Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Clicking On Google Search Result Links Redirect To Other Sites


  • Please log in to reply
14 replies to this topic

#1 Me2007

Me2007

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:09 PM

Posted 11 September 2008 - 01:01 PM

Hi, I have a windows XP and seems like it is infected heavily. I use Firefox, IE doesn't seem to work - comes up with lots of popups. Recently when I search on google and get the result page and click on a link, it redirects me to different websites. That's why I am unable to download any spyware removal software. I was looking at some other threads and found out about the combofix.exe but it suggests that I describe my problem first before trying to run it. Please let me know the next steps to follow. Thank you.

BC AdBot (Login to Remove)

 


#2 garmanma

garmanma

    Computer Masochist


  • Members
  • 27,809 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Cleveland, Ohio
  • Local time:06:09 PM

Posted 11 September 2008 - 01:20 PM

Yes you are infected. I'll move you to the correct forum
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#3 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:06:09 PM

Posted 11 September 2008 - 03:19 PM

Welcome Me2007 to BC!

Thank you for following the ComboFix rules. :thumbsup: I suggest downloading MalwareBytes, and it's updates, to another computer and then transferring them to your infected computer via flash drive / cd. (More instructions and links can be found below) - Then, please follow this procedure:

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#4 Me2007

Me2007
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:09 PM

Posted 12 September 2008 - 12:05 AM

Hi Rigel,

Here's the log file:
FYI-> Seems like most of the spywares are gone. Also, the searching is working now! I think it worked, what do you say? Thanks a bunch for the great help and also in advance if you think I still need to do something else :thumbsup:
==========================================================
Malwarebytes' Anti-Malware 1.28
Database version: 1141
Windows 5.1.2600 Service Pack 2

9/11/2008 9:52:31 PM
mbam-log-2008-09-11 (21-52-31).txt

Scan type: Quick Scan
Objects scanned: 66151
Time elapsed: 8 minute(s), 58 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 1
Registry Keys Infected: 58
Registry Values Infected: 3
Registry Data Items Infected: 0
Folders Infected: 22
Files Infected: 466

Memory Processes Infected:
C:\Program Files\ISTsvc\istsvc.exe (Adware.ISTBar) -> Unloaded process successfully.

Memory Modules Infected:
C:\WINDOWS\wsem303.dll (Adware.NetOptimizer) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\clientax.clientinstaller (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{5b6689b5-c2d4-4dc7-bfd1-24ac17e5fcda} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{031cbf6a-c70e-4177-a0d4-c5268ee311fb} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{2b0eceac-f597-4858-a542-d966b49055b9} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{7fa8976f-d00c-4e98-8729-a66569233fb5} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{bdddf1a5-51a9-4f51-b38d-4cd0ad831b31} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{ddea2e1d-8555-45e5-af09-ec9aa4ea27ad} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{f1f1e775-1b21-454d-8d38-7c16519969e5} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0ac49246-419b-4ee0-8917-8818daad6a4e} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{99410cde-6f16-42ce-9d49-3807f78f0287} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{f31a5d11-bf0b-4a4e-90af-274f2090aaa6} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\clientax.clientinstaller.1 (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\clientax.requiredcomponent (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\clientax.requiredcomponent.1 (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\dyfuca_bh.bhobj (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{0be10b0d-b4db-4693-9b1f-9aead54d17dc} (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{aa4939c3-deca-4a48-a454-97cd587c0ef5} (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{eee4a2e5-9f56-432f-a6ed-f6f625b551e0} (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{8f4e5661-f99e-4b3e-8d85-0ea71c0748e4} (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8f4e5661-f99e-4b3e-8d85-0ea71c0748e4} (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{cea206e8-8057-4a04-ace9-ff0d69a92297} (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\dyfuca_bh.bhobj.1 (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\dyfuca_bh.sinkobj (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\dyfuca_bh.sinkobj.1 (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\lmgr180.wmdrmax (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\lmgr180.wmdrmax.1 (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mediagatewayx.installer (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\c:/windows/downloaded program files/mediagatewayx.dll (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{981bda1d-c8ad-46ff-be2c-fddd859ac6f5} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{dd469a88-316c-441d-b712-783d9b9a6707} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{8fcdf9d9-a28b-480f-8c3d-581f119a8ab8} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8fcdf9d9-a28b-480f-8c3d-581f119a8ab8} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\mediagatewayx.installer.1 (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\ysb.ysbobj (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{4ee12b71-aa5e-45ec-8666-2db3ad3fdf44} (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{03b800f9-2536-4441-8cda-2a3e6d15b4f8} (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{dfbcc1eb-b149-487e-80c1-cc1562021542} (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{86227d9c-0efe-4f8a-aa55-30386a3f5686} (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\ysb.ysbobj.1 (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{1c01d150-91a4-4de0-9bf8-a35d1bdf1001} (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c2eeb4fa-b6d6-41b9-9cfa-aba87f862bcb} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c2eeb4fa-b6d6-41b9-9cfa-aba87f862bcb} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{00000010-6f7d-442c-93e3-4a4827c2e4c8} (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{40b1d454-9ca4-43cc-86aa-cb175eac52fb} (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000010-6f7d-442c-93e3-4a4827c2e4c8} (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{d28cd14c-50be-4cfa-951e-b37f25da3472} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\startup (Adware.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\tdss (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\ISTsvc (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ISTsvc (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\IST (Trojan.ISTBar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\YourSiteBar (Trojan.Istbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\YourSiteBar (Trojan.Istbar) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\AMeOpt (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DyFuCA (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WSEM Update (Adware.NetOptimizer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Kapabout (Adware.NetOptimizer) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\WINDOWS\Downloaded Program Files\MediaGatewayX.dll (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{86227d9c-0efe-4f8a-aa55-30386a3f5686} (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ist service (Adware.ISTBar) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\XP Antivirus (Rogue.XPantivirus) -> Quarantined and deleted successfully.
C:\Program Files\ISTsvc (Adware.ISTBar) -> Delete on reboot.
C:\Program Files\YourSiteBar (Adware.ISTBar) -> Quarantined and deleted successfully.
C:\Program Files\AV9 (Rogue.Antivirus2009) -> Quarantined and deleted successfully.
C:\Documents and Settings\........\Start Menu\XP Antivirus 2008 (Rogue.XPAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\IESkins (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\HostOI (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\HostOI\dynamic (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\HostOI\static (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\HostOL (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\HostOL\dynamic (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\HostOL\static (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\ustat (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad (Adware.Agent) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\Downloaded Program Files\ClientAX.dll (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\WINDOWS\wsem303.dll (Adware.NetOptimizer) -> Delete on reboot.
C:\WINDOWS\Downloaded Program Files\MediaGatewayX.dll (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Program Files\YourSiteBar\ysb.dll (Adware.ISTBar) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\navshext2.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\nem220.dll (Adware.NetOptimizer) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ccapp.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\navshext.dll (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ustart.exe (Adware.Agent) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\Components\ffcomponent.dll (Adware.SurfAccuracy) -> Quarantined and deleted successfully.
C:\Program Files\XP Antivirus\xpa.exe (Rogue.XPantivirus) -> Quarantined and deleted successfully.
C:\Program Files\XP Antivirus\xpa.exe.tmp (Rogue.XPantivirus) -> Quarantined and deleted successfully.
C:\Program Files\XP Antivirus\xpa2008.exe (Rogue.XPantivirus) -> Quarantined and deleted successfully.
C:\Program Files\ISTsvc\istsvc.exe (Adware.ISTBar) -> Delete on reboot.
C:\Program Files\YourSiteBar\imagemap_normal.bmp (Adware.ISTBar) -> Quarantined and deleted successfully.
C:\Program Files\YourSiteBar\imagemap_over.bmp (Adware.ISTBar) -> Quarantined and deleted successfully.
C:\Program Files\YourSiteBar\version.txt (Adware.ISTBar) -> Quarantined and deleted successfully.
C:\Program Files\YourSiteBar\yoursitebar.xml (Adware.ISTBar) -> Quarantined and deleted successfully.
C:\Program Files\AV9\av2009.exe (Rogue.Antivirus2009) -> Quarantined and deleted successfully.
C:\Documents and Settings\,,,,,,,\Start Menu\XP Antivirus 2008\Uninstall XP Antivirus 2008.lnk (Rogue.XPAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\........\Start Menu\XP Antivirus 2008\XP Antivirus 2008.lnk (Rogue.XPAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\1.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\117819.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\1383771.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\1387616.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\175641.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\2590073.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\2883915.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\2899625.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\3305670.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\3434661.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\3435572.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\3442551.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\3731753.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\3732170.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\737654.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\819382.sdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\domains.txt (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\10685 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\11891 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\13562 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\145911 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\1491 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\15388 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\15955 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\17025 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\17040 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\18383 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\188075 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\19052 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\199413 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\20478 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\20570 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\22913 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\23220 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\23923 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\23928 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\241510 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\24625 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\25025 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\25032 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\25047 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\26077 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\26664 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\277907 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\288733 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\31387 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\32290 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\33168 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\34107 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\34156 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\34186 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\35047 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\356660 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\35941 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\37081 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\372500 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\40999 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\42034 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\44228 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\44229 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\44293 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\44458 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\44878 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\459338 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\51166 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\52335 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\526389 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\531510 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\53595 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\53933 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\54473 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\54979 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\56113 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\578150 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\59844 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\64411 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\67552 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\67564 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\6873 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\69263 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\70463 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\70650 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\71999 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\72882 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\73391 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\73948 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\744617 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\744881 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\744959 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\748176 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\75089 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\7518 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\7521 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\753196 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\753331 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\79246 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\80670 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\81293 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\82292 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\83209 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\86379 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\87843 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\91840 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\93899 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\94407 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\95825 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\95873 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\95917 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\9665 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\TooltipXML\99795 (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\ustat\36dd.dat (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\dynamic\ustat\3734.dat (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\btntrans.idx (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\btntrans1.dat (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\buttondir.txt (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\components.cdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\cursors.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\default.cdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_511745-514279.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_categorize.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_comparison.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_explorer-Mails.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_explorer-people.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_favorites.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_Games.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_Hide.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_hotbarcom.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_Hotmail.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_hsskin.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_Mails.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_new.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_premium.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_searchfor.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_searchgo.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_weather.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Default_yellowpages.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_1000.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_2000.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_3000.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_bar.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_bbar1.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_logos.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_buttons_other.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\d_icons_weather.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\email-def-511724-548964.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\email-def-511724-9595.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\email-t1-bg.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\icons2.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\ie_games_icon.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\ie_video.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\keywords.idx (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\keywords1.dat (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\layout.cdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\linkpathlegal.txt (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\progress.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\sales_buttons.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\seekmo.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\seekmo_ie_menu.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\s_icons_buttons.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\t2_bg.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\theweb.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\top7.cdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\Top7_theweb.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\1\tsd_bg.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\btntrans.idx (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\btntrans1.dat (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\buttondir.txt (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\components.cdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\cursors.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\default.cdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_511745-514279.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_categorize.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_comparison.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_explorer-Mails.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_explorer-people.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_favorites.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_Games.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_Hide.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_hotbarcom.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_Hotmail.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_hsskin.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_Mails.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_new.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_premium.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_searchfor.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_searchgo.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_weather.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Default_yellowpages.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_1000.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_2000.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_3000.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_bar.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_bbar1.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_logos.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_buttons_other.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\d_icons_weather.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\email-def-511724-548964.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\email-def-511724-9595.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\email-t1-bg.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\icons2.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\ie_games_icon.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\ie_video.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\keywords.idx (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\keywords1.dat (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\layout.cdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\linkpathlegal.txt (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\progress.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\sales_buttons.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\seekmo.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\seekmo_ie_menu.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\s_icons_buttons.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\t2_bg.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\theweb.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\top7.cdf (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\Top7_theweb.mnu (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\2\tsd_bg.res (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\BtnTrans.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\BtnTrans1.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\buttondir.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\cursors.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\default.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_1000.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_2000.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_3000.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_bar.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_bbar1.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_logos.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_buttons_other.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\d_icons_weather.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\email-t1-bg.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\icons2.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\ie_games_icon.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\ie_video.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\keywords.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\keywords1.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\layout.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\linkpathlegal.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\progress.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\sales_buttons.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\samplegroups2.txt (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\samplegroups2.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\seekmo.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\seekmo_ie_menu.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\s_icons_buttons.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\t2_bg.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\top7.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Application Data\Seekmo\v3.0\Seekmo\static\DownLoad\tsd_bg.xip (Adware.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\navshext1.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdssadw.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssl.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssserf.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssmain.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssinit.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdsslog.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\tdssservers.dat (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\drivers\tdssserv.sys (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\Dell_User\Local Settings\Temp\E-CommercePresentationOutline.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\GUI Program Design.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\S.Ooyshee accept.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\~WRD0005.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\HPIM0931.jpg (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\241c_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\9dc_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\calog.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\cfout.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\DepCheck71.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\e1ab_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\ea02_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\f4f9_appcompat.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\Microsoft Office 2003 Setup(0001).txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\Microsoft Office 2003 Setup(0001)_Task(0001).txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\msinterr.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\NCInstallLog.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\removefiles.txttemp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\vsinstall71.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\wcuerror71.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\wcuevent71.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\wecerr.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\cuwl-title.png (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\adidas.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\airforce.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\airforce2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\angelsoft.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\angelsoft2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\applejacks.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\applejacks2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\applejacks3.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\applejacks4.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\apprentice4.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\apprentice6.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\arizonajeans.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\arizonajeans2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\baseball3.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\beneful2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\benzaclin.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\bestbuy.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\bodybymilk.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\budlight.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\budweiser.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\buicknews.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\buildabear.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\buildabear3.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\butterfinger.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\carlsjr.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\chapstick.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\chapstick2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\chilis.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\ckin2u.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\cleanandclear.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\cleanandclear2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\cliniquehappy.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\colgatedance.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\colgatemax.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\colgatepb.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\corpsebride.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\disneymtr.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\dodgecaliber.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\doritos2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\doritoscts.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\easymac.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\eloise.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\everest.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\everyoneshero.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\ffour.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\fifamatchcast.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\football.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\fordescape.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\fordescape_small.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\freeride.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\freeride2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\frozenpoptarts.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\gamekillers.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\gardasil.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\garnier2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\gatoradefierce.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\gatoradepro.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\gatoradepro_small.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\ghostrider.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\glade.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\gopro.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\harrypotter4.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\harrypotter4dvd.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\hitchhikers2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\hondafit.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\honeycomb.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\htf.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\iceage2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\iceage2dvd.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\jcpenney.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\jcpmixitup.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\jcpmixitup_small.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\kleenex.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\kyocera.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\lorealhip.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\lunchables.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\maddie.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\mandmsalways.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\mastiff.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\maybelline2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\maybellinelash.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\monsterhouse.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\mountaindew.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\mudds.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\musicmodshhr.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\mypoptarts.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\narnia.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\nascar.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\navy.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\neutrogena.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\nikeplus.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\nintendods.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\nordstrom2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\nordstrom3.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\nordstrom4.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\nordstrom6.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\ondcp.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\openseason.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\overthehedge.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\oxyride.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\panasonicoxyride.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\pepsiringtones.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\poptartsescape.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\poptartshollywood.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\ptchocolate.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\ptsplitz.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\purinadogchow.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\ratatouille.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\rbff.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\remymartin2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\rimmel.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\robots2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\samsungomg.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\shestheman.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\simpsons.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\sims2nightlife.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\sims2ofb.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\snowflake.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\soccer.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\sonyericsson.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\spotthequilters.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\ssx4.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\starbucks.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\starburst.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\sunkist.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\sunsilk.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\sunsilk_small.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\ti.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\tmobilesk3.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\tmobileskii.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\toyotahsd.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\transformers.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\travelocity.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\tridentsplash.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\vacancy.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\verbnow.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\verizon.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\walmart.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\wellsfargo.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\willywonka.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\willywonka2.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\wotw.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\wrigley5.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\xmen3.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Local Settings\Temp\ysmash.bmp (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\ar-11.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\IntelMyTravelPlans.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\license.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\MorganStanleyMyTravelPlans.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\N_400_Citizenship.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\n_400_instruction.pdf (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\501.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\changeLog.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\DirectLoanNumbers.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\New Text Document.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\pin.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\Radius PW and 3Mcorporateid.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\Rimmel.txt (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\Image019.jpg (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\Pagol.jpg (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\NBA666__Final_Case_Analysis.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\Sal-Comp.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\.........._NBA601-FinalExam.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Dell_User\Desktop\SF_Bay_Area_Resources.doc (Trojan.Extension.Exploit) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ooyshee\Desktop\XP Antivirus 2008.lnk (Rogue.XPAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ooyshee\Local Settings\Temp\cd10C.tmp (Heuristics.Malware) -> Quarantined and deleted successfully.

Edited by rigel, 26 January 2009 - 11:16 PM.


#5 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:09 AM

Posted 12 September 2008 - 12:11 AM

Your log indicates that you need to reboot your computer to complete the removal process. Please reboot, update and scan again with Malwarebytes. Post a new log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#6 Me2007

Me2007
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:09 PM

Posted 12 September 2008 - 02:21 AM

I did reboot twice, ran the scan again. Here's the new log:

Malwarebytes' Anti-Malware 1.28
Database version: 1141
Windows 5.1.2600 Service Pack 2

9/12/2008 12:13:18 AM
mbam-log-2008-09-12 (00-13-18).txt

Scan type: Quick Scan
Objects scanned: 57288
Time elapsed: 20 minute(s), 15 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\ISTsvc (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ISTsvc (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\IST (Trojan.ISTBar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\YourSiteBar (Trojan.Istbar) -> Delete on reboot.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ist service (Adware.ISTBar) -> Delete on reboot.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\ISTsvc (Adware.ISTBar) -> Delete on reboot.

Files Infected:
C:\Program Files\ISTsvc\istsvc.exe (Adware.ISTBar) -> Delete on reboot.

#7 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:06:09 PM

Posted 12 September 2008 - 10:01 AM

Looks much better...

Please download ATF Cleaner by Atribune & save it to your desktop. alternate download link DO NOT use yet.
Please download and install SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here and unzip into the program's folder.)
  • Under the "Configuration and Preferences", click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#8 Me2007

Me2007
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:09 PM

Posted 13 September 2008 - 05:53 PM

Hi,
Here's the log. Thank you.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/13/2008 at 03:41 PM

Application Version : 4.21.1004

Core Rules Database Version : 3565
Trace Rules Database Version: 1553

Scan type : Complete Scan
Total Scan Time : 03:36:54

Memory items scanned : 172
Memory threats detected : 0
Registry items scanned : 6851
Registry threats detected : 381
File items scanned : 207742
File threats detected : 23

Unclassified.Unknown Origin
[AwikVBq2] C:\WINDOWS\IIXMSECJ.EXE
C:\WINDOWS\IIXMSECJ.EXE
[AwikVh$v/C:\Program Files\ISTsvc\istsvc.exe] C:\WINDOWS\IIXMSECJ.EXE
[# L"h'9Ӝ3rWC:\Program Files\ISTsvc\istsvc.exe] C:\WINDOWS\IIXMSECJ.EXE

Adware.Avenue Media
[Internet Optimizer] C:\PROGRAM FILES\INTERNET OPTIMIZER\OPTIMIZE.EXE
C:\PROGRAM FILES\INTERNET OPTIMIZER\OPTIMIZE.EXE
[Bkuyvru] C:\PROGRAM FILES\NOQBE\GLYIKO.EXE
C:\PROGRAM FILES\NOQBE\GLYIKO.EXE

Adware.IST/ISTBar (Slotch Bar)
[IST Service] C:\PROGRAM FILES\ISTSVC\ISTSVC.EXE
C:\PROGRAM FILES\ISTSVC\ISTSVC.EXE
HKU\S-1-5-21-796845957-1897051121-725345543-1011\Software\IST
HKLM\Software\ISTsvc
HKLM\Software\ISTsvc#version
HKLM\Software\ISTsvc#app_name
HKLM\Software\ISTsvc#popup_url
HKLM\Software\ISTsvc#update_url
HKLM\Software\ISTsvc#config_url
HKLM\Software\ISTsvc#ui
HKLM\Software\ISTsvc#popup_titletext
HKLM\Software\ISTsvc#popup_initial_delay
HKLM\Software\ISTsvc#popup_count
HKLM\Software\ISTsvc#popup_day_count
HKLM\Software\ISTsvc#popup_day_limit
HKLM\Software\ISTsvc#update_count
HKLM\Software\ISTsvc#update_version
HKLM\Software\ISTsvc#config_count
HKLM\Software\ISTsvc#account_id
HKLM\Software\ISTsvc#app_date
HKLM\Software\ISTsvc#popup_interval
HKLM\Software\ISTsvc#popup_last
HKLM\Software\ISTsvc#update_interval
HKLM\Software\ISTsvc#update_last
HKLM\Software\ISTsvc#config_interval
HKLM\Software\ISTsvc#config_last
HKLM\Software\ISTsvc\history
HKLM\Software\ISTsvc\history#128658048287656250
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ISTsvc
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ISTsvc#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ISTsvc#UninstallString
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ISTsvc#NoModify
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ISTsvc#NoRepair
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ISTsvc#HelpLink
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ISTsvc#Publisher
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ISTsvc#URLInfoAbout
C:\Program Files\ISTsvc
HKLM\SOFTWARE\Microsoft\Internet Explorer\Main#BandRest [ Never ]

