1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: Control Panel Missing

Discussion in 'Virus & Other Malware Removal' started by taelyra, Oct 25, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. taelyra

    taelyra Thread Starter

    Joined:
    Oct 14, 2005
    Messages:
    69
    My control panel has gone missing in win xp pro, and says I don't have admin rights. Getting that misspelled popup that says I have potential spyware. The same that everyone else has been plaqued with.

    When I try to run HJT, I get "An unexpected error has occurred at procedure: modMainCheckOther1Item() Error #75 - Path/File access error

    Here is HJT log file:

    Logfile of Trend Micro HijackThis v2.0.0 (BETA)
    Scan saved at 11:51:54 AM, on 10/25/2007
    Platform: Windows XP (WinNT 5.01.2600)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Eset\nod32kui.exe
    C:\WINDOWS\System32\igfxtray.exe
    C:\WINDOWS\System32\hkcmd.exe
    C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
    C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe
    C:\Program Files\dvd43\dvd43_tray.exe
    C:\WINDOWS\System32\WinAvXX.exe
    C:\Program Files\Eset\nod32krn.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Documents and Settings\James\Desktop\HiJackThis_v2.exe

    F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\System32\printer.exe
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
    O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe -osboot
    O4 - HKLM\..\Run: [dvd43] C:\Program Files\dvd43\dvd43_tray.exe
    O4 - HKLM\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
    O4 - HKCU\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
    O4 - Startup: system.exe
    O4 - Global Startup: autorun.exe
    O7 - HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://clubgames.pogo.com/online2/pogop/bejeweled2/popcaploader_v6.cab
    O20 - AppInit_DLLs: sulimo.dat
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
    O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe

    --
    End of file - 2849 bytes
     
  2. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    hi, welcome to TSG.


    You need to get Xp SP1 asap and all other patches, you are open to
    multiple threats!then after your clean you should consider upgrading to
    XPSP2

    http://www.microsoft.com/windowsxp/downloads/updates/sp1/default.mspx



    you don't have either a firewall or an anti virus program, downlaod these from the links below and update anti vir!



    Anti-vir

    http://www.free-av.com/



    Comodo firewall. Sign up it's free!

    http://www.personalfirewall.trustix.com/


    Threads on comodo!

    http://www.wilderssecurity.com/forumdisplay.php?f=31





    Please download
    SmitfraudFix
    (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.



    Download AVG Anti-Spyware

    http://www.ewido.net/en/


    * Once you have downloaded AVG Anti-spyware, locate the icon on the desktop
    and double-click it to launch the set up program.
    * Once the setup is complete you will need run AVG and update the definition
    files.
    * On the main screen select the icon "Update" then select the "Update now"
    link.
    * Next select the "Start Update" button, the update will start and a
    progress bar will show the updates being installed.
    * Once the update has completed select the "Scanner" icon at the top of the
    screen, then select the "Settings" tab.
    * Once in the Settings screen click on "Recommended actions" and then select
    "Delete"
    * Under "Reports"
    * Select "Automatically generate report after every scan"
    * Un-Select "Only if threats were found"


    Close AVG Anti-Spyware. Anti-spyware, Do NOT run a scan yet. We will do that
    later in safe mode.






    * Click here to download ATF Cleaner by Atribune and save it to your
    desktop.

    http://majorgeeks.com/ATF_Cleaner_d4949.html


    * Double-click ATF-Cleaner.exe to run the program.
    * Under Main choose: Select All
    * Click the Empty Selected button.
    o If you use Firefox:
    + Click Firefox at the top and choose: Select All
    + Click the Empty Selected button.
    + NOTE: If you would like to keep your saved passwords,
    please click No at the prompt.
    o If you use Opera:
    + Click Opera at the top and choose: Select All
    + Click the Empty Selected button.
    + NOTE: If you would like to keep your saved passwords,
    please click No at the prompt.
    * Click Exit on the Main menu to close the program.


    * Click here for info on how to boot to safe mode if you don't already know
    how.


    http://support.microsoft.com/kb/315222


    * Now copy these instructions to notepad and save them to your desktop. You
    will need them to refer to in safe mode.


    * Restart your computer into safe mode now. Perform the following steps in
    safe mode:


    Once in Safe Mode, open the SmitfraudFix folder again and
    double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter"
    to delete infected files.

    You will be prompted: "Registry cleaning - Do you want to clean the
    registry?"; answer "Yes" by typing Y and press "Enter" in order to
    remove the Desktop background and clean registry keys associated with the
    infection.

    The tool will now check if wininet.dll is infected. You may be
    prompted to replace the infected file (if found); answer "Yes" by typing
    Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process;
    if it doesn't, please restart it into Normal Windows.

    A text file will appear onscreen, with results from the cleaning process;
    please copy/paste the content of that report into your next reply.

    The report can also be found at the root of the system drive, usually at
    C:\rapport.txt

    Warning: running option #2 on a non infected computer
    will remove your Desktop background
    .





    Run AVG Anti-Spyware!

    # IMPORTANT: Do not open any other windows or programs while AVG is scanning
    as it may interfere with the scanning process:
    # Launch AVG Anti-spyware by double-clicking the icon on your desktop.
    # Select the "Scanner" icon at the top and then the "Scan" tab then click on
    "Complete System Scan".
    # AVG will now begin the scanning process. Be patient this may take a little
    time.
    Once the scan is complete do the following:
    # If you have any infections you will prompted, then select "Apply all
    actions"
    # Next select the "Reports" icon at the top.
    # Select the "Save report as" button in the lower left hand of the screen
    and save it to a text file on your system (make sure to remember where you
    saved that file, this is important).
    # Close AVG and reboot your system back into Normal Mode.







    Note: this is a stand alone, it doesn't install to start/programmes.

    Download Mwav,

    http://www.spywareinfo.dk/download/mwav.exe


    double click on it and it will extract to C:\kaspersky. Click
    on the kaspersky folder and click on Kavupd, a black dos window will open
    and it will update the programme for you, be patient it will take 5-10
    minutes to download the new definitions. Once it's updated, click on
    mwavscan
    to launch the programme.

    Use the defaults of:

    Memory
    startup folders
    Registry
    system folders
    services

    Choose drive , all drives and, click scan all files
    and then click scan/clean. After it finishes scanning and cleaning post
    the log here with a new hijack this log.

    Note: this is a very thorough scanner, it might take anything up to an hour
    or more, depending on how many drives you have and how badly infected your
    pc is.



    Highlight the portion of the scan that lists infected items and hold
    CTRL + C to Copy then paste it here. The whole log with be extremely
    big so there is no way to copy the whole thing. I just need the
    infected items list.



    Post a new hijack this, the smitfraud, the Mwav scan log and the AVg antispware log!
     
  3. taelyra

    taelyra Thread Starter

    Joined:
    Oct 14, 2005
    Messages:
    69
    Actually, I do have antivirus program on here...it's nod32
     
  4. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    ok. you need to activate it then or it won't protect you!
     
  5. taelyra

    taelyra Thread Starter

    Joined:
    Oct 14, 2005
    Messages:
    69
    Logfile of Trend Micro HijackThis v2.0.0 (BETA)
    Scan saved at 2:14:56 PM, on 10/25/2007
    Platform: Windows XP (WinNT 5.01.2600)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.exe
    C:\Program Files\Eset\nod32kui.exe
    C:\WINDOWS\System32\igfxtray.exe
    C:\WINDOWS\System32\hkcmd.exe
    C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
    C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe
    C:\Program Files\dvd43\dvd43_tray.exe
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
    C:\Documents and Settings\James\Start Menu\Programs\Startup\system.exe
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    C:\Program Files\Eset\nod32krn.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Kaspersky\mwavscan.com
    C:\Kaspersky\kavss.exe
    C:\WINDOWS\System32\notepad.exe
    C:\Documents and Settings\James\Desktop\HiJackThis_v2.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\System32\printer.exe
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
    O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe -osboot
    O4 - HKLM\..\Run: [dvd43] C:\Program Files\dvd43\dvd43_tray.exe
    O4 - HKLM\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
    O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
    O4 - HKCU\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
    O4 - Startup: system.exe
    O4 - Global Startup: autorun.exe
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://clubgames.pogo.com/online2/pogop/bejeweled2/popcaploader_v6.cab
    O20 - AppInit_DLLs: sulimo.dat
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
    O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe

    --
    End of file - 3080 bytes
     
  6. taelyra

    taelyra Thread Starter

    Joined:
    Oct 14, 2005
    Messages:
    69
    SmitFraudFix v2.241

    Scan done at 12:53:17.51, Thu 10/25/2007
    Run from C:\Documents and Settings\James\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in safe mode

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    192.168.200.3 ad.doubleclick.net
    192.168.200.3 ad.fastclick.net
    192.168.200.3 ads.fastclick.net
    192.168.200.3 ar.atwola.com
    192.168.200.3 atdmt.com
    192.168.200.3 avp.ch
    192.168.200.3 avp.com
    192.168.200.3 avp.ru
    192.168.200.3 awaps.net
    192.168.200.3 banner.fastclick.net
    192.168.200.3 banners.fastclick.net
    192.168.200.3 ca.com
    192.168.200.3 click.atdmt.com
    192.168.200.3 clicks.atdmt.com
    192.168.200.3 customer.symantec.com
    192.168.200.3 dispatch.mcafee.com
    192.168.200.3 download.mcafee.com
    192.168.200.3 downloads-us1.kaspersky-labs.com
    192.168.200.3 downloads-us2.kaspersky-labs.com
    192.168.200.3 downloads-us3.kaspersky-labs.com
    192.168.200.3 downloads1.kaspersky-labs.com
    192.168.200.3 downloads2.kaspersky-labs.com
    192.168.200.3 downloads3.kaspersky-labs.com
    192.168.200.3 downloads4.kaspersky-labs.com
    192.168.200.3 engine.awaps.net
    192.168.200.3 f-secure.com
    192.168.200.3 fastclick.net
    192.168.200.3 ftp.avp.ch
    192.168.200.3 ftp.downloads1.kaspersky-labs.com
    192.168.200.3 ftp.downloads2.kaspersky-labs.com
    192.168.200.3 ftp.downloads3.kaspersky-labs.com
    192.168.200.3 ftp.f-secure.com
    192.168.200.3 ftp.kasperskylab.ru
    192.168.200.3 ftp.sophos.com
    192.168.200.3 ids.kaspersky-labs.com
    192.168.200.3 kaspersky-labs.com
    192.168.200.3 kaspersky.com
    192.168.200.3 liveupdate.symantec.com
    192.168.200.3 liveupdate.symantecliveupdate.com
    192.168.200.3 mast.mcafee.com
    192.168.200.3 mcafee.com
    192.168.200.3 media.fastclick.net
    192.168.200.3 my-etrust.com
    192.168.200.3 nai.com
    192.168.200.3 networkassociates.com
    192.168.200.3 norton.com
    192.168.200.3 phx.corporate-ir.net
    192.168.200.3 rads.mcafee.com
    192.168.200.3 secure.nai.com
    192.168.200.3 securityresponse.symantec.com
    192.168.200.3 service1.symantec.com
    192.168.200.3 sophos.com
    192.168.200.3 spd.atdmt.com
    192.168.200.3 symantec.com
    192.168.200.3 trendmicro.com
    192.168.200.3 update.symantec.com
    192.168.200.3 updates.symantec.com
    192.168.200.3 updates1.kaspersky-labs.com
    192.168.200.3 updates2.kaspersky-labs.com
    192.168.200.3 updates3.kaspersky-labs.com
    192.168.200.3 updates4.kaspersky-labs.com
    192.168.200.3 updates5.kaspersky-labs.com
    192.168.200.3 us.mcafee.com
    192.168.200.3 vil.nai.com
    192.168.200.3 viruslist.com
    192.168.200.3 viruslist.ru
    192.168.200.3 virusscan.jotti.org
    192.168.200.3 virustotal.com
    192.168.200.3 www.avp.ch
    192.168.200.3 www.avp.com
    192.168.200.3 www.avp.ru
    192.168.200.3 www.awaps.net
    192.168.200.3 www.ca.com
    192.168.200.3 www.f-secure.com
    192.168.200.3 www.fastclick.net
    192.168.200.3 www.grisoft.com
    192.168.200.3 www.kaspersky-labs.com
    192.168.200.3 www.kaspersky.com
    192.168.200.3 www.kaspersky.ru
    192.168.200.3 www.mcafee.com
    192.168.200.3 www.my-etrust.com
    192.168.200.3 www.nai.com
    192.168.200.3 www.networkassociates.com
    192.168.200.3 www.sophos.com
    192.168.200.3 www.symantec.com
    192.168.200.3 www.symantec.com
    192.168.200.3 www.trendmicro.com
    192.168.200.3 www.viruslist.com
    192.168.200.3 www.viruslist.ru
    192.168.200.3 www.virustotal.com
    192.168.200.3 www3.ca.com

    »»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

    S!Ri's WS2Fix: LSP not Found.


    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

    C:\WINDOWS\system32\printer.exe Deleted
    C:\WINDOWS\system32\vtr???.dll Deleted
    C:\WINDOWS\system32\WinAvXX.exe Deleted
    C:\DOCUME~1\ADMINI~1\STARTM~1\Programs\Startup\system.exe Deleted
    C:\DOCUME~1\ALLUSE~1\STARTM~1\Programs\Startup\autorun.exe Deleted

    »»»»»»»»»»»»»»»»»»»»»»»» DNS

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{A91D39F8-C86C-47B8-8D29-1D21D1FD5A17}: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{A91D39F8-C86C-47B8-8D29-1D21D1FD5A17}: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{A91D39F8-C86C-47B8-8D29-1D21D1FD5A17}: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254
    HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» End
     
  7. taelyra

    taelyra Thread Starter

    Joined:
    Oct 14, 2005
    Messages:
    69
    ---------------------------------------------------------
    AVG Anti-Spyware - Scan Report
    ---------------------------------------------------------

    + Created at: 1:17:46 PM 10/25/2007

    + Scan result:



    HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a} -> Adware.Generic : Cleaned.
    HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{c95fe080-8f5d-11d2-a20b-00aa003c157a} -> Adware.Generic : Cleaned.
    HKU\S-1-5-18\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{c95fe080-8f5d-11d2-a20b-00aa003c157a} -> Adware.Generic : Error during cleaning.
    C:\WINDOWS\Downloaded Program Files\popcaploader.dll -> Not-A-Virus.Downloader.Win32.PopCap.a : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.2o7 : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.2o7 : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.2o7 : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.2o7 : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.2o7 : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Adbrite : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Adbrite : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Adbrite : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Adbrite : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Adrevolver : Cleaned.
    C:\Documents and Settings\James\Cookies\jame[email protected][1].txt -> TrackingCookie.Advertising : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Atdmt : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Bridgetrack : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Casalemedia : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Clickhype : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Com : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Doubleclick : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Euroclick : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Fastclick : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Hitbox : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Hitbox : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Live : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Mediaplex : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Msn : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Netflame : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Pointroll : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Pro-market : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Questionmarket : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Realmedia : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Revsci : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Serving-sys : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Serving-sys : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Statcounter : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Tacoda : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Tacoda : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Tribalfusion : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][2].txt -> TrackingCookie.Webtrends : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Yadro : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Yieldmanager : Cleaned.
    C:\Documents and Settings\James\Cookies\[email protected][1].txt -> TrackingCookie.Zedo : Cleaned.


    ::Report end
     
  8. taelyra

    taelyra Thread Starter

    Joined:
    Oct 14, 2005
    Messages:
    69
    mwav scan

    Thu Oct 25 13:53:34 2007 => Regvalue DisableRegistryTools Reset. This could be part of a worm!!!
     
  9. taelyra

    taelyra Thread Starter

    Joined:
    Oct 14, 2005
    Messages:
    69
    still need help pls
     
  10. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    have hijack this fix these entries. close all browsers and programmes before
    clicking FIX.



    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    F2 - REG:system.ini: Shell=Explorer.exe C:\WINDOWS\System32\printer.exe
    O4 - HKLM\..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\evntsvc.exe -osboot
    O4 - HKLM\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
    O4 - HKCU\..\Run: [WinAVX] C:\WINDOWS\System32\WinAvXX.exe
    O4 - Startup: system.exe
    O4 - Global Startup: autorun.exe
    O20 - AppInit_DLLs: sulimo.dat




    NOTE: If you have downloaded ComboFix previously please delete that
    version and download it again!



    Download ComboFix from
    Here
    or
    Here
    to your Desktop.

    Reboot to Safe mode:

    Restart your computer and begin tapping the F8 key on your keyboard just
    before Windows starts to load. If done right a Windows Advanced Options menu
    will appear. Select the Safe Mode option and press Enter.

    Perform the following actions in Safe Mode.
    • Double click combofix.exe and follow the prompts.
    • When finished, it shall produce a log for you. Post that log and a
      HiJackthis log in your next reply
    Note: Do not mouseclick combofix's window while its
    running. That may cause it to stall





    Download Superantispyware (SAS):

    http://www.superantispyware.com/supe....html?rid=3132


    Once downloaded and installed update the defintions
    and then run a full system scan quarantine what it finds!


    * Double-click SUPERAntiSypware.exe and use the default settings for
    installation.
    * An icon will be created on your desktop. Double-click that icon to launch
    the program.
    * If asked to update the program definitions, click "Yes". If not, update
    the definitions before scanning by selecting "Check for Updates". (If you
    encounter any problems while downloading the updates, manually download and
    unzip them from here.)

    http://www.superantispyware.com/definitions.html

    * Under "Configuration and Preferences", click the Preferences button.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all
    others unchecked):
    o Close browsers before scanning.
    o Scan for tracking cookies.
    o Terminate memory threats before quarantining.
    * Click the "Close" button to leave the control center screen.
    * Back on the main screen, under "Scan for Harmful Software" click Scan your
    computer.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, under "Complete Scan", choose Perform Complete Scan.
    * Click "Next" to start the scan. Please be patient while it scans your
    computer.
    * After the scan is complete, a Scan Summary box will appear with
    potentially harmful items that were detected. Click "OK".
    * Make sure everything has a checkmark next to it and click "Next".
    * A notification will appear that "Quarantine and Removal is Complete".
    Click "OK" and then click the "Finish" button to return to the main menu.
    * If asked if you want to reboot, click "Yes".
    * To retrieve the removal information after reboot, launch SUPERAntispyware
    again.
    o Click Preferences, then click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o If there are several logs, click the current dated log and press View log.
    A text file will open in your default text editor.
    o Please copy and paste the Scan Log results in your next reply.
    * Click Close to exit the program.




    * Download Dr.Web CureIt to the desktop:
    ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe

    * Doubleclick the drweb-cureit.exe file and Allow to run the express scan
    * This will scan the files currently running in memory and when something is
    found,
    click the yes button when it asks you if you want to cure it. This is only a
    short scan.
    * Once the short scan has finished, Click Options > Change settings
    * Choose the "Scan"-tab, remove the mark at "Heuristic analysis".
    * Back at the main window, mark the drives that you want to scan.
    * Select all drives. A red dot shows which drives have been chosen.
    * Click the green arrow at the right, and the scan will start.
    * Click 'Yes to all' if it asks if you want to cure/move the file.
    * When the scan has finished, look if you can click next icon next to the
    files found: IPB Image
    * If so, click it and then click the next icon right below and select Move
    incurable as you'll see in next image:
    IPB Image
    This will move it to the %userprofile%\DoctorWeb\quarantaine-folder if it
    can't be cured. (this in case if we need samples)
    * After selecting, in the Dr.Web CureIt menu on top, click file and choose
    save report list
    * Save the report to your desktop. The report will be called DrWeb.csv
    * Close Dr.Web Cureit.
    * Reboot your computer!! Because it could be possible that files in use will
    be moved/deleted during reboot.


    post another log, the combo, super and the dr web log!
     
  11. taelyra

    taelyra Thread Starter

    Joined:
    Oct 14, 2005
    Messages:
    69
    ComboFix 07-10-23.2 - Administrator 2007-10-25 17:28:23.1 - NTFSx86 MINIMAL
    Microsoft Windows XP Professional 5.1.2600.0.1252.1.1033.18.403 [GMT -4:00]
    Running from: C:\Documents and Settings\James\Desktop\ComboFix.exe
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\Documents and Settings\James\Application Data\inst.exe
    C:\Documents and Settings\James\Start Menu\Programs\Startup\system.exe
    C:\WINDOWS\system32\printer.exe
    C:\WINDOWS\system32\WinAvXX.exe

    .
    ((((((((((((((((((((((((( Files Created from 2007-09-25 to 2007-10-25 )))))))))))))))))))))))))))))))
    .

    2007-10-25 17:27 51,200 --a------ C:\WINDOWS\NirCmd.exe
    2007-10-25 13:52 <DIR> d-------- C:\Kaspersky
    2007-10-25 12:55 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Grisoft
    2007-10-25 12:53 1,386 --a------ C:\WINDOWS\system32\tmp.reg
    2007-10-25 12:39 <DIR> d-------- C:\Documents and Settings\James\Application Data\Grisoft
    2007-10-25 12:39 10,872 --a------ C:\WINDOWS\system32\drivers\AvgAsCln.sys
    2007-10-24 12:42 <DIR> d-------- C:\WINDOWS\ERUNT
    2007-10-20 20:52 <DIR> d-------- C:\Documents and Settings\James\Application Data\Forte
    2007-10-20 20:26 <DIR> d-------- C:\WINDOWS\system32\URTTemp
    2007-10-19 13:51 <DIR> d-------- C:\Program Files\uTorrent
    2007-10-19 13:51 <DIR> d-------- C:\Documents and Settings\James\Application Data\uTorrent
    2007-10-18 19:38 <DIR> d-------- C:\Program Files\dvd43
    2007-10-18 19:38 18,816 --a------ C:\WINDOWS\system32\drivers\dvd43llh.sys
    2007-10-18 19:19 <DIR> d-------- C:\Program Files\LG Software Innovations
    2007-10-18 19:19 <DIR> d-------- C:\Documents and Settings\James\Application Data\Vso
    2007-10-18 19:19 47,360 --a------ C:\WINDOWS\system32\drivers\pcouffin.sys
    2007-10-18 19:19 47,360 --a------ C:\Documents and Settings\James\Application Data\pcouffin.sys
    2007-10-18 19:03 <DIR> d-------- C:\Program Files\Elaborate Bytes
    2007-10-07 21:46 <DIR> d-------- C:\My Music
    2007-10-07 21:45 <DIR> d-------- C:\Program Files\Common Files\xing shared
    2007-10-07 21:44 <DIR> d-------- C:\Program Files\Real
    2007-10-07 21:44 <DIR> d-------- C:\Program Files\Common Files\Real
    2007-10-07 21:36 <DIR> d-------- C:\Program Files\vso
    2007-10-07 21:34 <DIR> d-------- C:\Program Files\Illustrate
    2007-10-07 21:34 130,048 --a------ C:\WINDOWS\system32\SpoonUninstall.exe
    2007-10-07 21:34 35,132 --a------ C:\WINDOWS\system32\SpoonUninstall-dBpowerAMP Music Converter.dat
    2007-10-07 21:32 <DIR> d---s---- C:\Documents and Settings\James\UserData
    2007-10-07 21:30 <DIR> d-------- C:\Program Files\CyberLink
    2007-10-07 21:29 306,688 --a------ C:\WINDOWS\IsUninst.exe
    2007-10-07 16:19 30,976 --a------ C:\WINDOWS\rascntrl.dll
    2007-10-07 16:19 23,104 --a------ C:\WINDOWS\system32\svcprmpt.dll
    2007-10-07 16:19 8 --a------ C:\WINDOWS\Modemx.dll
    2007-10-07 11:54 <DIR> d-------- C:\Program Files\Pogo Auto Loader
    2007-10-06 20:49 <DIR> d-------- C:\Program Files\Common Files\Ahead
    2007-10-06 20:49 <DIR> d-------- C:\Program Files\Ahead
    2007-10-06 20:49 569,344 -ra------ C:\WINDOWS\system32\imagr5.dll
    2007-10-06 20:49 544,768 -ra------ C:\WINDOWS\system32\imagx5.dll
    2007-10-06 20:49 283,920 -ra------ C:\WINDOWS\system32\ImagXpr5.dll
    2007-10-06 20:49 155,648 -ra------ C:\WINDOWS\system32\NeroCheck.exe
    2007-10-06 20:49 89,184 --------- C:\WINDOWS\system32\drivers\imagedrv.sys
    2007-10-06 20:49 38,912 -ra------ C:\WINDOWS\system32\picn20.dll
    2007-10-06 20:41 <DIR> d-------- C:\WINDOWS\Sun
    2007-10-06 20:24 <DIR> d-------- C:\Program Files\Java
    2007-10-06 20:15 17,920 --a------ C:\WINDOWS\system32\drivers\usbehci.sys
    2007-10-06 20:11 <DIR> d-------- C:\WUTemp
    2007-10-06 20:11 182,880 --a------ C:\WINDOWS\system32\iuengine.dll
    2007-10-06 20:11 182,880 --a--c--- C:\WINDOWS\system32\dllcache\iuengine.dll
    2007-10-06 20:05 86,656 --a------ C:\WINDOWS\system32\drivers\atapi.sys
    2007-10-06 20:05 86,656 --a--c--- C:\WINDOWS\system32\dllcache\atapi.sys
    2007-10-06 20:05 23,680 --a------ C:\WINDOWS\system32\drivers\pciidex.sys
    2007-10-06 20:05 23,680 --a--c--- C:\WINDOWS\system32\dllcache\pciidex.sys
    2007-10-06 20:05 3,328 --a------ C:\WINDOWS\system32\drivers\pciide.sys
    2007-10-06 20:05 3,328 --a--c--- C:\WINDOWS\system32\dllcache\pciide.sys
    2007-10-06 20:04 <DIR> d--h----- C:\Program Files\InstallShield Installation Information
    2007-10-06 20:04 <DIR> d-------- C:\Program Files\Common Files\InstallShield
    2007-10-06 19:50 <DIR> d-------- C:\Program Files\Common Files\Java
    2007-10-06 19:43 <DIR> d-------- C:\Program Files\Webshots
    2007-10-06 19:43 <DIR> d-------- C:\Documents and Settings\James\Application Data\Webshots
    2007-10-06 18:26 163,840 --a------ C:\WINDOWS\system32\igfxres.dll
    2007-10-06 17:21 512,096 --a------ C:\WINDOWS\system32\drivers\amon.sys
    2007-10-06 17:21 298,104 --a------ C:\WINDOWS\system32\imon.dll
    2007-10-06 17:21 15,424 --a------ C:\WINDOWS\system32\drivers\nod32drv.sys
    2007-10-06 16:27 <DIR> d-------- C:\Program Files\Intel

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2007-10-08 01:30 4,608 ----a-w C:\WINDOWS\system32\w95inf32.dll
    2007-10-06 19:40 --------- d-----w C:\Program Files\microsoft frontpage
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "nod32kui"="C:\Program Files\Eset\nod32kui.exe" [2007-10-06 17:20]
    "IgfxTray"="C:\WINDOWS\System32\igfxtray.exe" [2005-06-21 16:48]
    "HotKeysCmds"="C:\WINDOWS\System32\hkcmd.exe" [2005-06-21 16:44]
    "SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe" [2007-09-25 01:11]
    "NeroCheck"="C:\WINDOWS\system32\NeroCheck.exe" [2003-07-13 02:49]
    "dvd43"="C:\Program Files\dvd43\dvd43_tray.exe" [2006-05-22 13:26]
    "!AVG Anti-Spyware"="C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" [2007-06-11 05:25]


    *Newly Created Service* - CATCHME
    .
    **************************************************************************

    catchme 0.3.1232 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-10-25 17:29:16
    Windows 5.1.2600 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Completion time: 2007-10-25 17:29:49
    .
    --- E O F ---
     
  12. taelyra

    taelyra Thread Starter

    Joined:
    Oct 14, 2005
    Messages:
    69
    Logfile of Trend Micro HijackThis v2.0.0 (BETA)
    Scan saved at 5:33:01 PM, on 10/25/2007
    Platform: Windows XP (WinNT 5.01.2600)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Eset\nod32kui.exe
    C:\WINDOWS\System32\igfxtray.exe
    C:\WINDOWS\System32\hkcmd.exe
    C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
    C:\Program Files\dvd43\dvd43_tray.exe
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
    C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    C:\Program Files\Eset\nod32krn.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Documents and Settings\James\Desktop\HiJackThis_v2.exe

    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
    O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [dvd43] C:\Program Files\dvd43\dvd43_tray.exe
    O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://clubgames.pogo.com/online2/pogop/bejeweled2/popcaploader_v6.cab
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
    O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
    O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe

    --
    End of file - 2407 bytes
     
  13. taelyra

    taelyra Thread Starter

    Joined:
    Oct 14, 2005
    Messages:
    69
    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 10/25/2007 at 06:02 PM

    Application Version : 3.9.1008

    Core Rules Database Version : 3330
    Trace Rules Database Version: 1331

    Scan type : Complete Scan
    Total Scan Time : 00:18:52

    Memory items scanned : 285
    Memory threats detected : 0
    Registry items scanned : 3473
    Registry threats detected : 0
    File items scanned : 14888
    File threats detected : 64

    Adware.Tracking Cookie
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][1].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt
    C:\Documents and Settings\James\Cookies\[email protected][2].txt

    Adware.Casino Games (Golden Palace Casino)
    C:\PROGRAM FILES\POGO AUTO LOADER\CASINO.EXE

    Trojan.Downloader-Gen/NoMultiTask
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18\A0001799.DLL
     
  14. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    Can you post the Dr web log?

    How's the computer running now any better?
     
  15. taelyra

    taelyra Thread Starter

    Joined:
    Oct 14, 2005
    Messages:
    69
    backup-20071025-172310-177-system.exe;C:\Documents and Settings\James\Desktop\backups;Trojan.Fakealert.357 - read error;Deleted.;
    backup-20071025-172310-336-autorun.exe;C:\Documents and Settings\James\Desktop\backups;Trojan.Fakealert.357 - read error;Deleted.;
    Process.exe;C:\Documents and Settings\James\Desktop\SmitfraudFix;Tool.Prockill;Moved.;
    restart.exe;C:\Documents and Settings\James\Desktop\SmitfraudFix;Tool.ShutDown.11;Deleted.;
    040ZWTBA.NQF;C:\Program Files\ESET\infected;Trojan.Proxy.1739;Deleted.;
    system.exe.vir;C:\qoobox\Quarantine\C\Documents and Settings\James\Start Menu\Programs\Startup;Trojan.Fakealert.357 - read error;Deleted.;
    printer.exe.vir;C:\qoobox\Quarantine\C\WINDOWS\system32;Trojan.Fakealert.357 - read error;Deleted.;
    WinAvXX.exe.vir;C:\qoobox\Quarantine\C\WINDOWS\system32;Trojan.Fakealert.357 - read error;Deleted.;
    Process.exe;C:\SDFix\apps;Tool.Prockill;Deleted.;
    A0001702.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001706.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001707.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001708.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001715.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001716.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001717.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001721.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001722.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001723.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001727.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001728.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001756.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001764.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001765.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001766.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001771.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001772.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001773.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001779.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001780.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001781.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001794.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001795.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001796.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001798.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP18;Trojan.Fakealert.357 - read error;Deleted.;
    A0001812.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP19;Trojan.Fakealert.357 - read error;Deleted.;
    A0001844.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP19;Trojan.Fakealert.357 - read error;Deleted.;
    A0001845.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP19;Trojan.Fakealert.357 - read error;Deleted.;
    A0001846.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP19;Trojan.Fakealert.357 - read error;Deleted.;
    A0001865.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP20;Trojan.Fakealert.357 - read error;Deleted.;
    A0001866.exe;C:\System Volume Information\_restore{1A1D6483-E714-41DE-8748-EE438E6B5609}\RP20;Trojan.Fakealert.357 - read error;Deleted.;
     
  16. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/643319

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice