Solved: Control Panel Missing

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

taelyra

Thread Starter
Joined
Oct 14, 2005
Messages
69
My control panel has gone missing in win xp pro, and says I don't have admin rights. Getting that misspelled popup that says I have potential spyware. The same that everyone else has been plaqued with.

When I try to run HJT, I get "An unexpected error has occurred at procedure: modMainCheckOther1Item() Error #75 - Path/File access error

Here is HJT log file:

Logfile of Trend Micro HijackThis v2.0.0 (BETA)
Scan saved at 11:51:54 AM, on 10/25/2007
Platform: Windows XP (WinNT 5.01.2600)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Eset\nod32kui.exe
C:\WINDOWS\System32\igfxtray.exe
C:\WINDOWS\System32\hkcmd.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe
C:\Program Files\dvd43\dvd43_tray.exe
C:\WINDOWS\System32\WinAvXX.exe
C:\Program Files\Eset\nod32krn.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\James\Desktop\HiJackThis_v2.exe

F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\System32\printer.exe
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe -osboot
O4 - HKLM\..\Run: [dvd43] C:\Program Files\dvd43\dvd43_tray.exe
O4 - HKLM\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
O4 - HKCU\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
O4 - Startup: system.exe
O4 - Global Startup: autorun.exe
O7 - HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://clubgames.pogo.com/online2/pogop/bejeweled2/popcaploader_v6.cab
O20 - AppInit_DLLs: sulimo.dat
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe

--
End of file - 2849 bytes
 
Joined
Feb 15, 2004
Messages
12,302
hi, welcome to TSG.


You need to get Xp SP1 asap and all other patches, you are open to
multiple threats!then after your clean you should consider upgrading to
XPSP2

http://www.microsoft.com/windowsxp/downloads/updates/sp1/default.mspx



you don't have either a firewall or an anti virus program, downlaod these from the links below and update anti vir!



Anti-vir

http://www.free-av.com/



Comodo firewall. Sign up it's free!

http://www.personalfirewall.trustix.com/


Threads on comodo!

http://www.wilderssecurity.com/forumdisplay.php?f=31





Please download
SmitfraudFix
(by S!Ri)
Extract the content (a folder named SmitfraudFix) to your Desktop.



Download AVG Anti-Spyware

http://www.ewido.net/en/


* Once you have downloaded AVG Anti-spyware, locate the icon on the desktop
and double-click it to launch the set up program.
* Once the setup is complete you will need run AVG and update the definition
files.
* On the main screen select the icon "Update" then select the "Update now"
link.
* Next select the "Start Update" button, the update will start and a
progress bar will show the updates being installed.
* Once the update has completed select the "Scanner" icon at the top of the
screen, then select the "Settings" tab.
* Once in the Settings screen click on "Recommended actions" and then select
"Delete"
* Under "Reports"
* Select "Automatically generate report after every scan"
* Un-Select "Only if threats were found"


Close AVG Anti-Spyware. Anti-spyware, Do NOT run a scan yet. We will do that
later in safe mode.






* Click here to download ATF Cleaner by Atribune and save it to your
desktop.

http://majorgeeks.com/ATF_Cleaner_d4949.html


* Double-click ATF-Cleaner.exe to run the program.
* Under Main choose: Select All
* Click the Empty Selected button.
o If you use Firefox:
+ Click Firefox at the top and choose: Select All
+ Click the Empty Selected button.
+ NOTE: If you would like to keep your saved passwords,
please click No at the prompt.
o If you use Opera:
+ Click Opera at the top and choose: Select All
+ Click the Empty Selected button.
+ NOTE: If you would like to keep your saved passwords,
please click No at the prompt.
* Click Exit on the Main menu to close the program.


* Click here for info on how to boot to safe mode if you don't already know
how.


http://support.microsoft.com/kb/315222


* Now copy these instructions to notepad and save them to your desktop. You
will need them to refer to in safe mode.


* Restart your computer into safe mode now. Perform the following steps in
safe mode:


Once in Safe Mode, open the SmitfraudFix folder again and
double-click smitfraudfix.cmd
Select option #2 - Clean by typing 2 and press "Enter"
to delete infected files.

You will be prompted: "Registry cleaning - Do you want to clean the
registry?"; answer "Yes" by typing Y and press "Enter" in order to
remove the Desktop background and clean registry keys associated with the
infection.

The tool will now check if wininet.dll is infected. You may be
prompted to replace the infected file (if found); answer "Yes" by typing
Y and press "Enter".

The tool may need to restart your computer to finish the cleaning process;
if it doesn't, please restart it into Normal Windows.

A text file will appear onscreen, with results from the cleaning process;
please copy/paste the content of that report into your next reply.

The report can also be found at the root of the system drive, usually at
C:\rapport.txt

Warning: running option #2 on a non infected computer
will remove your Desktop background
.





Run AVG Anti-Spyware!

# IMPORTANT: Do not open any other windows or programs while AVG is scanning
as it may interfere with the scanning process:
# Launch AVG Anti-spyware by double-clicking the icon on your desktop.
# Select the "Scanner" icon at the top and then the "Scan" tab then click on
"Complete System Scan".
# AVG will now begin the scanning process. Be patient this may take a little
time.
Once the scan is complete do the following:
# If you have any infections you will prompted, then select "Apply all
actions"
# Next select the "Reports" icon at the top.
# Select the "Save report as" button in the lower left hand of the screen
and save it to a text file on your system (make sure to remember where you
saved that file, this is important).
# Close AVG and reboot your system back into Normal Mode.







Note: this is a stand alone, it doesn't install to start/programmes.

Download Mwav,

http://www.spywareinfo.dk/download/mwav.exe


double click on it and it will extract to C:\kaspersky. Click
on the kaspersky folder and click on Kavupd, a black dos window will open
and it will update the programme for you, be patient it will take 5-10
minutes to download the new definitions. Once it's updated, click on
mwavscan
to launch the programme.

Use the defaults of:

Memory
startup folders
Registry
system folders
services

Choose drive , all drives and, click scan all files
and then click scan/clean. After it finishes scanning and cleaning post
the log here with a new hijack this log.

Note: this is a very thorough scanner, it might take anything up to an hour
or more, depending on how many drives you have and how badly infected your
pc is.



Highlight the portion of the scan that lists infected items and hold
CTRL + C to Copy then paste it here. The whole log with be extremely
big so there is no way to copy the whole thing. I just need the
infected items list.



Post a new hijack this, the smitfraud, the Mwav scan log and the AVg antispware log!
 

taelyra

Thread Starter
Joined
Oct 14, 2005
Messages
69
Logfile of Trend Micro HijackThis v2.0.0 (BETA)
Scan saved at 2:14:56 PM, on 10/25/2007
Platform: Windows XP (WinNT 5.01.2600)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.exe
C:\Program Files\Eset\nod32kui.exe
C:\WINDOWS\System32\igfxtray.exe
C:\WINDOWS\System32\hkcmd.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe
C:\Program Files\dvd43\dvd43_tray.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Documents and Settings\James\Start Menu\Programs\Startup\system.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Eset\nod32krn.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Kaspersky\mwavscan.com
C:\Kaspersky\kavss.exe
C:\WINDOWS\System32\notepad.exe
C:\Documents and Settings\James\Desktop\HiJackThis_v2.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\System32\printer.exe
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe -osboot
O4 - HKLM\..\Run: [dvd43] C:\Program Files\dvd43\dvd43_tray.exe
O4 - HKLM\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
O4 - Startup: system.exe
O4 - Global Startup: autorun.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://clubgames.pogo.com/online2/pogop/bejeweled2/popcaploader_v6.cab
O20 - AppInit_DLLs: sulimo.dat
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe

--
End of file - 3080 bytes
 

taelyra

Thread Starter
Joined
Oct 14, 2005
Messages
69
SmitFraudFix v2.241

Scan done at 12:53:17.51, Thu 10/25/2007
Run from C:\Documents and Settings\James\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts


192.168.200.3 ad.doubleclick.net
192.168.200.3 ad.fastclick.net
192.168.200.3 ads.fastclick.net
192.168.200.3 ar.atwola.com
192.168.200.3 atdmt.com
192.168.200.3 avp.ch
192.168.200.3 avp.com
192.168.200.3 avp.ru
192.168.200.3 awaps.net
192.168.200.3 banner.fastclick.net
192.168.200.3 banners.fastclick.net
192.168.200.3 ca.com
192.168.200.3 click.atdmt.com
192.168.200.3 clicks.atdmt.com
192.168.200.3 customer.symantec.com
192.168.200.3 dispatch.mcafee.com
192.168.200.3 download.mcafee.com
192.168.200.3 downloads-us1.kaspersky-labs.com
192.168.200.3 downloads-us2.kaspersky-labs.com
192.168.200.3 downloads-us3.kaspersky-labs.com
192.168.200.3 downloads1.kaspersky-labs.com
192.168.200.3 downloads2.kaspersky-labs.com
192.168.200.3 downloads3.kaspersky-labs.com
192.168.200.3 downloads4.kaspersky-labs.com
192.168.200.3 engine.awaps.net
192.168.200.3 f-secure.com
192.168.200.3 fastclick.net
192.168.200.3 ftp.avp.ch
192.168.200.3 ftp.downloads1.kaspersky-labs.com
192.168.200.3 ftp.downloads2.kaspersky-labs.com
192.168.200.3 ftp.downloads3.kaspersky-labs.com
192.168.200.3 ftp.f-secure.com
192.168.200.3 ftp.kasperskylab.ru
192.168.200.3 ftp.sophos.com
192.168.200.3 ids.kaspersky-labs.com
192.168.200.3 kaspersky-labs.com
192.168.200.3 kaspersky.com
192.168.200.3 liveupdate.symantec.com
192.168.200.3 liveupdate.symantecliveupdate.com
192.168.200.3 mast.mcafee.com
192.168.200.3 mcafee.com
192.168.200.3 media.fastclick.net
192.168.200.3 my-etrust.com
192.168.200.3 nai.com
192.168.200.3 networkassociates.com
192.168.200.3 norton.com
192.168.200.3 phx.corporate-ir.net
192.168.200.3 rads.mcafee.com
192.168.200.3 secure.nai.com
192.168.200.3 securityresponse.symantec.com
192.168.200.3 service1.symantec.com
192.168.200.3 sophos.com
192.168.200.3 spd.atdmt.com
192.168.200.3 symantec.com
192.168.200.3 trendmicro.com
192.168.200.3 update.symantec.com
192.168.200.3 updates.symantec.com
192.168.200.3 updates1.kaspersky-labs.com
192.168.200.3 updates2.kaspersky-labs.com
192.168.200.3 updates3.kaspersky-labs.com
192.168.200.3 updates4.kaspersky-labs.com
192.168.200.3 updates5.kaspersky-labs.com
192.168.200.3 us.mcafee.com
192.168.200.3 vil.nai.com
192.168.200.3 viruslist.com
192.168.200.3 viruslist.ru
192.168.200.3 virusscan.jotti.org
192.168.200.3 virustotal.com
192.168.200.3 www.avp.ch
192.168.200.3 www.avp.com
192.168.200.3 www.avp.ru
192.168.200.3 www.awaps.net
192.168.200.3 www.ca.com
192.168.200.3 www.f-secure.com
192.168.200.3 www.fastclick.net
192.168.200.3 www.grisoft.com
192.168.200.3 www.kaspersky-labs.com
192.168.200.3 www.kaspersky.com
192.168.200.3 www.kaspersky.ru
192.168.200.3 www.mcafee.com
192.168.200.3 www.my-etrust.com
192.168.200.3 www.nai.com
192.168.200.3 www.networkassociates.com
192.168.200.3 www.sophos.com
192.168.200.3 www.symantec.com
192.168.200.3 www.symantec.com
192.168.200.3 www.trendmicro.com
192.168.200.3 www.viruslist.com
192.168.200.3 www.viruslist.ru
192.168.200.3 www.virustotal.com
192.168.200.3 www3.ca.com

»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

C:\WINDOWS\system32\printer.exe Deleted
C:\WINDOWS\system32\vtr???.dll Deleted
C:\WINDOWS\system32\WinAvXX.exe Deleted
C:\DOCUME~1\ADMINI~1\STARTM~1\Programs\Startup\system.exe Deleted
C:\DOCUME~1\ALLUSE~1\STARTM~1\Programs\Startup\autorun.exe Deleted

»»»»»»»»»»»»»»»»»»»»»»»» DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{A91D39F8-C86C-47B8-8D29-1D21D1FD5A17}: DhcpNameServer=192.168.1.254
HKLM\SYSTEM\CS1\Services\Tcpip\..\{A91D39F8-C86C-47B8-8D29-1D21D1FD5A17}: DhcpNameServer=192.168.1.254
HKLM\SYSTEM\CS2\Services\Tcpip\..\{A91D39F8-C86C-47B8-8D29-1D21D1FD5A17}: DhcpNameServer=192.168.1.254
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» End
 

taelyra

Thread Starter
Joined
Oct 14, 2005
Messages
69
---------------------------------------------------------
AVG Anti-Spyware - Scan Report
---------------------------------------------------------

+ Created at: 1:17:46 PM 10/25/2007

+ Scan result:



HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a} -> Adware.Generic : Cleaned.
HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{c95fe080-8f5d-11d2-a20b-00aa003c157a} -> Adware.Generic : Cleaned.
HKU\S-1-5-18\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{c95fe080-8f5d-11d2-a20b-00aa003c157a} -> Adware.Generic : Error during cleaning.
C:\WINDOWS\Downloaded Program Files\popcaploader.dll -> Not-A-Virus.Downloader.Win32.PopCap.a : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.2o7 : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.2o7 : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.2o7 : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.2o7 : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.2o7 : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Adbrite : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Adbrite : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Adbrite : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Adbrite : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Adrevolver : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Advertising : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Atdmt : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Bridgetrack : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Casalemedia : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Clickhype : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Com : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Doubleclick : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Euroclick : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Fastclick : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Hitbox : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Hitbox : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Live : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Mediaplex : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Msn : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Netflame : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Pointroll : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Pro-market : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Questionmarket : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Realmedia : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Revsci : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Serving-sys : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Serving-sys : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Statcounter : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Tacoda : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Tacoda : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Tribalfusion : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Webtrends : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Yadro : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Yieldmanager : Cleaned.
C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Zedo : Cleaned.


::Report end
 

taelyra

Thread Starter
Joined
Oct 14, 2005
Messages
69
mwav scan

Thu Oct 25 13:53:34 2007 => Regvalue DisableRegistryTools Reset. This could be part of a worm!!!
 
Joined
Feb 15, 2004
Messages
12,302
have hijack this fix these entries. close all browsers and programmes before
clicking FIX.



R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\System32\printer.exe
O4 - HKLM\..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe -osboot
O4 - HKLM\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
O4 - HKCU\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
O4 - Startup: system.exe
O4 - Global Startup: autorun.exe
O20 - AppInit_DLLs: sulimo.dat




NOTE: If you have downloaded ComboFix previously please delete that
version and download it again!



Download ComboFix from
Here
or
Here
to your Desktop.

Reboot to Safe mode:

Restart your computer and begin tapping the F8 key on your keyboard just
before Windows starts to load. If done right a Windows Advanced Options menu
will appear. Select the Safe Mode option and press Enter.

Perform the following actions in Safe Mode.
  • Double click combofix.exe and follow the prompts.
  • When finished, it shall produce a log for you. Post that log and a
    HiJackthis log in your next reply
Note: Do not mouseclick combofix's window while its
running. That may cause it to stall





Download Superantispyware (SAS):

http://www.superantispyware.com/supe....html?rid=3132


Once downloaded and installed update the defintions
and then run a full system scan quarantine what it finds!


* Double-click SUPERAntiSypware.exe and use the default settings for
installation.
* An icon will be created on your desktop. Double-click that icon to launch
the program.
* If asked to update the program definitions, click "Yes". If not, update
the definitions before scanning by selecting "Check for Updates". (If you
encounter any problems while downloading the updates, manually download and
unzip them from here.)

http://www.superantispyware.com/definitions.html

* Under "Configuration and Preferences", click the Preferences button.
* Click the Scanning Control tab.
* Under Scanner Options make sure the following are checked (leave all
others unchecked):
o Close browsers before scanning.
o Scan for tracking cookies.
o Terminate memory threats before quarantining.
* Click the "Close" button to leave the control center screen.
* Back on the main screen, under "Scan for Harmful Software" click Scan your
computer.
* On the left, make sure you check C:\Fixed Drive.
* On the right, under "Complete Scan", choose Perform Complete Scan.
* Click "Next" to start the scan. Please be patient while it scans your
computer.
* After the scan is complete, a Scan Summary box will appear with
potentially harmful items that were detected. Click "OK".
* Make sure everything has a checkmark next to it and click "Next".
* A notification will appear that "Quarantine and Removal is Complete".
Click "OK" and then click the "Finish" button to return to the main menu.
* If asked if you want to reboot, click "Yes".
* To retrieve the removal information after reboot, launch SUPERAntispyware
again.
o Click Preferences, then click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
o Please copy and paste the Scan Log results in your next reply.
* Click Close to exit the program.




* Download Dr.Web CureIt to the desktop:
ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe

* Doubleclick the drweb-cureit.exe file and Allow to run the express scan
* This will scan the files currently running in memory and when something is
found,
click the yes button when it asks you if you want to cure it. This is only a
short scan.
* Once the short scan has finished, Click Options > Change settings
* Choose the "Scan"-tab, remove the mark at "Heuristic analysis".
* Back at the main window, mark the drives that you want to scan.
* Select all drives. A red dot shows which drives have been chosen.
* Click the green arrow at the right, and the scan will start.
* Click 'Yes to all' if it asks if you want to cure/move the file.
* When the scan has finished, look if you can click next icon next to the
files found: IPB Image
* If so, click it and then click the next icon right below and select Move
incurable as you'll see in next image:
IPB Image
This will move it to the %userprofile%\DoctorWeb\quarantaine-folder if it
can't be cured. (this in case if we need samples)
* After selecting, in the Dr.Web CureIt menu on top, click file and choose
save report list
* Save the report to your desktop. The report will be called DrWeb.csv
* Close Dr.Web Cureit.
* Reboot your computer!! Because it could be possible that files in use will
be moved/deleted during reboot.


post another log, the combo, super and the dr web log!
 

taelyra

Thread Starter
Joined
Oct 14, 2005
Messages
69
ComboFix 07-10-23.2 - Administrator 2007-10-25 17:28:23.1 - NTFSx86 MINIMAL
Microsoft Windows XP Professional 5.1.2600.0.1252.1.1033.18.403 [GMT -4:00]
Running from: C:\Documents and Settings\James\Desktop\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Documents and Settings\James\Application Data\inst.exe
C:\Documents and Settings\James\Start Menu\Programs\Startup\system.exe
C:\WINDOWS\system32\printer.exe
C:\WINDOWS\system32\WinAvXX.exe

.
((((((((((((((((((((((((( Files Created from 2007-09-25 to 2007-10-25 )))))))))))))))))))))))))))))))
.

2007-10-25 17:27 51,200 --a------ C:\WINDOWS\NirCmd.exe
2007-10-25 13:52 <DIR> d-------- C:\Kaspersky
2007-10-25 12:55 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Grisoft
2007-10-25 12:53 1,386 --a------ C:\WINDOWS\system32\tmp.reg
2007-10-25 12:39 <DIR> d-------- C:\Documents and Settings\James\Application Data\Grisoft
2007-10-25 12:39 10,872 --a------ C:\WINDOWS\system32\drivers\AvgAsCln.sys
2007-10-24 12:42 <DIR> d-------- C:\WINDOWS\ERUNT
2007-10-20 20:52 <DIR> d-------- C:\Documents and Settings\James\Application Data\Forte
2007-10-20 20:26 <DIR> d-------- C:\WINDOWS\system32\URTTemp
2007-10-19 13:51 <DIR> d-------- C:\Program Files\uTorrent
2007-10-19 13:51 <DIR> d-------- C:\Documents and Settings\James\Application Data\uTorrent
2007-10-18 19:38 <DIR> d-------- C:\Program Files\dvd43
2007-10-18 19:38 18,816 --a------ C:\WINDOWS\system32\drivers\dvd43llh.sys
2007-10-18 19:19 <DIR> d-------- C:\Program Files\LG Software Innovations
2007-10-18 19:19 <DIR> d-------- C:\Documents and Settings\James\Application Data\Vso
2007-10-18 19:19 47,360 --a------ C:\WINDOWS\system32\drivers\pcouffin.sys
2007-10-18 19:19 47,360 --a------ C:\Documents and Settings\James\Application Data\pcouffin.sys
2007-10-18 19:03 <DIR> d-------- C:\Program Files\Elaborate Bytes
2007-10-07 21:46 <DIR> d-------- C:\My Music
2007-10-07 21:45 <DIR> d-------- C:\Program Files\Common Files\xing shared
2007-10-07 21:44 <DIR> d-------- C:\Program Files\Real
2007-10-07 21:44 <DIR> d-------- C:\Program Files\Common Files\Real
2007-10-07 21:36 <DIR> d-------- C:\Program Files\vso
2007-10-07 21:34 <DIR> d-------- C:\Program Files\Illustrate
2007-10-07 21:34 130,048 --a------ C:\WINDOWS\system32\SpoonUninstall.exe
2007-10-07 21:34 35,132 --a------ C:\WINDOWS\system32\SpoonUninstall-dBpowerAMP Music Converter.dat
2007-10-07 21:32 <DIR> d---s---- C:\Documents and Settings\James\UserData
2007-10-07 21:30 <DIR> d-------- C:\Program Files\CyberLink
2007-10-07 21:29 306,688 --a------ C:\WINDOWS\IsUninst.exe
2007-10-07 16:19 30,976 --a------ C:\WINDOWS\rascntrl.dll
2007-10-07 16:19 23,104 --a------ C:\WINDOWS\system32\svcprmpt.dll
2007-10-07 16:19 8 --a------ C:\WINDOWS\Modemx.dll
2007-10-07 11:54 <DIR> d-------- C:\Program Files\Pogo Auto Loader
2007-10-06 20:49 <DIR> d-------- C:\Program Files\Common Files\Ahead
2007-10-06 20:49 <DIR> d-------- C:\Program Files\Ahead
2007-10-06 20:49 569,344 -ra------ C:\WINDOWS\system32\imagr5.dll
2007-10-06 20:49 544,768 -ra------ C:\WINDOWS\system32\imagx5.dll
2007-10-06 20:49 283,920 -ra------ C:\WINDOWS\system32\ImagXpr5.dll
2007-10-06 20:49 155,648 -ra------ C:\WINDOWS\system32\NeroCheck.exe
2007-10-06 20:49 89,184 --------- C:\WINDOWS\system32\drivers\imagedrv.sys
2007-10-06 20:49 38,912 -ra------ C:\WINDOWS\system32\picn20.dll
2007-10-06 20:41 <DIR> d-------- C:\WINDOWS\Sun
2007-10-06 20:24 <DIR> d-------- C:\Program Files\Java
2007-10-06 20:15 17,920 --a------ C:\WINDOWS\system32\drivers\usbehci.sys
2007-10-06 20:11 <DIR> d-------- C:\WUTemp
2007-10-06 20:11 182,880 --a------ C:\WINDOWS\system32\iuengine.dll
2007-10-06 20:11 182,880 --a--c--- C:\WINDOWS\system32\dllcache\iuengine.dll
2007-10-06 20:05 86,656 --a------ C:\WINDOWS\system32\drivers\atapi.sys
2007-10-06 20:05 86,656 --a--c--- C:\WINDOWS\system32\dllcache\atapi.sys
2007-10-06 20:05 23,680 --a------ C:\WINDOWS\system32\drivers\pciidex.sys
2007-10-06 20:05 23,680 --a--c--- C:\WINDOWS\system32\dllcache\pciidex.sys
2007-10-06 20:05 3,328 --a------ C:\WINDOWS\system32\drivers\pciide.sys
2007-10-06 20:05 3,328 --a--c--- C:\WINDOWS\system32\dllcache\pciide.sys
2007-10-06 20:04 <DIR> d--h----- C:\Program Files\InstallShield Installation Information
2007-10-06 20:04 <DIR> d-------- C:\Program Files\Common Files\InstallShield
2007-10-06 19:50 <DIR> d-------- C:\Program Files\Common Files\Java
2007-10-06 19:43 <DIR> d-------- C:\Program Files\Webshots
2007-10-06 19:43 <DIR> d-------- C:\Documents and Settings\James\Application Data\Webshots
2007-10-06 18:26 163,840 --a------ C:\WINDOWS\system32\igfxres.dll
2007-10-06 17:21 512,096 --a------ C:\WINDOWS\system32\drivers\amon.sys
2007-10-06 17:21 298,104 --a------ C:\WINDOWS\system32\imon.dll
2007-10-06 17:21 15,424 --a------ C:\WINDOWS\system32\drivers\nod32drv.sys
2007-10-06 16:27 <DIR> d-------- C:\Program Files\Intel

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2007-10-08 01:30 4,608 ----a-w C:\WINDOWS\system32\w95inf32.dll
2007-10-06 19:40 --------- d-----w C:\Program Files\microsoft frontpage
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"nod32kui"="C:\Program Files\Eset\nod32kui.exe" [2007-10-06 17:20]
"IgfxTray"="C:\WINDOWS\System32\igfxtray.exe" [2005-06-21 16:48]
"HotKeysCmds"="C:\WINDOWS\System32\hkcmd.exe" [2005-06-21 16:44]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe" [2007-09-25 01:11]
"NeroCheck"="C:\WINDOWS\system32\NeroCheck.exe" [2003-07-13 02:49]
"dvd43"="C:\Program Files\dvd43\dvd43_tray.exe" [2006-05-22 13:26]
"!AVG Anti-Spyware"="C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" [2007-06-11 05:25]


*Newly Created Service* - CATCHME
.
**************************************************************************

catchme 0.3.1232 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2007-10-25 17:29:16
Windows 5.1.2600 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2007-10-25 17:29:49
.
--- E O F ---
 

taelyra

Thread Starter
Joined
Oct 14, 2005
Messages
69
Logfile of Trend Micro HijackThis v2.0.0 (BETA)
Scan saved at 5:33:01 PM, on 10/25/2007
Platform: Windows XP (WinNT 5.01.2600)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Eset\nod32kui.exe
C:\WINDOWS\System32\igfxtray.exe
C:\WINDOWS\System32\hkcmd.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\dvd43\dvd43_tray.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Eset\nod32krn.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\James\Desktop\HiJackThis_v2.exe

O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [dvd43] C:\Program Files\dvd43\dvd43_tray.exe
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://clubgames.pogo.com/online2/pogop/bejeweled2/popcaploader_v6.cab
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe

--
End of file - 2407 bytes
 

taelyra

Thread Starter
Joined
Oct 14, 2005
Messages
69
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 10/25/2007 at 06:02 PM

Application Version : 3.9.1008

Core Rules Database Version : 3330
Trace Rules Database Version: 1331

Scan type : Complete Scan
Total Scan Time : 00:18:52

Memory items scanned : 285
Memory threats detected : 0
Registry items scanned : 3473
Registry threats detected : 0
File items scanned : 14888
File threats detected : 64

Adware.Tracking Cookie
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][1].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt
C:\Documents and Settings\James\Cookies\[email protected][2].txt

Adware.Casino Games (Golden Palace Casino)
C:\PROGRAM FILES\POGO AUTO LOADER\CASINO.EXE

Trojan.Downloader-Gen/NoMultiTask
C:\SYSTEM VOLUME INFORMATION\_RESTORE{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18\A0001799.DLL
 

taelyra

Thread Starter
Joined
Oct 14, 2005
Messages
69
backup-20071025-172310-177-system.exe;C:\Documents and Settings\James\Desktop\backups;Trojan.Fakealert.357 - read error;Deleted.;
backup-20071025-172310-336-autorun.exe;C:\Documents and Settings\James\Desktop\backups;Trojan.Fakealert.357 - read error;Deleted.;
Process.exe;C:\Documents and Settings\James\Desktop\SmitfraudFix;Tool.Prockill;Moved.;
restart.exe;C:\Documents and Settings\James\Desktop\SmitfraudFix;Tool.ShutDown.11;Deleted.;
040ZWTBA.NQF;C:\Program Files\ESET\infected;Trojan.Proxy.1739;Deleted.;
system.exe.vir;C:\qoobox\Quarantine\C\Documents and Settings\James\Start Menu\Programs\Startup;Trojan.Fakealert.357 - read error;Deleted.;
printer.exe.vir;C:\qoobox\Quarantine\C\WINDOWS\system32;Trojan.Fakealert.357 - read error;Deleted.;
WinAvXX.exe.vir;C:\qoobox\Quarantine\C\WINDOWS\system32;Trojan.Fakealert.357 - read error;Deleted.;
Process.exe;C:\SDFix\apps;Tool.Prockill;Deleted.;
A0001702.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001706.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001707.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001708.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001715.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001716.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001717.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001721.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001722.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001723.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001727.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001728.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001756.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001764.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001765.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001766.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001771.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001772.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001773.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001779.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001780.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001781.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001794.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001795.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001796.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001798.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
A0001812.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP19;Trojan.Fakealert.357 - read error;Deleted.;
A0001844.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP19;Trojan.Fakealert.357 - read error;Deleted.;
A0001845.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP19;Trojan.Fakealert.357 - read error;Deleted.;
A0001846.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP19;Trojan.Fakealert.357 - read error;Deleted.;
A0001865.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP20;Trojan.Fakealert.357 - read error;Deleted.;
A0001866.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP20;Trojan.Fakealert.357 - read error;Deleted.;
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Members online

Top