Adware.Avenue Media/Internet Optimizer
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Optimizer
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Optimizer#DisplayIcon
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Optimizer#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Optimizer#UninstallString
HKU\S-1-5-21-796845957-1897051121-725345543-1011\Software\Avenue Media
HKLM\Software\Avenue Media
HKLM\Software\Avenue Media\Internet Optimizer
HKLM\Software\Avenue Media\Internet Optimizer#TargetDir
HKLM\Software\Avenue Media\Internet Optimizer#TAC
HKLM\Software\Avenue Media\Internet Optimizer#CLS
HKLM\Software\Avenue Media\Internet Optimizer#RID
HKLM\Software\Avenue Media\Internet Optimizer#Version
HKLM\Software\Avenue Media\Internet Optimizer#ServerVisited
HKLM\Software\Avenue Media\Internet Optimizer#UpdateInterval
HKLM\Software\Avenue Media\Internet Optimizer#ID
HKLM\Software\Avenue Media\Internet Optimizer#InstallT
HKLM\Software\Avenue Media\Internet Optimizer#remember[LLT]
HKLM\Software\Avenue Media\Internet Optimizer#Conn
HKLM\Software\Avenue Media\Internet Optimizer#403
HKLM\Software\Avenue Media\Internet Optimizer#404
HKLM\Software\Avenue Media\Internet Optimizer#410
HKLM\Software\Avenue Media\Internet Optimizer#500
HKLM\Software\Avenue Media\Internet Optimizer#PendingRemoval
HKLM\Software\Avenue Media\Internet Optimizer#RemovedPrograms
HKLM\Software\Avenue Media\Internet Optimizer\Browser Helper
HKLM\Software\Avenue Media\Internet Optimizer\Browser Helper#Version
HKLM\Software\Avenue Media\Internet Optimizer\Browser Helper#ModuleFileName
HKLM\Software\Avenue Media\Internet Optimizer\Browser Helper#Options
HKLM\Software\Avenue Media\Internet Optimizer\Browser Helper\cf1
HKLM\Software\Avenue Media\Internet Optimizer\Browser Helper\cf1#RawData
HKLM\Software\Avenue Media\Internet Optimizer\Browser Helper\cf1#Data
HKLM\Software\Avenue Media\Internet Optimizer\Browser Helper\cf1#DiffAll
HKLM\Software\Avenue Media\Internet Optimizer\Browser Helper\cf1#TimeStamp
HKLM\Software\Avenue Media\Internet Optimizer\Browser Helper\cf1#Version
HKLM\Software\Avenue Media\Internet Optimizer\WSE
HKLM\Software\Avenue Media\Internet Optimizer\WSE#Version
HKLM\Software\Avenue Media\Internet Optimizer\WSE#Options
HKLM\Software\Avenue Media\Internet Optimizer\WSE#ModuleFileName
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2481
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1443
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1442
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1440
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI50283
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19981
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI507392
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508041
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1436
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19994
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19967
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21840
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22210
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1435
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19968
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI683
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534417
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21099
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22116
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI506451
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI500029
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19995
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI511003
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI18237
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI16999
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1424
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21613
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19973
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI17075
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI506428
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22201
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22753
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19996
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1439
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510438
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22233
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1547
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI531267
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19989
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508214
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI129
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508195
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI586
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22251
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI17509
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19992
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI533600
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2156
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2489
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI905
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22197
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510437
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI682
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510793
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI896
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510442
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22389
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19048
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508432
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI530947
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510025
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2385
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI16410
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI530903
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19975
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21892
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22016
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22013
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21657
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI837
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI20914
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2531
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21092
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19401
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534465
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2533
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI20240
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI17681
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI16419
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI500687
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI509488
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2539
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2536
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2076
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI533965
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534308
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510791
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534456
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508075
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI17098
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI531876
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI503275
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510134
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22821
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI17492
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI16458
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI531005
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510166
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI536585
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI536571
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2390
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI20002
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534314
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI536596
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508959
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21197
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2513
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2202
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21124
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI536243
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI20003
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI818
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21843
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI535220
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2080
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI50091
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534322
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI900
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21851
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI507914
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI536432
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2541
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI50169
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534111
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508991
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508936
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI16640
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI506151
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508826
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI530948
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510026
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI494
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2546
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI844
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2106
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510214
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI868
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI487
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534512
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1398
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI509681
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI718
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI536578
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI500681
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI509212
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21771
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2214
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2529
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI16441
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI530922
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI535250
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI535833
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534455
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19017
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508401
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI530899
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2522
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI509833
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21842
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI17370
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510782
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI919
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI509175
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI531530
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508044
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI535212
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22810
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI509180
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510465
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI535998
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510505
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI509491
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534463
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI16492
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI16436
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI16463
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI531030
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2363
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI17291
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534433
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534431
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI537384
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI536071
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22802
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI535284
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI536111
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI506203
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19978
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534473
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534318
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508221
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI20070
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1437
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1543
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI20071
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2389
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19319
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508703
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI531350
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21996
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI186
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2151
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534429
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19664
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2544
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2075
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534323
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI508129
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534413
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI523
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534458
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI928
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI536082
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI537016
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI1466
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2077
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534334
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI21779
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI533985
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510228
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2540
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI535426
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510712
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2535
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI535387
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI536178
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2532
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI510106
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI532199
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI509426
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI535161
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI142
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534464
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2548
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI16471
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI531083
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI2245
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI22239
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI19983
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI509195
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI534469
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI537977
HKLM\Software\Avenue Media\Internet Optimizer\WSE#RI504509
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf1
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf1#RawData
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf1#Data
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf1#DiffAll
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf1#TimeStamp
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf1#Version
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf2
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf2#RawData
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf2#Data
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf2#DiffAll
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf2#TimeStamp
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf2#Version
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf2#Last
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf2#StartT
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf2#Num
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf3
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf3#RawData
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf3#Data
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf3#DiffAll
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf3#TimeStamp
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf3#Version
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf4
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf4#RawData
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf4#Data
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf4#DiffAll
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf4#TimeStamp
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf4#Version
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf5
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf5#RawData
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf5#Data
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf5#DiffAll
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf5#TimeStamp
HKLM\Software\Avenue Media\Internet Optimizer\WSE\cf5#Version
HKLM\SOFTWARE\Policies\Avenue Media
C:\Program Files\Internet Optimizer\update\rogue.exe
C:\Program Files\Internet Optimizer\update
C:\Program Files\Internet Optimizer
HKU\S-1-5-21-796845957-1897051121-725345543-1011\Software\Microsoft\Internet Explorer\URLSearchHooks#_{CFBFAE00-17A6-11D0-99CB-00C04FD64497}

Trojan.NewDotNet
HKU\.DEFAULT\Software\New.net
HKU\S-1-5-21-796845957-1897051121-725345543-1011\Software\New.net
HKU\S-1-5-18\Software\New.net
C:\WINDOWS\NDNUNINSTALL6_38.EXE
C:\WINDOWS\NDNUNINSTALL6_98.EXE
C:\WINDOWS\NDNUNINSTALL7_14.EXE
C:\WINDOWS\NDNUNINSTALL7_22.EXE

Adware.IST/YourSiteBar
HKLM\Software\YourSiteBar
HKLM\Software\YourSiteBar#installTitle
HKLM\Software\YourSiteBar#barTitle
HKLM\Software\YourSiteBar#serverpath
HKLM\Software\YourSiteBar#urlAfterInstall
HKLM\Software\YourSiteBar#gUpdate
HKLM\Software\YourSiteBar#TBRowMode
HKLM\Software\YourSiteBar#yoursitebar.xml
HKLM\Software\YourSiteBar#imagemap_normal.bmp
HKLM\Software\YourSiteBar#imagemap_over.bmp
HKLM\Software\YourSiteBar#showcorrupted
HKLM\Software\YourSiteBar#updatever
HKLM\Software\YourSiteBar#refreshscope
HKLM\Software\YourSiteBar#allowupdate
HKLM\Software\YourSiteBar#LastCheckTime
HKLM\Software\YourSiteBar#version.txt
HKLM\Software\YourSiteBar#UpdateBegin
HKLM\Software\YourSiteBar\Historyfiles
HKLM\Software\YourSiteBar\Historymusic_keyword

Adware.180solutions/Seekmo
HKU\.DEFAULT\Software\seekmo
HKU\S-1-5-18\Software\seekmo

Adware.SurfAccuracy-Installer
C:\DOCUMENTS AND SETTINGS\OOYSHEE\LOCAL SETTINGS\TEMP\UNINSTALL.EXE

Adware.Tracking Cookie
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ad.yieldmanager[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@ads.pointroll[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@apmebf[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@atdmt[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@doubleclick[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@fastclick[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@hotbar[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@insightexpressai[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\system@www.adxtrack[2].txt

Trace.Known Threat Sources
C:\Documents and Settings\Ooyshee\Local Settings\Temp\Temporary Internet Files\Content.IE5\2JKT4V2F\content.licenseacquisition[1].htm

#9 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:06:09 PM

Posted 13 September 2008 - 07:00 PM

Hi Me2007,

The ext step is to UPDATE Malwarebytes and run another scan. Please post those results. Be sure to reboot after the run and then get the log.

Please do an online scan with Kaspersky WebScanner

Click on Kaspersky Online Scanner

You will be prompted to install an ActiveX component from Kaspersky, Click Yes.
  • The program will launch and then begin downloading the latest definition files:
  • Once the files have been downloaded click on NEXT
  • Now click on Scan Settings
  • In the scan settings make that the following are selected:
    • Scan using the following Anti-Virus database:
    Extended (if available otherwise Standard)
    • Scan Options:
    Scan Archives
    Scan Mail Bases
  • Click OK
  • Now under select a target to scan:Select My Computer
  • This will program will start and scan your system.
  • The scan will take a while so be patient and let it run.
  • Once the scan is complete it will display if your system has been infected.
    • Now click on the Save as Text button:
  • Save the file to your desktop.
  • Copy and paste that information in your next post.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#10 Me2007

Me2007
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:09 PM

Posted 14 September 2008 - 12:56 PM

Log file after scanning with Kaspersky.


