Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hijackthis Log File


  • This topic is locked This topic is locked
6 replies to this topic

#1 roxstar611

roxstar611

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:07 PM

Posted 16 December 2007 - 01:08 PM

I believe i have vundo on my computer.

Heres the hijackthis log file

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:07:52 PM, on 12/16/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\acs.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\system32\DVDRAMSV.exe
c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\Toshiba\Tvs\TvsTray.exe
C:\WINDOWS\AGRSMMSG.exe
C:\WINDOWS\System32\DLA\DLACTRLW.EXE
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\toshiba\ivp\ism\pinger.exe
C:\kybrdff_8.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\dfndrff_9.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\WINDOWS\ms050016416176.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
C:\Program Files\AIM\aim.exe
C:\WINDOWS\system32\RAMASST.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\rundll32.exe
C:\Documents and Settings\RK\Desktop\VundoFix.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yourstartingpage.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll
O2 - BHO: (no name) - {31A9F3BD-9865-4706-A3C8-90B0FA555C9e} - C:\WINDOWS\system32\dokeqvwh.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {831A52B0-0B93-4B04-8A6A-C14C15E69580} - C:\WINDOWS\system32\dokeqvwh.dll (file missing)
O2 - BHO: (no name) - {A07F539C-17D3-47C4-8EBE-6C8EEA9F49EF} - C:\WINDOWS\system32\vturq.dll (file missing)
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [SynTPLpr] "C:\Program Files\Synaptics\SynTP\SynTPLpr.exe"
O4 - HKLM\..\Run: [SynTPEnh] "C:\Program Files\Synaptics\SynTP\SynTPEnh.exe"
O4 - HKLM\..\Run: [THotkey] "C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe"
O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM\..\Run: [Tvs] "C:\Program Files\Toshiba\Tvs\TvsTray.exe"
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [DLA] C:\WINDOWS\System32\DLA\DLACTRLW.EXE
O4 - HKLM\..\Run: [TFncKy] TFncKy.exe
O4 - HKLM\..\Run: [TPSMain] TPSMain.exe
O4 - HKLM\..\Run: [PadTouch] "C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe"
O4 - HKLM\..\Run: [SmoothView] "C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe"
O4 - HKLM\..\Run: [Pinger] "c:\toshiba\ivp\ism\pinger.exe" /run
O4 - HKLM\..\Run: [CFSServ.exe] CFSServ.exe -NoClient
O4 - HKLM\..\Run: [keyboard] C:\\kybrdff_8.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [defender] C:\\dfndrff_9.exe
O4 - HKLM\..\Run: [{A9-9E-EA-A4-ZN}] c:\windows\system32\dwdsregt.exe SKY008
O4 - HKLM\..\Run: [{ZN}] C:\Documents and Settings\RK\TISKY008.exe SKY008
O4 - HKLM\..\Run: [ms050016416176] C:\WINDOWS\ms050016416176.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [TOSCDSPD] "C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe"
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Startup: Microsoft Office OneNote 2003 Quick Launch.lnk = C:\Program Files\Microsoft Office\OFFICE11\ONENOTEM.EXE
O4 - Global Startup: MSWin.exe
O4 - Global Startup: RAMASST.lnk = C:\WINDOWS\system32\RAMASST.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.toshibadirect.com/dpdstart
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1172977783421
O20 - Winlogon Notify: mljji - C:\WINDOWS\system32\mljji.dll (file missing)
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\acs.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: DVD-RAM_Service - Matsubleepa Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
O23 - Service: Swupdtmr - Unknown owner - c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
O23 - Service: TOSHIBA Application Service (TAPPSRV) - TOSHIBA Corp. - C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe

--
End of file - 6856 bytes


Someone please help me out, thanks

BC AdBot (Login to Remove)

 


#2 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:03:07 PM

Posted 16 December 2007 - 10:03 PM

Hello roxstar611,

Welcome to Bleeping Computer :thumbsup:

You have more than just Vundo going on here. :blink:

1. Download AVG Anti-Spyware from HERE and save that file to your desktop.
This is a 30 day trial of the program
  • Once you have downloaded AVG anti-spyware, locate the icon on the desktop and double-click it to launch the set up program.
  • Once the setup is complete, run AVG and update the definition files.
  • On the main screen select the icon "Update" then select the "Update now" link.
    • Next select the "Start Update" button, the update will start and a progress bar will show the updates being installed.
  • Once the update has completed select the "Scanner" icon at the top of the screen, then select the "Settings" tab.
  • Once in the Settings screen click on "Recommended actions" and then select "Quarantine".
  • Under "Reports"
    • Select "Automatically generate report after every scan"
    • Un-Select "Only if threats were found"
Close AVG anti-spyware, Do Not run a scan just yet

2. Please download Brute Force Uninstaller to your desktop.
  • Right click the BFU folder on your desktop, and choose Extract All
  • Click "Next"
  • In the box to choose where to extract the files to,
  • Click "Browse"
  • Click on the + sign next to "My Computer"
  • Click on "Local Disk (C:) or whatever your primary drive is
  • Click "Make New Folder"
  • Type in BFU
  • Click "Next", and Uncheck the "Show Extracted Files" box and then click "Finish".
3. RIGHT-CLICK HERE and choose "Save As" (in IE it's "Save Target As") in order to download Alcra PLUS Remover.
Save it in the same folder you made earlier (c:\BFU).

Do not do anything with these yet!

4. Reboot your computer into SafeMode. You can do this by restarting your computer and tapping the F8 key until a menu appears. Use your up arrow key to highlight SafeMode then hit enter.

5. IMPORTANT: Do not open any other windows or programs while AVG is scanning, it may interfere with the scanning proccess:
  • Lauch AVG Anti-spyware by double-clicking the icon on your desktop.
  • Select the "Scanner" icon at the top and then the "Scan" tab then click on "Complete System Scan".
  • AVG will now begin the scanning process, be patient this may take a little time.
    Once the scan is complete do the following:
  • If you have any infections you will prompted, then select "Apply all actions"
  • Next select the "Reports" icon at the top.
  • Select the "Save report as" button in the lower left hand of the screen and save it to a text file on your desktop (This is important)
  • Close AVG and reboot your system back into Normal Mode.
6. Then, please go to Start > My Computer and navigate to the C:\BFU folder.
  • Start the Brute Force Uninstaller by doubleclicking BFU.exe
  • Behind the scriptline to execute field click the folder icon Posted Image and select alcanshorty.bfu
  • Press Execute and let it do itís job. (You ought to see a progress bar if you did this correctly.)
  • Wait for the complete script execution box to pop up and press OK.
  • Press [b]exit to terminate the BFU program.
[b]Reboot into normal windows and post the contents of AVG text report that you saved and a new HiJackThis log.


Thanks,
tea
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?

#3 roxstar611

roxstar611
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:07 PM

Posted 17 December 2007 - 02:37 AM

AVG Report:

---------------------------------------------------------
AVG Anti-Spyware - Scan Report
---------------------------------------------------------

+ Created at: 2:19:55 AM 12/17/2007

+ Scan result:



HKLM\SOFTWARE\Classes\WR -> Adware.Generic : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007280.exe -> Adware.TTC : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007281.exe -> Adware.ZenoSearch : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007287.exe -> Adware.ZQuest : Cleaned with backup (quarantined).
C:\nwnmff_7.exe_tobedeleted -> Downloader.Adload.dj : Cleaned with backup (quarantined).
C:\kybrdff_7.exe -> Downloader.Adload.dl : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP43\A0020162.exe -> Downloader.Adload.dv : Cleaned with backup (quarantined).
C:\kybrdff_8.exe -> Downloader.Adload.dv : Cleaned with backup (quarantined).
[1936] C:\kybrdff_8.exe -> Downloader.Adload.dv : Cleaned with backup (quarantined).
C:\kybrdff_9.exe -> Downloader.Adload.ec : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007282.exe -> Downloader.Small.dxm : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007286.dll -> Downloader.Small.dxm : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007302.exe -> Downloader.Tiny.id : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007304.exe -> Downloader.Tiny.id : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007309.exe -> Downloader.Tiny.id : Cleaned with backup (quarantined).
C:\VundoFix Backups\fovkrgxv.exe.bad -> Downloader.Tiny.id : Cleaned with backup (quarantined).
C:\VundoFix Backups\jguxevjy.exe.bad -> Downloader.Tiny.id : Cleaned with backup (quarantined).
C:\VundoFix Backups\qpgkuvko.exe.bad -> Downloader.Tiny.id : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007278.exe -> Dropper.Agent.bfr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007283.dll -> Hijacker.StartPage : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007284.dll -> Hijacker.StartPage : Cleaned with backup (quarantined).
C:\Documents and Settings\RK\Local Settings\Temp\pre.exe -> Hijacker.VB.lb : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP43\A0020163.exe -> Hijacker.VB.or : Cleaned with backup (quarantined).
C:\dfndrff_9.exe -> Hijacker.VB.or : Cleaned with backup (quarantined).
[852] C:\dfndrff_9.exe -> Hijacker.VB.or : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007277.exe -> Hijacker.VB.po : Cleaned with backup (quarantined).
C:\Documents and Settings\RK\Local Settings\Temp\ICD1.tmp\USDR6_0001_D08M0404NetInstaller.exe -> Not-A-Virus.Downloader.Win32.WinFixer.l : Cleaned with backup (quarantined).
C:\WINDOWS\Downloaded Program Files\USDR6_0001_D08M0404NetInstaller.exe -> Not-A-Virus.Downloader.Win32.WinFixer.l : Cleaned with backup (quarantined).
:mozilla.224:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.2o7 : Cleaned.
:mozilla.64:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.2o7 : Cleaned.
:mozilla.65:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.2o7 : Cleaned.
:mozilla.66:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.2o7 : Cleaned.
:mozilla.67:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.2o7 : Cleaned.
:mozilla.68:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.2o7 : Cleaned.
:mozilla.69:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.2o7 : Cleaned.
:mozilla.132:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Aavalue : Cleaned.
:mozilla.179:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Aavalue : Cleaned.
:mozilla.180:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Aavalue : Cleaned.
:mozilla.181:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Aavalue : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@aavalue[1].txt -> TrackingCookie.Aavalue : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@arn.aavalue[2].txt -> TrackingCookie.Aavalue : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@prizeamerica.aavalue[1].txt -> TrackingCookie.Aavalue : Cleaned.
:mozilla.145:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Adbrite : Cleaned.
:mozilla.146:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Adbrite : Cleaned.
:mozilla.147:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Adbrite : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@adbrite[2].txt -> TrackingCookie.Adbrite : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@ads.adbrite[1].txt -> TrackingCookie.Adbrite : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@ads.addynamix[1].txt -> TrackingCookie.Addynamix : Cleaned.
:mozilla.518:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Adjuggler : Cleaned.
:mozilla.519:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Adjuggler : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@rotator.adjuggler[1].txt -> TrackingCookie.Adjuggler : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@rotator.dex.adjuggler[1].txt -> TrackingCookie.Adjuggler : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@thunderbolt.adjuggler[2].txt -> TrackingCookie.Adjuggler : Cleaned.
:mozilla.400:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Adrevolver : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@adrevolver[1].txt -> TrackingCookie.Adrevolver : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@media.adrevolver[2].txt -> TrackingCookie.Adrevolver : Cleaned.
:mozilla.160:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Adtech : Cleaned.
:mozilla.161:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Adtech : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@advertising[2].txt -> TrackingCookie.Advertising : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@atdmt[2].txt -> TrackingCookie.Atdmt : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@www.burstbeacon[1].txt -> TrackingCookie.Burstbeacon : Cleaned.
:mozilla.230:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Burstnet : Cleaned.
:mozilla.231:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Burstnet : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@burstnet[1].txt -> TrackingCookie.Burstnet : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@www.burstnet[2].txt -> TrackingCookie.Burstnet : Cleaned.
:mozilla.258:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Connextra : Cleaned.
:mozilla.259:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Connextra : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@doubleclick[1].txt -> TrackingCookie.Doubleclick : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@enhance[2].txt -> TrackingCookie.Enhance : Cleaned.
:mozilla.649:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Epilot : Cleaned.
:mozilla.150:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Euroclick : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@fastclick[1].txt -> TrackingCookie.Fastclick : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@findwhat[1].txt -> TrackingCookie.Findwhat : Cleaned.
:mozilla.58:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned.
:mozilla.59:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned.
:mozilla.60:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned.
:mozilla.61:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned.
:mozilla.62:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned.
:mozilla.63:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Hitbox : Cleaned.
:mozilla.357:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Imrworldwide : Cleaned.
:mozilla.358:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Imrworldwide : Cleaned.
:mozilla.200:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Msn : Cleaned.
:mozilla.526:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Msn : Cleaned.
:mozilla.527:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Msn : Cleaned.
:mozilla.528:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Msn : Cleaned.
:mozilla.529:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Msn : Cleaned.
:mozilla.431:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Navrcholu : Cleaned.
:mozilla.27:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Netflame : Cleaned.
:mozilla.28:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Netflame : Cleaned.
:mozilla.464:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Overture : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@ads.pointroll[2].txt -> TrackingCookie.Pointroll : Cleaned.
:mozilla.484:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Questionmarket : Cleaned.
:mozilla.485:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Questionmarket : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@questionmarket[2].txt -> TrackingCookie.Questionmarket : Cleaned.
:mozilla.507:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Realmedia : Cleaned.
:mozilla.513:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Revsci : Cleaned.
:mozilla.514:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Revsci : Cleaned.
:mozilla.515:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Revsci : Cleaned.
:mozilla.516:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Revsci : Cleaned.
:mozilla.517:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Revsci : Cleaned.
:mozilla.285:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Ru4 : Cleaned.
:mozilla.203:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Searchingbooth : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@bs.serving-sys[1].txt -> TrackingCookie.Serving-sys : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@serving-sys[2].txt -> TrackingCookie.Serving-sys : Cleaned.
:mozilla.263:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Sexcounter : Cleaned.
:mozilla.264:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Sexcounter : Cleaned.
:mozilla.307:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Sitestat : Cleaned.
:mozilla.308:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Sitestat : Cleaned.
:mozilla.369:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Sitestat : Cleaned.
:mozilla.590:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Starware : Cleaned.
:mozilla.44:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned.
:mozilla.45:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned.
:mozilla.46:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned.
:mozilla.47:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Statcounter : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@statcounter[2].txt -> TrackingCookie.Statcounter : Cleaned.
:mozilla.568:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned.
:mozilla.569:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned.
:mozilla.570:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Tacoda : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@tacoda[1].txt -> TrackingCookie.Tacoda : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@login.tracking101[1].txt -> TrackingCookie.Tracking101 : Cleaned.
:mozilla.586:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Trafficmp : Cleaned.
:mozilla.587:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Trafficmp : Cleaned.
:mozilla.589:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Tribalfusion : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@tribalfusion[2].txt -> TrackingCookie.Tribalfusion : Cleaned.
:mozilla.390:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Webtrends : Cleaned.
:mozilla.88:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Webtrendslive : Cleaned.
:mozilla.143:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Yieldmanager : Cleaned.
:mozilla.144:C:\Documents and Settings\RK\Application Data\Mozilla\Firefox\Profiles\qs5tfi31.default\cookies.txt -> TrackingCookie.Yieldmanager : Cleaned.
C:\Documents and Settings\RK\Cookies\anyuser@ad.yieldmanager[1].txt -> TrackingCookie.Yieldmanager : Cleaned.
C:\Documents and Settings\RK\Cookies\rk@ad.yieldmanager[2].txt -> TrackingCookie.Yieldmanager : Cleaned.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007323.dll -> Trojan.Pakes.akr : Cleaned with backup (quarantined).
C:\VundoFix Backups\opnnmnl.dll.bad -> Trojan.Pakes.akr : Cleaned with backup (quarantined).
C:\WINDOWS\retadpu361.exe -> Trojan.Small : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007288.exe -> Trojan.VB.bfv : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007285.exe -> Trojan.VB.bfw : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP38\A0007289.exe -> Trojan.VB.bfw : Cleaned with backup (quarantined).


::Report end



Hijackthis report:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:37:30 AM, on 12/17/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\acs.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\system32\DVDRAMSV.exe
c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\Toshiba\Tvs\TvsTray.exe
C:\WINDOWS\AGRSMMSG.exe
C:\WINDOWS\System32\DLA\DLACTRLW.EXE
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\toshiba\ivp\ism\pinger.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
C:\Program Files\AIM\aim.exe
C:\WINDOWS\system32\RAMASST.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yourstartingpage.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll
O2 - BHO: (no name) - {31A9F3BD-9865-4706-A3C8-90B0FA555C9e} - C:\WINDOWS\system32\dokeqvwh.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {831A52B0-0B93-4B04-8A6A-C14C15E69580} - C:\WINDOWS\system32\dokeqvwh.dll (file missing)
O2 - BHO: (no name) - {A07F539C-17D3-47C4-8EBE-6C8EEA9F49EF} - C:\WINDOWS\system32\vturq.dll (file missing)
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [SynTPLpr] "C:\Program Files\Synaptics\SynTP\SynTPLpr.exe"
O4 - HKLM\..\Run: [SynTPEnh] "C:\Program Files\Synaptics\SynTP\SynTPEnh.exe"
O4 - HKLM\..\Run: [THotkey] "C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe"
O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
O4 - HKLM\..\Run: [Tvs] "C:\Program Files\Toshiba\Tvs\TvsTray.exe"
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [DLA] C:\WINDOWS\System32\DLA\DLACTRLW.EXE
O4 - HKLM\..\Run: [TFncKy] TFncKy.exe
O4 - HKLM\..\Run: [TPSMain] TPSMain.exe
O4 - HKLM\..\Run: [PadTouch] "C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe"
O4 - HKLM\..\Run: [SmoothView] "C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe"
O4 - HKLM\..\Run: [Pinger] "c:\toshiba\ivp\ism\pinger.exe" /run
O4 - HKLM\..\Run: [CFSServ.exe] CFSServ.exe -NoClient
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [{A9-9E-EA-A4-ZN}] c:\windows\system32\dwdsregt.exe SKY008
O4 - HKLM\..\Run: [ms050016416176] C:\WINDOWS\ms050016416176.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [TOSCDSPD] "C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe"
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Startup: Microsoft Office OneNote 2003 Quick Launch.lnk = C:\Program Files\Microsoft Office\OFFICE11\ONENOTEM.EXE
O4 - Global Startup: MSWin.exe
O4 - Global Startup: RAMASST.lnk = C:\WINDOWS\system32\RAMASST.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.toshibadirect.com/dpdstart
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1172977783421
O20 - Winlogon Notify: mljji - C:\WINDOWS\system32\mljji.dll (file missing)
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\acs.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: DVD-RAM_Service - Matsubleepa Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
O23 - Service: Swupdtmr - Unknown owner - c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
O23 - Service: TOSHIBA Application Service (TAPPSRV) - TOSHIBA Corp. - C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe

--
End of file - 6869 bytes

#4 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:03:07 PM

Posted 17 December 2007 - 02:35 PM

Hello,

I have to tell you at this point that your computer has been compromised. This entry ----> O4 - Global Startup: MSWin.exe represents a password stealing trojan. http://www.sophos.com/virusinfo/analyses/trojbankercu.html

If you don't reformat and reinstall, which is your safest and surest course, then it is extremely important to change your passwords and such after it's clean. Your passwords are all known. Don't do it now, or they'll just get stolen again. Keep an eye on any sensitive accounts you might have for nefarious activity.

Please let me know what you decide to do.

Regards,
tea
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?

#5 roxstar611

roxstar611
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:07 PM

Posted 17 December 2007 - 07:56 PM

I guess, I will reformat and such.

How do I go about doing this?

#6 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:03:07 PM

Posted 17 December 2007 - 08:44 PM

Hello,

This should help :
http://www.fas.harvard.edu/computing/security/randr.html

Regards,
tea
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?

#7 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:03:07 PM

Posted 12 January 2008 - 11:39 AM

Since this issue appears resolved ... this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users