I have aquired the network monitor trojan and here is my hijack this log

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Baked421

Thread Starter
Joined
Jun 6, 2004
Messages
83
Logfile of HijackThis v1.99.1
Scan saved at 8:36:30 PM, on 1/28/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Digidesign\Drivers\MMERefresh.exe
C:\Program Files\MacOpener\FORMATM.EXE
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\purvyxc.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
C:\Program Files\outlook\outlook.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\v1201.exe
C:\WINDOWS\purvyxcA.exe
C:\Program Files\CMIntex\CMIntex.exe
C:\Program Files\MacOpener\MacName.exe
C:\Program Files\Exolon\Exolon.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\PROGRA~1\WinZip\winzip32.exe
C:\DOCUME~1\Mike\LOCALS~1\Temp\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
F2 - REG:system.ini: Shell=Explorer.exe, C:\WINDOWS\system32\vfxbs.exe
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,hbefdrs.exe
O1 - Hosts: 80.190.241.30 home.edonkey.com
O2 - BHO: AssistantLibrary - {04CDB16C-AB38-43CD-A86A-6FEB90290939} - C:\Program Files\PadsysAssistant\AssistantLibrary.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Domain Helper - {B8A5DE1C-BC13-4DD2-BF00-7BE3C603F9F2} - C:\WINDOWS\system32\DomainHelper.dll
O2 - BHO: (no name) - {E336CB8C-5BDB-4EA1-8F61-3337E3B05649} - C:\Program Files\Windows NT\mevopu.dll
O3 - Toolbar: (no name) - {C004DEC2-2623-438e-9CA2-C9043AB28508} - (no file)
O4 - HKLM\..\Run: [MacLicense] "C:\Program Files\MacOpener\MacLic.exe"
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
O4 - HKLM\..\Run: [DigidesignMMERefresh] "C:\Program Files\Digidesign\Drivers\MMERefresh.exe"
O4 - HKLM\..\Run: [MsgCenterExe] "C:\Program Files\Common Files\Real\Update_OB\RealOneMessageCenter.exe" -osboot
O4 - HKLM\..\Run: [outlook] C:\Program Files\outlook\outlook.exe /auto
O4 - HKLM\..\Run: [winlog] winlog.exe
O4 - HKLM\..\Run: [sth3a7ae] "RUNDLL32.EXE" wb50acf3.dll,n 0063a7a800000003b50acf3
O4 - HKLM\..\Run: [ms067884108109] C:\WINDOWS\ms067884108109.exe
O4 - HKLM\..\Run: [ExploreUpdSched] C:\WINDOWS\system32\swinmpea.exe GEN001
O4 - HKLM\..\Run: [ACTX1] C:\WINDOWS\v1201.exe
O4 - HKLM\..\Run: [purvyxcA] C:\WINDOWS\purvyxcA.exe
O4 - HKLM\..\RunServices: [winlog] winlog.exe
O4 - HKCU\..\Run: [CMIntex] "C:\Program Files\CMIntex\CMIntex.exe"
O4 - HKCU\..\Run: [BitTorrent] "C:\Program Files\BitTorrent\bittorrent.exe" --force_start_minimized
O4 - Startup: TA_Start.lnk = C:\WINDOWS\system32\dwdsregt.exe
O4 - Startup: Think-Adz.lnk = C:\WINDOWS\system32\swinmpea.exe
O4 - Global Startup: MacName.lnk = C:\Program Files\MacOpener\MacName.exe
O8 - Extra context menu item: E&xport to Microsoft Office Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: (no name) - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
O9 - Extra 'Tools' menuitem: Java - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted Zone: http://click.getmirar.com (HKLM)
O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://redirect.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
O16 - DPF: {01111F00-3E00-11D2-8470-0060089874ED} (Support.com Installer) - http://softdev.adelphia.net/sdccommon/download/tgctlins.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {3FE16C08-D6A7-4133-84FC-D5BFB4F7D886} (WebGameLoader Class) - http://www.reflexive.net/rlwweb/ReflexiveWebGameLoader.cab
O16 - DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} (MJLauncherCtrl Class) - http://zone.msn.com/bingame/luxr/default/mjolauncher.cab
O16 - DPF: {8A0DCBDB-6E20-489C-9041-C1E8A0352E75} -
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab34246.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab
O16 - DPF: {E4C29FDC-F547-4219-ACFD-571F2A7A564A} - http://click.mirarsearch.com/CABUPDATES/winwcd.cab
O18 - Filter: text/html - {994D478A-45D0-4DB4-AE28-738B1E346F99} - C:\Program Files\Exolon\Exolon.dll
O20 - Winlogon Notify: RunOnceEx - C:\WINDOWS\system32\dsskcopy.dll
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\
O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Digidesign MME Refresh Service (DigiRefresh) - Digidesign, A Division of Avid Technology, Inc. - C:\Program Files\Digidesign\Drivers\MMERefresh.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: MacFormatService - Unknown owner - C:\Program Files\MacOpener\FORMATM.EXE" /SERVICE (file missing)
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
O23 - Service: Windows Overlay Components - Unknown owner - C:\WINDOWS\purvyxc.exe
 
Joined
Sep 7, 2004
Messages
49,014
1. Download this file :

http://download.bleepingcomputer.com/sUBs/combofix.exe
http://www.techsupportforum.com/sectools/combofix.exe

2. Double click combofix.exe & follow the prompts.
3. When finished, it shall produce a log for you. Post that log and a HiJack log in your next reply

Note:
Do not mouseclick combofix's window while its running. That may cause it to stall

========================

Download http://downloads.andymanchesta.com/RemovalTools/SDFix.exe and save it to your Desktop.

Double click SDFix.exe and it will extract the files to %systemdrive%
(Drive that contains the Windows Directory, typically C:\SDFix)

Please then reboot your computer in Safe Mode by doing the following :
· Restart your computer
· After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
· Instead of Windows loading as normal, the Advanced Options Menu should appear;
· Select the first option, to run Windows in Safe Mode, then press Enter.
· Choose your usual account.
· Open the extracted SDFix folder and double click RunThis.bat to start the script.
· Type Y to begin the cleanup process.
· It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
· Press any Key and it will restart the PC.
· When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
· Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
(Report.txt will also be copied to Clipboard ready for posting back on the forum).
· Finally paste the contents of the Report.txt back on the forum with a new HijackThis log
==================

Download Superantispyware

http://www.superantispyware.com/superantispywarefreevspro.html

Install it and double-click the icon on your desktop to run it.
· It will ask if you want to update the program definitions, click Yes.
· Under Configuration and Preferences, click the Preferences button.
· Click the Scanning Control tab.
· Under Scanner Options make sure the following are checked:
o Close browsers before scanning
o Scan for tracking cookies
o Terminate memory threats before quarantining.
o Please leave the others unchecked.
o Click the Close button to leave the control center screen.
· On the main screen, under Scan for Harmful Software click Scan your computer.
· On the left check C:\Fixed Drive.
· On the right, under Complete Scan, choose Perform Complete Scan.
· Click Next to start the scan. Please be patient while it scans your computer.
· After the scan is complete a summary box will appear. Click OK.
· Make sure everything in the white box has a check next to it, then click Next.
· It will quarantine what it found and if it asks if you want to reboot, click Yes.
· To retrieve the removal information for me please do the following:
o After reboot, double-click the SUPERAntispyware icon on your desktop.
o Click Preferences. Click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o It will open in your default text editor (such as Notepad/Wordpad).
o Please highlight everything in the notepad, then right-click and choose copy.
· Click close and close again to exit the program.
· Please paste that information here for me with a new HijackThis log.
 

Baked421

Thread Starter
Joined
Jun 6, 2004
Messages
83
SDFix: Version 1.63

Mon 01/29/2007 - 20:09:46.79

Microsoft Windows XP [Version 5.1.2600]

Running From: C:\SDFix

Safe Mode:
Checking Services:

Name:
Windows Overlay Components

Path:
C:\WINDOWS\purvyxc.exe

Windows Overlay Components Deleted

Restoring Windows Registry Entries
Restoring Default Hosts File


Rebooting...

Normal Mode:
Checking Files:

Below files will be copied to Backups folder then removed:

C:\WINDOWS\system32\netstat.com - Deleted
C:\WINDOWS\system32\taskkill.com - Deleted
C:\WINDOWS\system32\unsvchosts.lzma - Deleted
C:\WINDOWS\system32\winlog.exe - Deleted
C:\WINDOWS\tcb.pmw - Deleted

Could Not Remove C:\WINDOWS\system32\svchosts.exe


ADS Check:

C:\WINDOWS\system32
No streams found.

Final Check:

Remaining Services:
------------------


Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"
"C:\\Program Files\\eDonkey2000\\edonkey2000.exe"="C:\\Program Files\\eDonkey2000\\edonkey2000.exe:*:Enabled:edonkey2000"
"C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"="C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe:*:Enabled:Yahoo! Messenger"
"C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"="C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe:*:Enabled:Yahoo! FT Server"
"C:\\Program Files\\eDonkey2000 Lite\\eDonkey2000.exe"="C:\\Program Files\\eDonkey2000 Lite\\eDonkey2000.exe:*:Enabled:eDonkey2000"
"X:\\Program Files\\Ubisoft\\Splinter Cell Pandora Tomorrow\\Pandora.exe"="X:\\Program Files\\Ubisoft\\Splinter Cell Pandora Tomorrow\\Pandora.exe:*:Enabled:pandora.exe"
"C:\\Program Files\\eMule\\emule.exe"="C:\\Program Files\\eMule\\emule.exe:*:Enabled:eMule"
"C:\\StubInstaller.exe"="C:\\StubInstaller.exe:*:Enabled:LimeWire swarmed installer"
"C:\\Program Files\\LimeWire\\LimeWire.exe"="C:\\Program Files\\LimeWire\\LimeWire.exe:*:Enabled:LimeWire"
"c:\\windows\\system32\\rlvknlg.exe"="c:\\windows\\system32\\rlvknlg.exe:*:Enabled:rlvknlg.exe"
"C:\\WINDOWS\\explorer.exe"="C:\\WINDOWS\\explorer.exe:*:Disabled:Windows Explorer"
"C:\\Program Files\\BitTorrent\\bittorrent.exe"="C:\\Program Files\\BitTorrent\\bittorrent.exe:*:Enabled:BitTorrent"


[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"


Remaining Files:
---------------
C:\WINDOWS\system32\svchosts.exe Found

Backups Folder: - C:\SDFix\backups\backups.zip


Checking For Files with Hidden Attributes :

C:\WINDOWS\system32\cmd.com
C:\WINDOWS\system32\ping.com
C:\WINDOWS\system32\regedit.com
C:\WINDOWS\system32\tasklist.com
C:\WINDOWS\system32\tracert.com
C:\WINDOWS\TWlrZQ\asappsrv.dll
C:\Documents and Settings\Mike\Local Settings\Temp\sdexe.exe
C:\Program Files\Common Files\Adobe\ESD\DLMCleanup.exe
C:\Program Files\outlook\outlook.exe
C:\WINDOWS\purvyxcA.exe
C:\WINDOWS\TWlrZQ\command.exe
C:\hiberfil.sys

Finished
 

Baked421

Thread Starter
Joined
Jun 6, 2004
Messages
83
Logfile of HijackThis v1.99.1
Scan saved at 8:21:36 PM, on 1/29/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchosts.exe
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
C:\Program Files\Digidesign\Drivers\MMERefresh.exe
C:\Program Files\MacOpener\FORMATM.EXE
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\v1201.exe
C:\WINDOWS\purvyxcA.exe
C:\Program Files\CMIntex\CMIntex.exe
C:\Program Files\MacOpener\MacName.exe
C:\Program Files\Exolon\Exolon.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Mike\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
F2 - REG:system.ini: Shell=Explorer.exe, C:\WINDOWS\system32\vfxbs.exe
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,hbefdrs.exe
O2 - BHO: AssistantLibrary - {04CDB16C-AB38-43CD-A86A-6FEB90290939} - C:\Program Files\PadsysAssistant\AssistantLibrary.dll
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Domain Helper - {B8A5DE1C-BC13-4DD2-BF00-7BE3C603F9F2} - C:\WINDOWS\system32\DomainHelper.dll
O2 - BHO: Bar888 - {C1B4DEC2-2623-438e-9CA2-C9043AB28508} - C:\PROGRA~1\COMMON~1\{30703~1\Bar888.dll
O2 - BHO: (no name) - {E336CB8C-5BDB-4EA1-8F61-3337E3B05649} - C:\Program Files\Windows NT\mevopu.dll
O3 - Toolbar: (no name) - {C004DEC2-2623-438e-9CA2-C9043AB28508} - (no file)
O3 - Toolbar: Bar888 - {C1B4DEC2-2623-438e-9CA2-C9043AB28508} - C:\PROGRA~1\COMMON~1\{30703~1\Bar888.dll
O4 - HKLM\..\Run: [MacLicense] "C:\Program Files\MacOpener\MacLic.exe"
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
O4 - HKLM\..\Run: [DigidesignMMERefresh] "C:\Program Files\Digidesign\Drivers\MMERefresh.exe"
O4 - HKLM\..\Run: [MsgCenterExe] "C:\Program Files\Common Files\Real\Update_OB\RealOneMessageCenter.exe" -osboot
O4 - HKLM\..\Run: [winlog] winlog.exe
O4 - HKLM\..\Run: [sth3a7ae] "RUNDLL32.EXE" wb50acf3.dll,n 0063a7a800000003b50acf3
O4 - HKLM\..\Run: [ms067884108109] C:\WINDOWS\ms067884108109.exe
O4 - HKLM\..\Run: [ExploreUpdSched] C:\WINDOWS\system32\swinmpea.exe GEN001
O4 - HKLM\..\Run: [ACTX1] C:\WINDOWS\v1201.exe
O4 - HKLM\..\Run: [purvyxcA] C:\WINDOWS\purvyxcA.exe
O4 - HKLM\..\RunServices: [winlog] winlog.exe
O4 - HKCU\..\Run: [CMIntex] "C:\Program Files\CMIntex\CMIntex.exe"
O4 - HKCU\..\Run: [BitTorrent] "C:\Program Files\BitTorrent\bittorrent.exe" --force_start_minimized
O4 - Startup: TA_Start.lnk = C:\WINDOWS\system32\dwdsregt.exe
O4 - Startup: Think-Adz.lnk = C:\WINDOWS\system32\swinmpea.exe
O4 - Global Startup: MacName.lnk = C:\Program Files\MacOpener\MacName.exe
O8 - Extra context menu item: E&xport to Microsoft Office Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: (no name) - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
O9 - Extra 'Tools' menuitem: Java - {4ABF810A-F11D-4169-9D5F-7D274F2270A1} - C:\WINDOWS\system32\dmonwv.dll (file missing)
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted Zone: http://click.getmirar.com (HKLM)
O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://redirect.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
O16 - DPF: {01111F00-3E00-11D2-8470-0060089874ED} (Support.com Installer) - http://softdev.adelphia.net/sdccommon/download/tgctlins.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {3FE16C08-D6A7-4133-84FC-D5BFB4F7D886} (WebGameLoader Class) - http://www.reflexive.net/rlwweb/ReflexiveWebGameLoader.cab
O16 - DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} (MJLauncherCtrl Class) - http://zone.msn.com/bingame/luxr/default/mjolauncher.cab
O16 - DPF: {8A0DCBDB-6E20-489C-9041-C1E8A0352E75} -
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab34246.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab
O16 - DPF: {E4C29FDC-F547-4219-ACFD-571F2A7A564A} - http://click.mirarsearch.com/CABUPDATES/winwcd.cab
O18 - Filter: text/html - {994D478A-45D0-4DB4-AE28-738B1E346F99} - C:\Program Files\Exolon\Exolon.dll
O20 - Winlogon Notify: RunOnceEx - C:\WINDOWS\system32\dsskcopy.dll
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\
O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Client IP-IPX - Unknown owner - C:\WINDOWS\system32\svchosts.exe" -e mc-110-12-0000137 (file missing)
O23 - Service: Digidesign MME Refresh Service (DigiRefresh) - Digidesign, A Division of Avid Technology, Inc. - C:\Program Files\Digidesign\Drivers\MMERefresh.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: MacFormatService - Unknown owner - C:\Program Files\MacOpener\FORMATM.EXE" /SERVICE (file missing)
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
 
Joined
Sep 7, 2004
Messages
49,014
You have not done the Combofix nor SUperAntiSpyware - go back to my previous post and do ALL of it!
 

Baked421

Thread Starter
Joined
Jun 6, 2004
Messages
83
"Mike" - 07-01-30 12:53:18 Service Pack 2
ComboFix 07.01.30 - Running from: "C:\Documents and Settings\Mike\Desktop"

((((((((((((((((((((((((((((((((((((((((((((( Look2Me's Log ))))))))))))))))))))))))))))))))))))))))))))))))))

REGISTRY ENTRIES REMOVED:
Windows Registry Editor Version 5.00

[HKEY_CLASSES_ROOT\clsid\{5fab2187-ee51-4780-9c01-2cf54c18ddf8}]
@=""
"IDEx"="ADDR"

[HKEY_CLASSES_ROOT\clsid\{5fab2187-ee51-4780-9c01-2cf54c18ddf8}\Implemented Categories]
@=""

[HKEY_CLASSES_ROOT\clsid\{5fab2187-ee51-4780-9c01-2cf54c18ddf8}\Implemented Categories\{00021492-0000-0000-C000-000000000046}]
@=""

[HKEY_CLASSES_ROOT\clsid\{5fab2187-ee51-4780-9c01-2cf54c18ddf8}\InprocServer32]
@="C:\\WINDOWS\\system32\\dsskcopy.dll"
"ThreadingModel"="Apartment"

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *


FILES REMOVED:

C:\WINDOWS\system32\dsskcopy.dll


Granting SeDebugPrivilege to Administrators ... successful


((((((((((((((((((((((((((((((((((((((((((((( Qoologic's Log )))))))))))))))))))))))))))))))))))))))))))))))))))



No infected Qoologic files found. Reg entries were fixed


(((((((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


C:\WINDOWS\uninstall_nmon.vbs
C:\WINDOWS\876056.exe
C:\WINDOWS\system32\bszip.dll
C:\WINDOWS\system32\cmd.com
C:\WINDOWS\system32\ping.com
C:\WINDOWS\system32\REGEDIT.com
C:\WINDOWS\system32\tasklist.com
C:\WINDOWS\system32\tpuninstall.exe
C:\WINDOWS\system32\tracert.com
C:\WINDOWS\offun.exe
C:\WINDOWS\v1201.exe
C:\DOCUME~1\LOCALS~1\Application Data\NetMon
C:\Program Files\Common Files\{30703~1
C:\Program Files\batty2
C:\Program Files\Batty2
C:\Program Files\CMFibula
C:\Program Files\cmfibula
C:\Program Files\InetGet2
C:\Program Files\Inetget2
C:\Program Files\network monitor
C:\Program Files\Network Monitor
C:\Program Files\outlook
C:\Program Files\PSCastor
C:\WINDOWS\system32\svchosts.exe
C:\Program Files\Common Files\{40703~1
C:\Program Files\CMIntex
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Purity ~ ~ ~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Folders Quarantined:
C:\qoobox\purity\DOCUME~1
C:\qoobox\purity\DOCUME~1\Mike
C:\qoobox\purity\DOCUME~1\Mike\Application Data
C:\qoobox\purity\DOCUME~1\Mike\My Documents
C:\qoobox\purity\DOCUME~1\Mike\Application Data\ASKS~1
C:\qoobox\purity\DOCUME~1\Mike\Application Data\CROSOF~1
C:\qoobox\purity\DOCUME~1\Mike\Application Data\from.txt
C:\qoobox\purity\DOCUME~1\Mike\Application Data\MANTEC~1
C:\qoobox\purity\DOCUME~1\Mike\Application Data\SSEMBL~1
C:\qoobox\purity\DOCUME~1\Mike\My Documents\from.txt
C:\qoobox\purity\DOCUME~1\Mike\My Documents\ICROSO~1.NET
C:\qoobox\purity\DOCUME~1\Mike\My Documents\YMBOLS~1
C:\qoobox\purity\Program Files\CROSOF~1.NET
C:\qoobox\purity\Program Files\CROSOF~2.NET
C:\qoobox\purity\Program Files\SEMBLY~1
C:\qoobox\purity\Program Files\Common Files\CURITY~1
C:\qoobox\purity\WINDOWS\CURITY~1
C:\qoobox\purity\WINDOWS\system32\MBOLS~1


((((((((((((((((((((((((((((((( Files Created from 2006-12-30 to 2007-01-30 ))))))))))))))))))))))))))))))))))


2007-01-30 12:55 <DIR> d-------- C:\WINDOWS\ERDNT
2007-01-29 20:05 <DIR> d-------- C:\SDFix
2007-01-29 19:54 2,560 --a------ C:\WINDOWS\system32\unsvchosts.exe
2007-01-28 20:00 <DIR> d-------- C:\DOCUME~1\Mike\Application Data\BitTorrent
2007-01-28 19:59 <DIR> d-------- C:\Program Files\BitTorrent
2007-01-28 19:46 10,344 --a------ C:\WINDOWS\system32\drivers\symlcbrd.sys
2007-01-25 14:17 3,270 --a------ C:\WINDOWS\system32\tmp.reg
2007-01-23 14:49 184,437 --a------ C:\WINDOWS\system32\swinmpea.exe
2007-01-19 17:44 <DIR> d-------- C:\Program Files\Exolon
2007-01-09 18:47 184,448 --a------ C:\WINDOWS\system32\swinmpeb.exe


(((((((((((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))))


2007-01-30 12:54 445 --a------ C:\WINDOWS\eqnej.dll
2007-01-30 12:49 1460 --a------ C:\WINDOWS\system32\sth3a7ae.sys
2007-01-30 12:49 -------- dr------- C:\Program Files\padsysassistant
2007-01-30 12:49 -------- d-------- C:\Program Files\messenger
2007-01-29 22:52 -------- d-------- C:\Program Files\Common Files\symantec shared
2007-01-28 20:00 -------- d-------- C:\Documents and Settings\Mike\Application Data\bittorrent
2007-01-28 19:32 -------- d-------- C:\Program Files\quicktime
2007-01-28 19:31 -------- d--h----- C:\Program Files\installshield installation information
2007-01-28 19:30 -------- d-------- C:\Program Files\full tilt poker.net
2007-01-26 20:08 -------- d-------- C:\Program Files\adsponsor
2007-01-25 14:50 -------- d-------- C:\Program Files\ipod
2007-01-25 14:47 -------- d-------- C:\Program Files\ea games
2007-01-23 14:49 -------- d-------- C:\Program Files\windows nt
2006-12-16 18:07 183808 --a-s---- C:\WINDOWS\ndnuninstall7_48.exe
2006-12-16 18:04 184419 --a------ C:\WINDOWS\system32\swinmped.exe
2006-12-10 17:33 1080 --a------ C:\WINDOWS\system32\winpfz32.sys
2006-12-06 20:35 919 --a------ C:\WINDOWS\system32\winpfg32.sys
2006-12-06 20:35 180309 --a------ C:\WINDOWS\system32\swinmpeg.exe
2006-11-12 09:46 62976 --a------ C:\WINDOWS\system32\sth3a7ae.dll
2006-11-12 09:46 106496 --a------ C:\WINDOWS\system32\domainhelper.dll
2006-11-04 10:14 69632 --a------ C:\WINDOWS\system32\bagcnohp.dll


(((((((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))

*Note* empty entries & legit default entries are not shown

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run]
"BitTorrent"="\"C:\\Program Files\\BitTorrent\\bittorrent.exe\" --force_start_minimized"
"ckrqt"="C:\\WINDOWS\\system32\\gvgwsl.exe reg_run"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run]
"MacLicense"="\"C:\\Program Files\\MacOpener\\MacLic.exe\""
"SoundMan"="SOUNDMAN.EXE"
"HPDJ Taskbar Utility"="C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\hpztsb07.exe"
"DigidesignMMERefresh"="\"C:\\Program Files\\Digidesign\\Drivers\\MMERefresh.exe\""
"MsgCenterExe"="\"C:\\Program Files\\Common Files\\Real\\Update_OB\\RealOneMessageCenter.exe\" -osboot"
"sth3a7ae"="\"RUNDLL32.EXE\" wb50acf3.dll,n 0063a7a800000003b50acf3"
"ms067884108109"="C:\\WINDOWS\\ms067884108109.exe"
"purvyxcA"="C:\\WINDOWS\\purvyxcA.exe"
"fnlosj"="C:\\WINDOWS\\system32\\gvgwsl.exe reg_run"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\IMAIL]
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MAPI]
"Installed"="1"
"NoChange"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MSFS]
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
"path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\Adobe Reader Speed Launch.lnk"
"backup"="C:\\WINDOWS\\pss\\Adobe Reader Speed Launch.lnkCommon Startup"
"location"="Common Startup"
"command"="C:\\PROGRA~1\\Adobe\\ACROBA~1.0\\Reader\\READER~1.EXE "
"item"="Adobe Reader Speed Launch"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^hp psc 1000 series.lnk]
"path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\hp psc 1000 series.lnk"
"backup"="C:\\WINDOWS\\pss\\hp psc 1000 series.lnkCommon Startup"
"location"="Common Startup"
"command"="C:\\PROGRA~1\\HEWLET~1\\DIGITA~1\\bin\\hpohmr08.exe "
"item"="hp psc 1000 series"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^hpoddt01.exe.lnk]
"path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\hpoddt01.exe.lnk"
"backup"="C:\\WINDOWS\\pss\\hpoddt01.exe.lnkCommon Startup"
"location"="Common Startup"
"command"="C:\\PROGRA~1\\HEWLET~1\\DIGITA~1\\bin\\hpotdd01.exe "
"item"="hpoddt01.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\dvd43]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="dvd43_tray"
"hkey"="HKLM"
"command"="C:\\Program Files\\dvd43\\dvd43_tray.exe"
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPDJ Taskbar Utility]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="hpztsb07"
"hkey"="HKLM"
"command"="C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\hpztsb07.exe"
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="iTunesHelper"
"hkey"="HKLM"
"command"="\"C:\\Program Files\\iTunes\\iTunesHelper.exe\""
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="NeroCheck"
"hkey"="HKLM"
"command"="C:\\WINDOWS\\system32\\NeroCheck.exe"
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="qttask"
"hkey"="HKLM"
"command"="\"C:\\Program Files\\QuickTime\\qttask.exe\" -atboottime"
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="jusched"
"hkey"="HKLM"
"command"="C:\\Program Files\\Java\\jre1.5.0_06\\bin\\jusched.exe"
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{04CDB16C-AB38-43CD-A86A-6FEB90290939}"=""

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\10]
Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/7927.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\11]
Source REG_SZ http://ai.pricegrabber.com/product_images/6800000-6800999/6800847_640.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\12]
Source REG_SZ http://dyn.ifilm.com/image/i/2/player/bkg_default.gif

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\13]
Source REG_SZ http://dyn.ifilm.com/image/i/2/player/play5.gif

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\14]
Source REG_SZ http://akamai.edeal.com/images/catalog1910/folder13489/img1197789.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\15]
Source REG_SZ http://thumbs.ebaystatic.com/pict/5793267101_0.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\16]
Source REG_SZ http://www.active-hardware.com/images/left-menu1.gif

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\17]
Source REG_SZ http://www.extremesportdrumming.com/Images/Banners/MTV C2G.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\18]
Source REG_SZ http://www.beatofdrum.com/vid-stills/MC-Shlomo.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\19]
Source REG_SZ http://www.beatofdrum.com/vid-stills/Rush.gif

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\2]
Source REG_SZ http://thumbs.ebaystatic.com/pict/5872880923_0.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\20]
Source REG_SZ http://www.beatofdrum.com/vid-stills/worlds-fastest.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\21]
Source REG_SZ http://www.beatofdrum.com/vid-stills/street-drummer.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\22]
Source REG_SZ http://www.beatofdrum.com/vid-stills/worlds-fastest2.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\23]
Source REG_SZ http://www.thedrummerswebsite.com/animateddrumsolo.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\24]
Source REG_SZ http://media1.break.com/girls/girl202_Kerriana1.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\26]
Source REG_SZ http://cgi.ebay.com/Pioneer-SX-7-St...QcategoryZ39789QQtcZphotoQQrdZ1QQcmdZViewItem

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\3]
Source REG_SZ http://i21.ebayimg.com/02/i/06/72/0c/2e_1_sbl.JPG

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\4]
Source REG_SZ http://media1.break.com/dnet/media/content/badcar.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\5]
Source REG_SZ http://media1.break.com/dnet/media/content/outofleague.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\6]
Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/7983.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\7]
Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/4223.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\8]
Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/8043.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\9]
Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/8535.jpg

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
"SecurityProviders"="msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll"


[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Svchost]
HTTPFilter REG_MULTI_SZ HTTPFilter\0\0
LocalService REG_MULTI_SZ Alerter\0WebClient\0LmHosts\0RemoteRegistry\0upnphost\0SSDPSRV\0\0
NetworkService REG_MULTI_SZ DnsCache\0\0
DcomLaunch REG_MULTI_SZ DcomLaunch\0TermService\0\0
rpcss REG_MULTI_SZ RpcSs\0\0
imgsvc REG_MULTI_SZ StiSvc\0\0
termsvcs REG_MULTI_SZ TermService\0\0



Contents of the 'Scheduled Tasks' folder
C:\WINDOWS\tasks\FRU Task #Hewlett-Packard#hp psc 1200 series#1146347100.job
C:\WINDOWS\tasks\XoftSpySE.job

Completion time: 07-01-30 12:57:20
 

Baked421

Thread Starter
Joined
Jun 6, 2004
Messages
83
Logfile of HijackThis v1.99.1
Scan saved at 3:59:02 PM, on 1/30/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Digidesign\Drivers\MMERefresh.exe
C:\Program Files\MacOpener\FORMATM.EXE
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\MacOpener\MacName.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Mike\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
F2 - REG:system.ini: Shell=Explorer.exe, C:\WINDOWS\system32\vfxbs.exe
F2 - REG:system.ini: UserInit=C:\WINDOWS\System32\userinit.exe,hbefdrs.exe
O4 - HKLM\..\Run: [MacLicense] "C:\Program Files\MacOpener\MacLic.exe"
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [HPDJ Taskbar Utility] C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb07.exe
O4 - HKLM\..\Run: [DigidesignMMERefresh] "C:\Program Files\Digidesign\Drivers\MMERefresh.exe"
O4 - HKLM\..\Run: [MsgCenterExe] "C:\Program Files\Common Files\Real\Update_OB\RealOneMessageCenter.exe" -osboot
O4 - HKLM\..\Run: [sth3a7ae] "RUNDLL32.EXE" wb50acf3.dll,n 0063a7a800000003b50acf3
O4 - HKLM\..\Run: [ms067884108109] C:\WINDOWS\ms067884108109.exe
O4 - HKCU\..\Run: [BitTorrent] "C:\Program Files\BitTorrent\bittorrent.exe" --force_start_minimized
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: MacName.lnk = C:\Program Files\MacOpener\MacName.exe
O8 - Extra context menu item: E&xport to Microsoft Office Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted Zone: http://click.getmirar.com (HKLM)
O15 - Trusted Zone: http://click.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://redirect.mirarsearch.com (HKLM)
O15 - Trusted Zone: http://awbeta.net-nucleus.com (HKLM)
O16 - DPF: {01111F00-3E00-11D2-8470-0060089874ED} (Support.com Installer) - http://softdev.adelphia.net/sdccommon/download/tgctlins.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {3FE16C08-D6A7-4133-84FC-D5BFB4F7D886} (WebGameLoader Class) - http://www.reflexive.net/rlwweb/ReflexiveWebGameLoader.cab
O16 - DPF: {7E980B9B-8AE5-466A-B6D6-DA8CF814E78A} (MJLauncherCtrl Class) - http://zone.msn.com/bingame/luxr/default/mjolauncher.cab
O16 - DPF: {8A0DCBDB-6E20-489C-9041-C1E8A0352E75} -
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://zone.msn.com/binFramework/v10/ZIntro.cab34246.cab
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab
O16 - DPF: {E4C29FDC-F547-4219-ACFD-571F2A7A564A} - http://click.mirarsearch.com/CABUPDATES/winwcd.cab
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\
O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Digidesign MME Refresh Service (DigiRefresh) - Digidesign, A Division of Avid Technology, Inc. - C:\Program Files\Digidesign\Drivers\MMERefresh.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: MacFormatService - Unknown owner - C:\Program Files\MacOpener\FORMATM.EXE" /SERVICE (file missing)
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
 
Joined
Sep 7, 2004
Messages
49,014
You did not post the Super log as requested - we need those things


You have no active AntiVirus!

Get the free AVG AntiVirus 7.5 install it, check for updates and run a full scan

AVG 7.5 - http://free.grisoft.com/freeweb.php/doc/2/
==========================

download http://www.mvps.org/winhelp2002/DelDomains.inf with I.E.

Right click the DelDomains.inf file and click Install, making sure Internet Explorer is closed. You won't see anything happen. Give it a minute.

Note, if you use SpywareBlaster and/or IE/Spyads, it will be necessary to re-install the protection both afford. For SpywareBlaster, run the program and re-protect all items. For IE/Spyads, run the batch file and reinstall the protection.
===========================

You may want to print this or save it to notepad as we will go to safe mode.

Fix these with HiJackThis – mark them, close IE, click fix checked

F2 - REG:system.ini: Shell=Explorer.exe, C:\WINDOWS\system32\vfxbs.exe

F2 - REG:system.ini: UserInit=C:\WINDOWS\System32\userinit.exe,hbefdrs.exe

O4 - HKLM\..\Run: [sth3a7ae] "RUNDLL32.EXE" wb50acf3.dll,n 0063a7a800000003b50acf3

O4 - HKLM\..\Run: [ms067884108109] C:\WINDOWS\ms067884108109.exe

O16 - DPF: {8A0DCBDB-6E20-489C-9041-C1E8A0352E75} –

O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab

O16 - DPF: {E4C29FDC-F547-4219-ACFD-571F2A7A564A} - http://click.mirarsearch.com/CABUPDATES/winwcd.cab

DownLoad http://www.downloads.subratam.org/KillBox.zip or
http://www.thespykiller.co.uk/files/killbox.exe

Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

C:\WINDOWS\system32\vfxbs.exe
C:\WINDOWS\System32\hbefdrs.exe
C:\WINDOWS\System32\wb50acf3.dll

Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

Not all temp files will delete and that is normal
Empty the recycle bin
Boot and post a new hijack log from normal NOT safe mode

Please give feedback on what worked/didn’t work and the current status of your system
 

Baked421

Thread Starter
Joined
Jun 6, 2004
Messages
83
SUPERAntiSpyware Scan Log
Generated 01/31/2007 at 03:15 PM

Application Version : 3.5.1016

Core Rules Database Version : 3175
Trace Rules Database Version: 1185

Scan type : Complete Scan
Total Scan Time : 00:46:04

Memory items scanned : 394
Memory threats detected : 1
Registry items scanned : 5473
Registry threats detected : 138
File items scanned : 19072
File threats detected : 280

Adware.WebNexus
C:\WINDOWS\SYSTEM32\MDGWJUE.DLL
C:\WINDOWS\SYSTEM32\MDGWJUE.DLL

Adware.Qoologic/QoolAid
[fnlosj] C:\WINDOWS\SYSTEM32\GVGWSL.EXE
C:\WINDOWS\SYSTEM32\GVGWSL.EXE
[ckrqt] C:\WINDOWS\SYSTEM32\GVGWSL.EXE
C:\DOCUMENTS AND SETTINGS\ALL USERS\START MENU\PROGRAMS\STARTUP\XDSXY.EXE

Browser Hijacker.Internet Explorer Zone Hijack
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getmirar.com
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getmirar.com\click
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getmirar.com\click#http
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\getmirar.com\click#https
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\click
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\click#http
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\click#https
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\redirect
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\redirect#http
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mirarsearch.com\redirect#https
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\net-nucleus.com
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\net-nucleus.com\awbeta
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\net-nucleus.com\awbeta#http
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\net-nucleus.com\awbeta#https

Adware.Unknown Origin
C:\PROGRAM FILES\WINDOWS MEDIA PLAYER\PODO.HTML
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#Source
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#SubscribedURL
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#FriendlyName
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#Flags
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#Position
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#CurrentState
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#OriginalStateInfo
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\0#RestoredStateInfo
C:\PROGRAM FILES\MESSENGER\MEBEZA.HTML
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#Source
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#SubscribedURL
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#FriendlyName
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#Flags
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#Position
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#CurrentState
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#OriginalStateInfo
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\Microsoft\Internet Explorer\Desktop\Components\1#RestoredStateInfo

Adware.Tracking Cookie
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][3].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][3].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][5].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][4].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][1].txt
C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
C:\Documents and Settings\LocalService\Cookies\[email protected][1].txt
C:\Documents and Settings\Mike\Cookies\[email protected][3].txt
C:\Documents and Settings\Mike\Cookies\[email protected][2].txt

Adware.BookedSpace
C:\WINDOWS\zAbstract\ASI5AFF.bsx
C:\WINDOWS\zAbstract\ASI_SPEC.bsx
C:\WINDOWS\zAbstract\bspace.html
C:\WINDOWS\zAbstract\EECH.bsx
C:\WINDOWS\zAbstract\MYGEEK3.bsx
C:\WINDOWS\zAbstract\SPZ5.bsx
C:\WINDOWS\zAbstract
HKCR\AppID\Scaggy.DLL
HKCR\AppID\Scaggy.DLL#AppID
HKCR\TypeLib\{90A52F08-64AC-4DC6-9D7D-451667029898}

Trojan.NewDotNet
HKU\.DEFAULT\Software\New.net
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\New.net
HKU\S-1-5-18\Software\New.net

Trojan.Windows Overlay Components/SysMon
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OvMon
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OvMon#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OvMon#UninstallString

Adware.IST/YourSiteBar
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/ysbactivex.dll

Adware.Mirar/NetNucleus
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/System32/WinATS.dll
HKCR\WebCamDet.WebCamTest
HKCR\WebCamDet.WebCamTest\CLSID
HKCR\WebCamDet.WebCamTest\CurVer
HKCR\WebCamDet.WebCamTest.1
HKCR\WebCamDet.WebCamTest.1\CLSID
HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}
HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}\1.0
HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}\1.0\0
HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}\1.0\0\win32
HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}\1.0\FLAGS
HKCR\TypeLib\{42298FF7-5DCD-4DFF-825A-225EEE6FF0C7}\1.0\HELPDIR
HKCR\Interface\{CE76AC70-161F-4B37-AC96-53E314C7FF95}
HKCR\Interface\{CE76AC70-161F-4B37-AC96-53E314C7FF95}\ProxyStubClsid
HKCR\Interface\{CE76AC70-161F-4B37-AC96-53E314C7FF95}\ProxyStubClsid32
HKCR\Interface\{CE76AC70-161F-4B37-AC96-53E314C7FF95}\TypeLib
HKCR\Interface\{CE76AC70-161F-4B37-AC96-53E314C7FF95}\TypeLib#Version
HKCR\Interface\{FC4BE248-2D1D-4271-8054-0385774B078C}
HKCR\Interface\{FC4BE248-2D1D-4271-8054-0385774B078C}\ProxyStubClsid
HKCR\Interface\{FC4BE248-2D1D-4271-8054-0385774B078C}\ProxyStubClsid32
HKCR\Interface\{FC4BE248-2D1D-4271-8054-0385774B078C}\TypeLib
HKCR\Interface\{FC4BE248-2D1D-4271-8054-0385774B078C}\TypeLib#Version
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8A0DCBDB-6E20-489C-9041-C1E8A0352E75}
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8A0DCBDB-6E20-489C-9041-C1E8A0352E75}\Contains
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8A0DCBDB-6E20-489C-9041-C1E8A0352E75}\Contains\Files
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8A0DCBDB-6E20-489C-9041-C1E8A0352E75}\Contains\Files#C:\WINDOWS\system32\WinATS.dll
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8A0DCBDB-6E20-489C-9041-C1E8A0352E75}\DownloadInformation
C:\WINDOWS\Downloaded Program Files\Winwcd.inf

Trojan.WinBo32/Enhance
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\System\sysuid

Adware.FullContext
C:\Program Files\PadsysAssistant\AssistantLibrary.dll
C:\Program Files\PadsysAssistant\desktop.ini
C:\Program Files\PadsysAssistant\PadsysAssistant.exe
C:\Program Files\PadsysAssistant\PadsysLibrary.sys
C:\Program Files\PadsysAssistant\PadsysLibrary2.sys
C:\Program Files\PadsysAssistant\Uninstall.exe
C:\Program Files\PadsysAssistant
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\CMFibula
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\PSDream
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\PSCastor
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\PadsysAssistant
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{04CDB16C-AB38-43CD-A86A-6FEB90290939}
C:\PROGRAM FILES\EXOLON\EXOLON.DLL

Adware.SearchClickAds
HKCR\KBBar.KBBarBand
HKCR\KBBar.KBBarBand\CLSID
HKCR\KBBar.KBBarBand\CurVer
HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}
HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}\1.0
HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}\1.0\0
HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}\1.0\0\win32
HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}\1.0\FLAGS
HKCR\TypeLib\{27A1CA0D-78CE-4E23-8A89-2C95C15954B3}\1.0\HELPDIR
HKCR\Interface\{41E74C20-8BBD-4B15-8C24-95BAC7B3BAC1}
HKCR\Interface\{41E74C20-8BBD-4B15-8C24-95BAC7B3BAC1}\ProxyStubClsid
HKCR\Interface\{41E74C20-8BBD-4B15-8C24-95BAC7B3BAC1}\ProxyStubClsid32
HKCR\Interface\{41E74C20-8BBD-4B15-8C24-95BAC7B3BAC1}\TypeLib
HKCR\Interface\{41E74C20-8BBD-4B15-8C24-95BAC7B3BAC1}\TypeLib#Version
HKCR\AppId\CFG32S.DLL
HKCR\AppId\CFG32S.DLL#AppID
HKLM\SOFTWARE\zAbstract
HKLM\SOFTWARE\zAbstract#Unique
HKLM\SOFTWARE\zAbstract#Stamp-Spawn
HKLM\SOFTWARE\zAbstract#Stamp-Update
HKLM\SOFTWARE\zAbstract#Count-Update
HKLM\SOFTWARE\zAbstract#Delay-Update
HKLM\SOFTWARE\zAbstract#Delay-EECH
HKLM\SOFTWARE\zAbstract#Delay-SPZ5
HKLM\SOFTWARE\zAbstract#Delay-ASI5AFF
HKLM\SOFTWARE\zAbstract#Delay-MYGEEK3
HKLM\SOFTWARE\zAbstract#Delay-ASI_SPEC
HKLM\SOFTWARE\zAbstract#Campaigns
HKLM\SOFTWARE\zAbstract#Receipt-EECH
HKLM\SOFTWARE\zAbstract#Data-EECH
HKLM\SOFTWARE\zAbstract#Receipt-SPZ5
HKLM\SOFTWARE\zAbstract#Data-SPZ5
HKLM\SOFTWARE\zAbstract#Receipt-ASI5AFF
HKLM\SOFTWARE\zAbstract#Data-ASI5AFF
HKLM\SOFTWARE\zAbstract#Receipt-MYGEEK3
HKLM\SOFTWARE\zAbstract#Data-MYGEEK3
HKLM\SOFTWARE\zAbstract#Receipt-ASI_SPEC
HKLM\SOFTWARE\zAbstract#Data-ASI_SPEC
HKLM\SOFTWARE\zAbstract#Receipt-MRR
HKLM\SOFTWARE\zAbstract#Last
HKLM\SOFTWARE\zAbstract#Page
HKLM\SOFTWARE\zAbstract#Stamp-EECH
HKLM\SOFTWARE\zAbstract#Count-EECH
HKLM\SOFTWARE\zAbstract#Override
HKLM\SOFTWARE\zAbstract#Receipt-UPG82
HKLM\SOFTWARE\zAbstract#Stamp-SPZ5
HKLM\SOFTWARE\zAbstract#Count-SPZ5
HKLM\SOFTWARE\zAbstract#Stamp-ASI_SPEC
HKLM\SOFTWARE\zAbstract#Count-ASI_SPEC
HKLM\SOFTWARE\zAbstract#Receipt-RK2

Adware.IPWins
HKU\S-1-5-21-299502267-790525478-725345543-1003\Software\IpWins
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IpWins
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IpWins#DisplayName
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IpWins#UninstallString

Adware.AdSponsor
C:\Program Files\AdSponsor
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\0
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\0\win32
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\FLAGS
HKCR\TypeLib\{1B8B502E-455B-4022-BE27-736D9F808A18}\1.0\HELPDIR

Unclassified.Unknown Origin/System
C:\PROGRAM FILES\COMMON FILES\MZZQ\MZZQD\MZZQC.DLL

Trojan.Update-Mcboo
C:\RECYCLER\S-1-5-18\DC1\UPDATE.EXE
C:\RECYCLER\S-1-5-18\DC2\UPDATE.EXE
C:\RECYCLER\S-1-5-18\DC3\UPDATE.EXE
C:\RECYCLER\S-1-5-18\DC4\UPDATE.EXE

Adware.ClickSpring/Yazzle
C:\SYSTEM VOLUME INFORMATION\_RESTORE{737D51B0-F8C7-49C0-B526-DE9751700F72}\RP498\A0053896.EXE

Adware.ClickSpring
C:\SYSTEM VOLUME INFORMATION\_RESTORE{737D51B0-F8C7-49C0-B526-DE9751700F72}\RP498\A0053897.EXE

Trojan.ZenoSearch
C:\WINDOWS\SYSTEM32\SWINMPEA.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{737D51B0-F8C7-49C0-B526-DE9751700F72}\RP498\A0053961.LNK
 
Joined
Sep 7, 2004
Messages
49,014
Need a new hijack log

=====================
IE - Block Third party cookies
1. Click on the Tools button on the Internet Explorer tool bar.
2. Highlight and click on Internet options at the bottom of the Tools menu.
3. Select the Privacy Tab of the Internet Options menu.
4. Select the Advanced... button at the bottom of the screen.
5. Select override automatic cookie handling button.
6. To block third party cookies select block under "Third-party cookies".
7. Select "always allow session cookies".
8. Click on the OK button at the bottom of the screen.
=====================

Run combo again and post its log
 

Baked421

Thread Starter
Joined
Jun 6, 2004
Messages
83
"Mike" - 07-01-31 17:47:41 Service Pack 2
ComboFix 07.01.30 - Running from: "C:\Documents and Settings\Mike\Desktop"

((((((((((((((((((((((((((((((((((((((((((((( Qoologic's Log )))))))))))))))))))))))))))))))))))))))))))))))))))


* * * PRE-RUN - Filepaths extracted from the Registry * * * * * * * * * * * * * * * * * * * * * *


O4 - HKCU\...\Run C:\WINDOWS\system32\gvgwsl.exe
O4 - HKLM\...\Run C:\WINDOWS\system32\gvgwsl.exe
F2 -REG:system.ini: Shell C:\WINDOWS\system32\vfxbs.exe
F2 -REG:system.ini: UserInit C:\WINDOWS\system32\hbefdrs.exe


* * * PRE-RUN - Filepaths extracted by Memory Dump * * * * * * * * * * * * * * * * * * * * * *


C:\WINDOWS\system32\mdgwjue.dll
C:\WINDOWS\system32\gvgwsl.exe
C:\WINDOWS\system32\hbefdrs.exe
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\xdsxy.exe
C:\WINDOWS\eqnej.dll
C:\WINDOWS\system32\ltvae.dat
C:\WINDOWS\system32\vfxbs.exe


* * * POST-RUN - Files in the Quarantine folder * * * * * * * * * * * * * * * * * * * * * * * * *


07-01-31 16:34 127488 xdsxy.exe.qoo
07-01-31 16:34 51712 mdgwjue.dll.qoo
07-01-31 17:45 339 eqnej.dll.qoo

DO NOT DELETE ANY FILES FROM THIS DIRECTORY UNLESS INSTRUCTED TO


(((((((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Purity ~ ~ ~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Folders Quarantined:
C:\qoobox\purity\DOCUME~1
C:\qoobox\purity\DOCUME~1\Mike
C:\qoobox\purity\DOCUME~1\Mike\Application Data
C:\qoobox\purity\DOCUME~1\Mike\My Documents
C:\qoobox\purity\DOCUME~1\Mike\Application Data\ASKS~1
C:\qoobox\purity\DOCUME~1\Mike\Application Data\CROSOF~1
C:\qoobox\purity\DOCUME~1\Mike\Application Data\from.txt
C:\qoobox\purity\DOCUME~1\Mike\Application Data\MANTEC~1
C:\qoobox\purity\DOCUME~1\Mike\Application Data\SSEMBL~1
C:\qoobox\purity\DOCUME~1\Mike\My Documents\from.txt
C:\qoobox\purity\DOCUME~1\Mike\My Documents\ICROSO~1.NET
C:\qoobox\purity\DOCUME~1\Mike\My Documents\YMBOLS~1
C:\qoobox\purity\Program Files\CROSOF~1.NET
C:\qoobox\purity\Program Files\CROSOF~2.NET
C:\qoobox\purity\Program Files\SEMBLY~1
C:\qoobox\purity\Program Files\Common Files\CURITY~1
C:\qoobox\purity\WINDOWS\CURITY~1
C:\qoobox\purity\WINDOWS\system32\MBOLS~1


((((((((((((((((((((((((((((((( Files Created from 2006-12-31 to 2007-01-31 ))))))))))))))))))))))))))))))))))


2007-01-31 18:17 51,712 --a------ C:\WINDOWS\system32\mdgwjue.dll
2007-01-31 18:17 24 --a------ C:\WINDOWS\eqnej.dll
2007-01-31 18:17 127,488 --a------ C:\WINDOWS\system32\gvgwsl.exe
2007-01-31 16:05 <DIR> d-------- C:\!KillBox
2007-01-30 17:10 <DIR> d--h----- C:\WINDOWS\PIF
2007-01-30 16:29 87,768 --a------ C:\WINDOWS\system32\S32EVNT1.DLL
2007-01-30 16:29 108,168 --a------ C:\WINDOWS\system32\drivers\SYMEVENT.SYS
2007-01-30 16:29 <DIR> d-------- C:\Program Files\Norton AntiVirus
2007-01-30 16:28 <DIR> d-------- C:\Program Files\Symantec
2007-01-30 13:21 0 --a------ C:\WINDOWS\YOURAPP.EXE
2007-01-30 13:20 0 --a------ C:\WINDOWS\system32\CMMGR32.EXE
2007-01-30 13:07 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
2007-01-30 13:07 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2007-01-30 13:07 <DIR> d-------- C:\DOCUME~1\Mike\Application Data\SUPERAntiSpyware.com
2007-01-30 13:07 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\Application Data\SUPERAntiSpyware.com
2007-01-30 12:55 <DIR> d-------- C:\WINDOWS\ERDNT
2007-01-29 20:05 <DIR> d-------- C:\SDFix
2007-01-29 19:54 2,560 --a------ C:\WINDOWS\system32\unsvchosts.exe
2007-01-28 20:00 <DIR> d-------- C:\DOCUME~1\Mike\Application Data\BitTorrent
2007-01-28 19:59 <DIR> d-------- C:\Program Files\BitTorrent
2007-01-28 19:46 10,344 --a------ C:\WINDOWS\system32\drivers\symlcbrd.sys
2007-01-25 14:17 3,270 --a------ C:\WINDOWS\system32\tmp.reg
2007-01-19 17:44 <DIR> d-------- C:\Program Files\Exolon
2007-01-09 18:47 184,448 --a------ C:\WINDOWS\system32\swinmpeb.exe


(((((((((((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))))


2007-01-30 20:34 1460 --a------ C:\WINDOWS\system32\sth3a7ae.sys
2007-01-30 17:07 -------- d-------- C:\Program Files\Common Files\symantec shared
2007-01-30 16:34 -------- d-------- C:\Documents and Settings\Mike\Application Data\symantec
2007-01-30 15:53 -------- d-------- C:\Program Files\windows nt
2007-01-30 13:07 -------- d-------- C:\Documents and Settings\Mike\Application Data\superantispyware.com
2007-01-30 12:58 -------- d-------- C:\Program Files\messenger
2007-01-28 20:00 -------- d-------- C:\Documents and Settings\Mike\Application Data\bittorrent
2007-01-28 19:32 -------- d-------- C:\Program Files\quicktime
2007-01-28 19:31 -------- d--h----- C:\Program Files\installshield installation information
2007-01-28 19:30 -------- d-------- C:\Program Files\full tilt poker.net
2007-01-25 14:50 -------- d-------- C:\Program Files\ipod
2007-01-25 14:47 -------- d-------- C:\Program Files\ea games
2006-12-16 18:07 183808 --a-s---- C:\WINDOWS\ndnuninstall7_48.exe
2006-12-16 18:04 184419 --a------ C:\WINDOWS\system32\swinmped.exe
2006-12-10 17:33 1080 --a------ C:\WINDOWS\system32\winpfz32.sys
2006-12-06 20:35 919 --a------ C:\WINDOWS\system32\winpfg32.sys
2006-12-06 20:35 180309 --a------ C:\WINDOWS\system32\swinmpeg.exe


(((((((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))

*Note* empty entries & legit default entries are not shown

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run]
"BitTorrent"="\"C:\\Program Files\\BitTorrent\\bittorrent.exe\" --force_start_minimized"
"SUPERAntiSpyware"="C:\\Program Files\\SUPERAntiSpyware\\SUPERAntiSpyware.exe"
"ckrqt"="C:\\WINDOWS\\system32\\gvgwsl.exe reg_run"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run]
"MacLicense"="\"C:\\Program Files\\MacOpener\\MacLic.exe\""
"SoundMan"="SOUNDMAN.EXE"
"HPDJ Taskbar Utility"="C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\hpztsb07.exe"
"DigidesignMMERefresh"="\"C:\\Program Files\\Digidesign\\Drivers\\MMERefresh.exe\""
"MsgCenterExe"="\"C:\\Program Files\\Common Files\\Real\\Update_OB\\RealOneMessageCenter.exe\" -osboot"
"ccApp"="\"C:\\Program Files\\Common Files\\Symantec Shared\\ccApp.exe\""
"ALUAlert"="C:\\Program Files\\Symantec\\LiveUpdate\\ALUNOTIFY.EXE"
"fnlosj"="C:\\WINDOWS\\system32\\gvgwsl.exe reg_run"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\IMAIL]
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MAPI]
"Installed"="1"
"NoChange"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\OptionalComponents\MSFS]
"Installed"="1"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
"path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\Adobe Reader Speed Launch.lnk"
"backup"="C:\\WINDOWS\\pss\\Adobe Reader Speed Launch.lnkCommon Startup"
"location"="Common Startup"
"command"="C:\\PROGRA~1\\Adobe\\ACROBA~1.0\\Reader\\READER~1.EXE "
"item"="Adobe Reader Speed Launch"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^hp psc 1000 series.lnk]
"path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\hp psc 1000 series.lnk"
"backup"="C:\\WINDOWS\\pss\\hp psc 1000 series.lnkCommon Startup"
"location"="Common Startup"
"command"="C:\\PROGRA~1\\HEWLET~1\\DIGITA~1\\bin\\hpohmr08.exe "
"item"="hp psc 1000 series"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^hpoddt01.exe.lnk]
"path"="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\hpoddt01.exe.lnk"
"backup"="C:\\WINDOWS\\pss\\hpoddt01.exe.lnkCommon Startup"
"location"="Common Startup"
"command"="C:\\PROGRA~1\\HEWLET~1\\DIGITA~1\\bin\\hpotdd01.exe "
"item"="hpoddt01.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\dvd43]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="dvd43_tray"
"hkey"="HKLM"
"command"="C:\\Program Files\\dvd43\\dvd43_tray.exe"
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPDJ Taskbar Utility]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="hpztsb07"
"hkey"="HKLM"
"command"="C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\hpztsb07.exe"
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="iTunesHelper"
"hkey"="HKLM"
"command"="\"C:\\Program Files\\iTunes\\iTunesHelper.exe\""
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="NeroCheck"
"hkey"="HKLM"
"command"="C:\\WINDOWS\\system32\\NeroCheck.exe"
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="qttask"
"hkey"="HKLM"
"command"="\"C:\\Program Files\\QuickTime\\qttask.exe\" -atboottime"
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
"key"="SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run"
"item"="jusched"
"hkey"="HKLM"
"command"="C:\\Program Files\\Java\\jre1.5.0_06\\bin\\jusched.exe"
"inimapping"="0"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"=""

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"Btn_Search"=dword:00000000
"SpecifyDefaultButtons"=dword:00000000

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer\Run]

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"Btn_Search"=dword:00000000
"SpecifyDefaultButtons"=dword:00000000

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer\Run]

[HKEY_USERS\s-1-5-18\software\microsoft\windows\currentversion\policies\explorer]
"Btn_Search"=dword:00000000
"SpecifyDefaultButtons"=dword:00000000

[HKEY_USERS\s-1-5-18\software\microsoft\windows\currentversion\policies\explorer\Run]

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\0]
Source REG_SZ http://thumbs.ebaystatic.com/pict/5872880923_0.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\1]
Source REG_SZ http://i21.ebayimg.com/02/i/06/72/0c/2e_1_sbl.JPG

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\10]
Source REG_SZ http://dyn.ifilm.com/image/i/2/player/bkg_default.gif

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\11]
Source REG_SZ http://dyn.ifilm.com/image/i/2/player/play5.gif

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\12]
Source REG_SZ http://akamai.edeal.com/images/catalog1910/folder13489/img1197789.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\13]
Source REG_SZ http://thumbs.ebaystatic.com/pict/5793267101_0.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\14]
Source REG_SZ http://www.active-hardware.com/images/left-menu1.gif

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\15]
Source REG_SZ http://www.extremesportdrumming.com/Images/Banners/MTV C2G.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\16]
Source REG_SZ http://www.beatofdrum.com/vid-stills/MC-Shlomo.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\17]
Source REG_SZ http://www.beatofdrum.com/vid-stills/Rush.gif

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\18]
Source REG_SZ http://www.beatofdrum.com/vid-stills/worlds-fastest.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\19]
Source REG_SZ http://www.beatofdrum.com/vid-stills/street-drummer.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\2]
Source REG_SZ http://media1.break.com/dnet/media/content/badcar.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\20]
Source REG_SZ http://www.beatofdrum.com/vid-stills/worlds-fastest2.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\21]
Source REG_SZ http://www.thedrummerswebsite.com/animateddrumsolo.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\22]
Source REG_SZ http://media1.break.com/girls/girl202_Kerriana1.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\24]
Source REG_SZ http://cgi.ebay.com/Pioneer-SX-7-St...QcategoryZ39789QQtcZphotoQQrdZ1QQcmdZViewItem

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\3]
Source REG_SZ http://media1.break.com/dnet/media/content/outofleague.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\4]
Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/7983.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\5]
Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/4223.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\6]
Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/8043.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\7]
Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/8535.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\8]
Source REG_SZ http://www.discountbargainshop.com/prod_images/shop/jpg/7927.jpg

[HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop\components\9]
Source REG_SZ http://ai.pricegrabber.com/product_images/6800000-6800999/6800847_640.jpg

HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
"SecurityProviders"="msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll"


[HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\Svchost]
HTTPFilter REG_MULTI_SZ HTTPFilter\0\0
LocalService REG_MULTI_SZ Alerter\0WebClient\0LmHosts\0RemoteRegistry\0upnphost\0SSDPSRV\0\0
NetworkService REG_MULTI_SZ DnsCache\0\0
DcomLaunch REG_MULTI_SZ DcomLaunch\0TermService\0\0
rpcss REG_MULTI_SZ RpcSs\0\0
imgsvc REG_MULTI_SZ StiSvc\0\0
termsvcs REG_MULTI_SZ TermService\0\0



Contents of the 'Scheduled Tasks' folder
C:\WINDOWS\tasks\FRU Task #Hewlett-Packard#hp psc 1200 series#1146347100.job
C:\WINDOWS\tasks\Norton AntiVirus - Run Full System Scan - Mike.job
C:\WINDOWS\tasks\XoftSpySE.job

Completion time: 07-01-31 18:18:25
C:\ComboFix2.txt ... 07-01-30 12:57
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Members online

Top