Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

help with winfixer [CLOSED]


  • This topic is locked This topic is locked

#1
michaelcacc

michaelcacc

    New Member

  • Member
  • Pip
  • 4 posts
It seems that winfixer has infected loads of computers and it's infected mine too. I would really appreciate any help that anyone would be able to give.

Logfile of HijackThis v1.99.1
Scan saved at 10:48:40 AM, on 9/18/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\gearsec.exe
C:\Program Files\Ahead\InCD\InCDsrv.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\ResChanger XP\ResChangerXP.exe
C:\WINDOWS\System32\RUNDLL32.EXE
C:\Program Files\Ahead\InCD\InCD.exe
C:\Program Files\Java\j2re1.4.2_05\bin\jusched.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
C:\Program Files\D-Tools\daemon.exe
C:\Program Files\Messenger\MSMSGS.EXE
C:\PROGRA~1\MUSICM~1\MUSICM~2\MMDiag.exe
C:\Program Files\802.11 Wireless LAN\WlanMonitor.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfAgent.exe
C:\Program Files\NETGEAR\WG121 Configuration Utility\wlancfg8.exe
C:\Program Files\Musicmatch\Musicmatch Jukebox\mim.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Winamp\Winamp.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\Mike\My Documents\hijackthis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.bitterfilms.com/rrrrrr.html
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: (no name) - {00DBDAC8-4691-4797-8E6A-7C6AB89BC441} - C:\WINDOWS\System32\geeba.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {1BD94507-BF45-24C5-8472-60557BFB7816} - C:\WINDOWS\System32\gywyz.dll (file missing)
O2 - BHO: MSEvents Object - {827DC836-DD9F-4A68-A602-5812EB50A834} - C:\WINDOWS\system\msvcfont.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [ResChangerXP] C:\Program Files\ResChanger XP\ResChangerXP.exe
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [InCD] C:\Program Files\Ahead\InCD\InCD.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_05\bin\jusched.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [x8TKWkU] c:\documents and settings\mike\local settings\temp\x8TKWkU.exe
O4 - HKLM\..\Run: [c9Qjdo] C:\documents and settings\mike\local settings\temp\c9Qjdo.exe
O4 - HKLM\..\Run: [kk1XEUY] C:\documents and settings\mike\local settings\temp\kk1XEUY.exe
O4 - HKLM\..\Run: [MPFExe] C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [98D0CE0C16B1] rundll32.exe D0CE0C16B1,D0CE0C16B1
O4 - HKLM\..\Run: [MimBoot] C:\PROGRA~1\MUSICM~1\MUSICM~2\mimboot.exe
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1033
O4 - HKCU\..\Run: [Evidence Cleaner] C:\Program Files\Evidence Cleaner\ecleaner.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\MSMSGS.EXE" /background
O4 - Global Startup: Configuration & Monitor Utility.lnk = ?
O4 - Global Startup: Smart Wizard Wireless Settings.lnk = ?
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://utu.popcap.co...aploader_v6.cab
O20 - Winlogon Notify: geeba - C:\WINDOWS\SYSTEM32\geeba.dll
O20 - Winlogon Notify: msvcfont - C:\WINDOWS\system\msvcfont.dll
O23 - Service: GearSecurity - GEAR Software - C:\WINDOWS\system32\gearsec.exe
O23 - Service: InCD Helper (InCDsrv) - AHEAD Software - C:\Program Files\Ahead\InCD\InCDsrv.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee Corporation - C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
  • 0

Advertisements


#2
Buckeye_Sam

Buckeye_Sam

    Malware Expert

  • Member
  • PipPipPipPipPipPipPipPip
  • 10,019 posts
Hi and welcome to GeeksToGo! My name is Sam and I will be helping you. :tazz:

Please download Ewido Security Suite it is a trial version of the program.
  • Install ewido security suite
  • When installing, under "Additional Options" uncheck "Install background guard" and "Install scan via context menu".
  • Launch ewido, there should be an icon on your desktop double-click it.
  • The program will now go to the main screen
You will need to update ewido to the latest definition files.
  • On the left hand side of the main screen click update
  • Then click on Start Update
The update will start and a progress bar will show the updates being installed.
If you are having problems with the updater, you can use this link to manually update ewido.
http://www.ewido.net...wnload/updates/

Once the updates are installed do the following:
  • Click on scanner
  • Click on Complete System Scan and the scan will begin.
  • While the scan is in progress you will be prompted to clean files, click OK
  • When it asks if you want to clean the first file, put a check in the lower left corner of the box that says "Perform action on all infections" then choose clean and click OK.
  • Once the scan has completed, there will be a button located on the bottom of the screen named Save report
  • Click Save report.
  • Save the report .txt file to your desktop.
Now close ewido security suite.


