Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Desktop Security 2010


  • This topic is locked This topic is locked
17 replies to this topic

#1 Shantini

Shantini

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:02 AM

Posted 24 April 2010 - 06:28 AM

Hi,

I was surfing the net earlier today and the Desktop Security 2010 malware popped up on the screen. After some time I could not log on to the internet (via Microsoft Internet Explorer or Mozilla Firefox). After much research using another PC I discovered this website. I have followed the Uninstall Guide written by Grinler (http://www.bleepingcomputer.com/virus-removal/remove-desktop-security-2010), but everytime I restart my PC I get the same pop-up from Desktop Security 2010 and have to run rKill to use my PC. I have followed the additional instructions (http://www.bleepingcomputer.com/forums/topic34773.html) as such, please find the data from the DDS.txt log :

DDS (Ver_10-03-17.01) - NTFSx86
Run by user at 20:55:15.66 on Sat 24/04/2010
Internet Explorer: 8.0.6001.18904 BrowserJavaVersion: 1.6.0_17
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.60.1033.18.2038.1032 [GMT 10:00]

AV: avast! antivirus 4.8.1229 [VPS 091231-0] *On-access scanning enabled* (Outdated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
SP: avast! antivirus 4.8.1229 [VPS 091231-0] *enabled* (Outdated) {7591DB91-41F0-48A3-B128-1A293FD8233D}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Windows\system32\Dwm.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\igfxpers.exe
C:\Windows\RtHDVCpl.exe
C:\Acer\Empowering Technology\SysMonitor.exe
C:\Acer\Empowering Technology\eDataSecurity\eDSLoader.exe
C:\Program Files\Common Files\Intel\IntelDH\NMS\Support\IntelHCTAgent.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Alwil Software\Avast4\ashDisp.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Windows\System32\spoolsv.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\McAfee Security Scan\1.0.150\SSScheduler.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\taskeng.exe
C:\Windows\ehome\ehmsas.exe
C:\Acer\Empowering Technology\ACER.EMPOWERING.FRAMEWORK.SUPERVISOR.EXE
C:\Acer\Empowering Technology\eRecovery\ERAGENT.EXE
C:\Program Files\Acer Arcade Live\Acer HomeMedia Connect\Kernel\DMS\CLMSServer.exe
C:\Program Files\Acer Arcade Live\Acer TV Share\Kernel\DMSTV\CLMSServer.exe
C:\Acer\Empowering Technology\ePerformance\MemCheck.exe
C:\Program Files\Intel\IntelDH\CCU\AlertService.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Common Files\Intel\IntelDH\NMS\AdpPlugins\DQLWinService.exe
C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\CyberLink\Shared Files\RichVideo.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Acer\Empowering Technology\eRecovery\eRecoveryService.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Windows\system32\WUDFHost.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Windows\explorer.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\explorer.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Users\user\Desktop\dds.scr
C:\Program Files\Skype\Toolbars\Shared\SkypeNames.exe

