Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Cannot Rid Pc Of Trojan-downloader-alij


  • This topic is locked This topic is locked
8 replies to this topic

#1 NewToThis

NewToThis

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:08 PM

Posted 23 July 2006 - 07:28 AM

SpySweeper has identified, quarantined, and deleted trojan-downloader-alij several times for me since it was first discovered on my PC on 07/14/2006, but each time I log off and back on again, the virus reappears with a run command in the registry. Help, please!

I have included logs from Spy Sweeper 5.0.5.1286, as well as Ewido Anti-Spyware 4.0.0.172 and Hijack This 1.99.1 while run in Safe Mode. Spy Sweeper and Ewido Anti-Spy were run searching everything on the computer, including cookies, registry, memory, files, rootkits, etc.

Please let me know what I can do to get rid of this problem. Thanks!

******************************************************************************

********
6:58 PM: | End of Session, Saturday, July 22, 2006 |
6:41 PM: Your definitions are up to date.
6:41 PM: Automated check for program update in progress.
6:41 PM: Removal process completed. Elapsed time 00:00:01
6:41 PM: Quarantining All Traces: trojan-downloader-alij
6:41 PM: Removal process initiated
6:40 PM: Traces Found: 1
6:40 PM: Full Sweep has completed. Elapsed time 00:10:38
6:40 PM: File Sweep Complete, Elapsed Time: 00:08:30
6:39 PM: Warning: Failed to access drive J:
6:39 PM: Warning: Failed to access drive I:
6:39 PM: Warning: Failed to access drive H:
6:39 PM: Warning: Failed to access drive G:
6:39 PM: Warning: Failed to access drive F:
6:32 PM: Starting File Sweep
6:32 PM: Warning: Failed to access drive A:
6:32 PM: Cookie Sweep Complete, Elapsed Time: 00:00:00
6:32 PM: Starting Cookie Sweep
6:32 PM: Registry Sweep Complete, Elapsed Time:00:00:18
6:32 PM: HKLM\software\microsoft\windows\currentversion\run\ || alij (ID = 1081196)
6:32 PM: Found Trojan Horse: trojan-downloader-alij
6:31 PM: Starting Registry Sweep
6:31 PM: Memory Sweep Complete, Elapsed Time: 00:01:32
6:30 PM: Starting Memory Sweep
6:30 PM: Sweep initiated using definitions version 724
6:30 PM: Spy Sweeper 5.0.5.1286 started
6:30 PM: | Start of Session, Saturday, July 22, 2006 |
********
8:32 PM: | End of Session, Saturday, July 22, 2006 |
8:30 PM: Deletion from quarantine completed. Elapsed time 00:00:00
8:30 PM: Processing: tacoda cookie
8:30 PM: Processing: tacoda cookie
8:30 PM: Processing: atlas dmt cookie
8:30 PM: Processing: 2o7.net cookie
8:30 PM: Processing: advertising cookie
8:30 PM: Processing: excite cookie
8:30 PM: Deletion from quarantine initiated
8:02 PM: Removal process completed. Elapsed time 00:00:00
8:02 PM: Quarantining All Traces: excite cookie
8:01 PM: Quarantining All Traces: 2o7.net cookie
8:01 PM: Quarantining All Traces: atlas dmt cookie
8:01 PM: Quarantining All Traces: tacoda cookie
8:01 PM: Quarantining All Traces: advertising cookie
8:01 PM: Removal process initiated
8:01 PM: Traces Found: 6
8:01 PM: Full Sweep has completed. Elapsed time 00:08:58
8:01 PM: File Sweep Complete, Elapsed Time: 00:07:27
8:00 PM: Warning: Failed to access drive J:
8:00 PM: Warning: Failed to access drive I:
8:00 PM: Warning: Failed to access drive H:
8:00 PM: Warning: Failed to access drive G:
8:00 PM: Warning: Failed to access drive F:
7:53 PM: Starting File Sweep
7:53 PM: Warning: Failed to access drive A:
7:53 PM: Cookie Sweep Complete, Elapsed Time: 00:00:00
7:53 PM: c:\documents and settings\angela green\cookies\angela green@tacoda[1].txt (ID = 6444)
7:53 PM: c:\documents and settings\angela green\cookies\angela green@excite[2].txt (ID = 2631)
7:53 PM: Found Spy Cookie: excite cookie
7:53 PM: c:\documents and settings\angela green\cookies\angela green@buycom.122.2o7[1].txt (ID = 1958)
7:53 PM: Found Spy Cookie: 2o7.net cookie
7:53 PM: c:\documents and settings\angela green\cookies\angela green@atdmt[2].txt (ID = 2253)
7:53 PM: Found Spy Cookie: atlas dmt cookie
7:53 PM: c:\documents and settings\angela green\cookies\angela green@anad.tacoda[1].txt (ID = 6445)
7:53 PM: Found Spy Cookie: tacoda cookie
7:53 PM: c:\documents and settings\angela green\cookies\angela green@advertising[2].txt (ID = 2175)
7:53 PM: Found Spy Cookie: advertising cookie
7:53 PM: Starting Cookie Sweep
7:53 PM: Registry Sweep Complete, Elapsed Time:00:00:15
7:53 PM: Starting Registry Sweep
7:53 PM: Memory Sweep Complete, Elapsed Time: 00:01:00
7:52 PM: Starting Memory Sweep
7:52 PM: Sweep initiated using definitions version 724
7:52 PM: Spy Sweeper 5.0.5.1286 started
7:52 PM: | Start of Session, Saturday, July 22, 2006 |
********
10:13 AM: | End of Session, Saturday, July 22, 2006 |
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
10:13 AM: Shield States
10:13 AM: Spyware Definitions: 724
10:13 AM: Spy Sweeper 5.0.5.1286 started
10:28 PM: | End of Session, Thursday, July 20, 2006 |
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
10:20 PM: Shield States
10:20 PM: Spyware Definitions: 719
10:20 PM: Spy Sweeper 5.0.5.1286 started
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
10:18 PM: Tamper Detection
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
10:18 PM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
10:17 PM: Shield States
10:17 PM: Spyware Definitions: 719
10:17 PM: Spy Sweeper 5.0.5.1286 started
9:24 PM: | End of Session, Thursday, July 20, 2006 |
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
9:22 PM: Shield States
9:22 PM: Spyware Definitions: 719
9:22 PM: Spy Sweeper 5.0.5.1286 started
8:55 PM: Deletion from quarantine completed. Elapsed time 00:00:00
8:55 PM: Processing: zedo cookie
8:55 PM: Processing: zedo cookie
8:55 PM: Processing: tacoda cookie
8:55 PM: Processing: tacoda cookie
8:55 PM: Processing: atlas dmt cookie
8:55 PM: Processing: atlas dmt cookie
8:55 PM: Processing: serving-sys cookie
8:55 PM: Processing: webtrendslive cookie
8:55 PM: Processing: questionmarket cookie
8:55 PM: Processing: specificclick.com cookie
8:55 PM: Processing: specificclick.com cookie
8:55 PM: Processing: 2o7.net cookie
8:55 PM: Processing: 2o7.net cookie
8:55 PM: Processing: 2o7.net cookie
8:55 PM: Processing: 2o7.net cookie
8:55 PM: Processing: 2o7.net cookie
8:55 PM: Processing: nextag cookie
8:55 PM: Processing: maxserving cookie
8:55 PM: Processing: trafficmp cookie
8:55 PM: Processing: adserver cookie
8:55 PM: Processing: yieldmanager cookie
8:55 PM: Processing: websponsors cookie
8:55 PM: Processing: pub cookie
8:55 PM: Processing: pointroll cookie
8:55 PM: Processing: atwola cookie
8:55 PM: Processing: adbureau cookie
8:55 PM: Processing: advertising cookie
8:55 PM: Processing: advertising cookie
8:55 PM: Processing: excite cookie
8:55 PM: Processing: mediaplex cookie
8:55 PM: Processing: go.com cookie
8:55 PM: Processing: go.com cookie
8:55 PM: Processing: go.com cookie
8:55 PM: Processing: trojan-downloader-alij
8:55 PM: Deletion from quarantine initiated
8:55 PM: Removal process completed. Elapsed time 00:00:01
8:55 PM: Quarantining All Traces: adserver cookie
8:55 PM: Quarantining All Traces: trafficmp cookie
8:55 PM: Quarantining All Traces: webtrendslive cookie
8:55 PM: Quarantining All Traces: serving-sys cookie
8:55 PM: Quarantining All Traces: questionmarket cookie
8:55 PM: Quarantining All Traces: pub cookie
8:55 PM: Quarantining All Traces: nextag cookie
8:55 PM: Quarantining All Traces: mediaplex cookie
8:55 PM: Quarantining All Traces: maxserving cookie
8:55 PM: Quarantining All Traces: go.com cookie
8:55 PM: Quarantining All Traces: adbureau cookie
8:55 PM: Quarantining All Traces: atwola cookie
8:55 PM: Quarantining All Traces: excite cookie
8:55 PM: Quarantining All Traces: tacoda cookie
8:55 PM: Quarantining All Traces: pointroll cookie
8:55 PM: Quarantining All Traces: yieldmanager cookie
8:55 PM: Quarantining All Traces: websponsors cookie
8:55 PM: Quarantining All Traces: zedo cookie
8:55 PM: Quarantining All Traces: 2o7.net cookie
8:55 PM: Quarantining All Traces: atlas dmt cookie
8:55 PM: Quarantining All Traces: advertising cookie
8:55 PM: Quarantining All Traces: specificclick.com cookie
8:55 PM: Quarantining All Traces: trojan-downloader-alij
8:55 PM: Removal process initiated
8:54 PM: Traces Found: 35
8:54 PM: Full Sweep has completed. Elapsed time 00:07:10
8:54 PM: File Sweep Complete, Elapsed Time: 00:05:46
8:48 PM: Starting File Sweep
8:48 PM: Cookie Sweep Complete, Elapsed Time: 00:00:04
8:48 PM: c:\documents and settings\angela green\cookies\angela green@zedo[1].txt (ID = 3762)
8:48 PM: c:\documents and settings\angela green\cookies\angela green@z1.adserver[1].txt (ID = 2142)
8:48 PM: Found Spy Cookie: adserver cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@trafficmp[2].txt (ID = 3581)
8:48 PM: Found Spy Cookie: trafficmp cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@tacoda[1].txt (ID = 6444)
8:48 PM: c:\documents and settings\angela green\cookies\angela green@statse.webtrendslive[1].txt (ID = 3667)
8:48 PM: Found Spy Cookie: webtrendslive cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@serving-sys[2].txt (ID = 3343)
8:48 PM: Found Spy Cookie: serving-sys cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@questionmarket[2].txt (ID = 3217)
8:48 PM: Found Spy Cookie: questionmarket cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@pub[1].txt (ID = 3205)
8:48 PM: Found Spy Cookie: pub cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@northwestairlines.112.2o7[1].txt (ID = 1958)
8:48 PM: c:\documents and settings\angela green\cookies\angela green@nextag[2].txt (ID = 5014)
8:48 PM: Found Spy Cookie: nextag cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@mediaplex[1].txt (ID = 6442)
8:48 PM: Found Spy Cookie: mediaplex cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@maxserving[1].txt (ID = 2966)
8:48 PM: Found Spy Cookie: maxserving cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@go[1].txt (ID = 2728)
8:48 PM: c:\documents and settings\angela green\cookies\angela green@excite[2].txt (ID = 2631)
8:48 PM: c:\documents and settings\angela green\cookies\angela green@disneyshopping.go[2].txt (ID = 2729)
8:48 PM: c:\documents and settings\angela green\cookies\angela green@disney.videos.go[1].txt (ID = 2729)
8:48 PM: Found Spy Cookie: go.com cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@cbs.112.2o7[1].txt (ID = 1958)
8:48 PM: c:\documents and settings\angela green\cookies\angela green@bookspan.122.2o7[1].txt (ID = 1958)
8:48 PM: c:\documents and settings\angela green\cookies\angela green@audible.adbureau[1].txt (ID = 2060)
8:48 PM: Found Spy Cookie: adbureau cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@atwola[1].txt (ID = 2255)
8:48 PM: Found Spy Cookie: atwola cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@atdmt[2].txt (ID = 2253)
8:48 PM: c:\documents and settings\angela green\cookies\angela green@apnews.excite[2].txt (ID = 2632)
8:48 PM: Found Spy Cookie: excite cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@anad.tacoda[1].txt (ID = 6445)
8:48 PM: Found Spy Cookie: tacoda cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@advertising[2].txt (ID = 2175)
8:48 PM: c:\documents and settings\angela green\cookies\angela green@ads.pointroll[1].txt (ID = 3148)
8:48 PM: Found Spy Cookie: pointroll cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@adopt.specificclick[2].txt (ID = 3400)
8:48 PM: c:\documents and settings\angela green\cookies\angela green@ad.yieldmanager[2].txt (ID = 3751)
8:48 PM: Found Spy Cookie: yieldmanager cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@a.websponsors[2].txt (ID = 3665)
8:48 PM: Found Spy Cookie: websponsors cookie
8:48 PM: c:\documents and settings\angela green\cookies\angela green@2o7[2].txt (ID = 1957)
8:48 PM: c:\documents and settings\rich green\cookies\rich green@zedo[1].txt (ID = 3762)
8:48 PM: Found Spy Cookie: zedo cookie
8:48 PM: c:\documents and settings\rich green\cookies\rich green@msnportal.112.2o7[1].txt (ID = 1958)
8:48 PM: Found Spy Cookie: 2o7.net cookie
8:48 PM: c:\documents and settings\rich green\cookies\rich green@atdmt[2].txt (ID = 2253)
8:48 PM: Found Spy Cookie: atlas dmt cookie
8:48 PM: c:\documents and settings\rich green\cookies\rich green@advertising[1].txt (ID = 2175)
8:48 PM: Found Spy Cookie: advertising cookie
8:48 PM: c:\documents and settings\rich green\cookies\rich green@adopt.specificclick[2].txt (ID = 3400)
8:48 PM: Found Spy Cookie: specificclick.com cookie
8:48 PM: Starting Cookie Sweep
8:48 PM: Registry Sweep Complete, Elapsed Time:00:00:15
8:48 PM: HKLM\software\microsoft\windows\currentversion\run\ || alij (ID = 1081196)
8:48 PM: Found Trojan Horse: trojan-downloader-alij
8:48 PM: Starting Registry Sweep
8:48 PM: Memory Sweep Complete, Elapsed Time: 00:01:01
8:47 PM: Starting Memory Sweep
8:47 PM: Sweep initiated using definitions version 719
8:47 PM: Spy Sweeper 5.0.5.1286 started
8:47 PM: | Start of Session, Thursday, July 20, 2006 |
********
9:37 PM: Removal process completed. Elapsed time 00:00:00
9:37 PM: Quarantining All Traces: trojan-downloader-alij
9:37 PM: Removal process initiated
9:37 PM: Traces Found: 1
9:37 PM: Full Sweep has completed. Elapsed time 00:12:35
9:37 PM: File Sweep Complete, Elapsed Time: 00:11:03
9:31 PM: Warning: Failed to open file "c:\documents and settings\angela green\cookies\angela green@microsoft[1].txt". The operation completed successfully
9:25 PM: Starting File Sweep
9:25 PM: Cookie Sweep Complete, Elapsed Time: 00:00:00
9:25 PM: Starting Cookie Sweep
9:25 PM: Registry Sweep Complete, Elapsed Time:00:00:19
9:25 PM: HKLM\software\microsoft\windows\currentversion\run\ || alij (ID = 1081196)
9:25 PM: Found Trojan Horse: trojan-downloader-alij
9:25 PM: Starting Registry Sweep
9:25 PM: Memory Sweep Complete, Elapsed Time: 00:01:09
9:24 PM: Starting Memory Sweep
9:24 PM: Sweep initiated using definitions version 719
9:24 PM: Spy Sweeper 5.0.5.1286 started
9:24 PM: | Start of Session, Thursday, July 20, 2006 |
********
10:00 PM: | End of Session, Thursday, July 20, 2006 |
9:52 PM: None
9:52 PM: Traces Found: 0
9:52 PM: Explorer Sweep has completed. Elapsed time 00:00:00
9:52 PM: File Sweep Complete, Elapsed Time: 00:00:00
9:52 PM: Starting File Sweep
9:52 PM: Sweep initiated using definitions version 719
9:52 PM: Spy Sweeper 5.0.5.1286 started
9:52 PM: | Start of Session, Thursday, July 20, 2006 |
********
Operation: File Access
Target:
Source: C:\DOCUME~1\ANGELA~1\LOCALS~1\TEMP\QOTMCCEWG.EXE
10:08 PM: Tamper Detection
10:00 PM: None
10:00 PM: Traces Found: 0
10:00 PM: Explorer Sweep has completed. Elapsed time 00:00:00
10:00 PM: File Sweep Complete, Elapsed Time: 00:00:00
10:00 PM: Starting File Sweep
10:00 PM: Sweep initiated using definitions version 719
10:00 PM: Spy Sweeper 5.0.5.1286 started
10:00 PM: | Start of Session, Thursday, July 20, 2006 |
********
10:45 PM: Deletion from quarantine completed. Elapsed time 00:00:00
10:45 PM: Processing: tacoda cookie
10:45 PM: Processing: tacoda cookie
10:45 PM: Processing: nextag cookie
10:45 PM: Processing: webtrends cookie
10:45 PM: Processing: yieldmanager cookie
10:45 PM: Processing: advertising cookie
10:45 PM: Processing: excite cookie
10:45 PM: Processing: trojan-downloader-alij
10:45 PM: Processing: trojan-downloader-alij
10:45 PM: Deletion from quarantine initiated
10:45 PM: Removal process completed. Elapsed time 00:00:02
10:45 PM: Quarantining All Traces: nextag cookie
10:45 PM: Quarantining All Traces: webtrends cookie
10:45 PM: Quarantining All Traces: excite cookie
10:45 PM: Quarantining All Traces: tacoda cookie
10:45 PM: Quarantining All Traces: advertising cookie
10:45 PM: Quarantining All Traces: yieldmanager cookie
10:45 PM: Quarantining All Traces: trojan-downloader-alij
10:45 PM: Removal process initiated
10:45 PM: Traces Found: 8
10:45 PM: Full Sweep has completed. Elapsed time 00:16:27
10:45 PM: File Sweep Complete, Elapsed Time: 00:14:00
10:41 PM: Warning: Failed to access drive J:
10:41 PM: Warning: Failed to access drive I:
10:41 PM: Warning: Failed to access drive H:
10:41 PM: Warning: Failed to access drive G:
10:41 PM: Warning: Failed to access drive F:
10:31 PM: Starting File Sweep
10:31 PM: Warning: Failed to access drive A:
10:31 PM: Cookie Sweep Complete, Elapsed Time: 00:00:00
10:31 PM: c:\documents and settings\angela green\cookies\angela green@tacoda[1].txt (ID = 6444)
10:31 PM: c:\documents and settings\angela green\cookies\angela green@nextag[1].txt (ID = 5014)
10:31 PM: Found Spy Cookie: nextag cookie
10:31 PM: c:\documents and settings\angela green\cookies\angela green@m.webtrends[1].txt (ID = 3669)
10:31 PM: Found Spy Cookie: webtrends cookie
10:31 PM: c:\documents and settings\angela green\cookies\angela green@excite[1].txt (ID = 2631)
10:31 PM: Found Spy Cookie: excite cookie
10:31 PM: c:\documents and settings\angela green\cookies\angela green@anad.tacoda[1].txt (ID = 6445)
10:31 PM: Found Spy Cookie: tacoda cookie
10:31 PM: c:\documents and settings\angela green\cookies\angela green@advertising[2].txt (ID = 2175)
10:31 PM: Found Spy Cookie: advertising cookie
10:31 PM: c:\documents and settings\angela green\cookies\angela green@ad.yieldmanager[2].txt (ID = 3751)
10:31 PM: Found Spy Cookie: yieldmanager cookie
10:31 PM: Starting Cookie Sweep
10:31 PM: Registry Sweep Complete, Elapsed Time:00:00:22
10:30 PM: HKLM\software\microsoft\windows\currentversion\run\ || alij (ID = 1081196)
10:30 PM: Found Trojan Horse: trojan-downloader-alij
Operation: File Access
Target:
Source: C:\DOCUME~1\ANGELA~1\LOCALS~1\TEMP\OSAMK.EXE
10:30 PM: Tamper Detection
10:30 PM: Starting Registry Sweep
10:30 PM: Memory Sweep Complete, Elapsed Time: 00:01:47
10:28 PM: Starting Memory Sweep
10:28 PM: Sweep initiated using definitions version 719
10:28 PM: Spy Sweeper 5.0.5.1286 started
10:28 PM: | Start of Session, Thursday, July 20, 2006 |
********
8:47 PM: | End of Session, Thursday, July 20, 2006 |
8:47 PM: Your spyware definitions have been updated.
8:46 PM: Your spyware definitions have been updated.
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
8:39 PM: Shield States
8:39 PM: Spyware Definitions: 719
8:39 PM: Spy Sweeper 5.0.5.1286 started
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
12:31 PM: Tamper Detection
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
12:30 PM: Tamper Detection
Operation: File Access
Target:
Source: C:\PROGRA~1\GRISOFT\AVG7\AVGW.EXE
11:49 AM: Tamper Detection
11:36 AM: Your spyware definitions have been updated.
11:36 AM: Automated check for program update in progress.
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
11:35 AM: Shield States
11:35 AM: Spyware Definitions: 719
11:34 AM: Spy Sweeper 5.0.5.1286 started
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
1:09 PM: Tamper Detection
Operation: File Access
Target:
Source: C:\PROGRA~1\GRISOFT\AVG7\AVGW.EXE
12:42 PM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
12:27 PM: Shield States
12:27 PM: Spyware Definitions: 719
12:27 PM: Spy Sweeper 5.0.5.1286 started
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
7:17 AM: Tamper Detection
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
7:17 AM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
7:15 AM: Shield States
7:15 AM: Spyware Definitions: 719
7:15 AM: Spy Sweeper 5.0.5.1286 started
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
4:16 PM: Tamper Detection
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
4:16 PM: Tamper Detection
3:17 PM: Your spyware definitions have been updated.
3:17 PM: Automated check for program update in progress.
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
2:01 PM: Warning: The handle is invalid
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
2:01 PM: Shield States
2:01 PM: Spyware Definitions: 719
2:01 PM: Spy Sweeper 5.0.5.1286 started
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
11:53 AM: Shield States
11:53 AM: Spyware Definitions: 719
11:53 AM: Spy Sweeper 5.0.5.1286 started
Operation: File Access
Target:
Source: C:\PROGRA~1\GRISOFT\AVG7\AVGW.EXE
10:52 AM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
10:37 AM: Shield States
10:37 AM: Spyware Definitions: 719
10:37 AM: Spy Sweeper 5.0.5.1286 started
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
9:50 PM: Tamper Detection
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
9:50 PM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
9:12 PM: Shield States
9:12 PM: Spyware Definitions: 719
9:11 PM: Spy Sweeper 5.0.5.1286 started
Operation: File Access
Target:
Source: C:\PROGRA~1\GRISOFT\AVG7\AVGW.EXE
3:20 PM: Tamper Detection
3:17 PM: Your definitions are up to date.
3:16 PM: Your definitions are up to date.
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
3:05 PM: Shield States
3:05 PM: Spyware Definitions: 719
3:05 PM: Spy Sweeper 5.0.5.1286 started
8:48 PM: Automated check for program update in progress.
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
8:47 PM: Shield States
8:47 PM: Spyware Definitions: 719
8:47 PM: Spy Sweeper 5.0.5.1286 started
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
1:52 PM: Tamper Detection
Operation: Terminate
Target: C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPERUI.EXE
Source: C:\WINDOWS\SYSTEM32\CSRSS.EXE
1:52 PM: Tamper Detection
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
1:42 PM: Shield States
1:42 PM: Spyware Definitions: 719
1:41 PM: Spy Sweeper 5.0.5.1286 started
Operation: File Access
Target:
Source: C:\PROGRA~1\GRISOFT\AVG7\AVGW.EXE
5:22 PM: Tamper Detection
5:16 PM: Your definitions are up to date.
5:13 PM: There is a problem reaching the server. The cause may be in your connection, or on the server. Please try again later.
5:13 PM: Automated check for program update in progress.
5:06 PM: Automated check for program update in progress.
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
5:05 PM: Warning: The handle is invalid
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
5:05 PM: Shield States
5:05 PM: Spyware Definitions: 719
5:05 PM: Spy Sweeper 5.0.5.1286 started
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
8:16 PM: Shield States
8:16 PM: Spyware Definitions: 719
8:16 PM: Spy Sweeper 5.0.5.1286 started
6:21 PM: | End of Session, Friday, July 14, 2006 |
Operation: File Access
Target:
Source: C:\PROGRA~1\GRISOFT\AVG7\AVGWB.DAT
4:07 PM: Tamper Detection
3:52 PM: Your definitions are up to date.
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
3:51 PM: Shield States
3:51 PM: Spyware Definitions: 719
3:50 PM: Spy Sweeper 5.0.5.1286 started
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
3:46 PM: Warning: The handle is invalid
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
3:46 PM: Shield States
3:46 PM: Spyware Definitions: 719
3:46 PM: Spy Sweeper 5.0.5.1286 started
3:24 PM: | End of Session, Friday, July 14, 2006 |
Keylogger Shield: On
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites Shield: Off
Hosts File Shield: On
Spy Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: Off
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
3:24 PM: Shield States
3:24 PM: Spyware Definitions: 719
3:24 PM: Spy Sweeper 5.0.5.1286 started
3:18 PM: Traces Found: 0
3:18 PM: Memory Sweep Complete, Elapsed Time: 00:02:25
3:18 PM: Sweep Canceled
3:16 PM: Starting Memory Sweep
3:16 PM: Sweep initiated using definitions version 719
3:16 PM: Spy Sweeper started
3:16 PM: | Start of Session, Friday, July 14, 2006 |
********
3:37 PM: BHO Shield: found: -- BHO installation allowed at user request
3:37 PM: Renewing Spy Sweeper subscription.
3:35 PM: Windows Messenger Service Shield: On
3:35 PM: Removal process completed. Elapsed time 00:00:06
3:35 PM: Quarantining All Traces: zedo cookie
3:35 PM: Quarantining All Traces: adserver cookie
3:35 PM: Quarantining All Traces: burstbeacon cookie
3:35 PM: Quarantining All Traces: tribalfusion cookie
3:35 PM: Quarantining All Traces: trafficmp cookie
3:35 PM: Quarantining All Traces: webtrendslive cookie
3:35 PM: Quarantining All Traces: statcounter cookie
3:35 PM: Quarantining All Traces: server.iad.liveperson cookie
3:35 PM: Quarantining All Traces: realmedia cookie
3:35 PM: Quarantining All Traces: questionmarket cookie
3:35 PM: Quarantining All Traces: pub cookie
3:35 PM: Quarantining All Traces: one-time-offer cookie
3:35 PM: Quarantining All Traces: nextag cookie
3:35 PM: Quarantining All Traces: mediaplex cookie
3:35 PM: Quarantining All Traces: linksynergy cookie
3:35 PM: Quarantining All Traces: homestore cookie
3:35 PM: Quarantining All Traces: fastclick cookie
3:35 PM: Quarantining All Traces: ru4 cookie
3:35 PM: Quarantining All Traces: did-it cookie
3:35 PM: Quarantining All Traces: overture cookie
3:35 PM: Quarantining All Traces: coremetrics cookie
3:35 PM: Quarantining All Traces: hitslink cookie
3:35 PM: Quarantining All Traces: commission junction cookie
3:35 PM: Quarantining All Traces: adbureau cookie
3:35 PM: Quarantining All Traces: atwola cookie
3:35 PM: Quarantining All Traces: ask cookie
3:35 PM: Quarantining All Traces: excite cookie
3:35 PM: Quarantining All Traces: apmebf cookie
3:35 PM: Quarantining All Traces: tacoda cookie
3:35 PM: Quarantining All Traces: addynamix cookie
3:35 PM: Quarantining All Traces: adrevolver cookie
3:35 PM: Quarantining All Traces: specificclick.com cookie
3:35 PM: Quarantining All Traces: go.com cookie
3:35 PM: Quarantining All Traces: websponsors cookie
3:35 PM: Quarantining All Traces: serving-sys cookie
3:35 PM: Quarantining All Traces: servedby advertising cookie
3:35 PM: Quarantining All Traces: 2o7.net cookie
3:35 PM: Quarantining All Traces: maxserving cookie
3:35 PM: Quarantining All Traces: bs.serving-sys cookie
3:35 PM: Quarantining All Traces: atlas dmt cookie
3:35 PM: Quarantining All Traces: advertising cookie
3:35 PM: Quarantining All Traces: pointroll cookie
3:35 PM: Quarantining All Traces: yieldmanager cookie
3:35 PM: Quarantining All Traces: trojan-downloader-alij
3:35 PM: Removal process initiated
3:34 PM: Traces Found: 82
3:34 PM: Full Sweep has completed. Elapsed time 00:09:53
3:34 PM: File Sweep Complete, Elapsed Time: 00:07:07
3:27 PM: Starting File Sweep
3:27 PM: Cookie Sweep Complete, Elapsed Time: 00:00:04
3:27 PM: c:\documents and settings\angela green\cookies\angela green@zedo[2].txt (ID = 3762)
3:27 PM: Found Spy Cookie: zedo cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@z1.adserver[1].txt (ID = 2142)
3:27 PM: Found Spy Cookie: adserver cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@www.burstbeacon[1].txt (ID = 2335)
3:27 PM: Found Spy Cookie: burstbeacon cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@twci.coremetrics[1].txt (ID = 2472)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@tribalfusion[2].txt (ID = 3589)
3:27 PM: Found Spy Cookie: tribalfusion cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@trafficmp[1].txt (ID = 3581)
3:27 PM: Found Spy Cookie: trafficmp cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@thomasvillefurniture.122.2o7[1].txt (ID = 1958)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@tacoda[2].txt (ID = 6444)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@statse.webtrendslive[2].txt (ID = 3667)
3:27 PM: Found Spy Cookie: webtrendslive cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@statcounter[2].txt (ID = 3447)
3:27 PM: Found Spy Cookie: statcounter cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@sports.espn.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@serving-sys[2].txt (ID = 3343)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@server.iad.liveperson[1].txt (ID = 3341)
3:27 PM: Found Spy Cookie: server.iad.liveperson cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@servedby.advertising[2].txt (ID = 3335)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@rsi.espn.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@rsi.abc.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@register.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@realmedia[1].txt (ID = 3235)
3:27 PM: Found Spy Cookie: realmedia cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@questionmarket[1].txt (ID = 3217)
3:27 PM: Found Spy Cookie: questionmarket cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@pub[2].txt (ID = 3205)
3:27 PM: Found Spy Cookie: pub cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@perf.overture[1].txt (ID = 3106)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@overture[1].txt (ID = 3105)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@one-time-offer[2].txt (ID = 3095)
3:27 PM: Found Spy Cookie: one-time-offer cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@northwestairlines.112.2o7[1].txt (ID = 1958)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@nextag[2].txt (ID = 5014)
3:27 PM: Found Spy Cookie: nextag cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@mediaplex[1].txt (ID = 6442)
3:27 PM: Found Spy Cookie: mediaplex cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@maxserving[2].txt (ID = 2966)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@linksynergy[2].txt (ID = 2926)
3:27 PM: Found Spy Cookie: linksynergy cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@homestore[1].txt (ID = 2793)
3:27 PM: Found Spy Cookie: homestore cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@go[1].txt (ID = 2728)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@fastclick[1].txt (ID = 2651)
3:27 PM: Found Spy Cookie: fastclick cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@excite[2].txt (ID = 2631)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@espn.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@edge.ru4[1].txt (ID = 3269)
3:27 PM: Found Spy Cookie: ru4 cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@dynamic.abc.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@disneyworld.disney.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@disneyshopping.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@disneyphotopass.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@disneymobile.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@disneyauctions.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@disney.videos.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@diginet.112.2o7[1].txt (ID = 1958)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@did-it[1].txt (ID = 2523)
3:27 PM: Found Spy Cookie: did-it cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@destinations.disney.go[1].txt (ID = 2729)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@data3.perf.overture[1].txt (ID = 3106)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@data2.perf.overture[1].txt (ID = 3106)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@data1.perf.overture[1].txt (ID = 3106)
3:27 PM: Found Spy Cookie: overture cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@data.coremetrics[1].txt (ID = 2472)
3:27 PM: Found Spy Cookie: coremetrics cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@counter.hitslink[2].txt (ID = 2790)
3:27 PM: Found Spy Cookie: hitslink cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@commission-junction[2].txt (ID = 2455)
3:27 PM: Found Spy Cookie: commission junction cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@cbs.112.2o7[1].txt (ID = 1958)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@buycom.122.2o7[1].txt (ID = 1958)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@bookspan.122.2o7[1].txt (ID = 1958)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@audible.adbureau[1].txt (ID = 2060)
3:27 PM: Found Spy Cookie: adbureau cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@atwola[1].txt (ID = 2255)
3:27 PM: Found Spy Cookie: atwola cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@atdmt[1].txt (ID = 2253)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@ask[1].txt (ID = 2245)
3:27 PM: Found Spy Cookie: ask cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@apnews.excite[1].txt (ID = 2632)
3:27 PM: Found Spy Cookie: excite cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@apmebf[2].txt (ID = 2229)
3:27 PM: Found Spy Cookie: apmebf cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@anat.tacoda[1].txt (ID = 6445)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@anad.tacoda[2].txt (ID = 6445)
3:27 PM: Found Spy Cookie: tacoda cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@americanexpress.122.2o7[1].txt (ID = 1958)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@advertising[2].txt (ID = 2175)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@ads.pointroll[2].txt (ID = 3148)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@ads.addynamix[1].txt (ID = 2062)
3:27 PM: Found Spy Cookie: addynamix cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@adrevolver[2].txt (ID = 2088)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@adrevolver[1].txt (ID = 2088)
3:27 PM: Found Spy Cookie: adrevolver cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@adopt.specificclick[2].txt (ID = 3400)
3:27 PM: Found Spy Cookie: specificclick.com cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@ad.yieldmanager[1].txt (ID = 3751)
3:27 PM: c:\documents and settings\angela green\cookies\angela green@abc.go[2].txt (ID = 2729)
3:27 PM: Found Spy Cookie: go.com cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@a.websponsors[1].txt (ID = 3665)
3:27 PM: Found Spy Cookie: websponsors cookie
3:27 PM: c:\documents and settings\angela green\cookies\angela green@2o7[1].txt (ID = 1957)
3:27 PM: c:\documents and settings\rich green\cookies\rich green@serving-sys[2].txt (ID = 3343)
3:27 PM: Found Spy Cookie: serving-sys cookie
3:27 PM: c:\documents and settings\rich green\cookies\rich green@servedby.advertising[2].txt (ID = 3335)
3:27 PM: Found Spy Cookie: servedby advertising cookie
3:27 PM: c:\documents and settings\rich green\cookies\rich green@msnportal.112.2o7[1].txt (ID = 1958)
3:27 PM: Found Spy Cookie: 2o7.net cookie
3:27 PM: c:\documents and settings\rich green\cookies\rich green@maxserving[2].txt (ID = 2966)
3:27 PM: Found Spy Cookie: maxserving cookie
3:27 PM: c:\documents and settings\rich green\cookies\rich green@bs.serving-sys[1].txt (ID = 2330)
3:27 PM: Found Spy Cookie: bs.serving-sys cookie
3:27 PM: c:\documents and settings\rich green\cookies\rich green@atdmt[2].txt (ID = 2253)
3:27 PM: Found Spy Cookie: atlas dmt cookie
3:27 PM: c:\documents and settings\rich green\cookies\rich green@advertising[1].txt (ID = 2175)
3:27 PM: Found Spy Cookie: advertising cookie
3:27 PM: c:\documents and settings\rich green\cookies\rich green@ads.pointroll[2].txt (ID = 3148)
3:27 PM: Found Spy Cookie: pointroll cookie
3:27 PM: c:\documents and settings\rich green\cookies\rich green@ad.yieldmanager[1].txt (ID = 3751)
3:27 PM: Found Spy Cookie: yieldmanager cookie
3:27 PM: Starting Cookie Sweep
3:27 PM: Registry Sweep Complete, Elapsed Time:00:00:29
3:26 PM: HKLM\software\microsoft\windows\currentversion\run\ || alij (ID = 1081196)
3:26 PM: Found Trojan Horse: trojan-downloader-alij
3:26 PM: Starting Registry Sweep
3:26 PM: Memory Sweep Complete, Elapsed Time: 00:02:05
3:24 PM: Starting Memory Sweep
3:24 PM: Sweep initiated using definitions version 719
3:24 PM: Spy Sweeper 5.0.5.1286 started
3:24 PM: | Start of Session, Friday, July 14, 2006 |
********
6:30 PM: | End of Session, Friday, July 14, 2006 |
6:30 PM: Deletion from quarantine completed. Elapsed time 00:00:01
6:30 PM: Processing: zedo cookie
6:30 PM: Processing: tacoda cookie
6:30 PM: Processing: tacoda cookie
6:30 PM: Processing: tacoda cookie
6:30 PM: Processing: addynamix cookie
6:30 PM: Processing: atlas dmt cookie
6:30 PM: Processing: atlas dmt cookie
6:30 PM: Processing: statcounter cookie
6:30 PM: Processing: serving-sys cookie
6:30 PM: Processing: serving-sys cookie
6:30 PM: Processing: webtrendslive cookie
6:30 PM: Processing: questionmarket cookie
6:30 PM: Processing: specificclick.com cookie
6:30 PM: Processing: 2o7.net cookie
6:30 PM: Processing: 2o7.net cookie
6:30 PM: Processing: 2o7.net cookie
6:30 PM: Processing: 2o7.net cookie
6:30 PM: Processing: 2o7.net cookie
6:30 PM: Processing: 2o7.net cookie
6:30 PM: Processing: 2o7.net cookie
6:30 PM: Processing: 2o7.net cookie
6:30 PM: Processing: 2o7.net cookie
6:30 PM: Processing: tribalfusion cookie
6:30 PM: Processing: homestore cookie
6:30 PM: Processing: nextag cookie
6:30 PM: Processing: ru4 cookie
6:30 PM: Processing: maxserving cookie
6:30 PM: Processing: maxserving cookie
6:30 PM: Processing: coremetrics cookie
6:30 PM: Processing: coremetrics cookie
6:30 PM: Processing: trafficmp cookie
6:30 PM: Processing: adserver cookie
6:30 PM: Processing: did-it cookie
6:30 PM: Processing: hitslink cookie
6:30 PM: Processing: yieldmanager cookie
6:30 PM: Processing: yieldmanager cookie
6:30 PM: Processing: websponsors cookie
6:30 PM: Processing: pub cookie
6:30 PM: Processing: burstbeacon cookie
6:30 PM: Processing: pointroll cookie
6:30 PM: Processing: pointroll cookie
6:30 PM: Processing: bs.serving-sys cookie
6:30 PM: Processing: one-time-offer cookie
6:30 PM: Processing: atwola cookie
6:30 PM: Processing: ask cookie
6:30 PM: Processing: apmebf cookie
6:30 PM: Processing: overture cookie
6:30 PM: Processing: overture cookie
6:30 PM: Processing: overture cookie
6:30 PM: Processing: overture cookie
6:30 PM: Processing: overture cookie
6:30 PM: Processing: adrevolver cookie
6:30 PM: Processing: adrevolver cookie
6:30 PM: Processing: server.iad.liveperson cookie
6:30 PM: Processing: servedby advertising cookie
6:30 PM: Processing: servedby advertising cookie
6:30 PM: Processing: adbureau cookie
6:30 PM: Processing: linksynergy cookie
6:30 PM: Processing: commission junction cookie
6:30 PM: Processing: advertising cookie
6:30 PM: Processing: advertising cookie
6:30 PM: Processing: fastclick cookie
6:30 PM: Processing: excite cookie
6:30 PM: Processing: excite cookie
6:30 PM: Processing: mediaplex cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: go.com cookie
6:30 PM: Processing: realmedia cookie
6:30 PM: Processing: trojan-downloader-alij
6:30 PM: Processing: trojan-downloader-alij
6:30 PM: Deletion from quarantine initiated
6:30 PM: Removal process completed. Elapsed time 00:00:00
6:30 PM: Quarantining All Traces: trojan-downloader-alij
6:30 PM: Removal process initiated
6:27 PM: Traces Found: 1
6:27 PM: Full Sweep has completed. Elapsed time 00:06:20
6:27 PM: File Sweep Complete, Elapsed Time: 00:05:11
6:22 PM: Starting File Sweep
6:22 PM: Cookie Sweep Complete, Elapsed Time: 00:00:01
6:22 PM: Starting Cookie Sweep
6:22 PM: Registry Sweep Complete, Elapsed Time:00:00:14
6:22 PM: HKLM\software\microsoft\windows\currentversion\run\ || alij (ID = 1081196)
6:22 PM: Found Trojan Horse: trojan-downloader-alij
6:22 PM: Starting Registry Sweep
6:22 PM: Memory Sweep Complete, Elapsed Time: 00:00:50
6:21 PM: Starting Memory Sweep
6:21 PM: Sweep initiated using definitions version 719
6:21 PM: Spy Sweeper 5.0.5.1286 started
6:21 PM: | Start of Session, Friday, July 14, 2006 |
********

******************************************************************************

---------------------------------------------------------
ewido anti-spyware - Scan Report
---------------------------------------------------------

+ Created at: 10:18:50 PM 7/22/2006

+ Scan result:



:mozilla.27:C:\Documents and Settings\Angela Green\Application Data\Mozilla\Firefox\Profiles\04740d9v.default\cookies.txt -> TrackingCookie.Advertising : Cleaned.
:mozilla.28:C:\Documents and Settings\Angela Green\Application Data\Mozilla\Firefox\Profiles\04740d9v.default\cookies.txt -> TrackingCookie.Advertising : Cleaned.
:mozilla.29:C:\Documents and Settings\Angela Green\Application Data\Mozilla\Firefox\Profiles\04740d9v.default\cookies.txt -> TrackingCookie.Advertising : Cleaned.
:mozilla.9:C:\Documents and Settings\Angela Green\Application Data\Mozilla\Firefox\Profiles\04740d9v.default\cookies.txt -> TrackingCookie.Atdmt : Cleaned.
C:\Documents and Settings\Rich Green\Local Settings\Temp\Cookies\rich green@atdmt[2].txt -> TrackingCookie.Atdmt : Cleaned.
C:\Documents and Settings\Angela Green\Cookies\angela green@bfast[1].txt -> TrackingCookie.Bfast : Cleaned.
C:\Documents and Settings\Devin Green\Cookies\devin green@bfast[1].txt -> TrackingCookie.Bfast : Cleaned.
:mozilla.47:C:\Documents and Settings\Angela Green\Application Data\Mozilla\Firefox\Profiles\04740d9v.default\cookies.txt -> TrackingCookie.Bridgetrack : Cleaned.
:mozilla.48:C:\Documents and Settings\Angela Green\Application Data\Mozilla\Firefox\Profiles\04740d9v.default\cookies.txt -> TrackingCookie.Bridgetrack : Cleaned.
:mozilla.49:C:\Documents and Settings\Angela Green\Application Data\Mozilla\Firefox\Profiles\04740d9v.default\cookies.txt -> TrackingCookie.Bridgetrack : Cleaned.
C:\Documents and Settings\Angela Green\Cookies\angela green@citi.bridgetrack[1].txt -> TrackingCookie.Bridgetrack : Cleaned.
C:\Documents and Settings\Angela Green\Cookies\angela green@com[2].txt -> TrackingCookie.Com : Cleaned.
C:\Documents and Settings\Angela Green\Cookies\angela green@news.com[2].txt -> TrackingCookie.Com : Cleaned.
C:\Documents and Settings\Rich Green\Cookies\rich green@com[1].txt -> TrackingCookie.Com : Cleaned.
:mozilla.26:C:\Documents and Settings\Angela Green\Application Data\Mozilla\Firefox\Profiles\04740d9v.default\cookies.txt -> TrackingCookie.Coremetrics : Cleaned.
C:\Documents and Settings\Rich Green\Local Settings\Temp\Cookies\rich green@twci.coremetrics[1].txt -> TrackingCookie.Coremetrics : Cleaned.
:mozilla.17:C:\Documents and Settings\Angela Green\Application Data\Mozilla\Firefox\Profiles\04740d9v.default\cookies.txt -> TrackingCookie.Doubleclick : Cleaned.
C:\Documents and Settings\Angela Green\Cookies\angela green@doubleclick[1].txt -> TrackingCookie.Doubleclick : Cleaned.
C:\Documents and Settings\Ange

BC AdBot (Login to Remove)

 


m

#2 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:10:08 PM

Posted 25 July 2006 - 04:37 AM

Hello,

Click here to download HJTsetup.exe
  • Save HJTsetup.exe to your desktop.
  • Double click on the HJTsetup.exe icon on your desktop.
  • By default it will install to C:\Program Files\Hijack This.
  • Continue to click Next in the setup dialogue boxes until you get to the Select Addition Tasks dialogue.
  • Put a check by Create a desktop icon then click Next again.
  • Continue to follow the rest of the prompts from there.
  • At the final dialogue box click Finish and it will launch Hijack This.
  • Click on the Do a system scan and save a log file button. It will scan and then ask you to save the log.
  • Click Save to save the log file and then the log will open in notepad.
  • Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT have Hijack This fix anything yet. Most of what it finds will be harmless or even required.

AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#3 NewToThis

NewToThis
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:08 PM

Posted 25 July 2006 - 09:45 AM

Here is the HijackThis log, as requested:

Logfile of HijackThis v1.99.1
Scan saved at 9:42:30 AM, on 7/25/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Ahead\InCD\InCDsrv.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe
C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
C:\WINDOWS\system32\acs.exe
C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVG7\avgfwsrv.exe
C:\Program Files\Common Files\EPSON\EBAPI\SAgent2.exe
C:\Program Files\ewido anti-spyware 4.0\guard.exe
C:\Program Files\Intel\IDU\IDUServ.exe
C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsDeviceConnect.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Ahead\InCD\InCD.exe
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\WINDOWS\shicoxp.exe
C:\Program Files\Acronis\TrueImage\TrueImageMonitor.exe
C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\WINDOWS\system32\carpserv.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\ALCWZRD.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\ewido anti-spyware 4.0\ewido.exe
C:\Program Files\ATI Multimedia\main\launchpd.exe
C:\Program Files\ATI Multimedia\main\ATIDtct.EXE
C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe
C:\Program Files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Program Files\NETGEAR\WPN311\wlancfg5.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe
C:\Program Files\Webroot\Spy Sweeper\SSU.EXE
C:\Program Files\Hijackthis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://excite.com/
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://windowsupdate.microsoft.com/
O2 - BHO: HelperObject Class - {00C6482D-C502-44C8-8409-FCE54AD9C208} - C:\Program Files\TechSmith\SnagIt 8\SnagItBHO.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {520DFD98-FF5A-438C-B2E2-B561D32A3909} - C:\WINDOWS\system32\ohlb.dll (file missing)
O2 - BHO: (no name) - {724d43a9-0d85-11d4-9908-00400523e39a} - C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: &RoboForm - {724d43a0-0d85-11d4-9908-00400523e39a} - C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: SnagIt - {8FF5E183-ABDE-46EB-B09E-D2AAB95CABE3} - C:\Program Files\TechSmith\SnagIt 8\SnagItIEAddin.dll
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [InCD] "C:\Program Files\Ahead\InCD\InCD.exe"
O4 - HKLM\..\Run: [AVG7_CC] "C:\PROGRA~1\Grisoft\AVG7\avgcc.exe" /STARTUP
O4 - HKLM\..\Run: [shicoxp] C:\WINDOWS\shicoxp.exe
O4 - HKLM\..\Run: [Acronis True Image Monitor] "C:\Program Files\Acronis\TrueImage\TrueImageMonitor.exe"
O4 - HKLM\..\Run: [Acronis Scheduler2 Service] "C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [CARPService] carpserv.exe
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [!ewido] "C:\Program Files\ewido anti-spyware 4.0\ewido.exe" /minimized
O4 - HKLM\..\Run: [alij] C:\WINDOWS\system32\run188.exe dummy
O4 - HKCU\..\Run: [ATI Launchpad] "C:\Program Files\ATI Multimedia\main\launchpd.exe"
O4 - HKCU\..\Run: [ATI DeviceDetect] "C:\Program Files\ATI Multimedia\main\ATIDtct.EXE"
O4 - HKCU\..\Run: [ATI Remote Control] "C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe"
O4 - HKCU\..\Run: [RoboForm] "C:\Program Files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe"
O4 - Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Startup: NETGEAR WPN311 Wireless Assistant.lnk = C:\Program Files\NETGEAR\WPN311\wlancfg5.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: NETGEAR WPN311 Wireless Assistant.lnk = C:\Program Files\NETGEAR\WPN311\wlancfg5.exe
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Customize Menu - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComCustomizeIEMenu.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Fill Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O8 - Extra context menu item: RoboForm Toolbar - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O8 - Extra context menu item: Save Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra 'Tools' menuitem: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra button: Save - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra 'Tools' menuitem: Save Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: ATI TV - {44226DFF-747E-4edc-B30C-78752E50CD0C} - C:\Program Files\ATI Multimedia\tv\EXPLBAR.DLL
O9 - Extra button: RoboForm - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra 'Tools' menuitem: RoboForm Toolbar - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\avgfwafu.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\avgfwafu.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\avgfwafu.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\avgfwafu.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\avgfwafu.dll
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1121265980131
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1121266084334
O16 - DPF: {A8683C98-5341-421B-B23C-8514C05354F1} (FujifilmUploader Class) - http://www.samsphotoclub.com/upload/FujifilmUploadClient.cab
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: Acronis Scheduler2 Service (AcrSch2Svc) - Acronis - C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\acs.exe
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Adobe Active File Monitor (AdobeActiveFileMonitor) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG Firewall (AVGFwSrv) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgfwsrv.exe
O23 - Service: EpsonBidirectionalService - Unknown owner - C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe
O23 - Service: EPSON Printer Status Agent2 (EPSONStatusAgent2) - SEIKO EPSON CORPORATION - C:\Program Files\Common Files\EPSON\EBAPI\SAgent2.exe
O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Program Files\ewido anti-spyware 4.0\guard.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Intel® Desktop Utilities Service (iHCService) - OSA Technologies, Inc. - C:\Program Files\Intel\IDU\IDUServ.exe
O23 - Service: InCD Helper (InCDsrv) - Ahead Software AG - C:\Program Files\Ahead\InCD\InCDsrv.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Photoshop Elements Device Connect (PhotoshopElementsDeviceConnect) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsDeviceConnect.exe
O23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
O23 - Service: X10 Device Network Service (x10nets) - Unknown owner - C:\PROGRA~1\ATIMUL~1\RemCtrl\x10nets.exe (file missing)

#4 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:10:08 PM

Posted 25 July 2006 - 04:01 PM

Hello,

Please disable SpySweeper's real-time protection, so it will not interfere with the fix:

Open SpySweeper and click Options | Program Options.
Uncheck Load at windows startup.
Over to the left click Shields.
Uncheck Home page shield and Automatically restore default without notifiction.


* Start HijackThis, close all open windows leaving only HijackThis running. Place a check against each of the following:

O2 - BHO: (no name) - {520DFD98-FF5A-438C-B2E2-B561D32A3909} - C:\WINDOWS\system32\ohlb.dll (file missing)
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [alij] C:\WINDOWS\system32\run188.exe dummy


* Click on Fix Checked when finished and exit HijackThis.
Make sure your Internet Explorer is closed when you click Fix Checked!

* Clean your Cache and Cookies in IE:
  • Close all instances of Outlook Express and Internet Explorer
  • Go to Control Panel > Internet Options > General tab
  • Click the "Delete Cookies" button
  • Next to it, Click the "Delete Files" button
  • When prompted, place a check in: "Delete all offline content", click OK
* Clean your Cache and Cookies in Firefox (In case you also have Firefox installed):
  • Go to Tools > Options.
  • Click Privacy in the menu on the left side of the Options window.
  • Click the Clear button located to the right of each option (History, Cookies, Cache).
  • Click OK to close the Options window
    Alternatively, you can clear all information stored while browsing by clicking Clear All.
    A confirmation dialog box will be shown before clearing the information.
* Clean other Temporary files + Recycle bin
  • Go to start > run and type: cleanmgr and click ok.
  • Let it scan your system for files to remove.
  • Make sure Temporary Files, Temporary Internet Files, and Recycle Bin are the only things checked.
  • Press OK to remove them.
* Perform an onlinescan with panda: (please use this scanner instead of any other scanner!)
Panda Online
- Once you are on the Panda site click the Scan your PC button
- A new window will open...click the Check Now button
- Enter your Country
- Enter your State/Province
- Enter your e-mail address and click send
- Select either Home User or Company
- Click the big Scan Now button
- If it wants to install an ActiveX component allow it
- It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
- When download is complete, click on Local Disks to start the scan
- When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location.
Post the contents of the Panda scan report together with a new hijackthislog.
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#5 NewToThis

NewToThis
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:08 PM

Posted 28 July 2006 - 02:41 PM

I followed your instructions - here are the files that you requested. Thanks!

***********************************************************************
Panda Report:


Incident Status Location

Spyware:Cookie/Advertising Not disinfected C:\Documents and Settings\Angela Green\Cookies\angela green@advertising[1].txt
Spyware:Cookie/Target Not disinfected C:\Documents and Settings\Angela Green\Cookies\angela green@target[2].txt
Virus:Trj/Delf.ABB Not disinfected C:\Documents and Settings\Angela Green\My Documents\Installed Software\Intel Desktop Utilities\IDU_2.1.8.63_Light.exe[IDU_2.1.8.63_Light/IDU_2.1.8.63_Light/Data1.cab][xpfwtool.exe]

**************************************************************************

HijackThis Log:

Logfile of HijackThis v1.99.1
Scan saved at 2:32:32 PM, on 7/28/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Ahead\InCD\InCDsrv.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe
C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
C:\WINDOWS\system32\acs.exe
C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVG7\avgfwsrv.exe
C:\Program Files\Common Files\EPSON\EBAPI\SAgent2.exe
C:\Program Files\ewido anti-spyware 4.0\guard.exe
C:\Program Files\Intel\IDU\IDUServ.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsDeviceConnect.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Ahead\InCD\InCD.exe
C:\PROGRA~1\Grisoft\AVG7\avgcc.exe
C:\WINDOWS\shicoxp.exe
C:\Program Files\Acronis\TrueImage\TrueImageMonitor.exe
C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\WINDOWS\system32\carpserv.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\ALCWZRD.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\ATI Multimedia\main\launchpd.exe
C:\Program Files\ATI Multimedia\main\ATIDtct.EXE
C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe
C:\Program Files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Audible\Bin\ADHelper.exe
C:\Program Files\NETGEAR\WPN311\wlancfg5.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
C:\Program Files\Hijackthis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://excite.com/
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://windowsupdate.microsoft.com/
O2 - BHO: HelperObject Class - {00C6482D-C502-44C8-8409-FCE54AD9C208} - C:\Program Files\TechSmith\SnagIt 8\SnagItBHO.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {724d43a9-0d85-11d4-9908-00400523e39a} - C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: &RoboForm - {724d43a0-0d85-11d4-9908-00400523e39a} - C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: SnagIt - {8FF5E183-ABDE-46EB-B09E-D2AAB95CABE3} - C:\Program Files\TechSmith\SnagIt 8\SnagItIEAddin.dll
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [InCD] "C:\Program Files\Ahead\InCD\InCD.exe"
O4 - HKLM\..\Run: [AVG7_CC] "C:\PROGRA~1\Grisoft\AVG7\avgcc.exe" /STARTUP
O4 - HKLM\..\Run: [shicoxp] C:\WINDOWS\shicoxp.exe
O4 - HKLM\..\Run: [Acronis True Image Monitor] "C:\Program Files\Acronis\TrueImage\TrueImageMonitor.exe"
O4 - HKLM\..\Run: [Acronis Scheduler2 Service] "C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [CARPService] carpserv.exe
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [ATI Launchpad] "C:\Program Files\ATI Multimedia\main\launchpd.exe"
O4 - HKCU\..\Run: [ATI DeviceDetect] "C:\Program Files\ATI Multimedia\main\ATIDtct.EXE"
O4 - HKCU\..\Run: [ATI Remote Control] "C:\Program Files\ATI Multimedia\RemCtrl\ATIRW.exe"
O4 - HKCU\..\Run: [RoboForm] "C:\Program Files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe"
O4 - Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Startup: Audible Download Manager.lnk = C:\Program Files\Audible\Bin\ADHelper.exe
O4 - Startup: NETGEAR WPN311 Wireless Assistant.lnk = C:\Program Files\NETGEAR\WPN311\wlancfg5.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O4 - Global Startup: Audible Download Manager.lnk = C:\Program Files\Audible\Bin\ADHelper.exe
O4 - Global Startup: NETGEAR WPN311 Wireless Assistant.lnk = C:\Program Files\NETGEAR\WPN311\wlancfg5.exe
O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: Customize Menu - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComCustomizeIEMenu.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Fill Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O8 - Extra context menu item: RoboForm Toolbar - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O8 - Extra context menu item: Save Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra 'Tools' menuitem: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra button: Save - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra 'Tools' menuitem: Save Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: ATI TV - {44226DFF-747E-4edc-B30C-78752E50CD0C} - C:\Program Files\ATI Multimedia\tv\EXPLBAR.DLL
O9 - Extra button: RoboForm - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra 'Tools' menuitem: RoboForm Toolbar - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\avgfwafu.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\avgfwafu.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\avgfwafu.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\avgfwafu.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\avgfwafu.dll
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1121265980131
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1121266084334
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O16 - DPF: {A8683C98-5341-421B-B23C-8514C05354F1} (FujifilmUploader Class) - http://www.samsphotoclub.com/upload/FujifilmUploadClient.cab
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: Acronis Scheduler2 Service (AcrSch2Svc) - Acronis - C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\acs.exe
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Adobe Active File Monitor (AdobeActiveFileMonitor) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG Firewall (AVGFwSrv) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgfwsrv.exe
O23 - Service: EpsonBidirectionalService - Unknown owner - C:\Program Files\Common Files\EPSON\EBAPI\eEBSVC.exe
O23 - Service: EPSON Printer Status Agent2 (EPSONStatusAgent2) - SEIKO EPSON CORPORATION - C:\Program Files\Common Files\EPSON\EBAPI\SAgent2.exe
O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Program Files\ewido anti-spyware 4.0\guard.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Intel® Desktop Utilities Service (iHCService) - OSA Technologies, Inc. - C:\Program Files\Intel\IDU\IDUServ.exe
O23 - Service: InCD Helper (InCDsrv) - Ahead Software AG - C:\Program Files\Ahead\InCD\InCDsrv.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Photoshop Elements Device Connect (PhotoshopElementsDeviceConnect) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsDeviceConnect.exe
O23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
O23 - Service: X10 Device Network Service (x10nets) - Unknown owner - C:\PROGRA~1\ATIMUL~1\RemCtrl\x10nets.exe (file missing)

#6 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:10:08 PM

Posted 28 July 2006 - 02:55 PM

Hello,

Clean log here. What Panda found were only some cookies and most probably a false positive, because it flags the IDU_2.1.8.63_Light.exe (installer for Intel® Desktop Utilities) as a virus.

How are things now? As you see, that alij is gone now... but whenever you reenable your Spysweeper again, spysweeper will replace it back, because it sees the modification in the registry that you did in hijackthis (deletion of the runkey alij) as an attempt. So when you reenable spysweeper, tell spysweeper to allow the changes and not to block it, because it will replace it back otherwise.
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#7 NewToThis

NewToThis
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:08 PM

Posted 28 July 2006 - 08:29 PM

Thanks for all of your help.

I tried to prevent Spy Sweeper from reloading the virus at startup as you suggested, but I failed. I finally reinstalled Spy Sweeper, reran the scans, and everything seems to look good.

Thanks again! I think that Spy Sweeper was my problem all along - it kept putting the virus back during restart everytime I quarantined and deleted the virus.

#8 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:10:08 PM

Posted 29 July 2006 - 03:10 AM

Hello, well, it didn't really put the 'virus' back, but the related registry entry. The malware was already gone.
Yes, spysweeper can be stubborn sometimes.
Same is with adwatch and teatimer. When you check and fix an entry, they both will replace it again.

Glad I could help. :thumbsup:

To keep this clean in the future, I would suggest the following things:

Install Spywareblaster
SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It blocks the popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

* Avoid illegal sites, because that's where most malware is present.
* Don't click on links inside popups.
* Don't click on links in spam messages claiming to offer anti-spyware software; because most of these so called removers ARE spyware.
* Download free software only from sites you know and trust. Because a lot of free software can bundle other software, including spyware.

Let your antispywarescanner(s) scan frequently and don't forget to update before.

And I do suggest you perform an online virusscan once in a while. (Housecall and/or Bitdefender). Because what one virusscanner can't find another one maybe can.
Also make sure that your virusscanner, the one that is installed on your system is always up to date!

Make sure your windows has the latest updates: http://windowsupdate.microsoft.com/

If you are having XP SP2, read here how to configure Security Features for Internet Explorer:
http://www.microsoft.com/technet/security/...xp/iesecxp.mspx

Also visit this Free Online Scanner for PC Health and Safety and Microsoft Security At Home for tips to Protect your Pc, Protect yourself and Protect your Family.

More info on how to prevent malware you can also find here (By Tony Klein)
and here: http://wiki.castlecops.com/Malware_Prevent...nt_Re-infection

Also read: Simple and easy ways to keep your computer safe and secure on the Internet

Happy surfing again! :flowers:
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#9 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:10:08 PM

Posted 29 July 2006 - 05:07 PM

Since this issue appears resolved ... this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team
a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users