Reboot your computer and post a new hijackthis log and the log from Ewido.
  • 0

#3
michaelcacc

michaelcacc

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
sorry for the super late reply, i haven't much chance to get on the computer for awhile. Thanks very very very much for the help.

------------------------------------------------

Logfile of HijackThis v1.99.1
Scan saved at 6:28:20 PM, on 10/4/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\gearsec.exe
C:\Program Files\Ahead\InCD\InCDsrv.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\McAfee.com\PERSON~1\MpfAgent.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\ResChanger XP\ResChangerXP.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Ahead\InCD\InCD.exe
C:\Program Files\Java\j2re1.4.2_05\bin\jusched.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
C:\Program Files\D-Tools\daemon.exe
C:\Program Files\Messenger\MSMSGS.EXE
C:\Program Files\802.11 Wireless LAN\WlanMonitor.exe
C:\PROGRA~1\MUSICM~1\MUSICM~2\MMDiag.exe
C:\Program Files\NETGEAR\WG121 Configuration Utility\wlancfg8.exe
C:\Program Files\Musicmatch\Musicmatch Jukebox\mim.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Mike\My Documents\hijackthis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.bitterfilms.com/rrrrrr.html
O2 - BHO: (no name) - {00DBDAC8-4691-4797-8E6A-7C6AB89BC441} - C:\WINDOWS\System32\geeba.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {1BD94507-BF45-24C5-8472-60557BFB7816} - C:\WINDOWS\System32\gywyz.dll (file missing)
O2 - BHO: MSEvents Object - {827DC836-DD9F-4A68-A602-5812EB50A834} - C:\WINDOWS\system\msvcfont.dll
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [ResChangerXP] C:\Program Files\ResChanger XP\ResChangerXP.exe
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [InCD] C:\Program Files\Ahead\InCD\InCD.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_05\bin\jusched.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [x8TKWkU] c:\documents and settings\mike\local settings\temp\x8TKWkU.exe
O4 - HKLM\..\Run: [c9Qjdo] C:\documents and settings\mike\local settings\temp\c9Qjdo.exe
O4 - HKLM\..\Run: [kk1XEUY] C:\documents and settings\mike\local settings\temp\kk1XEUY.exe
O4 - HKLM\..\Run: [MPFExe] C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [98D0CE0C16B1] rundll32.exe D0CE0C16B1,D0CE0C16B1
O4 - HKLM\..\Run: [MimBoot] C:\PROGRA~1\MUSICM~1\MUSICM~2\mimboot.exe
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [stratas] lockx.exe
O4 - HKLM\..\RunServices: [stratas] lockx.exe
O4 - HKCU\..\Run: [Evidence Cleaner] C:\Program Files\Evidence Cleaner\ecleaner.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\MSMSGS.EXE" /background
O4 - HKCU\..\Run: [stratas] lockx.exe
O4 - Global Startup: Configuration & Monitor Utility.lnk = ?
O4 - Global Startup: Smart Wizard Wireless Settings.lnk = ?
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://utu.popcap.co...aploader_v6.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{62E6B3CE-7D35-4E76-A0AF-153D6F5C46DC}: NameServer = 192.168.0.2
O17 - HKLM\System\CS1\Services\Tcpip\..\{62E6B3CE-7D35-4E76-A0AF-153D6F5C46DC}: NameServer = 192.168.0.2
O20 - Winlogon Notify: geeba - C:\WINDOWS\SYSTEM32\geeba.dll
O20 - Winlogon Notify: msvcfont - C:\WINDOWS\system\msvcfont.dll
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: GearSecurity - GEAR Software - C:\WINDOWS\system32\gearsec.exe
O23 - Service: InCD Helper (InCDsrv) - AHEAD Software - C:\Program Files\Ahead\InCD\InCDsrv.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee Corporation - C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

------------------------------------------------

---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on: 6:24:46 PM, 10/4/2005
+ Report-Checksum: 7F93681A

+ Scan result:

HKLM\SOFTWARE\Classes\CLSID\{2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C} -> Spyware.MiniBug : Cleaned with backup
HKLM\SOFTWARE\Classes\MiniBugTransporter.MiniBugTransporterX\CLSID\\ -> Spyware.MiniBug : Cleaned with backup
HKLM\SOFTWARE\Classes\MiniBugTransporter.MiniBugTransporterX.1\CLSID\\ -> Spyware.MiniBug : Cleaned with backup
HKLM\SOFTWARE\Classes\MSEvents.MSEvents -> Spyware.VirtuMonde : Cleaned with backup
HKLM\SOFTWARE\Classes\MSEvents.MSEvents\CLSID -> Spyware.VirtuMonde : Cleaned with backup
HKLM\SOFTWARE\Classes\MSEvents.MSEvents\CurVer -> Spyware.VirtuMonde : Cleaned with backup
HKLM\SOFTWARE\Classes\MSEvents.MSEvents.1 -> Spyware.VirtuMonde : Cleaned with backup
HKLM\SOFTWARE\Classes\PROTOCOLS\Name-Space Handler\res -> Spyware.WebSearch : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\STO -> Spyware.WebSearch : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/System32/mfc42.dll\\{9EB320CE-BE1D-4304-A081-4B4665414BEF} -> Spyware.PurityScan : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/System32/msvcrt.dll\\{9EB320CE-BE1D-4304-A081-4B4665414BEF} -> Spyware.PurityScan : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/System32/olepro32.dll\\{9EB320CE-BE1D-4304-A081-4B4665414BEF} -> Spyware.PurityScan : Cleaned with backup
HKU\S-1-5-21-220523388-1659004503-839522115-1007\Software\{12EE7A5E-0674-42f9-A76B-000000004D00} -> Spyware.BrowserAid : Cleaned with backup
C:\Documents and Settings\John\Cookies\[email protected][1].txt -> Spyware.Cookie.Specificclick : Cleaned with backup
C:\Documents and Settings\John\Cookies\john@advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Documents and Settings\John\Cookies\john@atdmt[1].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Documents and Settings\John\Cookies\john@doubleclick[1].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Documents and Settings\John\Cookies\[email protected][1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Documents and Settings\John\Local Settings\Temp\pw9k0HaH.dll -> Adware.MidADle : Cleaned with backup
C:\Documents and Settings\Mike\Application Data\ealm.exe -> Spyware.PurityScan : Cleaned with backup
:mozilla.6:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.7:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.8:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.9:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.10:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.11:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.12:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
:mozilla.29:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Atdmt : Cleaned with backup
:mozilla.30:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.31:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.32:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.33:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.34:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.35:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.36:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Fastclick : Cleaned with backup
:mozilla.37:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Atdmt : Cleaned with backup
:mozilla.40:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.41:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.42:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.43:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.44:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.45:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.46:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.47:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.48:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.49:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.50:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.51:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.52:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.53:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.54:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.55:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.56:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.57:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.58:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.59:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.60:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.61:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.62:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.63:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.64:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.65:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.66:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.67:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.68:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.69:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.70:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.71:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.72:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.73:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.74:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.75:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.76:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.77:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.78:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.79:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.80:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.81:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.82:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.83:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.84:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.85:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.86:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.87:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.88:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.89:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Advertising : Cleaned with backup
:mozilla.102:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Valueclick : Cleaned with backup
:mozilla.103:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Valueclick : Cleaned with backup
:mozilla.106:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Targetnet : Cleaned with backup
:mozilla.107:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Targetnet : Cleaned with backup
:mozilla.108:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Targetnet : Cleaned with backup
:mozilla.116:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.117:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.118:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.119:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.120:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.121:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.122:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
