Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Lots Of Pop Ups And Slow Computer


  • Please log in to reply
23 replies to this topic

#1 jamal56783

jamal56783

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 23 December 2006 - 07:01 PM

Logfile of HijackThis v1.99.1
Scan saved at 3:58:25 PM, on 12/23/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\SmFtYWwgTWFra291aw\command.exe
C:\WINDOWS\dls0523pmw.exe
C:\Program Files\Network Monitor\netmon.exe
C:\WINDOWS\xidvhxj.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Batty2\Batty2.exe
C:\WINDOWS\xidvhxjA.exe
C:\WINDOWS\yojefxvA.exe
C:\Program Files\CMIntex\CMIntex.exe
C:\Documents and Settings\Jamal\Desktop\HijackThis.exe
C:\WINDOWS\system32\rundll32.exe

O4 - HKLM\..\Run: [xidvhxjA] C:\WINDOWS\xidvhxjA.exe
O4 - HKLM\..\Run: [yojefxvA] C:\WINDOWS\yojefxvA.exe
O4 - HKCU\..\Run: [CMIntex] "C:\Program Files\CMIntex\CMIntex.exe"
O18 - Filter: text/html - {994D478A-45D0-4DB4-AE27-738B1E346F99} - C:\Program Files\Batty2\Batty2.dll
O20 - AppInit_DLLs: BattyRun2.dll
O20 - Winlogon Notify: SharedDlls - C:\WINDOWS\system32\f0l0la3m1d.dll
O20 - Winlogon Notify: winsys2freg - C:\Documents and Settings\All Users.WINDOWS\Documents\Settings\winsys2f.dll
O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS\SmFtYWwgTWFra291aw\command.exe
O23 - Service: Net Agent - Unknown owner - C:\WINDOWS\dls0523pmw.exe
O23 - Service: Network Monitor - Unknown owner - C:\Program Files\Network Monitor\netmon.exe
O23 - Service: Windows Overlay Components - Unknown owner - C:\WINDOWS\xidvhxj.exe
Jamal

BC AdBot (Login to Remove)

 


#2 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 23 December 2006 - 07:56 PM

You have no active AntiVirus!

Get the free AVG 7.5 install it, check for updates and run a full scan

AVG 7.5 - http://free.grisoft.com/freeweb.php/doc/2/
==================

1. Download this file :

http://download.bleepingcomputer.com/sUBs/combofix.exe
http://www.techsupportforum.com/sectools/combofix.exe

2. Double click combofix.exe & follow the prompts.
3. When finished, it shall produce a log for you. Post that log and a HiJack log in your next reply

Note:
Do not mouseclick combofix's window while its running. That may cause it to stall
===================

Download Superantispyware

http://www.superantispyware.com/downloadfi...ANTISPYWAREFREE

Install it and double-click the icon on your desktop to run it.
· It will ask if you want to update the program definitions, click Yes.
· Under Configuration and Preferences, click the Preferences button.
· Click the Scanning Control tab.
· Under Scanner Options make sure the following are checked:
o Close browsers before scanning
o Scan for tracking cookies
o Terminate memory threats before quarantining.
o Please leave the others unchecked.
o Click the Close button to leave the control center screen.
· On the main screen, under Scan for Harmful Software click Scan your computer.
· On the left check C:\Fixed Drive.
· On the right, under Complete Scan, choose Perform Complete Scan.
· Click Next to start the scan. Please be patient while it scans your computer.
· After the scan is complete a summary box will appear. Click OK.
· Make sure everything in the white box has a check next to it, then click Next.
· It will quarantine what it found and if it asks if you want to reboot, click Yes.
· To retrieve the removal information for me please do the following:
o After reboot, double-click the SUPERAntispyware icon on your desktop.
o Click Preferences. Click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o It will open in your default text editor (such as Notepad/Wordpad).
o Please highlight everything in the notepad, then right-click and choose copy.
· Click close and close again to exit the program.
· Please paste that information here for me with a new HijackThis log.
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#3 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 23 December 2006 - 08:05 PM

You must have an ignore list in hijack - remove all entries from the hijack ignore list
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#4 jamal56783

jamal56783
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 23 December 2006 - 10:26 PM

Jamal - 06-12-23 18:26:55.52 Service Pack 2
ComboFix 06.11.27 - Running from: "C:\Documents and Settings\Jamal\Desktop"

((((((((((((((((((((((((((((((((((((((((((((( Look2Me's Log ))))))))))))))))))))))))))))))))))))))))))))))))))

REGISTRY ENTRIES REMOVED:

[HKEY_CLASSES_ROOT\clsid\{D992E285-BF9B-428B-9E14-6E7FDE3648C3}]
@=""

[HKEY_CLASSES_ROOT\clsid\{D992E285-BF9B-428B-9E14-6E7FDE3648C3}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\clsid\{D992E285-BF9B-428B-9E14-6E7FDE3648C3}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\clsid\{D992E285-BF9B-428B-9E14-6E7FDE3648C3}\InprocServer32]
@="C:\\WINDOWS\\system32\\sEfrcdlg.dll"
"ThreadingModel"="Apartment"

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


FILES REMOVED:

(((((((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


C:\WINDOWS\offun.exe
C:\WINDOWS\uninstall_nmon.vbs
C:\WINDOWS\system32\atmtd.dll
C:\WINDOWS\system32\atmtd.dll._
C:\Documents and Settings\LocalService.NT AUTHORITY.003\Application Data\NetMon
C:\Program Files\cmfibula
C:\Documents and Settings\All Users.WINDOWS\Documents\Settings
C:\Program Files\batty2
C:\Program Files\network monitor
C:\WINDOWS\SmFtYWwgTWFra291aw


((((((((((((((((((((((((((((((( Files Created from 2006-11-23 to 2006-12-23 ))))))))))))))))))))))))))))))))))


2006-12-23 18:24 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
2006-12-23 18:23 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2006-12-23 18:22 4,960 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\avgtdi.sys
2006-12-23 18:22 4,224 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\avg7rsw.sys
2006-12-23 18:22 3,968 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\avgclean.sys
2006-12-23 18:22 28,416 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\avg7rsxp.sys
2006-12-23 18:22 18,240 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\avgmfx86.sys
2006-12-23 18:22 <DIR> d-------- C:\Documents and Settings\Jamal\Application Data\AVG7
2006-12-23 18:21 816,672 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\avg7core.sys
2006-12-23 18:21 <DIR> d-------- C:\Program Files\Grisoft
2006-12-23 18:21 <DIR> d-------- C:\Documents and Settings\All Users.WINDOWS\Application Data\Grisoft
2006-12-23 18:21 <DIR> d-------- C:\Documents and Settings\All Users.WINDOWS\Application Data\avg7
2006-12-23 15:57 235,302 -r--s---- C:\WINDOWS\SYSTEM32\gplml3311.dll
2006-12-23 14:08 65,536 --a------ C:\WINDOWS\dls0523pmw.exe
2006-12-23 14:08 46,592 --a------ C:\WINDOWS\yojefxv.exe
2006-12-23 14:08 34,816 --a------ C:\WINDOWS\rau001978.exe
2006-12-23 14:08 1,211,920 -r-hs---- C:\WINDOWS\yojefxvA.exe
2006-12-23 14:05 236,131 -r--s---- C:\WINDOWS\SYSTEM32\lv2809fue.dll
2006-12-22 19:45 236,266 -r--s---- C:\WINDOWS\SYSTEM32\r46u0ej9eho.dll
2006-12-22 11:46 235,961 -r--s---- C:\WINDOWS\SYSTEM32\lvn6095se.dll
2006-12-21 09:32 236,682 -r--s---- C:\WINDOWS\SYSTEM32\n08olal31dq.dll
2006-12-20 19:45 235,610 -r--s---- C:\WINDOWS\SYSTEM32\f80o0id3e80.dll
2006-12-20 15:31 <DIR> d-------- C:\Documents and Settings\Jamal\Application Data\Help
2006-12-20 15:30 <DIR> d-------- C:\Documents and Settings\All Users.WINDOWS\Application Data\SecTaskMan
2006-12-20 15:20 23,040 --a------ C:\WINDOWS\SYSTEM32\helper.dll
2006-12-20 15:14 234,272 -r--s---- C:\WINDOWS\SYSTEM32\ir8ol5l31.dll
2006-12-20 15:09 235,302 -r--s---- C:\WINDOWS\SYSTEM32\f0l0la3m1d.dll
2006-12-20 13:17 235,231 -r--s---- C:\WINDOWS\SYSTEM32\lvnu0959e.dll
2006-12-20 12:29 234,272 -r--s---- C:\WINDOWS\SYSTEM32\e402ledo1h0c.dll
2006-12-20 12:06 6,144 --a------ C:\WINDOWS\SYSTEM32\msvcrl.dll
2006-12-20 10:52 234,450 -r--s---- C:\WINDOWS\SYSTEM32\k8pm0i71e8.dll
2006-12-19 22:49 234,272 -r--s---- C:\WINDOWS\SYSTEM32\mpwdat10.dll
2006-12-19 22:49 234,272 -r--s---- C:\WINDOWS\SYSTEM32\isq.dll
2006-12-19 22:48 654,304 -r-hs---- C:\WINDOWS\xidvhxjA.exe
2006-12-19 22:48 593,728 -r-hs---- C:\WINDOWS\xidvhxj.exe
2006-12-19 22:48 32,976 --a------ C:\WINDOWS\SYSTEM32\uninstIcn.exe
2006-12-19 22:48 235,134 --a------ C:\WINDOWS\srvscxdjia.exe
2006-12-19 22:48 184,829 --a------ C:\WINDOWS\srvvmajbjt.exe
2006-12-19 22:48 <DIR> dr------- C:\Program Files\PadsysAssistant
2006-12-19 22:06 235,069 -r--s---- C:\WINDOWS\SYSTEM32\fp4003hme.dll
2006-12-19 22:06 235,026 -r--s---- C:\WINDOWS\SYSTEM32\dqrawex.dll
2006-12-19 21:45 236,081 -r--s---- C:\WINDOWS\SYSTEM32\irn0l55m1.dll
2006-12-19 18:45 236,771 -r--s---- C:\WINDOWS\SYSTEM32\ir4sl5h71.dll
2006-12-19 18:36 235,026 -r--s---- C:\WINDOWS\SYSTEM32\o4ns0e57eh.dll
2006-12-19 18:28 91,973 --a------ C:\Documents and Settings\Jamal\install.exe
2006-12-19 18:26 234,851 -r--s---- C:\WINDOWS\SYSTEM32\lvpq0975e.dll
2006-12-19 18:11 5,298 --a------ C:\WINDOWS\SYSTEM32\sachostc.exe
2006-12-19 18:11 4,786 --a------ C:\WINDOWS\SYSTEM32\sachosts.exe
2006-12-19 18:10 9,906 --a------ C:\WINDOWS\SYSTEM32\sachostp.exe
2006-12-19 18:06 167,695 --a------ C:\WINDOWS\cmfibula.exe
2006-12-19 18:01 236,724 --a------ C:\WINDOWS\batty2.exe
2006-12-19 17:57 2,368 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\msgegh.sys
2006-12-19 15:41 234,272 -r--s---- C:\WINDOWS\SYSTEM32\mkdtctm.dll
2006-12-19 15:38 587,776 --a------ C:\WINDOWS\Dc34.exe
2006-12-19 12:22 91,973 --a------ C:\WINDOWS\SYSTEM32\install.exe
2006-12-19 10:40 235,702 -r--s---- C:\WINDOWS\SYSTEM32\j0l4la3q1d.dll
2006-12-19 09:47 236,319 -r--s---- C:\WINDOWS\SYSTEM32\lt4027hmg.dll
2006-12-18 20:49 918 --a------ C:\WINDOWS\SYSTEM32\winpfz32.sys
2006-12-18 20:46 36,608 --a------ C:\WINDOWS\nem220.dll
2006-12-18 20:44 29,696 --a------ C:\WINDOWS\SYSTEM32\w01436aa.dll
2006-12-18 20:28 234,272 -r--s---- C:\WINDOWS\SYSTEM32\mvyuv.dll
2006-12-18 20:27 234,272 -r--s---- C:\WINDOWS\SYSTEM32\myyuv.dll
2006-12-18 13:46 6,239 --a------ C:\WINDOWS\SYSTEM32\se.exe
2006-12-18 13:46 18,015 --a------ C:\WINDOWS\SYSTEM32\w.exe
2006-12-18 13:46 18,015 ---h----- C:\WINDOWS\SYSTEM32\syspools.exe
2006-12-18 13:46 128,607 --a------ C:\WINDOWS\SYSTEM32\ss.exe
2006-12-18 13:36 8,342 --a------ C:\WINDOWS\SYSTEM32\comdlg77.dll
2006-12-18 13:03 234,272 -r--s---- C:\WINDOWS\SYSTEM32\ifuv_32.dll
2006-12-18 12:48 76,560 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\tmcomm.sys
2006-12-18 12:48 <DIR> d-------- C:\Program Files\Trend Micro
2006-12-18 12:15 234,272 -r--s---- C:\WINDOWS\SYSTEM32\kvdcz.dll
2006-12-18 12:15 234,272 -r--s---- C:\WINDOWS\SYSTEM32\jldw400.dll
2006-12-18 12:14 29,696 --a------ C:\WINDOWS\SYSTEM32\w037fb95.dll
2006-12-18 12:13 578,560 --a------ C:\WINDOWS\Installer3.exe
2006-12-18 11:59 852,566 --a------ C:\WINDOWS\cmdinst.exe
2006-12-18 11:41 <DIR> d-------- C:\Documents and Settings\Jamal\Shared
2006-12-18 11:41 <DIR> d-------- C:\Documents and Settings\Jamal\Incomplete
2006-12-18 11:41 <DIR> d-------- C:\Documents and Settings\Jamal\Application Data\LimeWire
2006-12-18 11:40 <DIR> d-------- C:\WINDOWS\Sun
2006-12-18 11:40 <DIR> d-------- C:\Documents and Settings\Jamal\Application Data\Sun
2006-12-18 11:38 <DIR> d-------- C:\Program Files\Java
2006-12-18 11:37 <DIR> d-------- C:\Program Files\Common Files\Java
2006-12-18 11:28 <DIR> d-------- C:\Documents and Settings\Jamal\Application Data\Preclick Photo Organizer
2006-12-17 12:25 <DIR> d-------- C:\Program Files\megalocastgames
2006-12-17 12:25 <DIR> d-------- C:\Program Files\Futurama
2006-12-17 12:10 <DIR> d-------- C:\Documents and Settings\Jamal\Application Data\SUPERAntiSpyware.com
2006-12-16 18:19 0 --a------ C:\WINDOWS\SYSTEM32\CMMGR32.EXE
2006-12-16 15:12 684,032 --a------ C:\WINDOWS\SYSTEM32\libeay32.dll
2006-12-16 15:12 155,648 --a------ C:\WINDOWS\SYSTEM32\ssleay32.dll
2006-12-16 15:12 15,360 --a------ C:\WINDOWS\SYSTEM32\DRIVERS\sskbfd.sys
2006-12-15 17:36 <DIR> d-------- C:\mm_deluxe
2006-12-10 16:16 <DIR> dr-h----- C:\Documents and Settings\Jamal\Recent
2006-12-08 20:52 79,360 --a------ C:\WINDOWS\SYSTEM32\swxcacls.exe
2006-12-08 20:52 40,960 --a------ C:\WINDOWS\SYSTEM32\swsc.exe
2006-12-07 17:35 53,248 --a------ C:\WINDOWS\SYSTEM32\Process.exe
2006-12-07 17:35 51,200 --a------ C:\WINDOWS\SYSTEM32\dumphive.exe
2006-12-07 17:35 288,417 --a------ C:\WINDOWS\SYSTEM32\SrchSTS.exe
2006-12-07 17:35 135,168 --a------ C:\WINDOWS\SYSTEM32\swreg.exe
2006-12-06 18:46 27,808 --a------ C:\WINDOWS\SYSTEM32\gxbplug.dll
2006-12-01 20:09 53,248 --a------ C:\WINDOWS\SYSTEM32\winclean.exe
2006-12-01 11:16 381,440 --a------ C:\loadmsg.exe
2006-11-30 16:38 69,632 --a------ C:\WINDOWS\SYSTEM32\blfdkinm.dll
2006-11-28 19:28 <DIR> d-------- C:\Documents and Settings\Jamal\Application Data\Mozilla
2006-11-28 17:33 <DIR> d-------- C:\Documents and Settings\Jamal\Application Data\Aim
2006-11-27 20:42 <DIR> d-------- C:\Documents and Settings\Jamal\Application Data\Rex-Services
2006-11-25 17:25 <DIR> d--hs---- C:\WA6P
2006-11-25 17:24 8,704 --a------ C:\WINDOWS\SYSTEM32\SpOrder.dll
2006-11-25 16:02 11,264 --a------ C:\WINDOWS\SYSTEM32\v3.dll
2006-11-25 15:35 27,648 --a------ C:\WINDOWS\SYSTEM32\stcloader.exe
2006-11-25 14:33 214 --a------ C:\WINDOWS\SYSTEM32\tmp.reg
2006-11-23 14:38 72,192 --a------ C:\WINDOWS\SYSTEM32\zlib.dll
2006-11-23 14:38 25,088 --a------ C:\WINDOWS\SYSTEM32\msxml3a.dll
2006-11-23 14:35 368,912 --a------ C:\WINDOWS\SYSTEM32\vbar332.dll
2006-11-23 13:41 89,088 --a------ C:\WINDOWS\SYSTEM32\atl71.dll
2006-11-23 13:41 499,712 --a------ C:\WINDOWS\SYSTEM32\msvcp71.dll
2006-11-23 13:41 348,160 --a------ C:\WINDOWS\SYSTEM32\msvcr71.dll
2006-11-23 13:41 1,060,864 --a------ C:\WINDOWS\SYSTEM32\mfc71.dll


(((((((((((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))))

Rootkit driver pe386 is present. A rootkit scan is required

2006-12-23 18:23 -------- d-a------ C:\Program Files\Common Files
2006-12-23 18:21 -------- d---s---- C:\Documents and Settings\Jamal\Application Data\Microsoft
2006-12-19 16:18 -------- d-------- C:\Program Files\Common Files\InstallShield
2006-12-19 15:45 0 --a------ C:\Documents and Settings\Jamal\Application Data\internaldb41.dat
2006-12-15 13:11 -------- d-------- C:\Program Files\Internet Explorer
2006-12-14 18:31 -------- d-------- C:\Documents and Settings\Jamal\Application Data\Macromedia
2006-11-25 17:25 0 --a------ C:\Program Files\Common Files\err.log
2006-11-25 13:44 982 --a------ C:\WINDOWS\SYSTEM32\winpfg32.sys
2006-11-24 09:26 -------- d-------- C:\Program Files\Windows Media Player
2006-11-24 09:26 -------- d-------- C:\Program Files\MSN
2006-11-22 17:12 110612 --a------ C:\WINDOWS\SYSTEM32\uohlwjvd.exe
2006-11-21 21:59 -------- d-------- C:\Program Files\Online Services
2006-11-21 21:49 -------- d-------- C:\Program Files\Windows NT
2006-11-21 21:49 -------- d-------- C:\Program Files\Web Publish
2006-11-21 17:13 -------- d-------- C:\Program Files\Messenger
2006-11-21 17:12 126996 --a------ C:\WINDOWS\SYSTEM32\aapmigup.dll
2006-11-21 17:12 110612 --a------ C:\WINDOWS\SYSTEM32\fhrghpvo.exe
2006-11-21 17:08 -------- d-------- C:\Program Files\Accessories
2006-11-21 17:04 40973 ---hs---- C:\WINDOWS\SYSTEM32\iifcywu.dll
2006-11-19 12:23 -------- d-------- C:\Documents and Settings\Jamal\Application Data\Identities
2006-11-19 03:30 62 --ahs---- C:\Documents and Settings\Jamal\Application Data\desktop.ini


(((((((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))

*Note* empty entries are not shown

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run]
@=""
"CMIntex"="\"C:\\Program Files\\CMIntex\\CMIntex.exe\""
"SUPERAntiSpyware"="C:\\Program Files\\SUPERAntiSpyware\\SUPERAntiSpyware.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run]
"xidvhxjA"="C:\\WINDOWS\\xidvhxjA.exe"
"yojefxvA"="C:\\WINDOWS\\yojefxvA.exe"
"AVG7_CC"="C:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgcc.exe /STARTUP"

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components]
"DeskHtmlVersion"=dword:00000110
"DeskHtmlMinorVersion"=dword:00000005
"Settings"=dword:00000001
"GeneralFlags"=dword:00000000

[HKEY_USERS\.default\software\microsoft\windows\currentversion\run]
"AVG7_Run"="C:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgw.exe /RUNONCE"

[HKEY_USERS\s-1-5-18\software\microsoft\windows\currentversion\run]
"AVG7_Run"="C:\\PROGRA~1\\Grisoft\\AVGFRE~1\\avgw.exe /RUNONCE"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\sharedtaskscheduler]
"{438755C2-A8BA-11D1-B96B-00A0C90312E1}"="Browseui preloader"
"{8C7461EF-2B13-11d2-BE35-3078302C2030}"="Component Categories cache daemon"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{AEB6717E-7E19-11d0-97EE-00C04FD91972}"=""
"{04CDB16C-AB38-43CD-A86A-6FEB90290939}"=""
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"=""

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoDriveTypeAutoRun"=dword:00000091

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer\Run]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"dontdisplaylastusername"=dword:00000000
"legalnoticecaption"=""
"legalnoticetext"=""
"shutdownwithoutlogon"=dword:00000001
"undockwithoutlogon"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run]
"isamini.exe"="C:\\Program Files\\Video ActiveX Object\\isamonitor.exe"

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NoDriveTypeAutoRun"=dword:00000091

[HKEY_USERS\s-1-5-18\software\microsoft\windows\currentversion\policies\explorer]
"NoDriveTypeAutoRun"=dword:00000091

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shellserviceobjectdelayload]
"PostBootReminder"="{7849596a-48ea-486e-8937-a2a3009f31a9}"
"CDBurn"="{fbeb8a05-beee-4442-804e-409d6c4515e9}"
"WebCheck"="{E6FB5E20-DE35-11CF-9C87-00AA005127ED}"
"SysTray"="{35CEC8A3-2BE6-11D2-8773-92E220524153}"

HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\winsys2freg

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
"SecurityProviders"="msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll"

Completion time: 06-12-23 18:39:33.17
C:\ComboFix.txt ... 06-12-23 18:39
Jamal

#5 jamal56783

jamal56783
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 23 December 2006 - 10:28 PM

SUPERAntiSpyware Scan Log
Generated 12/23/2006 at 07:22 PM

Application Version : 3.4.1000

Core Rules Database Version : 3153
Trace Rules Database Version: 1170

Scan type : Complete Scan
Total Scan Time : 00:27:14

Memory items scanned : 186
Memory threats detected : 1
Registry items scanned : 3712
Registry threats detected : 202
File items scanned : 6540
File threats detected : 152

Adware.FullContext
C:\PROGRAM FILES\PADSYSASSISTANT\PADSYSASSISTANT.EXE
C:\PROGRAM FILES\PADSYSASSISTANT\PADSYSASSISTANT.EXE
HKLM\Software\Classes\CLSID\{04CDB16C-AB38-43CD-A86A-6FEB90290939}
HKCR\CLSID\{04CDB16C-AB38-43CD-A86A-6FEB90290939}
HKCR\CLSID\{04CDB16C-AB38-43CD-A86A-6FEB90290939}
HKCR\CLSID\{04CDB16C-AB38-43CD-A86A-6FEB90290939}\InprocServer32
HKCR\CLSID\{04CDB16C-AB38-43CD-A86A-6FEB90290939}\InprocServer32#ThreadingModel
C:\PROGRAM FILES\PADSYSASSISTANT\ASSISTANTLIBRARY.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{04CDB16C-AB38-43CD-A86A-6FEB90290939}
C:\Program Files\PadsysAssistant\desktop.ini
C:\Program Files\PadsysAssistant\Uninstall.exe
C:\Program Files\PadsysAssistant
HKU\S-1-5-21-725345543-813497703-854245398-1004\Software\CMFibula
HKU\S-1-5-21-725345543-813497703-854245398-1004\Software\PSDream
HKU\S-1-5-21-725345543-813497703-854245398-1004\Software\PSCastor
HKU\S-1-5-21-725345543-813497703-854245398-1004\Software\PadsysAssistant
C:\WINDOWS\BATTY2.EXE
C:\WINDOWS\SYSTEM32\BATTYRUN2.DLL

Unclassified.Unknown Origin
HKLM\Software\Classes\CLSID\{2B896072-F6E3-4FF7-ADE6-43D5BEC6557C}
HKCR\CLSID\{2B896072-F6E3-4FF7-ADE6-43D5BEC6557C}
HKCR\CLSID\{2B896072-F6E3-4FF7-ADE6-43D5BEC6557C}
HKCR\CLSID\{2B896072-F6E3-4FF7-ADE6-43D5BEC6557C}\InprocServer32
HKCR\CLSID\{2B896072-F6E3-4FF7-ADE6-43D5BEC6557C}\InprocServer32#ThreadingModel
HKCR\CLSID\{2B896072-F6E3-4FF7-ADE6-43D5BEC6557C}\ProgID
HKCR\CLSID\{2B896072-F6E3-4FF7-ADE6-43D5BEC6557C}\Programmable
HKCR\CLSID\{2B896072-F6E3-4FF7-ADE6-43D5BEC6557C}\TypeLib
HKCR\CLSID\{2B896072-F6E3-4FF7-ADE6-43D5BEC6557C}\VersionIndependentProgID
C:\WINDOWS\SYSTEM32\NODEIPPROC.DLL
HKCR\CLSID\{00D13CE9-1879-41BD-B8A3-EA3CB1BD01BC}
HKCR\CLSID\{00D13CE9-1879-41BD-B8A3-EA3CB1BD01BC}\InprocServer32
HKCR\CLSID\{00D13CE9-1879-41BD-B8A3-EA3CB1BD01BC}\InprocServer32#ThreadingModel
HKCR\CLSID\{00D13CE9-1879-41BD-B8A3-EA3CB1BD01BC}\ProgID
HKCR\CLSID\{00D13CE9-1879-41BD-B8A3-EA3CB1BD01BC}\Programmable
HKCR\CLSID\{00D13CE9-1879-41BD-B8A3-EA3CB1BD01BC}\TypeLib
HKCR\CLSID\{00D13CE9-1879-41BD-B8A3-EA3CB1BD01BC}\VersionIndependentProgID

Adware.AdSponsor
HKLM\Software\Classes\CLSID\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}
HKCR\CLSID\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}
HKCR\CLSID\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}
HKCR\CLSID\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}#AppID
HKCR\CLSID\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}\Implemented Categories
HKCR\CLSID\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}\Implemented Categories\{00021493-0000-0000-C000-000000000046}
HKCR\CLSID\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}\InprocServer32
HKCR\CLSID\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}\InprocServer32#ThreadingModel
HKCR\CLSID\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}\ProgID
HKCR\CLSID\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}\TypeLib
HKCR\CLSID\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}\VersionIndependentProgID
C:\PROGRAM FILES\ADSPONSOR\ADSPONSOR.DLL
HKLM\Software\Microsoft\Internet Explorer\Explorer Bars\{2BC9C452-BB57-4896-A9A2-64611E06C5AA}
HKCR\AdBand.BandBHO
HKCR\AdBand.BandBHO\CLSID
HKCR\AdBand.BandBHO\CurVer
HKCR\AdBand.BandBHO.1
HKCR\AdBand.BandBHO.1\CLSID
HKCR\AdBand.BandImpl
HKCR\AdBand.BandImpl\CLSID
HKCR\AdBand.BandImpl\CurVer
HKCR\AdBand.BandImpl.1
HKCR\AdBand.BandImpl.1\CLSID
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\0
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\0\win32
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\FLAGS
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\HELPDIR
HKCR\TypeLib\{D5599FAE-28AA-4C2B-A29C-6C0CD5B245AA}
HKCR\TypeLib\{D5599FAE-28AA-4C2B-A29C-6C0CD5B245AA}\1.0
HKCR\TypeLib\{D5599FAE-28AA-4C2B-A29C-6C0CD5B245AA}\1.0\0
HKCR\TypeLib\{D5599FAE-28AA-4C2B-A29C-6C0CD5B245AA}\1.0\0\win32
HKCR\TypeLib\{D5599FAE-28AA-4C2B-A29C-6C0CD5B245AA}\1.0\FLAGS
HKCR\TypeLib\{D5599FAE-28AA-4C2B-A29C-6C0CD5B245AA}\1.0\HELPDIR
HKCR\AppId\AdBand.DLL
HKCR\AppId\AdBand.DLL#AppID
HKCR\AppId\{36946A0A-05A1-4CF7-934B-270571338E55}
HKU\S-1-5-21-725345543-813497703-854245398-1004\Software\AdSponsor
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSponsor
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSponsor#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdSponsor#UninstallString

Trojan.Rootkit-FullContext
HKLM\System\ControlSet001\Services\dxminiport
C:\PROGRAM FILES\PADSYSASSISTANT\PADSYSLIBRARY2.SYS
HKLM\System\ControlSet001\Services\searchassistant
C:\PROGRAM FILES\PADSYSASSISTANT\PADSYSLIBRARY.SYS
HKLM\System\CurrentControlSet\Services\dxminiport
HKLM\System\CurrentControlSet\Services\searchassistant
HKLM\SYSTEM\CurrentControlSet\Services\dxminiport#Type
HKLM\SYSTEM\CurrentControlSet\Services\dxminiport#Start
HKLM\SYSTEM\CurrentControlSet\Services\dxminiport#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\dxminiport#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\dxminiport#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\dxminiport\Security
HKLM\SYSTEM\CurrentControlSet\Services\dxminiport\Security#Security
HKLM\SYSTEM\CurrentControlSet\Services\dxminiport\Enum
HKLM\SYSTEM\CurrentControlSet\Services\dxminiport\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\dxminiport\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\dxminiport\Enum#NextInstance
HKLM\SYSTEM\CurrentControlSet\Services\searchassistant#Type
HKLM\SYSTEM\CurrentControlSet\Services\searchassistant#Start
HKLM\SYSTEM\CurrentControlSet\Services\searchassistant#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\searchassistant#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\searchassistant#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\searchassistant\Security
HKLM\SYSTEM\CurrentControlSet\Services\searchassistant\Security#Security
HKLM\SYSTEM\CurrentControlSet\Services\searchassistant\Enum
HKLM\SYSTEM\CurrentControlSet\Services\searchassistant\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\searchassistant\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\searchassistant\Enum#NextInstance

Trojan.Downloader-SysMon
HKLM\System\ControlSet001\Services\Windows Overlay Components
C:\WINDOWS\XIDVHXJ.EXE
HKLM\System\ControlSet002\Services\Windows Overlay Components
HKLM\System\CurrentControlSet\Services\Windows Overlay Components

Adware.Tracking Cookie
C:\Documents and Settings\Jamal\Cookies\jamal@www.drivecleaner[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@offers.worldadvertisingdirect[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@www.stopzilla[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@kanoodle[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@count3.exitexchange[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@trafficmp[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@realmedia[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@adserver[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@anad.tacoda[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@mb[4].txt
C:\Documents and Settings\Jamal\Cookies\jamal@www.cyberspacestats[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@entrepreneur.122.2o7[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@screensavers[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@24302[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@24278[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@winantivirus[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ehg-pcsecurityshield.hitbox[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@sextracker[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@fastclick[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@a.websponsors[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ads.adnet-plus[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@nextstat[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@directtrack[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@revsci[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ads.topix[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@interclick[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@exitexchange[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ehg-inforspaceinc.hitbox[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ads.addynamix[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@clicksor[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@mbop[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@i.screensavers[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@count2.exitexchange[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@drivecleaner[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ehg-ripedigitalentertainment.hitbox[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@sxload[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@count1.exitexchange[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@media.licenseacquisition[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@dxcdirect[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@as-us.falkag[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@hitbox[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@doubleclick[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@advertising[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@entrepreneur[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@heavycom.122.2o7[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@apmebf[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ads.realtechnetwork[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ats[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@24215[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ads.traffic-o-rama[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@creditpaymentservices.122.2o7[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@questionmarket[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@adopt.hotbar[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ad.yieldmanager[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@mb[3].txt
C:\Documents and Settings\Jamal\Cookies\jamal@247realmedia[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@revenue[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@mediaplex[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@stats.privacyprotector[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@www.adnet-plus[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@reduxads.valuead[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@cpvfeed[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@login.revenueloop[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@cgi-bin[3].txt
C:\Documents and Settings\Jamal\Cookies\jamal@gostats[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ehg-bandwidth.hitbox[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@cpacampaigns.directtrack[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@adecn[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@xxxreactor[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@tacoda[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@findwhat[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@onlinerewardcenter[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@adbrite[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@stats1.reliablestats[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@image.masterstats[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@rotator.adjuggler[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@login.tracking101[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@24303[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@azjmp[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@adsrevenue[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@as-eu.falkag[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@adultfriendfinder[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ads.pointroll[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@casalemedia[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ad[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@adserver.easyad[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@tcompany.122.2o7[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@adserve.webtoolcafe[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@www.rowise[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@focalex[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@sexybabesx[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@atdmt[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@www.advertyz[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@edge.ru4[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@cz6.clickzs[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@mb[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@indiads[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@www.virusbursters[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@hotbar[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@statse.webtrendslive[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@serving-sys[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@mb[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@2o7[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@rambler[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@count4.exitexchange[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@hotlog[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@bluestreak[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@adopt.specificclick[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@zedo[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@tribalfusion[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@adrevolver[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@www.winantivirus[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@phg.hitbox[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@24218[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@www.amaena[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@enhance[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@indexstats[2].txt
C:\Documents and Settings\Jamal\Cookies\jamal@ads.k8l[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@www.screensavers[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@counter9.sextracker[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@banners.searchingbooth[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@sexlist[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@qksrv[1].txt
C:\Documents and Settings\Jamal\Cookies\jamal@msnportal.112.2o7[1].txt
C:\Documents and Settings\LocalService.NT AUTHORITY.003\Cookies\system@ad.yieldmanager[1].txt
C:\Documents and Settings\LocalService.NT AUTHORITY.003\Cookies\system@enhance[1].txt
C:\Documents and Settings\LocalService.NT AUTHORITY.003\Cookies\system@findwhat[1].txt
C:\Documents and Settings\LocalService.NT AUTHORITY.003\Cookies\system@mediaplex[1].txt

Adware.Avenue Media/Internet Optimizer
HKCR\CLSID\{00000010-6F7D-442C-93E3-4A4827C2E4C8}
HKCR\CLSID\{00000010-6F7D-442C-93E3-4A4827C2E4C8}\InprocServer32
HKCR\CLSID\{00000010-6F7D-442C-93E3-4A4827C2E4C8}\InprocServer32#ThreadingModel
HKCR\CLSID\{00000010-6F7D-442C-93E3-4A4827C2E4C8}\ProgID
HKCR\CLSID\{00000010-6F7D-442C-93E3-4A4827C2E4C8}\Programmable
HKCR\CLSID\{00000010-6F7D-442C-93E3-4A4827C2E4C8}\TypeLib
HKCR\CLSID\{00000010-6F7D-442C-93E3-4A4827C2E4C8}\VersionIndependentProgID
HKCR\Interface\{1C01D150-91A4-4DE0-9BF8-A35D1BDF1001}
HKCR\Interface\{1C01D150-91A4-4DE0-9BF8-A35D1BDF1001}\ProxyStubClsid
HKCR\Interface\{1C01D150-91A4-4DE0-9BF8-A35D1BDF1001}\ProxyStubClsid32
HKCR\Interface\{1C01D150-91A4-4DE0-9BF8-A35D1BDF1001}\TypeLib
HKCR\Interface\{1C01D150-91A4-4DE0-9BF8-A35D1BDF1001}\TypeLib#Version
HKCR\TypeLib\{40B1D454-9CA4-43CC-86AA-CB175EAC52FB}
HKCR\TypeLib\{40B1D454-9CA4-43CC-86AA-CB175EAC52FB}\1.0
HKCR\TypeLib\{40B1D454-9CA4-43CC-86AA-CB175EAC52FB}\1.0\0
HKCR\TypeLib\{40B1D454-9CA4-43CC-86AA-CB175EAC52FB}\1.0\0\win32
HKCR\TypeLib\{40B1D454-9CA4-43CC-86AA-CB175EAC52FB}\1.0\FLAGS
HKCR\TypeLib\{40B1D454-9CA4-43CC-86AA-CB175EAC52FB}\1.0\HELPDIR

Adware.Toolbar888
HKCR\CLSID\{C1B4DEC2-2623-438E-9CA2-C9043AB28508}
HKCR\CLSID\{C1B4DEC2-2623-438E-9CA2-C9043AB28508}\InprocServer32
HKCR\CLSID\{C1B4DEC2-2623-438E-9CA2-C9043AB28508}\InprocServer32#ThreadingModel
HKCR\CLSID\{C1B4DEC2-2623-438E-9CA2-C9043AB28508}\ProgID
HKCR\CLSID\{C1B4DEC2-2623-438E-9CA2-C9043AB28508}\Programmable
HKCR\CLSID\{C1B4DEC2-2623-438E-9CA2-C9043AB28508}\TypeLib
HKCR\CLSID\{C1B4DEC2-2623-438E-9CA2-C9043AB28508}\VersionIndependentProgID

Trojan.SpyFalcon
C:\WINDOWS\system32\oleext.dll

Trojan.NetMon/DNSChange
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#DeviceDesc

Trojan.cmdService
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#DeviceDesc

Trojan.Windows Overlay Components/SysMon
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components#Type
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components#Start
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components#ObjectName
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components\Security
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components\Security#Security
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components\Enum
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\Windows Overlay Components\Enum#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDOWS_OVERLAY_COMPONENTS
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDOWS_OVERLAY_COMPONENTS#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDOWS_OVERLAY_COMPONENTS\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDOWS_OVERLAY_COMPONENTS\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDOWS_OVERLAY_COMPONENTS\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDOWS_OVERLAY_COMPONENTS\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDOWS_OVERLAY_COMPONENTS\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDOWS_OVERLAY_COMPONENTS\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINDOWS_OVERLAY_COMPONENTS\0000#DeviceDesc
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OvMon
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OvMon#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OvMon#UninstallString

Trojan.ZenoSearch
C:\WINDOWS\system32\msnav32.ax

Adware.MediaMotor
HKLM\software\mm
HKLM\software\mm#check

Trojan.Malware
HKCR\CLSID\{357A87ED-3E5D-437d-B334-DEB7EB4982A3}
HKCR\CLSID\{357A87ED-3E5D-437d-B334-DEB7EB4982A3}#IT
HKCR\CLSID\{357A87ED-3E5D-437d-B334-DEB7EB4982A3}#Bin
HKCR\CLSID\{357A87ED-3E5D-437d-B334-DEB7EB4982A3}#No

Trojan.WinBo32/Enhance
HKLM\Software\System\sysold
HKLM\Software\System\sysold#sys037566587100
HKLM\Software\System\sysold#sys037566587100.exe
HKLM\Software\System\sysold#win32097100756658.exe
HKLM\Software\System\sysold#gege15x.exe
HKU\S-1-5-21-725345543-813497703-854245398-1004\Software\System\sysuid

Adware.AdRotator
HKCR\OddBot.AdClicker
HKCR\OddBot.AdClicker\CLSID
HKCR\OddBot.AdClicker\CurVer
HKCR\OddBot.AdClicker.1
HKCR\OddBot.AdClicker.1\CLSID
HKCR\TypeLib\{C845AC9A-70A6-491C-9106-D34A360E1F58}
HKCR\TypeLib\{C845AC9A-70A6-491C-9106-D34A360E1F58}\1.0
HKCR\TypeLib\{C845AC9A-70A6-491C-9106-D34A360E1F58}\1.0\0
HKCR\TypeLib\{C845AC9A-70A6-491C-9106-D34A360E1F58}\1.0\0\win32
HKCR\TypeLib\{C845AC9A-70A6-491C-9106-D34A360E1F58}\1.0\FLAGS
HKCR\TypeLib\{C845AC9A-70A6-491C-9106-D34A360E1F58}\1.0\HELPDIR
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdRotator
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdRotator#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdRotator#UninstallString
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdRotator#Publisher
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdRotator#HelpLink
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdRotator#URLInfoAbout
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdRotator#NoModify
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdRotator#NoRepair
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdRotator#DisplayVersion
HKLM\SOFTWARE\NodeIpProc
HKLM\SOFTWARE\NodeIpProc#Vendor
HKCR\Interface\{251DF512-6FAF-4AAF-BF19-D99B5F1C9250}
HKCR\Interface\{251DF512-6FAF-4AAF-BF19-D99B5F1C9250}\ProxyStubClsid
HKCR\Interface\{251DF512-6FAF-4AAF-BF19-D99B5F1C9250}\ProxyStubClsid32
HKCR\Interface\{251DF512-6FAF-4AAF-BF19-D99B5F1C9250}\TypeLib
HKCR\Interface\{251DF512-6FAF-4AAF-BF19-D99B5F1C9250}\TypeLib#Version

Trojan.Freeprod
C:\DOCUMENTS AND SETTINGS\JAMAL\INSTALL.EXE

Trojan.Downloader-CommandDesktop
C:\WINDOWS\CMDINST.EXE

Adware.CASClient
C:\WINDOWS\CMFIBULA.EXE

Adware.SysMon
C:\WINDOWS\DC34.EXE

Adware.Spyware Labs
C:\WINDOWS\DOWNLOADED PROGRAM FILES\WRAPPEROUTER.EXE

Adware.NicTech Networks
C:\WINDOWS\INSTALLER3.EXE

Adware.Avenue Media
C:\WINDOWS\NEM220.DLL

Trojan.Downloader-SpyTool
C:\WINDOWS\SYSTEM32\AAPMIGUP.DLL

Worm.Loosky Variant
C:\WINDOWS\SYSTEM32\ATTRIB.INI

Trojan.Downloader-NewAds
C:\WINDOWS\SYSTEM32\BLFDKINM.DLL
Jamal

#6 jamal56783

jamal56783
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 23 December 2006 - 10:31 PM

Logfile of HijackThis v1.99.1
Scan saved at 7:29:08 PM, on 12/23/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRAM FILES\PADSYSASSISTANT\PadsysAssistant.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Batty2\Batty2.exe
C:\Documents and Settings\Jamal\Desktop\HijackThis.exe

O2 - BHO: BandBHO Class - {6CA1C00B-90FC-4F3E-911F-95306ABA43AA} - C:\Program Files\AdSponsor\AdSponsor.dll
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
Jamal

#7 jamal56783

jamal56783
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 23 December 2006 - 10:52 PM

ok for some reason my computer will not work in normal mode but in safe mode its fine and i really need help :thumbsup:
Jamal

#8 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 24 December 2006 - 10:20 AM

Do you have the XP CD - You had an infection that is near impossible to clear your system and you had some many problems it is best to do a reformat and reinstall.
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#9 jamal56783

jamal56783
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 24 December 2006 - 02:50 PM

i dont have a xp cd
Jamal

#10 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 24 December 2006 - 02:59 PM

Are you showing everything or do you have items in hijacks ignorelist




Fix these with HiJackThis – mark them, close IE, click fix checked

O2 - BHO: BandBHO Class - {6CA1C00B-90FC-4F3E-911F-95306ABA43AA} - C:\Program Files\AdSponsor\AdSponsor.dll


Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

C:\Program Files\AdSponsor
C:\Program Files\Batty2

Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

Not all temp files will delete and that is normal
Empty the recycle bin
Boot

===========================

Go to the link below and download the trial version of SpySweeper:

SpySweeper http://www.webroot.com/consumer/products/s...4129&ac=tsg

(It's a 2 week trial.)

* Click the Try Spy Sweeper for FreeDownload the trial link.
* Install it. Once the program is installed, it will open.
* It will prompt you to update to the latest definitions, click Yes.
* Once the definitions are installed, click Options on the left side.
* Click the Sweep Options tab.
* Under What to Sweep please put a check next to the following:
o Sweep Memory
o Sweep Registry
o Sweep Cookies
o Sweep All User Accounts
o Enable Direct Disk Sweeping
o Sweep Contents of Compressed Files
o Sweep for Rootkits

o Please UNCHECK Do not Sweep System Restore Folder.

* Click Sweep Now on the left side.
* Click the Start button.
* When it's done scanning, click the Next button.
* Make sure everything has a check next to it, then click the Next button.
* It will remove all of the items found.
* Click Session Log in the upper right corner, copy everything in that window.
* Click the Summary tab and click Finish.
* Paste the contents of the session log you copied into your next reply.

Also post a new Hijack This log.
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#11 jamal56783

jamal56783
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 24 December 2006 - 04:06 PM

Pocket Killbox version 2.0.0.881
Running on Windows XP as Jamal(Administrator)
was started @ Sunday, December 24, 2006, 12:22 PM

# 1 [Files to Delete]
Path = C:\Program Files\AdSponsor
*File Was Deleted

# 2 [Files to Delete]
Path = C:\Program Files\Batty2
*File Was Deleted

Killbox Closed(Exit) @ 12:24:53 PM
__________________________________________________



1:03 PM: Removal process completed. Elapsed time 00:05:13
1:02 PM: Quarantining All Traces: hotbar/zango
1:02 PM: Quarantining All Traces: monstermarketplace cookie
1:02 PM: Quarantining All Traces: infospace cookie
1:02 PM: Quarantining All Traces: zango cookie
1:02 PM: Quarantining All Traces: seeq cookie
1:02 PM: Quarantining All Traces: myaffiliateprogram.com cookie
1:02 PM: Quarantining All Traces: tribalfusion cookie
1:02 PM: Quarantining All Traces: trafficmp cookie
1:02 PM: Quarantining All Traces: tacoda cookie
1:02 PM: Quarantining All Traces: revenue.net cookie
1:02 PM: Quarantining All Traces: reunion cookie
1:02 PM: Quarantining All Traces: realmedia cookie
1:02 PM: Quarantining All Traces: passion cookie
1:02 PM: Quarantining All Traces: outster cookie
1:02 PM: Quarantining All Traces: nuker cookie
1:02 PM: Quarantining All Traces: mygeek cookie
1:02 PM: Quarantining All Traces: 2o7.net cookie
1:02 PM: Quarantining All Traces: webtrends cookie
1:02 PM: Quarantining All Traces: go.com cookie
1:02 PM: Quarantining All Traces: exitexchange cookie
1:02 PM: Quarantining All Traces: ru4 cookie
1:02 PM: Quarantining All Traces: hitslink cookie
1:02 PM: Quarantining All Traces: casalemedia cookie
1:02 PM: Quarantining All Traces: bravenet cookie
1:02 PM: Quarantining All Traces: atlas dmt cookie
1:02 PM: Quarantining All Traces: ask cookie
1:02 PM: Quarantining All Traces: advertising cookie
1:02 PM: Quarantining All Traces: adrevolver cookie
1:02 PM: Quarantining All Traces: specificclick.com cookie
1:02 PM: Quarantining All Traces: yieldmanager cookie
1:02 PM: Quarantining All Traces: 180search assistant/zango
1:02 PM: Quarantining All Traces: gxb
1:02 PM: Quarantining All Traces: webrebates
1:02 PM: Quarantining All Traces: networkessentials
1:02 PM: Quarantining All Traces: ezula ilookup
1:02 PM: Quarantining All Traces: popupwithcast
1:01 PM: Quarantining All Traces: exact bullseye
1:01 PM: Quarantining All Traces: webhancer
1:01 PM: Quarantining All Traces: desktop bar
1:00 PM: Quarantining All Traces: command
1:00 PM: Quarantining All Traces: virtualbouncer
1:00 PM: Quarantining All Traces: hi5 toolbar
1:00 PM: Quarantining All Traces: trojan-downloader-pscastor
1:00 PM: Quarantining All Traces: deluxecommunications
1:00 PM: Quarantining All Traces: internetoptimizer
1:00 PM: Quarantining All Traces: trafficsolution
1:00 PM: Quarantining All Traces: trojan-winclean
1:00 PM: Quarantining All Traces: trojan-backdoor-banwarum@mm
1:00 PM: Quarantining All Traces: trojan-downloader-asdbiz.biz
12:59 PM: Quarantining All Traces: trojan-downloader-padsysassistant
12:59 PM: Quarantining All Traces: trojan-downloader-cmintex
12:59 PM: Quarantining All Traces: trojan-busky
12:59 PM: Quarantining All Traces: trojan-relayer-fivetoone
12:59 PM: Quarantining All Traces: trojan-phisher-nethelper
12:59 PM: Quarantining All Traces: ist yoursitebar
12:59 PM: Quarantining All Traces: trojan downloader matcash
12:58 PM: Quarantining All Traces: look2me
12:58 PM: Quarantining All Traces: spysheriff fakealert
12:58 PM: Quarantining All Traces: vs toolbar
12:58 PM: Quarantining All Traces: enbrowser
12:58 PM: Quarantining All Traces: elitebar
12:58 PM: Quarantining All Traces: visfx
12:58 PM: Quarantining All Traces: trojan-downloader-game4all.biz
12:58 PM: Quarantining All Traces: trojan-downloader-evko.biz
12:58 PM: Quarantining All Traces: trojan looksy
12:58 PM: Quarantining All Traces: trojan-downloader-zlob
12:58 PM: Quarantining All Traces: 2nd-thought
12:58 PM: Quarantining All Traces: trojan-downloader-ac2
12:57 PM: Quarantining All Traces: fullcontext
12:57 PM: Removal process initiated
12:56 PM: Sweep Status: 69 Items Found
12:56 PM: Traces Found: 274
12:56 PM: File Sweep Complete, Elapsed Time: 00:15:29
12:56 PM: Sweep Canceled
12:56 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0039699.dll (ID = 144945)
12:56 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0036314.exe (ID = 378379)
12:56 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0039700.exe (ID = 144946)
12:56 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0022949.exe (ID = 115372)
12:56 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0037170.exe (ID = 378334)
12:55 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0036296.exe (ID = 379083)
12:55 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0036312.exe (ID = 382687)
12:55 PM: C:\WINDOWS\SYSTEM32\n08olal31dq.dll (ID = 493)
12:55 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025252.exe (ID = 378494)
12:55 PM: C:\WINDOWS\SYSTEM32\dqrawex.dll (ID = 493)
12:55 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0021942.dll (ID = 286981)
12:55 PM: Found Adware: ist yoursitebar
12:55 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035623.exe (ID = 255142)
12:55 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0037164.exe (ID = 378377)
12:55 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0036058.exe (ID = 83956)
12:55 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0039610.sys (ID = 413585)
12:55 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0039609.sys (ID = 413584)
12:55 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP1\A0013211.inf (ID = 339662)
12:54 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0036050.exe (ID = 360447)
12:54 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0001041.exe (ID = 361293)
12:54 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0036295.exe (ID = 378334)
12:54 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0050768.exe (ID = 231664)
12:54 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0029915.exe (ID = 83956)
12:54 PM: C:\WINDOWS\SYSTEM32\gxbplug.dll (ID = 62009)
12:54 PM: Found Adware: gxb
12:54 PM: C:\WINDOWS\SYSTEM32\ir4sl5h71.dll (ID = 493)
12:54 PM: C:\WINDOWS\SYSTEM32\myyuv.dll (ID = 163672)
12:54 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035524.dll (ID = 144945)
12:54 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0048736.dll (ID = 166754)
12:54 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP1\A0017348.inf (ID = 339662)
12:54 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0001046.exe (ID = 115372)
12:54 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0036021.exe (ID = 361268)
12:54 PM: C:\WINDOWS\SYSTEM32\kvdcz.dll (ID = 163672)
12:54 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP5\A0025316.exe (ID = 378495)
12:54 PM: C:\WINDOWS\SYSTEM32\k8pm0i71e8.dll (ID = 493)
12:53 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP1\A0004202.dll (ID = 360566)
12:53 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0035978.exe (ID = 83956)
12:53 PM: Found Adware: webrebates
12:53 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0032270.exe (ID = 413362)
12:53 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0032287.exe (ID = 345)
12:53 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0032278.exe (ID = 345)
12:53 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0039724.exe (ID = 335)
12:53 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0020342.inf (ID = 339662)
12:53 PM: C:\System Volume Information\_restore{85382948-7181-4fc5-bd7c-05a391c0fe5a}\RP14\A0110121.exe (ID = 539)
12:53 PM: C:\WINDOWS\SYSTEM32\mkdtctm.dll (ID = 163672)
12:53 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033371.dll (ID = 359890)
12:53 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033365.dll (ID = 359890)
12:53 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033354.dll (ID = 359890)
12:53 PM: C:\WINDOWS\SYSTEM32\o4ns0e57eh.dll (ID = 493)
12:53 PM: C:\WINDOWS\SYSTEM32\guard.tmp (ID = 493)
12:53 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP26\A0029086.exe (ID = 255142)
12:53 PM: Found Trojan Horse: trojan downloader matcash
12:53 PM: C:\WINDOWS\SYSTEM32\fp4003hme.dll (ID = 493)
12:53 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0048775.exe (ID = 414380)
12:53 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0001035.exe (ID = 146972)
12:53 PM: Found Adware: networkessentials
12:53 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0048779.exe (ID = 414371)
12:53 PM: Found Trojan Horse: trojan-downloader-pscastor
12:53 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0048774.exe (ID = 344993)
12:53 PM: C:\WINDOWS\SYSTEM32\f0l0la3m1d.dll (ID = 493)
12:52 PM: C:\WINDOWS\SYSTEM32\mpwdat10.dll (ID = 163672)
12:52 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP1\A0016342.inf (ID = 339662)
12:52 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025226.exe (ID = 359310)
12:52 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0022959.inf (ID = 339662)
12:52 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0036289.exe (ID = 379081)
12:52 PM: Found Adware: ezula ilookup
12:52 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0050785.exe (ID = 413578)
12:52 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0039684.exe (ID = 335)
12:52 PM: C:\WINDOWS\SYSTEM32\jldw400.dll (ID = 163672)
12:52 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0050765.exe (ID = 99)
12:52 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0028932.inf (ID = 339662)
12:52 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0048760.exe (ID = 144946)
12:52 PM: C:\WINDOWS\SYSTEM32\e402ledo1h0c.dll (ID = 163672)
12:52 PM: Found Adware: look2me
12:51 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025233.exe (ID = 361293)
12:51 PM: Found Adware: deluxecommunications
12:51 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025153.exe (ID = 360972)
12:51 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0037592.exe (ID = 335)
12:51 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035592.dll (ID = 407641)
12:51 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0000075.dll (ID = 360566)
12:51 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025223.dll (ID = 216235)
12:51 PM: Found Adware: hotbar/zango
12:51 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0048773.dll (ID = 345004)
12:51 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0021400.exe (ID = 361268)
12:51 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0048776.exe (ID = 413634)
12:51 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0032285.exe (ID = 242074)
12:51 PM: Found Adware: spysheriff fakealert
12:51 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025213.dll (ID = 360569)
12:51 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025144.exe (ID = 361725)
12:51 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035620.dll (ID = 407641)
12:50 PM: C:\WINDOWS\SYSTEM32\uohlwjvd.exe (ID = 539)
12:50 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0038596.exe (ID = 333)
12:50 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0036563.exe (ID = 333)
12:50 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025150.exe (ID = 361268)
12:50 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0032230.vbs (ID = 231442)
12:50 PM: C:\WINDOWS\SYSTEM32\fhrghpvo.exe (ID = 539)
12:50 PM: Found Adware: vs toolbar
12:50 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035421.exe (ID = 80237)
12:50 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP33\A0047733.exe (ID = 301241)
12:49 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0048759.dll (ID = 144945)
12:49 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0039730.exe (ID = 333)
12:49 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0052788.dll (ID = 344979)
12:49 PM: C:\WINDOWS\SYSTEM32\w037fb95.dll (ID = 320288)
12:49 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0050772.dll (ID = 64043)
12:49 PM: Found Adware: internetoptimizer
12:49 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0013021.inf (ID = 339662)
12:49 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025189.ini (ID = 304315)
12:49 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035615.dll (ID = 359890)
12:49 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0048758.exe (ID = 231443)
12:49 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0001157.ini (ID = 304315)
12:49 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0041727.exe (ID = 333)
12:49 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025214.dll (ID = 360566)
12:49 PM: Found Adware: popupwithcast
12:49 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP1\A0016291.exe (ID = 346389)
12:49 PM: Found Adware: enbrowser
12:48 PM: C:\WINDOWS\SYSTEM32\stcloader.exe (ID = 48347)
12:48 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0032971.inf (ID = 339662)
12:48 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0023908.exe (ID = 115372)
12:48 PM: Found Adware: exact bullseye
12:48 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035575.exe (ID = 345)
12:48 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035571.exe (ID = 345)
12:48 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025212.exe (ID = 360447)
12:48 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035597.dll (ID = 359890)
12:48 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0041726.exe (ID = 331)
12:48 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025234.exe (ID = 335877)
12:47 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0021691.inf (ID = 339662)
12:47 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025200.exe (ID = 334250)
12:47 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025251.exe (ID = 378493)
12:47 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0021496.exe (ID = 361268)
12:47 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033347.dll (ID = 359890)
12:47 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025256.exe (ID = 335877)
12:47 PM: Found Adware: trafficsolution
12:47 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0036313.exe (ID = 378375)
12:47 PM: Found Adware: webhancer
12:47 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0042724.exe (ID = 335)
12:47 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0010013.inf (ID = 339662)
12:46 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033266.dll (ID = 359890)
12:46 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0053835.dll (ID = 365890)
12:46 PM: Found Adware: elitebar
12:46 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0039637.dll (ID = 166754)
12:46 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0039591.vbs (ID = 231442)
12:46 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0039729.exe (ID = 331)
12:46 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0037597.exe (ID = 333)
12:46 PM: C:\WINDOWS\SYSTEM32\winclean.exe (ID = 406531)
12:46 PM: Found Trojan Horse: trojan-winclean
12:46 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033324.dll (ID = 359890)
12:46 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0040727.exe (ID = 333)
12:46 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0050761.dll (ID = 344979)
12:46 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0048734.exe (ID = 356444)
12:46 PM: Found Adware: visfx
12:45 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033309.dll (ID = 359890)
12:45 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0040726.exe (ID = 331)
12:45 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0034375.dll (ID = 359890)
12:45 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033341.dll (ID = 359890)
12:45 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP5\A0025314.exe (ID = 378493)
12:45 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033316.dll (ID = 359890)
12:45 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035413.exe (ID = 413362)
12:45 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0050757.dll (ID = 413579)
12:44 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033274.dll (ID = 359890)
12:44 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033257.dll (ID = 359890)
12:44 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0054864.exe (ID = 333)
12:44 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0054862.exe (ID = 331)
12:44 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP3\A0025930.inf (ID = 339662)
12:44 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0037596.exe (ID = 331)
12:44 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0048735.vbs (ID = 231442)
12:44 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035578.exe (ID = 289300)
12:44 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035419.exe (ID = 345)
12:44 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035427.exe (ID = 345)
12:44 PM: Found Trojan Horse: trojan-downloader-game4all.biz
12:43 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0015019.inf (ID = 339662)
12:43 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035466.vbs (ID = 231442)
12:43 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035428.exe (ID = 289300)
12:43 PM: Found Trojan Horse: trojan-downloader-evko.biz
12:43 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0054863.exe (ID = 332)
12:43 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035458.sys (ID = 413585)
12:43 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0033302.dll (ID = 359890)
12:43 PM: Found Trojan Horse: trojan-backdoor-banwarum@mm
12:43 PM: C:\System Volume Information\_restore{32bebe0f-2413-4a94-9366-4f0e03884aad}\RP1\A0002030.inf (ID = 339662)
12:43 PM: Found Adware: desktop bar
12:43 PM: C:\System Volume Information\_restore{509d4cf5-4ecb-4858-94b5-a1b767c87a41}\RP2\A0025253.exe (ID = 378495)
12:42 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035416.exe (ID = 80237)
12:42 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035409.exe (ID = 80237)
12:42 PM: Found Trojan Horse: trojan-downloader-asdbiz.biz
12:42 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0038595.exe (ID = 331)
12:42 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP31\A0036562.exe (ID = 331)
12:42 PM: Found Trojan Horse: trojan looksy
12:42 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP30\A0035457.sys (ID = 413584)
12:42 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0050763.sys (ID = 413585)
12:42 PM: C:\System Volume Information\_restore{48b182c2-84bd-4e0f-b292-09ecf2cc29d5}\RP35\A0050764.sys (ID = 413584)
12:41 PM: Warning: DDA Failure, error reading MFT: 35855. of: 35856. Fragments: 14. A call to an OS function failed
12:41 PM: Warning: DDA Failure, error reading MFT: 35854. of: 35856. Fragments: 14. A call to an OS function failed
12:41 PM: Starting File Sweep
12:41 PM: Warning: Failed to access drive A:
12:41 PM: Cookie Sweep Complete, Elapsed Time: 00:00:03
12:41 PM: c:\documents and settings\localservice.nt authority.003\cookies\system@www.monstermarketplace[2].txt (ID = 3007)
12:41 PM: c:\documents and settings\localservice.nt authority.003\cookies\system@monstermarketplace[1].txt (ID = 3006)
12:41 PM: Found Spy Cookie: monstermarketplace cookie
12:41 PM: c:\documents and settings\localservice.nt authority.003\cookies\system@infospace[1].txt (ID = 2865)
12:41 PM: Found Spy Cookie: infospace cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@zango[1].txt (ID = 3760)
12:41 PM: Found Spy Cookie: zango cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@www48.seeq[1].txt (ID = 3332)
12:41 PM: Found Spy Cookie: seeq cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@www.myaffiliateprogram[2].txt (ID = 3032)
12:41 PM: Found Spy Cookie: myaffiliateprogram.com cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@tribalfusion[1].txt (ID = 3589)
12:41 PM: Found Spy Cookie: tribalfusion cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@trafficmp[2].txt (ID = 3581)
12:41 PM: Found Spy Cookie: trafficmp cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@tacoda[2].txt (ID = 6444)
12:41 PM: Found Spy Cookie: tacoda cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@revenue[1].txt (ID = 3257)
12:41 PM: Found Spy Cookie: revenue.net cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@reunion[2].txt (ID = 3255)
12:41 PM: Found Spy Cookie: reunion cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@realmedia[1].txt (ID = 3235)
12:41 PM: Found Spy Cookie: realmedia cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@passion[2].txt (ID = 3113)
12:41 PM: Found Spy Cookie: passion cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@outster[2].txt (ID = 3103)
12:41 PM: Found Spy Cookie: outster cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@nuker[1].txt (ID = 3085)
12:41 PM: Found Spy Cookie: nuker cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@mygeek[1].txt (ID = 3041)
12:41 PM: Found Spy Cookie: mygeek cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@msnportal.112.2o7[1].txt (ID = 1958)
12:41 PM: Found Spy Cookie: 2o7.net cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@m.webtrends[1].txt (ID = 3669)
12:41 PM: Found Spy Cookie: webtrends cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@go[1].txt (ID = 2728)
12:41 PM: Found Spy Cookie: go.com cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@exitexchange[1].txt (ID = 2633)
12:41 PM: Found Spy Cookie: exitexchange cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@edge.ru4[2].txt (ID = 3269)
12:41 PM: Found Spy Cookie: ru4 cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@counter.hitslink[1].txt (ID = 2790)
12:41 PM: Found Spy Cookie: hitslink cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@casalemedia[1].txt (ID = 2354)
12:41 PM: Found Spy Cookie: casalemedia cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@bravenet[1].txt (ID = 2322)
12:41 PM: Found Spy Cookie: bravenet cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@atdmt[2].txt (ID = 2253)
12:41 PM: Found Spy Cookie: atlas dmt cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@ask[1].txt (ID = 2245)
12:41 PM: Found Spy Cookie: ask cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@advertising[2].txt (ID = 2175)
12:41 PM: Found Spy Cookie: advertising cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@adrevolver[3].txt (ID = 2088)
12:41 PM: c:\documents and settings\jamal\cookies\jamal@adrevolver[2].txt (ID = 2088)
12:41 PM: Found Spy Cookie: adrevolver cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@adopt.specificclick[2].txt (ID = 3400)
12:41 PM: Found Spy Cookie: specificclick.com cookie
12:41 PM: c:\documents and settings\jamal\cookies\jamal@ad.yieldmanager[1].txt (ID = 3751)
12:41 PM: Found Spy Cookie: yieldmanager cookie
12:41 PM: Starting Cookie Sweep
12:41 PM: Registry Sweep Complete, Elapsed Time:00:01:09
12:40 PM: HKU\S-1-5-21-725345543-813497703-854245398-1004\software\microsoft\windows\currentversion\ext\stats\{5d4831e0-5a7c-4a46-afd5-a79ab8ce36c2}\ (ID = 1877666)
12:40 PM: Found Trojan Horse: trojan-downloader-zlob
12:40 PM: HKU\S-1-5-21-725345543-813497703-854245398-1004\software\padsysassistant\ || tpa (ID = 1876638)
12:40 PM: HKU\S-1-5-21-725345543-813497703-854245398-1004\software\padsysassistant\ || activitytimestamp (ID = 1876637)
12:40 PM: HKU\S-1-5-21-725345543-813497703-854245398-1004\software\padsysassistant\ || tpatimestamp (ID = 1876636)
12:40 PM: HKU\S-1-5-21-725345543-813497703-854245398-1004\software\padsysassistant\ (ID = 1876629)
12:40 PM: Found Trojan Horse: trojan-downloader-padsysassistant
12:40 PM: HKU\S-1-5-21-725345543-813497703-854245398-1004\software\cmintex\ (ID = 1876622)
12:40 PM: Found Trojan Horse: trojan-downloader-cmintex
12:40 PM: HKU\S-1-5-21-725345543-813497703-854245398-1004\software\adwaredisablekey4\ (ID = 1857752)
12:40 PM: HKU\S-1-5-21-725345543-813497703-854245398-1004\software\microsoft\windows\currentversion\explorer\menuorder\start menu\programs\zango\ (ID = 554173)
12:40 PM: HKU\S-1-5-21-725345543-813497703-854245398-1004\software\stc\ (ID = 102020)
12:40 PM: Found Trojan Horse: 2nd-thought
12:40 PM: HKLM\software\adwaredisablekey4\ (ID = 1857760)
12:40 PM: Found Trojan Horse: trojan-busky
12:40 PM: HKLM\software\classes\typelib\{5aa5392d-e5c9-4276-8998-44c3c578419d}\ (ID = 1848458)
12:40 PM: HKLM\software\classes\domainhelper.dh.1\ (ID = 1848454)
12:40 PM: HKLM\software\classes\domainhelper.dh\ (ID = 1848448)
12:40 PM: HKLM\software\classes\clsid\{b8a5de1c-bc13-4dd2-bf00-7be3c603f9f2}\ (ID = 1848435)
12:40 PM: HKLM\software\classes\appid\{20f8483e-6ced-445f-af32-d9c646a6ede9}\ (ID = 1848428)
12:40 PM: HKLM\software\classes\appid\domainhelper.dll\ (ID = 1848426)
12:40 PM: HKCR\typelib\{5aa5392d-e5c9-4276-8998-44c3c578419d}\ (ID = 1848416)
12:40 PM: HKCR\domainhelper.dh.1\ (ID = 1848412)
12:40 PM: HKCR\domainhelper.dh\ (ID = 1848406)
12:40 PM: HKCR\clsid\{b8a5de1c-bc13-4dd2-bf00-7be3c603f9f2}\ (ID = 1848393)
12:40 PM: HKCR\appid\{20f8483e-6ced-445f-af32-d9c646a6ede9}\ (ID = 1848386)
12:40 PM: HKCR\appid\domainhelper.dll\ (ID = 1848384)
12:40 PM: Found Trojan Horse: trojan-downloader-ac2
12:40 PM: HKLM\system\currentcontrolset\services\msgegh\ (ID = 1838510)
12:40 PM: HKLM\system\controlset002\services\msgegh\ (ID = 1838491)
12:40 PM: HKLM\system\controlset002\enum\root\legacy_msgegh\ (ID = 1838481)
12:40 PM: HKLM\system\controlset001\services\msgegh\ (ID = 1838469)
12:40 PM: HKLM\system\controlset001\enum\root\legacy_msgegh\ (ID = 1838458)
12:40 PM: Found Trojan Horse: trojan-relayer-fivetoone
12:40 PM: HKLM\software\classes\helper.helper.1\ (ID = 1826574)
12:40 PM: HKLM\software\classes\helper.helper\ (ID = 1826568)
12:40 PM: HKCR\helper.helper.1\ (ID = 1826549)
12:40 PM: HKCR\helper.helper\ (ID = 1826543)
12:40 PM: HKLM\system\controlset001\enum\root\legacy_cmdservice\ (ID = 1556665)
12:40 PM: Found Adware: command
12:40 PM: HKLM\software\classes\typelib\{1b8b502e-455b-4022-be27-736d9f808a18}\ (ID = 1533329)
12:40 PM: HKCR\typelib\{1b8b502e-455b-4022-be27-736d9f808a18}\ (ID = 1533306)
12:40 PM: Found Adware: fullcontext
12:40 PM: HKLM\software\classes\typelib\{80874336-c940-48fa-b15f-5bb94a8c8c83}\ (ID = 1215898)
12:40 PM: HKCR\typelib\{80874336-c940-48fa-b15f-5bb94a8c8c83}\ (ID = 1215866)
12:40 PM: Found Trojan Horse: trojan-phisher-nethelper
12:40 PM: HKLM\software\classes\typelib\{73d7abfe-d325-430a-817f-64c7bfd48813}\f.0\0\ (ID = 819747)
12:40 PM: HKLM\software\microsoft\windows\currentversion\shareddlls\ || c:\program files\vbouncer\vbdnr.dll (ID = 819737)
12:40 PM: HKLM\software\classes\imside1egate.application.1\ (ID = 711277)
12:40 PM: HKCR\imside1egate.application.1\ (ID = 710985)
12:40 PM: Found Adware: 180search assistant/zango
12:40 PM: HKLM\software\classes\typelib\{73d7abfe-d325-430a-817f-64c7bfd48813}\ (ID = 553195)
12:40 PM: HKLM\software\classes\clsid\{eec056ce-3e1b-4571-bee1-eab9876b35f8}\ (ID = 553184)
12:40 PM: HKLM\software\classes\clsid\{dcb5773b-4d84-4e6f-8e21-96f2a5b431a8}\ (ID = 553171)
12:40 PM: HKLM\software\classes\clsid\{cf0fbbf5-1ddd-4d58-b480-ac2c2a4186d3}\ (ID = 553160)
12:40 PM: HKLM\software\classes\clsid\{be40278c-1c4e-4a63-bc3d-811646900a1a}\ (ID = 553147)
12:40 PM: HKLM\software\classes\clsid\{b0be4bbc-c1b6-4ea3-b346-7358fec20248}\ (ID = 553134)
12:40 PM: HKLM\software\classes\clsid\{a85c505e-aae3-4cb0-aee1-cb8213b140fb}\ (ID = 553123)
12:40 PM: HKLM\software\classes\clsid\{9fe4d9e6-13bb-43e0-8c74-9800573da4d6}\ (ID = 553112)
12:40 PM: HKLM\software\classes\clsid\{9cc6f6d3-8b13-4206-abc1-8b285f9413a7}\ (ID = 553101)
12:40 PM: HKLM\software\classes\clsid\{25ae1a9b-87d2-418f-a3a6-5a46edc37a84}\ (ID = 553090)
12:40 PM: HKLM\software\classes\vbdnr.dnrdirector\ (ID = 553086)
12:40 PM: HKLM\software\classes\vbdnr.cusersettings\ (ID = 553082)
12:40 PM: HKLM\software\classes\vbdnr.cthreatlevel\ (ID = 553078)
12:40 PM: HKLM\software\classes\vbdnr.csignature\ (ID = 553074)
12:40 PM: HKLM\software\classes\vbdnr.cscheduler\ (ID = 553070)
12:40 PM: HKLM\software\classes\vbdnr.cregistryroutines\ (ID = 553066)
12:40 PM: HKLM\software\classes\vbdnr.chistory\ (ID = 553062)
12:40 PM: HKLM\software\classes\vbdnr.cerrorlog\ (ID = 553058)
12:40 PM: HKLM\software\classes\vbdnr.ccookie\ (ID = 553054)
12:40 PM: HKCR\typelib\{73d7abfe-d325-430a-817f-64c7bfd48813}\ (ID = 553043)
12:40 PM: HKCR\clsid\{eec056ce-3e1b-4571-bee1-eab9876b35f8}\ (ID = 553032)
12:40 PM: HKCR\clsid\{dcb5773b-4d84-4e6f-8e21-96f2a5b431a8}\ (ID = 553019)
12:40 PM: HKCR\clsid\{cf0fbbf5-1ddd-4d58-b480-ac2c2a4186d3}\ (ID = 553008)
12:40 PM: HKCR\clsid\{be40278c-1c4e-4a63-bc3d-811646900a1a}\ (ID = 552995)
12:40 PM: HKCR\clsid\{b0be4bbc-c1b6-4ea3-b346-7358fec20248}\ (ID = 552982)
12:40 PM: HKCR\clsid\{a85c505e-aae3-4cb0-aee1-cb8213b140fb}\ (ID = 552971)
12:40 PM: HKCR\clsid\{9fe4d9e6-13bb-43e0-8c74-9800573da4d6}\ (ID = 552960)
12:40 PM: HKCR\clsid\{9cc6f6d3-8b13-4206-abc1-8b285f9413a7}\ (ID = 552949)
12:40 PM: HKCR\clsid\{25ae1a9b-87d2-418f-a3a6-5a46edc37a84}\ (ID = 552938)
12:40 PM: HKCR\vbdnr.dnrdirector\ (ID = 552934)
12:40 PM: HKCR\vbdnr.cusersettings\ (ID = 552930)
12:40 PM: HKCR\vbdnr.cthreatlevel\ (ID = 552926)
12:40 PM: HKCR\vbdnr.csignature\ (ID = 552922)
12:40 PM: HKCR\vbdnr.cscheduler\ (ID = 552918)
12:40 PM: HKCR\vbdnr.cregistryroutines\ (ID = 552914)
12:40 PM: HKCR\vbdnr.chistory\ (ID = 552910)
12:40 PM: HKCR\vbdnr.cerrorlog\ (ID = 552906)
12:40 PM: HKCR\vbdnr.ccookie\ (ID = 552902)
12:40 PM: HKLM\software\microsoft\cryptography\services\ || distid (ID = 145553)
12:40 PM: Found Adware: virtualbouncer
12:40 PM: HKCR\toolbar.toolbarobj.1\ (ID = 127132)
12:40 PM: HKCR\toolbar.toolbarobj\ (ID = 127131)
12:40 PM: Found Adware: hi5 toolbar
12:39 PM: Starting Registry Sweep
12:39 PM: Memory Sweep Complete, Elapsed Time: 00:06:29
12:33 PM: Starting Memory Sweep
12:33 PM: Start Custom Sweep
12:33 PM: Sweep initiated using definitions version 826
12:33 PM: Spy Sweeper 5.2.3.2138 started
12:33 PM: | Start of Session, Sunday, December 24, 2006 |
********
12:33 PM: | End of Session, Sunday, December 24, 2006 |
12:31 PM: None
12:31 PM: Traces Found: 0
12:31 PM: Warning: Fewer than 17 MFT entries were found
12:31 PM: Sweep Canceled
12:30 PM: Start Context Folder Sweep
12:30 PM: Sweep initiated using definitions version 826
12:30 PM: Spy Sweeper 5.2.3.2138 started
12:30 PM: | Start of Session, Sunday, December 24, 2006 |
********
12:30 PM: | End of Session, Sunday, December 24, 2006 |
Keylogger: Off
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites: Off
Hosts File Shield: On
Internet Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
Spy Installation Shield: On
Memory Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
12:30 PM: Shield States
12:30 PM: Spyware Definitions: 826
12:29 PM: Spy Sweeper 5.2.3.2138 started
12:28 PM: Spy Sweeper 5.2.3.2138 started
12:26 PM: Spyware Definitions: 816
12:26 PM: Warning: Virus definitions files are invalid, please update your virus definitions. 220
12:25 PM: Spy Sweeper 5.2.3.2138 started
12:25 PM: Spy Sweeper 5.2.3.2138 started
12:25 PM: | Start of Session, Sunday, December 24, 2006 |
********
Jamal

#12 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 24 December 2006 - 04:22 PM

Once again!!!!!!!!!

Are you showing everything or do you have items in hijacks ignorelist



Turn off restore points, boot, turn them back on – here’s how

http://service1.symantec.com/SUPPORT/tsgen...src=sec_doc_nam



Post a new hijack log

Is it running ok
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#13 jamal56783

jamal56783
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 24 December 2006 - 04:25 PM

Logfile of HijackThis v1.99.1
Scan saved at 1:14:45 PM, on 12/24/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\WINDOWS\Explorer.EXE
C:\Documents and Settings\Jamal\Desktop\HijackThis.exe

O4 - HKLM\..\Run: [cjlikibn] C:\vadqfnet.bat
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe" /startintray
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: Webroot Spy Sweeper Engine (WebrootSpySweeperService) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
Jamal

#14 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 24 December 2006 - 04:29 PM

Until you answer my question we will go no further
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#15 jamal56783

jamal56783
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:10:47 PM

Posted 24 December 2006 - 04:54 PM

i dont have a ignore list in hijack
Jamal




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users