============== Pseudo HJT Report ===============

uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
mStart Page = hxxp://en.my.acer.yahoo.com
mDefault_Page_URL = hxxp://en.my.acer.yahoo.com
uInternet Settings,ProxyOverride = *.local
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn\yt.dll
BHO: Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn\yt.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SEPsearchhelperie.dll
BHO: ShowBarObj Class: {83a2f9b1-01a2-4aa5-87d1-45b6b8505e96} - c:\windows\system32\ActiveToolBand.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: Windows Live Toolbar Helper: {e15a8dc0-8516-42a1-81ea-dc94ec1acf10} - c:\program files\windows live\toolbar\wltcore.dll
TB: Acer eDataSecurity Management: {5cbe3b7c-1e47-477e-a7dd-396db0476e29} - c:\windows\system32\eDStoolbar.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn\yt.dll
TB: &Windows Live Toolbar: {21fa44ef-376d-4d53-9b0f-8a89d3229068} - c:\program files\windows live\toolbar\wltcore.dll
TB: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
TB: {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - No File
uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
uRun: [MsnMsgr] "c:\program files\windows live\messenger\MsnMsgr.Exe" /background
uRun: [Acer Tour Reminder]
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [AdobeBridge]
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [Skype] "c:\program files\skype\\phone\Skype.exe" /nosplash /minimized
uRun: [VeohPlugin] "c:\program files\veoh networks\veohwebplayer\veohwebplayer.exe"
uRun: [AdobeFlash] c:\users\user\appdata\local\temp\uDhW.exe
uRun: [a4ehgtuvenb8] c:\users\user\appdata\local\temp\m.24C2F.tmp.exe
uRun: [AdobeExtractor] c:\users\user\desktop\AdobeExtractor.exe
uRun: [OAMsBlues] c:\users\user\music\itunes\itunes music\aaron goldberg\worlds\oamsblues31201.exe
uRun: [ActionsPalette] c:\users\user\appdata\roaming\adobe\adobe photoshop cs4\adobe photoshop cs4 settings\paletteactions.exe
uRun: [rnsetupRealNetworks] c:\users\user\appdata\roaming\real\update\setup3.10\rup\rnsetuprealnetworks.exe
uRun: [BluesOAMs] c:\users\user\music\itunes\itunes music\aaron goldberg\worlds\OAMsBlues31201.exe
uRun: [uDhW] c:\users\user\appdata\local\temp\uDhW.exe
uRun: [AdobeAntiMalware] c:\users\user\desktop\AdobeExtractor.exe
uRun: [Desktop Security 2010] "c:\users\user\appdata\roaming\desktop security 2010\Desktop Security 2010.exe" /STARTUP
uRun: [SecurityCenter] c:\users\user\appdata\roaming\desktop security 2010\securitycenter.exe
uRunServices: [PlayerAdobe] c:\users\user\appdata\local\temp\uDhW.exe
uRunServices: [ArsenalFootball] c:\users\user\music\itunes\itunes music\podcasts\football weekly\weeklyarsenal.exe
uRunServices: [Microsoftdecorad3d] c:\users\user\appdata\locallow\sun\java\deployment\cache\6.0\15\58fb3e0f-24893687-n\javafxdecorad3d.exe
uRunServices: [BluesOAMs] c:\users\user\music\itunes\itunes music\aaron goldberg\worlds\OAMsBlues31201.exe
uRunServices: [ActionsPalette] c:\users\user\appdata\roaming\adobe\adobe photoshop cs4\adobe photoshop cs4 settings\paletteactions.exe
uRunServices: [ExtractorAdobe] c:\users\user\desktop\AdobeExtractor.exe
uRunServices: [uDhW] c:\users\user\appdata\local\temp\uDhW.exe
uRunServices: [MalwarebytesExtractor] c:\users\user\desktop\AdobeExtractor.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [Acer Tour]
mRun: [PCMMediaSharing] c:\program files\acer arcade live\acer homemedia connect\kernel\dms\PCMMediaSharing.exe
mRun: [Acer Empowering Technology Monitor] c:\acer\empowering technology\SysMonitor.exe
mRun: [eDataSecurity Loader] c:\acer\empowering technology\edatasecurity\eDSloader.exe
mRun: [Skytel] Skytel.exe
mRun: [NMSSupport] "c:\program files\common files\intel\inteldh\nms\support\IntelHCTAgent.exe" /startup
mRun: [CCUTRAYICON] FactoryMode
mRun: [eRecoveryService]
mRun: [Acer Tour Reminder] c:\acer\acertour\Reminder.exe
mRun: [Symantec PIF AlertEng] "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\pifsvc.exe" /a /m "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\AlertEng.dll"
mRun: [avast!] c:\progra~1\alwils~1\avast4\ashDisp.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [AdobeCS4ServiceManager] "c:\program files\common files\adobe\cs4servicemanager\CS4ServiceManager.exe" -launchedbylogin
mRun: [AppleSyncNotifier] c:\program files\common files\apple\mobile device support\AppleSyncNotifier.exe
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [rnsetupRealNetworks] c:\users\user\appdata\roaming\real\update\setup3.10\rup\rnsetuprealnetworks.exe
mRun: [AdobeFlash1.0.20] c:\users\user\appdata\local\temp\udhw.exe
mRun: [AdobeExtractor] c:\users\user\desktop\adobeextractor.exe
mRun: [OAMsBlues5447] c:\users\user\music\itunes\itunes music\aaron goldberg\worlds\oamsblues31201.exe
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRunServices: [rnsetupInstaller] c:\users\user\appdata\roaming\real\update\setup3.10\rup\rnsetuprealnetworks.exe
mRunServices: [ActionsPalette] c:\users\user\appdata\roaming\adobe\adobe photoshop cs4\adobe photoshop cs4 settings\paletteactions.exe
dRun: [Acer Tour Reminder] c:\acer\acertour\Reminder.exe
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\empowe~1.lnk - c:\acer\empowering technology\eAPLauncher.exe
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\mcafee~1.lnk - c:\program files\mcafee security scan\1.0.150\SSScheduler.exe
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files\windows live\writer\WriterBrowserExtension.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: golder.com\cavpn
Trusted Zone: golder.com\usvpn
DPF: {195538FD-1C39-44B1-A7C3-5D7137A8A8F1} - c:\users\user\appdata\local\temp\f5tmp\f5opswati.cab
DPF: {30CF9713-6614-4556-B5F5-66F8C7F9DEF1} - c:\users\user\appdata\local\temp\f5tmp\f5opswati.cab
DPF: {45B69029-F3AB-4204-92DE-D5140C3E8E74} - c:\users\user\appdata\local\temp\f5tmp\InstallerControl.cab
DPF: {49EC7987-E331-44E3-B170-748B58A268B9} - c:\users\user\appdata\local\temp\f5tmp\f5opswati.cab
DPF: {57C76689-F052-487B-A19F-855AFDDF28EE} - c:\users\user\appdata\local\temp\f5tmp\f5InspectionHost.cab
DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {EBDC91CB-F23F-477D-B152-3F7243760D04} - c:\users\user\appdata\local\temp\f5tmp\f5opswati.cab
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: igfxcui - igfxdev.dll

================= FIREFOX ===================

FF - ProfilePath - c:\users\user\appdata\roaming\mozilla\firefox\profiles\ximqql86.default\
FF - plugin: c:\program files\microsoft\office live\npOLW.dll
FF - plugin: c:\program files\opera\program\plugins\np_gp.dll
FF - plugin: c:\program files\windows live\photo gallery\NPWLPG.dll
FF - plugin: c:\users\user\appdata\roaming\mozilla\firefox\profiles\ximqql86.default\extensions\moveplayer@movenetworks.com\platform\winnt_x86-msvc\plugins\npmnqmp071101000055.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2010-1-18 114768]
R2 Acer HomeMedia Connect Service;Acer HomeMedia Connect Service;c:\program files\acer arcade live\acer homemedia connect\kernel\dms\CLMSServer.exe [2007-7-26 269448]
R2 Acer TV Share Service;Acer TV Share Service;c:\program files\acer arcade live\acer tv share\kernel\dmstv\CLMSServer.exe [2008-7-15 269432]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2010-1-18 20560]
R2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2008-10-29 53328]
R2 avast! Antivirus;avast! Antivirus;c:\program files\alwil software\avast4\ashServ.exe [2010-1-18 138680]
R2 DQLWinService;DQLWinService;c:\program files\common files\intel\inteldh\nms\adpplugins\DQLWinService.exe [2007-2-13 208896]
R2 nmsunidr;UniDriver for NMS;c:\windows\system32\drivers\nmsunidr.sys [2007-2-19 5376]
R3 avast! Mail Scanner;avast! Mail Scanner;c:\program files\alwil software\avast4\ashMaiSv.exe [2010-1-18 254040]
R3 avast! Web Scanner;avast! Web Scanner;c:\program files\alwil software\avast4\ashWebSv.exe [2010-1-18 352920]
R3 IntelDH;IntelDH Driver;c:\windows\system32\drivers\IntelDH.sys [2008-7-16 5504]
R3 OmniTV;Cx2388x AvStream Video Capture;c:\windows\system32\drivers\OmniTV.sys [2007-7-26 221184]
S3 AVerM115S;AVerM115S service;c:\windows\system32\drivers\AVerM115S.sys [2007-7-26 856832]
S3 DHTRACE;Intel® DHTrace Controller;c:\program files\common files\intel\inteldh\bin\DHTraceController.exe [2007-4-7 39896]
S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-8-4 21504]
S3 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr.sys [2009-10-27 54632]
S3 fsssvc;Windows Live Family Safety Service;c:\program files\windows live\family safety\fsssvc.exe [2009-8-5 704864]
S3 IntelDHSvcConf;IntelDHSvcConf;c:\program files\intel\inteldh\intel media server\tools\IntelDHSvcConf.exe [2007-4-7 36312]
S3 MCLServiceATL;Intel® Application Tracker;c:\program files\intel\inteldh\intel media server\shells\MCLServiceATL.exe [2007-4-7 158168]
S3 NMSCore;Intel® NMSCore;c:\program files\common files\intel\inteldh\nms\nmscore\NMSCore.exe [2007-4-7 313816]
S3 QualityManager;Intel® Quality Manager;c:\program files\intel\inteldh\intel media server\media server\bin\QualityManager.exe [2007-4-7 272856]

=============== Created Last 30 ================

2010-04-24 10:46:58 0 d-----w- c:\users\user\appdata\roaming\Desktop Security 2010
2010-04-24 03:23:47 0 d-----w- c:\users\user\appdata\roaming\Malwarebytes
2010-04-24 03:23:34 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-24 03:23:33 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-24 03:23:33 0 d-----w- c:\programdata\Malwarebytes
2010-04-24 03:23:32 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-14 01:31:12 3600776 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-04-14 01:31:12 3548040 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-04-14 01:31:10 79360 ----a-w- c:\windows\system32\drivers\mrxsmb20.sys
2010-04-14 01:31:10 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-04-14 01:31:10 106496 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-04-14 01:31:07 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-04-14 01:31:05 62464 ----a-w- c:\windows\system32\l3codeca.acm
2010-04-14 01:31:05 220672 ----a-w- c:\windows\system32\l3codecp.acm
2010-04-14 01:31:03 904576 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-04-14 01:31:02 25088 ----a-w- c:\windows\system32\drivers\tunnel.sys
2010-04-14 01:31:02 200704 ----a-w- c:\windows\system32\iphlpsvc.dll
2010-04-14 01:30:22 172032 ----a-w- c:\windows\system32\wintrust.dll
2010-04-14 01:30:00 98304 ----a-w- c:\windows\system32\cabview.dll
2010-04-13 23:19:39 0 d-----w- c:\program files\iPod
2010-04-13 23:19:37 0 d-----w- c:\programdata\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-04-13 23:19:37 0 d-----w- c:\program files\iTunes
2010-04-13 23:14:30 0 d-----w- c:\program files\Bonjour

==================== Find3M ====================

2010-04-13 23:15:18 86016 ----a-w- c:\windows\inf\infstor.dat
2010-04-13 23:15:18 51200 ----a-w- c:\windows\inf\infpub.dat
2010-04-13 23:15:18 143360 ----a-w- c:\windows\inf\infstrng.dat
2010-02-24 00:16:06 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-02-23 06:39:13 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-23 06:33:45 71680 ----a-w- c:\windows\system32\iesetup.dll
2010-02-23 06:33:45 109056 ----a-w- c:\windows\system32\iesysprep.dll
2010-02-23 04:55:36 133632 ----a-w- c:\windows\system32\ieUnatt.exe
2010-02-20 23:06:41 24064 ----a-w- c:\windows\system32\nshhttp.dll
2010-02-20 23:05:14 30720 ----a-w- c:\windows\system32\httpapi.dll
2010-02-12 01:46:14 91424 ----a-w- c:\windows\system32\dnssd.dll
2010-02-12 01:46:14 107808 ----a-w- c:\windows\system32\dns-sd.exe
2010-01-25 12:00:35 471552 ----a-w- c:\windows\system32\secproc_isv.dll
2010-01-25 12:00:35 152576 ----a-w- c:\windows\system32\secproc_ssp_isv.dll
2010-01-25 12:00:35 152064 ----a-w- c:\windows\system32\secproc_ssp.dll
2010-01-25 12:00:22 471552 ----a-w- c:\windows\system32\secproc.dll
2010-01-25 11:58:52 332288 ----a-w- c:\windows\system32\msdrm.dll
2010-01-25 08:21:20 526336 ----a-w- c:\windows\system32\RMActivate_isv.exe
2010-01-25 08:21:20 346624 ----a-w- c:\windows\system32\RMActivate_ssp_isv.exe
2010-01-25 08:21:18 518144 ----a-w- c:\windows\system32\RMActivate.exe
2010-01-25 08:21:18 347136 ----a-w- c:\windows\system32\RMActivate_ssp.exe
2009-11-17 09:43:48 665600 ----a-w- c:\windows\inf\drvindex.dat
2008-08-07 13:13:51 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2009-12-06 00:14:12 16384 --sha-w- c:\windows\serviceprofiles\localservice\appdata\local\temp\cookies\index.dat
2009-12-06 00:14:12 16384 --sha-w- c:\windows\serviceprofiles\localservice\appdata\local\temp\history\history.ie5\index.dat
2009-12-06 00:14:12 32768 --sha-w- c:\windows\serviceprofiles\localservice\appdata\local\temp\temporary internet files\content.ie5\index.dat
2009-10-17 21:17:37 245760 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\ietldcache\index.dat

============= FINISH: 20:56:13.15 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:02 AM

Posted 28 April 2010 - 08:22 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 Shantini

Shantini
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:02 AM

Posted 28 April 2010 - 11:08 PM

Hi Mole,

Yes I am here. Really need your help fixing this problem.




QUOTE(m0le @ Apr 29 2010, 11:22 AM) View Post
Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif



#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:02 AM

Posted 29 April 2010 - 12:45 PM

Let's run both Rkill and another program to kill these fake messages

Please download exeHelper to your desktop.
Double-click on exeHelper.com to run the fix.
A black window should pop up, press any key to close once the fix is completed.
Post the contents of exehelperlog.txt (Will be created in the directory where you ran exeHelper.com, and should open at the end of the scan)
Note: If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together (they will both be in the one file).


Then

Download and Run RKill

Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

Link 1
Link 2
Link 3
Link 4
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • Please post the resulting log in your next reply.


Finally run Combofix which will remove this pest

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.


Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#5 Shantini

Shantini
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:02 AM

Posted 30 April 2010 - 08:08 PM

Hi Mole,

Here are the contents of exehelperlog.txt :

exeHelper by Raktor
Build 20100414
Run at 10:45:23 on 05/01/10
Now searching...
Checking for numerical processes...
Checking for sysguard processes...
Checking for bad processes...
Checking for bad files...
Checking for bad registry entries...
Resetting filetype association for .exe
Resetting filetype association for .com
Resetting userinit and shell values...
Resetting policies...
--Finished--

Here are the contents of rkill.txt :

This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.
Ran as user on 01/05/2010 at 10:47:42.


Processes terminated by Rkill or while it was running:


C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Users\user\Desktop\exeHelper(4).com
C:\Users\user\Desktop\rkill.exe


Rkill completed on 01/05/2010 at 10:47:45.


Please find attached the combolog.txt file.

Please advise what needs to be done next to get rid of this pest once and for all.



Thanks for your help,

Shantini

Attached Files



#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:02 AM

Posted 01 May 2010 - 03:24 AM

Desktop Security 2010 has been removed.


Please run ESET's online scan for remnant checking and removal

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found there will be no option to export the text file as no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#7 Shantini

Shantini
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:02 AM

Posted 02 May 2010 - 04:49 AM

Hi Mole,

Looks like my PC is still infected with something or other. Here's the contents of the ESET Scan :

C:\Qoobox\Quarantine\C\Users\user\AppData\Roaming\Real\Update\setup3.10\RUP\rnsetupRealNetworks.exe.vir a variant of Win32/Kryptik.DXN trojan
C:\Qoobox\Quarantine\C\Users\user\Music\iTunes\iTunes Music\Aaron Goldberg\Worlds\OAMsBlues31201.exe.vir a variant of Win32/Kryptik.DXN trojan
C:\Users\user\AppData\Local\Microsoft\Feeds\Links~\HeadlinesfeedLatest.exe a variant of Win32/Kryptik.DXN trojan
C:\Users\user\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10\5940244a-559b480e a variant of Java/TrojanDownloader.Agent.NAA trojan
C:\Users\user\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\49\6b800f31-6e67233f multiple threats
C:\Users\user\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\6e49cf76-73b275a2 a variant of Java/TrojanDownloader.Agent.NAA trojan
C:\Users\user\AppData\Roaming\Adobe\Adobe Photoshop CS4\Adobe Photoshop CS4 Settings\PaletteActions.exe a variant of Win32/Kryptik.DXN trojan
C:\Users\user\AppData\Roaming\Microsoft\IdentityCRL\Production\ppcrlconfigLive.exe a variant of Win32/Kryptik.DXN trojan
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ximqql86.default\extensions\moveplayer@movenetworks.com\platform\WINNT_x86-msvc\plugins\npmnqmpnpmnqmp0711010000055.exe a variant of Win32/Kryptik.DXN trojan
C:\Users\user\Desktop\AdobeExtractor.exe a variant of Win32/Kryptik.DXN trojan
C:\Users\user\Music\iTunes\iTunes Music\Podcasts\Football Weekly\WeeklyArsenal.exe a variant of Win32/Kryptik.DXN trojan
Operating memory a variant of Win32/Kryptik.DXN trojan


Please advise what I should do now.

Thanks!

Shantini

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:02 AM

Posted 02 May 2010 - 06:19 AM

Firstly, don't worry too much about the ESET scan.

The entries break down into three categories:

QUOTE
C:\Qoobox\Quarantine\C\Users\user\AppData\Roaming\Real\Update\setup3.10\RUP\rnsetupRealNetworks.exe.vir a variant of Win32/Kryptik.DXN trojan
C:\Qoobox\Quarantine\C\Users\user\Music\iTunes\iTunes Music\Aaron Goldberg\Worlds\OAMsBlues31201.exe.vir a variant of Win32/Kryptik.DXN trojan


These are in Combofix's quarantine folder

QUOTE
C:\Users\user\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10\5940244a-559b480e a variant of Java/TrojanDownloader.Agent.NAA trojan
C:\Users\user\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\49\6b800f31-6e67233f multiple threats
C:\Users\user\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\6e49cf76-73b275a2 a variant of Java/TrojanDownloader.Agent.NAA trojan


These are in the Java cache. Copies of the malware, in other words.


QUOTE
C:\Users\user\AppData\Roaming\Adobe\Adobe Photoshop CS4\Adobe Photoshop CS4 Settings\PaletteActions.exe a variant of Win32/Kryptik.DXN trojan
C:\Users\user\AppData\Roaming\Microsoft\IdentityCRL\Production\ppcrlconfigLive.exe a variant of Win32/Kryptik.DXN trojan
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ximqql86.default\extensions\moveplayer@movenetworks.com\platform\WINNT_x86-msvc\plugins\npmnqmpnpmnqmp0711010000055.exe a variant of Win32/Kryptik.DXN trojan
C:\Users\user\Desktop\AdobeExtractor.exe a variant of Win32/Kryptik.DXN trojan
C:\Users\user\Music\iTunes\iTunes Music\Podcasts\Football Weekly\WeeklyArsenal.exe a variant of Win32/Kryptik.DXN trojan
Operating memory a variant of Win32/Kryptik.DXN trojan
C:\Users\user\AppData\Local\Microsoft\Feeds\Links~\HeadlinesfeedLatest.exe a variant of Win32/Kryptik.DXN trojan


These are the seemingly legitimate files which were infected. The big guns don't go after these which is why we run ESET to remove them.

You might want to look into why you have so many of these infected files. If you are downloading from a P2P site or a non-official site then this could be why.


Rerun ESET and make sure you remove anything found then just to be sure, let's run Superantispyware and see if there are any more hidden extras whistling.gif

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Edited by m0le, 02 May 2010 - 06:20 AM.

Posted Image
m0le is a proud member of UNITE

#9 Shantini

Shantini
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:02 AM

Posted 04 May 2010 - 08:09 PM

Hi Mole,

I have rerun ESET and removed the infected files.

I then ran SUPERAntiSpyware. Here is the log :

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/05/2010 at 11:02 AM

Application Version : 4.36.1006

Core Rules Database Version : 4890
Trace Rules Database Version: 2702

Scan type : Complete Scan
Total Scan Time : 01:57:08

Memory items scanned : 482
Memory threats detected : 0
Registry items scanned : 8579
Registry threats detected : 0
File items scanned : 196844
File threats detected : 140

Adware.Tracking Cookie
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@imrworldwide[2].txt
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@atdmt[1].txt
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@msnportal.112.2o7[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@112.2o7[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@ad.yieldmanager[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@adbrite[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@ads.as4x.tmcs[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@ads.today[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@adtech[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@atdmt[2].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@bs.serving-sys[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@doubleclick[2].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@imrworldwide[2].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@media.sensis.com[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@mediaonenetwork[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@msnportal.112.2o7[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@overture[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@rotator.adjuggler[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@sensismediasmart.com[2].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@serving-sys[2].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@statcounter[2].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Low\user@zedo[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@2o7[1].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@atdmt[2].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@bs.serving-sys[2].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@doubleclick[2].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@imrworldwide[2].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@msnportal.112.2o7[2].txt
D:\Backup\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\user@serving-sys[1].txt
ad.yieldmanager.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
ad.yieldmanager.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
ad.yieldmanager.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
ad.yieldmanager.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
ad.yieldmanager.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
ad.yieldmanager.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
ad.yieldmanager.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.atdmt.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.overture.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.richmedia.yahoo.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.doubleclick.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adtech.de [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adopt.euroclick.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adopt.euroclick.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adopt.euroclick.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adopt.euroclick.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adopt.euroclick.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.112.2o7.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.divx.112.2o7.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.hotlog.ru [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.tribalfusion.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.revsci.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.revsci.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.revsci.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.revsci.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.imrworldwide.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.imrworldwide.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.kontera.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.kontera.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.kontera.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.stats.adbrite.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adbrite.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adbrite.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adbrite.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.stat.youku.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.mediateevee.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.mediateevee.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.statcounter.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.zedo.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.zedo.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.zedo.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.zedo.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.zedo.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
media.adrevolver.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.advertising.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.advertising.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.advertising.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.advertising.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.mediaonenetwork.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.questionmarket.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.questionmarket.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.bs.serving-sys.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.serving-sys.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.serving-sys.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.serving-sys.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.serving-sys.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.serving-sys.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.mediaplex.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.serving-sys.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.edge.ru4.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.edge.ru4.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.edge.ru4.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
stat.onestat.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
stat.onestat.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.bravenet.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.sbsaustralia.112.2o7.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.msnportal.112.2o7.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.specificclick.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.specificclick.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.specificclick.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.specificclick.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.ads.pointroll.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.ads.pointroll.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.ads.pointroll.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.ads.pointroll.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.ads.pointroll.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.ads.pointroll.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.ads.pointroll.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
media.sensis.com.au [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
media.sensis.com.au [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
media.sensis.com.au [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
media.sensis.com.au [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
media.sensis.com.au [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.partygaming.122.2o7.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.partypoker.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.partypoker.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
ad2.clickhype.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.americanexpress.122.2o7.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.yadro.ru [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.yadro.ru [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adultadworld.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adultadworld.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.adultadworld.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.fastclick.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.fastclick.net [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
www.zango.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.toplist.cz [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.toplist.sk [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.usenext.de [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.usenext.de [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.usenext.de [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.usenext.de [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.usenext.de [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.indiads.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.casalemedia.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.casalemedia.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.casalemedia.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.casalemedia.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.casalemedia.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
.apmebf.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]
ad1.clickhype.com [ D:\Backup\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\eas34ozd.default\cookies.txt ]


Please advise what I need to do next.


Thanks,

Shantini


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:02 AM

Posted 05 May 2010 - 01:03 PM

The SAS scan reveals tracking cookies only. Most PCs have those so don't worry.

I would have liked to have seen the ESET log which shows that the items were removed but other than that the machine looks good.

How is it handling?
Posted Image
m0le is a proud member of UNITE

#11 Shantini

Shantini
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:02 AM

Posted 07 May 2010 - 07:24 PM

Would you like me to run another ESET scan and include the log?

The machine seems to be running fine. There is however this message box that constantly pops up in the bottom right hand corner of the screen. The message reads "Windows has blocked some startup programs". I have included an attachment with a Print Screen of this message. Does this pose any issues to the machine?

Thanks,

Shantini

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:02 AM

Posted 07 May 2010 - 07:33 PM

No attachment on your post. It might be an idea to take a look at your startup programs

Run HijackThis.
Click on Open the Misc Tools Section.
Then press Generate StartupList log, making sure that both boxes next to it are checked.
Select Yes at the prompt.
A Notepad file will open, and will automatically be saved in your HijackThis folder.
Paste this log in your next reply.
More information with a screenshot, can be found here.
Posted Image
m0le is a proud member of UNITE

#13 Shantini

Shantini
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:02 AM

Posted 08 May 2010 - 09:04 PM

Please find attached the log from HijackThis.

Apologies I can't upload the Print Screen because the file is too big (2+ MB).



Thanks,

Shantini

Attached Files



#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:02 AM

Posted 09 May 2010 - 10:51 AM

Nothing nasty there either.

Run the StartupLite program which should trim down your startup programs

Please download StartupLite. to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve performance.
Posted Image
m0le is a proud member of UNITE

#15 Shantini

Shantini
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:02 AM

Posted 09 May 2010 - 11:59 PM

Hi Mole,

Startup lite didnt seem to get rid of it. When I run Rkill however it does. Please find attached Rkill log.

Thank you for your help.


Shantini

Attached Files






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users