--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7 REPORT
Sunday, September 14, 2008
Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Saturday, September 13, 2008 23:20:00
Records in database: 1221843
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
C:\
D:\

Scan statistics:
Files scanned: 209647
Threat name: 3
Infected objects: 62
Suspicious objects: 0
Duration of the scan: 07:39:39


File name / Threat name / Threats count
C:\Documents and Settings\......\Local Settings\Temp\vfG14y.exe Infected: Trojan-Downloader.Win32.IstBar.pk 1
C:\Program Files\mIRC\mirc.exe Infected: not-a-virus:Client-IRC.Win32.mIRC.62 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\621[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\ac[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\ac[2].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\ac[3].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\ac[4].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\ac[5].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\ac[6].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\ac[7].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\CA67EBAH.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\CAPSSJD1.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\CAT48NPT.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\CAZIKF3D.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\evtv1_ads[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\keywords[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\1VROF7BS\sports_1[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\7C2M4TWK\1[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\7C2M4TWK\ac[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\7C2M4TWK\CA0HY7KP.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\7C2M4TWK\CA8H6NKH.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\7C2M4TWK\cb[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\7C2M4TWK\rd_p[2].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\10432451[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\6534867[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\ac[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\ac[2].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\ac[3].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\ac[4].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\ac[5].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\ac[6].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\ac[7].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\CA23Q361.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\dumb-quiz[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\globalPixel[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\jump1[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\jump1[2].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\keywords[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\keywords[2].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\Q3PWP1WH\keywords[3].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\ac[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\ac[2].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\ac[3].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\ac[4].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\ac[5].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\ac[6].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\ac[7].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\adServerESI[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\allaccess.maniatv[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\CA2NS39E.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\CADK4V5D.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\CAG5AJ81.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\CAPWSJH1.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\CAS5UV8H.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\CAW56R8L.htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\keywords[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\keywords[2].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\keywords[3].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\lp_splash[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\lp_splash[2].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\system-processes[1].htm Infected: Trojan-Downloader.JS.Agent.cnn 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\SCXSAMY2\system-processes[2].htm Infected: Trojan-Downloader.JS.Agent.cnn 1

The selected area was scanned.

Edited by rigel, 26 January 2009 - 11:11 PM.


#11 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:06:09 PM

Posted 14 September 2008 - 03:43 PM

Let's flush your system restore point.

Please Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok"
  • Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" Tab.
  • Click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
After that is completed, please update and rerun Malwarebytes and then post a new log.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#12 Me2007

Me2007
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:09 PM

Posted 14 September 2008 - 08:57 PM

Hi, here's the new log. Seems like it's all clean now. Thank you all! :thumbsup:

Malwarebytes' Anti-Malware 1.28
Database version: 1152
Windows 5.1.2600 Service Pack 2

9/14/2008 6:54:50 PM
mbam-log-2008-09-14 (18-54-50).txt

Scan type: Full Scan (C:\|)
Objects scanned: 287143
Time elapsed: 2 hour(s), 34 minute(s), 14 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#13 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:06:09 PM

Posted 14 September 2008 - 09:29 PM

The log looks great! How are things running now?

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#14 Me2007

Me2007
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:09 PM

Posted 14 September 2008 - 10:45 PM

Its running smooth now. Thank you...thank you!

#15 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:06:09 PM

Posted 15 September 2008 - 06:38 AM

If there are no more problems or signs of infection, you should again Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok"
  • Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" Tab.
  • Click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
I recommend you keep MBAM and SAS as part of your anti-malware toolkit. These are two of the more effective tools around these days.

For Tips to protect yourself against malware and reduce the potential for re-infection, be sure to read:
"Simple and easy ways to keep your computer safe".
"How did I get infected?, With steps so it does not happen again!".
"Best Practices - Internet Safety for 2008".
"Hardening Windows Security - Part 1 & Part 2".
"IE Recommended Minimal Security Settings" - "How to Secure Your Web Browser".

Avoid gaming sites, underground web pages, pirated software sites, and peer-to-peer (P2P) file sharing programs. They are a security risk which can make your computer susceptible to a smrgsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users. The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications. Read P2P Software User Advisories and Risks of File-Sharing Technology.

Safe surfing!

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users