Damaddwebba
Thread Starter
- Joined
- Aug 14, 2006
- Messages
- 37
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 10/27/2007 at 10:21 AM
Application Version : 3.9.1008
Core Rules Database Version : 3332
Trace Rules Database Version: 1333
Scan type : Complete Scan
Total Scan Time : 01:48:47
Memory items scanned : 389
Memory threats detected : 1
Registry items scanned : 5935
Registry threats detected : 90
File items scanned : 105117
File threats detected : 212
Trojan.Downloader-LDCORE
C:\WINDOWS\SYSTEM32\LDCORE.DLL
C:\WINDOWS\SYSTEM32\LDCORE.DLL
Adware.SysMon
[plite731] C:\WINDOWS\PLITE731.EXE
C:\WINDOWS\PLITE731.EXE
Trojan.ZenoSearch
[ExploreUpdSched] C:\WINDOWS\SYSTEM32\TWINSLDQ.EXE
C:\WINDOWS\SYSTEM32\TWINSLDQ.EXE
C:\WINDOWS\system32\msnav32.ax
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\ING7E121\DQ[1].EXE
C:\WINDOWS\Prefetch\TWINSLDQ.EXE-0039728B.pf
Adware.ZenoSearch-NVON
[{BD-D0-06-60-ZN}] C:\WINDOWS\SYSTEM32\KRDSRNGS.EXE
C:\WINDOWS\SYSTEM32\KRDSRNGS.EXE
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\T0CHD001.EXE
C:\WINDOWS\SYSTEM32\DWDSRNGT.EXE
Adware.AdSponsor/ISM
HKLM\Software\Classes\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}#AppID
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\Implemented Categories
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\Implemented Categories\{00021493-0000-0000-C000-000000000046}
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\InprocServer32
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\InprocServer32#ThreadingModel
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\ProgID
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\TypeLib
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\VersionIndependentProgID
C:\PROGRAM FILES\ISM\BNDDRIVE5.DLL
HKLM\Software\Classes\CLSID\{1ED6A320-8AF3-4f06-868A-9BA95585712E}
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}#AppID
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\Implemented Categories
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\Implemented Categories\{00021493-0000-0000-C000-000000000046}
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\InprocServer32
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\InprocServer32#ThreadingModel
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\ProgID
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\TypeLib
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\VersionIndependentProgID
C:\PROGRAM FILES\ISM\BNDDRIVE7.DLL
HKLM\Software\Classes\CLSID\{8ABA9A9C-8791-4d61-8D5B-BCC9448EA573}
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}#AppID
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}\InprocServer32
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}\InprocServer32#ThreadingModel
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}\ProgID
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}\TypeLib
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}\VersionIndependentProgID
HKLM\Software\Classes\CLSID\{8FB5B012-E8CB-46cd-B6D2-ED428FAE9043}
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}#AppID
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}\InprocServer32
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}\InprocServer32#ThreadingModel
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}\ProgID
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}\TypeLib
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}\VersionIndependentProgID
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8ABA9A9C-8791-4d61-8D5B-BCC9448EA573}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8FB5B012-E8CB-46cd-B6D2-ED428FAE9043}
HKLM\Software\Microsoft\Internet Explorer\Explorer Bars\{11B97CF9-C40E-4127-801D-0FE00EB35705}
HKLM\Software\Microsoft\Internet Explorer\Explorer Bars\{1ED6A320-8AF3-4f06-868A-9BA95585712E}
HKU\.DEFAULT\Software\BndDrive
HKU\S-1-5-18\Software\BndDrive
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR.NATION\LOCAL SETTINGS\TEMP\TEMP.FR31C0\BNDDRIVE5.DLL
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR.NATION\LOCAL SETTINGS\TEMP\TEMP.FR31C0\ISMMODULE8.EXE
C:\PROGRAM FILES\ISM2\ISMPACK6.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP930\A0105099.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP930\A0105101.EXE
Adware.AdBreak
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000000-d9e3-4bc6-a0bd-3d0ca4be5271}
411Ferret Toolbar
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{12F02779-6D88-4958-8AD3-83C12D86ADC7}
Adware.AdBlaster
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2d7cb618-cc1c-4126-a7e3-f5b12d3bcf71}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e9147a0a-a866-4214-b47c-da821891240f}
AdBars BHO
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{51641ef3-8a7a-4d84-8659-b0911e947cc8}
Adware.404Search
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{53C330D6-A4AB-419B-B45D-FD4411C1FEF4}
Unclassified.Unknown Origin
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{54645654-2225-4455-44A1-9F4543D34546}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c5af2622-8c75-4dfb-9693-23ab7686a456}
Adware.Accoona
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{944864a5-3916-46e2-96a9-a2e84f3f1208}
Trojan.Downloader-FakeRX
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\Implemented Categories
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502}
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\InprocServer32
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\InprocServer32#ThreadingModel
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\ProgID
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\Programmable
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\TypeLib
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\VERSION
C:\WINDOWS\SYSTEM32\AIVSKURQ.DLL
Trojan.PBar
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ca1d1b05-9c66-11d5-a009-000103c1e50b}
Adware.Tracking Cookie
C:\Documents and Settings\administrator.nation\Cookies\[email protected][1].txt
C:\Documents and Settings\administrator.nation\Cookies\[email protected][1].txt
C:\Documents and Settings\administrator.nation\Cookies\[email protected][2].txt
C:\Documents and Settings\administrator.nation\Cookies\[email protected][2].txt
C:\Documents and Settings\administrator.nation\Cookies\[email protected][2].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][2].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][2].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][1].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][1].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][1].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][2].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][1].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][2].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\cbuckley\Cookies\[email protected][1].txt
C:\Documents and Settings\cbuckley\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][2].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][2].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][2].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
Adware.ClickSpring
HKLM\Software\ClickSpring
HKLM\Software\ClickSpring#UBWKR
Trojan.NetMon/DNSChange
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#DeviceDesc
Trojan.cmdService
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#DeviceDesc
Trojan.SpySheriff
C:\DOCUMENTS AND SETTINGS\JFARIAS\LOCAL SETTINGS\TEMP\CIASBTCO.EXE
C:\DOCUMENTS AND SETTINGS\JFARIAS\LOCAL SETTINGS\TEMP\DFEBJXHO.EXE
C:\DOCUMENTS AND SETTINGS\JFARIAS\LOCAL SETTINGS\TEMP\LPJIXFUF.EXE
C:\DOCUMENTS AND SETTINGS\JFARIAS\LOCAL SETTINGS\TEMP\NDRLWVXV.EXE
C:\DOCUMENTS AND SETTINGS\JFARIAS\QOIMMVVW.EXE
Trojan.Downloader-SysMon
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\1003.EXE
Malware.LocusSoftware Inc/BestSellerAntivirus
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\INSTALL_EN.EXE
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QTCN6DO5\INSTALL_EN[1].EXE
Trojan.Downloader-Gen/Multi-Dropper
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\LOADER.EXE
Adware.WINSHOW
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\WINSHOW.EXE
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\Y90XC7W3\WINSHOW[1].EXE
C:\WINDOWS\WINSHOW.EXE.VIR
Adware.ClickSpring/Yazzle
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\YAZZLEBUNDLE-1549.EXE
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\Y90XC7W3\YAZZLEBUNDLE-1549[1].EXE
Adware.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP929\A0105025.CFG
Trojan.FakeDrop-764
C:\WINDOWS\764.EXE
Trojan.FakeDrop-7Search
C:\WINDOWS\7SEARCH.DLL
Trojan.Unknown Origin
C:\WINDOWS\SM9OBIBMDWJRZW4\MA6CV21GXQLOTQB.VBS
C:\WINDOWS\UNINSTALL_NMON.VBS
Unclassified.Unknown Origin/System
C:\WINDOWS\SYSTEM32\ESHOPEE.EXE
Trojan.Fakespy-B
C:\WINDOWS\SYSTEM32\MSOLE32.EXE
Trojan.Downloader-Gen
C:\WINDOWS\SYSTEM32\WINPFZ32.SYS
Trace.Known Threat Sources
C:\Documents and Settings\administrator.nation\Local Settings\Temporary Internet Files\Content.IE5\4PQ7052J\pcdocanim_170x200[1].gif
Hijack log to follow.
http://www.superantispyware.com
Generated 10/27/2007 at 10:21 AM
Application Version : 3.9.1008
Core Rules Database Version : 3332
Trace Rules Database Version: 1333
Scan type : Complete Scan
Total Scan Time : 01:48:47
Memory items scanned : 389
Memory threats detected : 1
Registry items scanned : 5935
Registry threats detected : 90
File items scanned : 105117
File threats detected : 212
Trojan.Downloader-LDCORE
C:\WINDOWS\SYSTEM32\LDCORE.DLL
C:\WINDOWS\SYSTEM32\LDCORE.DLL
Adware.SysMon
[plite731] C:\WINDOWS\PLITE731.EXE
C:\WINDOWS\PLITE731.EXE
Trojan.ZenoSearch
[ExploreUpdSched] C:\WINDOWS\SYSTEM32\TWINSLDQ.EXE
C:\WINDOWS\SYSTEM32\TWINSLDQ.EXE
C:\WINDOWS\system32\msnav32.ax
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\ING7E121\DQ[1].EXE
C:\WINDOWS\Prefetch\TWINSLDQ.EXE-0039728B.pf
Adware.ZenoSearch-NVON
[{BD-D0-06-60-ZN}] C:\WINDOWS\SYSTEM32\KRDSRNGS.EXE
C:\WINDOWS\SYSTEM32\KRDSRNGS.EXE
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\T0CHD001.EXE
C:\WINDOWS\SYSTEM32\DWDSRNGT.EXE
Adware.AdSponsor/ISM
HKLM\Software\Classes\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}#AppID
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\Implemented Categories
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\Implemented Categories\{00021493-0000-0000-C000-000000000046}
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\InprocServer32
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\InprocServer32#ThreadingModel
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\ProgID
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\TypeLib
HKCR\CLSID\{11B97CF9-C40E-4127-801D-0FE00EB35705}\VersionIndependentProgID
C:\PROGRAM FILES\ISM\BNDDRIVE5.DLL
HKLM\Software\Classes\CLSID\{1ED6A320-8AF3-4f06-868A-9BA95585712E}
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}#AppID
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\Implemented Categories
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\Implemented Categories\{00021493-0000-0000-C000-000000000046}
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\InprocServer32
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\InprocServer32#ThreadingModel
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\ProgID
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\TypeLib
HKCR\CLSID\{1ED6A320-8AF3-4F06-868A-9BA95585712E}\VersionIndependentProgID
C:\PROGRAM FILES\ISM\BNDDRIVE7.DLL
HKLM\Software\Classes\CLSID\{8ABA9A9C-8791-4d61-8D5B-BCC9448EA573}
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}#AppID
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}\InprocServer32
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}\InprocServer32#ThreadingModel
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}\ProgID
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}\TypeLib
HKCR\CLSID\{8ABA9A9C-8791-4D61-8D5B-BCC9448EA573}\VersionIndependentProgID
HKLM\Software\Classes\CLSID\{8FB5B012-E8CB-46cd-B6D2-ED428FAE9043}
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}#AppID
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}\InprocServer32
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}\InprocServer32#ThreadingModel
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}\ProgID
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}\TypeLib
HKCR\CLSID\{8FB5B012-E8CB-46CD-B6D2-ED428FAE9043}\VersionIndependentProgID
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8ABA9A9C-8791-4d61-8D5B-BCC9448EA573}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8FB5B012-E8CB-46cd-B6D2-ED428FAE9043}
HKLM\Software\Microsoft\Internet Explorer\Explorer Bars\{11B97CF9-C40E-4127-801D-0FE00EB35705}
HKLM\Software\Microsoft\Internet Explorer\Explorer Bars\{1ED6A320-8AF3-4f06-868A-9BA95585712E}
HKU\.DEFAULT\Software\BndDrive
HKU\S-1-5-18\Software\BndDrive
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR.NATION\LOCAL SETTINGS\TEMP\TEMP.FR31C0\BNDDRIVE5.DLL
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR.NATION\LOCAL SETTINGS\TEMP\TEMP.FR31C0\ISMMODULE8.EXE
C:\PROGRAM FILES\ISM2\ISMPACK6.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP930\A0105099.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP930\A0105101.EXE
Adware.AdBreak
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000000-d9e3-4bc6-a0bd-3d0ca4be5271}
411Ferret Toolbar
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{12F02779-6D88-4958-8AD3-83C12D86ADC7}
Adware.AdBlaster
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2d7cb618-cc1c-4126-a7e3-f5b12d3bcf71}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e9147a0a-a866-4214-b47c-da821891240f}
AdBars BHO
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{51641ef3-8a7a-4d84-8659-b0911e947cc8}
Adware.404Search
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{53C330D6-A4AB-419B-B45D-FD4411C1FEF4}
Unclassified.Unknown Origin
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{54645654-2225-4455-44A1-9F4543D34546}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c5af2622-8c75-4dfb-9693-23ab7686a456}
Adware.Accoona
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{944864a5-3916-46e2-96a9-a2e84f3f1208}
Trojan.Downloader-FakeRX
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\Implemented Categories
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502}
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\InprocServer32
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\InprocServer32#ThreadingModel
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\ProgID
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\Programmable
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\TypeLib
HKCR\CLSID\{A6E432B4-D4C2-43B3-BF55-C364F8F7362A}\VERSION
C:\WINDOWS\SYSTEM32\AIVSKURQ.DLL
Trojan.PBar
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ca1d1b05-9c66-11d5-a009-000103c1e50b}
Adware.Tracking Cookie
C:\Documents and Settings\administrator.nation\Cookies\[email protected][1].txt
C:\Documents and Settings\administrator.nation\Cookies\[email protected][1].txt
C:\Documents and Settings\administrator.nation\Cookies\[email protected][2].txt
C:\Documents and Settings\administrator.nation\Cookies\[email protected][2].txt
C:\Documents and Settings\administrator.nation\Cookies\[email protected][2].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][2].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][2].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][1].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][1].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][1].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][2].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][1].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][2].txt
C:\Documents and Settings\aarcinas\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][2].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\abrito\Cookies\[email protected][1].txt
C:\Documents and Settings\cbuckley\Cookies\[email protected][1].txt
C:\Documents and Settings\cbuckley\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][2].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\jfarias\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][2].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][2].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][2].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][1].txt
C:\Documents and Settings\kcalhoun\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][2].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
C:\Documents and Settings\phughes\Cookies\[email protected][1].txt
Adware.ClickSpring
HKLM\Software\ClickSpring
HKLM\Software\ClickSpring#UBWKR
Trojan.NetMon/DNSChange
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#DeviceDesc
Trojan.cmdService
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#DeviceDesc
Trojan.SpySheriff
C:\DOCUMENTS AND SETTINGS\JFARIAS\LOCAL SETTINGS\TEMP\CIASBTCO.EXE
C:\DOCUMENTS AND SETTINGS\JFARIAS\LOCAL SETTINGS\TEMP\DFEBJXHO.EXE
C:\DOCUMENTS AND SETTINGS\JFARIAS\LOCAL SETTINGS\TEMP\LPJIXFUF.EXE
C:\DOCUMENTS AND SETTINGS\JFARIAS\LOCAL SETTINGS\TEMP\NDRLWVXV.EXE
C:\DOCUMENTS AND SETTINGS\JFARIAS\QOIMMVVW.EXE
Trojan.Downloader-SysMon
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\1003.EXE
Malware.LocusSoftware Inc/BestSellerAntivirus
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\INSTALL_EN.EXE
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\QTCN6DO5\INSTALL_EN[1].EXE
Trojan.Downloader-Gen/Multi-Dropper
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\LOADER.EXE
Adware.WINSHOW
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\WINSHOW.EXE
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\Y90XC7W3\WINSHOW[1].EXE
C:\WINDOWS\WINSHOW.EXE.VIR
Adware.ClickSpring/Yazzle
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMP\YAZZLEBUNDLE-1549.EXE
C:\DOCUMENTS AND SETTINGS\KCALHOUN\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\Y90XC7W3\YAZZLEBUNDLE-1549[1].EXE
Adware.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{987E0331-0F01-427C-A58A-7A2E4AABF84D}\RP929\A0105025.CFG
Trojan.FakeDrop-764
C:\WINDOWS\764.EXE
Trojan.FakeDrop-7Search
C:\WINDOWS\7SEARCH.DLL
Trojan.Unknown Origin
C:\WINDOWS\SM9OBIBMDWJRZW4\MA6CV21GXQLOTQB.VBS
C:\WINDOWS\UNINSTALL_NMON.VBS
Unclassified.Unknown Origin/System
C:\WINDOWS\SYSTEM32\ESHOPEE.EXE
Trojan.Fakespy-B
C:\WINDOWS\SYSTEM32\MSOLE32.EXE
Trojan.Downloader-Gen
C:\WINDOWS\SYSTEM32\WINPFZ32.SYS
Trace.Known Threat Sources
C:\Documents and Settings\administrator.nation\Local Settings\Temporary Internet Files\Content.IE5\4PQ7052J\pcdocanim_170x200[1].gif
Hijack log to follow.