Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Security Toolbar 7.1


  • Please log in to reply
17 replies to this topic

#1 Angor

Angor

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:10:10 AM

Posted 07 July 2008 - 05:01 AM

Somehow i have got this "security tool bar 7.1" in my internet explorer, and now my pc is going haywire i have this anti virus pop up all the time anti virus xp 2008, is in start menu i have tries uninstaling the program, i am also running trend internet security pro and, ad-aware any help would be gratly appreciated thanks

BC AdBot (Login to Remove)

 


m

#2 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 07 July 2008 - 09:33 AM

Hi,

So you can't download Anti-Virus 2008 and the toolbar?

Do this:

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

#3 Angor

Angor
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  

Posted 08 July 2008 - 09:29 AM

Thanks so much for the speedy reply and all the help,i don't know if this means anything but latley i have been getting a pop up ever time i resart windows saying "Error loading C:\Windows\system32\{771cff12-ef79-6564-b25b-c10e3195b35f5.dll" i fairly certain thst corecct will double check before the next respose ran the scan and the following is the log
Thanks Again


Malwarebytes' Anti-Malware 1.20
Database version: 931
Windows 5.1.2600 Service Pack 2

00:09:15 2008-07-09
mbam-log-7-9-2008 (00-09-15).txt

Scan type: Quick Scan
Objects scanned: 42737
Time elapsed: 29 minute(s), 19 second(s)

Memory Processes Infected: 3
Memory Modules Infected: 3
Registry Keys Infected: 41
Registry Values Infected: 27
Registry Data Items Infected: 16
Folders Infected: 39
Files Infected: 89

Memory Processes Infected:
C:\WINDOWS\system32\lphc3eoj0eg07.exe (Trojan.Agent) -> Unloaded process successfully.
C:\Program Files\Web Technologies\iebtm.exe (Trojan.Zlob) -> Unloaded process successfully.
C:\Program Files\Web Technologies\iebtmm.exe (Trojan.Zlob) -> Unloaded process successfully.

Memory Modules Infected:
C:\Program Files\Web Technologies\iebt.dll (Trojan.Zlob) -> Unloaded module successfully.
C:\Program Files\Web Technologies\iebr.dll (Trojan.Zlob) -> Unloaded module successfully.
C:\WINDOWS\system32\hkushdr.dll (Trojan.Zlob) -> Unloaded module successfully.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{c46f137f-2c2a-4714-aa14-323137f882ae} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e2090673-256b-4632-94ee-fec7f551543c} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e2090673-256b-4632-94ee-fec7f551543c} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{d1577581-2ed7-469f-99b1-72c1339e0ee0} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\e405.e405mgr (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\e405.e405mgr.1 (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0bd071a6-c989-49e8-9b8e-80f92a868e26} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0bd071a6-c989-49e8-9b8e-80f92a868e26} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{04a38f6b-006f-4247-ba4c-02a139d5531c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{3c2d2a1e-031f-4397-9614-87c932a848e0} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx.1 (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2b96d5cc-c5b5-49a5-a69d-cc0a30f9028c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{9034a523-d068-4be8-a284-9df278be776e} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{d2608046-dd09-a225-01bf-70c1edd8b2e8} (Rogue.AntiSpyCheck) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{daed9266-8c28-4c1c-8b58-5c66eff1d302} (Search.Hijack) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\internetsoftware.pornpro_bho (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\internetsoftware.pornpro_bho.1 (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\ascwarning32.warningbho (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\ascwarning32.warningbho.1 (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{58472bc6-bea3-42d4-8917-7a8bcb0711b5} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{58472bc6-bea3-42d4-8917-7a8bcb0711b5} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{ea7522f6-87cf-411e-8a55-19ee4344b676} (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{ea7522f6-87cf-411e-8a55-19ee4344b676} (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{d761645b-6b20-4698-aee8-729981152a82} (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\mysearchassistant (Adware.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\MediaHoldings (Adware.PlayMP3Z) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\PlayMP3 (Adware.PlayMP3Z) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\FBrowsingAdvisor (Trojan.FBrowsingAdvisor) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\fbrowsingadvisor_is1 (Trojan.FBrowsingAdvisor) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\asc 2.1 (Rogue.AntiSpyCheck) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Windows Safety Alert (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Web Technologies (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\e405.e405mgr (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEBrowse Tool (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IExplorer Bar (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\multimediaControls.chl (Trojan.Zlob) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lphc3eoj0eg07 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{c46f137f-2c2a-4714-aa14-323137f882ae} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{c46f137f-2c2a-4714-aa14-323137f882ae} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\start (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{d1577581-2ed7-469f-99b1-72c1339e0ee0} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autorun_val (Rogue.VirusHeat) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\asc32 (Rogue.VirusHeat) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smrhc7eoj0eg07 (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smshc5eoj0eg07 (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\ADP (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Search\searchassistant (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Search\searchassistant (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\search page (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\searchmigrateddefaulturl (Trojan.Zlob) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\search bar (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\default_search_url (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchUrl\w\ (Trojan.Zlob) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\searchurl (Trojan.Zlob) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\default_search_url (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\search page (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\search bar (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\searchmigrateddefaulturl (Trojan.Zlob) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchUrl\w\ (Trojan.Zlob) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\searchurl (Trojan.Zlob) -> Delete on reboot.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\New Windows\Allow\*.securewebinfo.com (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\New Windows\Allow\*.safetyincludes.com (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\New Windows\Allow\*.securemanaging.com (Trojan.Zlob) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchUrl\w\ (Hijack.Search) -> Bad: (http://internetsearchservice.com/search?q=%s) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchUrl\w\ (Hijack.Search) -> Bad: (http://internetsearchservice.com/search?q=%s) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchURL (Hijack.Search) -> Bad: (http://internetsearchservice.com) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchURL (Hijack.Search) -> Bad: (http://internetsearchservice.com) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Search\SearchAssistant (Hijack.Search) -> Bad: (http://internetsearchservice.com) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\SearchAssistant (Hijack.Search) -> Bad: (http://internetsearchservice.com) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page (Hijack.Search) -> Bad: (http://internetsearchservice.com) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Bar (Hijack.Search) -> Bad: (http://internetsearchservice.com/ie6.html) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\SearchMigratedDefaultURL (Hijack.Search) -> Bad: (http://internetsearchservice.com/search?q={searchTerms}) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Default_Search_URL (Hijack.Search) -> Bad: (http://internetsearchservice.com) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Page (Hijack.Search) -> Bad: (http://internetsearchservice.com) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Bar (Hijack.Search) -> Bad: (http://internetsearchservice.com/ie6.html) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\SearchMigratedDefaultURL (Hijack.Search) -> Bad: (http://internetsearchservice.com/search?q={searchTerms}) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Search_URL (Hijack.Search) -> Bad: (http://internetsearchservice.com) Good: (http://www.google.com/) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispBackgroundPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispScrSavPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\Web Technologies (Trojan.Zlob) -> Delete on reboot.
C:\Documents and Settings\All Users\Start Menu\Programs\RelevantKnowledge (Spyware.Marketscore) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\SalesMon (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\SalesMon\Data (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\TrustedAntivirus (Rogue.TrustedAntivirus) -> Quarantined and deleted successfully.
C:\TrustedAntivirus (Rogue.TrustedProtection) -> Quarantined and deleted successfully.
C:\TrustedAntivirus\AVQuar (Rogue.TrustedProtection) -> Quarantined and deleted successfully.
C:\Program Files\ASC 2.1 (Rogue.AntiSpyCheck) -> Quarantined and deleted successfully.
C:\Program Files\FBrowsingAdvisor (Trojan.FBrowsingAdvisor) -> Quarantined and deleted successfully.
C:\Program Files\FBrowserAdvisor (Trojan.FBrowsingAdvisor) -> Quarantined and deleted successfully.
C:\Program Files\rhc7eoj0eg07 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\shc5eoj0eg07 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008 (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008 (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\734914 (Trojan.BHO) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\TrustedAntivirus (Rogue.TrustedAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\TrustedAntivirus\Logs (Rogue.TrustedAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\rhc7eoj0eg07 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\rhc7eoj0eg07\Quarantine (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\rhc7eoj0eg07\Quarantine\Autorun (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\rhc7eoj0eg07\Quarantine\Autorun\HKCU (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\rhc7eoj0eg07\Quarantine\Autorun\HKCU\RunOnce (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\rhc7eoj0eg07\Quarantine\Autorun\HKLM (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\rhc7eoj0eg07\Quarantine\Autorun\HKLM\RunOnce (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\rhc7eoj0eg07\Quarantine\Autorun\StartMenuAllUsers (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\rhc7eoj0eg07\Quarantine\Autorun\StartMenuCurrentUser (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\rhc7eoj0eg07\Quarantine\BrowserObjects (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\rhc7eoj0eg07\Quarantine\Packages (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\shc5eoj0eg07 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\shc5eoj0eg07\Quarantine (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\shc5eoj0eg07\Quarantine\Autorun (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\shc5eoj0eg07\Quarantine\Autorun\HKCU (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\shc5eoj0eg07\Quarantine\Autorun\HKCU\RunOnce (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\shc5eoj0eg07\Quarantine\Autorun\HKLM (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\shc5eoj0eg07\Quarantine\Autorun\HKLM\RunOnce (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\shc5eoj0eg07\Quarantine\Autorun\StartMenuAllUsers (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\shc5eoj0eg07\Quarantine\Autorun\StartMenuCurrentUser (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\shc5eoj0eg07\Quarantine\BrowserObjects (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\shc5eoj0eg07\Quarantine\Packages (Rogue.Multiple) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\lphc3eoj0eg07.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\Web Technologies\iebr.dll (Trojan.Zlob) -> Delete on reboot.
C:\Program Files\Web Technologies\iebt.dll (Trojan.Zlob) -> Delete on reboot.
C:\Program Files\Web Technologies\iebtm.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Program Files\Web Technologies\iebtmm.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Program Files\Web Technologies\iebtu.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Program Files\Web Technologies\iebu.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Program Files\Web Technologies\myd.ico (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Program Files\Web Technologies\mym.ico (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Program Files\Web Technologies\myp.ico (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Program Files\Web Technologies\myv.ico (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Program Files\Web Technologies\ot.ico (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Program Files\Web Technologies\ts.ico (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hkushdr.dll (Trojan.Zlob) -> Delete on reboot.
C:\Program Files\ASC 2.1\asc 2.1.exe (Rogue.VirusHeat) -> Quarantined and deleted successfully.
C:\Program Files\ASC 2.1\asc 2.1.exe (Rogue.VirusHeat) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mlJDvWPH.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\myss_sb_uninstall.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\WhoisCL.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-2000478354-179605362-725345543-1003\Dc11.tmp\blowfish.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-2000478354-179605362-725345543-1003\Dc8.tmp\Au_.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-2000478354-179605362-725345543-1003\Dc9\esrp.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\regxpcom.exe (Trojan.FBrowsingAdvisor) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\atmadm2.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\RelevantKnowledge\About RelevantKnowledge.lnk (Spyware.Marketscore) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\RelevantKnowledge\Privacy Policy and User License Agreement.lnk (Spyware.Marketscore) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\RelevantKnowledge\Support.lnk (Spyware.Marketscore) -> Quarantined and deleted successfully.
C:\Program Files\TrustedAntivirus\history.db (Rogue.TrustedAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\FBrowsingAdvisor\IXPCOMEvents.xpt (Trojan.FBrowsingAdvisor) -> Quarantined and deleted successfully.
C:\Program Files\FBrowsingAdvisor\Logo.png (Trojan.FBrowsingAdvisor) -> Quarantined and deleted successfully.
C:\Program Files\FBrowsingAdvisor\main.db (Trojan.FBrowsingAdvisor) -> Quarantined and deleted successfully.
C:\Program Files\FBrowsingAdvisor\unins000.dat (Trojan.FBrowsingAdvisor) -> Quarantined and deleted successfully.
C:\Program Files\FBrowsingAdvisor\unins000.exe (Trojan.FBrowsingAdvisor) -> Quarantined and deleted successfully.
C:\Program Files\FBrowsingAdvisor\XPCOMEvents.dll (Trojan.FBrowsingAdvisor) -> Quarantined and deleted successfully.
C:\Program Files\rhc7eoj0eg07\database.dat (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\rhc7eoj0eg07\license.txt (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\rhc7eoj0eg07\MFC71.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\rhc7eoj0eg07\MFC71ENU.DLL (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\rhc7eoj0eg07\msvcp71.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\rhc7eoj0eg07\msvcr71.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\rhc7eoj0eg07\rhc7eoj0eg07.exe (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\rhc7eoj0eg07\rhc7eoj0eg07.exe.local (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\rhc7eoj0eg07\Uninstall.exe (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\shc5eoj0eg07\database.dat (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\shc5eoj0eg07\license.txt (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\shc5eoj0eg07\MFC71.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\shc5eoj0eg07\MFC71ENU.DLL (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\shc5eoj0eg07\msvcp71.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\shc5eoj0eg07\msvcr71.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\shc5eoj0eg07\shc5eoj0eg07.exe (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\shc5eoj0eg07\shc5eoj0eg07.exe.local (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\shc5eoj0eg07\shc5eoj0eg07Skin.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Program Files\shc5eoj0eg07\Uninstall.exe (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\Antivirus XP 2008.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\How to Register Antivirus XP 2008.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\License Agreement.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\Register Antivirus XP 2008.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008\Uninstall.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\How to Register Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\License Agreement.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\Register Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008\Uninstall.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\TrustedAntivirus\PGE.dat (Rogue.TrustedAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\TrustedAntivirus\Logs\threats.log (Rogue.TrustedAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\TrustedAntivirus\Logs\update.log (Rogue.TrustedAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Desktop\Antivirus XP 2008.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\Microsoft\Internet Explorer\Quick Launch\Antivirus XP 2008.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Antivirus XP 2008.lnk (Rogue.AntivirusXP2008) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\components\nsBrowserGal.dll (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Desktop\Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\Microsoft\Internet Explorer\Quick Launch\Malware Protector 2008.lnk (Rogue.MalwareProtector2008) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mysidesearch_sidebar_uninstall.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\phc3eoj0eg07.bmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\.tt5.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\.tt7.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\.tt8.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\.tt9.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\.ttA.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\.ttB.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\.ttC.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\.ttD.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\.ttE.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\My Documents\My Music\My Music.url (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\My Documents\My Pictures\My Pictures.url (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\My Documents\My Videos\My Video.url (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\My Documents\My Documents.url (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Local Settings\Temp\bindsrv2.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

#4 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 08 July 2008 - 09:40 AM

Hi,

Have you rebooted the computer already? If not, do this now, because MBAM needs this to remove all infections.
After that, please make a new logfile, and post it in your next reply. :thumbsup:

#5 Angor

Angor
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:10:10 AM

Posted 11 July 2008 - 09:29 PM

Hi, sorry it took so long to get back to you
That msg is still there at start up, doesn,t seem to have any negative effects though. Here is the new log
Malwarebytes' Anti-Malware 1.20
Database version: 931
Windows 5.1.2600 Service Pack 2

12:27:50 2008-07-12
mbam-log-7-12-2008 (12-27-50).txt

Scan type: Quick Scan
Objects scanned: 45749
Time elapsed: 12 minute(s), 29 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#6 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 12 July 2008 - 03:26 AM

Hi,

Do you still have problems?
Are the programs still present?

#7 Angor

Angor
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  

Posted 14 July 2008 - 06:33 AM

I still have that pop msg at the start which i described earlier, apart from that everything is much better thanks

#8 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 14 July 2008 - 06:39 AM

Hi,

I need some more information. So please, do this:

1. Please download SDFix and save it to your Desktop.

Double click SDFix.exe and it will extract the files to C:\SDFix

You may wish to print out these instructions or copy them to a notepad document since you will be unable to access the Internet while in Safe Mode to read from this site.

Please then reboot your computer in Safe Mode (tap F8 just before Windows starts to load and select Safe Mode from the list).
  • Open the extracted SDFix folder and double click RunThis.bat to start the script.
  • Type Y to begin the cleanup process.
  • It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
  • Press any Key and it will restart the PC.
  • When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
  • Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
    (Report.txt will also be copied to Clipboard ready for posting back on the forum).
  • Finally paste the contents of the Report.txt back on the forum.
2. Please use the Internet Explorer browser (or FireFox with IETab), and do an online scan with Kaspersky Online Scanner

Note: If you have used this particular scanner before, you MAY HAVE TO UNINSTALL the program through Add/Remove Programs before downloading the new ActiveX component

Click Yes, when prompted to install its ActiveX component.
(Note.. for Internet Explorer 7 users: If at any time you have trouble with the "Accept" button of the license, click on the "Zoom" tool located at the bottom right of the IE window and set the zoom to 75 %. Once the license has been accepted, reset to 100%.)
The program launches and downloads the latest definition files.
  • Once the files are downloaded click on Next
  • Click on Scan Settings and configure as follows:
    • Scan using the following Anti-Virus database:
      • Extended
    • Scan Options:Scan Archives
      Scan Mail Bases
  • Click OK and, under select a target to scan, select My Computer
When the scan is done, in the Scan is completed window (below), any infection is displayed.
There is no option to clean/disinfect, however, we need to analyze the information on the report.
Posted Image
Posted Image
To obtain the report:
Click on: Save Report As (above - red blinking arrow)
Next, in the Save as prompt, Save in area, select: Desktop
In the File name area, use KScan, or something similar
In Save as type, click the drop arrow and select: Text file [*.txt]
Then, click: Save
Please post the Kaspersky Online Scanner Report in your reply.

#9 Angor

Angor
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:10:10 AM

Posted 17 July 2008 - 04:19 AM

Hi, i wasn't able to run Kaspersky Online Scanner because everytime i tried to go to the web site i would get an error msg while trying to download the updates. It was installed fine the only proble was the updates. The following is the results from SDFix
Thanks

SDFix: Version 1.205
Run by Owner on 2008-07-16 at 22:00

Microsoft Windows XP [Version 5.1.2600]
Running From: C:\SDFix

Checking Services :


Restoring Default Security Values
Restoring Default Hosts File

Rebooting


Checking Files :

Trojan Files Found:

C:\Program Files\Mozilla Firefox\extensions\sotfone-tracker@sotfone.ru\chrome.manifest - Deleted
C:\Program Files\Mozilla Firefox\extensions\sotfone-tracker@sotfone.ru\install.rdf - Deleted
C:\Program Files\Mozilla Firefox\extensions\sotfone-tracker@sotfone.ru\chrome\content\main.js - Deleted
C:\Program Files\Mozilla Firefox\extensions\sotfone-tracker@sotfone.ru\chrome\content\main.xul - Deleted
C:\Program Files\Mozilla Firefox\extensions\sotfone-tracker@sotfone.ru\chrome\content\request.js - Deleted
C:\Program Files\Mozilla Firefox\extensions\sotfone-tracker@sotfone.ru\chrome\content\web_progress.js - Deleted
C:\Program Files\Mozilla Firefox\extensions\sotfone-tracker@sotfone.ru\defaults\preferences\main.js - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt13.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt14.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt16.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt17.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt19.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt1A.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt1B.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt1C.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt1D.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt1E.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt20.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt21.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt22.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt23.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt25.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt26.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt27.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt2A.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt2B.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt2C.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt2D.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt2E.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt2F.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt30.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt32.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt33.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt34.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt35.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt36.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt38.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt39.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt3A.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt3B.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt3C.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt3E.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt40.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt42.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt43.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt45.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt47.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt4A.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt4C.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt4E.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt50.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt52.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt59.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt6B.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt80.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt8F.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt93.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt98.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt9A.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt9C.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.tt9E.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttA0.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttA2.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttA4.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttA6.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttA8.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttAA.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttAC.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttAE.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttB0.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttB2.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttB4.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttB6.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttB8.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttBB.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttBD.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttBF.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttC1.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttC3.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttC5.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttC7.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttC9.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttCB.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttCD.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttCF.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttD1.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttD3.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttD5.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttD7.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttD9.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttDB.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttDE.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttE0.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\.ttE2.tmp - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\atmadm2.exe.bat - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\bindsrv2.exe.bat - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\vista_sp1.exe.bat - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\zfe4.exe - Deleted
C:\DOCUME~1\Owner\LOCALS~1\Temp\media.php.bat - Deleted



Folder C:\Program Files\Mozilla Firefox\extensions\sotfone-tracker@sotfone.ru - Removed


Removing Temp Files

ADS Check :



Final Check :

catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-07-16 22:10:58
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\d347prt\Cfg\0Jf40]
"khjeh"=hex:20,02,00,00,d1,ed,b3,6e,b1,1c,11,60,80,56,7b,d0,23,bc,0d,74,1a,..
"hj34z0"=hex:11,78,71,f6,44,70,bf,0d,12,59,5b,c5,93,36,fc,4d,81,8f,e5,9d,c9,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\d347prt\Cfg\0Jf41]
"khjeh"=hex:20,02,00,00,c7,ec,b3,6e,f3,27,83,63,ea,b5,51,c4,35,f8,53,2e,f4,..
"hj34z0"=hex:11,78,71,f6,44,70,bf,0d,12,59,5b,c5,93,36,fc,4d,81,8f,e5,9d,60,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\d347prt\Cfg\0Jf42]
"khjeh"=hex:20,02,00,00,ce,eb,b3,6e,c8,2b,83,f2,cb,0d,a2,58,02,c8,fa,e8,4d,..
"hj34z0"=hex:11,78,71,f6,44,70,bf,0d,12,59,5b,c5,93,36,fc,4d,81,8f,e5,9d,ae,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\d347prt\Cfg\0Jf43]
"khjeh"=hex:20,02,00,00,8f,97,ba,bf,9b,2e,62,66,92,c9,85,54,9d,bf,ec,cf,bc,..

scanning hidden registry entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


Remaining Services :




Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\Sony Ericsson\\Sony Ericsson Media Manager 1.0\\MediaManager.exe"="C:\\Program Files\\Sony Ericsson\\Sony Ericsson Media Manager 1.0\\MediaManager.exe:*:Enabled:Sony Ericsson Media Manager 1.0"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\LimeWire\\LimeWire.exe"="C:\\Program Files\\LimeWire\\LimeWire.exe:*:Enabled:LimeWire"
"C:\\Program Files\\DNA\\btdna.exe"="C:\\Program Files\\DNA\\btdna.exe:*:Enabled:DNA"
"C:\\Program Files\\iTunes\\iTunes.exe"="C:\\Program Files\\iTunes\\iTunes.exe:*:Enabled:iTunes"
"C:\\Program Files\\MSN Messenger\\msnmsgr.exe"="C:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger 8.1"
"C:\\Program Files\\MSN Messenger\\livecall.exe"="C:\\Program Files\\MSN Messenger\\livecall.exe:*:Enabled:Windows Live Messenger 8.1 (Phone)"
"C:\\Program Files\\uTorrent\\uTorrent.exe"="C:\\Program Files\\uTorrent\\uTorrent.exe:*:Enabled:ęTorrent"
"C:\\Program Files\\BitDownload\\BitDownload.exe"="C:\\Program Files\\BitDownload\\BitDownload.exe:*:Enabled:Warez3"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\MSN Messenger\\msnmsgr.exe"="C:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger 8.1"
"C:\\Program Files\\MSN Messenger\\livecall.exe"="C:\\Program Files\\MSN Messenger\\livecall.exe:*:Enabled:Windows Live Messenger 8.1 (Phone)"

Remaining Files :


File Backups: - C:\SDFix\backups\backups.zip

Files with Hidden Attributes :

Tue 4 Apr 2006 4,348 A.SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
Thu 15 Feb 2007 308,832 A..H. --- "C:\Program Files\Canon\MP Navigator EX 1.0\Maint.exe"
Mon 19 Dec 2005 61,440 A..H. --- "C:\Program Files\Canon\MP Navigator EX 1.0\uinstrsc.dll"
Thu 10 Apr 2008 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"
Tue 11 Mar 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\0af356491b55c305dd5d04c316921bbd\BIT2F.tmp"
Tue 11 Mar 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\694301dbfd149d8645046cbc0b1067e8\BIT30.tmp"
Tue 11 Mar 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\7839365c1326e76174268a08a0fe22da\BIT27.tmp"
Tue 11 Mar 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\837a8691e43011f909e4b3e192fe1437\BIT41.tmp"
Tue 11 Mar 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\8e4a93629d6cd1d1cabd0d9fdb63ca6b\BIT3D.tmp"
Tue 11 Mar 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\90c5d2ebf41ce8d405eb458cc79a1965\BIT4E.tmp"
Tue 11 Mar 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\cbf49375d9664af3421554329a6d98d1\BIT4B.tmp"
Tue 11 Mar 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\f7db876e78b88fd8276fd7d29cb7e4eb\BIT19.tmp"
Wed 11 Jun 2008 95,315,977 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\f8e4c50bd1c41feac24607e18c5505bd\BIT16.tmp"
Sat 10 May 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\fd0264849c01086f3c6b505dc02dbd44\BIT7.tmp"
Fri 21 Mar 2008 616,448 A.SH. --- "C:\Deckard\System Scanner\backup\WINDOWS\temp\0fvexo15.TMP"
Mon 31 Mar 2008 616,448 A.SH. --- "C:\Deckard\System Scanner\backup\WINDOWS\temp\1qm91cit.TMP"
Mon 16 Oct 2006 616,448 A.SH. --- "C:\Deckard\System Scanner\backup\WINDOWS\temp\5rgf3yly.TMP"
Mon 24 Mar 2008 616,448 A.SH. --- "C:\Deckard\System Scanner\backup\WINDOWS\temp\8p9yt618.TMP"
Sun 23 Mar 2008 616,448 A.SH. --- "C:\Deckard\System Scanner\backup\WINDOWS\temp\gr3gadh7.TMP"
Thu 20 Mar 2008 616,448 A.SH. --- "C:\Deckard\System Scanner\backup\WINDOWS\temp\l2mw4wx7.TMP"
Tue 31 Jul 2007 616,448 A.SH. --- "C:\Deckard\System Scanner\backup\WINDOWS\temp\ox1g2t4g.TMP"
Thu 20 Mar 2008 616,448 A.SH. --- "C:\Deckard\System Scanner\backup\WINDOWS\temp\t0l0my7q.TMP"
Fri 21 Mar 2008 616,448 A.SH. --- "C:\Deckard\System Scanner\backup\WINDOWS\temp\ttuza4wh.TMP"
Thu 20 Mar 2008 616,448 A.SH. --- "C:\Deckard\System Scanner\backup\WINDOWS\temp\v3l9apdy.TMP"
Mon 10 Oct 2005 4,348 A..H. --- "C:\Documents and Settings\Owner\My Documents\My Music\License Backup\drmv1key.bak"
Mon 10 Oct 2005 401 A..H. --- "C:\Documents and Settings\Owner\My Documents\My Music\License Backup\drmv1lic.bak"
Sat 26 Feb 2005 312 A.SH. --- "C:\Documents and Settings\Owner\My Documents\My Music\License Backup\drmv2key.bak"
Thu 20 Mar 2008 0 A..H. --- "C:\Deckard\System Scanner\backup\DOCUME~1\Owner\LOCALS~1\Temp\s1.tmp"
Fri 28 Mar 2008 24,576 ...H. --- "C:\Documents and Settings\Owner\My Documents\Uni\1st Semester 2008\Human Physiology & the Lifecycle\Assignments\Essay 1\~WRL2483.tmp"

Finished!

#10 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 17 July 2008 - 06:43 AM

Download ATF Cleaner
  • Double-click ATF-Cleaner.exe to run the program.
  • Click Select All found at the bottom of the list.
  • Click the Empty Selected button.
If you use Firefox browser, do this also:
  • Click Firefox at the top and choose Select All from the list.
  • Click the Empty Selected button.
  • NOTE : If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser, do this also:
  • Click Opera at the top and choose Select All from the list.
  • Click the Empty Selected button.
  • NOTE : If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.


Do you still have problems? :thumbsup:

#11 Angor

Angor
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  

Posted 24 July 2008 - 03:20 AM

Hi, i ran the program, but still have the error msg pop up at start up, but other than that everthing is fine

#12 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 24 July 2008 - 03:28 AM

1. Open Notepad.
Copy this in the Notepad-file:

@ECHO OFF
REGEDIT /E log.txt "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\d347prt\Cfg\0Jf40"
REGEDIT /E log.txt "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\d347prt\Cfg\0Jf41"
REGEDIT /E log.txt "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\d347prt\Cfg\0Jf42"
REGEDIT /E log.txt "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\d347prt\Cfg\0Jf43"
START NOTEPAD.EXE log.txt
EXIT

Go to File - Save as...
Fill in the next values:
Location: Desktop
File name: look.bat
File type: All files (*.*).
Now, click Save.
Doubleclick look.bat.
Post the contents of the logfile that opens in your next reply.

#13 Angor

Angor
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:10:10 AM

Posted 06 August 2008 - 02:39 AM

Sorry for the late reply i followed the steps, and it created a new notpad file called log.txt, but the file was blank

#14 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 06 August 2008 - 05:38 AM

Please use the Internet Explorer browser (or FireFox with IETab), and do an online scan with Kaspersky Online Scanner

Note: If you have used this particular scanner before, you MAY HAVE TO UNINSTALL the program through Add/Remove Programs before downloading the new ActiveX component

Click Yes, when prompted to install its ActiveX component.
(Note.. for Internet Explorer 7 users: If at any time you have trouble with the "Accept" button of the license, click on the "Zoom" tool located at the bottom right of the IE window and set the zoom to 75 %. Once the license has been accepted, reset to 100%.)
The program launches and downloads the latest definition files.
  • Once the files are downloaded click on Next
  • Click on Scan Settings and configure as follows:
    • Scan using the following Anti-Virus database:
      • Extended
    • Scan Options:Scan Archives
      Scan Mail Bases
  • Click OK and, under select a target to scan, select My Computer
When the scan is done, in the Scan is completed window (below), any infection is displayed.
There is no option to clean/disinfect, however, we need to analyze the information on the report.
Posted Image
Posted Image
To obtain the report:
Click on: Save Report As (above - red blinking arrow)
Next, in the Save as prompt, Save in area, select: Desktop
In the File name area, use KScan, or something similar
In Save as type, click the drop arrow and select: Text file [*.txt]
Then, click: Save
Please post the Kaspersky Online Scanner Report in your reply.

#15 Angor

Angor
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  

Posted 22 August 2008 - 08:59 PM

Sorry it took me so long

--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7 REPORT
Saturday, August 23, 2008
Operating System: Microsoft Windows XP Home Edition Service Pack 2 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Friday, August 22, 2008 08:07:20
Records in database: 1123253
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
A:\
C:\
D:\
E:\
F:\
G:\
H:\
I:\

Scan statistics:
Files scanned: 145428
Threat name: 15
Infected objects: 58
Suspicious objects: 0
Duration of the scan: 09:55:57


File name / Threat name / Threats count
C:\Deckard\System Scanner\backup\DOCUME~1\Owner\LOCALS~1\Temp\bisE.exe Infected: Trojan.Win32.Obfuscated.gen 1
C:\Deckard\System Scanner\backup\DOCUME~1\Owner\LOCALS~1\Temp\s5a4 Infected: not-a-virus:AdWare.Win32.Agent.boh 1
C:\Deckard\System Scanner\backup\DOCUME~1\Owner\LOCALS~1\Temp\tem34.tmp.exe Infected: not-a-virus:AdWare.Win32.Agent.bjb 1
C:\Deckard\System Scanner\backup\DOCUME~1\Owner\LOCALS~1\Temp\tmp85.tmp Infected: not-a-virus:AdWare.Win32.BHO.clf 1
C:\Deckard\System Scanner\backup\DOCUME~1\Owner\LOCALS~1\Temp\tmp8D.tmp Infected: not-a-virus:AdWare.Win32.BHO.clf 1
C:\Deckard\System Scanner\backup\DOCUME~1\Owner\LOCALS~1\Temp\upd3A.tmp.exe Infected: not-a-virus:AdWare.Win32.Agent.bjb 1
C:\Documents and Settings\Owner\My Documents\Downloads\Command & Conquer - Red Alert 2 + Expansion Yuri's Revenge - Incl. Keygen & Crack\Command & Conquer - Red Alert 2 + Expansion Yuri's Revenge - Incl. Keygen & Crack\GAME.EXE Infected: Trojan.Win32.Monderb.don 1
C:\Documents and Settings\Owner\My Documents\Downloads\Command & Conquer - Red Alert 2 + Expansion Yuri's Revenge - Incl. Keygen & Crack\Command & Conquer - Red Alert 2 + Expansion Yuri's Revenge - Incl. Keygen & Crack\ra2.exe Infected: Trojan.Win32.Monderb.don 1
C:\Documents and Settings\Owner\My Documents\Downloads\Command & Conquer - Red Alert 2 + Expansion Yuri's Revenge - Incl. Keygen & Crack\Command & Conquer - Red Alert 2 + Expansion Yuri's Revenge - Incl. Keygen & Crack.rar Infected: Trojan.Win32.Monderb.don 2
C:\Program Files\PKR\pkr.exe Infected: not-a-virus:Monitor.Win32.PKRPoker.a 1
C:\Program Files\Trend Micro\HijackThis\backups\backup-20080507-191545-645.dll Infected: not-a-virus:AdWare.Win32.Agent.bjb 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\3077htsbdjyf[1].dll Infected: Rootkit.Win32.Podnuha.ale 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\7.tmp Infected: Trojan-Downloader.WMA.Wimad.n 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0108207.exe Infected: Hoax.Win32.Renos.vafa 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\A0128657.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.cti 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\AKV_570.VIR Infected: not-a-virus:Monitor.Win32.Ardamax.u 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\jfcjr_4dc.VIR Infected: Trojan-Downloader.Win32.Agent.lxt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\jfcjr_634.VIR Infected: Trojan-Downloader.Win32.Agent.lxt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07.exe Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_128.VI0 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_128.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_134.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_148.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_164.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_178.VI0 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_180.VI0 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_180.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_184.VI1 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_184.VI2 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_184.VI3 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_184.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_188.VI0 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_188.VI1 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_474.VI0 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_474.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_478.VI0 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_478.VI1 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_488.VI0 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_49c.VI0 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_49c.VI1 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_49c.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_4a4.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_4b0.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_4d8.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_500.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_a44.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_a5c.VI0 Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_a5c.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_a64.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_a7c.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\pphc3eoj0eg07_a84.VIR Infected: not-a-virus:FraudTool.Win32.MalwareProtector.d 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\vsskkbc[1]_504.VIR Infected: Trojan-Downloader.Win32.Agent.lxt 1
C:\Program Files\Trend Micro\Internet Security\Quarantine\XDMR_5b8.VIR Infected: not-a-virus:Monitor.Win32.Ardamax.u 1
C:\QooBox\Quarantine\C\Program Files\InternetSoftware\InternetSoftware-2.dll.vir Infected: not-a-virus:AdWare.Win32.Agent.bjb 1
C:\QooBox\Quarantine\C\WINDOWS\system32\comd32.dll.vir Infected: Trojan-Banker.Win32.Banker.rkb 1
C:\QooBox\Quarantine\C\WINDOWS\system32\msindc.dll.vir Infected: Trojan-Banker.Win32.Banker.rkb 1
I:\Programs\Codecs\GordianKnot.CodecPack.1.1.exe Infected: not-a-virus:AdWare.Win32.Gator.3202 1

The selected area was scanned.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users