Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

PLEASE HELP! Caught a nasty bug!


  • This topic is locked This topic is locked
3 replies to this topic

#1 taternutz

taternutz

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:12:23 AM

Posted 29 June 2011 - 02:32 AM

Hey...I need help. Got something nasty on my laptop. It started with a windows xp hard drive Trojan. Ran MBAM & SAS. Thought I got rid of it. Not getting the xp hard drive deal now, but my browser, both IE and Firefox is now getting hijacked every time I try an visit any site. Goes to my homepage (Google), but as soon as I search and click on a result, it takes me to a very different page. I have a very important workshop in a week, and I really need my laptop. Posting the Hijack this log an any other I can find...

Hijack This:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:16:41 AM, on 6/29/2011
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\Program Files\Fingerprint Sensor\AtService.exe
C:\Program Files\Softex\OmniPass\Omniserv.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Microsoft Shared\Ink\KeyboardSurrogate.exe
C:\Program Files\Softex\OmniPass\OPXPApp.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\SYSTEM32\WISPTIS.EXE
C:\WINDOWS\System32\tabbtnu.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Common Files\Microsoft Shared\Ink\TCServer.exe
C:\WINDOWS\VM331_STI.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\Fujitsu\Fujitsu Hotkey Utility\IndicatorUty.exe
C:\WINDOWS\system32\agrsmsvc.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Softex\OmniPass\scureapp.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\EPSON Projector\EMP NS Connection V2\EMP_NSWLSV.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\Pure Digital Technologies\FlipShare\FlipShareService.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
C:\WINDOWS\system32\o2flash.exe
C:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe
C:\Program Files\Portshutter\PsRun.exe
C:\Program Files\Portshutter\PsSvc.exe
C:\Program Files\SolidWorks Corp\SolidWorks Flow Simulation\binCFW\StandAloneSlv.exe
C:\Program Files\CyberLink\Shared Files\RichVideo.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\WINDOWS\system32\SearchIndexer.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\SearchProtocolHost.exe
C:\Documents and Settings\Thomas Tatum\My Documents\Virus Fix\Virus Fix\SUPERAntiSpyware.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: StumbleUpon Launcher - {145B29F4-A56B-4b90-BBAC-45784EBEBBB7} - C:\Program Files\StumbleUpon\StumbleUponIEBar.dll
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O2 - BHO: SmartSelect - {F4971EE7-DAA0-4053-9964-665D8EE6A077} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll
O3 - Toolbar: StumbleUpon Toolbar - {5093EB4C-3E93-40AB-9266-B607BA87BDC8} - C:\Program Files\StumbleUpon\StumbleUponIEBar.dll
O4 - HKLM\..\Run: [331BigDog] C:\WINDOWS\VM331_STI.EXE
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
O4 - HKLM\..\Run: [IndicatorUtility] C:\Program Files\Fujitsu\Fujitsu Hotkey Utility\IndicatorUty.exe
O4 - HKLM\..\Run: [SSUtility] C:\Program Files\Fujitsu\SSUtility\FJSSDMN.exe
O4 - HKLM\..\Run: [OmniPass] C:\Program Files\Softex\OmniPass\scureapp.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [Messenger (Yahoo!)] "C:\PROGRA~1\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Documents and Settings\Thomas Tatum\My Documents\Virus Fix\Virus Fix\SUPERAntiSpyware.exe
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: Append Link Target to Existing PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Append to Existing PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert Link Target to Adobe PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: Add to EverNote - {A5ABA0BB-F195-40d8-A5E9-0801153E6597} - C:\Program Files\EverNote\EverNote\enbar.dll
O9 - Extra 'Tools' menuitem: Add to EverNote - {A5ABA0BB-F195-40d8-A5E9-0801153E6597} - C:\Program Files\EverNote\EverNote\enbar.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://us.fujitsu.com/computers
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1233242239765
O16 - DPF: {D30CA0FD-1CA0-11D4-AC78-006008A9A8BC} (WebBasedClientInstall Class) - http://www.tntech.edu/sav10/webinst.cab
O16 - DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} (Virtools WebPlayer Class) - http://3dlifeplayer.dl.3dvia.com/player/install/3DVIA_player_installer.exe
O20 - Winlogon Notify: !SASWinLogon - C:\Documents and Settings\Thomas Tatum\My Documents\Virus Fix\Virus Fix\SASWINLO.DLL
O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:\WINDOWS\system32\agrsmsvc.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: AuthenTec Fingerprint Service (ATService) - AuthenTec, Inc. - C:\Program Files\Fingerprint Sensor\AtService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: SW Distributed TS Coordinator Service (CoordinatorServiceHost) - Dassault Systèmes SolidWorks Corp. - C:\Program Files\SolidWorks Corp\SolidWorks\swScheduler\DTSCoordinatorService.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: EMP_NSWLSV - SEIKO EPSON CORPORATION - C:\Program Files\EPSON Projector\EMP NS Connection V2\EMP_NSWLSV.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: FlipShare Service - Unknown owner - C:\Program Files\Pure Digital Technologies\FlipShare\FlipShareService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: O2Flash Memory Service (O2Flash) - O2Micro International - C:\WINDOWS\system32\o2flash.exe
O23 - Service: Softex OmniPass Service (omniserv) - Softex Inc. - C:\Program Files\Softex\OmniPass\Omniserv.exe
O23 - Service: Protexis Licensing V2 (PSI_SVC_2) - Protexis Inc. - C:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe
O23 - Service: PsRun - FUJITSU SOFTWARE TECHNOLOGIES LIMITED - C:\Program Files\Portshutter\PsRun.exe
O23 - Service: PsSvc - FUJITSU SOFTWARE TECHNOLOGIES LIMITED - C:\Program Files\Portshutter\PsSvc.exe
O23 - Service: Remote Solver for Flow Simulation 2009 - Mentor Graphics Corporation - C:\Program Files\SolidWorks Corp\SolidWorks Flow Simulation\binCFW\StandAloneSlv.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: SolidWorks Licensing Service - SolidWorks - C:\Program Files\Common Files\SolidWorks Shared\Service\SolidWorksLicensing.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: StumbleUponUpdateService - stumbleupon.com - C:\Program Files\StumbleUpon\StumbleUponUpdateService.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: TOSHIBA Bluetooth Service - TOSHIBA CORPORATION - C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
O23 - Service: Yahoo! Updater (YahooAUService) - Yahoo! Inc. - C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe

--
End of file - 11852 bytes

Can't find other logs. Will run again if requested


Please Help!

MBAM Log 1st run

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6741

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

6/28/2011 7:05:58 PM
mbam-log-2011-06-28 (19-05-58).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 373986
Time elapsed: 56 minute(s), 28 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 4
Folders Infected: 0
Files Infected: 10

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallPaper (PUM.Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop (PUM.Hidden.Desktop) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\thomas tatum\application data\Sun\Java\deployment\cache\6.0\48\9194470-61da02fb (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\thomas tatum\application data\Sun\Java\deployment\cache\6.0\48\9194470-7cee866a (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\all users\application data\jj06511ddkle06511\jj06511ddkle06511.exe.vir (Rogue.MSRemovalTool) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\thomas tatum\local settings\application data\viw.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\thomas tatum\local settings\application data\yws.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP356\A0133127.exe (Rogue.MSRemovalTool) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP356\A0133298.exe (Rogue.MSRemovalTool) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP358\A0137329.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP358\A0137330.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\17489700.exe (Trojan.Agent) -> Quarantined and deleted successfully.

MBAM Log 2n run

Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 6971

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

6/28/2011 8:46:49 PM
mbam-log-2011-06-28 (20-46-49).txt

Scan type: Quick scan
Objects scanned: 176883
Time elapsed: 2 minute(s), 3 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oYohbioPvgYB (Trojan.FakeAlert) -> Value: oYohbioPvgYB -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\all users\application data\oyohbiopvgyb.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\17030948.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

MBAM Log 3rd run

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6971

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

6/28/2011 11:35:37 PM
mbam-log-2011-06-28 (23-35-37).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 358957
Time elapsed: 45 minute(s), 34 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Security Protection (Trojan.FakeAlert) -> Value: Security Protection -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP378\A0144015.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP378\A0145082.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP378\A0145083.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\defender.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\program files\mozilla firefox\0.15054806058545356.exe (Exploit.Dropper) -> Quarantined and deleted successfully.
c:\program files\mozilla firefox\0.631488776857261.exe (Exploit.Dropper) -> Quarantined and deleted successfully.

MBAM Log 4th run

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6971

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

6/28/2011 11:50:14 PM
mbam-log-2011-06-28 (23-50-14).txt

Scan type: Quick scan
Objects scanned: 179823
Time elapsed: 6 minute(s), 43 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

MBAM Log 1st run

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6741

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

6/28/2011 7:05:58 PM
mbam-log-2011-06-28 (19-05-58).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 373986
Time elapsed: 56 minute(s), 28 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 4
Folders Infected: 0
Files Infected: 10

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallPaper (PUM.Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop (PUM.Hidden.Desktop) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\thomas tatum\application data\Sun\Java\deployment\cache\6.0\48\9194470-61da02fb (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\thomas tatum\application data\Sun\Java\deployment\cache\6.0\48\9194470-7cee866a (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\all users\application data\jj06511ddkle06511\jj06511ddkle06511.exe.vir (Rogue.MSRemovalTool) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\thomas tatum\local settings\application data\viw.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\thomas tatum\local settings\application data\yws.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP356\A0133127.exe (Rogue.MSRemovalTool) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP356\A0133298.exe (Rogue.MSRemovalTool) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP358\A0137329.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP358\A0137330.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\17489700.exe (Trojan.Agent) -> Quarantined and deleted successfully.

MBAM Log 2n run

Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 6971

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

6/28/2011 8:46:49 PM
mbam-log-2011-06-28 (20-46-49).txt

Scan type: Quick scan
Objects scanned: 176883
Time elapsed: 2 minute(s), 3 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oYohbioPvgYB (Trojan.FakeAlert) -> Value: oYohbioPvgYB -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\all users\application data\oyohbiopvgyb.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\17030948.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

MBAM Log 3rd run

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6971

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

6/28/2011 11:35:37 PM
mbam-log-2011-06-28 (23-35-37).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 358957
Time elapsed: 45 minute(s), 34 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Security Protection (Trojan.FakeAlert) -> Value: Security Protection -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP378\A0144015.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP378\A0145082.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP378\A0145083.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\defender.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\program files\mozilla firefox\0.15054806058545356.exe (Exploit.Dropper) -> Quarantined and deleted successfully.
c:\program files\mozilla firefox\0.631488776857261.exe (Exploit.Dropper) -> Quarantined and deleted successfully.

MBAM Log 4th run

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6971

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

6/28/2011 11:50:14 PM
mbam-log-2011-06-28 (23-50-14).txt

Scan type: Quick scan
Objects scanned: 179823
Time elapsed: 6 minute(s), 43 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

MBAM Log 1st run

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6741

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

6/28/2011 7:05:58 PM
mbam-log-2011-06-28 (19-05-58).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 373986
Time elapsed: 56 minute(s), 28 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 4
Folders Infected: 0
Files Infected: 10

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallPaper (PUM.Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop (PUM.Hidden.Desktop) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\thomas tatum\application data\Sun\Java\deployment\cache\6.0\48\9194470-61da02fb (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\thomas tatum\application data\Sun\Java\deployment\cache\6.0\48\9194470-7cee866a (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\all users\application data\jj06511ddkle06511\jj06511ddkle06511.exe.vir (Rogue.MSRemovalTool) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\thomas tatum\local settings\application data\viw.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\thomas tatum\local settings\application data\yws.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP356\A0133127.exe (Rogue.MSRemovalTool) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP356\A0133298.exe (Rogue.MSRemovalTool) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP358\A0137329.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP358\A0137330.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\17489700.exe (Trojan.Agent) -> Quarantined and deleted successfully.

MBAM Log 2n run

Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 6971

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

6/28/2011 8:46:49 PM
mbam-log-2011-06-28 (20-46-49).txt

Scan type: Quick scan
Objects scanned: 176883
Time elapsed: 2 minute(s), 3 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oYohbioPvgYB (Trojan.FakeAlert) -> Value: oYohbioPvgYB -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\all users\application data\oyohbiopvgyb.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\17030948.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

MBAM Log 3rd run

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6971

Windows 5.1.2600 Service Pack 3 (Safe Mode)
Internet Explorer 8.0.6001.18702

6/28/2011 11:35:37 PM
mbam-log-2011-06-28 (23-35-37).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 358957
Time elapsed: 45 minute(s), 34 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Security Protection (Trojan.FakeAlert) -> Value: Security Protection -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP378\A0144015.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP378\A0145082.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3ecf326f-aa82-42c8-8aa2-ecbe3eded24e}\RP378\A0145083.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\defender.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\program files\mozilla firefox\0.15054806058545356.exe (Exploit.Dropper) -> Quarantined and deleted successfully.
c:\program files\mozilla firefox\0.631488776857261.exe (Exploit.Dropper) -> Quarantined and deleted successfully.

MBAM Log 4th run

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6971

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

6/28/2011 11:50:14 PM
mbam-log-2011-06-28 (23-50-14).txt

Scan type: Quick scan
Objects scanned: 179823
Time elapsed: 6 minute(s), 43 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Super Anti Spyware Log

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/29/2011 at 02:15 AM

Application Version : 4.47.1000

Core Rules Database Version : 7349
Trace Rules Database Version: 5161

Scan type : Quick Scan
Total Scan Time : 00:12:43

Memory items scanned : 622
Memory threats detected : 0
Registry items scanned : 2332
Registry threats detected : 1
File items scanned : 6688
File threats detected : 120

System.BrokenFileAssociation
HKCR\exefile\shell\open\command

Adware.Tracking Cookie
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.pornerbros[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@adserv.rotator.hadj7.adjuggler[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.burstnet[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.ventivmedia[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ero-advertising[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@realmedia[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@adserver.adtechus[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@collective-media[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.networldmedia[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@adultfriendfinder[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.pornerbros[5].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ar.atwola[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@vortexmediagroup[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@mattthomas.112.2o7[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.pubmatic[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@3questionsgetthegirl[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@yieldmanager[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@adxpansion[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@bonniercorp.122.2o7[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ad.adpredictive[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@lfstmedia[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@hearstmagazines.112.2o7[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ad.jmg[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.watchmygf[3].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ad.wsod[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@interclick[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@gostats[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@eyewonder[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@invitemedia[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@in.getclicky[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@dc.tremormedia[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@e-2dj6wclywocjghq.stats.esomniture[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@healthgrades.112.2o7[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@solvemedia[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@legolas-media[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.networldmedia[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@stats.erau[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@rogersmedia[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@network.realmedia[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@mediabrandsww[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@stats.erau[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@geeksaresexy[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.bleepingcomputer[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@usatoday1.112.2o7[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@adserver.adreactor[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@indieclick[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.crakmedia[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@2o7[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@accounts.youtube[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ad.yieldmanager[5].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@tacoda.at.atwola[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@pornerbros[3].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@adxpose[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.googleadservices[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@mm.chitika[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@media6degrees[3].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.dicarlotrack[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@advertnation[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@adinterax[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.siteencore[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@a1.interclick[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@adserver.ignitad[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@e-2dj6wjmioocpmlq.stats.esomniture[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@networldmedia[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@lucidmedia[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@xiti[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@stats.pictorymag[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@at.atwola[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@8tracks[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@segment-pixel.invitemedia[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.pornerbros[4].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@content.yieldmanager[4].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@statcounter[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@content.yieldmanager[6].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@findtubes[3].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.undertone[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.adk2[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@analytics.rogersmedia[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@cruzcampo.solution.weborama[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.foodbuzz[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@cracked[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@search.seekfinds[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@fourteenlol.110mb[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@clickaider[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.screenmediadaily[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@optimize.indieclick[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@search.boltfind[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.inhabitat[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@burstbeacon[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@microsoftsto.112.2o7[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@shopica[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.flowingdata[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@audit.median[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@gotacha.rotator.hadj7.adjuggler[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ads.lycos[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@intermundomedia[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@uk.sitestat[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@uk.sitestat[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@server.cpmstar[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@cmp.112.2o7[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.burstbeacon[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@mtvn.112.2o7[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@yadro[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.googleadservices[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www7.addfreestats[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@gotacha.rotator.hadj7.adjuggler[3].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.qsstats[2].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@weborama[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@screenmediadaily[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@vitamine.networldmedia[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@gr.burstnet[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.find-quick-results[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@advertise[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@microsoftwindows.112.2o7[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@ad.blockshopper[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@www.geeksaresexy[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@cbsdigitalmedia.112.2o7[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@trinitymirror.112.2o7[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@atlanticmedia.122.2o7[1].txt
C:\Documents and Settings\Thomas Tatum\Cookies\thomas_tatum@dmtracker[1].txt

Edited by hamluis, 29 June 2011 - 05:32 AM.
Merged posts, moved from XP to Malware Removal Logs.


BC AdBot (Login to Remove)

 


#2 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:01:23 AM

Posted 02 July 2011 - 12:15 PM

Hello and welcome to the forums!

My secret agent name on the forums is SweetTech (you can call me ST for short), it's a pleasure to meet you. :)

I am very sorry for the delay in responding, but as you can see we are at the moment being flooded with logs which, when paired with the never-ending shortage of helpers, resulted in the delayed responding to your thread.

I would be glad to take a look at your log and help you with solving any malware problems.

If you have since resolved the issues you were originally experiencing, or have received help elsewhere, please inform me so that this topic can be closed.

If you have not, please adhere to the guidelines below and then follow instructions as outlined further below:

  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forums.
  • Please make sure to carefully read any instruction that I give you. Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
  • If you're not sure, or if something unexpected happens, do NOT continue! Stop and ask!
  • In Windows Vista and Windows 7, all tools need to be started by right clicking and selecting Run as Administrator!
  • If I instruct you to download a specific tool in which you already have, please delete the copy that you have and re-download the tool. The reason I ask you to do this is because these tools are updated fairly regularly.
  • Do not do things I do not ask for, such as running a spyware scan on your computer. The one thing that you should always do, is to make sure sure that your anti-virus definitions are up-to-date!
  • Please do not use the Attachment feature for any log file. Do a Copy/Paste of the entire contents of the log file and submit it inside your post.
  • I am going to stick with you until ALL malware is gone from your system. I would appreciate it if you would do the same. From this point, we're in this together ;)
    Because of this, you must reply within three days
    failure to reply will result in the topic being closed!
  • Lastly, I am no magician. I will try very hard to fix your issues, but no promises can be made. Also be aware that some infections are so severe that you might need to resort to reformatting and reinstalling your operating system.
    Don't worry, this only happens in severe cases, but it sadly does happen. Be prepared to back up your data. Have means of backing up your data available.

____________________________________________________

Rootkit UnHooker (RkU)
Please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can downlaod, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth Code, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".



NEXT:


Running OTL

We need to create a FULL OTL Report
  • Please download OTL from here:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Change the "Extra Registry" option to "SafeList"
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extras.txt <-- Will be minimized

NEXT:


Please provide an update on how things are running in your next reply.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#3 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:01:23 AM

Posted 05 July 2011 - 02:41 PM

Hi!

It's been several days since I last posted instructions for you to complete. Do you still require assistance in getting your computer cleaned up?

Please Note: Unless notified in advance, threads with no response in 3 days get closed.

If for any reason you cannot complete instructions within that time, that's fine, just put a post here so that I know you're still here. We get a lot of people who simply leave & if there is no contact for that amount of time I will have to assume you have abandoned your topic.


Thanks,
SweetTech.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#4 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:01:23 AM

Posted 09 July 2011 - 12:39 PM

Due to lack of feedback this thread will now be closed. If you still require assistance, and would like to have your thread re-opened, please feel free to send me a Private Message (PM) being sure to include a link to your topic, and I'd be happy to re-open it.


Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users