Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Antispy Protector 2009 infection


  • This topic is locked This topic is locked
21 replies to this topic

#1 emi326

emi326

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:03:28 AM

Posted 20 August 2009 - 06:46 PM

Hoping I can get some help with this one - it seems to be blocking malware bytes Thanks in advance.

rootrepeal log:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/20 16:06
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF8460000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF8DA4000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF7DA8000 Size: 49152 File Visible: No Signed: -
Status: -

Name: win32k.sys:1
Image Path: C:\WINDOWS\win32k.sys:1
Address: 0xF8C08000 Size: 20480 File Visible: No Signed: -
Status: -

Name: win32k.sys:2
Image Path: C:\WINDOWS\win32k.sys:2
Address: 0xF89B8000 Size: 61440 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\WINDOWS\$hf_mig$\{29F8DDC1-9487-49b8-B27E-3E0C3C1298FF}
Status: Allocation size mismatch (API: 1, Raw: 0)

Path: C:\WINDOWS\system32\netlogon.dll
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\My Documents\My Pictures\Cruise 07 -08 Mammoth\Studio pictures\IMG_5352.jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\My Documents\My Pictures\Cruise 07 -08 Mammoth\Studio pictures\IMG_5305.jpg
Status: Locked to the Windows API!

Path: c:\documents and settings\administrator\local settings\application data\microsoft\cd burning\my pictures\2008_12_14\thumbs.db
Status: Allocation size mismatch (API: 16384, Raw: 8192)

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "PCTCore.sys" at address 0xf8766514

#: 047 Function Name: NtCreateProcess
Status: Hooked by "PCTCore.sys" at address 0xf8755282

#: 048 Function Name: NtCreateProcessEx
Status: Hooked by "PCTCore.sys" at address 0xf8755474

#: 063 Function Name: NtDeleteKey
Status: Hooked by "PCTCore.sys" at address 0xf8766d00

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "PCTCore.sys" at address 0xf8766fb8

#: 119 Function Name: NtOpenKey
Status: Hooked by "PCTCore.sys" at address 0xf87653fa

#: 192 Function Name: NtRenameKey
Status: Hooked by "PCTCore.sys" at address 0xf8767422

#: 247 Function Name: NtSetValueKey
Status: Hooked by "PCTCore.sys" at address 0xf87667d8

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "PCTCore.sys" at address 0xf8754f32

==EOF==



DDS Log:

DDS (Ver_09-07-30.01) - NTFSx86 MINIMAL
Run by Administrator at 16:34:39.18 on Thu 08/20/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.345 [GMT -7:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\WINDOWS\Explorer.EXE
C:\Documents and Settings\Administrator\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uInternet Settings,ProxyOverride = *.local
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Ask Search Assistant BHO: {0579b4b1-0293-4d73-b02d-5ebb0ba0f0a2} - c:\program files\asksbar\srchastt\1.bin\A2SRCHAS.DLL
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\tfswshx.dll
BHO: Gamevance Text: {7370f91f-6994-4595-9949-601fa2261c8d} - c:\program files\gamevance\gvtl.dll
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar1.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.1.1309.3572\swg.dll
BHO: MSN Toolbar Helper: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\program files\msn\toolbar\3.0.0988.2\msneshellx.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: Ask Toolbar BHO: {f0d4b231-da4b-4daf-81e4-dfee4931a4aa} - c:\program files\asksbar\bar\1.bin\ASKSBAR.DLL
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll
TB: Ask Toolbar: {f0d4b239-da4b-4daf-81e4-dfee4931a4aa} - c:\program files\asksbar\bar\1.bin\ASKSBAR.DLL
TB: MSN Toolbar: {1e61ed7c-7cb8-49d6-b9e9-ab4c880c8414} - c:\program files\msn\toolbar\3.0.0988.2\msneshellx.dll
TB: {604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - No File
uRun: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "c:\program files\common files\ahead\lib\NMBgMonitor.exe"
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [swg] c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [SmileboxTray] "c:\documents and settings\administrator\application data\smilebox\SmileboxTray.exe"
uRun: [Antispy Protector 2009] c:\documents and settings\administrator\application data\antispy protector 2009\asp2009.exe
mRun: [CTHelper] CTHELPER.EXE
mRun: [CTxfiHlp] CTXFIHLP.EXE
mRun: [McAfeeUpdaterUI] "c:\program files\network associates\common framework\UdaterUI.exe" /StartedFromRunKey
mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
mRun: [UpdateManager] "c:\program files\common files\sonic\update manager\sgtray.exe" /r
mRun: [ctfmon] c:\windows\system32\dlg\ctfmon.exe
mRun: [NeroFilterCheck] c:\program files\common files\ahead\lib\NeroCheck.exe
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [Google Desktop Search] "c:\program files\google\google desktop search\GoogleDesktop.exe" /startup
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [Gamevance] c:\program files\gamevance\gamevance32.exe
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRunOnce: [Malwarebytes' Anti-Malware] c:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silent
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\imagem~1.lnk - c:\program files\pixela\imagemixer 3 se for sd\CameraMonitor.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: adobe.com\www
Trusted Zone: java.com\www
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab
DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} - hxxp://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
DPF: {106E49CF-797A-11D2-81A2-00E02C015623} - hxxp://www.alternatiff.com/install-ie/alttiff.cab
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {26B2A5DA-BFD6-422F-A89A-28A54C74B12B} - hxxp://www.costcophotocenter.com/upload/activex/v3_0_0_4/PhotoCenter_ActiveX_Control.cab
DPF: {3DCEC959-378A-4922-AD7E-FD5C925D927F} - hxxp://disney.go.com/pirates/online/testActiveX/built/signed/DisneyOnlineGames.cab
DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} - hxxp://photo2.walgreens.com/WalgreensActivia.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1186421501984
DPF: {85BA505F-FD01-4A91-836C-F7D502E89C9A} - hxxp://www.evite.com/html/imageUpload/ImageUploader4.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0015-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} - hxxp://a532.g.akamai.net/f/532/6712/5m/virtools.download.akamai.com/6712/player/install/installer.exe
Notify: AtiExtEvent - Ati2evxx.dll
AppInit_DLLs: c:\progra~1\google\google~3\GOEC62~1.DLL

============= SERVICES / DRIVERS ===============

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [2009-8-20 130936]
S2 McAfeeFramework;McAfee Framework Service;c:\program files\network associates\common framework\FrameworkService.exe [2007-8-6 104000]
S3 GoogleDesktopManager-022208-143751;Google Desktop Manager 5.7.802.22438;c:\program files\google\google desktop search\GoogleDesktop.exe [2007-11-25 29744]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2008-3-25 348752]
S3 sdCoreService;PC Tools Security Service;c:\program files\spyware doctor\pctsSvc.exe [2008-3-25 1097096]

=============== Created Last 30 ================

2009-08-20 16:22 664 a------- c:\windows\system32\d3d9caps.dat
2009-08-20 15:48 38,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-08-20 15:48 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-08-20 15:48 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-08-20 15:15 <DIR> --d----- c:\docume~1\admini~1\applic~1\Malwarebytes
2009-08-20 15:14 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-08-20 14:56 159,600 a------- c:\windows\system32\drivers\pctgntdi.sys
2009-08-20 14:56 130,936 a------- c:\windows\system32\drivers\PCTCore.sys
2009-08-20 14:56 73,840 a------- c:\windows\system32\drivers\PCTAppEvent.sys
2009-08-20 14:56 <DIR> --d----- c:\program files\common files\PC Tools
2009-08-20 14:56 64,392 a------- c:\windows\system32\drivers\pctplsg.sys
2009-08-20 14:56 <DIR> --d----- c:\docume~1\alluse~1\applic~1\PC Tools
2009-08-12 12:49 <DIR> --d----- c:\docume~1\admini~1\applic~1\Antispy Protector 2009
2009-08-11 20:45 128,512 -c------ c:\windows\system32\dllcache\dhtmled.ocx
2009-08-11 20:43 1,315,328 -c------ c:\windows\system32\dllcache\msoe.dll
2009-08-09 19:58 <DIR> --d----- c:\program files\Smilebox
2009-08-09 19:57 <DIR> --d----- c:\docume~1\admini~1\applic~1\Smilebox
2009-08-05 02:01 204,800 -c------ c:\windows\system32\dllcache\mswebdvd.dll

==================== Find3M ====================

2009-08-05 02:01 204,800 a------- c:\windows\system32\mswebdvd.dll
2009-07-17 12:01 58,880 a------- c:\windows\system32\atl.dll
2009-07-12 12:21 233,472 a------- c:\windows\system32\wmpdxm.dll
2009-06-29 09:12 827,392 a------- c:\windows\system32\wininet.dll
2009-06-29 09:12 78,336 a------- c:\windows\system32\ieencode.dll
2009-06-29 09:12 17,408 -------- c:\windows\system32\corpol.dll
2009-06-16 07:36 119,808 a------- c:\windows\system32\t2embed.dll
2009-06-16 07:36 81,920 a------- c:\windows\system32\fontsub.dll
2009-06-12 05:31 80,896 a------- c:\windows\system32\tlntsess.exe
2009-06-12 05:31 76,288 a------- c:\windows\system32\telnet.exe
2009-06-10 09:19 2,066,432 a------- c:\windows\system32\mstscax.dll
2009-06-10 07:13 84,992 a------- c:\windows\system32\avifil32.dll
2009-06-09 23:14 132,096 a------- c:\windows\system32\wkssvc.dll
2009-06-03 12:09 1,291,264 a------- c:\windows\system32\quartz.dll

============= FINISH: 16:34:56.28 ===============


and DDS attach attached :-)

Attached Files



BC AdBot (Login to Remove)

 


#2 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:28 AM

Posted 20 August 2009 - 08:54 PM

Hi and welcome to the HijackThis Logs and Virus/Trojan/Spyware/Malware Removal forum,

I am Posted Image and I am here to help you!

