1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

I have aquired the network monitor trojan and here is my hijack this log

Discussion in 'Virus & Other Malware Removal' started by Baked421, Jan 28, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. Baked421

    Baked421 Thread Starter

    Joined:
    Jun 6, 2004
    Messages:
    83
    Logfile of HijackThis v1.99.1
    Scan saved at 8:36:30 PM, on 1/28/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Digidesign\Drivers\MMERefresh.exe
    C:\Program Files\MacOpener\FORMATM.EXE
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\purvyxc.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\SOUNDMAN.EXE
    C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
    C:\Program Files\outlook\outlook.exe
    C:\WINDOWS\system32\RUNDLL32.EXE
    C:\WINDOWS\v1201.exe
    C:\WINDOWS\purvyxcA.exe
    C:\Program Files\CMIntex\CMIntex.exe
    C:\Program Files\MacOpener\MacName.exe
    C:\Program Files\Exolon\Exolon.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\PROGRA~1\WinZip\winzip32.exe
    C:\DOCUME~1\Mike\LOCALS~1\Temp\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
    F2 - REG:system.ini: Shell=Explorer.exe, C:\WINDOWS\system32\vfxbs.exe
    F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,hbefdrs.exe
    O1 - Hosts: 80.190.241.30 home.edonkey.com
    O2 - BHO: AssistantLibrary - {04CDB16C-AB38-43CD-A86A-6FEB90290939} - C:\Program Files\PadsysAssistant\AssistantLibrary.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O2 - BHO: Domain Helper - {B8A5DE1C-BC13-4DD2-BF00-7BE3C603F9F2} - C:\WINDOWS\system32\DomainHelper.dll
    O2 - BHO: (no name) - {E336CB8C-5BDB-4EA1-8F61-3337E3B05649} - C:\Program Files\Windows NT\mevopu.dll
    O3 - Toolbar: (no name) - {C004DEC2-2623-438e-9CA2-C9043AB28508} - (no file)
    O4 - HKLM\..\Run: [MacLicense] "C:\Program Files\MacOpener\MacLic.exe"
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
    O4 - HKLM\..\Run: [DigidesignMMERefresh] "C:\Program Files\Digidesign\Drivers\MMERefresh.exe"
    O4 - HKLM\..\Run: [MsgCenterExe] "C:\Program Files\Common Files\Real\Update_OB\RealOneMessageCenter.exe" -osboot
    O4 - HKLM\..\Run: [outlook] C:\Program Files\outlook\outlook.exe /auto
    O4 - HKLM\..\Run: [winlog] winlog.exe
    O4 - HKLM\..\Run: [sth3a7ae] "RUNDLL32.EXE" wb50acf3.dll,n 0063a7a800000003b50acf3
    O4 - HKLM\..\Run: [ms067884108109] C:\WINDOWS\ms067884108109.exe
    O4 - HKLM\..\Run: [ExploreUpdSched] C:\WINDOWS\system32\swinmpea.exe GEN001
    O4 - HKLM\..\Run: [ACTX1] C:\WINDOWS\v1201.exe
    O4 - HKLM\..\Run: [purvyxcA] C:\WINDOWS\purvyxcA.exe
    O4 - HKLM\..\RunServices: [winlog] winlog.exe
    O4 - HKCU\..\Run: [CMIntex] "C:\Program Files\CMIntex\CMIntex.exe"
    O4 - HKCU\..\Run: [BitTorrent] "C:\Program Files\BitTorrent\bittorrent.exe" --force_start_minimized
    O4 - Startup: TA_Start.lnk = C:\WINDOWS\system32\dwdsregt.exe
    O4 - Startup: Think-Adz.lnk = C:\WINDOWS\system32\swinmpea.exe
    O4 - Global Startup: MacName.lnk = C:\Program Files\MacOpener\MacName.exe
    O8 - Extra context menu item: E&xport to Microsoft Office Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra button: (no name) - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
    O9 - Extra 'Tools' menuitem: Java - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O15 - Trusted Zone: http://click.getmirar.com (HKLM)
    O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
    O15 - Trusted Zone: http://redirect.mirarsearch.com (HKLM)
    O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
    O16 - DPF: {01111F00-3E00-11D2-8470-0060089874ED} (Support.com Installer) - http://softdev.adelphia.net/sdccommon/download/tgctlins.cab
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
    O16 - DPF: {3FE16C08-D6A7-4133-84FC-D5BFB4F7D886} (WebGameLoader Class) - http://www.reflexive.net/rlwweb/ReflexiveWebGameLoader.cab
    O16 - DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} (MJLauncherCtrl Class) - http://zone.msn.com/bingame/luxr/default/mjolauncher.cab
    O16 - DPF: {8A0DCBDB-6E20-489C-9041-C1E8A0352E75} -
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab34246.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab
    O16 - DPF: {E4C29FDC-F547-4219-ACFD-571F2A7A564A} - http://click.mirarsearch.com/CABUPDATES/winwcd.cab
    O18 - Filter: text/html - {994D478A-45D0-4DB4-AE28-738B1E346F99} - C:\Program Files\Exolon\Exolon.dll
    O20 - Winlogon Notify: RunOnceEx - C:\WINDOWS\system32\dsskcopy.dll
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\
    O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: Digidesign MME Refresh Service (DigiRefresh) - Digidesign, A Division of Avid Technology, Inc. - C:\Program Files\Digidesign\Drivers\MMERefresh.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: MacFormatService - Unknown owner - C:\Program Files\MacOpener\FORMATM.EXE" /SERVICE (file missing)
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    O23 - Service: Windows Overlay Components - Unknown owner - C:\WINDOWS\purvyxc.exe
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    1. Download this file :

    http://download.bleepingcomputer.com/sUBs/combofix.exe
    http://www.techsupportforum.com/sectools/combofix.exe

    2. Double click combofix.exe & follow the prompts.
    3. When finished, it shall produce a log for you. Post that log and a HiJack log in your next reply

    Note:
    Do not mouseclick combofix's window while its running. That may cause it to stall

    ========================

    Download http://downloads.andymanchesta.com/RemovalTools/SDFix.exe and save it to your Desktop.

    Double click SDFix.exe and it will extract the files to %systemdrive%
    (Drive that contains the Windows Directory, typically C:\SDFix)

    Please then reboot your computer in Safe Mode by doing the following :
    · Restart your computer
    · After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    · Instead of Windows loading as normal, the Advanced Options Menu should appear;
    · Select the first option, to run Windows in Safe Mode, then press Enter.
    · Choose your usual account.
    · Open the extracted SDFix folder and double click RunThis.bat to start the script.
    · Type Y to begin the cleanup process.
    · It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
    · Press any Key and it will restart the PC.
    · When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
    · Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
    (Report.txt will also be copied to Clipboard ready for posting back on the forum).
    · Finally paste the contents of the Report.txt back on the forum with a new HijackThis log
    ==================

    Download Superantispyware

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me with a new HijackThis log.
     
  3. Baked421

    Baked421 Thread Starter

    Joined:
    Jun 6, 2004
    Messages:
    83
    SDFix: Version 1.63

    Mon 01/29/2007 - 20:09:46.79

    Microsoft Windows XP [Version 5.1.2600]

    Running From: C:\SDFix

    Safe Mode:
    Checking Services:

    Name:
    Windows Overlay Components

    Path:
    C:\WINDOWS\purvyxc.exe

    Windows Overlay Components Deleted

    Restoring Windows Registry Entries
    Restoring Default Hosts File


    Rebooting...

    Normal Mode:
    Checking Files:

    Below files will be copied to Backups folder then removed:

    C:\WINDOWS\system32\netstat.com - Deleted
    C:\WINDOWS\system32\taskkill.com - Deleted
    C:\WINDOWS\system32\unsvchosts.lzma - Deleted
    C:\WINDOWS\system32\winlog.exe - Deleted
    C:\WINDOWS\tcb.pmw - Deleted

    Could Not Remove C:\WINDOWS\system32\svchosts.exe


    ADS Check:

    C:\WINDOWS\system32
    No streams found.

