Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I Have Been Infected! Pleeeese Help Me!


  • Please log in to reply
5 replies to this topic

#1 mg3

mg3

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:08:45 PM

Posted 20 January 2007 - 04:21 PM

I get all kinds of alerts for viruses and adwares and such.....any help would be highly appriciated....

Here is the Hijackthis log:

Logfile of HijackThis v1.99.1
Scan saved at 23:15:29, on 20/01/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINXP\System32\smss.exe
C:\WINXP\system32\winlogon.exe
C:\WINXP\system32\services.exe
C:\WINXP\system32\lsass.exe
C:\WINXP\system32\svchost.exe
C:\WINXP\System32\svchost.exe
C:\WINXP\system32\svchost.exe
C:\WINXP\system32\spoolsv.exe
C:\WINXP\Explorer.EXE
C:\WINXP\System32\cisvc.exe
C:\WINXP\system32\crypserv.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\DOCUME~1\MATYGO~1.002\LOCALS~1\Temp\ieupdate.exe
C:\Program Files\Eset\nod32krn.exe
C:\WINXP\system32\nvsvc32.exe
C:\WINXP\System32\svchost.exe
C:\Program Files\Eset\nod32kui.exe
C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe
C:\WINXP\system32\RUNDLL32.EXE
C:\WINXP\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\MSN Messenger\msnmsgr.exe
C:\Program Files\Java\jre1.5.0_09\bin\jucheck.exe
C:\WINXP\system32\cidaemon.exe
C:\WINXP\system32\NOTEPAD.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
G:\Hijackthis\HijackThis.exe

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINXP\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [M-Audio Delta Taskbar Icon] C:\WINXP\System32\DeltTray.exe
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe"
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINXP\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINXP\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://G:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - G:\PROGRA~1\SPYWAR~1\tools\iesdpb.dll (file missing)
O9 - Extra button: ICQ - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra 'Tools' menuitem: ICQ - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - G:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {51C98AC0-31D3-4049-B659-24389E0D94E3} (TCM3Control Control) - http://video.icellcom.co.il/TCM3Viewer.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1169059270703
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1169059253468
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab50997.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O16 - DPF: {A18962F6-E6ED-40B1-97C9-1FB36F38BFA8} (Aurigma Image Uploader 3.5 Control) - http://filelodge.bolt.com/ImageUploader3.cab
O16 - DPF: {D79B6F43-F214-4E7A-9ECB-CCC8771F2416} (LauncherV1 Class) - http://www.tapuz.co.il/irc/main/launcher.cab
O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zone.msn.com/binary/Solit...wn.cab50997.cab
O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL
O20 - Winlogon Notify: rpcc - C:\WINXP\system32\rpcc.dll
O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINXP\SYSTEM32\crypserv.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: ieupdater (Microsoft IE Updater) - Unknown owner - C:\DOCUME~1\MATYGO~1.002\LOCALS~1\Temp\ieupdate.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINXP\system32\nvsvc32.exe
O23 - Service: SmartFinder Uninstall (SmartFinder_Uninstall) - Unknown owner - C:\Documents and Settings\Maty Golovaty.MATY.001\Desktop\SFUninstaller.exe" service (file missing)
O23 - Service: XAMPP Service (XAMPP) - Unknown owner - C:\Program Files\xampp\service.exe (file missing)

BC AdBot (Login to Remove)

 


#2 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 20 January 2007 - 05:04 PM

Download http://downloads.andymanchesta.com/RemovalTools/SDFix.exe and save it to your Desktop.

Double click SDFix.exe and it will extract the files to %systemdrive%
(Drive that contains the Windows Directory, typically C:\SDFix)

Please then reboot your computer in Safe Mode by doing the following :
· Restart your computer
· After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
· Instead of Windows loading as normal, the Advanced Options Menu should appear;
· Select the first option, to run Windows in Safe Mode, then press Enter.
· Choose your usual account.
· Open the extracted SDFix folder and double click RunThis.bat to start the script.
· Type Y to begin the cleanup process.
· It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
· Press any Key and it will restart the PC.
· When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
· Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
(Report.txt will also be copied to Clipboard ready for posting back on the forum).
· Finally paste the contents of the Report.txt back on the forum with a new HijackThis log
=========================

Download Superantispyware

http://www.superantispyware.com/superantis...efreevspro.html

Install it and double-click the icon on your desktop to run it.
· It will ask if you want to update the program definitions, click Yes.
· Under Configuration and Preferences, click the Preferences button.
· Click the Scanning Control tab.
· Under Scanner Options make sure the following are checked:
o Close browsers before scanning
o Scan for tracking cookies
o Terminate memory threats before quarantining.
o Please leave the others unchecked.
o Click the Close button to leave the control center screen.
· On the main screen, under Scan for Harmful Software click Scan your computer.
· On the left check C:\Fixed Drive.
· On the right, under Complete Scan, choose Perform Complete Scan.
· Click Next to start the scan. Please be patient while it scans your computer.
· After the scan is complete a summary box will appear. Click OK.
· Make sure everything in the white box has a check next to it, then click Next.
· It will quarantine what it found and if it asks if you want to reboot, click Yes.
· To retrieve the removal information for me please do the following:
o After reboot, double-click the SUPERAntispyware icon on your desktop.
o Click Preferences. Click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o It will open in your default text editor (such as Notepad/Wordpad).
o Please highlight everything in the notepad, then right-click and choose copy.
· Click close and close again to exit the program.
· Please paste that information here for me with a new HijackThis log.
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#3 mg3

mg3
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:08:45 PM

Posted 21 January 2007 - 12:35 PM

OK i did all of the above...

Here is the SDfix report:


SDFix: Version 1.60

Sun 01/21/2007 - 19:04:39.48

Microsoft Windows XP [Version 5.1.2600]

Running From: C:\SDFix

Safe Mode:
Checking Services:

Name:
new_drv

Path:
\??\C:\WINXP\new_drv.sys

new_drv Deleted

Restoring Windows Registry Entries
Restoring Default Hosts File


Rebooting...

Normal Mode:
Checking Files:

Files will be copied to Backups folder and removed:

C:\WINXP\system32\nton.exe - Deleted



Alternate Streams Check:

C:\WINXP\system32
No streams found.

Final Check:

Remaining Services:
------------------


Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\eMule\\emule.exe"="C:\\Program Files\\eMule\\emule.exe:*:Enabled:LHeMule תוכנת שיתוף קבצים"
"C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
"G:\\downloads2\\utorrent.exe"="G:\\downloads2\\utorrent.exe:*:Enabled:µTorrent"
"C:\\Program Files\\uTorrent\\utorrent.exe"="C:\\Program Files\\uTorrent\\utorrent.exe:*:Enabled:µTorrent"
"C:\\Program Files\\MSN Messenger\\msnmsgr.exe"="C:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger 8.0"
"C:\\Program Files\\MSN Messenger\\msncall.exe"="C:\\Program Files\\MSN Messenger\\msncall.exe:*:Enabled:Windows Live Messenger 8.0 (Phone)"
"C:\\WINXP\\EXPLORER.EXE"="C:\\WINXP\\EXPLORER.EXE:*:Enabled:Internet Explorer"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\MSN Messenger\\msnmsgr.exe"="C:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger 8.0"
"C:\\Program Files\\MSN Messenger\\msncall.exe"="C:\\Program Files\\MSN Messenger\\msncall.exe:*:Enabled:Windows Live Messenger 8.0 (Phone)"


Remaining Files:
---------------

Backups Folder: - C:\SDFix\backups\backups.zip


Checking For Files with Hidden Attributes :

C:\ntdetect.com
C:\Program Files\Uninstall Information\IE40.Comctl32\AINF0000
C:\Program Files\Uninstall Information\mshtml.DllReg\AINF0000
C:\ErdUndoCache\E000000A\Local Settings\Temp\_Setupx.dll
C:\Program Files\Ipswitch\WS_FTP Professional\wsftpgui.exe-CommandBars
C:\electroman\Em.exe
C:\WINXP\system32\cdplayer.exe.manifest
C:\WINXP\system32\logonui.exe.manifest
C:\pagefile.sys
C:\MSDOS.SYS
C:\IO.SYS

Finished



Now the SUPERAntiSpyware Scan Log:

SUPERAntiSpyware Scan Log
Generated 01/21/2007 at 08:34 AM

Application Version : 3.5.1016

Core Rules Database Version : 3168
Trace Rules Database Version: 1179

Scan type : Complete Scan
Total Scan Time : 01:15:23

Memory items scanned : 343
Memory threats detected : 0
Registry items scanned : 5644
Registry threats detected : 34
File items scanned : 79977
File threats detected : 289

Trojan.Downloader-Gen/Win
[ttool] C:\WINXP\9129837.EXE
C:\WINXP\9129837.EXE
[ttool] C:\WINXP\9129837.EXE

Trojan.Downloader-RPCC
Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc
C:\WINXP\SYSTEM32\RPCC.DLL
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#DllName
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#Asynchronous
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#Impersonate
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\rpcc#Startup

Adware.Tracking Cookie
C:\Documents and Settings\Maty Golovaty.MATY.002\Cookies\maty golovaty@advertstream[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.002\Cookies\maty golovaty@adbrite[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.002\Cookies\maty golovaty@statcounter[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.002\Cookies\maty golovaty@mb[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.002\Cookies\maty golovaty@ehg-digg.hitbox[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.002\Cookies\maty golovaty@adv.surinter[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.002\Cookies\maty golovaty@pro.imedia.co[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.002\Cookies\maty golovaty@ad.yieldmanager[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.002\Cookies\maty golovaty@ad.msn.co[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.002\Cookies\maty golovaty@fastclick[1].txt
C:\WINDOWS\Cookies\maty golovaty@ad.ir[1].txt
C:\WINDOWS\Cookies\maty golovaty@yadro[1].txt
C:\WINDOWS\Cookies\maty golovaty@www.warezfaw[1].txt
C:\WINDOWS\Cookies\maty golovaty@www.warezenergy[1].txt
C:\WINDOWS\Cookies\maty golovaty@ads.specificclick[1].txt
C:\WINDOWS\Cookies\maty golovaty@ads.msn.co[1].txt
C:\WINDOWS\Cookies\maty golovaty@ads.cd-rw[1].txt
C:\WINDOWS\Cookies\maty golovaty@www.crackz[1].txt
C:\WINDOWS\Cookies\maty golovaty@banner.flamingoclub[2].txt
C:\WINDOWS\Cookies\maty golovaty@toplist[2].txt
C:\WINDOWS\Cookies\maty golovaty@ad.bannerpoint[2].txt
C:\WINDOWS\Cookies\maty golovaty@atwola[1].txt
C:\WINDOWS\Cookies\maty golovaty@search.warez[1].txt
C:\WINDOWS\Cookies\maty golovaty@webpower[1].txt
C:\WINDOWS\Cookies\maty golovaty@banners[2].txt
C:\WINDOWS\Cookies\maty golovaty@dynamicsitestats[1].txt
C:\WINDOWS\Cookies\maty golovaty@mediamgr.ugo[2].txt
C:\WINDOWS\Cookies\maty golovaty@ads.tripod.lycos.co[2].txt
C:\WINDOWS\Cookies\maty golovaty@windowsmedia[1].txt
C:\WINDOWS\Cookies\maty golovaty@ads.gorillanation[1].txt
C:\WINDOWS\Cookies\maty golovaty@ad.sensismediasmart.com[2].txt
C:\WINDOWS\Cookies\maty golovaty@www.zanox-affiliate[1].txt
C:\WINDOWS\Cookies\maty golovaty@ad.goop.co[2].txt
C:\WINDOWS\Cookies\maty golovaty@ads.imedia.co[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Local Settings\Temp\Cookies\maty golovaty@ad.msn.co[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Local Settings\Temp\Cookies\maty golovaty@adv.surinter[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Local Settings\Temp\Cookies\maty golovaty@ads.realcastmedia[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Local Settings\Temp\Cookies\maty golovaty@ad.isohunt[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Local Settings\Temp\Cookies\maty golovaty@adopt.hbmediapro[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Local Settings\Temp\Cookies\maty golovaty@ads.mininova[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Local Settings\Temp\Cookies\maty golovaty@ad.yieldmanager[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Local Settings\Temp\Cookies\maty golovaty@belnk[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Local Settings\Temp\Cookies\maty golovaty@dist.belnk[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads.us.e-planning[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads.msn.co[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@counter.cnw[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@multimedia.haifa.ac[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@msnportal.112.2o7[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@stats.manticoretechnology[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@www.short-media[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@soundclick[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@smileycentral[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@belnk[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@pro.imedia.co[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@doctors-co-il.freestats[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ad.cibleclick[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads.i-am-bored[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads.corky[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@interclick[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@audit.median[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@vhost.oddcast[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@www.winfixer[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@click-fr[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@counter.credo[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@adverticum[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads.conceptonline[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@usenext[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@hurricanedigitalmedia[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@admarketplace[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@revsci[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@fixionmedia[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@warlog[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@clickcount[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@fcstats.bcentral[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@tripod.lycos[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@warez4ever[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@counter.plugin[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@www.directdl[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@dist.belnk[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@www.freestats[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads.mininova[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@xiti[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@toplist[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@msnisrael.122.2o7[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@adopt.hbmediapro[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads.internic.co[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ad.msn.co[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ad.text.tbn[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ad.tbn[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@adv.surinter[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@www.clickxchange[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ientry[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@122.2o7[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads07.hyperbanner[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@dealtime[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@www.xtrastats[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@stats[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@stat.dealtime[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads.realcastmedia[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@winfixer[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@a.websponsors[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@thecounter[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@www.counters[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@adsense[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@directtrack[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@logoyes.directtrack[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@roiservice[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@stats[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@cl.enhance[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@indextools[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@adv.macmusic[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@adv.440net[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@atwola[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@m1.webstats4u[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@mediamax.streamload[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@www.ourmedia[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@adopt.euroclick[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads.primeinteractive[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@media.next-in[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ad.yieldmanager[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads.realtechnetwork[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@data1.perf.overture[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@burstnet[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@e-2dj6wjmiwjazicp.stats.esomniture[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@yadro[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@track.effiliation[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@ads.ecrush[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@rotator.adjuggler[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@tacoda[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@advertstream[1].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@data3.perf.overture[2].txt
C:\Documents and Settings\Maty Golovaty.MATY.001\Cookies\maty golovaty@countercentral[1].txt

Parasite.CoolWebSearch Variant
HKCR\CLSID\{AB847C41-7B3D-5486-1C51-BE3AF6F7894D}
HKCR\CLSID\{AB847C41-7B3D-5486-1C51-BE3AF6F7894D}\Data
C:\WINXP\SYSTEM32\NETVE.EXE
C:\WINXP\SYSTEM32\CRDQ32.EXE
C:\WINXP\SYSTEM32\WINZU32.EXE
C:\WINXP\SYSTEM32\WINYY.EXE
C:\WINXP\WINWL.EXE
C:\WINXP\IEZC32.EXE
C:\WINXP\ADDXJ32.EXE
C:\WINXP\D3WZ.EXE
C:\WINXP\SYSDR.EXE
C:\WINXP\ATLVK.EXE
C:\WINXP\SDKRU32.EXE
C:\WINXP\APPIE32.EXE
C:\WINXP\SYSJL.EXE

Trojan.Downloader-MS IE Updater
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000#DeviceDesc
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000\Control
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MICROSOFT_IE_UPDATER\0000\Control#ActiveService
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#Type
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#Start
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater#ObjectName
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Security
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Security#Security
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Enum
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\Microsoft IE Updater\Enum#NextInstance
C:\DOCUMENTS AND SETTINGS\MATY GOLOVATY.MATY.002\LOCAL SETTINGS\TEMP\IEUPDATE.EXE

Trojan.Downloader-Gen/MultiBot
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADER[1]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADER[2]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADER[3]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADER[4]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADER[5]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADER[6]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADER[7]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADER[8]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADER[9]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADER[10]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADER[11]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADERCA4V95XB
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADERCA9B0M5F
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADERCAZ69A1I
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADERCAO6TWNT
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADERCAG7EOSN
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADERCAQH5X9P
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\LOADERCAZRVDTC
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\ORP9DEIR\LOADER[1]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\ORP9DEIR\LOADER[2]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\ORP9DEIR\LOADER[3]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\ORP9DEIR\LOADER[5]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\ORP9DEIR\LOADER[6]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\ORP9DEIR\LOADER[7]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\ORP9DEIR\LOADER[8]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\ORP9DEIR\LOADER[9]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\ORP9DEIR\LOADER[10]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0Y6M2N3C\LOADER[1]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0Y6M2N3C\LOADER[2]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0Y6M2N3C\LOADER[4]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0Y6M2N3C\LOADER[5]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0Y6M2N3C\LOADER[6]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0Y6M2N3C\LOADER[7]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\0Y6M2N3C\LOADER[8]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADER[3]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADER[5]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADER[6]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADER[8]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADER[10]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADERCA4EW6UF
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADERCAQAUBTW
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADER[12]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADER[13]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADER[2]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADER[14]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\JG0VYEZJ\LOADER[15]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\054XAGT9\LOADER[1]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\054XAGT9\LOADER[5]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\054XAGT9\LOADER[6]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\054XAGT9\LOADER[7]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\054XAGT9\LOADER[8]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\054XAGT9\LOADER[9]
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\054XAGT9\LOADER[10]

Trojan.Unknown Origin
C:\DOCUMENTS AND SETTINGS\LOCALSERVICE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\8LU3K96B\3339[1]
C:\SYSTEM VOLUME INFORMATION\_RESTORE{7A92D277-E81F-4C54-90CA-675738B4B2D3}\RP716\A0272485.EXE

Trojan.Spam-DAO
C:\SYSTEM VOLUME INFORMATION\_RESTORE{7A92D277-E81F-4C54-90CA-675738B4B2D3}\RP732\A0286728.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{7A92D277-E81F-4C54-90CA-675738B4B2D3}\RP733\A0286905.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{7A92D277-E81F-4C54-90CA-675738B4B2D3}\RP734\A0287078.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{7A92D277-E81F-4C54-90CA-675738B4B2D3}\RP735\A0287247.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{7A92D277-E81F-4C54-90CA-675738B4B2D3}\RP736\A0287417.DLL
C:\WINXP\SYSTEM32\ZDFOP.DLL

Trojan.Downloader-Update/VXPkg
C:\WINXP\SYSTEM32\UPDATE67660831.EXE
C:\WINXP\SYSTEM32\UPDATE94071568.EXE
C:\WINXP\SYSTEM32\UPDATE73656369.EXE
C:\WINXP\SYSTEM32\UPDATE44784850.EXE
C:\WINXP\SYSTEM32\UPDATE54417805.EXE
C:\WINXP\SYSTEM32\UPDATE92094928.EXE
C:\WINXP\SYSTEM32\UPDATE96007847.EXE
C:\WINXP\SYSTEM32\UPDATE13428241.EXE
C:\WINXP\SYSTEM32\UPDATE61299710.EXE
C:\WINXP\SYSTEM32\UPDATE42851695.EXE
C:\WINXP\SYSTEM32\UPDATE08371307.EXE
C:\WINXP\SYSTEM32\UPDATE80286011.EXE
C:\WINXP\SYSTEM32\UPDATE69286258.EXE
C:\WINXP\SYSTEM32\UPDATE28354053.EXE
C:\WINXP\SYSTEM32\UPDATE24525635.EXE
C:\WINXP\SYSTEM32\UPDATE07754562.EXE
C:\WINXP\SYSTEM32\UPDATE41577249.EXE
C:\WINXP\SYSTEM32\UPDATE36905738.EXE
C:\WINXP\SYSTEM32\UPDATE83557729.EXE
C:\WINXP\SYSTEM32\UPDATE59946030.EXE
C:\WINXP\SYSTEM32\UPDATE15319380.EXE
C:\WINXP\SYSTEM32\UPDATE50685333.EXE
C:\WINXP\SYSTEM32\UPDATE17715542.EXE
C:\WINXP\SYSTEM32\UPDATE70447438.EXE
C:\WINXP\SYSTEM32\UPDATE40206023.EXE
C:\WINXP\SYSTEM32\UPDATE93785649.EXE
C:\WINXP\SYSTEM32\UPDATE37473076.EXE
C:\WINXP\SYSTEM32\UPDATE38415189.EXE
C:\WINXP\SYSTEM32\UPDATE99113463.EXE
C:\WINXP\SYSTEM32\UPDATE85365255.EXE
C:\WINXP\SYSTEM32\UPDATE42955980.EXE
C:\WINXP\SYSTEM32\UPDATE75563098.EXE
C:\WINXP\SYSTEM32\UPDATE52423708.EXE
C:\WINXP\SYSTEM32\UPDATE13978398.EXE
C:\WINXP\SYSTEM32\UPDATE42589259.EXE
C:\WINXP\SYSTEM32\UPDATE21034596.EXE
C:\WINXP\SYSTEM32\UPDATE94937474.EXE
C:\WINXP\SYSTEM32\UPDATE68190125.EXE
C:\WINXP\SYSTEM32\UPDATE97139047.EXE
C:\WINXP\SYSTEM32\UPDATE95150425.EXE
C:\WINXP\SYSTEM32\UPDATE34268628.EXE
C:\WINXP\SYSTEM32\UPDATE90836910.EXE
C:\WINXP\SYSTEM32\UPDATE50029211.EXE
C:\WINXP\SYSTEM32\UPDATE79577429.EXE
C:\WINXP\SYSTEM32\UPDATE15165068.EXE
C:\WINXP\SYSTEM32\UPDATE40460121.EXE
C:\WINXP\SYSTEM32\UPDATE02619623.EXE
C:\WINXP\SYSTEM32\UPDATE11391753.EXE
C:\WINXP\SYSTEM32\UPDATE50662023.EXE
C:\WINXP\SYSTEM32\UPDATE45328046.EXE
C:\WINXP\SYSTEM32\UPDATE09016165.EXE
C:\WINXP\SYSTEM32\UPDATE66232247.EXE
C:\WINXP\SYSTEM32\UPDATE61887110.EXE
C:\WINXP\SYSTEM32\UPDATE13898558.EXE
C:\WINXP\SYSTEM32\UPDATE99344950.EXE
C:\WINXP\SYSTEM32\UPDATE22460297.EXE
C:\WINXP\SYSTEM32\UPDATE65246881.EXE
C:\WINXP\SYSTEM32\UPDATE62649758.EXE
C:\WINXP\SYSTEM32\UPDATE82259777.EXE
C:\WINXP\SYSTEM32\UPDATE03284046.EXE
C:\WINXP\SYSTEM32\UPDATE37736545.EXE
C:\WINXP\SYSTEM32\UPDATE42079018.EXE
C:\WINXP\SYSTEM32\UPDATE62989967.EXE
C:\WINXP\SYSTEM32\UPDATE71835842.EXE
C:\WINXP\SYSTEM32\UPDATE89910522.EXE
C:\WINXP\SYSTEM32\UPDATE28829757.EXE
C:\WINXP\SYSTEM32\UPDATE93452537.EXE
C:\WINXP\SYSTEM32\UPDATE10231151.EXE
C:\WINXP\SYSTEM32\UPDATE61751384.EXE
C:\WINXP\SYSTEM32\UPDATE59107000.EXE
C:\WINXP\SYSTEM32\UPDATE12951550.EXE
C:\WINXP\SYSTEM32\UPDATE34368022.EXE
C:\WINXP\SYSTEM32\UPDATE27061951.EXE
C:\WINXP\SYSTEM32\UPDATE34196052.EXE
C:\WINXP\SYSTEM32\UPDATE18769018.EXE
C:\WINXP\SYSTEM32\UPDATE97407107.EXE
C:\WINXP\SYSTEM32\UPDATE34386261.EXE
C:\WINXP\SYSTEM32\UPDATE10599617.EXE
C:\WINXP\SYSTEM32\UPDATE49413486.EXE

Trojan.Downloader-MSDCom32
C:\WINXP\SYSTEM32\ZSTV.DLL




Finally the HJT report:

Logfile of HijackThis v1.99.1
Scan saved at 19:27:47, on 21/01/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINXP\System32\smss.exe
C:\WINXP\system32\winlogon.exe
C:\WINXP\system32\services.exe
C:\WINXP\system32\lsass.exe
C:\WINXP\system32\svchost.exe
C:\WINXP\System32\svchost.exe
C:\WINXP\system32\spoolsv.exe
C:\WINXP\Explorer.EXE
C:\WINXP\System32\cisvc.exe
C:\WINXP\system32\crypserv.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Eset\nod32krn.exe
C:\WINXP\system32\nvsvc32.exe
C:\WINXP\System32\svchost.exe
C:\WINXP\system32\wscntfy.exe
C:\WINXP\system32\notepad.exe
C:\Program Files\Eset\nod32kui.exe
C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe
C:\WINXP\system32\RUNDLL32.EXE
C:\WINXP\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\1.2.908.5008\GoogleToolbarNotifier.exe
C:\WINXP\system32\cidaemon.exe
C:\Program Files\Winamp\winamp.exe
C:\Program Files\MSN Messenger\msnmsgr.exe
C:\WINXP\system32\NOTEPAD.EXE
C:\WINXP\system32\notepad.exe
G:\Hijackthis\HijackThis.exe

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINXP\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe"
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINXP\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINXP\system32\ctfmon.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.908.5008\GoogleToolbarNotifier.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://G:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\WINXP\System32\shdocvw.dll
O9 - Extra button: ICQ - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra 'Tools' menuitem: ICQ - {6224f700-cba3-4071-b251-47cb894244cd} - C:\Program Files\ICQ\ICQ.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - G:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {51C98AC0-31D3-4049-B659-24389E0D94E3} (TCM3Control Control) - http://video.icellcom.co.il/TCM3Viewer.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1169059270703
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1169059253468
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab50997.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/activescan/as5free/asinst.cab
O16 - DPF: {A18962F6-E6ED-40B1-97C9-1FB36F38BFA8} (Aurigma Image Uploader 3.5 Control) - http://filelodge.bolt.com/ImageUploader3.cab
O16 - DPF: {D79B6F43-F214-4E7A-9ECB-CCC8771F2416} (LauncherV1 Class) - http://www.tapuz.co.il/irc/main/launcher.cab
O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zone.msn.com/binary/Solit...wn.cab50997.cab
O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINXP\SYSTEM32\crypserv.exe
O23 - Service: CWShredder Service - InterMute, Inc. - G:\removal_bleep\CWShredder.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINXP\system32\nvsvc32.exe
O23 - Service: SmartFinder Uninstall (SmartFinder_Uninstall) - Unknown owner - C:\Documents and Settings\Maty Golovaty.MATY.001\Desktop\SFUninstaller.exe" service (file missing)
O23 - Service: XAMPP Service (XAMPP) - Unknown owner - C:\Program Files\xampp\service.exe (file missing)




Now what please?

#4 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 21 January 2007 - 01:06 PM

IE - Block Third party cookies
1. Click on the Tools button on the Internet Explorer tool bar.
2. Highlight and click on Internet options at the bottom of the Tools menu.
3. Select the Privacy Tab of the Internet Options menu.
4. Select the Advanced... button at the bottom of the screen.
5. Select override automatic cookie handling button.
6. To block third party cookies select block under "Third-party cookies".
7. Select "always allow session cookies".
8. Click on the OK button at the bottom of the screen.
===================

DownLoad EasyCleaner http://www.majorgeeks.com/download414.html

Use the clear files and Unnecessary files buttons – I do not recommend
using the Duplicates files button
as many dupes are there on purpose.

Not all files will delete – that is normal.

In the unnecessary button I check the top 4 entries

==============

How are things???????
"Nothing could be finer than to be in South Carolina ............"

Member ASAP

#5 mg3

mg3
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:08:45 PM

Posted 21 January 2007 - 01:53 PM

Ok I think it looks ok for now....
I hope it all works well now

anyways. thanks a lot for your help in this.... :thumbsup:

#6 MFDnSC

MFDnSC

    Ret. Director I/T


  • Members
  • 4,310 posts
  • OFFLINE
  •  
  • Local time:12:45 PM

Posted 21 January 2007 - 02:01 PM

Turn off restore points, boot, turn them back on – here’s how

http://service1.symantec.com/SUPPORT/tsgen...src=sec_doc_nam
"Nothing could be finer than to be in South Carolina ............"

Member ASAP




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users