:mozilla.123:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Burstnet : Cleaned with backup
:mozilla.124:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Burstnet : Cleaned with backup
:mozilla.125:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
:mozilla.130:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.131:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.132:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.133:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Questionmarket : Cleaned with backup
:mozilla.134:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Pointroll : Cleaned with backup
:mozilla.136:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Statcounter : Cleaned with backup
:mozilla.138:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Bfast : Cleaned with backup
:mozilla.142:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
:mozilla.147:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Tribalfusion : Cleaned with backup
:mozilla.174:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
:mozilla.175:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
:mozilla.176:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
:mozilla.177:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
:mozilla.178:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
:mozilla.179:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
:mozilla.181:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Valueclick : Cleaned with backup
:mozilla.182:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Googleadservices : Cleaned with backup
:mozilla.183:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Bluestreak : Cleaned with backup
:mozilla.220:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
:mozilla.221:C:\Documents and Settings\Mike\Application Data\Mozilla\Firefox\Profiles\6lzujmzb.default\cookies.txt -> Spyware.Cookie.Adserver : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@2o7[1].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt -> Spyware.Cookie.Yieldmanager : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@advertising[2].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@bfast[2].txt -> Spyware.Cookie.Bfast : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@bluestreak[1].txt -> Spyware.Cookie.Bluestreak : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@burstnet[2].txt -> Spyware.Cookie.Burstnet : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@casalemedia[1].txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt -> Spyware.Cookie.Sextracker : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt -> Spyware.Cookie.Sextracker : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt -> Spyware.Cookie.Sexcounter : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt -> Spyware.Cookie.Clickzs : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@doubleclick[2].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@fastclick[1].txt -> Spyware.Cookie.Fastclick : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@mediaplex[1].txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@sextracker[1].txt -> Spyware.Cookie.Sextracker : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@statcounter[1].txt -> Spyware.Cookie.Statcounter : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@targetnet[1].txt -> Spyware.Cookie.Targetnet : Cleaned with backup
C:\Documents and Settings\Mike\Cookies\mike@valueclick[1].txt -> Spyware.Cookie.Valueclick : Cleaned with backup
C:\Documents and Settings\Mike\msdirectx.sys -> Trojan.Rootkit.h : Cleaned with backup
C:\Program Files\AWS\WeatherBug\MiniBugTransporter.dll -> Spyware.Wheaterbug : Cleaned with backup
C:\Program Files\Evrsoft\1st Page 2000\IScripts\Buttons\Six buttons from [bleep].izs -> Trojan.Loop : Cleaned with backup
C:\Program Files\Microsoft AntiSpyware\Quarantine\493F2669-5438-421F-8AED-FBE4EF\364B5413-7CD2-461D-8C8F-9AD08D -> Spyware.Hijacker.Generic : Cleaned with backup
C:\Program Files\Microsoft AntiSpyware\Quarantine\7EDC9156-8D68-4649-8EBE-722785\4E71C1FF-74BE-4478-93D4-ED8C2B -> TrojanDownloader.Braidupdate.d : Cleaned with backup
C:\Program Files\Microsoft AntiSpyware\Quarantine\E2367780-9C44-46AE-B60B-279188\B31C3F92-F394-4190-BCCD-C5D2B7 -> TrojanDownloader.Braidupdate.d : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,10,2005_18,26,50.zip/mike@advertising[2].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,10,2005_18,26,50.zip/[email protected][1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,10,2005_18,26,50.zip/[email protected][1].txt -> Spyware.Cookie.Adserver : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@2o7[2].txt -> Spyware.Cookie.2o7 : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/[email protected][2].txt -> Spyware.Cookie.Addynamix : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@advertising[1].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@atdmt[2].txt -> Spyware.Cookie.Atdmt : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@bfast[2].txt -> Spyware.Cookie.Bfast : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@bluestreak[2].txt -> Spyware.Cookie.Bluestreak : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@casalemedia[1].txt -> Spyware.Cookie.Casalemedia : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@doubleclick[2].txt -> Spyware.Cookie.Doubleclick : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@euniverseads[2].txt -> Spyware.Cookie.Euniverseads : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@fastclick[2].txt -> Spyware.Cookie.Fastclick : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@gator[1].txt -> Spyware.Cookie.Gator : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@mediaplex[1].txt -> Spyware.Cookie.Mediaplex : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/[email protected][1].txt -> Spyware.Cookie.Overture : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@revenue[1].txt -> Spyware.Cookie.Revenue : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/[email protected][2].txt -> Spyware.Cookie.Advertising : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@trafficmp[1].txt -> Spyware.Cookie.Trafficmp : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/mike@valueclick[1].txt -> Spyware.Cookie.Valueclick : Cleaned with backup
C:\Program Files\NoAdware\NoAdwareBackup\1,8,2005_0,45,38.zip/[email protected][1].txt -> Spyware.Cookie.Adserver : Cleaned with backup
C:\WINDOWS\Downloaded Program Files\popcaploader.dll -> Not-A-Virus.PornWare.PopCap.b : Cleaned with backup
C:\WINDOWS\system\msvcfont.dll -> Spyware.Virtumonde : Cleaned with backup
C:\WINDOWS\system32\awtqq.dll -> TrojanDownloader.ConHook.k : Cleaned with backup
C:\WINDOWS\system32\ddccb.dll -> TrojanDownloader.Small.bpk : Cleaned with backup
C:\WINDOWS\system32\geeba.dll -> Trojan.Crypt.o : Cleaned with backup
C:\WINDOWS\system32\msdirectx.sys -> Trojan.Rootkit.h : Cleaned with backup


::Report End
  • 0

#4
Buckeye_Sam

Buckeye_Sam

    Malware Expert

  • Member
  • PipPipPipPipPipPipPipPip
  • 10,019 posts
There's still quite a few issues in your log. Let's get rid of Vundo first.

Please print these instructions out for use in Safe Mode.

Please download VundoFix.exe to your desktop.
  • Double-click VundoFix.exe to extract the files
  • This will create a VundoFix folder on your desktop.
  • After the files are extracted, please reboot your computer into Safe Mode. You can do this by restarting your computer and continually tapping the F8 key until a menu appears. Use your up arrow key to highlight Safe Mode then hit enter.
  • Once in safe mode open the VundoFix folder and doubleclick on KillVundo.bat
  • You will first be presented with a warning and a list of forums to seek help at.
    it should look like this

    VundoFix V2.1 by Atri
    By pressing enter you agree that you are using this at your own risk
    Please seek assistance at one of the following forums:
    http://www.atribune.org/forums
    http://www.247fixes.com/forums
    http://www.geekstogo.com/forum
    http://forums.net-integration.net

  • At this point press enter one time.
  • Next you will see:

    Type in the filepath as instructed by the forum staff
    Then Press Enter, Then F6, Then Enter Again to continue with the fix.

  • At this point please type the following file path (make sure to enter it exactly as below!):

    • C:\WINDOWS\system\msvcfont.dll

  • Press Enter, then press the F6 key, then press Enter one more time to continue with the fix.
  • Next you will see:

    Please type in the second filepath as instructed by the forum staff
    Then Press Enter, Then F6, Then Enter Again to continue with the fix.

  • At this point please type the following file path (make sure to enter it exactly as below!):

    C:\WINDOWS\system\tnofcvsm.*
  • Press Enter, then press the F6 key, then press Enter one more time to continue with the fix.
  • The fix will run then HijackThis will open.
  • In HiJackThis, please place a check next to the following items and click FIX CHECKED:


    O2 - BHO: (no name) - {00DBDAC8-4691-4797-8E6A-7C6AB89BC441} - C:\WINDOWS\System32\geeba.dll
    O2 - BHO: MSEvents Object - {827DC836-DD9F-4A68-A602-5812EB50A834} - C:\WINDOWS\system\msvcfont.dll
    O20 - Winlogon Notify: geeba - C:\WINDOWS\SYSTEM32\geeba.dll
    O20 - Winlogon Notify: msvcfont - C:\WINDOWS\system\msvcfont.dll

  • After you have fixed these items, close Hijackthis and Press any key to Force a reboot of your computer.
  • Pressing any key will cause a "Blue Screen of Death" this is normal, do not worry!
  • Once your machine reboots please continue with the instructions below.
Download and install CleanUp!

Open Cleanup! by double-clicking the icon on your desktop (or from the Start > All Programs menu).
Set the program up as follows:
Click "Options..."
Move the arrow down to "Custom CleanUp!"
Put a check next to the following (Make sure nothing else is checked!):
  • Empty Recycle Bins
  • Delete Cookies
  • Delete Prefetch files
  • Cleanup! All Users
Click OK
Press the CleanUp! button to start the program.

It may ask you to reboot at the end, click NO.

Then, please run this online virus scan: ActiveScan

Copy the results of the ActiveScan and paste them here along with a new HiJackThis log and the vundofix.txt file from the vundofix folder into this topic.
  • 0

#5
michaelcacc

michaelcacc

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
whenever i restart in safe mode and eveything's done loading and i'm in my indentity, it says "safe mode" in all four corners like normal, but the screen is all black, and i can't do anything. would disconnecting from my network suffice?
  • 0

#6
Buckeye_Sam

Buckeye_Sam

    Malware Expert

  • Member
  • PipPipPipPipPipPipPipPip
  • 10,019 posts
Go ahead and run through the fix in normal mode and let's see what that gets us.
  • 0

#7
michaelcacc

michaelcacc

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
-HIJACKTHIS LOG-
Logfile of HijackThis v1.99.1
Scan saved at 12:02:53 AM, on 10/23/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\gearsec.exe
C:\Program Files\Ahead\InCD\InCDsrv.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\ResChanger XP\ResChangerXP.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Ahead\InCD\InCD.exe
C:\Program Files\Java\j2re1.4.2_05\bin\jusched.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
C:\Program Files\D-Tools\daemon.exe
C:\WINDOWS\system32\lockx.exe
C:\PROGRA~1\MUSICM~1\MUSICM~2\MMDiag.exe
C:\Program Files\Messenger\MSMSGS.EXE
C:\Program Files\802.11 Wireless LAN\WlanMonitor.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfAgent.exe
C:\Program Files\NETGEAR\WG121 Configuration Utility\wlancfg8.exe
C:\Program Files\Musicmatch\Musicmatch Jukebox\mim.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\System32\svchost.exe
C:\Documents and Settings\Mike\My Documents\hijackthis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.bitterfilms.com/rrrrrr.html
O2 - BHO: (no name) - {00DBDAC8-4691-4797-8E6A-7C6AB89BC441} - C:\WINDOWS\System32\geeba.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {1BD94507-BF45-24C5-8472-60557BFB7816} - C:\WINDOWS\System32\gywyz.dll (file missing)
O2 - BHO: MSEvents Object - {827DC836-DD9F-4A68-A602-5812EB50A834} - C:\WINDOWS\system\msvcfont.dll
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [ResChangerXP] C:\Program Files\ResChanger XP\ResChangerXP.exe
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [InCD] C:\Program Files\Ahead\InCD\InCD.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_05\bin\jusched.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [x8TKWkU] c:\documents and settings\mike\local settings\temp\x8TKWkU.exe
O4 - HKLM\..\Run: [c9Qjdo] C:\documents and settings\mike\local settings\temp\c9Qjdo.exe
O4 - HKLM\..\Run: [kk1XEUY] C:\documents and settings\mike\local settings\temp\kk1XEUY.exe
O4 - HKLM\..\Run: [MPFExe] C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [98D0CE0C16B1] rundll32.exe D0CE0C16B1,D0CE0C16B1
O4 - HKLM\..\Run: [MimBoot] C:\PROGRA~1\MUSICM~1\MUSICM~2\mimboot.exe
O4 - HKLM\..\Run: [DAEMON Tools-1033] "C:\Program Files\D-Tools\daemon.exe" -lang 1033
O4 - HKLM\..\Run: [stratas] lockx.exe
O4 - HKLM\..\RunServices: [stratas] lockx.exe
O4 - HKCU\..\Run: [Evidence Cleaner] C:\Program Files\Evidence Cleaner\ecleaner.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\MSMSGS.EXE" /background
O4 - HKCU\..\Run: [stratas] lockx.exe
O4 - Global Startup: Configuration & Monitor Utility.lnk = ?
O4 - Global Startup: Smart Wizard Wireless Settings.lnk = ?
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoft...free/asinst.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://utu.popcap.co...aploader_v6.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{62E6B3CE-7D35-4E76-A0AF-153D6F5C46DC}: NameServer = 192.168.0.2
O17 - HKLM\System\CS1\Services\Tcpip\..\{62E6B3CE-7D35-4E76-A0AF-153D6F5C46DC}: NameServer = 192.168.0.2
O20 - Winlogon Notify: geeba - C:\WINDOWS\SYSTEM32\geeba.dll
O20 - Winlogon Notify: msvcfont - C:\WINDOWS\system\msvcfont.dll
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: GearSecurity - GEAR Software - C:\WINDOWS\system32\gearsec.exe
O23 - Service: InCD Helper (InCDsrv) - AHEAD Software - C:\Program Files\Ahead\InCD\InCDsrv.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee Corporation - C:\PROGRA~1\McAfee.com\PERSON~1\MPFSERVICE.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe

-ACTIVESCAN-


Incident Status Location

Spyware:Spyware/Virtumonde Reported C:\WINDOWS\system\msvcfont.dll
Adware:Adware/StartPage.AIW Reported C:\WINDOWS\System32\geeba.dll
Adware:adware/powersearch Reported C:\WINDOWS\SYSTEM32\stlb2.xml
Spyware:spyware/virtumonde Reported Windows Registry
Spyware:Cookie/2o7.net Reported C:\Documents and Settings\Mike\Cookies\mike@2o7[1].txt
Spyware:Cookie/YieldManager Reported C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
Spyware:Cookie/Adrevolver Reported C:\Documents and Settings\Mike\Cookies\mike@adrevolver[1].txt
Spyware:Cookie/Adrevolver Reported C:\Documents and Settings\Mike\Cookies\mike@adrevolver[3].txt
Spyware:Cookie/Advertising Reported C:\Documents and Settings\Mike\Cookies\mike@advertising[1].txt
Spyware:Cookie/Ask Reported C:\Documents and Settings\Mike\Cookies\mike@ask[1].txt
Spyware:Cookie/Atlas DMT Reported C:\Documents and Settings\Mike\Cookies\mike@atdmt[2].txt
Spyware:Cookie/Banner Reported C:\Documents and Settings\Mike\Cookies\mike@banner[1].txt
Spyware:Cookie/Bfast Reported C:\Documents and Settings\Mike\Cookies\mike@bfast[1].txt
Spyware:Cookie/Casalemedia Reported C:\Documents and Settings\Mike\Cookies\mike@casalemedia[2].txt
Spyware:Cookie/Doubleclick Reported C:\Documents and Settings\Mike\Cookies\mike@doubleclick[1].txt
Spyware:Cookie/FastClick Reported C:\Documents and Settings\Mike\Cookies\mike@fastclick[2].txt
Spyware:Cookie/Mediaplex Reported C:\Documents and Settings\Mike\Cookies\mike@mediaplex[1].txt
Spyware:Cookie/QuestionMarket Reported C:\Documents and Settings\Mike\Cookies\mike@questionmarket[1].txt
Spyware:Cookie/RealMedia Reported C:\Documents and Settings\Mike\Cookies\mike@realmedia[2].txt
Spyware:Cookie/Advertising Reported C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
Spyware:Cookie/Reliablestats Reported C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
Spyware:Cookie/Tradedoubler Reported C:\Documents and Settings\Mike\Cookies\mike@tradedoubler[2].txt
Spyware:Cookie/Valueclick Reported C:\Documents and Settings\Mike\Cookies\mike@valueclick[2].txt
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\a.jar-22be6520-7e02c0b5.zip[a.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\a.jar-22be6520-7e02c0b5.zip[Dummy.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\a.jar-22be6520-7e02c0b5.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arc.zip-6c522c5b-5840783b.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arc.zip-6c522c5b-5840783b.zip[Counter.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arc.zip-6c522c5b-5840783b.zip[Gummy.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arc.zip-6c522c5b-5840783b.zip[Beyond.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arc.zip-6c522c5b-5840783b.zip[Worker.class]
Spyware:Spyware/AdClicker Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\arc.zip-6c522c5b-5840783b.zip[web.exe]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-54c913c1-231975e2.zip[GetAccess.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-54c913c1-231975e2.zip[InsecureClassLoader.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-54c913c1-231975e2.zip[Dummy.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\classload.jar-54c913c1-231975e2.zip[Installer.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jpg-32d187b2-7764c1b2.zip[Counter.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jpg-32d187b2-7764c1b2.zip[Gummy.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jpg-32d187b2-7764c1b2.zip[VerifierBug.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jpg-32d187b2-7764c1b2.zip[Worker.class]
Virus:Exploit/ByteVerify Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jpg-32d187b2-7764c1b2.zip[Xeyond.class]
Virus:Trj/Downloader.CHD Reported C:\Documents and Settings\Mike\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\counter.jpg-32d187b2-7764c1b2.zip[web.exe]
Spyware:Cookie/2o7.net Reported C:\Documents and Settings\Mike\Cookies\mike@2o7[1].txt
Spyware:Cookie/YieldManager Reported C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
Spyware:Cookie/Adrevolver Reported C:\Documents and Settings\Mike\Cookies\mike@adrevolver[1].txt
Spyware:Cookie/Adrevolver Reported C:\Documents and Settings\Mike\Cookies\mike@adrevolver[3].txt
Spyware:Cookie/Advertising Reported C:\Documents and Settings\Mike\Cookies\mike@advertising[1].txt
Spyware:Cookie/Ask Reported C:\Documents and Settings\Mike\Cookies\mike@ask[1].txt
Spyware:Cookie/Atlas DMT Reported C:\Documents and Settings\Mike\Cookies\mike@atdmt[2].txt
Spyware:Cookie/Banner Reported C:\Documents and Settings\Mike\Cookies\mike@banner[1].txt
Spyware:Cookie/Bfast Reported C:\Documents and Settings\Mike\Cookies\mike@bfast[1].txt
Spyware:Cookie/Casalemedia Reported C:\Documents and Settings\Mike\Cookies\mike@casalemedia[2].txt
Spyware:Cookie/Doubleclick Reported C:\Documents and Settings\Mike\Cookies\mike@doubleclick[1].txt
Spyware:Cookie/FastClick Reported C:\Documents and Settings\Mike\Cookies\mike@fastclick[2].txt
Spyware:Cookie/Mediaplex Reported C:\Documents and Settings\Mike\Cookies\mike@mediaplex[1].txt
Spyware:Cookie/QuestionMarket Reported C:\Documents and Settings\Mike\Cookies\mike@questionmarket[1].txt
Spyware:Cookie/RealMedia Reported C:\Documents and Settings\Mike\Cookies\mike@realmedia[2].txt
Spyware:Cookie/Advertising Reported C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
Spyware:Cookie/Reliablestats Reported C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
Spyware:Cookie/Tradedoubler Reported C:\Documents and Settings\Mike\Cookies\mike@tradedoubler[2].txt
Spyware:Cookie/Valueclick Reported C:\Documents and Settings\Mike\Cookies\mike@valueclick[2].txt
Hacktool:HackTool/Rootkit.C Reported C:\Documents and Settings\Mike\msdirectx.sys
Spyware:Spyware/Virtumonde Reported C:\WINDOWS\system\msvcfont.dll
Adware:Adware/StartPage.AIW Reported C:\WINDOWS\system32\geeba.dll
Spyware:Spyware/Virtumonde Reported C:\WINDOWS\system32\geeby.dll
Virus:W32/Sdbot.EFG.worm Reported C:\WINDOWS\system32\lockx.exe
Spyware:Spyware/Virtumonde Reported C:\WINDOWS\system32\ssqro.dll
Virus:W32/Sdbot.EFG.worm Reported C:\xz.bat

-VUNDO-


Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 [email protected]
Suspending PID 464 'smss.exe'
Threads [468][472][476]

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 [email protected]
Killing PID 1472 'explorer.exe'
Killing PID 1472 'explorer.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 [email protected]
Killing PID 644 'rundll32.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 [email protected]
Killing PID 584 'winlogon.exe'
Killing PID 584 'winlogon.exe'
Could not delete file.
Files Deleted sucessfully.
  • 0

#8
Buckeye_Sam

Buckeye_Sam

    Malware Expert

  • Member
  • PipPipPipPipPipPipPipPip
  • 10,019 posts
Please delete the entire VundoFix folder. The tool has been updated.

Please print these instructions out for use in Safe Mode.

Please download VundoFix.exe to your desktop.
  • Double-click VundoFix.exe to extract the files
  • This will create a VundoFix folder on your desktop.
  • After the files are extracted, please reboot your computer into Safe Mode. You can do this by restarting your computer and continually tapping the F8 key until a menu appears. Use your up arrow key to highlight Safe Mode then hit enter.
  • Once in safe mode open the VundoFix folder and doubleclick on KillVundo.bat
  • You will first be presented with a warning.
    It should look like this

    VundoFix V2.15 by Atri
    By using VundoFix you agree that you are doing so at your own risk
    Press enter to continue....

  • At this point press enter one time.
  • Next you will see:

    Please Type in the filepath as instructed by the forum staff
    and then press enter:

  • At this point please type the following file path (make sure to enter it exactly as below!):

    • C:\WINDOWS\system\msvcfont.dll

  • Press Enter to continue with the fix.
  • Next you will see:

    Please type in the second filepath as instructed by the forum
    staff then press enter:

  • At this point please type the following file path (make sure to enter it exactly as below!):

    C:\WINDOWS\system\tnofcvsm.*
  • Press Enter to continue with the fix.
  • The fix will run then HijackThis will open. If it does not open automatically please open it manually.
  • In HiJackThis, please place a check next to the following items and click FIX CHECKED:


    O2 - BHO: MSEvents Object - {827DC836-DD9F-4A68-A602-5812EB50A834} - C:\WINDOWS\system\msvcfont.dll
    O20 - Winlogon Notify: msvcfont - C:\WINDOWS\system\msvcfont.dll

  • After you have fixed these items, close Hijackthis.
  • Press enter to exit the program then manually reboot your computer.
  • Once your machine reboots please continue with the instructions below.
Download and install CleanUp!

Open Cleanup! by double-clicking the icon on your desktop (or from the Start > All Programs menu).
Set the program up as follows:
Click "Options..."
Move the arrow down to "Custom CleanUp!"
Put a check next to the following (Make sure nothing else is checked!):
  • Empty Recycle Bins
  • Delete Cookies
  • Delete Prefetch files
  • Cleanup! All Users
Click OK
Press the CleanUp! button to start the program.

It may ask you to reboot at the end, click NO.

Then, please run this online virus scan: ActiveScan

Copy the results of the ActiveScan and paste them here along with a new HiJackThis log and the vundofix.txt file from the vundofix folder into this topic.
  • 0

#9
Buckeye_Sam

Buckeye_Sam

    Malware Expert

  • Member
  • PipPipPipPipPipPipPipPip
  • 10,019 posts
Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please contact a staff member. This applies only to the original topic starter. Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP