{89B4C1CD-B018-4511-B0A1-5476DBF70820}] *
StubPath = C:\WINDOWS\system32\Rundll32.exe C:\WINDOWS\system32\mscories.dll,Install

[{8b15971b-5355-4c82-8c07-7e181ea07608}] *
StubPath = rundll32.exe advpack.dll,LaunchINFSection C:\WINDOWS\INF\fxsocm.inf,Fax.Install.PerUser

--------------------------------------------------

Enumerating ICQ Agent Autostart apps:
HKCU\Software\Mirabilis\ICQ\Agent\Apps

*Registry key not found*

--------------------------------------------------

Load/Run keys from C:\WINDOWS\WIN.INI:

load=*INI section not found*
run=*INI section not found*

Load/Run keys from Registry:

HKLM\..\Windows NT\CurrentVersion\WinLogon: load=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\WinLogon: run=*Registry value not found*
HKLM\..\Windows\CurrentVersion\WinLogon: load=*Registry key not found*
HKLM\..\Windows\CurrentVersion\WinLogon: run=*Registry key not found*
HKCU\..\Windows NT\CurrentVersion\WinLogon: load=*Registry value not found*
HKCU\..\Windows NT\CurrentVersion\WinLogon: run=*Registry value not found*
HKCU\..\Windows\CurrentVersion\WinLogon: load=*Registry key not found*
HKCU\..\Windows\CurrentVersion\WinLogon: run=*Registry key not found*
HKCU\..\Windows NT\CurrentVersion\Windows: load=
HKCU\..\Windows NT\CurrentVersion\Windows: run=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\Windows: load=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\Windows: run=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\Windows: AppInit_DLLs=

--------------------------------------------------

Shell & screensaver key from C:\WINDOWS\SYSTEM.INI:

Shell=*INI section not found*
SCRNSAVE.EXE=*INI section not found*
drivers=*INI section not found*

Shell & screensaver key from Registry:

Shell=Explorer.exe
SCRNSAVE.EXE=*Registry value not found*
drivers=*Registry value not found*

Policies Shell key:

HKCU\..\Policies: Shell=*Registry key not found*
HKLM\..\Policies: Shell=*Registry value not found*

--------------------------------------------------

Checking for EXPLORER.EXE instances:

C:\WINDOWS\Explorer.exe: PRESENT!

C:\Explorer.exe: not present
C:\WINDOWS\Explorer\Explorer.exe: not present
C:\WINDOWS\System\Explorer.exe: not present
C:\WINDOWS\System32\Explorer.exe: not present
C:\WINDOWS\Command\Explorer.exe: not present
C:\WINDOWS\Fonts\Explorer.exe: not present

--------------------------------------------------

Checking for superhidden extensions:

.lnk: HIDDEN! (arrow overlay: yes)
.pif: HIDDEN! (arrow overlay: yes)
.exe: not hidden
.com: not hidden
.bat: not hidden
.hta: not hidden
.scr: not hidden
.shs: HIDDEN!
.shb: HIDDEN!
.vbs: not hidden
.vbe: not hidden
.wsh: not hidden
.scf: HIDDEN! (arrow overlay: NO!)
.url: HIDDEN! (arrow overlay: yes)
.js: not hidden
.jse: not hidden

--------------------------------------------------

Verifying REGEDIT.EXE integrity:

- Regedit.exe found in C:\WINDOWS
- .reg open command is normal (regedit.exe %1)
- Company name OK: 'Microsoft Corporation'
- Original filename OK: 'REGEDIT.EXE'
- File description: 'Registry Editor'

Registry check passed

--------------------------------------------------

Enumerating Browser Helper Objects:

(no name) - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}
(no name) - C:\Program Files\Microsoft Money\System\mnyside.dll - {243B17DE-77C7-46BF-B94B-0B5F309A0E64}
(no name) - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll - {53707962-6F74-2D53-2644-206D7942484F}
(no name) - (no file) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC}

--------------------------------------------------

Enumerating Task Scheduler jobs:

*No jobs found*

--------------------------------------------------

Enumerating Download Program Files:

[Microsoft XML Parser for Java]
CODEBASE = file://C:\WINDOWS\Java\classes\xmldso.cab
OSD = C:\WINDOWS\Downloaded Program Files\Microsoft XML Parser for Java.osd

[{0000000A-0000-0010-8000-00AA00389B71}]
CODEBASE = http://download.micr...0367/wmavax.CAB

[Quicksilver Class]
CODEBASE = http://scpwhc.ops.pl...quicksilver.cab

[{33564D57-0000-0010-8000-00AA00389B71}]
CODEBASE = http://download.micr...922/wmv9VCM.CAB

[{41F17733-B041-4099-A042-B518BB6A408C}]
CODEBASE = http://a1540.g.akama...meInstaller.exe

[HouseCall Control]
InProcServer32 = C:\WINDOWS\DOWNLO~1\xscan53.ocx
CODEBASE = http://a840.g.akamai...all/xscan53.cab

[Microsoft RDP Client Control (redist)]
InProcServer32 = C:\WINDOWS\Downloaded Program Files\msrdp.ocx
CODEBASE = https://www.tarantul...emote/msrdp.cab

[Quicksilver Class]
CODEBASE = http://scpwbf.ops.pl...quicksilver.cab

[Shockwave Flash Object]
InProcServer32 = C:\WINDOWS\System32\macromed\flash\Flash.ocx
CODEBASE = http://download.macr...ash/swflash.cab

--------------------------------------------------

Enumerating Winsock LSP files:

NameSpace #1: C:\WINDOWS\System32\mswsock.dll
NameSpace #2: C:\WINDOWS\System32\winrnr.dll
NameSpace #3: C:\WINDOWS\System32\mswsock.dll
Protocol #1: C:\WINDOWS\system32\mswsock.dll
Protocol #2: C:\WINDOWS\system32\mswsock.dll
Protocol #3: C:\WINDOWS\system32\mswsock.dll
Protocol #4: C:\WINDOWS\system32\rsvpsp.dll
Protocol #5: C:\WINDOWS\system32\rsvpsp.dll
Protocol #6: C:\WINDOWS\system32\mswsock.dll
Protocol #7: C:\WINDOWS\system32\mswsock.dll
Protocol #8: C:\WINDOWS\system32\mswsock.dll
Protocol #9: C:\WINDOWS\system32\mswsock.dll
Protocol #10: C:\WINDOWS\system32\mswsock.dll
Protocol #11: C:\WINDOWS\system32\mswsock.dll
Protocol #12: C:\WINDOWS\system32\mswsock.dll
Protocol #13: C:\WINDOWS\system32\mswsock.dll
Protocol #14: C:\WINDOWS\system32\mswsock.dll
Protocol #15: C:\WINDOWS\system32\mswsock.dll

--------------------------------------------------

Enumerating Windows NT/2000/XP services

Microsoft ACPI Driver: System32\DRIVERS\ACPI.sys (system)
Microsoft Embedded Controller Driver: System32\DRIVERS\ACPIEC.sys (system)
Microsoft Kernel Acoustic Echo Canceller: system32\drivers\aec.sys (manual start)
AFD Networking Support Environment: \SystemRoot\System32\drivers\afd.sys (system)
Intel AGP Bus Filter: System32\DRIVERS\agp440.sys (system)
Alerter: %SystemRoot%\System32\svchost.exe -k LocalService (disabled)
Application Layer Gateway Service: %SystemRoot%\System32\alg.exe (manual start)
Application Management: %SystemRoot%\system32\svchost.exe -k netsvcs (manual start)
ASP.NET State Service: %SystemRoot%\Microsoft.NET\Framework\v1.1.4322\aspnet_state.exe (manual start)
RAS Asynchronous Media Driver: System32\DRIVERS\asyncmac.sys (manual start)
Standard IDE/ESDI Hard Disk Controller: System32\DRIVERS\atapi.sys (system)
ATM ARP Client Protocol: System32\DRIVERS\atmarpc.sys (manual start)
Windows Audio: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Audio Stub Driver: System32\DRIVERS\audstub.sys (manual start)
Background Intelligent Transfer Service: %SystemRoot%\System32\svchost.exe -k netsvcs (manual start)
Computer Browser: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
CD-ROM Driver: System32\DRIVERS\cdrom.sys (system)
Indexing Service: C:\WINDOWS\System32\cisvc.exe (manual start)
ClipBook: %SystemRoot%\system32\clipsrv.exe (disabled)
Microsoft ACPI Control Method Battery Driver: System32\DRIVERS\CmBatt.sys (manual start)
Microsoft Composite Battery Driver: System32\DRIVERS\compbatt.sys (system)
COM+ System Application: C:\WINDOWS\System32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235} (manual start)
Cryptographic Services: %SystemRoot%\system32\svchost.exe -k netsvcs (autostart)
DCOM Server Process Launcher: %SystemRoot%\system32\svchost -k DcomLaunch (autostart)
DefWatch: C:\Program Files\NavNT\defwatch.exe (autostart)
DHCP Client: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Disk Driver: System32\DRIVERS\disk.sys (system)
Logical Disk Manager Administrative Service: %SystemRoot%\System32\dmadmin.exe /com (manual start)
dmboot: System32\drivers\dmboot.sys (disabled)
Logical Disk Manager Driver: System32\drivers\dmio.sys (system)
dmload: System32\drivers\dmload.sys (system)
Logical Disk Manager: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Microsoft Kernel DLS Syntheiszer: system32\drivers\DMusic.sys (manual start)
DNS Client: %SystemRoot%\System32\svchost.exe -k NetworkService (autostart)
Microsoft Kernel DRM Audio Descrambler: system32\drivers\drmkaud.sys (manual start)
3Com EtherLink XL 90XB/C Adapter Driver: System32\DRIVERS\el90xbc5.sys (manual start)
Error Reporting Service: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Event Log: %SystemRoot%\system32\services.exe (autostart)
COM+ Event System: C:\WINDOWS\System32\svchost.exe -k netsvcs (manual start)
Fast User Switching Compatibility: %SystemRoot%\System32\svchost.exe -k netsvcs (manual start)
Fax: %systemroot%\system32\fxssvc.exe (autostart)
Floppy Disk Controller Driver: System32\DRIVERS\fdc.sys (manual start)
Floppy Disk Driver: System32\DRIVERS\flpydisk.sys (manual start)
FltMgr: system32\drivers\fltmgr.sys (system)
Volume Manager Driver: System32\DRIVERS\ftdisk.sys (system)
Generic Packet Classifier: System32\DRIVERS\msgpc.sys (manual start)
Help and Support: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Human Interface Device Access: %SystemRoot%\System32\svchost.exe -k netsvcs (disabled)
HTTP: System32\Drivers\HTTP.sys (manual start)
HTTP SSL: %SystemRoot%\System32\svchost.exe -k HTTPFilter (manual start)
i8042 Keyboard and PS/2 Mouse Port Driver: System32\DRIVERS\i8042prt.sys (system)
IIS Admin: C:\WINDOWS\system32\inetsrv\inetinfo.exe (autostart)
IMAPI CD-Burning COM Service: C:\WINDOWS\System32\imapi.exe (manual start)
IntelIde: System32\DRIVERS\intelide.sys (system)
IPv6 Windows Firewall Driver: system32\drivers\ip6fw.sys (manual start)
IP Traffic Filter Driver: System32\DRIVERS\ipfltdrv.sys (manual start)
IP in IP Tunnel Driver: System32\DRIVERS\ipinip.sys (manual start)
IP Network Address Translator: System32\DRIVERS\ipnat.sys (manual start)
IPSEC driver: System32\DRIVERS\ipsec.sys (system)
IR Enumerator Service: System32\DRIVERS\irenum.sys (manual start)
PnP ISA/EISA Bus Driver: System32\DRIVERS\isapnp.sys (system)
Keyboard Class Driver: System32\DRIVERS\kbdclass.sys (system)
Microsoft Kernel Wave Audio Mixer: system32\drivers\kmixer.sys (manual start)
Server: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Workstation: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
TCP/IP NetBIOS Helper: %SystemRoot%\System32\svchost.exe -k LocalService (autostart)
LT Modem Driver: System32\DRIVERS\ltmdmnt.sys (manual start)
Machine Debug Manager: "C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE" (autostart)
Messenger: %SystemRoot%\System32\svchost.exe -k netsvcs (disabled)
NetMeeting Remote Desktop Sharing: C:\WINDOWS\System32\mnmsrvc.exe (manual start)
Unimodem Streaming Filter Device: system32\drivers\MODEMCSA.sys (manual start)
Mouse Class Driver: System32\DRIVERS\mouclass.sys (system)
WebDav Client Redirector: System32\DRIVERS\mrxdav.sys (manual start)
MRXSMB: System32\DRIVERS\mrxsmb.sys (system)
Distributed Transaction Coordinator: C:\WINDOWS\System32\msdtc.exe (manual start)
Windows Installer: C:\WINDOWS\system32\msiexec.exe /V (manual start)
Microsoft Streaming Service Proxy: system32\drivers\MSKSSRV.sys (manual start)
Microsoft Streaming Clock Proxy: system32\drivers\MSPCLOCK.sys (manual start)
Microsoft Streaming Quality Manager Proxy: system32\drivers\MSPQM.sys (manual start)
Microsoft System Management BIOS Driver: System32\DRIVERS\mssmbios.sys (manual start)
NAVAP: \??\C:\Program Files\NavNT\NAVAP.sys (manual start)
NAVAPEL: \??\C:\Program Files\NavNT\NAVAPEL.SYS (autostart)
NAVENG: \??\C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20050706.008\NAVENG.sys (manual start)
NAVEX15: \??\C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20050706.008\NAVEX15.sys (manual start)
Remote Access NDIS TAPI Driver: System32\DRIVERS\ndistapi.sys (manual start)
NDIS Usermode I/O Protocol: System32\DRIVERS\ndisuio.sys (manual start)
Remote Access NDIS WAN Driver: System32\DRIVERS\ndiswan.sys (manual start)
neo20xx: System32\DRIVERS\neo20xx.sys (manual start)
NetBIOS Interface: System32\DRIVERS\netbios.sys (system)
NetBios over Tcpip: System32\DRIVERS\netbt.sys (system)
Network DDE: %SystemRoot%\system32\netdde.exe (disabled)
Network DDE DSDM: %SystemRoot%\system32\netdde.exe (disabled)
Net Logon: %SystemRoot%\System32\lsass.exe (autostart)
Network Connections: %SystemRoot%\System32\svchost.exe -k netsvcs (manual start)
Network Location Awareness (NLA): %SystemRoot%\System32\svchost.exe -k netsvcs (manual start)
Norton AntiVirus Client: C:\Program Files\NavNT\rtvscan.exe (autostart)
NT LM Security Support Provider: %SystemRoot%\System32\lsass.exe (manual start)
Removable Storage: %SystemRoot%\system32\svchost.exe -k netsvcs (manual start)
IPX Traffic Filter Driver: System32\DRIVERS\nwlnkflt.sys (manual start)
IPX Traffic Forwarder Driver: System32\DRIVERS\nwlnkfwd.sys (manual start)
Office Source Engine: "C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE" (manual start)
Intel PentiumIII Processor Driver: System32\DRIVERS\p3.sys (system)
Parallel port driver: System32\DRIVERS\parport.sys (manual start)
PCI Bus Driver: System32\DRIVERS\pci.sys (system)
Pcmcia: System32\DRIVERS\pcmcia.sys (system)
Cisco Wireless LAN Adapters Driver: System32\DRIVERS\pcx500.sys (manual start)
Cisco 350 Series Lower Device Filter: System32\DRIVERS\pcx500mp.sys (manual start)
Plug and Play: %SystemRoot%\system32\services.exe (autostart)
IPSEC Services: %SystemRoot%\System32\lsass.exe (autostart)
WAN Miniport (PPTP): System32\DRIVERS\raspptp.sys (manual start)
Protected Storage: %SystemRoot%\system32\lsass.exe (autostart)
QoS Packet Scheduler: System32\DRIVERS\psched.sys (manual start)
Direct Parallel Link Driver: System32\DRIVERS\ptilink.sys (manual start)
Remote Access Auto Connection Driver: System32\DRIVERS\rasacd.sys (system)
Remote Access Auto Connection Manager: %SystemRoot%\System32\svchost.exe -k netsvcs (manual start)
WAN Miniport (L2TP): System32\DRIVERS\rasl2tp.sys (manual start)
Remote Access Connection Manager: %SystemRoot%\System32\svchost.exe -k netsvcs (manual start)
Remote Access PPPOE Driver: System32\DRIVERS\raspppoe.sys (manual start)
Direct Parallel: System32\DRIVERS\raspti.sys (manual start)
Rdbss: System32\DRIVERS\rdbss.sys (system)
RDPCDD: System32\DRIVERS\RDPCDD.sys (system)
Terminal Server Device Redirector Driver: System32\DRIVERS\rdpdr.sys (manual start)
Remote Desktop Help Session Manager: C:\WINDOWS\system32\sessmgr.exe (manual start)
Digital CD Audio Playback Filter Driver: System32\DRIVERS\redbook.sys (system)
Routing and Remote Access: %SystemRoot%\System32\svchost.exe -k netsvcs (disabled)
Remote Registry: %SystemRoot%\system32\svchost.exe -k LocalService (autostart)
Remote Procedure Call (RPC) Locator: %SystemRoot%\System32\locator.exe (manual start)
Remote Procedure Call (RPC): %SystemRoot%\system32\svchost -k rpcss (autostart)
QoS RSVP: %SystemRoot%\System32\rsvp.exe (manual start)
Security Accounts Manager: %SystemRoot%\system32\lsass.exe (autostart)
Smart Card: %SystemRoot%\System32\SCardSvr.exe (manual start)
Task Scheduler: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Secdrv: System32\DRIVERS\secdrv.sys (manual start)
Secondary Logon: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
System Event Notification: %SystemRoot%\system32\svchost.exe -k netsvcs (autostart)
Serenum Filter Driver: System32\DRIVERS\serenum.sys (manual start)
Serial port driver: System32\DRIVERS\serial.sys (system)
Windows Firewall/Internet Connection Sharing (ICS): %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Shell Hardware Detection: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Simple Mail Transfer Protocol (SMTP): C:\WINDOWS\system32\inetsrv\inetinfo.exe (autostart)
Microsoft Kernel Audio Splitter: system32\drivers\splitter.sys (manual start)
Print Spooler: %SystemRoot%\system32\spoolsv.exe (autostart)
System Restore Filter Driver: \SystemRoot\System32\DRIVERS\sr.sys (disabled)
System Restore Service: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Srv: System32\DRIVERS\srv.sys (manual start)
SSDP Discovery Service: %SystemRoot%\System32\svchost.exe -k LocalService (manual start)
Windows Image Acquisition (WIA): %SystemRoot%\System32\svchost.exe -k imgsvc (manual start)
Software Bus Driver: System32\DRIVERS\swenum.sys (manual start)
Microsoft Kernel GS Wavetable Synthesizer: system32\drivers\swmidi.sys (manual start)
MS Software Shadow Copy Provider: C:\WINDOWS\System32\dllhost.exe /Processid:{C42A3AD1-3D87-4F6D-B616-2E0BA0723035} (manual start)
SymEvent: \??\C:\Program Files\Symantec\SYMEVENT.SYS (manual start)
Microsoft Kernel System Audio Device: system32\drivers\sysaudio.sys (manual start)
Performance Logs and Alerts: %SystemRoot%\system32\smlogsvc.exe (manual start)
Telephony: %SystemRoot%\System32\svchost.exe -k netsvcs (manual start)
TCP/IP Protocol Driver: System32\DRIVERS\tcpip.sys (system)
Terminal Device Driver: System32\DRIVERS\termdd.sys (system)
Terminal Services: %SystemRoot%\System32\svchost -k DComLaunch (manual start)
Themes: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Telnet: C:\WINDOWS\System32\tlntsvr.exe (manual start)
Distributed Link Tracking Client: %SystemRoot%\system32\svchost.exe -k netsvcs (autostart)
Windows User Mode Driver Framework: C:\WINDOWS\System32\wdfmgr.exe (autostart)
Microcode Update Driver: System32\DRIVERS\update.sys (manual start)
Universal Plug and Play Device Host: %SystemRoot%\System32\svchost.exe -k LocalService (manual start)
Uninterruptible Power Supply: %SystemRoot%\System32\ups.exe (manual start)
USB2 Enabled Hub: System32\DRIVERS\usbhub.sys (manual start)
Instant Wireless XP USB Network Adapter ver.2.6 Driver: System32\DRIVERS\netusbxp.sys (manual start)
USB Mass Storage Driver: System32\DRIVERS\USBSTOR.SYS (manual start)
Microsoft USB Universal Host Controller Miniport Driver: System32\DRIVERS\usbuhci.sys (manual start)
VGA Display Controller.: \SystemRoot\System32\drivers\vga.sys (system)
Volume Shadow Copy: %SystemRoot%\System32\vssvc.exe (manual start)
Windows Time: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
World Wide Web Publishing: %SystemRoot%\system32\inetsrv\inetinfo.exe (autostart)
Remote Access IP ARP Driver: System32\DRIVERS\wanarp.sys (manual start)
Microsoft WINMM WDM Audio Compatibility Driver: system32\drivers\wdmaud.sys (manual start)
NeoMagic MagicMedia 256AV Audio Driver (WDM): system32\drivers\nm5a2wdm.sys (manual start)
WebClient: %SystemRoot%\System32\svchost.exe -k LocalService (autostart)
Windows Management Instrumentation: %systemroot%\system32\svchost.exe -k netsvcs (autostart)
Portable Media Serial Number Service: %SystemRoot%\System32\svchost.exe -k netsvcs (manual start)
Windows Management Instrumentation Driver Extensions: %SystemRoot%\System32\svchost.exe -k netsvcs (manual start)
WMI Performance Adapter: C:\WINDOWS\System32\wbem\wmiapsrv.exe (manual start)
Security Center: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Automatic Updates: %SystemRoot%\system32\svchost.exe -k netsvcs (autostart)
Wireless Zero Configuration: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
Network Provisioning Service: %SystemRoot%\System32\svchost.exe -k netsvcs (manual start)


--------------------------------------------------

Enumerating Windows NT logon/logoff scripts:
*No scripts set to run*

Windows NT checkdisk command:
BootExecute = autocheck autochk *

Windows NT 'Wininit.ini':
PendingFileRenameOperations: *Registry value not found*

--------------------------------------------------

Enumerating ShellServiceObjectDelayLoad items:

PostBootReminder: C:\WINDOWS\system32\SHELL32.dll
CDBurn: C:\WINDOWS\system32\SHELL32.dll
WebCheck: C:\WINDOWS\System32\webcheck.dll
SysTray: C:\WINDOWS\System32\stobject.dll

--------------------------------------------------
Autorun entries from Registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run

*Registry key not found*

--------------------------------------------------

Autorun entries from Registry:
HKLM\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run

*Registry key not found*

--------------------------------------------------

End of report, 32,630 bytes
Report generated in 0.361 seconds

Command line options:
/verbose - to add additional info on each section
/complete - to include empty sections and unsuspicious data
/full - to include several rarely-important sections
/force9x - to include Win9x-only startups even if running on WinNT
/forcent - to include WinNT-only startups even if running on Win9x
/forceall - to include all Win9x and WinNT startups, regardless of platform
/history - to list version history only


>>>>>TrackQoo Results!<<<<<

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AdaptecDirectCD"="\"C:\\Program Files\\Roxio\\Easy CD Creator 5\\DirectCD\\DirectCD.exe\""
"vptray"="C:\\Program Files\\NavNT\\vptray.exe"
"TkBellExe"="\"C:\\Program Files\\Common Files\\Real\\Update_OB\\realsched.exe\" -osboot"
"ACUMon"="\"C:\\Program Files\\Cisco Systems\\Aironet Client Monitor\\ACUMon.Exe\" -a"
"QuickTime Task"="\"C:\\Program Files\\QuickTime\\qttask.exe\" -atboottime"
"SunJavaUpdateSched"="C:\\Program Files\\Java\\jre1.5.0_02\\bin\\jusched.exe"
"KavSvc"="C:\\WINDOWS\\system32\\urlnpr.exe reg_run"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
"Installed"="1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
"Installed"="1"
"NoChange"="1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
"Installed"="1"

-----------------
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers


Subkey --- LDVPMenu
{BDA77241-42F6-11d0-85E2-00AA001FE28C}
C:\Program Files\Common Files\Symantec Shared\SSC\vpshell2.dll

Subkey --- mgsqxgqx
{b7d5f41b-c539-43d7-b6c4-82289e613ef9}
C:\WINDOWS\system32\ocsdu.dll

Subkey --- Offline Files
{750fdf0e-2a26-11d1-a3ea-080036587f03}
C:\WINDOWS\System32\cscui.dll

Subkey --- Open With
{09799AFB-AD67-11d1-ABCD-00C04FC30936}
C:\WINDOWS\system32\SHELL32.dll

Subkey --- Open With EncryptionMenu
{A470F8CF-A1E8-4f65-8335-227475AA5C46}
C:\WINDOWS\system32\SHELL32.dll

Subkey --- {a2a9545d-a0c2-42b4-9708-a0b2badd77c8}
Start Menu Pin
C:\WINDOWS\system32\SHELL32.dll

=====================

HKEY_CLASSES_ROOT\Folder\shellex\ColumnHandlers


Subkey --- {0D2E74C4-3C34-11d2-A27E-00C04FC30871}
C:\WINDOWS\system32\SHELL32.dll

Subkey --- {24F14F01-7B1C-11d1-838f-0000F80461CF}
C:\WINDOWS\system32\SHELL32.dll

Subkey --- {24F14F02-7B1C-11d1-838f-0000F80461CF}
C:\WINDOWS\system32\SHELL32.dll

Subkey --- {66742402-F9B9-11D1-A202-0000F81FEDEE}
C:\WINDOWS\system32\SHELL32.dll

==============================
C:\Documents and Settings\All Users\Start Menu\Programs\Startup

desktop.ini
rdut.exe
==============================
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup

desktop.ini
rdut.exe
desktop.ini
==============================
C:\WINDOWS\system32 cpl files


access.cpl Microsoft Corporation
appwiz.cpl Microsoft Corporation
bthprops.cpl Microsoft Corporation
CiscoACU.cpl Cisco Systems, Inc.
desk.cpl Microsoft Corporation
firewall.cpl Microsoft Corporation
hdwwiz.cpl Microsoft Corporation
inetcpl.cpl Microsoft Corporation
intl.cpl Microsoft Corporation
irprops.cpl Microsoft Corporation
joy.cpl Microsoft Corporation
jpicpl32.cpl Sun Microsystems, Inc.
main.cpl Microsoft Corporation
mbllnk.cpl AvantGo, Inc.
mmsys.cpl Microsoft Corporation
ncpa.cpl Microsoft Corporation
netsetup.cpl Microsoft Corporation
nusrmgr.cpl Microsoft Corporation
nwc.cpl Microsoft Corporation
odbccp32.cpl Microsoft Corporation
powercfg.cpl Microsoft Corporation
QuickTime.cpl Apple Computer, Inc.
redit.cpl
sysdm.cpl Microsoft Corporation
telephon.cpl Microsoft Corporation
timedate.cpl Microsoft Corporation
wscui.cpl Microsoft Corporation
wuaucpl.cpl Microsoft Corporation
  • 0

#6
Wizard

Wizard

    Retired Staff

  • Retired Staff
  • 5,661 posts
I am going to Attach a Zip Folder with a Registry File in it,please download>> Right Click the Zip Folder and Select "Extract All"

Place the Reg File on the Desktop but dont run it yet!

Download Pocket KillBox from here:
http://www.bleepingc...les/killbox.php
There is a Direct Download and a description of what the Program does inside this link.


Use the list of files below and enter each into Killbox and use the Instructions that follow!


C:\WINDOWS\system32\opngrpg.dll
C:\WINDOWS\system32\supdate.dll
C:\WINDOWS\system32\urlnpr.exe
C:\WINDOWS\system32\wqgvk.dat
C:\WINDOWS\system32\dcxomco.exe
C:\WINDOWS\system32\ocsdu.dll
C:\WINDOWS\system32\redit.cpl
C:\WINDOWS\qool.exe
C:\WINDOWS\ssk.exe
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rdut.exe
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\rdut.exe



Enter each,one at a time and place a tick next to any of these selections available


"Delete on Reboot"
"Unregister .dll before Deleting"


Click the Red Circle with the White X in the Middle to Delete!

Click "Yes" to Confirm

Click "No" to Reboot

Once at the last file

Click "Yes" to Confirm

Click "Yes" to Reboot


If you get a PendingFileRenameOperations Registry Data has been Removed by External Process! message then just restart manually.


Restart in Safe Mode!


Run those files through Killbox again to be sure none still exist, this place a tick by any of these selections available

"Standard File Kill"
"End Explorer Shell while Killing File"
"Unregister .dll before Deleting"


Click the Red Circle with the White X in the Middle to Delete!


Locate the Registry File and Double Click it,Allow it to Merge into the Registry!


Run MSCONFIG and enable everything in the startup area. To get to MSCONFIG, click on Start -> Run -> type in MSCONFIG -> click OK!

Under the "General" Tab
Make Sure Normal Startup is Checked!!

Click Apply>>OK>>Follow the Prompts to Restart!!

Restart Normal and have the PC Scanned here:
Panda Active Scan

You will need to be using Internet Explorer for the Scan to work!

Save the Report it generates


Post back with a fresh HijackThis log and the report Panda!

Attached Files


  • 0

#7
rbzane

rbzane

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
Cretemonster,

The Panda scan took about 6 hours. I didn't realize it was going to scan all of my deleted email. Here are the results and the latest HJT log.

Rob

>>>>>Panda ActiveScxan Results<<<<<


Incident Status Location

Spyware:Spyware/SurfSideKick No disinfected C:\Documents and Settings\Administrator\Application Data\Sskcwrd.dll
Spyware:Spyware/SurfSideKick No disinfected C:\Documents and Settings\Administrator\Application Data\Sskknwrd.dll
Virus:Trj/Citifraud.A Disinfected Archive Folders\Inbox\0fficial Notice for all eBay users\MSG_RTF.TXT
Virus:Trj/Citifraud.A Disinfected Archive Folders\Inbox\PayPaI officiaI notice\MSG_RTF.TXT
Virus:W32/Bagle.BK.worm Disinfected Personal Folders\Deleted Items\Registration is accepted\guupd02.cpl
Virus:W32/Bagle.BL.worm Disinfected Personal Folders\Deleted Items\Delivery service mail\siupd02.com
Virus:W32/Netsky.P.worm Disinfected Personal Folders\Deleted Items\Re: Approved document\file.txt .pif
Virus:W32/Netsky.P.worm Disinfected Personal Folders\Deleted Items\Re: thanks!\website.zip[document.txt .exe]
Virus:Exploit/iFrame Disinfected Personal Folders\Deleted Items\Mail Delivery (failure rob@zane.org)\MSG_RTF.TXT
Virus:W32/Netsky.P.worm Disinfected Personal Folders\Deleted Items\Mail Delivery (failure rob@zane.org)\message.scr
Virus:Trj/Citifraud.A Disinfected Personal Folders\Inbox\Citibank - security maintenance [Sat, 18 Sep 2004 22:23:04 -0400]\MSG_RTF.TXT
Virus:W32/Mimail.I.worm Disinfected Personal Folders\Inbox\YOUR PAYPAL.COM ACCOUNT EXPIRES\www.paypal.com.scr
Virus:W97M/Pri.A Disinfected Personal Folders\CT Business\Dallas\Peer review: Chris Parker\peer_review_cp_by_rz.doc
Virus:Exploit/iFrame Disinfected Personal Folders\Deleted Items\Of Service\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders\Deleted Items\** SPAM (5.50/5.00) ** New M.A. Program in Jewish Spirituality\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders\Deleted Items\HotJobs.com Job Submission\MSG_RTF.TXT
Virus:W32/Mimail.S.worm Disinfected Personal Folders\Deleted Items\here is the file you asked for\document.txt.scr
Virus:Trj/Citifraud.A Disinfected Personal Folders\Inbox\0fficial Notice for all eBay users\MSG_RTF.TXT
Virus:Trj/Citifraud.A Disinfected Personal Folders\Inbox\PayPaI officiaI notice\MSG_RTF.TXT
Virus:W97M/Pri.A Disinfected Personal Folders\CT Business\Dallas\Peer review: Chris Parker\peer_review_cp_by_rz.doc
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Message User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\undeliverable mail\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\returned message: user unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\message: returned to sender\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Bug Announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\error letter\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Bug Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\bug report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\undelivered message user unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\undelivered mail: user unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\undeliverable mail: returned to mailer\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\returned mail\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Mail: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Failure Announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\undeliverable message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\returned mail user unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Bug Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Error Advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\abort letter\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\mail: returned to sender\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Error Announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Error Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Mail: Returned To Mailer ScanMail has detected a virus!\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Mail\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Bug Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\mail: returned to sender\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\bug message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\abort report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Message: Returned To Mailer\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\error message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\returned mail returned to sender\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\returned message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Message: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Mail: Returned To Mailer\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\error report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undeliverable Mail: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Letter\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Mail: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Failure Letter\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\error report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Mail\Undelivered Mail
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undeliverable Message: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\error letter\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Bug Announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Message: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\returned message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Mail Returned To Sender\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\failure message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Message: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Mail\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undeliverable Mail Returned To Sender\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Error Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undeliverable Message: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\failure message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\undelivered mail: returned to sender\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Mail\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\failure advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Failure Announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Message Returned To Mailer\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Mail: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\mail: user unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undeliverable Mail User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\bug report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Error Announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Error Letter\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Mail: Returned To Sender\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\undelivered mail\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Failure Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\undeliverable mail returned to sender\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Failure Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Mail\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Letter\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Message: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undeliverable Mail Returned To Mailer\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Failure Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\failure report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Bug Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Bug Advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undeliverable Message: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Message\Returned Message
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Error Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\mail: user unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Letter\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Failure Letter\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undeliverable Message: Returned To Sender\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\abort notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\bug advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undeliverable Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Message: Returned To Mailer\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\error notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Bug Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Message User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Mail\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\failure message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Message: Returned To Sender\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undeliverable Mail: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Advice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Letter\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Failure Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\failure announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Message: Returned To Mailer\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\mail\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Error Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Error Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Message User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\undelivered message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Bug Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\bug report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Bug Announcement\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\undeliverable message: returned to mailer\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Report\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Abort Notice\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Message\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Message: Returned To Mailer\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Undelivered Mail: User unknown\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\Returned Mail: Returned To Mailer\MSG_RTF.TXT
Virus:Exploit/iFrame Disinfected Personal Folders (rzane.pst)\MS Update Email\MSG_RTF.TXT
  • 0

#8
Wizard

Wizard

    Retired Staff

  • Retired Staff
  • 5,661 posts
Well it appears its a good thing it did,you obviously had a Mass Mailing Worm in there!

Locate and Delete these 2

C:\Documents and Settings\Administrator\Application Data\Sskcwrd.dll<< File

C:\Documents and Settings\Administrator\Application Data\Sskknwrd.dll<< File

Disable System Restore
http://service1.syma...src=sec_doc_nam


Install these 2 for more Secure Browsing!

SpywareBlaster:
http://www.javacools...areblaster.html
Update Immediatly!

IE Spyad:
http://www.bleepingc...showtutorial=53
There is a direct download inside and great tutorial also!


I suggest emptying the MailBox folders as soon as possible!


Look at the 3 little black links in my signature for lots of good info!


Post back and let me know how the PC is running?
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP