Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trendmicro Pop-up / infected with GRAY_Gen.CX46U3


  • This topic is locked This topic is locked
12 replies to this topic

#1 afh930

afh930

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:31 PM

Posted 10 July 2010 - 09:19 PM

I have Trendmicro security protection on my laptop (PC with windows vista) and for the past 2 days i have had a Trendmicro pop-up that tells me "Trend Micro Internet Security has identified a potential threat in one of [my] files. Click the link below to learn more about it", but I have not been able to quarantine, delete, or fix the file, which I can't figure out how to identify to begin with. I followed the Preparation Guide, so I'll attach everything below. (I'm not the most computer/tech-savvy, but I did my best to follow the instructions, despite not understanding)


Additionally, my iTunes library just began having problems (today), which I think may be related. When I try to open iTunes, I am told: The file "iTunes Library.itl" cannot be read because it was created by a newer version of iTunes. I do not know what that means and cannot begin to think of how to fix it. Thankfully, I have my library backed up to CD, but this is still problematic! If someone knows how to help with that also, it would be greatly appreciated! (I don't use limewire or other types of illegal downloads, so all my music is safely and legally obtained; I'm not sure why it's not working or why/how there would be an issue)


DDS (Ver_10-03-17.01) - NTFSX64
Run by Aliana at 20:45:06.50 on Sat 07/10/2010
Internet Explorer: 8.0.6001.18928
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.4054.1432 [GMT -4:00]

AV: Trend Micro Internet Security *On-access scanning enabled* (Outdated) {7D2296BC-32CC-4519-917E-52E652474AF5}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_a2af78c4\STacSV64.exe
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Program Files\Dell\DellDock\DockLogin.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\WLTRYSVC.EXE
C:\Windows\System32\bcmwltry.exe
C:\Windows\system32\WLANExt.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_a2af78c4\AESTSr64.exe
C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files (x86)\Bonjour\mDNSResponder.exe
C:\Program Files (x86)\Sensible Vision\Fast Access\FAService.exe
C:\Windows\SysWOW64\svchost.exe -k hpdevmgmt
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\Iomega\REV System Software\RevUDF.exe
C:\Program Files (x86)\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Program Files\Iomega\REV System Software\ImIconXp.exe
C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\Trend Micro\BM\TMBMSRV.exe
C:\Program Files (x86)\Viewpoint\Common\ViewpointService.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\DellTPad\Apoint.exe
C:\Program Files\IDT\WDM\sttray64.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\igfxpers.exe
C:\Windows\System32\WLTRAY.EXE
C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Trend Micro\Internet Security\TMAS_OE\TMAS_OEMon.exe
C:\Program Files (x86)\Dell Video Chat\DellVideoChat.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files (x86)\AIM\aim.exe
C:\Program Files (x86)\ooVoo\ooVoo.exe
C:\Program Files (x86)\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\Program Files\Dell\DellDock\DellDock.exe
C:\Program Files (x86)\Java\jre6\bin\jusched.exe
C:\Program Files (x86)\Sensible Vision\Fast Access\FATrayMon.exe
C:\Program Files (x86)\Dell\MediaDirect\PCMService.exe
C:\Program Files (x86)\HP\HP Software Update\hpwuSchd2.exe
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Program Files (x86)\Sensible Vision\Fast Access\FATrayAlert.exe
C:\Program Files (x86)\HBLite\bin\11.0.181.0\HBLiteSA.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\igfxsrvc.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files (x86)\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\DellTPad\ApMsgFwd.exe
C:\Program Files\DellTPad\HidFind.exe
C:\Program Files\DellTPad\Apntex.exe
C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe
C:\Program Files (x86)\Mozilla Firefox\firefox.exe
C:\Program Files (x86)\Windows Live\Contacts\wlcomm.exe
C:\Windows\system32\wuauclt.exe
C:\Program Files (x86)\Java\jre6\bin\jucheck.exe
C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
C:\Program Files (x86)\Internet Explorer\IELowutil.exe
C:\Program Files (x86)\Microsoft Office\OFFICE11\WINWORD.EXE
C:\Program Files (x86)\Microsoft\Office Live\OfficeLiveSignIn.exe
C:\Windows\splwow64.exe
C:\Windows\System32\svchost.exe -k HPZ12
C:\Windows\system32\msiexec.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files (x86)\iTunes\iTunesHelper.exe
C:\Program Files (x86)\iTunes\iTunes.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Users\Aliana\Downloads\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.mystart.com?pr=oovoo2_0
uWindow Title = Internet Explorer provided by Dell
mLocal Page = c:\windows\syswow64\blank.htm
uInternet Settings,ProxyOverride = *.local
uURLSearchHooks: AIM Toolbar Search Class: {03402f96-3dc7-4285-bc50-9e81fefafe43} - c:\program files (x86)\aim toolbar\aimtb.dll
mURLSearchHooks: AIM Toolbar Search Class: {03402f96-3dc7-4285-bc50-9e81fefafe43} - c:\program files (x86)\aim toolbar\aimtb.dll
mWinlogon: Userinit=userinit.exe
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files (x86)\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Skype add-on (mastermind): {22bf413b-c6d2-4d91-82a9-a0f997ba588c} - c:\program files (x86)\skype\toolbars\internet explorer\SkypeIEPlugin.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files (x86)\microsoft\search enhancement pack\search helper\SEPsearchhelperie.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files (x86)\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Search Toolbar: {9d425283-d487-4337-bab6-ab8354a81457} - c:\program files (x86)\search toolbar\SearchToolbar.dll
BHO: ooVoo Toolbar: {a1fb2f9a-d35e-11dd-8935-e46a56d89593} - c:\program files (x86)\oovootb\oovoodx.dll
BHO: FAIESSOHelper Class: {a2f122da-055f-4df7-8f24-7354dbdba85b} - c:\program files (x86)\sensible vision\fast access\FAIESSO.dll
BHO: AIM Toolbar Loader: {b0cda128-b425-4eef-a174-61a11ac5dbf8} - c:\program files (x86)\aim toolbar\aimtb.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files (x86)\java\jre6\bin\jp2ssv.dll
BHO: Windows Live Toolbar Helper: {e15a8dc0-8516-42a1-81ea-dc94ec1acf10} - c:\program files (x86)\windows live\toolbar\wltcore.dll
TB: ooVoo Toolbar: {a1fb2f9a-d35e-11dd-8935-e46a56d89593} - c:\program files (x86)\oovootb\oovoodx.dll
TB: AIM Toolbar: {61539ecd-cc67-4437-a03c-9aaccbd14326} - c:\program files (x86)\aim toolbar\aimtb.dll
TB: &Windows Live Toolbar: {21fa44ef-376d-4d53-9b0f-8a89d3229068} - c:\program files (x86)\windows live\toolbar\wltcore.dll
TB: Search Toolbar: {9d425283-d487-4337-bab6-ab8354a81457} - c:\program files (x86)\search toolbar\SearchToolbar.dll
uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
uRun: [msnmsgr] "c:\program files (x86)\windows live\messenger\msnmsgr.exe" /background
uRun: [OE] "c:\program files\trend micro\internet security\tmas_oe\TMAS_OEMon.exe"
uRun: [SightSpeed] "c:\program files (x86)\dell video chat\DellVideoChat.exe" -bootmode
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [Aim] "c:\program files (x86)\aim\aim.exe" /d locale=en-US
uRun: [ooVoo.exe] c:\program files (x86)\oovoo\oovoo.exe /minimized
uRun: [WMPNSCFG] c:\program files (x86)\windows media player\WMPNSCFG.exe
mRun: [SunJavaUpdateSched] "c:\program files (x86)\java\jre6\bin\jusched.exe"
mRun: [FATrayAlert] c:\program files (x86)\sensible vision\fast access\FATrayMon.exe
mRun: [Dell Webcam Central] "c:\program files (x86)\dell webcam\dell webcam central\WebcamDell.exe" /mode2
mRun: [PCMService] "c:\program files (x86)\dell\mediadirect\PCMService.exe"
mRun: [FAStartup]
mRun: [HP Software Update] c:\program files (x86)\hp\hp software update\HPWuSchd2.exe
mRun: [<NO NAME>]
mRun: [Adobe Reader Speed Launcher] "c:\program files (x86)\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files (x86)\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [QuickTime Task] "c:\program files (x86)\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files (x86)\itunes\iTunesHelper.exe"
mRun: [HBLiteSA] "c:\program files (x86)\hblite\bin\11.0.181.0\HBLiteSA.exe"
StartupFolder: c:\users\aliana\appdata\roaming\micros~1\windows\startm~1\programs\startup\delldo~1.lnk - c:\program files\dell\delldock\DellDock.exe
StartupFolder: c:\progra~3\micros~1\windows\startm~1\programs\startup\hpdigi~1.lnk - c:\program files (x86)\hp\digital imaging\bin\hpqtra08.exe
StartupFolder: c:\progra~3\micros~1\windows\startm~1\programs\startup\quickset.lnk - c:\program files\dell\quickset\quickset.exe
mPolicies-explorer: NoActiveDesktop = 1 (0x1)
mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
mPolicies-explorer: ForceActiveDesktopOn = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~2\micros~2\office11\EXCEL.EXE/3000
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files (x86)\windows live\writer\WriterBrowserExtension.dll
IE: {5067A26B-1337-4436-8AFE-EE169C2DA79F} - {77BF5300-1474-4EC7-9980-D32B190E9B07} - c:\program files (x86)\skype\toolbars\internet explorer\SkypeIEPlugin.dll
IE: {77BF5300-1474-4EC7-9980-D32B190E9B07} - {77BF5300-1474-4EC7-9980-D32B190E9B07} - c:\program files (x86)\skype\toolbars\internet explorer\SkypeIEPlugin.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~2\micros~2\office11\REFIEBAR.DLL
DPF: Garmin Communicator Plug-In - hxxps://static.garmincdn.com/gcp/ie/2.9.1.0/GarminAxControl.CAB
DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} - hxxps://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~2\common~1\skype\SKYPE4~1.DLL
Notify: FastAccess - c:\program files (x86)\sensible vision\fast access\FALogNot.dll
LSA: Notification Packages = scecli FAPassSync
BHO-X64: Windows Live ID Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
TB-X64: {21FA44EF-376D-4D53-9B0F-8A89D3229068} - No File
TB-X64: AIM Toolbar: {61539ECD-CC67-4437-A03C-9AACCBD14326} -
TB-X64: {9D425283-D487-4337-BAB6-AB8354A81457} - No File
mRun-x64: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun-x64: [Apoint] c:\program files\delltpad\Apoint.exe
mRun-x64: [SysTrayApp] %ProgramFiles%\IDT\WDM\sttray64.exe
mRun-x64: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun-x64: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun-x64: [Persistence] c:\windows\system32\igfxpers.exe
mRun-x64: [Broadcom Wireless Manager UI] c:\windows\system32\WLTRAY.exe
mRun-x64: [UfSeAgnt.exe] "c:\program files\trend micro\internet security\UfSeAgnt.exe"

================= FIREFOX ===================

FF - ProfilePath - c:\users\aliana\appdata\roaming\mozilla\firefox\profiles\u6ep5fy0.default\
FF - prefs.js: browser.search.defaulturl - hxxp://aim.search.aol.com/aol/search?query={searchTerms}&invocationType=tb50-ff-aim-chromesbox-en-us
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.aol.com/?src=aim&ncid=snsusaimc00000001
FF - prefs.js: keyword.URL - hxxp://slirsredirect.search.aol.com/redirector/sredir?sredir=2706&invocationType=tb50-ff-aim-ab-en-us&query=
FF - plugin: c:\program files (x86)\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files (x86)\google\update\1.2.183.29\npGoogleOneClick8.dll
FF - plugin: c:\program files (x86)\hblite\bin\11.0.181.0\firefox\extensions\plugins\npclntax_HBLiteSA.dll
FF - plugin: c:\program files (x86)\ksolo\npAVX.dll
FF - plugin: c:\program files (x86)\microsoft\office live\npOLW.dll
FF - plugin: c:\program files (x86)\mozilla firefox\plugins\npclntax_HBLiteSA.dll
FF - plugin: c:\program files (x86)\mozilla firefox\plugins\npdnu.dll
FF - plugin: c:\program files (x86)\mozilla firefox\plugins\npdnupdater2.dll
FF - plugin: c:\program files (x86)\viewpoint\viewpoint media player\npViewpoint.dll
FF - plugin: c:\program files (x86)\windows live\photo gallery\NPWLPG.dll
FF - plugin: c:\users\aliana\appdata\roaming\facebook\npfbplugin_1_0_3.dll
FF - plugin: c:\users\aliana\appdata\roaming\move networks\plugins\npqmp071503000010.dll
FF - plugin: c:\users\aliana\appdata\roaming\move networks\plugins\npqmp071701000002.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\

---- FIREFOX POLICIES ----
FF - user.js: network.protocol-handler.warn-external.dnupdate - false);user_pref(network.protocol-handler.warn-external.dnupdate, false
FF - user.js: browser.sessionstore.resume_from_crash - false
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files (x86)\mozilla firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files (x86)\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files (x86)\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files (x86)\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files (x86)\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files (x86)\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
c:\program files (x86)\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files (x86)\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
c:\program files (x86)\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files (x86)\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);

============= SERVICES / DRIVERS ===============

R0 imdrv64;Iomega File System Filter Driver x64;c:\windows\system32\drivers\imdrv64.sys [2007-1-5 43256]
R0 PxHlpa64;PxHlpa64;c:\windows\system32\drivers\PxHlpa64.sys [2009-2-9 53488]
R1 tmlwf;Trend Micro NDIS 6.0 Filter Driver;c:\windows\system32\drivers\tmlwf.sys [2008-10-3 192528]
R2 tmpreflt;tmpreflt;c:\windows\system32\drivers\tmpreflt.sys [2010-7-10 42000]
R2 tmwfp;Trend Micro WFP Callout Driver;c:\windows\system32\drivers\tmwfp.sys [2008-10-3 277008]
R3 IntcHdmiAddService;Intel® High Definition Audio HDMI;c:\windows\system32\drivers\IntcHdmi.sys [2009-2-9 126464]
R3 itecir;ITECIR Infrared Receiver;c:\windows\system32\drivers\itecir.sys [2009-6-12 59392]
R3 k57nd60a;Broadcom NetLink ™ Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\k57nd60a.sys [2009-2-9 239104]
R3 OA001Ufd;Creative Camera OA001 Upper Filter Driver;c:\windows\system32\drivers\OA001Ufd.sys [2009-3-6 159840]
R3 OA001Vid;Creative Camera OA001 Function Driver;c:\windows\system32\drivers\OA001Vid.sys [2009-3-8 319840]
S3 FACAP;facap, FastAccess Video Capture;c:\windows\system32\drivers\facap.sys [2008-8-2 243840]

============== File Associations ===============

JSEFile=c:\windows\syswow64\WScript.exe "%1" %*

=============== Created Last 30 ================

2010-07-10 15:29:48 265744 ----a-w- c:\windows\system32\drivers\tmxpflt.sys
2010-07-10 15:29:48 2007056 ----a-w- c:\windows\system32\drivers\vsapint.sys
2010-07-10 15:29:47 42000 ----a-w- c:\windows\system32\drivers\tmpreflt.sys
2010-07-10 14:51:25 65536 --sha-w- c:\users\aliana\ntuser.dat{7b65553f-8c32-11df-b397-002219e239bb}.TM.blf
2010-07-10 14:51:25 524288 --sha-w- c:\users\aliana\ntuser.dat{7b65553f-8c32-11df-b397-002219e239bb}.TMContainer00000000000000000002.regtrans-ms
2010-07-10 14:51:25 524288 --sha-w- c:\users\aliana\ntuser.dat{7b65553f-8c32-11df-b397-002219e239bb}.TMContainer00000000000000000001.regtrans-ms
2010-06-26 14:41:25 0 d-----w- c:\program files\iPod(329)
2010-06-26 14:41:17 0 d-----w- c:\program files (x86)\iTunes(169)
2010-06-26 14:32:29 0 d-----w- c:\program files (x86)\Bonjour(25)
2010-06-18 22:58:38 0 d-----w- c:\users\aliana\appdata\roaming\HBLite
2010-06-18 22:58:38 0 d-----w- c:\programdata\HBLiteSA
2010-06-18 22:57:31 0 d-----w- c:\program files (x86)\Search Toolbar
2010-06-18 22:57:22 0 d-----w- c:\programdata\2ACA5CC3-0F83-453D-A079-1076FE1A8B65
2010-06-18 22:57:21 0 d-----w- c:\program files (x86)\HBLite
2010-06-11 23:40:18 0 d-----w- c:\users\aliana\appdata\roaming\oovooinstaller

==================== Find3M ====================

2010-06-23 21:55:55 10944 ----a-w- c:\users\aliana\appdata\roaming\wklnhst.dat
2010-05-26 16:53:52 48128 ----a-w- c:\windows\system32\atmlib.dll
2010-05-26 16:16:50 34304 ----a-w- c:\windows\syswow64\atmlib.dll
2010-05-26 14:56:53 366080 ----a-w- c:\windows\system32\atmfd.dll
2010-05-26 14:25:15 289792 ----a-w- c:\windows\syswow64\atmfd.dll
2010-05-04 06:56:19 1147904 ----a-w- c:\windows\system32\wininet.dll
2010-05-04 06:51:49 132096 ----a-w- c:\windows\system32\iesysprep.dll
2010-05-04 06:51:48 77312 ----a-w- c:\windows\system32\iesetup.dll
2010-05-04 05:59:21 916480 ----a-w- c:\windows\syswow64\wininet.dll
2010-05-04 05:59:11 1209344 ----a-w- c:\windows\syswow64\urlmon.dll
2010-05-04 05:58:07 206848 ----a-w- c:\windows\syswow64\occache.dll
2010-05-04 05:56:49 611840 ----a-w- c:\windows\syswow64\mstime.dll
2010-05-04 05:56:28 5950976 ----a-w- c:\windows\syswow64\mshtml.dll
2010-05-04 05:56:25 599040 ----a-w- c:\windows\syswow64\msfeeds.dll
2010-05-04 05:56:25 55296 ----a-w- c:\windows\syswow64\msfeedsbs.dll
2010-05-04 05:55:56 25600 ----a-w- c:\windows\syswow64\jsproxy.dll
2010-05-04 05:55:42 71680 ----a-w- c:\windows\syswow64\iesetup.dll
2010-05-04 05:55:42 1985536 ----a-w- c:\windows\syswow64\iertutil.dll
2010-05-04 05:55:42 164352 ----a-w- c:\windows\syswow64\ieui.dll
2010-05-04 05:55:42 109056 ----a-w- c:\windows\syswow64\iesysprep.dll
2010-05-04 05:55:41 55808 ----a-w- c:\windows\syswow64\iernonce.dll
2010-05-04 05:55:41 184320 ----a-w- c:\windows\syswow64\iepeers.dll
2010-05-04 05:55:41 11076096 ----a-w- c:\windows\syswow64\ieframe.dll
2010-05-04 05:55:37 387584 ----a-w- c:\windows\syswow64\iedkcs32.dll
2010-05-04 05:01:59 162816 ----a-w- c:\windows\system32\ieUnatt.exe
2010-05-04 04:31:05 133632 ----a-w- c:\windows\syswow64\ieUnatt.exe
2010-05-04 04:30:58 173056 ----a-w- c:\windows\syswow64\ie4uinit.exe
2010-05-04 04:30:19 13312 ----a-w- c:\windows\syswow64\msfeedssync.exe
2010-05-01 14:26:09 2749952 ----a-w- c:\windows\system32\win32k.sys
2010-04-23 14:24:29 2048 ----a-w- c:\windows\system32\tzres.dll
2010-04-23 13:55:52 2048 ----a-w- c:\windows\syswow64\tzres.dll
2010-04-16 16:40:20 1570816 ----a-w- c:\windows\system32\quartz.dll
2010-04-16 16:10:05 1314816 ----a-w- c:\windows\syswow64\quartz.dll
2010-04-11 00:05:30 86016 ----a-w- c:\windows\inf\infstor.dat
2010-04-11 00:05:30 51200 ----a-w- c:\windows\inf\infpub.dat
2010-04-11 00:05:30 143360 ----a-w- c:\windows\inf\infstrng.dat
2009-02-09 16:24:29 665600 ----a-w- c:\windows\inf\drvindex.dat
2008-01-21 03:21:59 174 --sha-w- c:\program files\desktop.ini
2008-01-21 03:21:59 174 --sha-w- c:\program files (x86)\desktop.ini
2006-11-02 15:14:56 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 15:14:56 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 15:14:56 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 15:14:56 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 10:52:12 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 10:52:12 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 10:52:10 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 10:52:10 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2009-02-09 15:02:23 75 --sha-r- c:\windows\CT4CET.bin
2010-04-11 00:20:24 245760 --sha-w- c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\windows\ietldcache\index.dat
2010-01-12 05:16:36 245760 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\ietldcache\index.dat
2009-02-09 15:51:40 8192 --sha-w- c:\windows\users\default\NTUSER.DAT

============= FINISH: 20:47:12.58 ===============

**When I ran the gmer, nothing came up but I still saved the (blank) scan; it told me that there were no system modifications, so I'm not sure what to think about that.**

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:31 PM

Posted 14 July 2010 - 06:56 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:31 PM

Posted 19 July 2010 - 06:49 PM

This topic has been closed.

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:31 PM

Posted 24 July 2010 - 03:49 PM

Reopened at user's request

-----------------------------------------

Hey,

There's nothing that I can see on the logs. Gmer stating that there are no modifications is a good sign too.

Please run MBAM and Superantispyware and let's see if anything turns up.

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Then

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Posted Image
m0le is a proud member of UNITE

#5 afh930

afh930
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:31 PM

Posted 25 July 2010 - 11:18 AM

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4345

Windows 6.0.6001 Service Pack 1
Internet Explorer 8.0.6001.18928

7/25/2010 12:15:00 PM
mbam-log-2010-07-25 (12-15-00).txt

Scan type: Full scan (C:\|D:\|E:\|)
Objects scanned: 293742
Time elapsed: 2 hour(s), 1 minute(s), 22 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 1
Registry Keys Infected: 25
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 9
Files Infected: 22

Memory Processes Infected:
C:\Program Files (x86)\HBLite\bin\11.0.181.0\HBLiteSA.exe (Adware.Hotbar) -> Unloaded process successfully.

Memory Modules Infected:
c:\program files (x86)\HBLite\bin\11.0.181.0\hblitesahook.dll (Adware.Hotbar) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\hbliteax.info (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{6f098504-cdb1-420f-a2e6-ddc0b835fedf} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{30b15818-e110-4527-9c05-46ace5a3460d} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{618aad04-921f-44c2-be38-c0818af69861} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{b5d2ed96-62f9-4c2c-956d-e425b1f67337} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{d3a412e8-1e4b-47d2-9b12-f88291f5afbb} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4d1ec4ca-4b92-4324-b8f8-c9a6ed06a8ae} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{4d1ec4ca-4b92-4324-b8f8-c9a6ed06a8ae} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4e674574-3f0b-491d-8ae3-f90b43a34fd6} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{4e674574-3f0b-491d-8ae3-f90b43a34fd6} (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbliteax.info.1 (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbliteax.userprofiles (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\hbliteax.userprofiles.1 (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\searchtoolbarlib.csearchtoolbarimpl (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\searchtoolbarlib.csearchtoolbarimpl.1 (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{a078f691-9c07-4af2-bf43-35e79eecf8b7} (Adware.Softomate) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\search toolbar (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\HBLite (Adware.HotBar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HBLiteSA (Adware.HotBar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\hblitesa (Adware.HotBar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Zugo (Adware.Zugo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hblitesa (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{9d425283-d487-4337-bab6-ab8354a81457} (Adware.Zugo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions\hblite@hblite.com (Adware.HotBar) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\ProgramData\2ACA5CC3-0F83-453D-A079-1076FE1A8B65 (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Program Files (x86)\HBLite (Adware.Hotbar) -> Delete on reboot.
C:\Program Files (x86)\HBLite\bin (Adware.Hotbar) -> Delete on reboot.
C:\Program Files (x86)\HBLite\bin\11.0.181.0 (Adware.Hotbar) -> Delete on reboot.
C:\Program Files (x86)\HBLite\bin\11.0.181.0\firefox (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\Program Files (x86)\HBLite\bin\11.0.181.0\firefox\extensions (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\Program Files (x86)\HBLite\bin\11.0.181.0\firefox\extensions\plugins (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\HBLiteSA (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\Users\Aliana\AppData\Roaming\HBLite (Adware.Hotbar) -> Delete on reboot.

Files Infected:
C:\Program Files (x86)\HBLite\bin\11.0.181.0\HBLiteSA.exe (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\Program Files (x86)\HBLite\bin\11.0.181.0\HBLiteSAAX.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\Program Files (x86)\Search Toolbar\SearchToolbar.dll (Adware.Zugo) -> Quarantined and deleted successfully.
C:\Program Files (x86)\HBLite\bin\11.0.181.0\LaunchHelp.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Program Files (x86)\HBLite\bin\11.0.181.0\firefox\extensions\plugins\npclntax_HBLiteSA.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\Program Files (x86)\Mozilla Firefox\plugins\npclntax_HBLiteSA.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\Program Files (x86)\Search Toolbar\SearchToolbarUninstall.exe (Adware.Zugo) -> Quarantined and deleted successfully.
C:\Users\Aliana\AppData\Local\Temp\nsiD0C6.tmp\Install.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Users\Aliana\AppData\Local\Temp\nsyD02A.tmp\Install.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Users\Aliana\AppData\Local\Temp\nsyD02A.tmp\Resource.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\Users\Aliana\Downloads\Setup(2).exe (Adware.HotBar) -> Quarantined and deleted successfully.
C:\Users\Aliana\Downloads\Setup.exe (Adware.HotBar) -> Quarantined and deleted successfully.
C:\Program Files (x86)\HBLite\bin\11.0.181.0\HBLiteSAHook.dll (Adware.Hotbar) -> Delete on reboot.
C:\Program Files (x86)\HBLite\bin\11.0.181.0\firefox\extensions\chrome.manifest (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\Program Files (x86)\HBLite\bin\11.0.181.0\firefox\extensions\install.rdf (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\HBLiteSA\HBLiteSA.dat (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\HBLiteSA\HBLiteSAAbout.mht (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\HBLiteSA\HBLiteSAau.dat (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\HBLiteSA\HBLiteSAEULA.mht (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\HBLiteSA\HBLiteSA_hpk.dat (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\HBLiteSA\HBLiteSA_kyf.dat (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\End of the Year Letter to Class.doc (Trojan.FakeAlert) -> Quarantined and deleted successfully.


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:31 PM

Posted 27 July 2010 - 07:11 PM

Still waiting for the second scan with Superantispyware...
Posted Image
m0le is a proud member of UNITE

#7 afh930

afh930
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:31 PM

Posted 29 July 2010 - 08:50 PM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/25/2010 at 04:48 PM

Application Version : 4.41.1000

Core Rules Database Version : 5265
Trace Rules Database Version: 3077

Scan type : Complete Scan
Total Scan Time : 01:07:36

Memory items scanned : 572
Memory threats detected : 0
Registry items scanned : 13664
Registry threats detected : 0
File items scanned : 40248
File threats detected : 14

Adware.Tracking Cookie
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@citi.bridgetrack[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@doubleclick[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@at.atwola[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@ar.atwola[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@content.yieldmanager[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@cdn.at.atwola[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@ar.atwola[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@atwola[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@tacoda[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@ad.yieldmanager[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@atdmt[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@advertising[1].txt
.at.atwola.com [ C:\Users\Aliana\AppData\Roaming\Mozilla\Firefox\Profiles\u6ep5fy0.default\cookies.sqlite ]
serving-sys.com [ C:\Users\Joanne\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\B3KREH5A ]

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/25/2010 at 02:38 PM

Application Version : 4.41.1000

Core Rules Database Version : 5265
Trace Rules Database Version: 3077

Scan type : Complete Scan
Total Scan Time : 01:16:13

Memory items scanned : 568
Memory threats detected : 0
Registry items scanned : 13664
Registry threats detected : 0
File items scanned : 40243
File threats detected : 168

Adware.Tracking Cookie
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@cts.metricsdirect[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@cts.zroitracker[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@doubleclick[3].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@adrevolver[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@apmebf[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@ads.bridgetrack[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@at.atwola[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@ar.atwola[4].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@content.yieldmanager[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@lfstmedia[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@adbrite[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@pointroll[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@collective-media[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@fastclick[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@cdn.at.atwola[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@invitemedia[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@ar.atwola[3].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@questionmarket[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@tribalfusion[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@atwola[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@content.licenseacquisition[4].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@ads.pointroll[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@msnportal.112.2o7[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@media.adrevolver[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@tacoda[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@zedo[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@media.licenseacquisition[4].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@mediaplex[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@bs.serving-sys[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@ad.yieldmanager[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@eyewonder[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@atdmt[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@serving-sys[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@advertising[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@yieldmanager[2].txt
.apmebf.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.mediaplex.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.mediaplex.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.doubleclick.net [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ru4.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ru4.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ru4.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.imrworldwide.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.imrworldwide.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.burstnet.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.www.burstnet.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
www.burstbeacon.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.burstbeacon.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
www.burstnet.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
optimize.indieclick.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.content.yieldmanager.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.content.yieldmanager.com [ C:\Users\Aliana\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
a.media.soapnet.go.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
acvs.mediaonenetwork.net [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
adimages.scrippsnetworks.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
cdn4.specificclick.net [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
convoad.technoratimedia.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
core.insightexpressai.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
crackle.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
ec.atdmt.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
googleads.g.doubleclick.net [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
i.adultswim.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
ia.media-imdb.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
indieclick.3janecdn.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
interclick.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
m1.2mdn.net [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
media.entertonement.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
media.mtvnservices.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
media.mtvu.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
media.nbcphiladelphia.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
media.scanscout.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
media.socialvibe.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
media.thewb.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
media01.kyte.tv [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
media1.break.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
mediaforgews.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
msnbcmedia.msn.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
objects.tremormedia.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
s0.2mdn.net [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
secure-us.imrworldwide.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
service.twistage.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
serving-sys.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
static.2mdn.net [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
super.sexcontents.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
udn.specificclick.net [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
www.promdressfinder.seventeen.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
www.seventeen.com [ C:\Users\Aliana\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\5WA5A939 ]
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@media.licenseacquisition[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@media.licenseacquisition[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@doubleclick[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@ar.atwola[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\aliana@atwola[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@doubleclick[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@2o7[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@atdmt[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@sales.liveperson[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@apmebf[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@atwola[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@adbrite[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@liveperson[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@ad.yieldmanager[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@eyewonder[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@casalemedia[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@snapfish.112.2o7[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@ar.atwola[3].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@ar.atwola[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@zedo[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@liveperson[3].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@imrworldwide[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@fastclick[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@tacoda[2].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@at.atwola[1].txt
C:\Users\Aliana\AppData\Roaming\Microsoft\Windows\Cookies\Low\aliana@advertising[2].txt
.at.atwola.com [ C:\Users\Aliana\AppData\Roaming\Mozilla\Firefox\Profiles\u6ep5fy0.default\cookies.sqlite ]
serving-sys.com [ C:\Users\Joanne\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\B3KREH5A ]
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@atwola[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@doubleclick[1].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@ad.yieldmanager[1].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@statcounter[1].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@chitika[1].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@ar.atwola[1].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@ar.atwola[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@tacoda[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@casalemedia[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@bs.serving-sys[1].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@at.atwola[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@tribalfusion[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@2o7[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@ads.freefoto[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@advertising[1].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@atdmt[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@edge.ru4[1].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@msnportal.112.2o7[1].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@questionmarket[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@revenue[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@serving-sys[2].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@specificclick[1].txt
C:\Users\Joanne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joanne@tradedoubler[1].txt

Adware.Flash Tracking Cookie
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\SERVING-SYS.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\A.MEDIA.SOAPNET.GO.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\ACVS.MEDIAONENETWORK.NET
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\CONVOAD.TECHNORATIMEDIA.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\IA.MEDIA-IMDB.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\MEDIA.ENTERTONEMENT.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\MEDIA.MTVNSERVICES.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\MEDIA1.BREAK.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\MEDIAFORGEWS.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\MSNBCMEDIA.MSN.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\OBJECTS.TREMORMEDIA.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\I.ADULTSWIM.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\SUPER.SEXCONTENTS.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\INTERCLICK.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\UDN.SPECIFICCLICK.NET
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\CRACKLE.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\ADIMAGES.SCRIPPSNETWORKS.COM
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\M1.2MDN.NET
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\S0.2MDN.NET
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\STATIC.2MDN.NET
C:\Users\Aliana\AppData\Roaming\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\5WA5A939\SECURE-US.IMRWORLDWIDE.COM


sorry, i had trouble figuring out the second program. i ended up running the scan twice also because i couldn't find the log.

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:31 PM

Posted 30 July 2010 - 04:51 AM

No problem. thumbup2.gif

So far this is looking very good. Please run ESET's online scanner next
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#9 afh930

afh930
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:31 PM

Posted 01 August 2010 - 08:25 AM

No threats were found with the ESET scan

#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:31 PM

Posted 01 August 2010 - 05:01 PM

Any PC issues at the moment?
Posted Image
m0le is a proud member of UNITE

#11 afh930

afh930
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:31 PM

Posted 02 August 2010 - 09:49 PM

I don't have any issues with my laptop now, so I think everything is okay and back to normal! Thank you so much!!

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:31 PM

Posted 03 August 2010 - 01:42 PM

Good news, just the final instructions to do then...

You're clean. Good stuff! thumbup2.gif

Let's do some clearing up

Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Jdk 6 Update 20 (JDK or JRE)".
  • Click the "Download JRE" button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u20-windows-i586-p.exe to install the newest version.
-- If using Windows Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
-- If you choose to update via the Java applet in Control Panel, uncheck the option to install the Toolbar unless you want it.
-- The uninstaller incorporated in this release removes previous Updates 10 and above, but does not remove older versions, so they still need to be removed manually.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click Ok and reboot your computer.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.


You should now set a new Restore Point to prevent infection from any previous Restore Points. The easiest and safest way to do this is:
  • Go to Start > All Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the Restore Point a name then click "Create". The new Restore Point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Go to "Disk Cleanup" which can be found by going to Start > All Programs > Accessories > System Tools.
  • Click "OK" to select the partition or drive you desire.
  • Click the "More Options" Tab.
  • Click "Clean Up" in the System Restore section to remove all previous Restore Points except the newly created one. More details and screenshots for Disk Cleanup in Windows Vista can be found here.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Use and update your AntiVirus Software

You must have a good antivirus. There are plenty to choose from but I personally recommend the free options of Avast and Avira Antivir. If you want to purchase a security program then I recommend any of the following: AVG, Norton, McAfee, Kaspersky and ESET Nod32.

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it afh930, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:31 PM

Posted 07 August 2010 - 06:44 PM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. smile.gif

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users