Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

email sent from my computer that I didn't send


  • This topic is locked This topic is locked
17 replies to this topic

#1 taoson

taoson

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 13 June 2010 - 02:41 PM

I tried to run the three programs on my computer but on each one I got the message below.

"Illegal operation attempted on a regisstry key that has been marked for deletion."

I think this is because I had already run ComboFix. The log from that is attached.

I have a Vista Ultimate desktop that has Outlook 2007. A few days ago I heard from friends who had received email from my account with just a link in the body. I had not sent the emails and they weren't in my Sent folder. A friend who is a network admin had me unintall my avg software and download the trial version of Avast to run a boot scan from. I did that and nothing showed up. Then he told me to download and run ComboFix which I did. The log is attached.

Thanks!

I restarted my infected computer and now the programs run. DDS is below. other two logs are attached.

Again, a couple of days ago I learned that people I knew were getting emails from my email address with nothing but a web link in the body. One friend opened the link and his av software blocked it saying it was an attack page. I did not send the emails and they aren't in my Sent folder but the people getting them are all in my Contacts folder in Outlook. I am using Vista Ultimate and Outlook 2008. I have disconnected the computer from my home network.

Thanks!


DDS (Ver_10-03-17.01) - NTFSx86
Run by Bill at 14:58:07.73 on Sun 06/13/2010
Internet Explorer: 8.0.6001.18904
Microsoft® Windows Vista™ Ultimate 6.0.6002.2.1252.1.1033.18.3071.1797 [GMT -5:00]

SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k secsvcs
C:\Program Files\Trusteer\Rapport\bin\RapportMgmtService.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\Ati2evxx.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
C:\Windows\system32\Dwm.exe
C:\Program Files\Alwil Software\Avast5\afwServ.exe
C:\Windows\Explorer.EXE
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k apphost
C:\Windows\system32\inetsrv\inetinfo.exe
C:\Windows\system32\spool\DRIVERS\W32X86\3\lxeaserv.exe
C:\Windows\system32\lxeacoms.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
C:\Program Files\Microsoft SQL Server\90\DTS\Binn\MsDtsSrvr.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Microsoft SQL Server\100\DTS\Binn\MsDtsSrvr.exe
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\msftesql.exe
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
C:\Program Files\Microsoft SQL Server\MSSQL10.DEVELOPER2008\MSSQL\Binn\sqlservr.exe
C:\Program Files\Microsoft SQL Server\MSSQL10.DEVELOPER2008\MSSQL\Binn\fdlauncher.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\system32\svchost.exe -k iissvcs
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\DRIVERS\xaudio.exe
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\SQLAGENT90.EXE
C:\Program Files\Microsoft SQL Server\MSSQL10.DEVELOPER2008\MSSQL\Binn\SQLAGENT.EXE
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Lexmark S300-S400 Series\lxeamon.exe
C:\Program Files\Lexmark S300-S400 Series\ezprint.exe
C:\Program Files\Microsoft SQL Server\MSSQL10.DEVELOPER2008\MSSQL\Binn\fdhost.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe
C:\Program Files\Alwil Software\Avast5\AvastUI.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\eFax Messenger 4.4\J2GTray.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\System32\svchost.exe -k swprv
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
C:\Users\Bill\Desktop\Defogger.exe
C:\Program Files\Trusteer\Rapport\bin\RapportService.exe
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Users\Bill\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://my.yahoo.com/
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SEPsearchhelperie.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.5.4723.1820\swg.dll
BHO: Lexmark Printable Web: {d2c5e510-be6d-42cc-9f61-e4f939078474} - c:\program files\lexmark printable web\bho.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: Windows Live Toolbar Helper: {e15a8dc0-8516-42a1-81ea-dc94ec1acf10} - c:\program files\windows live\toolbar\wltcore.dll
TB: &Windows Live Toolbar: {21fa44ef-376d-4d53-9b0f-8a89d3229068} - c:\program files\windows live\toolbar\wltcore.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
uRun: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter
uRun: [msnmsgr] "c:\program files\windows live\messenger\msnmsgr.exe" /background
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [eFax 4.4] "c:\program files\efax messenger 4.4\J2GDllCmd.exe" /R
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [lxeamon.exe] "c:\program files\lexmark s300-s400 series\lxeamon.exe"
mRun: [EzPrint] "c:\program files\lexmark s300-s400 series\ezprint.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [avast5] c:\progra~1\alwils~1\avast5\avastUI.exe /nogui
StartupFolder: c:\users\bill\appdata\roaming\micros~1\windows\startm~1\programs\startup\automa~1.lnk - c:\troopmaster software\automailer\AutoMailer.exe
StartupFolder: c:\users\bill\appdata\roaming\micros~1\windows\startm~1\programs\startup\efax44~1.lnk - c:\program files\efax messenger 4.4\J2GTray.exe
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~4\office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files\windows live\writer\WriterBrowserExtension.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~4\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office12\REFIEBAR.DLL
Trusted Zone: intuit.com\ttlc
Trusted Zone: real.com\rhap-app-4-0
Trusted Zone: real.com\rhapreg
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {57055870-7F19-46ED-B1DD-56004FBFCB9D} - hxxp://premieranniversarydownload.hipdigital.com/HipDigitalDownloadManager.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
DPF: {ED28050F-D713-43BA-A376-DCC5C35407D5} - hxxp://entimg.msn.com/client/msnmusax8729.cab
Handler: belarc - {6318E0AB-2E93-11D1-B8ED-00608CC9A71F} - c:\program files\belarc\advisor\system\BAVoilaX.dll
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
STS: Windows DreamScene: {e31004d1-a431-41b8-826f-e902f9d95c81} - %SystemRoot%\System32\DreamScene.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
mASetup: {7070D8E0-650A-46b3-B03C-9497582E6A74} - %SystemRoot%\system32\soundschemes.exe /AddRegistration
mASetup: {B3688A53-AB2A-4b1d-8CEF-8F93D8C51C24} - %SystemRoot%\system32\soundschemes2.exe /AddRegistration

============= SERVICES / DRIVERS ===============

R0 aswNdis;avast! Firewall NDIS Filter Service;c:\windows\system32\drivers\aswNdis.sys [2010-6-9 12112]
R0 aswNdis2;avast! Firewall Core Firewall Service;c:\windows\system32\drivers\aswNdis2.sys [2010-6-9 190416]
R1 aswFW;avast! TDI Firewall driver;c:\windows\system32\drivers\aswFW.sys [2010-6-9 99280]
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2010-6-9 307280]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2010-6-9 164048]
R1 RapportKELL;RapportKELL;c:\program files\trusteer\rapport\bin\RapportKELL.sys [2010-5-27 59240]
R1 RapportPG;RapportPG;c:\program files\trusteer\rapport\bin\RapportPG.sys [2010-5-27 166632]
R1 RsFx0103;RsFx0103 Driver;c:\windows\system32\drivers\RsFx0103.sys [2009-3-30 239336]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2010-6-9 19024]
R2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2010-6-9 51792]
R2 avast! Antivirus;avast! Antivirus;c:\program files\alwil software\avast5\AvastSvc.exe [2010-6-9 40384]
R2 avast! Firewall;avast! Firewall;c:\program files\alwil software\avast5\afwServ.exe [2010-6-9 119200]
R2 lxea_device;lxea_device;c:\windows\system32\lxeacoms.exe -service --> c:\windows\system32\lxeacoms.exe -service [?]
R2 lxeaCATSCustConnectService;lxeaCATSCustConnectService;c:\windows\system32\spool\drivers\w32x86\3\lxeaserv.exe [2010-4-27 193192]
R2 MsDtsServer;SQL Server Integration Services;c:\program files\microsoft sql server\90\dts\binn\MsDtsSrvr.exe [2008-11-24 203616]
R2 MsDtsServer100;SQL Server Integration Services 10.0;c:\program files\microsoft sql server\100\dts\binn\MsDtsSrvr.exe [2008-7-10 218136]
R2 msftesql$DEVELOPER2005;SQL Server FullText Search (DEVELOPER2005);c:\program files\microsoft sql server\mssql.1\mssql\binn\msftesql.exe [2007-6-22 95592]
R2 MSSQL$DEVELOPER2005;SQL Server (DEVELOPER2005);c:\program files\microsoft sql server\mssql.1\mssql\binn\sqlservr.exe [2009-5-27 29262680]
R2 MSSQL$DEVELOPER2008;SQL Server (DEVELOPER2008);c:\program files\microsoft sql server\mssql10.developer2008\mssql\binn\sqlservr.exe [2009-3-30 43010392]
R2 MSSQLFDLauncher$DEVELOPER2008;SQL Full-text Filter Daemon Launcher (DEVELOPER2008);c:\program files\microsoft sql server\mssql10.developer2008\mssql\binn\fdlauncher.exe [2008-7-10 31256]
R2 RapportMgmtService;Rapport Management Service;c:\program files\trusteer\rapport\bin\RapportMgmtService.exe [2010-5-27 840936]
R2 SQLAgent$DEVELOPER2005;SQL Server Agent (DEVELOPER2005);c:\program files\microsoft sql server\mssql.1\mssql\binn\SQLAGENT90.EXE [2008-11-24 346976]
R2 SQLAgent$DEVELOPER2008;SQL Server Agent (DEVELOPER2008);c:\program files\microsoft sql server\mssql10.developer2008\mssql\binn\SQLAGENT.EXE [2009-3-30 366936]
R3 avast! Mail Scanner;avast! Mail Scanner;c:\program files\alwil software\avast5\AvastSvc.exe [2010-6-9 40384]
R3 avast! Web Scanner;avast! Web Scanner;c:\program files\alwil software\avast5\AvastSvc.exe [2010-6-9 40384]
R3 HCW88TSE;Hauppauge WinTV 88x MPEG/TS Capture;c:\windows\system32\drivers\hcw88tse.sys [2007-1-24 299776]
R3 HCW88TUNE;Hauppauge WinTV 88x Tuner;c:\windows\system32\drivers\hcw88tun.sys [2007-1-24 149504]
R3 hcw88vid;Hauppauge WinTV 88x Video;c:\windows\system32\drivers\hcw88vid.sys [2007-1-24 498176]
R3 HCW88XBAR;Hauppauge WinTV 88x Crossbar;c:\windows\system32\drivers\hcw88bar.sys [2007-1-24 23552]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-5-3 135664]
S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
S3 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr.sys [2010-4-28 54632]
S3 fsssvc;Windows Live Family Safety Service;c:\program files\windows live\family safety\fsssvc.exe [2009-8-5 704864]
S3 VST_DPV;VST_DPV;c:\windows\system32\drivers\VSTDPV3.SYS [2008-1-20 987648]
S3 VSTHWBS2;VSTHWBS2;c:\windows\system32\drivers\VSTBS23.SYS [2008-1-20 251904]
S3 WMSvc;Web Management Service;c:\windows\system32\inetsrv\WMSvc.exe [2008-1-20 11264]
S4 MSSQLServerADHelper100;SQL Active Directory Helper Service;c:\program files\microsoft sql server\100\shared\sqladhlp.exe [2008-7-10 47128]
S4 msvsmon80;Visual Studio 2005 Remote Debugger;c:\program files\microsoft visual studio 8\common7\ide\remote debugger\x86\msvsmon.exe [2007-2-22 2808664]

=============== Created Last 30 ================

2010-06-13 19:57:30 0 ----a-w- c:\users\bill\defogger_reenable
2010-06-12 21:36:41 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdMtpDr_01_07_00.Wdf
2010-06-11 00:44:45 0 d-sh--w- C:\$RECYCLE.BIN
2010-06-11 00:10:47 77312 ----a-w- c:\windows\MBR.exe
2010-06-11 00:10:47 256512 ----a-w- c:\windows\PEV.exe
2010-06-11 00:10:46 98816 ----a-w- c:\windows\sed.exe
2010-06-11 00:10:46 161792 ----a-w- c:\windows\SWREG.exe
2010-06-10 02:04:49 232 ----a-w- c:\windows\reimage.ini
2010-06-09 18:11:45 307280 ----a-w- c:\windows\system32\drivers\aswSnx.sys
2010-06-09 18:11:42 99280 ----a-w- c:\windows\system32\drivers\aswFW.sys
2010-06-09 18:10:46 190416 ----a-w- c:\windows\system32\drivers\aswNdis2.sys
2010-06-09 18:10:44 51792 ----a-w- c:\windows\system32\drivers\aswMonFlt.sys
2010-06-09 18:09:37 12112 ----a-w- c:\windows\system32\drivers\aswNdis.sys
2010-06-09 18:09:22 0 d-----w- c:\programdata\Alwil Software
2010-06-09 13:40:56 249120950 ----a-w- c:\windows\MEMORY.DMP
2010-05-25 19:31:22 2048 ----a-w- c:\windows\system32\tzres.dll
2010-05-19 06:56:21 0 d-----w- c:\program files\SAMSUNG
2010-05-19 06:55:59 0 d-----w- c:\programdata\Samsung
2010-05-19 06:49:31 0 d-----w- c:\program files\Samsung Electronics
2010-05-17 23:44:13 0 d-----w- c:\program files\TurboTax

==================== Find3M ====================

2010-06-09 18:11:30 51200 ----a-w- c:\windows\inf\infpub.dat
2010-06-09 18:11:30 143360 ----a-w- c:\windows\inf\infstrng.dat
2010-06-09 18:11:29 86016 ----a-w- c:\windows\inf\infstor.dat
2010-04-29 01:30:03 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_07_00.Wdf
2010-04-28 02:16:34 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-04-27 04:34:24 665600 ----a-w- c:\windows\inf\drvindex.dat
2010-04-27 04:11:06 37665 ----a-w- c:\windows\fonts\GlobalUserInterface.CompositeFont
2010-04-27 01:08:48 0 ---ha-w- c:\windows\system32\drivers\Msft_Kernel_NuidFltr_01005.Wdf
2010-04-14 00:41:34 442368 ----a-w- c:\windows\system32\lxeacoin.dll
2010-04-01 11:53:54 348160 ----a-w- c:\windows\system32\msvcr71.dll
2010-04-01 11:53:52 499712 ----a-w- c:\windows\system32\msvcp71.dll
2008-01-21 02:41:56 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:40:37 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:40:37 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:40:37 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:40:37 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat

============= FINISH: 15:00:26.31 ===============

Merged posts. ~ OB

Attached Files


Edited by Orange Blossom, 14 June 2010 - 12:15 PM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:12 PM

Posted 18 June 2010 - 07:19 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 taoson

taoson
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 18 June 2010 - 09:51 PM

I'm still here. Thanks.

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:12 PM

Posted 19 June 2010 - 05:33 PM

You should not run ComboFix unless you are specifically asked to by a helper. Also, due to the power of this tool it is strongly advised that you do not attempt to act upon any of the information displayed by ComboFix without supervision from someone who has been properly trained. If you do so, it may lead to problems with the normal functionality of your computer.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

QUOTE
Reglock::
[HKEY_USERS\S-1-5-21-3745806335-1843824059-172262370-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*%€%*]
[HKEY_USERS\S-1-5-21-3745806335-1843824059-172262370-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*%€%*\OpenWithList]
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE

#5 taoson

taoson
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 19 June 2010 - 08:04 PM

I have attached the ComboFix log that was created based on the instructions in your earlier message. Thanks!

Attached Files



#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:12 PM

Posted 19 June 2010 - 08:36 PM

Looks good on the face of it but you must update the Combofix program.

Uninstall the one you have

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Disable any realtime antivirus or antispyware programs.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Now download and run it as below

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#7 taoson

taoson
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 19 June 2010 - 11:24 PM

Here's the new combofix.txt that you asked for. Thanks again!

Attached Files



#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:12 PM

Posted 20 June 2010 - 06:53 PM

Still looks okay.

Please run MBAM

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Now Superantispyware

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Posted Image
m0le is a proud member of UNITE

#9 taoson

taoson
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 21 June 2010 - 07:36 AM

MWB Log

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4219

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18904

6/20/2010 9:34:43 PM
mbam-log-2010-06-20 (21-34-43).txt

Scan type: Full scan (C:\|D:\|E:\|F:\|G:\|)
Objects scanned: 552576
Time elapsed: 2 hour(s), 14 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

SAS Log

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/20/2010 at 11:31 PM

Application Version : 4.39.1002

Core Rules Database Version : 5093
Trace Rules Database Version: 2905

Scan type : Complete Scan
Total Scan Time : 01:35:08

Memory items scanned : 820
Memory threats detected : 0
Registry items scanned : 11833
Registry threats detected : 0
File items scanned : 134845
File threats detected : 181

Adware.Tracking Cookie
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@atdmt[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@apmebf[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@ads.m4internet[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@bluestreak[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@avgtechnologies.112.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@2o7[3].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@tribalfusion[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@imrworldwide[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@doubleclick[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@fastclick[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@advertising[3].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@ad.yieldmanager[2].txt
a.ads2.msads.net [ C:\Users\Bill\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\J4Z67DJV ]
b.ads2.msads.net [ C:\Users\Bill\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\J4Z67DJV ]
cdn4.specificclick.net [ C:\Users\Bill\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\J4Z67DJV ]
media-ti.pictela.net [ C:\Users\Bill\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\J4Z67DJV ]
media.mtvnservices.com [ C:\Users\Bill\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\J4Z67DJV ]
media.scanscout.com [ C:\Users\Bill\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\J4Z67DJV ]
media.theonion.com [ C:\Users\Bill\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\J4Z67DJV ]
polltracker.talkingpointsmemo.com [ C:\Users\Bill\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\J4Z67DJV ]
s0.2mdn.net [ C:\Users\Bill\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\J4Z67DJV ]
secure-us.imrworldwide.com [ C:\Users\Bill\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\J4Z67DJV ]
videos.mediaite.com [ C:\Users\Bill\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\J4Z67DJV ]
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@2o7[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@adbrite[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@ads.m4internet[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@adserver.crawlspace-interactive[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@adserver.mommo[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@adverticum[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@advertising[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@atdmt[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@audit.median[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@doubleclick[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@microsoftinternetexplorer.112.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@microsoftsto.112.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\bill@msnportal.112.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@247realmedia[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@a1.interclick[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@accountonline[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ad.sbnation[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ad.wsod[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ad.yieldmanager[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@adbrite[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@adecn[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@adinterax[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@adlegend[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ads.ad4game[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ads.asp[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ads.bridgetrack[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ads.cnn[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ads.cpxadroit[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ads.m4internet[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ads.neudesicmediagroup[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ads.ourstage[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ads.pointroll[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ads.undertone[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@adserver.adtechus[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@adserver.crawlspace-interactive[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@advertising[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@adx.bidsystem[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@adxpose[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@apmebf[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@at.atwola[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@atdmt[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@avgtechnologies.112.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@azjmp[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@bannertgt[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@beacon.dmsinsights[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@bizrate[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@bluestreak[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@bs.serving-sys[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@bs.serving-sys[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@burstnet[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@buycom.122.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@casalemedia[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@cdn1.trafficmp[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@cdn4.specificclick[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@chitika[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@citi.bridgetrack[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@cmedia.com[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@collective-media[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@content.yieldmanager[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@content.yieldmanager[3].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@counter.hitslink[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@d.mediaforceads[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@data.coremetrics[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@dc.tremormedia[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@dealtime[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@dmtracker[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@doubleclick[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@e-2dj6wjl4oic5slp.stats.esomniture[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@e-2dj6wjlicgczsgo.stats.esomniture[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ehg-lexmark.hitbox[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ehg-zoomerang.hitbox[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@epson.112.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@eyewonder[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@fastclick[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@googleads.g.doubleclick[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@hitbox[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ice.112.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@imrworldwide[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@in.getclicky[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@insightexpressai[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@interclick[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@invitemedia[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@invitemedia[3].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@kontera[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@legolas-media[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@linksynergy[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@liveperson[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@liveperson[3].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@lockedonmedia[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@media.expedia[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@media6degrees[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@mediaforge[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@mediaite[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@mediaplex[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@mediaplex[3].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@microsoftsto.112.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@microsoftwindows.112.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@msnportal.112.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@network.realmedia[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@nextag[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@npca.rotator.hadj7.adjuggler[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@oasn04.247realmedia[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@oasn04.247realmedia[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ordie.adbureau[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@overture[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@pajamasmedia[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@paypal.112.2o7[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@pluckit.demandmedia[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@pointroll[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@pro-market[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@questionmarket[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@realmedia[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@revsci[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@richmedia.yahoo[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@ru4[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@sales.liveperson[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@sales.liveperson[3].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@sales.liveperson[4].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@sec1.liveperson[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@sec1.liveperson[3].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@server.iad.liveperson[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@server.iad.liveperson[3].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@serving-sys[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@specificclick[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@specificmedia[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@stat.dealtime[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@statcounter[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@stats.paypal[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@stats2.clicktracks[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@statse.webtrendslive[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@tacoda[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@traffic.buyservices[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@traffic.prod.cobaltgroup[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@trafficmp[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@tribalfusion[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@videoegg.adbureau[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@videos.mediaite[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@www.accountonline[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@www.burstnet[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@www.googleadservices[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@www.googleadservices[3].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@www.googleadservices[4].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@www.googleadservices[5].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@www.googleadservices[6].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@www.googleadservices[7].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@www.mediaite[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@www1.addfreestats[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@yieldmanager[1].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@zedo[2].txt
C:\Users\Bill\AppData\Roaming\Microsoft\Windows\Cookies\Low\bill@zillow.adbureau[2].txt

Adware.Flash Tracking Cookie
C:\Users\Bill\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\J4Z67DJV\MEDIA.MTVNSERVICES.COM
C:\Users\Bill\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\J4Z67DJV\MEDIA.THEONION.COM
C:\Users\Bill\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\J4Z67DJV\POLLTRACKER.TALKINGPOINTSMEMO.COM
C:\Users\Bill\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\J4Z67DJV\A.ADS2.MSADS.NET
C:\Users\Bill\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\J4Z67DJV\B.ADS2.MSADS.NET
C:\Users\Bill\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\J4Z67DJV\S0.2MDN.NET
C:\Users\Bill\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\J4Z67DJV\SECURE-US.IMRWORLDWIDE.COM


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:12 PM

Posted 21 June 2010 - 01:06 PM

So far nothing really nasty. Tracking cookies are bad but they don't send out email, that's for the real malware to do and that is visible during this many scans.


Final check to see if anything is leftover which might give us a clue

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#11 taoson

taoson
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 22 June 2010 - 07:25 AM

No Threats Found

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:12 PM

Posted 22 June 2010 - 01:29 PM

There are no infections on the PC.

When did your PC last send one of these emails?
Posted Image
m0le is a proud member of UNITE

#13 taoson

taoson
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 22 June 2010 - 01:48 PM

It sent out a few emails in the early morning of June 9th. I have had it disconnected from the internet since I found out later that morning.

Remember that I jumped the gun and ran ComboFix first thing. Maybe that got rid of it?

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:12 PM

Posted 22 June 2010 - 06:06 PM

I can't see anything else that could be doing this.

Reconnect to the internet and give it a day or so and see if any emails are sent in that period.

I'll wait... whistling.gif smile.gif

Edited by m0le, 22 June 2010 - 06:08 PM.

Posted Image
m0le is a proud member of UNITE

#15 taoson

taoson
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:03:12 PM

Posted 22 June 2010 - 07:30 PM

I'll do it. Hope your going somewhere fun for the next few days.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users