I ask that you refrain from running tools other than those I suggest to you while I am cleaning up your computer. The reason for this is so I know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.

Please perform all steps in the order received and do not proceed if you need clarification.

In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond to your topic and facilitate the cleaning of your machine.

After 5 days if a topic is not replied to we assume it has been abandoned and it is closed.

As I am in the final stages of training an Expert Coach will also oversee your fix. Your benefit will be "four eyes and two brains" but responses may be somewhat delayed so please be patient!!!!

I would also like to inform you that most of us here at Bleeping Computer offer our expert assistance out of the goodness of our hearts. Please be courteous and appreciative for the assistance provided!

==========

In addition to the logs already posted please try to do this....

We need to create an OTL Report
  • Please download OTL from one of the following mirrors:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Under "Extra Registry" please check "Use Safelist" and also check "LOP Check" and "Purity Check" as pictured.Posted Image
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTListIt.txt <-- Will be opened
    • Extra.txt <-- Will be minimized
==========

Again I would like to remind you to make no further changes to your computer unless I direct you to do so. Your computer fix will be based on the current condition of your computer! Any changes might delay my ability to help you.


I will review your logs and post instructions forthcoming.
Regards,
~t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#3 emi326

emi326
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:03:28 AM

Posted 20 August 2009 - 11:24 PM

First off, thanks for taking time to look at the logs and reply. I use this resource frequently though this is the first time I have registered/posted. I downloaded OTL and ran it but after scanning for about 20 seconds the program simply closed. When I tried to open it again it created an error message reading, "windows can not access the specified drive, path or file. You may not have the appropriate permissions to access the item" I then tried running OTL from a flash drive but it closed before the scan completed again. I restarted in safe mode and retried the scan with the exact same results. This was similar to what happened when I tried running malware bytes (before my original post)

I am very appreciative of your attention.

EMI

#4 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:28 AM

Posted 21 August 2009 - 07:00 AM

Hi, :thumbup2:

Based on your particular infection I suspected that you would be unable to run that program. In fact you will likely be unable to run most any security program until we clean up the infection.

I have reviewed your DDS logs and proposed a fix for review by my expert coach. I will then post instructions for you to follow. Please minimize use of this computer if possible.

I would like to ask you to remain patient in the meantime and make no changes to the computer whatsoever unless I direct you to do so! Your fix is based on the current state of your computer and any changes could hamper the cleaning process.
Kind regards,
~t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#5 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:28 AM

Posted 21 August 2009 - 08:33 AM

Hi there,

You appear to be infected by a very new nasty Rootkit infection associated with a Rogue antivirus program. See here for more info.

==========

Let's begin.....

Download and run Win32kDiag:Next......


Download and run a batch file (peek.bat):
  • Download peek.bat from the download link below and save it to your Desktop.
  • Double-click peek.bat to run it.A black Command Prompt window will appear shortly: the program is running.
  • Once it is finished, copy and paste the entire contents of the Log.txt file it creates as a reply to this post.
==========

With your next post please provide:

* Win32kDiag.txt
* Log.txt

Kind regards,
~t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#6 emi326

emi326
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:03:28 AM

Posted 21 August 2009 - 10:19 AM

The above linked thread is where I first started with this issue and why I thought I needed to post for help rather than read other's solutions. For the record the affected machine can't get online so I am downloading everything on another machine and transferring it using a flash drive.

The requested logs are as follows:

win32:

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...



Found mount point : C:\WINDOWS\$hf_mig$\{29F8DDC1-9487-49b8-B27E-3E0C3C1298FF}

Mount point destination : \Device\__max++>\^

Cannot access: C:\WINDOWS\system32\netlogon.dll

[1] 2004-08-04 03:00:00 407040 C:\WINDOWS\$NtServicePackUninstall$\netlogon.dll (Microsoft Corporation)

[1] 2008-04-13 17:12:01 407040 C:\WINDOWS\ServicePackFiles\i386\netlogon.dll (Microsoft Corporation)

[1] 2008-04-13 17:12:01 60416 C:\WINDOWS\system32\netlogon.dll ()

[2] 2008-04-13 17:12:01 407040 C:\WINDOWS\system32\ntelogon.dll (Microsoft Corporation)





Finished!



peek.bat:

Volume in drive C has no label.
Volume Serial Number is 081E-8A69

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/04/2004 03:00 AM 180,224 scecli.dll

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/04/2004 03:00 AM 407,040 netlogon.dll

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/04/2004 03:00 AM 55,808 eventlog.dll
3 File(s) 643,072 bytes

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 05:12 PM 181,248 scecli.dll

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 05:12 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 05:11 PM 56,320 eventlog.dll
3 File(s) 644,608 bytes

Directory of C:\WINDOWS\system32

04/13/2008 05:12 PM 181,248 scecli.dll

Directory of C:\WINDOWS\system32

04/13/2008 05:12 PM 60,416 netlogon.dll

Directory of C:\WINDOWS\system32

04/13/2008 05:11 PM 56,320 eventlog.dll
3 File(s) 297,984 bytes

Total Files Listed:
9 File(s) 1,585,664 bytes
0 Dir(s) 116,513,341,440 bytes free



This is a nasty bugger, thanks for your help.

EMI

#7 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:28 AM

Posted 21 August 2009 - 02:05 PM

Well done. :thumbup2:
This is indeed a nasty Rootkit!

We will need to take this cleanup in phases. You are not clean until I tell you so - even if it appears that everything is running fine!

Let's begin....

==========

Step 1

Please save this file to your desktop. Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please open it with notepad and post the contents here.
"%userprofile%\desktop\win32kdiag.exe" -f -r

==========

Step 2

Please do this:
  • Click on the Start button, then click on Run...
  • In the empty "Open:" box provided, type cmd and press Enter
    • This will launch a Command Prompt window (looks like DOS).
  • Copy the entire blue text below to the clipboard by highlighting all of it and pressing Ctrl+C (or after highlighting, right-click and select Copy).
    copy C:\WINDOWS\ServicePackFiles\i386\netlogon.dll C:\ /y
  • In the Command Prompt window, paste the copied text by right-clicking and selecting Paste.
  • Press Enter.When successfully, you should get this message within the Command Prompt: "1 file(s) copied"
    NOTE: If you didn't get this message, stop and tell me first. Executing The Avenger script (step #3) won't work if the file copy was not successful.
  • Exit the Command Prompt window.
==========

Step 3

:) Warning to others reading this thread!: The Avenger is a VERY POWERFUL program, and can easily be misused.
Certain misuses of this program can prevent your system from ever starting again.
For this reason, it is strongly recommended to use The Avenger only as directed and under qualified supervision.
We can accept no responsibility for damage caused by misuse of the program.
:)
  • Download The Avenger by Swandog46 from here.
  • Unzip/extract it to a folder on your desktop.
  • Double click on avenger.exe to run The Avenger.
  • Click OK.
  • Make sure that the box next to Scan for rootkits has a tick in it and that the box next to Automatically disable any rootkits found does not have a tick in it.
  • Copy all of the text in the below code box to the clipboard by highlighting it and then pressing Ctrl+C.
    Files to move:C:\netlogon.dll | C:\WINDOWS\system32\netlogon.dll
  • In the avenger window, click the Paste Script from Clipboard, Posted Image button.
  • Click the Execute button.
  • You will be asked Are you sure you want to execute the current script?.
  • Click Yes.
  • You will now be asked First step completed --- The Avenger has been successfully set up to run on next boot. Reboot now?.
  • Click Yes.
  • Your PC will now be rebooted.
  • Note: If the above script contains Drivers to delete: or Drivers to disable:, then The Avenger will require two reboots to complete its operation.
  • After your PC has completed the necessary reboots, a log should automatically open. If it does not automatically open, then the log can be found at %systemdrive%\avenger.txt (typically C:\avenger.txt).
  • Please post this log in your next reply.
==========

With your next post please provide:

* Win32kDiag.txt
* Avenger.txt

Kind Regards,
~t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#8 emi326

emi326
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:03:28 AM

Posted 21 August 2009 - 04:38 PM

steps completed - After the avenger reboot "antispy protector" restarted immediately. ***I restarted a second time manually and it appears to have disabled the rogue. *** (2nd edit) oops - no such luck, its still popping up.

Logs as follows -


Win32:

Removing all found mount points.

Attempting to reset file permissions.

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...



Cannot access: C:\WINDOWS\system32\netlogon.dll

Attempting to restore permissions of : C:\WINDOWS\system32\netlogon.dll

[1] 2004-08-04 03:00:00 407040 C:\WINDOWS\$NtServicePackUninstall$\netlogon.dll (Microsoft Corporation)

[1] 2008-04-13 17:12:01 407040 C:\WINDOWS\ServicePackFiles\i386\netlogon.dll (Microsoft Corporation)

[1] 2008-04-13 17:12:01 60416 C:\WINDOWS\system32\netlogon.dll ()

[2] 2008-04-13 17:12:01 407040 C:\WINDOWS\system32\ntelogon.dll (Microsoft Corporation)





Finished!




Avenger:

Logfile of The Avenger Version 2.0, © by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

File move operation "C:\netlogon.dll|C:\WINDOWS\system32\netlogon.dll" completed successfully.

Completed script processing.

*******************

Finished! Terminate.

Edited by emi326, 21 August 2009 - 04:46 PM.


#9 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:28 AM

Posted 21 August 2009 - 11:18 PM

Hi there,
I have not forgotten about you. No worries. The 1st part of the cleanup went well. :thumbup2:

We disabled the complex Rootkit. The Rootkit is what prevents our security applications from running. Now that we have successfully completed that crucial step we can begin cleanup.

My coach is going to be gone until Sunday so please do not use or make any changes to your infected computer until I post your next steps. Thank you for being patient!

Kind regards,
~t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#10 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:28 AM

Posted 23 August 2009 - 08:12 AM

Hi there,
Thanks for you patience. :thumbup2:

Don't worry. All we have done so far is disable the Rootkit that disables our ability to clean the Rogue Antivirus Program. Now it is time to bring in the big guns!

Please do this...

Download the tools needed to a flash drive or other removable media, and transfer them to the infected computer.

***************************************************

Download ComboFix from one of these locations:

Link 1
Link 2

**Note: It is important that it is saved directly to your desktop**

--------------------------------------------------------------------

With malware infections being as they are today, it's strongly recommended to have the Windows Recovery Console pre-installed on your machine before doing any malware removal.

The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.


Go to Microsoft's website => http://support.microsoft.com/kb/310994

Select the download that's appropriate for your Operating System

Posted Image


Download the file & save it as it's originally named.


---------------------------------------------------------------------

Transfer all files you just downloaded, to the desktop of the infected computer.

--------------------------------------------------------------------


Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools!! Very important!

Posted Image
  • Drag the setup package onto ComboFix.exe and drop it.

  • Follow the prompts to start ComboFix and when prompted, agree to the End-User License Agreement to install the Microsoft Recovery Console.


    Posted Image


  • At the next prompt, click 'Yes' to run the full ComboFix scan.

  • When the tool is finished, it will produce a report for you.
Please post the C:\ComboFix.txt in your next reply.

==========

Please rerun RootRepeal and post another log.

==========

With your next post please provide:

* Combofix.txt
* RootRepeal log
* How is your computer running now?
* Do you have an internet connection yet?

Kind regards,
~t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#11 emi326

emi326
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:03:28 AM

Posted 23 August 2009 - 11:28 AM

after following the Sunday instructions and upon restart antispy protector 2009 started right up :-( The desktop wallpaper changed for some reason but I am able to access web pages now.

Logs as follows -

combofix:

ComboFix 09-08-22.06 - Administrator 08/23/2009 9:02.1.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.192 [GMT -7:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\program files\gamevance\gamevancelib32.dll
c:\program files\Gamevance\gvtl.dll
c:\windows\Installer\18f5a.msi

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_{79007602-0CDB-4405-9DBF-1257BB3226ED}
-------\Legacy_{79007602-0CDB-4405-9DBF-1257BB3226EE}


((((((((((((((((((((((((( Files Created from 2009-07-23 to 2009-08-23 )))))))))))))))))))))))))))))))
.

2009-08-22 21:06 . 2008-04-13 18:40 43904 -c--a-w- c:\windows\system32\dllcache\sbp2port.sys
2009-08-22 21:06 . 2008-04-13 18:40 43904 ----a-w- c:\windows\system32\drivers\sbp2port.sys
2009-08-21 00:00 . 2009-08-21 00:00 -------- dc----w- c:\documents and settings\All Users\Application Data\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}
2009-08-20 23:58 . 2009-08-20 23:58 -------- d-----w- c:\program files\Trend Micro
2009-08-20 23:22 . 2009-08-21 04:36 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-08-20 22:48 . 2009-08-03 20:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-08-20 22:48 . 2009-08-21 00:13 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-08-20 22:48 . 2009-08-03 20:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-08-20 22:15 . 2009-08-20 22:15 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2009-08-20 22:14 . 2009-08-20 22:14 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-08-20 21:56 . 2008-12-11 15:38 159600 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2009-08-20 21:56 . 2009-04-03 17:18 130936 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2009-08-20 21:56 . 2008-12-18 18:16 73840 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2009-08-20 21:56 . 2009-08-20 21:56 -------- d-----w- c:\program files\Common Files\PC Tools
2009-08-20 21:56 . 2008-12-10 18:36 64392 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2009-08-20 21:56 . 2009-08-20 21:56 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Tools
2009-08-12 19:49 . 2009-08-16 07:00 -------- d-----w- c:\documents and settings\Administrator\Application Data\Antispy Protector 2009
2009-08-12 19:49 . 2009-08-12 19:49 1147904 ----a-w- c:\documents and settings\Administrator\Application Data\Antispy Protector 2009\asp2009.exe
2009-08-12 03:43 . 2009-07-10 13:27 1315328 -c----w- c:\windows\system32\dllcache\msoe.dll
2009-08-10 02:58 . 2009-08-10 03:00 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Smilebox
2009-08-10 02:58 . 2009-08-10 02:58 -------- d-----w- c:\program files\Smilebox
2009-08-10 02:57 . 2009-08-12 20:56 -------- d-----w- c:\documents and settings\Administrator\Application Data\Smilebox
2009-08-10 02:57 . 2009-08-10 02:57 57943 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\uninstall.exe
2009-08-09 16:52 . 2009-08-09 16:52 152576 ----a-w- c:\documents and settings\Administrator\Application Data\Sun\Java\jre1.6.0_15\lzma.dll
2009-08-05 09:01 . 2009-08-05 09:01 204800 -c----w- c:\windows\system32\dllcache\mswebdvd.dll
2009-07-31 21:17 . 2009-07-31 21:17 266888 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxTray.exe
2009-07-31 21:17 . 2009-07-31 21:17 205448 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxDvd.exe
2009-07-31 21:10 . 2009-07-31 21:10 1573512 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxClient.exe
2009-07-31 21:10 . 2009-07-31 21:17 373384 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxStarter.exe
2009-07-31 20:41 . 2009-07-31 20:41 340616 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxDvdEngine.dll
2009-07-31 20:41 . 2009-07-31 20:41 123528 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxUpdater.exe
2009-07-31 20:41 . 2009-07-31 21:17 168584 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxBrowserEngine.dll
2009-07-30 03:49 . 2009-07-30 03:49 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\PhotoChannel

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-08-23 16:07 . 2008-09-06 01:53 -------- d-----w- c:\program files\Gamevance
2009-08-22 21:06 . 2007-11-17 01:45 -------- d-----w- c:\documents and settings\All Users\Application Data\Google Updater
2009-08-20 22:52 . 2007-10-27 00:32 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-08-20 22:14 . 2007-11-25 17:22 -------- d-----w- c:\program files\Spyware Doctor
2009-08-08 15:50 . 2008-12-12 03:24 -------- d-----w- c:\documents and settings\Administrator\Application Data\CameraWindowDC
2009-08-05 09:01 . 2004-08-04 10:00 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-07-31 22:01 . 2008-01-04 23:02 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-07-30 22:22 . 2009-05-14 02:26 -------- d-----w- c:\program files\IKEA HomePlanner
2009-07-30 22:21 . 2008-10-14 21:30 -------- d-----w- c:\program files\CardRecovery
2009-07-30 03:19 . 2009-04-25 04:21 -------- d-----w- c:\documents and settings\Administrator\Application Data\Costco Photo Organizer
2009-07-17 22:01 . 2009-07-17 22:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2009-07-17 22:01 . 2007-11-25 17:19 -------- d-----w- c:\program files\Norton Security Scan
2009-07-17 22:01 . 2009-07-17 22:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2009-07-17 22:01 . 2009-07-17 22:01 -------- d-----w- c:\program files\NortonInstaller
2009-07-17 22:01 . 2009-07-17 22:01 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-07-17 19:01 . 2004-08-04 10:00 58880 ----a-w- c:\windows\system32\atl.dll
2009-07-12 19:21 . 2004-08-04 10:00 233472 ----a-w- c:\windows\system32\wmpdxm.dll
2009-07-07 22:46 . 2009-07-07 22:46 152576 ----a-w- c:\documents and settings\Administrator\Application Data\Sun\Java\jre1.6.0_14\lzma.dll
2009-06-29 16:12 . 2006-03-04 03:33 827392 ----a-w- c:\windows\system32\wininet.dll
2009-06-29 16:12 . 2004-08-04 10:00 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-06-29 16:12 . 2004-08-04 10:00 17408 ------w- c:\windows\system32\corpol.dll
2009-06-16 14:36 . 2004-08-04 10:00 81920 ----a-w- c:\windows\system32\fontsub.dll
2009-06-16 14:36 . 2004-08-04 10:00 119808 ----a-w- c:\windows\system32\t2embed.dll
2009-06-12 12:31 . 2004-08-04 10:00 80896 ----a-w- c:\windows\system32\tlntsess.exe
2009-06-12 12:31 . 2004-08-04 10:00 76288 ----a-w- c:\windows\system32\telnet.exe
2009-06-10 16:19 . 2007-08-03 19:28 2066432 ----a-w- c:\windows\system32\mstscax.dll
2009-06-10 14:13 . 2004-08-04 10:00 84992 ----a-w- c:\windows\system32\avifil32.dll
2009-06-10 06:14 . 2004-08-04 10:00 132096 ----a-w- c:\windows\system32\wkssvc.dll
2009-06-06 18:18 . 2009-04-07 16:52 152576 ----a-w- c:\documents and settings\Administrator\Application Data\Sun\Java\jre1.6.0_13\lzma.dll
2009-06-03 19:09 . 2004-08-04 10:00 1291264 ----a-w- c:\windows\system32\quartz.dll
2008-04-26 14:52 . 2008-04-26 14:52 122880 ----a-w- c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
2008-02-08 04:46 . 2008-02-08 04:46 13624 ----a-w- c:\program files\mozilla firefox\plugins\cgpcfg.dll
2008-02-08 04:46 . 2008-02-08 04:46 87360 ----a-w- c:\program files\mozilla firefox\plugins\CgpCore.dll
2008-02-08 04:46 . 2008-02-08 04:46 91448 ----a-w- c:\program files\mozilla firefox\plugins\confmgr.dll
2008-02-08 04:46 . 2008-02-08 04:46 21824 ----a-w- c:\program files\mozilla firefox\plugins\ctxlogging.dll
2008-02-08 04:46 . 2008-02-08 04:46 206136 ----a-w- c:\program files\mozilla firefox\plugins\ctxmui.dll
2008-02-08 04:46 . 2008-02-08 04:46 31544 ----a-w- c:\program files\mozilla firefox\plugins\icafile.dll
2008-02-08 04:46 . 2008-02-08 04:46 40248 ----a-w- c:\program files\mozilla firefox\plugins\icalogon.dll
2007-03-17 00:27 . 2007-03-17 00:27 479232 ----a-w- c:\program files\mozilla firefox\plugins\msvcm80.dll
2007-03-17 00:27 . 2007-03-17 00:27 548864 ----a-w- c:\program files\mozilla firefox\plugins\msvcp80.dll
2007-03-17 00:27 . 2007-03-17 00:27 626688 ----a-w- c:\program files\mozilla firefox\plugins\msvcr80.dll
2007-07-20 19:47 . 2007-07-20 19:47 981170 ----a-w- c:\program files\mozilla firefox\plugins\sslsdk_b.dll
2008-02-08 04:46 . 2008-02-08 04:46 24384 ----a-w- c:\program files\mozilla firefox\plugins\TcpPServ.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{0579B4B1-0293-4d73-B02D-5EBB0BA0F0A2}]
2008-05-15 23:27 66912 ----a-w- c:\program files\AskSBar\SrchAstt\1.bin\A2SRCHAS.DLL

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="c:\program files\Common Files\Ahead\Lib\NMBgMonitor.exe" [2006-10-09 139264]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-11-17 68856]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-14 1695232]
"SmileboxTray"="c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxTray.exe" [2009-07-31 266888]
"Antispy Protector 2009"="c:\documents and settings\Administrator\Application Data\Antispy Protector 2009\asp2009.exe" [2009-08-12 1147904]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"McAfeeUpdaterUI"="c:\program files\Network Associates\Common Framework\UdaterUI.exe" [2007-03-27 136768]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [2004-08-13 122939]
"UpdateManager"="c:\program files\Common Files\Sonic\Update Manager\sgtray.exe" [2004-01-07 110592]
"NeroFilterCheck"="c:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2006-01-12 155648]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2007-05-08 54840]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-04-26 29744]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-09-06 413696]
"Gamevance"="c:\program files\Gamevance\gamevance32.exe" [2008-09-06 91648]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-21 136600]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
"CTHelper"="CTHELPER.EXE" - c:\windows\CTHELPER.EXE [2006-08-11 17920]
"CTxfiHlp"="CTXFIHLP.EXE" - c:\windows\system32\CTXFIHLP.EXE [2006-08-11 18944]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2005-5-11 282624]
ImageMixer 3 SE Camera Monitor for SD.lnk - c:\program files\PIXELA\ImageMixer 3 SE for SD\CameraMonitor.exe [2009-4-25 253952]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\rootrepeal.sys]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdauxservice]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdcoreservice]
@=""

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Network Associates\\Common Framework\\FrameworkService.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [8/20/2009 2:56 PM 130936]
S3 GoogleDesktopManager-022208-143751;Google Desktop Manager 5.7.802.22438;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [11/25/2007 10:17 AM 29744]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\Spyware Doctor\pctsAuxs.exe [3/25/2008 9:26 AM 348752]
.
Contents of the 'Scheduled Tasks' folder

2009-08-16 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 19:34]

2009-08-23 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-11-17 21:22]

2009-07-09 c:\windows\Tasks\Norton PC Checkup WeekDay Scanner.job
- c:\program files\norton pc checkup\PC_Checkup.exe [2008-06-29 19:57]

2009-08-16 c:\windows\Tasks\Norton PC Checkup Weekend Scanner.job
- c:\program files\norton pc checkup\PC_Checkup.exe [2008-06-29 19:57]

2009-07-31 c:\windows\Tasks\Norton Security Scan for Administrator.job
- c:\program files\Norton Security Scan\Norton Security Scan\Engine\2.3.0.44\Nss.exe [2009-07-17 22:01]
.
- - - - ORPHANS REMOVED - - - -

WebBrowser-{604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - (no file)


.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Settings,ProxyOverride = *.local
Trusted Zone: adobe.com\www
Trusted Zone: java.com\www
DPF: {26B2A5DA-BFD6-422F-A89A-28A54C74B12B} - hxxp://www.costcophotocenter.com/upload/activex/v3_0_0_4/PhotoCenter_ActiveX_Control.cab
DPF: {85BA505F-FD01-4A91-836C-F7D502E89C9A} - hxxp://www.evite.com/html/imageUpload/ImageUploader4.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-08-23 09:10
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Gamevance = c:\program files\Gamevance\gamevance32.exe?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(704)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(3496)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\ati2evxx.exe
c:\windows\system32\ati2evxx.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Network Associates\Common Framework\FrameworkService.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\program files\Network Associates\Common Framework\naPrdMgr.exe
c:\windows\system32\wdfmgr.exe
c:\program files\Canon\CAL\CALMAIN.exe
c:\windows\system32\wscntfy.exe
c:\program files\Network Associates\Common Framework\Mctray.exe
c:\program files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
c:\program files\HP\Digital Imaging\bin\hpqste08.exe
.
**************************************************************************
.
Completion time: 2009-08-23 9:14 - machine was rebooted
ComboFix-quarantined-files.txt 2009-08-23 16:14

Pre-Run: 117,353,205,760 bytes free
Post-Run: 119,198,830,592 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

234 --- E O F --- 2009-08-12 04:18








Rootrepeal:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/23 09:16
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: catchme.sys
Image Path: C:\ComboFix\catchme.sys
Address: 0xF8C07000 Size: 31744 File Visible: No Signed: -
Status: -

Name: Combo-Fix.sys
Image Path: Combo-Fix.sys
Address: 0xF8907000 Size: 60416 File Visible: No Signed: -
Status: -

Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xEE244000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF8DCF000 Size: 8192 File Visible: No Signed: -
Status: -

Name: PROCEXP90.SYS
Image Path: C:\WINDOWS\system32\Drivers\PROCEXP90.SYS
Address: 0xF8E43000 Size: 6464 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF8AC7000 Size: 49152 File Visible: No Signed: -
Status: -

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "PCTCore.sys" at address 0xf8775514

#: 047 Function Name: NtCreateProcess
Status: Hooked by "PCTCore.sys" at address 0xf8764282

#: 048 Function Name: NtCreateProcessEx
Status: Hooked by "PCTCore.sys" at address 0xf8764474

#: 063 Function Name: NtDeleteKey
Status: Hooked by "PCTCore.sys" at address 0xf8775d00

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "PCTCore.sys" at address 0xf8775fb8

#: 119 Function Name: NtOpenKey
Status: Hooked by "PCTCore.sys" at address 0xf87743fa

#: 192 Function Name: NtRenameKey
Status: Hooked by "PCTCore.sys" at address 0xf8776422

#: 247 Function Name: NtSetValueKey
Status: Hooked by "PCTCore.sys" at address 0xf87757d8

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "PCTCore.sys" at address 0xf8763f32

==EOF==

#12 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:28 AM

Posted 24 August 2009 - 08:07 AM

Well done. :thumbup2:
Your getting there.
Lets proceed.

==========

Did you have any McAfee product(s) installed in the past?

==========

Please note....

:) P2P Warning :)

Your log indicates that you have Limewire installed.

Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs.

- They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites.

- Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users.

- The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications. Read P2P Software User Advisories and Risks of File-Sharing Technology.

Note: It is pretty much certain that if you continue to use P2P programs, then you will get infected again.
I would recommend that you uninstall Limewire, however that choice is up to you. If you choose to remove these programs, you can do so via Control Panel>> Add / Remove Programs.

If you wish to keep it, please do not use it until your computer is cleaned.

==========

Most computer experts agree that the Ask Toolbar and Gamevance are considered Adware and should be removed.

Go to Start > Control Panel > Add or Remove Programs.

Remove the following program(s), if still present.
  • Ask Toolbar
  • Gamevance
If you are unsure of how to use Add or Remove Programs, the please see this tutorial:
How To Remove An Installed Program From Your Computer

==========

:cool: Warning: This script was specifically written and designed for this user only. Unsupervised use of this tool could render your computer unbootable permanently!! :)

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

File::
c:\windows\system32\dlg\ctfmon.exe

Folder::
c:\documents and settings\Administrator\Application Data\Antispy Protector 2009
c:\program files\Gamevance
c:\program files\AskSBar

Registry::
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{0579B4B1-0293-4d73-B02D-5EBB0BA0F0A2}]
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Antispy Protector 2009"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Gamevance"=-
"ctfmon"=-

DirLook::
c:\documents and settings\All Users\Application Data\TEMP


Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

==========

I don't see an Anti Virus Program running on your machine
  • Download and install an antivirus program, and make sure that you keep it updated


    New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software.

    Two good antivirus programs free for non-commercial home use are Avast! and Antivir
    Note: You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.
Please download, install and run the program now. Copy and paste the logfile results in your next post.

==========

With your next post please provide:

* Answer to question about McAfee
* Combofix.txt
* Newly installed Antivirus Log
* How is your computer running now?

Kind regards,
~t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#13 emi326

emi326
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:03:28 AM

Posted 24 August 2009 - 12:19 PM

Hi t,

Things seem to be looking good at this point. I am currently scanning with AVG internet security so I won't have log for that in this reply but will post it when complete. McAfee was installed but no longer seems to be. On start up the icon was appearing in the system tray but when moused over it disappeared leaving the windows security icon instead.

The combofix log:

ComboFix 09-08-22.06 - Administrator 08/24/2009 9:10.2.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.297 [GMT -7:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\CFScript.txt

FILE ::
"c:\windows\system32\dlg\ctfmon.exe"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Administrator\Application Data\Antispy Protector 2009
c:\documents and settings\Administrator\Application Data\Antispy Protector 2009\asp2009.exe
c:\documents and settings\Administrator\Application Data\Antispy Protector 2009\threats\update.dat
c:\program files\AskSBar
c:\program files\AskSBar\bar\1.bin\A2FFXTBR.JAR
c:\program files\AskSBar\bar\1.bin\A2FFXTBR.MANIFEST
c:\program files\AskSBar\bar\1.bin\A2HIGHIN.EXE
c:\program files\AskSBar\bar\1.bin\A2NTSTBR.JAR
c:\program files\AskSBar\bar\1.bin\A2NTSTBR.MANIFEST
c:\program files\AskSBar\bar\1.bin\A2PLUGIN.DLL
c:\program files\AskSBar\bar\1.bin\ASKSBAR.DLL
c:\program files\AskSBar\bar\1.bin\NPASKSBR.DLL
c:\program files\AskSBar\bar\Cache\00049883
c:\program files\AskSBar\bar\Cache\0004BC86
c:\program files\AskSBar\bar\Cache\0004CD9D.bin
c:\program files\AskSBar\bar\Cache\0004D26F.bin
c:\program files\AskSBar\bar\Cache\0004D54E.bin
c:\program files\AskSBar\bar\Cache\0004D7ED.bin
c:\program files\AskSBar\bar\Cache\0004DAAD.bin
c:\program files\AskSBar\bar\Cache\0004DEC3.bin
c:\program files\AskSBar\bar\Cache\files.ini
c:\program files\AskSBar\bar\History\search2
c:\program files\AskSBar\bar\Settings\prevcfg2.htm
c:\program files\AskSBar\SrchAstt\1.bin\A2SRCHAS.DLL
c:\program files\Gamevance
c:\program files\Gamevance\ars.cfg
c:\program files\Gamevance\gamevance32.exe
c:\program files\Gamevance\gvun.exe
c:\program files\Gamevance\icon.ico

.
((((((((((((((((((((((((( Files Created from 2009-07-24 to 2009-08-24 )))))))))))))))))))))))))))))))
.

2009-08-24 15:35 . 2009-08-24 15:35 -------- d-----w- c:\windows\LastGood
2009-08-22 21:06 . 2008-04-13 18:40 43904 -c--a-w- c:\windows\system32\dllcache\sbp2port.sys
2009-08-22 21:06 . 2008-04-13 18:40 43904 ----a-w- c:\windows\system32\drivers\sbp2port.sys
2009-08-21 00:00 . 2009-08-21 00:00 -------- dc----w- c:\documents and settings\All Users\Application Data\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}
2009-08-20 23:58 . 2009-08-20 23:58 -------- d-----w- c:\program files\Trend Micro
2009-08-20 23:22 . 2009-08-21 04:36 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-08-20 22:48 . 2009-08-03 20:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-08-20 22:48 . 2009-08-21 00:13 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-08-20 22:48 . 2009-08-03 20:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-08-20 22:15 . 2009-08-20 22:15 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2009-08-20 22:14 . 2009-08-20 22:14 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-08-20 21:56 . 2008-12-11 15:38 159600 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2009-08-20 21:56 . 2009-04-03 17:18 130936 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2009-08-20 21:56 . 2008-12-18 18:16 73840 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2009-08-20 21:56 . 2009-08-20 21:56 -------- d-----w- c:\program files\Common Files\PC Tools
2009-08-20 21:56 . 2008-12-10 18:36 64392 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2009-08-20 21:56 . 2009-08-20 21:56 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Tools
2009-08-12 03:43 . 2009-07-10 13:27 1315328 -c----w- c:\windows\system32\dllcache\msoe.dll
2009-08-10 02:58 . 2009-08-10 03:00 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Smilebox
2009-08-10 02:58 . 2009-08-10 02:58 -------- d-----w- c:\program files\Smilebox
2009-08-10 02:57 . 2009-08-12 20:56 -------- d-----w- c:\documents and settings\Administrator\Application Data\Smilebox
2009-08-10 02:57 . 2009-08-10 02:57 57943 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\uninstall.exe
2009-08-09 16:52 . 2009-08-09 16:52 152576 ----a-w- c:\documents and settings\Administrator\Application Data\Sun\Java\jre1.6.0_15\lzma.dll
2009-08-05 09:01 . 2009-08-05 09:01 204800 -c----w- c:\windows\system32\dllcache\mswebdvd.dll
2009-07-31 21:17 . 2009-07-31 21:17 266888 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxTray.exe
2009-07-31 21:17 . 2009-07-31 21:17 205448 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxDvd.exe
2009-07-31 21:10 . 2009-07-31 21:10 1573512 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxClient.exe
2009-07-31 21:10 . 2009-07-31 21:17 373384 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxStarter.exe
2009-07-31 20:41 . 2009-07-31 20:41 340616 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxDvdEngine.dll
2009-07-31 20:41 . 2009-07-31 20:41 123528 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxUpdater.exe
2009-07-31 20:41 . 2009-07-31 21:17 168584 ----a-w- c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxBrowserEngine.dll
2009-07-30 03:49 . 2009-07-30 03:49 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\PhotoChannel

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-08-24 15:34 . 2007-11-17 01:45 -------- d-----w- c:\documents and settings\All Users\Application Data\Google Updater
2009-08-20 22:52 . 2007-10-27 00:32 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-08-20 22:14 . 2007-11-25 17:22 -------- d-----w- c:\program files\Spyware Doctor
2009-08-08 15:50 . 2008-12-12 03:24 -------- d-----w- c:\documents and settings\Administrator\Application Data\CameraWindowDC
2009-08-05 09:01 . 2004-08-04 10:00 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-07-31 22:01 . 2008-01-04 23:02 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-07-30 22:22 . 2009-05-14 02:26 -------- d-----w- c:\program files\IKEA HomePlanner
2009-07-30 22:21 . 2008-10-14 21:30 -------- d-----w- c:\program files\CardRecovery
2009-07-30 03:19 . 2009-04-25 04:21 -------- d-----w- c:\documents and settings\Administrator\Application Data\Costco Photo Organizer
2009-07-17 22:01 . 2009-07-17 22:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2009-07-17 22:01 . 2007-11-25 17:19 -------- d-----w- c:\program files\Norton Security Scan
2009-07-17 22:01 . 2009-07-17 22:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2009-07-17 22:01 . 2009-07-17 22:01 -------- d-----w- c:\program files\NortonInstaller
2009-07-17 22:01 . 2009-07-17 22:01 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-07-17 19:01 . 2004-08-04 10:00 58880 ----a-w- c:\windows\system32\atl.dll
2009-07-12 19:21 . 2004-08-04 10:00 233472 ----a-w- c:\windows\system32\wmpdxm.dll
2009-07-07 22:46 . 2009-07-07 22:46 152576 ----a-w- c:\documents and settings\Administrator\Application Data\Sun\Java\jre1.6.0_14\lzma.dll
2009-06-29 16:12 . 2006-03-04 03:33 827392 ------w- c:\windows\system32\wininet.dll
2009-06-29 16:12 . 2004-08-04 10:00 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-06-29 16:12 . 2004-08-04 10:00 17408 ------w- c:\windows\system32\corpol.dll
2009-06-16 14:36 . 2004-08-04 10:00 81920 ----a-w- c:\windows\system32\fontsub.dll
2009-06-16 14:36 . 2004-08-04 10:00 119808 ----a-w- c:\windows\system32\t2embed.dll
2009-06-12 12:31 . 2004-08-04 10:00 80896 ----a-w- c:\windows\system32\tlntsess.exe
2009-06-12 12:31 . 2004-08-04 10:00 76288 ----a-w- c:\windows\system32\telnet.exe
2009-06-10 16:19 . 2007-08-03 19:28 2066432 ----a-w- c:\windows\system32\mstscax.dll
2009-06-10 14:13 . 2004-08-04 10:00 84992 ----a-w- c:\windows\system32\avifil32.dll
2009-06-10 06:14 . 2004-08-04 10:00 132096 ----a-w- c:\windows\system32\wkssvc.dll
2009-06-06 18:18 . 2009-04-07 16:52 152576 ----a-w- c:\documents and settings\Administrator\Application Data\Sun\Java\jre1.6.0_13\lzma.dll
2009-06-03 19:09 . 2004-08-04 10:00 1291264 ----a-w- c:\windows\system32\quartz.dll
2008-04-26 14:52 . 2008-04-26 14:52 122880 ----a-w- c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll
2008-02-08 04:46 . 2008-02-08 04:46 13624 ----a-w- c:\program files\mozilla firefox\plugins\cgpcfg.dll
2008-02-08 04:46 . 2008-02-08 04:46 87360 ----a-w- c:\program files\mozilla firefox\plugins\CgpCore.dll
2008-02-08 04:46 . 2008-02-08 04:46 91448 ----a-w- c:\program files\mozilla firefox\plugins\confmgr.dll
2008-02-08 04:46 . 2008-02-08 04:46 21824 ----a-w- c:\program files\mozilla firefox\plugins\ctxlogging.dll
2008-02-08 04:46 . 2008-02-08 04:46 206136 ----a-w- c:\program files\mozilla firefox\plugins\ctxmui.dll
2008-02-08 04:46 . 2008-02-08 04:46 31544 ----a-w- c:\program files\mozilla firefox\plugins\icafile.dll
2008-02-08 04:46 . 2008-02-08 04:46 40248 ----a-w- c:\program files\mozilla firefox\plugins\icalogon.dll
2007-03-17 00:27 . 2007-03-17 00:27 479232 ----a-w- c:\program files\mozilla firefox\plugins\msvcm80.dll
2007-03-17 00:27 . 2007-03-17 00:27 548864 ----a-w- c:\program files\mozilla firefox\plugins\msvcp80.dll
2007-03-17 00:27 . 2007-03-17 00:27 626688 ----a-w- c:\program files\mozilla firefox\plugins\msvcr80.dll
2007-07-20 19:47 . 2007-07-20 19:47 981170 ----a-w- c:\program files\mozilla firefox\plugins\sslsdk_b.dll
2008-02-08 04:46 . 2008-02-08 04:46 24384 ----a-w- c:\program files\mozilla firefox\plugins\TcpPServ.dll
.

(((((((((((((((((((((((((((((((((((((((((((( Look )))))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
---- Directory of c:\documents and settings\All Users\Application Data\TEMP ----



((((((((((((((((((((((((((((( SnapShot@2009-08-23_16.10.30 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-08-24 15:34 . 2009-08-24 15:34 16384 c:\windows\Temp\Perflib_Perfdata_66c.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="c:\program files\Common Files\Ahead\Lib\NMBgMonitor.exe" [2006-10-09 139264]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-11-17 68856]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-14 1695232]
"SmileboxTray"="c:\documents and settings\Administrator\Application Data\Smilebox\SmileboxTray.exe" [2009-07-31 266888]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"McAfeeUpdaterUI"="c:\program files\Network Associates\Common Framework\UdaterUI.exe" [2007-03-27 136768]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [2004-08-13 122939]
"UpdateManager"="c:\program files\Common Files\Sonic\Update Manager\sgtray.exe" [2004-01-07 110592]
"NeroFilterCheck"="c:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2006-01-12 155648]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2007-05-08 54840]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-04-26 29744]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-09-06 413696]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-21 136600]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
"CTHelper"="CTHELPER.EXE" - c:\windows\CTHELPER.EXE [2006-08-11 17920]
"CTxfiHlp"="CTXFIHLP.EXE" - c:\windows\system32\CTXFIHLP.EXE [2006-08-11 18944]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2005-5-11 282624]
ImageMixer 3 SE Camera Monitor for SD.lnk - c:\program files\PIXELA\ImageMixer 3 SE for SD\CameraMonitor.exe [2009-4-25 253952]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\rootrepeal.sys]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdauxservice]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdcoreservice]
@=""

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Network Associates\\Common Framework\\FrameworkService.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [8/20/2009 2:56 PM 130936]
S3 GoogleDesktopManager-022208-143751;Google Desktop Manager 5.7.802.22438;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [11/25/2007 10:17 AM 29744]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\Spyware Doctor\pctsAuxs.exe [3/25/2008 9:26 AM 348752]
.
Contents of the 'Scheduled Tasks' folder

2009-08-16 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 19:34]

2009-08-24 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-11-17 21:22]

2009-07-09 c:\windows\Tasks\Norton PC Checkup WeekDay Scanner.job
- c:\program files\norton pc checkup\PC_Checkup.exe [2008-06-29 19:57]

2009-08-16 c:\windows\Tasks\Norton PC Checkup Weekend Scanner.job
- c:\program files\norton pc checkup\PC_Checkup.exe [2008-06-29 19:57]

2009-07-31 c:\windows\Tasks\Norton Security Scan for Administrator.job
- c:\program files\Norton Security Scan\Norton Security Scan\Engine\2.3.0.44\Nss.exe [2009-07-17 22:01]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Settings,ProxyOverride = *.local
Trusted Zone: adobe.com\www
Trusted Zone: java.com\www
DPF: {26B2A5DA-BFD6-422F-A89A-28A54C74B12B} - hxxp://www.costcophotocenter.com/upload/activex/v3_0_0_4/PhotoCenter_ActiveX_Control.cab
DPF: {85BA505F-FD01-4A91-836C-F7D502E89C9A} - hxxp://www.evite.com/html/imageUpload/ImageUploader4.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-08-24 09:17
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(712)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2009-08-24 9:22
ComboFix-quarantined-files.txt 2009-08-24 16:22
ComboFix2.txt 2009-08-23 16:14

Pre-Run: 118,779,142,144 bytes free
Post-Run: 118,713,004,032 bytes free

224 --- E O F --- 2009-08-12 04:18





Thanks again for your help thus far, I hope this can assist others with the same infection.

EMI

#14 emi326

emi326
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:03:28 AM

Posted 24 August 2009 - 03:11 PM

Here is the log from AVG Internet Security's 3 hour scan. I also attached it as a csv file in case some of the fields don't show up correctly.

Thanks!

Eric

Scan "Scan whole computer" was finished.
Infections;"2";"2";"0"
Spyware;"3";"3";"0"
Folders selected for scanning:;"Scan whole computer"
Scan started:;"Monday, August 24, 2009, 9:57:56 AM"
Scan finished:;"Monday, August 24, 2009, 12:50:59 PM (2 hour(s) 53 minute(s) 3 second(s))"
Total object scanned:;"554465"
User who launched the scan:;"Administrator"

Infections
File;"Infection";"Result"
C:\Documents and Settings\Administrator\My Documents\virus cleaner.exe;"Trojan horse Downloader.Generic8.BHRZ";"Moved to Virus Vault"
C:\System Volume Information\_restore{66CE8A71-4C81-4659-9C90-D321582CD0FD}\RP291\A0085508.dll;"Trojan horse Crypt.GBE";"Moved to Virus Vault"

Spyware
File;"Infection";"Result"
C:\System Volume Information\_restore{66CE8A71-4C81-4659-9C90-D321582CD0FD}\RP292\A0085570.dll;"Adware Generic3.AFAY";"Moved to Virus Vault"
C:\System Volume Information\_restore{66CE8A71-4C81-4659-9C90-D321582CD0FD}\RP292\A0085693.exe;"Adware Generic4.JJT";"Moved to Virus Vault"
C:\System Volume Information\_restore{66CE8A71-4C81-4659-9C90-D321582CD0FD}\RP292\A0085703.exe;"Adware Generic3.AEUW";"Moved to Virus Vault"

Warnings
File;"Infection";"Result"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\247realmedia.com.855b46d;"Found Tracking cookie.247realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\2o7.net.1aa86b19;"Found Tracking cookie.2o7";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\2o7.net.419ddb50;"Found Tracking cookie.2o7";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\2o7.net.484dbb69;"Found Tracking cookie.2o7";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\ad.yieldmanager.com.557bf2b0;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\2o7.net.b7e57d5c;"Found Tracking cookie.2o7";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\ad.yieldmanager.com.13a6979d;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\ad.yieldmanager.com.830b6f08;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\ad.yieldmanager.com.b68f2b7b;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\adbrite.com.44f92a69;"Found Tracking cookie.Adbrite";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\2o7.net.a66c055e;"Found Tracking cookie.2o7";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\adbrite.com.71beeff9;"Found Tracking cookie.Adbrite";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\adbrite.com.d5e309c2;"Found Tracking cookie.Adbrite";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\advertising.com.1820df7a;"Found Tracking cookie.Advertising";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\advertising.com.203aa218;"Found Tracking cookie.Advertising";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\advertising.com.525a5fb9;"Found Tracking cookie.Advertising";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\advertising.com.b624fa46;"Found Tracking cookie.Advertising";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\adopt.euroclick.com.891542da;"Found Tracking cookie.Euroclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\adrevolver.com.4a719aa9;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\adrevolver.com.9b9d670a;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\adrevolver.com.b595d4db;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\adrevolver.com.f6cfcad4;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\advertising.com.f62113d5;"Found Tracking cookie.Advertising";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\atdmt.com.b3e33b5f;"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\bs.serving-sys.com.5bf1f00f;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\burstnet.com.27341d57;"Found Tracking cookie.Burstnet";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\burstnet.com.a3218a37;"Found Tracking cookie.Burstnet";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\burstnet.com.c4fe2ebb;"Found Tracking cookie.Burstnet";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\doubleclick.net.bf396750;"Found Tracking cookie.Doubleclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\doubleclick.net.ce59db3e;"Found Tracking cookie.Doubleclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\fastclick.net.57e8da10;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\fastclick.net.8a6435e9;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\fastclick.net.8dd1284a;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\fastclick.net.94ca190b;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\fastclick.net.9b41aa53;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\hitbox.com.2b95f8a3;"Found Tracking cookie.Hitbox";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\mediaplex.com.dc30fb3c;"Found Tracking cookie.Mediaplex";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\media.adrevolver.com.2be00b0;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\media.adrevolver.com.57f415b5;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\media.adrevolver.com.5fed601d;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\questionmarket.com.3eb5a9f1;"Found Tracking cookie.Questionmarket";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\questionmarket.com.4dd5e426;"Found Tracking cookie.Questionmarket";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\mediaplex.com.f652b123;"Found Tracking cookie.Mediaplex";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\realmedia.com.6b2e2a72;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\serving-sys.com.255d6f2f;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\serving-sys.com.400f83f;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\serving-sys.com.4b416ef8;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\realmedia.com.68087763;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\serving-sys.com.606c3d3b;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\serving-sys.com.6a1cf9e8;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\serving-sys.com.c9034af6;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\trafficmp.com.ae53b8b;"Found Tracking cookie.Trafficmp";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\realmedia.com.ef906bac;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\statse.webtrendslive.com.b4ca7df0;"Found Tracking cookie.Webtrendslive";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\tacoda.net.a3218a37;"Found Tracking cookie.Tacoda";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\trafficmp.com.37644bdb;"Found Tracking cookie.Trafficmp";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\trafficmp.com.a00e30b4;"Found Tracking cookie.Trafficmp";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\trafficmp.com.e2e71e33;"Found Tracking cookie.Trafficmp";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\trafficmp.com.f3e5803e;"Found Tracking cookie.Trafficmp";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\realmedia.com.964cd308;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\revenue.net.bcf44ea1;"Found Tracking cookie.Revenue";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\revsci.net.2df99d79;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\revsci.net.44927ec;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\revsci.net.50e13b1b;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\revsci.net.50e13b1b;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\searchportal.information.com.3a8d7204;"Found Tracking cookie.Information";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\tribalfusion.com.dcc03271;"Found Tracking cookie.Tribalfusion";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\yieldmanager.com.ce59db3e;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\zedo.com.775ee79c;"Found Tracking cookie.Zedo";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\9dovqzra.default\cookies.sqlite:\zedo.com.c1dd09f2;"Found Tracking cookie.Zedo";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@247realmedia[1].txt;"Found Tracking cookie.247realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@247realmedia[1].txt:\247realmedia.com.125a868c;"Found Tracking cookie.247realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@247realmedia[1].txt:\247realmedia.com.855b46d;"Found Tracking cookie.247realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@247realmedia[1].txt:\247realmedia.com.d90d45cf;"Found Tracking cookie.247realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.2574710e;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.2f21f4a;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.2fb5248b;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.6492a00e;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.7fd8e1ca;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.a7616acc;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.8cc1875b;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.9464f2b7;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.c2eb6b55;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.d0ab9b67;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.d9056f11;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.daf5afc9;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.e31bc356;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[1].txt:\2o7.net.f541978a;"Found Tracking cookie.2o7";"Deleted"
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.539b0606;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.557bf2b0;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.830b6f08;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.b68f2b7b;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.8a47878;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.cf5393df;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.e626e6be;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.ff92306;"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@adbrite[2].txt;"Found Tracking cookie.Adbrite";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@adbrite[2].txt:\adbrite.com.44f92a69;"Found Tracking cookie.Adbrite";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@adbrite[2].txt:\adbrite.com.71beeff9;"Found Tracking cookie.Adbrite";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@adbrite[2].txt:\adbrite.com.d5e309c2;"Found Tracking cookie.Adbrite";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@admarketplace[1].txt;"Found Tracking cookie.Admarketplace";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@admarketplace[1].txt:\admarketplace.net.61a250a;"Found Tracking cookie.Admarketplace";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@adrevolver[2].txt;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@adrevolver[2].txt:\adrevolver.com.9b9d670a;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@adrevolver[2].txt:\adrevolver.com.f6cfcad4;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@adtech[1].txt;"Found Tracking cookie.Adtech";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@adtech[1].txt:\adtech.de.a9245469;"Found Tracking cookie.Adtech";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@advertising[2].txt;"Found Tracking cookie.Advertising";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@advertising[2].txt:\advertising.com.1820df7a;"Found Tracking cookie.Advertising";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@advertising[2].txt:\advertising.com.203aa218;"Found Tracking cookie.Advertising";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@advertising[2].txt:\advertising.com.525a5fb9;"Found Tracking cookie.Advertising";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@advertising[2].txt:\advertising.com.b624fa46;"Found Tracking cookie.Advertising";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@advertising[2].txt:\advertising.com.f62113d5;"Found Tracking cookie.Advertising";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt;"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt:\atdmt.com.7247c262;"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt:\atdmt.com.74c5668;"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt:\atdmt.com.9e6d7fd3;"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt:\atdmt.com.b3e33b5f;"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@bs.serving-sys[1].txt;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@bs.serving-sys[1].txt:\bs.serving-sys.com.5bf1f00f;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@burstbeacon[1].txt;"Found Tracking cookie.Burstbeacon";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@burstbeacon[1].txt:\burstbeacon.com.c4fe2ebb;"Found Tracking cookie.Burstbeacon";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@burstnet[1].txt;"Found Tracking cookie.Burstnet";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@burstnet[1].txt:\burstnet.com.27341d57;"Found Tracking cookie.Burstnet";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@burstnet[1].txt:\burstnet.com.a3218a37;"Found Tracking cookie.Burstnet";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@burstnet[1].txt:\burstnet.com.c4fe2ebb;"Found Tracking cookie.Burstnet";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt;"Found Tracking cookie.Casalemedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt:\casalemedia.com.156cbc67;"Found Tracking cookie.Casalemedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt:\casalemedia.com.1773afc;"Found Tracking cookie.Casalemedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt:\casalemedia.com.2d37ad26;"Found Tracking cookie.Casalemedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt:\casalemedia.com.350339d4;"Found Tracking cookie.Casalemedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt:\casalemedia.com.3a28db8d;"Found Tracking cookie.Casalemedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt:\casalemedia.com.650648e8;"Found Tracking cookie.Casalemedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt:\casalemedia.com.80ad4799;"Found Tracking cookie.Casalemedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt:\casalemedia.com.8c65eddd;"Found Tracking cookie.Casalemedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt:\casalemedia.com.987e6b46;"Found Tracking cookie.Casalemedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@doubleclick[2].txt;"Found Tracking cookie.Doubleclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@doubleclick[2].txt:\doubleclick.net.bf396750;"Found Tracking cookie.Doubleclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[2].txt;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[2].txt:\fastclick.net.57e8da10;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[2].txt:\fastclick.net.6fd479aa;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[2].txt:\fastclick.net.8a6435e9;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[2].txt:\fastclick.net.8dd1284a;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[2].txt:\fastclick.net.94ca190b;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[2].txt:\fastclick.net.9b41aa53;"Found Tracking cookie.Fastclick";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@hitbox[1].txt;"Found Tracking cookie.Hitbox";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@hitbox[1].txt:\hitbox.com.2b95f8a3;"Found Tracking cookie.Hitbox";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@hitbox[1].txt:\hitbox.com.bbf2a6e8;"Found Tracking cookie.Hitbox";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@media.adrevolver[1].txt;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@media.adrevolver[1].txt:\media.adrevolver.com.7fd89687;"Found Tracking cookie.Adrevolver";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@mediaplex[1].txt;"Found Tracking cookie.Mediaplex";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@mediaplex[1].txt:\mediaplex.com.323e9a10;"Found Tracking cookie.Mediaplex";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@mediaplex[1].txt:\mediaplex.com.dc30fb3c;"Found Tracking cookie.Mediaplex";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@mediaplex[1].txt:\mediaplex.com.f652b123;"Found Tracking cookie.Mediaplex";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@msnportal.112.2o7[1].txt;"Found Tracking cookie.2o7";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@msnportal.112.2o7[1].txt:\msnportal.112.2o7.net.7225be6f;"Found Tracking cookie.2o7";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@overture[2].txt;"Found Tracking cookie.Overture";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@overture[2].txt:\overture.com.52ca467a;"Found Tracking cookie.Overture";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@overture[2].txt:\overture.com.d727de6f;"Found Tracking cookie.Overture";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@overture[2].txt:\overture.com.e626e6be;"Found Tracking cookie.Overture";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@perf.overture[1].txt;"Found Tracking cookie.Overture";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@perf.overture[1].txt:\perf.overture.com.610ef18d;"Found Tracking cookie.Overture";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@pro-market[1].txt;"Found Tracking cookie.Pro-market";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@pro-market[1].txt:\pro-market.net.266912e2;"Found Tracking cookie.Pro-market";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@pro-market[1].txt:\pro-market.net.679dd108;"Found Tracking cookie.Pro-market";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@pro-market[1].txt:\pro-market.net.b51604f4;"Found Tracking cookie.Pro-market";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@pro-market[1].txt:\pro-market.net.bbf67f2d;"Found Tracking cookie.Pro-market";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@questionmarket[2].txt;"Found Tracking cookie.Questionmarket";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@questionmarket[2].txt:\questionmarket.com.3eb5a9f1;"Found Tracking cookie.Questionmarket";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@questionmarket[2].txt:\questionmarket.com.4dd5e426;"Found Tracking cookie.Questionmarket";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@questionmarket[2].txt:\questionmarket.com.767e4302;"Found Tracking cookie.Questionmarket";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.125a868c;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.6b2e2a72;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.71465e38;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.855b46d;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.9514c147;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.a2b49f1a;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.bf4a1fa7;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.cb8f36de;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.dc841856;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.e14be39e;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.ea3e4cf;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt:\realmedia.com.ef906bac;"Found Tracking cookie.Realmedia";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[1].txt;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[1].txt:\revsci.net.44927ec;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[1].txt:\revsci.net.55564293;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[1].txt:\revsci.net.2df99d79;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[1].txt:\revsci.net.4fdfee8f;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[1].txt:\revsci.net.50e13b1b;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[1].txt:\revsci.net.8642c85d;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[1].txt:\revsci.net.e9dbeb91;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[1].txt:\revsci.net.f7ac007f;"Found Tracking cookie.Revsci";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[2].txt;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[2].txt:\serving-sys.com.255d6f2f;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[2].txt:\serving-sys.com.400f83f;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[2].txt:\serving-sys.com.4b416ef8;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[2].txt:\serving-sys.com.606c3d3b;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[2].txt:\serving-sys.com.6a1cf9e8;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[2].txt:\serving-sys.com.c9034af6;"Found Tracking cookie.Serving-sys";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@statse.webtrendslive[1].txt;"Found Tracking cookie.Webtrendslive";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@statse.webtrendslive[1].txt:\statse.webtrendslive.com.b4ca7df0;"Found Tracking cookie.Webtrendslive";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@tacoda[2].txt;"Found Tracking cookie.Tacoda";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@tacoda[2].txt:\tacoda.net.27341d57;"Found Tracking cookie.Tacoda";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@tacoda[2].txt:\tacoda.net.4366831a;"Found Tracking cookie.Tacoda";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@tacoda[2].txt:\tacoda.net.5935e89;"Found Tracking cookie.Tacoda";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@tacoda[2].txt:\tacoda.net.c4fe2ebb;"Found Tracking cookie.Tacoda";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@tacoda[2].txt:\tacoda.net.cd7ce44f;"Found Tracking cookie.Tacoda";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@tacoda[2].txt:\tacoda.net.ed9c50d1;"Found Tracking cookie.Tacoda";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@trafficmp[2].txt;"Found Tracking cookie.Trafficmp";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@trafficmp[2].txt:\trafficmp.com.a00e30b4;"Found Tracking cookie.Trafficmp";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@trafficmp[2].txt:\trafficmp.com.f3e5803e;"Found Tracking cookie.Trafficmp";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@tribalfusion[1].txt;"Found Tracking cookie.Tribalfusion";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@tribalfusion[1].txt:\tribalfusion.com.dcc03271;"Found Tracking cookie.Tribalfusion";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[1].txt;"Found Tracking cookie.Zedo";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[1].txt:\zedo.com.14a38114;"Found Tracking cookie.Zedo";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[1].txt:\zedo.com.27f1639b;"Found Tracking cookie.Zedo";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[1].txt:\zedo.com.6a4b36ab;"Found Tracking cookie.Zedo";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[1].txt:\zedo.com.a5b6a132;"Found Tracking cookie.Zedo";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[1].txt:\zedo.com.c1dd09f2;"Found Tracking cookie.Zedo";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[1].txt:\zedo.com.f1d14556;"Found Tracking cookie.Zedo";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[1].txt:\zedo.com.f462b69f;"Found Tracking cookie.Zedo";"Moved to Virus Vault"
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[1].txt:\zedo.com.ff8ec9c0;"Found Tracking cookie.Zedo";"Moved to Virus Vault"

Edited by emi326, 24 August 2009 - 03:12 PM.


#15 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:28 AM

Posted 25 August 2009 - 06:43 AM

Hi,
I got your pm. I can not give advice via that route. Due to the infection that Security application has lost its Permissions. I do not want you to delete it yet as we will utilize it forthcoming. Lets try to fix it.

Do this please...

==========

Remove all entries in the Trusted, Restricted, and Enhanced Security Configuration Zones:
  • Download DelDomains.inf by right-clicking the download link below, and choosing the option labelled "Save Target As…". Save it to your Desktop.
  • Locate DelDomains.inf on your Desktop, right-click it and select the "Install" option. NOTE: You will not see any on-screen action.This will remove all entries in the Trusted, Restricted, and Enhanced Security Configuration Zones.
    NOTE once you do this: Any previous restricted zone hacks (SpywareBlaster, IE-SPYAD, etc) will need to be reapplyed.

==========

Please download Posted Image by OldTimer to your desktop from here.
  • Open the file and close any other windows.
  • It will close all programs itself when run; make sure to let it run uninterrupted.
  • Click the Start button to begin the process. The program should not take long to finish its job.
  • After it is finished, it should reboot your machine, if not, do this yourself to ensure a complete clean.
==========

Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Java Runtime Environment (JRE)" JRE 6 Update 16.
  • Click the Download button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u16-windows-i586.exe to install the newest version.
-- If using Windows Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
-- If you choose to update via the Java applet in Control Panel, uncheck the option to install the Toolbar unless you want it.
-- The uninstaller incorporated in this release removes previous Updates 10 and above, but does not remove older versions, so they still need to be removed manually.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click Ok and reboot your computer.

==========

Lets uninstall the McAfee remnants.
Please run this uninstaller...

McAfee Uninstaller

==========

Please download Inherit and save it to your desktop. Now please drag and drop OTL on top of Inherit.

Let me know if that restored permissions to the application.

==========

We need to create an OTL Quick Scan
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the Posted Image button.
  • A report will open, copy and paste it in a reply here
==========

With your next post please provide:

* OTL quick scan log
* Any further problems?

Kind regards,
~t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users