    Final Check:

    Remaining Services:
    ------------------


    Authorized Application Key Export:

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"
    "C:\\Program Files\\eDonkey2000\\edonkey2000.exe"="C:\\Program Files\\eDonkey2000\\edonkey2000.exe:*:Enabled:edonkey2000"
    "C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"="C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe:*:Enabled:Yahoo! Messenger"
    "C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"="C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe:*:Enabled:Yahoo! FT Server"
    "C:\\Program Files\\eDonkey2000 Lite\\eDonkey2000.exe"="C:\\Program Files\\eDonkey2000 Lite\\eDonkey2000.exe:*:Enabled:eDonkey2000"
    "X:\\Program Files\\Ubisoft\\Splinter Cell Pandora Tomorrow\\Pandora.exe"="X:\\Program Files\\Ubisoft\\Splinter Cell Pandora Tomorrow\\Pandora.exe:*:Enabled:pandora.exe"
    "C:\\Program Files\\eMule\\emule.exe"="C:\\Program Files\\eMule\\emule.exe:*:Enabled:eMule"
    "C:\\StubInstaller.exe"="C:\\StubInstaller.exe:*:Enabled:LimeWire swarmed installer"
    "C:\\Program Files\\LimeWire\\LimeWire.exe"="C:\\Program Files\\LimeWire\\LimeWire.exe:*:Enabled:LimeWire"
    "c:\\windows\\system32\\rlvknlg.exe"="c:\\windows\\system32\\rlvknlg.exe:*:Enabled:rlvknlg.exe"
    "C:\\WINDOWS\\explorer.exe"="C:\\WINDOWS\\explorer.exe:*:Disabled:Windows Explorer"
    "C:\\Program Files\\BitTorrent\\bittorrent.exe"="C:\\Program Files\\BitTorrent\\bittorrent.exe:*:Enabled:BitTorrent"


    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"


    Remaining Files:
    ---------------
    C:\WINDOWS\system32\svchosts.exe Found

    Backups Folder: - C:\SDFix\backups\backups.zip


    Checking For Files with Hidden Attributes :

    C:\WINDOWS\system32\cmd.com
    C:\WINDOWS\system32\ping.com
    C:\WINDOWS\system32\regedit.com
    C:\WINDOWS\system32\tasklist.com
    C:\WINDOWS\system32\tracert.com
    C:\WINDOWS\TWlrZQ\asappsrv.dll
    C:\Documents and Settings\Mike\Local Settings\Temp\sdexe.exe
    C:\Program Files\Common Files\Adobe\ESD\DLMCleanup.exe
    C:\Program Files\outlook\outlook.exe
    C:\WINDOWS\purvyxcA.exe
    C:\WINDOWS\TWlrZQ\command.exe
    C:\hiberfil.sys

    Finished
     
  4. Baked421

    Baked421 Thread Starter

    Joined:
    Jun 6, 2004
    Messages:
    83
    Logfile of HijackThis v1.99.1
    Scan saved at 8:21:36 PM, on 1/29/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\svchosts.exe
    C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Program Files\Digidesign\Drivers\MMERefresh.exe
    C:\Program Files\MacOpener\FORMATM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
    C:\WINDOWS\system32\RUNDLL32.EXE
    C:\WINDOWS\v1201.exe
    C:\WINDOWS\purvyxcA.exe
    C:\Program Files\CMIntex\CMIntex.exe
    C:\Program Files\MacOpener\MacName.exe
    C:\Program Files\Exolon\Exolon.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Documents and Settings\Mike\Desktop\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
    F2 - REG:system.ini: Shell=Explorer.exe, C:\WINDOWS\system32\vfxbs.exe
    F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,hbefdrs.exe
    O2 - BHO: AssistantLibrary - {04CDB16C-AB38-43CD-A86A-6FEB90290939} - C:\Program Files\PadsysAssistant\AssistantLibrary.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O2 - BHO: Domain Helper - {B8A5DE1C-BC13-4DD2-BF00-7BE3C603F9F2} - C:\WINDOWS\system32\DomainHelper.dll
    O2 - BHO: Bar888 - {C1B4DEC2-2623-438e-9CA2-C9043AB28508} - C:\PROGRA~1\COMMON~1\{30703~1\Bar888.dll
    O2 - BHO: (no name) - {E336CB8C-5BDB-4EA1-8F61-3337E3B05649} - C:\Program Files\Windows NT\mevopu.dll
    O3 - Toolbar: (no name) - {C004DEC2-2623-438e-9CA2-C9043AB28508} - (no file)
    O3 - Toolbar: Bar888 - {C1B4DEC2-2623-438e-9CA2-C9043AB28508} - C:\PROGRA~1\COMMON~1\{30703~1\Bar888.dll
    O4 - HKLM\..\Run: [MacLicense] "C:\Program Files\MacOpener\MacLic.exe"
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
    O4 - HKLM\..\Run: [DigidesignMMERefresh] "C:\Program Files\Digidesign\Drivers\MMERefresh.exe"
    O4 - HKLM\..\Run: [MsgCenterExe] "C:\Program Files\Common Files\Real\Update_OB\RealOneMessageCenter.exe" -osboot
    O4 - HKLM\..\Run: [winlog] winlog.exe
    O4 - HKLM\..\Run: [sth3a7ae] "RUNDLL32.EXE" wb50acf3.dll,n 0063a7a800000003b50acf3
    O4 - HKLM\..\Run: [ms067884108109] C:\WINDOWS\ms067884108109.exe
    O4 - HKLM\..\Run: [ExploreUpdSched] C:\WINDOWS\system32\swinmpea.exe GEN001
    O4 - HKLM\..\Run: [ACTX1] C:\WINDOWS\v1201.exe
    O4 - HKLM\..\Run: [purvyxcA] C:\WINDOWS\purvyxcA.exe
    O4 - HKLM\..\RunServices: [winlog] winlog.exe
    O4 - HKCU\..\Run: [CMIntex] "C:\Program Files\CMIntex\CMIntex.exe"
    O4 - HKCU\..\Run: [BitTorrent] "C:\Program Files\BitTorrent\bittorrent.exe" --force_start_minimized
    O4 - Startup: TA_Start.lnk = C:\WINDOWS\system32\dwdsregt.exe
    O4 - Startup: Think-Adz.lnk = C:\WINDOWS\system32\swinmpea.exe
    O4 - Global Startup: MacName.lnk = C:\Program Files\MacOpener\MacName.exe
    O8 - Extra context menu item: E&xport to Microsoft Office Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra button: (no name) - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
    O9 - Extra 'Tools' menuitem: Java - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O15 - Trusted Zone: http://click.getmirar.com (HKLM)
    O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
    O15 - Trusted Zone: http://redirect.mirarsearch.com (HKLM)
    O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
    O16 - DPF: {01111F00-3E00-11D2-8470-0060089874ED} (Support.com Installer) - http://softdev.adelphia.net/sdccommon/download/tgctlins.cab
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
    O16 - DPF: {3FE16C08-D6A7-4133-84FC-D5BFB4F7D886} (WebGameLoader Class) - http://www.reflexive.net/rlwweb/ReflexiveWebGameLoader.cab
    O16 - DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} (MJLauncherCtrl Class) - http://zone.msn.com/bingame/luxr/default/mjolauncher.cab
    O16 - DPF: {8A0DCBDB-6E20-489C-9041-C1E8A0352E75} -
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab34246.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab
    O16 - DPF: {E4C29FDC-F547-4219-ACFD-571F2A7A564A} - http://click.mirarsearch.com/CABUPDATES/winwcd.cab
    O18 - Filter: text/html - {994D478A-45D0-4DB4-AE28-738B1E346F99} - C:\Program Files\Exolon\Exolon.dll
    O20 - Winlogon Notify: RunOnceEx - C:\WINDOWS\system32\dsskcopy.dll
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\
    O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: Client IP-IPX - Unknown owner - C:\WINDOWS\system32\svchosts.exe" -e mc-110-12-0000137 (file missing)
    O23 - Service: Digidesign MME Refresh Service (DigiRefresh) - Digidesign, A Division of Avid Technology, Inc. - C:\Program Files\Digidesign\Drivers\MMERefresh.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: MacFormatService - Unknown owner - C:\Program Files\MacOpener\FORMATM.EXE" /SERVICE (file missing)
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
     
  5. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    You have not done the Combofix nor SUperAntiSpyware - go back to my previous post and do ALL of it!
     
  6. Baked421

    Baked421 Thread Starter

    Joined:
    Jun 6, 2004
    Messages:
    83
    "Mike" - 07-01-30 12:53:18 Service Pack 2
    ComboFix 07.01.30 - Running from: "C:\Documents and Settings\Mike\Desktop"

    ((((((((((((((((((((((((((((((((((((((((((((( Look2Me's Log ))))))))))))))))))))))))))))))))))))))))))))))))))

    REGISTRY ENTRIES REMOVED:
    Windows Registry Editor Version 5.00

    [HKEY_CLASSES_ROOT\clsid\{5fab2187-ee51-4780-9c01-2cf54c18ddf8}]
    @=""
    "IDEx"="ADDR"

    [HKEY_CLASSES_ROOT\clsid\{5fab2187-ee51-4780-9c01-2cf54c18ddf8}\Implemented Categories]
    @=""

    [HKEY_CLASSES_ROOT\clsid\{5fab2187-ee51-4780-9c01-2cf54c18ddf8}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
    @=""

    [HKEY_CLASSES_ROOT\clsid\{5fab2187-ee51-4780-9c01-2cf54c18ddf8}\InprocServer32]
    @="C:\\WINDOWS\\system32\\dsskcopy.dll"
    "ThreadingModel"="Apartment"

    * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


    FILES REMOVED:

    C:\WINDOWS\system32\dsskcopy.dll


    Granting SeDebugPrivilege to Administrators ... successful


    ((((((((((((((((((((((((((((((((((((((((((((( Qoologic's Log )))))))))))))))))))))))))))))))))))))))))))))))))))



    No infected Qoologic files found. Reg entries were fixed


    (((((((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


    C:\WINDOWS\uninstall_nmon.vbs
    C:\WINDOWS\876056.exe
    C:\WINDOWS\system32\bszip.dll
    C:\WINDOWS\system32\cmd.com
    C:\WINDOWS\system32\ping.com
    C:\WINDOWS\system32\REGEDIT.com
    C:\WINDOWS\system32\tasklist.com
    C:\WINDOWS\system32\tpuninstall.exe
    C:\WINDOWS\system32\tracert.com
    C:\WINDOWS\offun.exe
    C:\WINDOWS\v1201.exe
    C:\DOCUME~1\LOCALS~1\Application Data\NetMon
    C:\Program Files\Common Files\{30703~1
    C:\Program Files\batty2
    C:\Program Files\Batty2
    C:\Program Files\CMFibula
    C:\Program Files\cmfibula
    C:\Program Files\InetGet2
    C:\Program Files\Inetget2
    C:\Program Files\network monitor
    C:\Program Files\Network Monitor
    C:\Program Files\outlook
    C:\Program Files\PSCastor
    C:\WINDOWS\system32\svchosts.exe
    C:\Program Files\Common Files\{40703~1
    C:\Program Files\CMIntex
    ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Purity ~ ~ ~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
    Folders Quarantined:
    C:\qoobox\purity\DOCUME~1
    C:\qoobox\purity\DOCUME~1\Mike
    C:\qoobox\purity\DOCUME~1\Mike\Application Data
    C:\qoobox\purity\DOCUME~1\Mike\My Documents
    C:\qoobox\purity\DOCUME~1\Mike\Application Data\ASKS~1
    C:\qoobox\purity\DOCUME~1\Mike\Application Data\CROSOF~1
    C:\qoobox\purity\DOCUME~1\Mike\Application Data\from.txt
    C:\qoobox\purity\DOCUME~1\Mike\Application Data\MANTEC~1
    C:\qoobox\purity\DOCUME~1\Mike\Application Data\SSEMBL~1
    C:\qoobox\purity\DOCUME~1\Mike\My Documents\from.txt
    C:\qoobox\purity\DOCUME~1\Mike\My Documents\ICROSO~1.NET
    C:\qoobox\purity\DOCUME~1\Mike\My Documents\YMBOLS~1
    C:\qoobox\purity\Program Files\CROSOF~1.NET
    C:\qoobox\purity\Program Files\CROSOF~2.NET
    C:\qoobox\purity\Program Files\SEMBLY~1
    C:\qoobox\purity\Program Files\Common Files\CURITY~1
    C:\qoobox\purity\WINDOWS\CURITY~1
    C:\qoobox\purity\WINDOWS\system32\MBOLS~1


    ((((((((((((((((((((((((((((((( Files Created from 2006-12-30 to 2007-01-30 ))))))))))))))))))))))))))))))))))


    2007-01-30 12:55 <DIR> d-------- C:\WINDOWS\ERDNT
    2007-01-29 20:05 <DIR> d-------- C:\SDFix
    2007-01-29 19:54 2,560 --a------ C:\WINDOWS\system32\unsvchosts.exe
    2007-01-28 20:00 <DIR> d-------- C:\DOCUME~1\Mike\Application Data\BitTorrent
    2007-01-28 19:59 <DIR> d-------- C:\Program Files\BitTorrent
    2007-01-28 19:46 10,344 --a------ C:\WINDOWS\system32\drivers\symlcbrd.sys
    2007-01-25 14:17 3,270 --a------ C:\WINDOWS\system32\tmp.reg
    2007-01-23 14:49 184,437 --a------ C:\WINDOWS\system32\swinmpea.exe
    2007-01-19 17:44 <DIR> d-------- C:\Program Files\Exolon
    2007-01-09 18:47 184,448 --a------ C:\WINDOWS\system32\swinmpeb.exe


    (((((((((((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))))


    2007-01-30 12:54 445 --a------ C:\WINDOWS\eqnej.dll
    2007-01-30 12:49 1460 --a------ C:\WINDOWS\system32\sth3a7ae.sys
    2007-01-30 12:49 -------- dr------- C:\Program Files\padsysassistant
    2007-01-30 12:49 -------- d-------- C:\Program Files\messenger
    2007-01-29 22:52 -------- d-------- C:\Program Files\Common Files\symantec shared
    2007-01-28 20:00 -------- d-------- C:\Documents and Settings\Mike\Application Data\bittorrent
    2007-01-28 19:32 -------- d-------- C:\Program Files\quicktime
    2007-01-28 19:31 -------- d--h----- C:\Program Files\installshield installation information
    2007-01-28 19:30 -------- d-------- C:\Program Files\full tilt poker.net
    2007-01-26 20:08 -------- d-------- C:\Program Files\adsponsor
    2007-01-25 14:50 -------- d-------- C:\Program Files\ipod
    2007-01-25 14:47 -------- d-------- C:\Program Files\ea games
    2007-01-23 14:49 -------- d-------- C:\Program Files\windows nt
    2006-12-16 18:07 183808 --a-s---- C:\WINDOWS\ndnuninstall7_48.exe
    2006-12-16 18:04 184419 --a------ C:\WINDOWS\system32\swinmped.exe
    2006-12-10 17:33 1080 --a------ C:\WINDOWS\system32\winpfz32.sys
    2006-12-06 20:35 919 --a------ C:\WINDOWS\system32\winpfg32.sys
    2006-12-06 20:35 180309 --a------ C:\WINDOWS\system32\swinmpeg.exe
    2006-11-12 09:46 62976 --a------ C:\WINDOWS\system32\sth3a7ae.dll
    2006-11-12 09:46 106496 --a------ C:\WINDOWS\system32\domainhelper.dll
    2006-11-04 10:14 69632 --a------ C:\WINDOWS\system32\bagcnohp.dll


    (((((((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))

    *Note* empty entries & legit default entries are not shown

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run]
    "BitTorrent"="\"C:\\Program Files\\BitTorrent\\bittorrent.exe\" --force_start_minimized"
    "ckrqt"="C:\\WINDOWS\\system32\\gvgwsl.exe reg_run"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run]
    "MacLicense"="\"C:\\Program Files\\MacOpener\\MacLic.exe\""
    "SoundMan"="SOUNDMAN.EXE"
    "HPDJ Taskbar Utility"="C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\hpztsb07.exe"
    "DigidesignMMERefresh"="\"C:\\Program Files\\Digidesign\\Drivers\\MMERefresh.exe\""
    "MsgCenterExe"="\"C:\\Program Files\\Common Files\\Real\\Update_OB\\RealOneMessageCenter.exe\" -osboot"
    "sth3a7ae"="\"RUNDLL32.EXE\" wb50acf3.dll,n 0063a7a800000003b50acf3"
    "ms067884108109"="C:\\WINDOWS\\ms067884108109.exe"
    "purvyxcA"="C:\\WINDOWS\\purvyxcA.exe"
    "fnlosj"="C:\\WINDOWS\\system32\\gvgwsl.exe reg_run"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\IMAIL]
    "Installed"="1"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MAPI]
    "Installed"="1"
    "NoChange"="1"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MSFS]
    "Installed"="1"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder]

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
    "path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\Adobe Reader Speed Launch.lnk"
    "backup"="C:\\WINDOWS\\pss\\Adobe Reader Speed Launch.lnkCommon Startup"
    "location"="Common Startup"
    "command"="C:\\PROGRA~1\\Adobe\\ACROBA~1.0\\Reader\\READER~1.EXE "
    "item"="Adobe Reader Speed Launch"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^hp psc 1000 series.lnk]
    "path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\hp psc 1000 series.lnk"
    "backup"="C:\\WINDOWS\\pss\\hp psc 1000 series.lnkCommon Startup"
    "location"="Common Startup"
    "command"="C:\\PROGRA~1\\HEWLET~1\\DIGITA~1\\bin\\hpohmr08.exe "
    "item"="hp psc 1000 series"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^hpoddt01.exe.lnk]
    "path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\hpoddt01.exe.lnk"
    "backup"="C:\\WINDOWS\\pss\\hpoddt01.exe.lnkCommon Startup"
    "location"="Common Startup"
    "command"="C:\\PROGRA~1\\HEWLET~1\\DIGITA~1\\bin\\hpotdd01.exe "
    "item"="hpoddt01.exe"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg]

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\dvd43]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="dvd43_tray"
    "hkey"="HKLM"
    "command"="C:\\Program Files\\dvd43\\dvd43_tray.exe"
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPDJ Taskbar Utility]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="hpztsb07"
    "hkey"="HKLM"
    "command"="C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\hpztsb07.exe"
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="iTunesHelper"
    "hkey"="HKLM"
    "command"="\"C:\\Program Files\\iTunes\\iTunesHelper.exe\""
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="NeroCheck"
    "hkey"="HKLM"
    "command"="C:\\WINDOWS\\system32\\NeroCheck.exe"
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="qttask"
    "hkey"="HKLM"
    "command"="\"C:\\Program Files\\QuickTime\\qttask.exe\" -atboottime"
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="jusched"
    "hkey"="HKLM"
    "command"="C:\\Program Files\\Java\\jre1.5.0_06\\bin\\jusched.exe"
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
    "{04CDB16C-AB38-43CD-A86A-6FEB90290939}"=""

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\10]
    Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/7927.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\11]
    Source REG_SZ http://ai.pricegrabber.com/product_images/6800000-6800999/6800847_640.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\12]
    Source REG_SZ http://dyn.ifilm.com/image/i/2/player/bkg_default.gif

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\13]
    Source REG_SZ http://dyn.ifilm.com/image/i/2/player/play5.gif

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\14]
    Source REG_SZ http://akamai.edeal.com/images/catalog1910/folder13489/img1197789.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\15]
    Source REG_SZ http://thumbs.ebaystatic.com/pict/5793267101_0.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\16]
    Source REG_SZ http://www.active-hardware.com/images/left-menu1.gif

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\17]
    Source REG_SZ http://www.extremesportdrumming.com/Images/Banners/MTV C2G.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\18]
    Source REG_SZ http://www.beatofdrum.com/vid-stills/MC-Shlomo.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\19]
    Source REG_SZ http://www.beatofdrum.com/vid-stills/Rush.gif

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\2]
    Source REG_SZ http://thumbs.ebaystatic.com/pict/5872880923_0.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\20]
    Source REG_SZ http://www.beatofdrum.com/vid-stills/worlds-fastest.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\21]
    Source REG_SZ http://www.beatofdrum.com/vid-stills/street-drummer.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\22]
    Source REG_SZ http://www.beatofdrum.com/vid-stills/worlds-fastest2.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\23]
    Source REG_SZ http://www.thedrummerswebsite.com/animateddrumsolo.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\24]
    Source REG_SZ http://media1.break.com/girls/girl202_Kerriana1.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\26]
    Source REG_SZ http://cgi.ebay.com/Pioneer-SX-7-St...QcategoryZ39789QQtcZphotoQQrdZ1QQcmdZViewItem

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\3]
    Source REG_SZ http://i21.ebayimg.com/02/i/06/72/0c/2e_1_sbl.JPG

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\4]
    Source REG_SZ http://media1.break.com/dnet/media/content/badcar.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\5]
    Source REG_SZ http://media1.break.com/dnet/media/content/outofleague.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\6]
    Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/7983.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\7]
    Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/4223.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\8]
    Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/8043.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\9]
    Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/8535.jpg

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
    "SecurityProviders"="msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll"


    [HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Svchost]
    HTTPFilter REG_MULTI_SZ HTTPFilter\0\0
    LocalService REG_MULTI_SZ Alerter\0WebClient\0LmHosts\0RemoteRegistry\0upnphost\0SSDPSRV\0\0
    NetworkService REG_MULTI_SZ DnsCache\0\0
    DcomLaunch REG_MULTI_SZ DcomLaunch\0TermService\0\0
    rpcss REG_MULTI_SZ RpcSs\0\0
    imgsvc REG_MULTI_SZ StiSvc\0\0
    termsvcs REG_MULTI_SZ TermService\0\0



    Contents of the 'Scheduled Tasks' folder
    C:\WINDOWS\tasks\FRU Task #Hewlett-Packard#hp psc 1200 series#1146347100.job
    C:\WINDOWS\tasks\XoftSpySE.job

    Completion time: 07-01-30 12:57:20
     
  7. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Now do Superantispyware and post a new hijack log
     
  8. Baked421

    Baked421 Thread Starter

    Joined:
    Jun 6, 2004
    Messages:
    83
    Logfile of HijackThis v1.99.1
    Scan saved at 3:59:02 PM, on 1/30/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Digidesign\Drivers\MMERefresh.exe
    C:\Program Files\MacOpener\FORMATM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\SOUNDMAN.EXE
    C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
    C:\WINDOWS\system32\RUNDLL32.EXE
    C:\Program Files\MacOpener\MacName.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Documents and Settings\Mike\Desktop\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
    F2 - REG:system.ini: Shell=Explorer.exe, C:\WINDOWS\system32\vfxbs.exe
    F2 - REG:system.ini: UserInit=C:\WINDOWS\System32\userinit.exe,hbefdrs.exe
    O4 - HKLM\..\Run: [MacLicense] "C:\Program Files\MacOpener\MacLic.exe"
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
    O4 - HKLM\..\Run: [DigidesignMMERefresh] "C:\Program Files\Digidesign\Drivers\MMERefresh.exe"
    O4 - HKLM\..\Run: [MsgCenterExe] "C:\Program Files\Common Files\Real\Update_OB\RealOneMessageCenter.exe" -osboot
    O4 - HKLM\..\Run: [sth3a7ae] "RUNDLL32.EXE" wb50acf3.dll,n 0063a7a800000003b50acf3
    O4 - HKLM\..\Run: [ms067884108109] C:\WINDOWS\ms067884108109.exe
    O4 - HKCU\..\Run: [BitTorrent] "C:\Program Files\BitTorrent\bittorrent.exe" --force_start_minimized
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Global Startup: MacName.lnk = C:\Program Files\MacOpener\MacName.exe
    O8 - Extra context menu item: E&xport to Microsoft Office Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O15 - Trusted Zone: http://click.getmirar.com (HKLM)
    O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
    O15 - Trusted Zone: http://redirect.mirarsearch.com (HKLM)
    O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
    O16 - DPF: {01111F00-3E00-11D2-8470-0060089874ED} (Support.com Installer) - http://softdev.adelphia.net/sdccommon/download/tgctlins.cab
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
    O16 - DPF: {3FE16C08-D6A7-4133-84FC-D5BFB4F7D886} (WebGameLoader Class) - http://www.reflexive.net/rlwweb/ReflexiveWebGameLoader.cab
    O16 - DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} (MJLauncherCtrl Class) - http://zone.msn.com/bingame/luxr/default/mjolauncher.cab
    O16 - DPF: {8A0DCBDB-6E20-489C-9041-C1E8A0352E75} -
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab34246.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab
    O16 - DPF: {E4C29FDC-F547-4219-ACFD-571F2A7A564A} - http://click.mirarsearch.com/CABUPDATES/winwcd.cab
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\
    O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: Digidesign MME Refresh Service (DigiRefresh) - Digidesign, A Division of Avid Technology, Inc. - C:\Program Files\Digidesign\Drivers\MMERefresh.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: MacFormatService - Unknown owner - C:\Program Files\MacOpener\FORMATM.EXE" /SERVICE (file missing)
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
     
  9. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    You did not post the Super log as requested - we need those things


    You have no active AntiVirus!

    Get the free AVG AntiVirus 7.5 install it, check for updates and run a full scan

    AVG 7.5 - http://free.grisoft.com/freeweb.php/doc/2/
    ==========================

    download http://www.mvps.org/winhelp2002/DelDomains.inf with I.E.

    Right click the DelDomains.inf file and click Install, making sure Internet Explorer is closed. You won't see anything happen. Give it a minute.

    Note, if you use SpywareBlaster and/or IE/Spyads, it will be necessary to re-install the protection both afford. For SpywareBlaster, run the program and re-protect all items. For IE/Spyads, run the batch file and reinstall the protection.
    ===========================

    You may want to print this or save it to notepad as we will go to safe mode.

    Fix these with HiJackThis – mark them, close IE, click fix checked

    F2 - REG:system.ini: Shell=Explorer.exe, C:\WINDOWS\system32\vfxbs.exe

    F2 - REG:system.ini: UserInit=C:\WINDOWS\System32\userinit.exe,hbefdrs.exe

    O4 - HKLM\..\Run: [sth3a7ae] "RUNDLL32.EXE" wb50acf3.dll,n 0063a7a800000003b50acf3

    O4 - HKLM\..\Run: [ms067884108109] C:\WINDOWS\ms067884108109.exe

    O16 - DPF: {8A0DCBDB-6E20-489C-9041-C1E8A0352E75} –

    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab

    O16 - DPF: {E4C29FDC-F547-4219-ACFD-571F2A7A564A} - http://click.mirarsearch.com/CABUPDATES/winwcd.cab

    DownLoad http://www.downloads.subratam.org/KillBox.zip or
    http://www.thespykiller.co.uk/files/killbox.exe

    Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

    Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

    C:\WINDOWS\system32\vfxbs.exe
    C:\WINDOWS\System32\hbefdrs.exe
    C:\WINDOWS\System32\wb50acf3.dll

    Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

    START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

    Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

    Not all temp files will delete and that is normal
    Empty the recycle bin
    Boot and post a new hijack log from normal NOT safe mode

    Please give feedback on what worked/didn’t work and the current status of your system
     
  10. Baked421

    Baked421 Thread Starter

    Joined:
    Jun 6, 2004
    Messages:
    83
    SUPERAntiSpyware Scan Log
    Generated 01/31/2007 at 03:15 PM

    Application Version : 3.5.1016

    Core Rules Database Version : 3175
    Trace Rules Database Version: 1185

    Scan type : Complete Scan
    Total Scan Time : 00:46:04

    Memory items scanned : 394
    Memory threats detected : 1
    Registry items scanned : 5473
    Registry threats detected : 138
    File items scanned : 19072
    File threats detected : 280

    Adware.WebNexus
    C:\WINDOWS\SYSTEM32\MDGWJUE.DLL
    C:\WINDOWS\SYSTEM32\MDGWJUE.DLL

    Adware.Qoologic/QoolAid
    [fnlosj] C:\WINDOWS\SYSTEM32\GVGWSL.EXE
    C:\WINDOWS\SYSTEM32\GVGWSL.EXE
    [ckrqt] C:\WINDOWS\SYSTEM32\GVGWSL.EXE
    C:\DOCUMENTS AND SETTINGS\ALL USERS\START MENU\PROGRAMS\STARTUP\XDSXY.EXE

    Browser Hijacker.Internet Explorer Zone Hijack
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getmirar.com
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getmirar.com\click
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getmirar.com\click#http
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getmirar.com\click#https
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\click
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\click#http
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\click#https
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\redirect
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\redirect#http
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\redirect#https
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\net-nucleus.com
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\net-nucleus.com\awbeta
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\net-nucleus.com\awbeta#http
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\net-nucleus.com\awbeta#https

    Adware.Unknown Origin
    C:\PROGRAM FILES\WINDOWS MEDIA PLAYER\PODO.HTML
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#Source
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#SubscribedURL
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#FriendlyName
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#Flags
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#Position
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#CurrentState
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#OriginalStateInfo
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#RestoredStateInfo
    C:\PROGRAM FILES\MESSENGER\MEBEZA.HTML
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#Source
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#SubscribedURL
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#FriendlyName
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#Flags
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#Position
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#CurrentState
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#OriginalStateInfo
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#RestoredStateInfo

    Adware.Tracking Cookie
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][3].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected]verture[1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][3].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][5].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][4].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected]itexchange[1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][3].txt
    C:\Documents and Settings\Mike\Cookies\[email protected][2].txt

    Adware.BookedSpace
    C:\WINDOWS\zAbstract\ASI5AFF.bsx
    C:\WINDOWS\zAbstract\ASI_SPEC.bsx
    C:\WINDOWS\zAbstract\bspace.html
    C:\WINDOWS\zAbstract\EECH.bsx
    C:\WINDOWS\zAbstract\MYGEEK3.bsx
    C:\WINDOWS\zAbstract\SPZ5.bsx
    C:\WINDOWS\zAbstract
    HKCR\AppID\Scaggy.DLL
    HKCR\AppID\Scaggy.DLL#AppID
    HKCR\TypeLib\{90A52F08-64AC-4DC6-9D7D-451667029898}

    Trojan.NewDotNet
    HKU\.DEFAULT\Software\New.net
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\New.net
    HKU\S-1-5-18\Software\New.net

    Trojan.Windows Overlay Components/SysMon
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OvMon
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OvMon#DisplayName
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OvMon#UninstallString

    Adware.IST/YourSiteBar
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/ysbactivex.dll

    Adware.Mirar/NetNucleus
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/System32/WinATS.dll
    HKCR\WebCamDet.WebCamTest
    HKCR\WebCamDet.WebCamTest\CLSID
    HKCR\WebCamDet.WebCamTest\CurVer
    HKCR\WebCamDet.WebCamTest.1
    HKCR\WebCamDet.WebCamTest.1\CLSID
    HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}
    HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}\1.0
    HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}\1.0\0
    HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}\1.0\0\win32
    HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}\1.0\FLAGS
    HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}\1.0\HELPDIR
    HKCR\Interface\{CE76AC70-161F-4B37-AC96-53E314C7FF95}
    HKCR\Interface\{CE76AC70-161F-4B37-AC96-53E314C7FF95}\ProxyStubClsid
    HKCR\Interface\{CE76AC70-161F-4B37-AC96-53E314C7FF95}\ProxyStubClsid32
    HKCR\Interface\{CE76AC70-161F-4B37-AC96-53E314C7FF95}\TypeLib
    HKCR\Interface\{CE76AC70-161F-4B37-AC96-53E314C7FF95}\TypeLib#Version
    HKCR\Interface\{FC4BE248-2D1D-4271-8054-0385774B078C}
    HKCR\Interface\{FC4BE248-2D1D-4271-8054-0385774B078C}\ProxyStubClsid
    HKCR\Interface\{FC4BE248-2D1D-4271-8054-0385774B078C}\ProxyStubClsid32
    HKCR\Interface\{FC4BE248-2D1D-4271-8054-0385774B078C}\TypeLib
    HKCR\Interface\{FC4BE248-2D1D-4271-8054-0385774B078C}\TypeLib#Version
    HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8A0DCBDB-6E20-489C-9041-C1E8A0352E75}
    HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8A0DCBDB-6E20-489C-9041-C1E8A0352E75}\Contains
    HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8A0DCBDB-6E20-489C-9041-C1E8A0352E75}\Contains\Files
    HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8A0DCBDB-6E20-489C-9041-C1E8A0352E75}\Contains\Files#C:\WINDOWS\system32\WinATS.dll
    HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8A0DCBDB-6E20-489C-9041-C1E8A0352E75}\DownloadInformation
    C:\WINDOWS\Downloaded Program Files\Winwcd.inf

    Trojan.WinBo32/Enhance
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\System\sysuid

    Adware.FullContext
    C:\Program Files\PadsysAssistant\AssistantLibrary.dll
    C:\Program Files\PadsysAssistant\desktop.ini
    C:\Program Files\PadsysAssistant\PadsysAssistant.exe
    C:\Program Files\PadsysAssistant\PadsysLibrary.sys
    C:\Program Files\PadsysAssistant\PadsysLibrary2.sys
    C:\Program Files\PadsysAssistant\Uninstall.exe
    C:\Program Files\PadsysAssistant
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\CMFibula
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\PSDream
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\PSCastor
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\PadsysAssistant
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{04CDB16C-AB38-43CD-A86A-6FEB90290939}
    C:\PROGRAM FILES\EXOLON\EXOLON.DLL

    Adware.SearchClickAds
    HKCR\KBBar.KBBarBand
    HKCR\KBBar.KBBarBand\CLSID
    HKCR\KBBar.KBBarBand\CurVer
    HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}
    HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}\1.0
    HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}\1.0\0
    HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}\1.0\0\win32
    HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}\1.0\FLAGS
    HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}\1.0\HELPDIR
    HKCR\Interface\{41E74C20-8BBD-4B15-8C24-95BAC7B3BAC1}
    HKCR\Interface\{41E74C20-8BBD-4B15-8C24-95BAC7B3BAC1}\ProxyStubClsid
    HKCR\Interface\{41E74C20-8BBD-4B15-8C24-95BAC7B3BAC1}\ProxyStubClsid32
    HKCR\Interface\{41E74C20-8BBD-4B15-8C24-95BAC7B3BAC1}\TypeLib
    HKCR\Interface\{41E74C20-8BBD-4B15-8C24-95BAC7B3BAC1}\TypeLib#Version
    HKCR\AppId\CFG32S.DLL
    HKCR\AppId\CFG32S.DLL#AppID
    HKLM\SOFTWARE\zAbstract
    HKLM\SOFTWARE\zAbstract#Unique
    HKLM\SOFTWARE\zAbstract#Stamp-Spawn
    HKLM\SOFTWARE\zAbstract#Stamp-Update
    HKLM\SOFTWARE\zAbstract#Count-Update
    HKLM\SOFTWARE\zAbstract#Delay-Update
    HKLM\SOFTWARE\zAbstract#Delay-EECH
    HKLM\SOFTWARE\zAbstract#Delay-SPZ5
    HKLM\SOFTWARE\zAbstract#Delay-ASI5AFF
    HKLM\SOFTWARE\zAbstract#Delay-MYGEEK3
    HKLM\SOFTWARE\zAbstract#Delay-ASI_SPEC
    HKLM\SOFTWARE\zAbstract#Campaigns
    HKLM\SOFTWARE\zAbstract#Receipt-EECH
    HKLM\SOFTWARE\zAbstract#Data-EECH
    HKLM\SOFTWARE\zAbstract#Receipt-SPZ5
    HKLM\SOFTWARE\zAbstract#Data-SPZ5
    HKLM\SOFTWARE\zAbstract#Receipt-ASI5AFF
    HKLM\SOFTWARE\zAbstract#Data-ASI5AFF
    HKLM\SOFTWARE\zAbstract#Receipt-MYGEEK3
    HKLM\SOFTWARE\zAbstract#Data-MYGEEK3
    HKLM\SOFTWARE\zAbstract#Receipt-ASI_SPEC
    HKLM\SOFTWARE\zAbstract#Data-ASI_SPEC
    HKLM\SOFTWARE\zAbstract#Receipt-MRR
    HKLM\SOFTWARE\zAbstract#Last
    HKLM\SOFTWARE\zAbstract#Page
    HKLM\SOFTWARE\zAbstract#Stamp-EECH
    HKLM\SOFTWARE\zAbstract#Count-EECH
    HKLM\SOFTWARE\zAbstract#Override
    HKLM\SOFTWARE\zAbstract#Receipt-UPG82
    HKLM\SOFTWARE\zAbstract#Stamp-SPZ5
    HKLM\SOFTWARE\zAbstract#Count-SPZ5
    HKLM\SOFTWARE\zAbstract#Stamp-ASI_SPEC
    HKLM\SOFTWARE\zAbstract#Count-ASI_SPEC
    HKLM\SOFTWARE\zAbstract#Receipt-RK2

    Adware.IPWins
    HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\IpWins
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IpWins
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IpWins#DisplayName
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IpWins#UninstallString

    Adware.AdSponsor
    C:\Program Files\AdSponsor
    HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}
    HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0
    HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\0
    HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\0\win32
    HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\FLAGS
    HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\HELPDIR

    Unclassified.Unknown Origin/System
    C:\PROGRAM FILES\COMMON FILES\MZZQ\MZZQD\MZZQC.DLL

    Trojan.Update-Mcboo
    C:\RECYCLER\S-1-5-18\DC1\UPDATE.EXE
    C:\RECYCLER\S-1-5-18\DC2\UPDATE.EXE
    C:\RECYCLER\S-1-5-18\DC3\UPDATE.EXE
    C:\RECYCLER\S-1-5-18\DC4\UPDATE.EXE

    Adware.ClickSpring/Yazzle
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{737D51B0-F8C7-49C0-B526-DE9751700F72}\RP498\A0053896.EXE

    Adware.ClickSpring
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{737D51B0-F8C7-49C0-B526-DE9751700F72}\RP498\A0053897.EXE

    Trojan.ZenoSearch
    C:\WINDOWS\SYSTEM32\SWINMPEA.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{737D51B0-F8C7-49C0-B526-DE9751700F72}\RP498\A0053961.LNK
     
  11. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Need a new hijack log

    =====================
    IE - Block Third party cookies
    1. Click on the Tools button on the Internet Explorer tool bar.
    2. Highlight and click on Internet options at the bottom of the Tools menu.
    3. Select the Privacy Tab of the Internet Options menu.
    4. Select the Advanced... button at the bottom of the screen.
    5. Select override automatic cookie handling button.
    6. To block third party cookies select block under "Third-party cookies".
    7. Select "always allow session cookies".
    8. Click on the OK button at the bottom of the screen.
    =====================

    Run combo again and post its log
     
  12. Baked421

    Baked421 Thread Starter

    Joined:
    Jun 6, 2004
    Messages:
    83
  13. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Combofix - post 2
     
  14. Baked421

    Baked421 Thread Starter

    Joined:
    Jun 6, 2004
    Messages:
    83
    C:\WINDOWS\system32\vfxbs.exe
    C:\WINDOWS\System32\hbefdrs.exe
     
  15. Baked421

    Baked421 Thread Starter

    Joined:
    Jun 6, 2004
    Messages:
    83
    "Mike" - 07-01-31 17:47:41 Service Pack 2
    ComboFix 07.01.30 - Running from: "C:\Documents and Settings\Mike\Desktop"

    ((((((((((((((((((((((((((((((((((((((((((((( Qoologic's Log )))))))))))))))))))))))))))))))))))))))))))))))))))


    * * * PRE-RUN - Filepaths extracted from the Registry * * * * * * * * * * * * * * * * * * * * * *


    O4 - HKCU\...\Run C:\WINDOWS\system32\gvgwsl.exe
    O4 - HKLM\...\Run C:\WINDOWS\system32\gvgwsl.exe
    F2 -REG:system.ini: Shell C:\WINDOWS\system32\vfxbs.exe
    F2 -REG:system.ini: UserInit C:\WINDOWS\system32\hbefdrs.exe


    * * * PRE-RUN - Filepaths extracted by Memory Dump * * * * * * * * * * * * * * * * * * * * * *


    C:\WINDOWS\system32\mdgwjue.dll
    C:\WINDOWS\system32\gvgwsl.exe
    C:\WINDOWS\system32\hbefdrs.exe
    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\xdsxy.exe
    C:\WINDOWS\eqnej.dll
    C:\WINDOWS\system32\ltvae.dat
    C:\WINDOWS\system32\vfxbs.exe


    * * * POST-RUN - Files in the Quarantine folder * * * * * * * * * * * * * * * * * * * * * * * * *


    07-01-31 16:34 127488 xdsxy.exe.qoo
    07-01-31 16:34 51712 mdgwjue.dll.qoo
    07-01-31 17:45 339 eqnej.dll.qoo

    DO NOT DELETE ANY FILES FROM THIS DIRECTORY UNLESS INSTRUCTED TO


    (((((((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


    ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Purity ~ ~ ~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
    Folders Quarantined:
    C:\qoobox\purity\DOCUME~1
    C:\qoobox\purity\DOCUME~1\Mike
    C:\qoobox\purity\DOCUME~1\Mike\Application Data
    C:\qoobox\purity\DOCUME~1\Mike\My Documents
    C:\qoobox\purity\DOCUME~1\Mike\Application Data\ASKS~1
    C:\qoobox\purity\DOCUME~1\Mike\Application Data\CROSOF~1
    C:\qoobox\purity\DOCUME~1\Mike\Application Data\from.txt
    C:\qoobox\purity\DOCUME~1\Mike\Application Data\MANTEC~1
    C:\qoobox\purity\DOCUME~1\Mike\Application Data\SSEMBL~1
    C:\qoobox\purity\DOCUME~1\Mike\My Documents\from.txt
    C:\qoobox\purity\DOCUME~1\Mike\My Documents\ICROSO~1.NET
    C:\qoobox\purity\DOCUME~1\Mike\My Documents\YMBOLS~1
    C:\qoobox\purity\Program Files\CROSOF~1.NET
    C:\qoobox\purity\Program Files\CROSOF~2.NET
    C:\qoobox\purity\Program Files\SEMBLY~1
    C:\qoobox\purity\Program Files\Common Files\CURITY~1
    C:\qoobox\purity\WINDOWS\CURITY~1
    C:\qoobox\purity\WINDOWS\system32\MBOLS~1


    ((((((((((((((((((((((((((((((( Files Created from 2006-12-31 to 2007-01-31 ))))))))))))))))))))))))))))))))))


    2007-01-31 18:17 51,712 --a------ C:\WINDOWS\system32\mdgwjue.dll
    2007-01-31 18:17 24 --a------ C:\WINDOWS\eqnej.dll
    2007-01-31 18:17 127,488 --a------ C:\WINDOWS\system32\gvgwsl.exe
    2007-01-31 16:05 <DIR> d-------- C:\!KillBox
    2007-01-30 17:10 <DIR> d--h----- C:\WINDOWS\PIF
    2007-01-30 16:29 87,768 --a------ C:\WINDOWS\system32\S32EVNT1.DLL
    2007-01-30 16:29 108,168 --a------ C:\WINDOWS\system32\drivers\SYMEVENT.SYS
    2007-01-30 16:29 <DIR> d-------- C:\Program Files\Norton AntiVirus
    2007-01-30 16:28 <DIR> d-------- C:\Program Files\Symantec
    2007-01-30 13:21 0 --a------ C:\WINDOWS\YOURAPP.EXE
    2007-01-30 13:20 0 --a------ C:\WINDOWS\system32\CMMGR32.EXE
    2007-01-30 13:07 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
    2007-01-30 13:07 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
    2007-01-30 13:07 <DIR> d-------- C:\DOCUME~1\Mike\Application Data\SUPERAntiSpyware.com
    2007-01-30 13:07 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\Application Data\SUPERAntiSpyware.com
    2007-01-30 12:55 <DIR> d-------- C:\WINDOWS\ERDNT
    2007-01-29 20:05 <DIR> d-------- C:\SDFix
    2007-01-29 19:54 2,560 --a------ C:\WINDOWS\system32\unsvchosts.exe
    2007-01-28 20:00 <DIR> d-------- C:\DOCUME~1\Mike\Application Data\BitTorrent
    2007-01-28 19:59 <DIR> d-------- C:\Program Files\BitTorrent
    2007-01-28 19:46 10,344 --a------ C:\WINDOWS\system32\drivers\symlcbrd.sys
    2007-01-25 14:17 3,270 --a------ C:\WINDOWS\system32\tmp.reg
    2007-01-19 17:44 <DIR> d-------- C:\Program Files\Exolon
    2007-01-09 18:47 184,448 --a------ C:\WINDOWS\system32\swinmpeb.exe


    (((((((((((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))))


    2007-01-30 20:34 1460 --a------ C:\WINDOWS\system32\sth3a7ae.sys
    2007-01-30 17:07 -------- d-------- C:\Program Files\Common Files\symantec shared
    2007-01-30 16:34 -------- d-------- C:\Documents and Settings\Mike\Application Data\symantec
    2007-01-30 15:53 -------- d-------- C:\Program Files\windows nt
    2007-01-30 13:07 -------- d-------- C:\Documents and Settings\Mike\Application Data\superantispyware.com
    2007-01-30 12:58 -------- d-------- C:\Program Files\messenger
    2007-01-28 20:00 -------- d-------- C:\Documents and Settings\Mike\Application Data\bittorrent
    2007-01-28 19:32 -------- d-------- C:\Program Files\quicktime
    2007-01-28 19:31 -------- d--h----- C:\Program Files\installshield installation information
    2007-01-28 19:30 -------- d-------- C:\Program Files\full tilt poker.net
    2007-01-25 14:50 -------- d-------- C:\Program Files\ipod
    2007-01-25 14:47 -------- d-------- C:\Program Files\ea games
    2006-12-16 18:07 183808 --a-s---- C:\WINDOWS\ndnuninstall7_48.exe
    2006-12-16 18:04 184419 --a------ C:\WINDOWS\system32\swinmped.exe
    2006-12-10 17:33 1080 --a------ C:\WINDOWS\system32\winpfz32.sys
    2006-12-06 20:35 919 --a------ C:\WINDOWS\system32\winpfg32.sys
    2006-12-06 20:35 180309 --a------ C:\WINDOWS\system32\swinmpeg.exe


    (((((((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))

    *Note* empty entries & legit default entries are not shown

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run]
    "BitTorrent"="\"C:\\Program Files\\BitTorrent\\bittorrent.exe\" --force_start_minimized"
    "SUPERAntiSpyware"="C:\\Program Files\\SUPERAntiSpyware\\SUPERAntiSpyware.exe"
    "ckrqt"="C:\\WINDOWS\\system32\\gvgwsl.exe reg_run"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run]
    "MacLicense"="\"C:\\Program Files\\MacOpener\\MacLic.exe\""
    "SoundMan"="SOUNDMAN.EXE"
    "HPDJ Taskbar Utility"="C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\hpztsb07.exe"
    "DigidesignMMERefresh"="\"C:\\Program Files\\Digidesign\\Drivers\\MMERefresh.exe\""
    "MsgCenterExe"="\"C:\\Program Files\\Common Files\\Real\\Update_OB\\RealOneMessageCenter.exe\" -osboot"
    "ccApp"="\"C:\\Program Files\\Common Files\\Symantec Shared\\ccApp.exe\""
    "ALUAlert"="C:\\Program Files\\Symantec\\LiveUpdate\\ALUNOTIFY.EXE"
    "fnlosj"="C:\\WINDOWS\\system32\\gvgwsl.exe reg_run"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\IMAIL]
    "Installed"="1"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MAPI]
    "Installed"="1"
    "NoChange"="1"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MSFS]
    "Installed"="1"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder]

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
    "path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\Adobe Reader Speed Launch.lnk"
    "backup"="C:\\WINDOWS\\pss\\Adobe Reader Speed Launch.lnkCommon Startup"
    "location"="Common Startup"
    "command"="C:\\PROGRA~1\\Adobe\\ACROBA~1.0\\Reader\\READER~1.EXE "
    "item"="Adobe Reader Speed Launch"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^hp psc 1000 series.lnk]
    "path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\hp psc 1000 series.lnk"
    "backup"="C:\\WINDOWS\\pss\\hp psc 1000 series.lnkCommon Startup"
    "location"="Common Startup"
    "command"="C:\\PROGRA~1\\HEWLET~1\\DIGITA~1\\bin\\hpohmr08.exe "
    "item"="hp psc 1000 series"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^hpoddt01.exe.lnk]
    "path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\hpoddt01.exe.lnk"
    "backup"="C:\\WINDOWS\\pss\\hpoddt01.exe.lnkCommon Startup"
    "location"="Common Startup"
    "command"="C:\\PROGRA~1\\HEWLET~1\\DIGITA~1\\bin\\hpotdd01.exe "
    "item"="hpoddt01.exe"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg]

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\dvd43]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="dvd43_tray"
    "hkey"="HKLM"
    "command"="C:\\Program Files\\dvd43\\dvd43_tray.exe"
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPDJ Taskbar Utility]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="hpztsb07"
    "hkey"="HKLM"
    "command"="C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\hpztsb07.exe"
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="iTunesHelper"
    "hkey"="HKLM"
    "command"="\"C:\\Program Files\\iTunes\\iTunesHelper.exe\""
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="NeroCheck"
    "hkey"="HKLM"
    "command"="C:\\WINDOWS\\system32\\NeroCheck.exe"
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="qttask"
    "hkey"="HKLM"
    "command"="\"C:\\Program Files\\QuickTime\\qttask.exe\" -atboottime"
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
    "key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
    "item"="jusched"
    "hkey"="HKLM"
    "command"="C:\\Program Files\\Java\\jre1.5.0_06\\bin\\jusched.exe"
    "inimapping"="0"

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"=""

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
    "Btn_Search"=dword:00000000
    "SpecifyDefaultButtons"=dword:00000000

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer\Run]

    [HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
    "Btn_Search"=dword:00000000
    "SpecifyDefaultButtons"=dword:00000000

    [HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer\Run]

    [HKEY_USERS\s-1-5-18\software\microsoft\windows\currentversion\policies\explorer]
    "Btn_Search"=dword:00000000
    "SpecifyDefaultButtons"=dword:00000000

    [HKEY_USERS\s-1-5-18\software\microsoft\windows\currentversion\policies\explorer\Run]

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\0]
    Source REG_SZ http://thumbs.ebaystatic.com/pict/5872880923_0.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\1]
    Source REG_SZ http://i21.ebayimg.com/02/i/06/72/0c/2e_1_sbl.JPG

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\10]
    Source REG_SZ http://dyn.ifilm.com/image/i/2/player/bkg_default.gif

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\11]
    Source REG_SZ http://dyn.ifilm.com/image/i/2/player/play5.gif

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\12]
    Source REG_SZ http://akamai.edeal.com/images/catalog1910/folder13489/img1197789.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\13]
    Source REG_SZ http://thumbs.ebaystatic.com/pict/5793267101_0.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\14]
    Source REG_SZ http://www.active-hardware.com/images/left-menu1.gif

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\15]
    Source REG_SZ http://www.extremesportdrumming.com/Images/Banners/MTV C2G.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\16]
    Source REG_SZ http://www.beatofdrum.com/vid-stills/MC-Shlomo.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\17]
    Source REG_SZ http://www.beatofdrum.com/vid-stills/Rush.gif

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\18]
    Source REG_SZ http://www.beatofdrum.com/vid-stills/worlds-fastest.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\19]
    Source REG_SZ http://www.beatofdrum.com/vid-stills/street-drummer.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\2]
    Source REG_SZ http://media1.break.com/dnet/media/content/badcar.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\20]
    Source REG_SZ http://www.beatofdrum.com/vid-stills/worlds-fastest2.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\21]
    Source REG_SZ http://www.thedrummerswebsite.com/animateddrumsolo.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\22]
    Source REG_SZ http://media1.break.com/girls/girl202_Kerriana1.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\24]
    Source REG_SZ http://cgi.ebay.com/Pioneer-SX-7-St...QcategoryZ39789QQtcZphotoQQrdZ1QQcmdZViewItem

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\3]
    Source REG_SZ http://media1.break.com/dnet/media/content/outofleague.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\4]
    Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/7983.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\5]
    Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/4223.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\6]
    Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/8043.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\7]
    Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/8535.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\8]
    Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/7927.jpg

    [HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\9]
    Source REG_SZ http://ai.pricegrabber.com/product_images/6800000-6800999/6800847_640.jpg

    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
    "SecurityProviders"="msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll"


    [HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Svchost]
    HTTPFilter REG_MULTI_SZ HTTPFilter\0\0
    LocalService REG_MULTI_SZ Alerter\0WebClient\0LmHosts\0RemoteRegistry\0upnphost\0SSDPSRV\0\0
    NetworkService REG_MULTI_SZ DnsCache\0\0
    DcomLaunch REG_MULTI_SZ DcomLaunch\0TermService\0\0
    rpcss REG_MULTI_SZ RpcSs\0\0
    imgsvc REG_MULTI_SZ StiSvc\0\0
    termsvcs REG_MULTI_SZ TermService\0\0



    Contents of the 'Scheduled Tasks' folder
    C:\WINDOWS\tasks\FRU Task #Hewlett-Packard#hp psc 1200 series#1146347100.job
    C:\WINDOWS\tasks\Norton AntiVirus - Run Full System Scan - Mike.job
    C:\WINDOWS\tasks\XoftSpySE.job

    Completion time: 07-01-31 18:18:25
    C:\ComboFix2.txt ... 07-01-30 12:57
     
  16. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/539238

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice