1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

"System Alert: [email protected]"

Discussion in 'Virus & Other Malware Removal' started by alexant, Feb 4, 2007.

Thread Status:
Not open for further replies.
Advertisement
  1. alexant

    alexant Thread Starter

    Joined:
    Feb 4, 2007
    Messages:
    2
    I am getting a yellow triangle with a pop-up balloon with "System Alert: [email protected]". I found another thread where you helped to remove it, and did what was recommended: installed HiJack This and performed the scan. Below is the log. I hope you can help me remove it too. My computer is Dell Dimension 2400 with Windows XT Home edition.
    Thanks in advance

    PS: While writing this I received another triangle with "System Alert: Malvware threats" that informs that my computer is infected with a back door Trojan ... and asked to click on it to download removal software. I suspect it is related to the original one.

    Logfile of HijackThis v1.99.1
    Scan saved at 2:52:05 PM, on 2/4/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0011)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
    C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
    C:\Program Files\Common Files\Symantec Shared\DJSNETCN.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Yahoo!\NAV\navapsvc.exe
    C:\Program Files\Yahoo!\NAV\IWP\NPFMntor.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\SiteAdvisor\6009\SAService.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Video ActiveX Object\pmsngr.exe
    C:\PROGRA~1\Yahoo!\YOP\yop.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\Program Files\SiteAdvisor\6009\SiteAdv.exe
    C:\Program Files\Video ActiveX Object\pmmon.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Microsoft Office\Office\1033\msoffice.exe
    C:\PROGRA~1\Yahoo!\browser\ycommon.exe
    C:\PROGRA~1\Yahoo!\YOP\secstat.exe
    C:\Program Files\Common Files\Symantec Shared\NMain.exe
    C:\Program Files\Common Files\Symantec Shared\Security Console\NSCSRVCE.EXE
    C:\Program Files\Common Files\Symantec Shared\ccLgView.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\WINDOWS\system32\msiexec.exe
    C:\Program Files\Hijackthis\HijackThis.exe
    C:\Program Files\Messenger\msmsgs.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll
    O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {089FD14D-132B-48FC-8861-0048AE113215} - C:\Program Files\SiteAdvisor\6009\SiteAdv.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: (no name) - {67982BB7-0F95-44C5-92DC-E3AF3DC19D6D} - C:\Program Files\Video ActiveX Object\isaddon.dll (file missing)
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O2 - BHO: NAV Helper - {A8F38D8D-E480-4D52-B7A2-731BB6995FDD} - C:\Program Files\Yahoo!\NAV\NavShExt.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
    O2 - BHO: FlashFXP Helper for Internet Explorer - {E5A1691B-D188-4419-AD02-90002030B8EE} - C:\PROGRA~1\FlashFXP\IEFlash.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll
    O3 - Toolbar: Nina's Toolbar Toolbar - {ee590fea-45f1-4b4a-ab90-eb7c8ceb5204} - C:\Program Files\Nina's_Toolbar\tbNin1.dll
    O3 - Toolbar: McAfee SiteAdvisor - {0BF43445-2F28-4351-9252-17FE6E806AA0} - C:\Program Files\SiteAdvisor\6009\SiteAdv.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
    O4 - HKLM\..\Run: [YOP] C:\PROGRA~1\Yahoo!\YOP\yop.exe /autostart
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [SiteAdvisor] C:\Program Files\SiteAdvisor\6009\SiteAdv.exe
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\RunServices: [DJSNetCN] C:\Program Files\Common Files\Symantec Shared\DJSNETCN.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O16 - DPF: {14B87622-7E19-4EA8-93B3-97215F77A6BC} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab31267.cab
    O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} (FilePlanet Download Control Class) - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.0.97.cab
    O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
    O16 - DPF: {B020B534-4AA2-4B99-BD6D-5F6EE286DF5C} (Symantec Download Bridge) - http://a248.e.akamai.net/f/248/5462...img/operations/symbizpr/xcontrol/SymDlBrg.cab
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://messenger.zone.msn.com/binary/ZIntro.cab32846.cab
    O16 - DPF: {CE28D5D2-60CF-4C7D-9FE8-0F47A3308078} (ActiveDataInfo Class) - http://www.symantec.com/techsupp/asa/ctrl/SymAData.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O16 - DPF: {D57262F5-9637-4E67-BC59-88C53EA76FC3} (ULcontrol Control) - http://pix.futureshop.ca/en/ulcontrolxp.cab
    O16 - DPF: {DA758BB1-5F89-4465-975F-8D7179A4BCF3} (WheelofFortune Object) - http://messenger.zone.msn.com/binary/WoF.cab31267.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab
    O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zone.msn.com/binary/SolitaireShowdown.cab31267.cab
    O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O18 - Protocol: siteadvisor - {3A5DC592-7723-4EAA-9EE6-AF4222BCF879} - C:\Program Files\SiteAdvisor\6009\SiteAdv.dll
    O20 - AppInit_DLLs: MsgPlusLoader.dll
    O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
    O20 - Winlogon Notify: pmnlk - C:\WINDOWS\system32\pmnlk.dll (file missing)
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
    O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
    O21 - SSODL: breadthes - {5c4f2cbc-f32d-4a03-9812-86f39379811b} - C:\WINDOWS\system32\oksrqqu.dll (file missing)
    O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
    O23 - Service: Boonty Games - BOONTY - C:\Program Files\Common Files\BOONTY Shared\Service\Boonty.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    O23 - Service: Symantec Licensing Detect Internet Connection (DJSNETCN) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\DJSNETCN.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
    O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Yahoo!\NAV\navapsvc.exe
    O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
    O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Yahoo!\NAV\IWP\NPFMntor.exe
    O23 - Service: Norton Protection Center Service (NSCService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Console\NSCSRVCE.EXE
    O23 - Service: Symantec AVScan (SAVScan) - Symantec Corporation - C:\Program Files\Yahoo!\NAV\SAVScan.exe
    O23 - Service: SiteAdvisor Service - McAfee, Inc. - C:\Program Files\SiteAdvisor\6009\SAService.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: SPBBCSvc - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
    O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Next, please reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

    You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

    A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply along with a new hijack log.

    The report can also be found at the root of the system drive, usually at C:\rapport.txt

    Warning: running option #2 on a non infected computer will remove your Desktop background.
    ======================

    Download Superantispyware

    http://www.superantispyware.com/superantispywarefreevspro.html

    Install it and double-click the icon on your desktop to run it.
    · It will ask if you want to update the program definitions, click Yes.
    · Under Configuration and Preferences, click the Preferences button.
    · Click the Scanning Control tab.
    · Under Scanner Options make sure the following are checked:
    o Close browsers before scanning
    o Scan for tracking cookies
    o Terminate memory threats before quarantining.
    o Please leave the others unchecked.
    o Click the Close button to leave the control center screen.
    · On the main screen, under Scan for Harmful Software click Scan your computer.
    · On the left check C:\Fixed Drive.
    · On the right, under Complete Scan, choose Perform Complete Scan.
    · Click Next to start the scan. Please be patient while it scans your computer.
    · After the scan is complete a summary box will appear. Click OK.
    · Make sure everything in the white box has a check next to it, then click Next.
    · It will quarantine what it found and if it asks if you want to reboot, click Yes.
    · To retrieve the removal information for me please do the following:
    o After reboot, double-click the SUPERAntispyware icon on your desktop.
    o Click Preferences. Click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o It will open in your default text editor (such as Notepad/Wordpad).
    o Please highlight everything in the notepad, then right-click and choose copy.
    · Click close and close again to exit the program.
    · Please paste that information here for me with a new HijackThis log.
     
  3. alexant

    alexant Thread Starter

    Joined:
    Feb 4, 2007
    Messages:
    2
    Thanks a lot, it looks like the computer is clean now. Here are all the logs:

    Logfile of HijackThis v1.99.1
    Scan saved at 6:57:00 PM, on 2/4/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.5730.0011)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
    C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Common Files\Symantec Shared\DJSNETCN.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Yahoo!\NAV\navapsvc.exe
    C:\Program Files\Yahoo!\NAV\IWP\NPFMntor.exe
    C:\Program Files\SiteAdvisor\6009\SAService.exe
    C:\WINDOWS\system32\svchost.exe
    C:\PROGRA~1\Yahoo!\YOP\yop.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\Program Files\SiteAdvisor\6009\SiteAdv.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Microsoft Office\Office\1033\msoffice.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\PROGRA~1\Yahoo!\browser\ycommon.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\PROGRA~1\Yahoo!\YOP\secstat.exe
    C:\Program Files\Common Files\Symantec Shared\Security Console\NSCSRVCE.EXE
    C:\Program Files\Hijackthis\HijackThis.exe

    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll
    O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: (no name) - {089FD14D-132B-48FC-8861-0048AE113215} - C:\Program Files\SiteAdvisor\6009\SiteAdv.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O2 - BHO: NAV Helper - {A8F38D8D-E480-4D52-B7A2-731BB6995FDD} - C:\Program Files\Yahoo!\NAV\NavShExt.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
    O2 - BHO: FlashFXP Helper for Internet Explorer - {E5A1691B-D188-4419-AD02-90002030B8EE} - C:\PROGRA~1\FlashFXP\IEFlash.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn2\yt.dll
    O3 - Toolbar: McAfee SiteAdvisor - {0BF43445-2F28-4351-9252-17FE6E806AA0} - C:\Program Files\SiteAdvisor\6009\SiteAdv.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
    O4 - HKLM\..\Run: [YOP] C:\PROGRA~1\Yahoo!\YOP\yop.exe /autostart
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [SiteAdvisor] C:\Program Files\SiteAdvisor\6009\SiteAdv.exe
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\RunServices: [DJSNetCN] C:\Program Files\Common Files\Symantec Shared\DJSNETCN.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
    O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O16 - DPF: {14B87622-7E19-4EA8-93B3-97215F77A6BC} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab31267.cab
    O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} (FilePlanet Download Control Class) - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.0.97.cab
    O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
    O16 - DPF: {B020B534-4AA2-4B99-BD6D-5F6EE286DF5C} (Symantec Download Bridge) - http://a248.e.akamai.net/f/248/5462...img/operations/symbizpr/xcontrol/SymDlBrg.cab
    O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://messenger.zone.msn.com/binary/ZIntro.cab32846.cab
    O16 - DPF: {CE28D5D2-60CF-4C7D-9FE8-0F47A3308078} (ActiveDataInfo Class) - http://www.symantec.com/techsupp/asa/ctrl/SymAData.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    O16 - DPF: {D57262F5-9637-4E67-BC59-88C53EA76FC3} (ULcontrol Control) - http://pix.futureshop.ca/en/ulcontrolxp.cab
    O16 - DPF: {DA758BB1-5F89-4465-975F-8D7179A4BCF3} (WheelofFortune Object) - http://messenger.zone.msn.com/binary/WoF.cab31267.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab
    O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zone.msn.com/binary/SolitaireShowdown.cab31267.cab
    O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
    O18 - Protocol: siteadvisor - {3A5DC592-7723-4EAA-9EE6-AF4222BCF879} - C:\Program Files\SiteAdvisor\6009\SiteAdv.dll
    O20 - AppInit_DLLs: MsgPlusLoader.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
    O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
    O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
    O23 - Service: Boonty Games - BOONTY - C:\Program Files\Common Files\BOONTY Shared\Service\Boonty.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    O23 - Service: Symantec Licensing Detect Internet Connection (DJSNETCN) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\DJSNETCN.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
    O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Yahoo!\NAV\navapsvc.exe
    O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
    O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Yahoo!\NAV\IWP\NPFMntor.exe
    O23 - Service: Norton Protection Center Service (NSCService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Console\NSCSRVCE.EXE
    O23 - Service: Symantec AVScan (SAVScan) - Symantec Corporation - C:\Program Files\Yahoo!\NAV\SAVScan.exe
    O23 - Service: SiteAdvisor Service - McAfee, Inc. - C:\Program Files\SiteAdvisor\6009\SAService.exe
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
    O23 - Service: SPBBCSvc - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
    O23 - Service: Symantec Core LC - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    ------------------------------------

    SmitFraudFix v2.138

    Scan done at 16:28:51.43, Sun 02/04/2007
    Run from C:\Documents and Settings\Alexei\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in safe mode

    »»»»»»»»»»»»»»»»»»»»»»»» Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "{5c4f2cbc-f32d-4a03-9812-86f39379811b}"="breadthes"

    [HKEY_CLASSES_ROOT\CLSID\{5c4f2cbc-f32d-4a03-9812-86f39379811b}\InProcServer32]
    @="C:\WINDOWS\system32\oksrqqu.dll"

    [HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{5c4f2cbc-f32d-4a03-9812-86f39379811b}\InProcServer32]
    @="C:\WINDOWS\system32\oksrqqu.dll"


    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files

    C:\DOCUME~1\ALLUSE~1\STARTM~1\Online Security Guide.url Deleted
    C:\DOCUME~1\ALLUSE~1\STARTM~1\Security Troubleshooting.url Deleted
    C:\DOCUME~1\ALLUSE~1\Desktop\Online Security Guide.url Deleted
    C:\DOCUME~1\ALLUSE~1\Desktop\Security Troubleshooting.url Deleted
    C:\Program Files\Video ActiveX Object\ Deleted

    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» End



    SUPERAntiSpyware Scan Log
    Generated 02/04/2007 at 06:42 PM

    Application Version : 3.5.1016

    Core Rules Database Version : 3177
    Trace Rules Database Version: 1187

    Scan type : Complete Scan
    Total Scan Time : 01:56:24

    Memory items scanned : 443
    Memory threats detected : 0
    Registry items scanned : 7396
    Registry threats detected : 10
    File items scanned : 84906
    File threats detected : 165

    Adware.Effective Brand/180Search
    HKLM\Software\Classes\CLSID\{EE590FEA-45F1-4B4A-AB90-EB7C8CEB5204}
    HKCR\CLSID\{EE590FEA-45F1-4B4A-AB90-EB7C8CEB5204}
    HKCR\CLSID\{EE590FEA-45F1-4B4A-AB90-EB7C8CEB5204}
    HKCR\CLSID\{EE590FEA-45F1-4B4A-AB90-EB7C8CEB5204}\InprocServer32
    HKCR\CLSID\{EE590FEA-45F1-4B4A-AB90-EB7C8CEB5204}\InprocServer32#ThreadingModel
    C:\PROGRAM FILES\NINA'S_TOOLBAR\TBNIN1.DLL
    HKLM\Software\Microsoft\Internet Explorer\Toolbar#{ee590fea-45f1-4b4a-ab90-eb7c8ceb5204}

    Adware.Tracking Cookie
    C:\Documents and Settings\Alexei\Cookies\[email protected][1].txt
    C:\Documents and Settings\Alexei\Cookies\[email protected][1].txt
    C:\Documents and Settings\Alexei\Cookies\[email protected][2].txt
    C:\Documents and Settings\Alexei\Cookies\[email protected][1].txt
    C:\Documents and Settings\Alexei\Cookies\[email protected][3].txt
    C:\Documents and Settings\Alexei\Cookies\[email protected][1].txt
    C:\Documents and Settings\Alexei\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][3].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\el[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][3].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ellen\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][3].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][2].txt
    C:\Documents and Settings\Nina\Local Settings\Temp\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][3].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][2].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt
    C:\Documents and Settings\p2c\Cookies\[email protected][1].txt

    Trojan.Media-Codec
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Alert Popup
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Alert Popup#DisplayName
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Alert Popup#UninstallString
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\explorer\run#none [ C:\Program Files\Video ActiveX Object\pmsngr.exe ]
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP800\A0130730.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP800\A0131717.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP803\A0132718.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP805\A0132733.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP807\A0132744.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP809\A0132773.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP809\A0132785.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP809\A0132941.EXE
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP809\A0132948.EXE

    Trojan.WinAntiSpyware/WinAntiVirus 2006
    C:\DOCUMENTS AND SETTINGS\NINA\LOCAL SETTINGS\TEMP\NI.UWAS6_0001_N73M1104\SETUP.EXE
    C:\DOCUMENTS AND SETTINGS\NINA\LOCAL SETTINGS\TEMP\WINANTISPYWARE2006SETUP.EXE

    Browser Hijacker.Favorites
    C:\DOCUMENTS AND SETTINGS\P2C\FAVORITES\ONLINE SECURITY TEST.URL

    Trojan.Unknown Origin
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP809\A0132947.ICO
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP809\A0132950.ICO

    Trace.Known Threat Sources
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\EB8B1E7Y\ico1[1].gif
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\EB8B1E7Y\checksoft[1].js
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\KDW3GZOJ\button2[1].gif
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\KDW3GZOJ\ico5[1].gif
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\EB8B1E7Y\ico3[1].gif
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\EB8B1E7Y\index[2].htm
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\EB8B1E7Y\logo[1].gif
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\OH6RW567\ico4[1].gif
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\EB8B1E7Y\top_pic2[1].gif
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\YXS76TM1\wav_banner[1].swf
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\SL41E3G5\ico2[1].gif
    C:\Documents and Settings\Ellen\Local Settings\Temporary Internet Files\Content.IE5\STIBSP2F\favicon[2].ico
     
  4. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    You may want to print this or save it to notepad as we will go to safe mode.

    Fix these with HiJackThis – mark them, close IE, click fix checked

    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://www.popcap.com/games/popcaploader_v6.cab

    O23 - Service: Boonty Games - BOONTY - C:\Program Files\Common Files\BOONTY Shared\Service\Boonty.exe
    =======================
    Click Start > Run > and type in:

    services.msc

    Click OK.

    In the services window find this exact name

    Boonty Games

    Rightclick and choose "Properties". Beside "Startup Type" in the dropdown menu select "Disabled". On the "General" tab under "Service Status" click the "Stop" button to stop the service. Click Apply then OK. File-Exit the Services utility.

    =======================
    DownLoad http://www.downloads.subratam.org/KillBox.zip or
    http://www.thespykiller.co.uk/files/killbox.exe

    Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

    Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

    C:\Program Files\Common Files\BOONTY Shared

    Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

    START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

    Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

    Not all temp files will delete and that is normal
    Empty the recycle bin
    Boot and post a new hijack log from normal NOT safe mode

    Please give feedback on what worked/didn’t work and the current status of your system
     
As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/541214

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice