Removal of spyware?

View previous topic View next topic Go down

Removal of spyware?

Post by shimmeringmisty on Mon Jan 25, 2010 2:24 am

I've got a little red and white 'x' in my clock tray and my desktop looks like this.


I've had this problem before, but this time it won't clear up. I've run Malwarebytes Anitmalware twice, and there's one file it won't get rid of.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:23:47 PM, on 1/24/2010
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\Digital Media Reader\readericon45G.exe
C:\WINDOWS\RTHDCPL.EXE
C:\PROGRA~1\COMMON~1\AOL\AOLSPY~1\AOLSP Scheduler.exe
C:\Program Files\McAfee.com\VSO\oasclnt.exe
C:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\PROGRA~1\McAfee\SPAMKI~1\MskAgent.exe
C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\WINDOWS\system32\smss32.exe
C:\Program Files\BigFix\bigfix.exe
C:\Program Files\WinZip\WZQKPICK.EXE
c:\progra~1\mcafee.com\vso\mcvsescn.exe
C:\PROGRA~1\COMMON~1\AOL\125941~1\EE\AOLHOS~1.EXE
C:\PROGRA~1\COMMON~1\AOL\125941~1\EE\AOLServiceHost.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Java\jre6\bin\jqs.exe
c:\program files\mcafee.com\agent\mcdetect.exe
c:\PROGRA~1\mcafee.com\vso\mcshield.exe
c:\PROGRA~1\mcafee.com\agent\mctskshd.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfService.exe
C:\PROGRA~1\McAfee\SPAMKI~1\MSKSrvr.exe
c:\progra~1\mcafee.com\vso\mcvsftsn.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\PROGRA~1\McAfee.com\PERSON~1\MpfAgent.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: McAfee Anti-Phishing Filter - {41D68ED8-4CFF-4115-88A6-6EBB8AF19000} - c:\program files\mcafee\spamkiller\mcapfbho.dll
O2 - BHO: Browser Address Error Redirector - {CA6319C0-31B7-401E-A518-A07C3DB8F777} - c:\windows\system32\BAE.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: McAfee VirusScan - {BA52B914-B692-46c4-B683-905236F6F655} - c:\progra~1\mcafee.com\vso\mcvsshl.dll
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [readericon] C:\Program Files\Digital Media Reader\readericon45G.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Recguard] %WINDIR%\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [Reminder] %WINDIR%\Creator\Remind_XP.exe
O4 - HKLM\..\Run: [HostManager] C:\Program Files\Common Files\AOL\1259418501\EE\AOLHostManager.exe
O4 - HKLM\..\Run: [AOL Spyware Protection] "C:\PROGRA~1\COMMON~1\AOL\AOLSPY~1\AOLSP Scheduler.exe"
O4 - HKLM\..\Run: [VSOCheckTask] "C:\PROGRA~1\McAfee.com\VSO\mcmnhdlr.exe" /checktask
O4 - HKLM\..\Run: [OASClnt] C:\Program Files\McAfee.com\VSO\oasclnt.exe
O4 - HKLM\..\Run: [MCAgentExe] c:\PROGRA~1\mcafee.com\agent\mcagent.exe
O4 - HKLM\..\Run: [MCUpdateExe] C:\PROGRA~1\mcafee.com\agent\mcupdate.exe
O4 - HKLM\..\Run: [MSKAGENTEXE] C:\PROGRA~1\McAfee\SPAMKI~1\MskAgent.exe
O4 - HKLM\..\Run: [MSKDetectorExe] C:\PROGRA~1\McAfee\SPAMKI~1\MSKDetct.exe /startup
O4 - HKLM\..\Run: [VirusScan Online] c:\PROGRA~1\mcafee.com\vso\mcvsshld.exe
O4 - HKLM\..\Run: [MPFExe] C:\PROGRA~1\McAfee.com\PERSON~1\MpfTray.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [smss32.exe] C:\WINDOWS\system32\smss32.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKUS\S-1-5-18\..\Run: [Power2GoExpress] NA (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Power2GoExpress] NA (User 'Default user')
O4 - Global Startup: BigFix.lnk = C:\Program Files\BigFix\bigfix.exe
O4 - Global Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - [You must be registered and logged in to see this link.]
O9 - Extra button: (no name) - {39FD89BF-D3F1-45b6-BB56-3582CCF489E1} - c:\program files\mcafee\spamkiller\mcapfbho.dll
O9 - Extra 'Tools' menuitem: McAfee Anti-Phishing Filter - {39FD89BF-D3F1-45b6-BB56-3582CCF489E1} - c:\program files\mcafee\spamkiller\mcapfbho.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O23 - Service: AOL Connectivity Service (AOL ACS) - America Online - C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
O23 - Service: AOL TopSpeed Monitor (AOL TopSpeedMonitor) - America Online, Inc - C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: McAfee WSC Integration (McDetect.exe) - McAfee, Inc - c:\program files\mcafee.com\agent\mcdetect.exe
O23 - Service: McAfee.com McShield (McShield) - McAfee Inc. - c:\PROGRA~1\mcafee.com\vso\mcshield.exe
O23 - Service: McAfee Task Scheduler (McTskshd.exe) - McAfee, Inc - c:\PROGRA~1\mcafee.com\agent\mctskshd.exe
O23 - Service: McAfee SecurityCenter Update Manager (mcupdmgr.exe) - McAfee, Inc - C:\PROGRA~1\McAfee.com\Agent\mcupdmgr.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee Corporation - C:\PROGRA~1\McAfee.com\PERSON~1\MpfService.exe
O23 - Service: McAfee SpamKiller Server (MskService) - McAfee Inc. - C:\PROGRA~1\McAfee\SPAMKI~1\MSKSrvr.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS

--
End of file - 7214 bytes

shimmeringmisty
Novice
Novice

Status :
Online
Offline

Posts : 25
Joined : 2009-09-01
OS : XP

View user profile

Back to top Go down

Re: Removal of spyware?

Post by Dr Jay on Mon Jan 25, 2010 5:55 pm

Can you see the Desktop, start menu, etc. If so, it is probably the wallpaper.

Let me know if you can access the Start menu, task manager, etc.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Status :
Online
Offline

Posts : 13707
Joined : 2009-09-06
Gender : Male
OS : Windows 10 Home & Pro

View user profile

Back to top Go down

Re: Removal of spyware?

Post by shimmeringmisty on Mon Jan 25, 2010 8:51 pm

Well, the background still has the message on the background, only instead of dark green it's black now. I can pull up my start menu, but cannot pull up task manager, notepad, calculator or play any media files. When I turned my computer on a few minutes ago, I got a pop up that said I have a worm from email and active-x. Which is interesting because I don't open email, ever. Pretty much just only notifications from insanejournal and maybe one from a friend every now and again.

shimmeringmisty
Novice
Novice

Status :
Online
Offline

Posts : 25
Joined : 2009-09-01
OS : XP

View user profile

Back to top Go down

Re: Removal of spyware?

Post by Dr Jay on Tue Jan 26, 2010 12:12 am

Please download [You must be registered and logged in to see this link.], and save to your Desktop.
  • Double-click on Cheetah-Anti-Rogue.zip, and extract the file to your Desktop.
  • Double-click on Cheetah-Anti-Rogue.cmd to start.
  • It will finish quickly and launch a log.
  • Post the contents of it in your next reply.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Status :
Online
Offline

Posts : 13707
Joined : 2009-09-06
Gender : Male
OS : Windows 10 Home & Pro

View user profile

Back to top Go down

Re: Removal of spyware?

Post by shimmeringmisty on Tue Jan 26, 2010 12:23 am

Okay, downloaded it. I tried to run it, and all I got was the following (before a pop up came up and said 'Application cannot be executed. The file is infected. Please activate your anitvirus software.')



Cheetah-Anti-Rogue v1.2.5
by DragonMaster Jay

Microsoft Windows XP [Version 5.1.2600]
Date: 01/25/2010 - Time: 19:22:49 - Arch.: x86


-- Malware tools check --
Trend Micro HijackThis 2.0.2
Malwarebytes' Anti-Malware

shimmeringmisty
Novice
Novice

Status :
Online
Offline

Posts : 25
Joined : 2009-09-01
OS : XP

View user profile

Back to top Go down

Re: Removal of spyware?

Post by Dr Jay on Tue Jan 26, 2010 12:39 am

Please visit this webpage for instructions for downloading and running ComboFix:

[You must be registered and logged in to see this link.]

Post the log from ComboFix when you've accomplished that.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Status :
Online
Offline

Posts : 13707
Joined : 2009-09-06
Gender : Male
OS : Windows 10 Home & Pro

View user profile

Back to top Go down

Re: Removal of spyware?

Post by shimmeringmisty on Tue Jan 26, 2010 1:45 am

ComboFix 10-01-25.02 - Owner 01/25/2010 20:01:37.2.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.382.190 [GMT -5:00]
Running from: c:\documents and settings\Owner\Desktop\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\s
c:\windows\system32\11478.exe
c:\windows\system32\15724.exe
c:\windows\system32\16827.exe
c:\windows\system32\18467.exe
c:\windows\system32\19169.exe
c:\windows\system32\23281.exe
c:\windows\system32\24464.exe
c:\windows\system32\26500.exe
c:\windows\system32\26962.exe
c:\windows\system32\28145.exe
c:\windows\system32\29358.exe
c:\windows\system32\41.exe
c:\windows\system32\5705.exe
c:\windows\system32\6334.exe
c:\windows\system32\helper32.dll
c:\windows\system32\IS15.exe
c:\windows\system32\smss32.exe
c:\windows\system32\warning.html
c:\windows\system32\winlogon32.exe

.
((((((((((((((((((((((((( Files Created from 2009-12-26 to 2010-01-26 )))))))))))))))))))))))))))))))
.

2010-01-17 03:48 . 2010-01-17 03:48 -------- d-----w- c:\documents and settings\Owner\Application Data\AdobeUM
2010-01-14 20:26 . 2010-01-17 04:17 -------- d-----w- c:\documents and settings\Owner\Application Data\BitTorrent
2010-01-14 20:26 . 2010-01-14 20:26 -------- d-----w- c:\program files\BitTorrent
2010-01-12 22:38 . 2009-11-21 16:36 470528 -c----w- c:\windows\system32\dllcache\aclayers.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-01-15 00:21 . 2009-12-06 16:52 -------- d-----w- c:\documents and settings\Owner\Application Data\vlc
2010-01-14 15:20 . 2009-12-08 02:09 2026 ----a-w- c:\documents and settings\Owner\Application Data\wklnhst.dat
2009-12-22 05:42 . 2008-05-25 08:39 662016 ----a-w- c:\windows\system32\wininet.dll
2009-12-22 05:42 . 2008-05-25 08:33 81920 ----a-w- c:\windows\system32\ieencode.dll
2009-12-19 22:46 . 2009-12-19 03:42 -------- d-----w- c:\documents and settings\Owner\Application Data\Move Networks
2009-12-14 03:18 . 2009-12-14 03:17 -------- d-----w- c:\documents and settings\All Users\Application Data\WinZip
2009-12-13 08:42 . 2009-11-29 00:15 -------- d-----w- c:\program files\DivX
2009-12-12 16:34 . 2005-01-10 01:26 47712 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-12-08 02:10 . 2009-12-08 02:10 -------- d-----w- c:\documents and settings\Owner\Application Data\Template
2009-12-05 18:23 . 2009-12-05 18:23 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-12-05 18:23 . 2009-12-05 18:23 -------- d-----w- c:\program files\Java
2009-12-05 17:56 . 2009-12-04 21:05 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-12-05 17:37 . 2009-12-05 17:37 -------- d-----w- c:\program files\MSBuild
2009-12-05 17:37 . 2009-12-05 17:37 -------- d-----w- c:\program files\Reference Assemblies
2009-12-05 17:26 . 2009-12-05 17:26 -------- d-----w- c:\program files\MSXML 6.0
2009-12-05 16:57 . 2009-11-28 12:08 -------- d-----w- c:\documents and settings\Owner\Application Data\McAfee.com Personal Firewall
2009-12-05 16:56 . 2009-11-28 14:32 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee.com Personal Firewall
2009-12-04 22:23 . 2009-12-04 22:23 -------- d-----w- c:\program files\Trend Micro
2009-12-04 21:06 . 2009-12-04 21:06 -------- d-----w- c:\documents and settings\Owner\Application Data\Malwarebytes
2009-12-04 21:05 . 2009-12-04 21:05 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-12-03 21:14 . 2009-12-05 17:55 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-03 21:13 . 2009-12-05 17:55 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-03 17:05 . 2009-12-03 17:05 -------- d-----w- c:\documents and settings\Owner\Application Data\Jasc
2009-12-03 17:04 . 2009-12-03 17:04 -------- d-----w- c:\program files\Jasc Software Inc
2009-12-03 16:14 . 2009-12-03 16:14 -------- d-----w- c:\program files\Quick Screenshot Maker
2009-12-03 12:49 . 2009-12-03 12:49 128 ----a-w- c:\documents and settings\Owner\Local Settings\Application Data\fusioncache.dat
2009-12-02 22:03 . 2009-12-02 22:03 -------- d-----w- c:\documents and settings\Owner\Application Data\AnvSoft
2009-12-02 22:03 . 2009-12-02 22:03 -------- d-----w- c:\program files\AnvSoft
2009-12-02 22:00 . 2009-12-02 22:00 -------- d-----w- c:\documents and settings\Owner\Application Data\Any Video Converter
2009-11-30 15:14 . 2009-11-30 15:13 -------- d-----w- c:\program files\K-Lite Codec Pack
2009-11-30 08:03 . 2009-11-30 08:03 -------- d-----w- c:\program files\MSXML 4.0
2009-11-29 08:29 . 2009-11-29 08:29 -------- d-----w- c:\documents and settings\LocalService\Application Data\McAfee.com Personal Firewall
2009-11-29 00:15 . 2009-11-29 00:15 -------- d-----w- c:\program files\Common Files\DivX Shared
2009-11-28 20:36 . 2009-11-28 20:35 -------- d-----w- c:\documents and settings\Owner\Application Data\MozillaControl
2009-11-28 20:34 . 2009-11-28 20:34 -------- d-----w- c:\program files\Mozilla ActiveX Control v1.7.12
2009-11-28 20:34 . 2009-11-28 20:22 -------- d-----w- c:\program files\Graboid
2009-11-28 20:22 . 2009-11-28 20:22 -------- d-----w- c:\program files\VideoLAN
2009-11-28 14:43 . 2009-11-28 15:06 -------- d-----w- c:\documents and settings\Owner\Application Data\AOL
2009-11-28 14:43 . 2009-11-28 15:05 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\AOL
2009-11-28 14:43 . 2009-11-28 14:43 -------- d-----w- c:\documents and settings\Administrator\Application Data\AOL
2009-11-28 14:32 . 2009-11-28 14:32 -------- d-----w- c:\program files\McAfee
2009-11-28 14:32 . 2009-11-28 14:32 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2009-11-28 14:32 . 2009-11-28 14:31 -------- d-----w- c:\program files\McAfee.com
2009-11-28 14:31 . 2009-11-28 14:31 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee.com
2009-11-28 14:30 . 2009-11-28 14:24 -------- d-----w- c:\program files\Realtek
2009-11-28 14:30 . 2009-11-28 14:15 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-11-28 14:30 . 2009-11-28 14:29 -------- d-----w- c:\program files\Microsoft Money 2006
2009-11-28 14:28 . 2009-11-28 14:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Pure Networks
2009-11-28 14:28 . 2009-11-28 14:28 -------- d-----w- c:\program files\Pure Networks
2009-11-28 14:28 . 2009-11-28 14:28 -------- d-----w- c:\program files\Common Files\AolCoach
2009-11-28 14:28 . 2009-11-28 15:06 -------- d-----w- c:\documents and settings\Owner\Application Data\SampleView
2009-11-28 14:28 . 2009-11-28 15:05 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\SampleView
2009-11-28 14:28 . 2009-11-28 14:28 -------- d-----w- c:\documents and settings\Administrator\Application Data\SampleView
2009-11-28 14:28 . 2009-11-28 14:28 335 ----a-w- c:\windows\nsreg.dat
2009-11-28 14:28 . 2009-11-28 14:28 -------- d-----w- c:\program files\BigFix
2009-11-28 14:27 . 2009-11-28 14:27 -------- d-----w- c:\program files\Microsoft Works
2009-11-28 14:26 . 2009-11-28 14:26 -------- d-----w- c:\program files\MSN Encarta Plus
2009-11-28 14:26 . 2009-11-28 14:26 -------- d-----w- c:\program files\Microsoft Digital Image 2006
2009-11-28 14:26 . 2009-11-28 14:26 4 ----a-w- c:\windows\Pix11.dat
2009-11-28 14:25 . 2009-11-28 14:25 -------- d-----w- c:\program files\Common Files\Adobe
2009-11-28 14:23 . 2009-11-28 14:15 -------- d-----w- c:\program files\Common Files\InstallShield
2009-11-28 14:22 . 2009-11-28 14:22 -------- d-----w- c:\program files\Digital Media Reader
2009-11-28 14:19 . 2009-11-28 14:19 -------- d-----w- c:\program files\Microsoft ActiveSync
2009-11-28 14:18 . 2009-11-28 14:18 -------- d-----w- c:\program files\Microsoft.NET
2009-11-28 14:18 . 2009-11-28 14:18 -------- d-----w- c:\program files\Google
2009-11-28 14:16 . 2009-11-28 14:15 -------- d-----w- c:\program files\CyberLink
2009-11-28 14:13 . 2009-11-28 14:13 -------- d-----w- c:\program files\Common Files\New Boundary
2009-11-28 14:13 . 2009-11-28 14:13 -------- d-----w- c:\documents and settings\All Users\Application Data\Prism Deploy
2009-11-28 14:09 . 2009-11-28 14:09 -------- d-----w- c:\program files\CONEXANT
2009-11-28 12:53 . 2005-01-10 01:13 -------- d-----w- c:\program files\microsoft frontpage
2009-11-28 12:53 . 2005-01-10 01:06 -------- d-----w- c:\program files\Windows Plus
2009-11-28 12:08 . 2009-11-28 12:08 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\McAfee.com Personal Firewall
2009-11-21 16:36 . 2008-05-25 08:30 470528 ----a-w- c:\windows\AppPatch\aclayers.dll
2009-05-01 21:02 . 2009-05-01 21:02 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
2009-05-01 21:02 . 2009-05-01 21:02 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-10-13 1694208]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray"="c:\windows\ehome\ehtray.exe" [2005-08-06 64512]
"readericon"="c:\program files\Digital Media Reader\readericon45G.exe" [2005-12-10 139264]
"RTHDCPL"="RTHDCPL.EXE" [2006-04-04 16120832]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2002-09-14 212992]
"Reminder"="c:\windows\Creator\Remind_XP.exe" [2005-02-26 966656]
"HostManager"="c:\program files\Common Files\AOL\1259418501\EE\AOLHostManager.exe" [2004-11-03 125528]
"AOL Spyware Protection"="c:\progra~1\COMMON~1\AOL\AOLSPY~1\AOLSP Scheduler.exe" [2004-10-19 79448]
"VSOCheckTask"="c:\progra~1\McAfee.com\VSO\mcmnhdlr.exe" [2005-07-09 151552]
"OASClnt"="c:\program files\McAfee.com\VSO\oasclnt.exe" [2005-08-12 53248]
"MCAgentExe"="c:\progra~1\mcafee.com\agent\mcagent.exe" [2005-09-23 303104]
"MCUpdateExe"="c:\progra~1\mcafee.com\agent\mcupdate.exe" [2005-08-26 212992]
"MSKAGENTEXE"="c:\progra~1\McAfee\SPAMKI~1\MskAgent.exe" [2005-09-26 110592]
"MSKDetectorExe"="c:\progra~1\McAfee\SPAMKI~1\MSKDetct.exe" [2005-08-13 1121792]
"VirusScan Online"="c:\progra~1\mcafee.com\vso\mcvsshld.exe" [2005-08-10 163840]
"MPFExe"="c:\progra~1\McAfee.com\PERSON~1\MpfTray.exe" [2005-11-12 1005096]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-12-05 149280]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Power2GoExpress"="NA" [X]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
BigFix.lnk - c:\program files\BigFix\bigfix.exe [2009-11-28 2168360]
WinZip Quick Pick.lnk - c:\program files\WinZip\WZQKPICK.EXE [2009-11-18 495432]

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLacsd.exe"=
"c:\\Program Files\\America Online 9.0\\waol.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltsmon.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltpspd.exe"=
"c:\\Program Files\\Common Files\\AOL\\1259418501\\EE\\AOLServiceHost.exe"=
"c:\\Program Files\\Common Files\\AOL\\System Information\\sinf.exe"=
"c:\\Program Files\\Common Files\\AOL\\AOL Spyware Protection\\AOLSP Scheduler.exe"=
"c:\\Program Files\\Common Files\\AOL\\AOL Spyware Protection\\asp.exe"=
"c:\\Program Files\\Common Files\\AolCoach\\en_en\\player\\AOLNySEV.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\BitTorrent\\bittorrent.exe"=

.
.
------- Supplementary Scan -------
.
uStart Page = [You must be registered and logged in to see this link.]
mStart Page = [You must be registered and logged in to see this link.]
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\gm5vbau3.default\
FF - prefs.js: browser.startup.homepage - [You must be registered and logged in to see this link.]
FF - plugin: c:\documents and settings\Owner\Application Data\Move Networks\plugins\npqmp071505000011.dll
FF - hȋdden: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, [You must be registered and logged in to see this link.]
Rootkit scan 2010-01-25 20:07
Windows 5.1.2600 Service Pack 2 NTFS

scanning hȋdden processes ...

scanning hȋdden autostart entries ...

scanning hȋdden files ...

scan completed successfully
hȋdden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(536)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2010-01-25 20:14:28
ComboFix-quarantined-files.txt 2010-01-26 01:14
ComboFix2.txt 2009-12-05 17:40

Pre-Run: 43,815,800,832 bytes free
Post-Run: 45,760,073,728 bytes free

- - End Of File - - D5861C6533B8A211EA155FB1D57D292B

shimmeringmisty
Novice
Novice

Status :
Online
Offline

Posts : 25
Joined : 2009-09-01
OS : XP

View user profile

Back to top Go down

Re: Removal of spyware?

Post by Dr Jay on Tue Jan 26, 2010 1:56 am

Hi again. Please do these steps in order.

1. Please download [You must be registered and logged in to see this link.] to your desktop
  • Please double-click TFC.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • It will close all programs when run, so make sure you have saved all your work before you begin.
  • Click the Start
    button to begin the process. Depending on how often you clean temp
    files, execution time should be anywhere from a few seconds to a minute
    or two. Let it run uninterrupted to completion.
  • Once it's finished it should reboot your machine. If it does not, please manually reboot the machine yourself to ensure a complete clean.


2. Please download Malwarebytes Anti-Malware from [You must be registered and logged in to see this link.].
Alternate link: [You must be registered and logged in to see this link.].
(Note: if you already have the program installed, just follow the directions. No need to re-download or re-install!)

Double Click mbam-setup.exe to install the application.

(Note: if you already have the program installed, open Malwarebytes from the Start Menu or Desktop shortcut, click the Update tab, and click Check for Updates, before doing the scan as instructed below!)

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • Please save the log to a location you will remember.
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.

3. Please visit this webpage for instructions for downloading and running SUPERAntiSpyware (SAS) to scan and remove malware from your computer:

[You must be registered and logged in to see this link.]

Post the log from SUPERAntiSpyware when you've accomplished that.

4. Please run a free online scan with the [You must be registered and logged in to see this link.]
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • When asked, allow the ActiveX control to install
  • Click Start
  • Make sure that the options Remove found threats and the option Scan unwanted applications is checked
  • Click Scan (This scan can take several hours, so please be patient)
  • Once the scan is completed, you may close the window
  • Use Notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt
  • Copy and paste that log as a reply to this topic


5. Post the following in your next reply:
  • MBAM log
  • SAS log
  • ESET log

And, please tell me how your computer is doing.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Status :
Online
Offline

Posts : 13707
Joined : 2009-09-06
Gender : Male
OS : Windows 10 Home & Pro

View user profile

Back to top Go down

Re: Removal of spyware?

Post by shimmeringmisty on Tue Jan 26, 2010 11:33 am

Okay, starting with the MBAM log.

Malwarebytes' Anti-Malware 1.42
Database version: 3300
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

1/26/2010 1:02:21 AM
mbam-log-2010-01-26 (01-02-21).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 400700
Time elapsed: 2 hour(s), 58 minute(s), 21 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 131

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Application Data\Microsoft\dtsc\6253.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\syswcc32.exe (Adware.WebHancer) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\bbbti.exe (Trojan.Proxy) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F11631C.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F1198C2.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F11A94D.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F125106.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F134EC2A.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F1A40738.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F2577F02.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F2D7F702.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F429123.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F42A622.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F458184.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F45D35D.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F486B6D.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F48C8FE.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F64C0F.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00F7CA349.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00FB0EFD6.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00FBA8DD.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00FC1979.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00FC282E.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00FC3974.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00FC669F.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\mmonHJ.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\msiexec.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00FE51E4.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\_A00FF8E6C.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\37E3A92V\kbg105613[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\G9MVOXU3\kb65666[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\Program Files\ISM\ism.exe (Adware.SearchAid) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\acmiiliu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\acrstgkn.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\apxpwg.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\bcahyb.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\bhmthgta.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\btbhnncv.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ceublivx.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\cnojtusv.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\cytjgdjc.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\dccyxa.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\dhptge.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\digxauqv.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\dqshlwji.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\dslujf.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\duhapqnr.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\dwgitgcb.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\eldbkdyc.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\eqoefvhu.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\exktbdtj.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\gasdtrso.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ghphawlg.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\gkugvt.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\gnwgakmu.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\gsbjwlhk.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\hpwxfkfd.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\hwulvgxx.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ivfxxksl.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\jlaihded.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\jmxjppng.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\jsichpnn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\kcnxknal.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\kftapktr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\lcboapad.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ldjmkvwm.exe (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\lefteg.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\mngbvs.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ndgvakfg.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ndngevle.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\nvbpnhtg.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\oihkggec.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\oiqqvfvi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ouabbmbs.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\oxxnpjrb.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\psbwkist.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\rjxioxtd.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\rsfecpql.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\rucknbtf.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\sedfnbcd.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ssckopct.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\tdllaehv.dll (Rogue.Installer) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\tskckm.dll (Rogue.Installer) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ucrygeio.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\uolfikuf.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\vtutftjh.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\yskyiaga.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\wmeyewol.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\wyvxbpix.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\wznkad.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\lhrofncx.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ljwzed.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\xwdlxdcu.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ydmpcnxk.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\yofgamve.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\yrqevskx.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\yrtthxkh.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\xciqnart.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\xcvmqxuk.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ytqmjoer.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\vntiho06\vntiho061083.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Application Data\Microsoft\dtsc\30977.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\mmonHJ.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\msiexec.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\bbbti.exe (Trojan.Proxy) -> Quarantined and deleted successfully.
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\65GXYPWJ\mmonHJ[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\65GXYPWJ\kb713501[1] (Trojan.LowZones) -> Quarantined and deleted successfully.
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\EZQJMB6X\msiexec[1].exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\SF3RIOHX\tor[1].exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\VB333K9T\ie[1].exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\VB333K9T\bbbti[1].exe (Trojan.Proxy) -> Quarantined and deleted successfully.
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Local Settings\Temp\e.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\NAUSIBLM\load[1].php (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 09-03-16 0139AM\WINDOWS\system32\pamuyomi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 09-03-16 0139AM\WINDOWS\system32\yigekote.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 09-03-16 0139AM\WINDOWS\system32\zasiyugi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\System\lsass.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Local Settings\Temp\service.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\My Backup -- 09-11-28 0551AM\WINDOWS\system32\drivers\eciujhfch.sys (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP5\A0001690.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP5\A0001691.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP5\A0001692.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP5\A0001706.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP5\A0001707.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP52\A0007981.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP7\A0001815.exe (Rogue.AdvancedVirusRemover) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP7\A0001828.exe (Rogue.AdvancedVirusRemover) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP7\A0003034.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP7\A0003035.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP7\A0003044.exe (Rogue.AdvancedVirusRemover) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP7\A0003045.exe (Rogue.AdvancedVirusRemover) -> Quarantined and deleted successfully.


The SAS log:

SUPERAntiSpyware Scan Log
[You must be registered and logged in to see this link.]

Generated 01/26/2010 at 02:13 AM

Application Version : 4.33.1000

Core Rules Database Version : 4517
Trace Rules Database Version: 2329

Scan type : Quick Scan
Total Scan Time : 00:58:46

Memory items scanned : 434
Memory threats detected : 0
Registry items scanned : 425
Registry threats detected : 0
File items scanned : 50835
File threats detected : 261

Adware.Tracking Cookie
C:\Documents and Settings\Owner\Cookies\owner@doubleclick[2].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@atdmt[1].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@questionmarket[2].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@ad.yieldmanager[2].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@tribalfusion[1].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@serving-sys[1].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@2o7[1].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@mediaplex[1].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@doubleclick[1].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@ads.pointroll[1].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@buzznet.112.2o7[1].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@specificclick[2].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@bs.serving-sys[2].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@adopt.specificclick[2].txt
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@apmebf[1].txt
.specificclick.net [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
cdn4.specificclick.net [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.specificclick.net [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.specificclick.net [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.doubleclick.net [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.specificclick.net [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.specificclick.net [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.specificclick.net [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.specificclick.net [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.specificmedia.com [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.advertising.com [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.advertising.com [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.advertising.com [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.advertising.com [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
statse.webtrendslive.com [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
.advertising.com [ C:\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\voff37u6.slt\cookies.txt ]
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@2o7[2].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@casalemedia[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@statse.webtrendslive[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@sixapart.adbureau[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@ehg-globalgamingleague.hitbox[2].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@dmtracker[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@tribalfusion[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@overture[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@ads.gamesbannernet[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@ad.yieldmanager[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@fastclick[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@hitbox[2].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@interclick[2].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@cdn.atwola[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@atdmt[2].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@media.adrevolver[2].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@statcounter[2].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@cracked[2].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@specificclick[2].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@adrevolver[2].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@adrevolver[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@server.cpmstar[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@zedo[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@revsci[2].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@advertising[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@adopt.specificclick[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@trafficmp[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@apmebf[1].txt
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\Cookies\owner@atwola[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@questionmarket[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@adserver.adtechus[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@clickarrows[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@yieldmanager[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@ad.yieldmanager[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@c7.zedo[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@network.realmedia[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@realmedia[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@media6degrees[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@ads.xapads[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@interclick[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@mediaplex[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@insightexpressai[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@linksynergy[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@ad.iconadserver[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@admarketplace[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@iacas.adbureau[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@tds.checkclick-go[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@a1.interclick[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@ads.lucidmedia[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@adecn[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@bridge1.admarketplace[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@atdmt[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@imrworldwide[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@media.adrevolver[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@statcounter[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@m1.webstats.motigo[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@ads.ad4game[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@ads.quixsurf[3].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@adrevolver[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@adopt.euroclick[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@revsci[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@chitika[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@zedo[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@advertising[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@247realmedia[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@ads.quixsurf[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@trafficmp[1].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@tds.myclicknowgo[2].txt
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Cookies\owner@eas.apm.emediate[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\LocalService\Cookies\owner@statse.webtrendslive[2].txt
.doubleclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.atdmt.com [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.atdmt.com [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.tribalfusion.com [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.specificclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.specificclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.specificclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.specificclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.specificclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.specificclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.specificclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
cdn4.specificclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.specificclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.specificclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
cdn4.specificclick.net [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.specificmedia.com [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.advertising.com [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.advertising.com [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.advertising.com [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
.advertising.com [ C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\MozillaControl\profiles\MozillaControl\9rvhz5i6.slt\cookies.txt ]
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@statse.webtrendslive[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@questionmarket[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@cdn4.specificclick[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@ad.yieldmanager[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@data.coremetrics[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@mediaplex[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@login.tracking101[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@serving-sys[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@2o7[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@homestore.122.2o7[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@doubleclick[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@admarketplace[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@roiservice[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@a1.interclick[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@bestbuy.122.2o7[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@pointroll[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@ads.pointroll[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@dr.findlinks[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@interclick[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@adserve.brandgivewaycentre[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@p2track.sl2host[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@clickthrough.kanoodle[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@bridge2.admarketplace[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@atdmt[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@revsci[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@theclickcheck[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@statcounter[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@myroitracking[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@enhance[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@specificclick[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@tacoda[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@specificmedia[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@[You must be registered and logged in to see this link.]
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@at.atwola[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@invitemedia[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@serving.adsrevenue.clicksor[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@ads.undertone[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@bs.serving-sys[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@burstnet[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@zedo[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@advertising[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@tracking.realtor[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@content.yieldmanager[1].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@apmebf[2].txt
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Cookies\owner@mediatraffic[2].txt

Adware.ClickSpring/Yazzle
C:\MY BACKUP -- 08-08-25 0344AM\PROGRAM FILES\COMMON FILES\YAZZLE1552OINADMIN.EXE
C:\MY BACKUP -- 08-08-25 0344AM\PROGRAM FILES\COMMON FILES\YAZZLE1552OINUNINSTALLER.EXE
C:\MY BACKUP -- 08-05-25 0149AM\PROGRAM FILES\COMMON FILES\YAZZLE1552OINADMIN.EXE
C:\MY BACKUP -- 08-05-25 0149AM\PROGRAM FILES\COMMON FILES\YAZZLE1552OINUNINSTALLER.EXE

Adware.AdSponsor/ISM
C:\MY BACKUP -- 08-08-25 0344AM\PROGRAM FILES\QDRMODULE\QDRMODULE16.EXE

Adware.webHancer
C:\MY BACKUP -- 08-08-25 0344AM\PROGRAM FILES\WEBHANCER\PROGRAMS\WEBHDLL.DLL
C:\MY BACKUP -- 08-08-25 0344AM\PROGRAM FILES\WEBHANCER\PROGRAMS\WHAGENT.EXE
C:\MY BACKUP -- 08-08-25 0344AM\PROGRAM FILES\WEBHANCER\PROGRAMS\WHIEHLPR.DLL
C:\MY BACKUP -- 08-08-25 0344AM\PROGRAM FILES\WEBHANCER\PROGRAMS\WHINSTALLER.EXE
C:\MY BACKUP -- 08-05-25 0149AM\PROGRAM FILES\WEBHANCER\PROGRAMS\WEBHDLL(2).DLL
C:\MY BACKUP -- 08-05-25 0149AM\PROGRAM FILES\WEBHANCER\PROGRAMS\WEBHDLL.DLL
C:\MY BACKUP -- 08-05-25 0149AM\PROGRAM FILES\WEBHANCER\PROGRAMS\WHAGENT.EXE
C:\MY BACKUP -- 08-05-25 0149AM\PROGRAM FILES\WEBHANCER\PROGRAMS\WHIEHLPR.DLL
C:\MY BACKUP -- 08-05-25 0149AM\PROGRAM FILES\WEBHANCER\PROGRAMS\WHINSTALLER.EXE

Trojan.Vundo-Variant/Small
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\BGUWWISS.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\BOAJSRUV.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\FELVJTKQ.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\GXTRQXWI.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\HRGQTWXU.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\KIPFGUMY.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\LCEUUVNR.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\LCQUPSNW.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\LDAYUBPB.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\MJRNQKCI.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\NTWSXOVT.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\PFVVJXFX.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\PMHKBDYG.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\QOAIXATN.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\RSSVDMKR.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\SLQPFTHX.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\TSOORBUN.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\WMHVOOCL.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\XQMABFYX.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\XXYYYWPI.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\YDWCGOUO.DLL

Adware.Vundo/Variant-0219X
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\BMFKLWSG.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\BRRYJORP.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\DVKDRIBS.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\KYFRBIRF.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\MROXEXUS.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\NSECMFCG.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\OMWNNNKS.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\QAIHOXBS.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\QLFYEYPC.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\QMLQMPXT.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\SNQKEPQK.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\SQNVAMLS.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\VGUOPNDI.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\XBJYMVIT.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\YYLRLFVC.DLL

Trojan.Vundo-Variant/Small-GEN
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\EFCCBYOG.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\OPNFNRSW.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\QOMGECVP.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\RQRKEWQG.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\WVUNGEXO.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\YAYYXOIA.DLL

Trojan.Unknown Origin
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\EPINSH.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\LILOCARG.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\MZGPEG.DLL
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\VTHMUVXS.DLL

Trojan.Unclassified/C00-WL/B
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C006FBDE.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C0081065.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C001BB0C.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C0032324.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C004D9F4.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C00544F0.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C0054888.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C005B7CE.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C0060502.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C0070900.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C0070DC1.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C0078C39.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C0087886.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C00884E9.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C0089A21.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C008B2A1.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C00A74F0.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C00A98BA.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C00C6400.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C00DB2E4.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C00DC54E.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C00EE71D.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C00F450.DAT
C:\MY BACKUP -- 08-08-25 0344AM\WINDOWS\SYSTEM32\__C00FB2D8.DAT

Adware.Vundo/Variant-MSFake
C:\MY BACKUP -- 08-05-25 0149AM\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\B3NEW.EXE
C:\MY BACKUP -- 09-03-16 0139AM\WINDOWS\SYSTEM32\KMSVC32.DLL

Adware.Vundo/Variant-Helper
C:\MY BACKUP -- 09-03-16 0139AM\RECYCLER\S-1-5-21-1272799353-1076206456-1011316653-1006\DC29.DLL

Adware.Vundo/Variant-86K
C:\MY BACKUP -- 09-03-16 0139AM\WINDOWS\SYSTEM32\FOMASOPI.DLL

Adware.Vundo/Variant-EC
C:\MY BACKUP -- 09-03-16 0139AM\WINDOWS\SYSTEM32\JONOTAMA.DLL

Adware.Vundo Variant
C:\MY BACKUP -- 09-03-16 0139AM\WINDOWS\SYSTEM32\MST122.DLL

Adware.Vundo/Variant-F13
C:\MY BACKUP -- 09-03-16 0139AM\WINDOWS\SYSTEM32\UANYRP.DLL

Adware.Vundo/Variant-81K
C:\MY BACKUP -- 09-03-16 0139AM\WINDOWS\SYSTEM32\VOZIZOWU.DLL

Trojan.Agent/Gen-MSFake
C:\MY BACKUP -- 09-11-28 0551AM\DOCUMENTS AND SETTINGS\OWNER\LOCAL SETTINGS\TEMP\YTASFWEPYLBGFUXT.TMP

Adware.Vundo/Variant-WinMM
C:\_OTM\MOVEDFILES\12052009_130009\C_WINDOWS\SYSTEM32\BOZOYIPO.DLL


And the ESET log:

ESETSmartInstaller@High as downloader log:
all ok
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6211
# api_version=3.0.2
# EOSSerial=9722ba532f3f384684c3ca2cf1c24b93
# end=finished
# remove_checked=true
# archives_checked=false
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2010-01-26 10:29:37
# local_time=2010-01-26 05:29:37 (-0500, Eastern Standard Time)
# country="United States"
# lang=1033
# osver=5.1.2600 NT Service Pack 2
# compatibility_mode=512 16777215 100 0 4443240 4443240 0 0
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=277194
# found=85
# cleaned=85
# scan_time=10322
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\removalfile.bat Win32/Adware.Virtumonde application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temp\s_loader.exe probably a variant of Win32/PSW.Sinowal trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\05O98FUZ\s_loader[1].exe probably a variant of Win32/PSW.Sinowal trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\ANYN2TQV\index[1] a variant of Win32/Kryptik.AB trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\ANYN2TQV\kb456456[1] probably a variant of Win32/Adware.Virtumonde application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\PLTBYY3A\kb516107[1] a variant of Win32/Adware.Virtumonde.NCK application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\RSC0DTJ6\index[1].pdf PDF/Exploit.Gen trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\RSC0DTJ6\query[1] a variant of Win32/Adware.Virtumonde.NCK application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-05-25 0149AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\VB333K9T\CAO9494B.htm Win32/Adware.MalwareAlarm application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Application Data\Microsoft\Windows\lsass.exe probably a variant of Win32/Agent trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\removalfile.bat Win32/Adware.Virtumonde application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temp\s_loader.exe probably a variant of Win32/PSW.Sinowal trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\01234527\kb456456[1] a variant of Win32/Adware.Virtumonde.NCB application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\4J13IM75\kb767887[1] Win32/Adware.SuperJuan application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\G9MVOXU3\kb671231[1] Win32/Adware.AdMedia application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\000060.exe a variant of Win32/Adware.ISM application (deleted - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\000080.exe a variant of Win32/TrojanDownloader.Small.IAW trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\000090.exe probably a variant of Win32/Genetik trojan (deleted - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\agvpdihl.dll Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\anxsjwjm.dll a variant of Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\bhtufa.dll Win32/BHO.NFH trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\bmqrvbhr.dll a variant of Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\cxkhyxvb.dll a variant of Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\dgjblvmw.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\eqlquhvm.dll Win32/Adware.SuperJuan application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\fribrfyk.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ftmwmmih.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\gjbroq.dll Win32/Adware.SuperJuan application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\gkxiar.dll Win32/BHO.NFH trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\hmhkwe.dll a variant of Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\hoeblvym.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\hqtloljk.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\hyslfg.dll a variant of Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\hyybcsjm.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ieksxyab.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\imiyjywv.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\iPWyyyxx.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\iPWyyyxx.ini2 Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\irylga.dll a variant of Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\isynvgxb.dll a variant of Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\iyvkupwj.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\jmjtmsrt.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\kiwulo.dll Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\kjycrgwy.dll a variant of Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\lmccftxg.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\lmehejco.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\mqdcnu.dll a variant of Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\mvvymvfu.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\mwgpcwqn.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\nfrpgpyj.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ofxcxqfi.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\oypouuwe.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\pjaathgt.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\pkekaxth.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\projyrrb.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\qbqbpl.dll a variant of Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\qiruqyhc.dll Win32/BHO.NFH trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\qsyfhjtc.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\siyskyjc.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\tmdjeomq.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ufxqvxeq.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\ugdrbx.dll Win32/BHO.NFH trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\uxwtqgrh.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\vfwprksh.dll Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\vswrbjou.dll Win32/BHO.NFH trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\wowqqnul.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\wsrnfnpo.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\xgideima.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\xiwrhxac.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\xpndjuiu.dll Win32/BHO.NFH trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 08-08-25 0344AM\WINDOWS\system32\zojqkb.dll Win32/Adware.Virtumonde.NAP application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\RXAA9NPW\AntiVirusInstaller[1].exe probably a variant of Win32/TrojanDownloader.Agent trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\VOJXZPFM\1733[1].pdf JS/Exploit.Pdfka.NCY trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\VOJXZPFM\update[1].exe Win32/Spy.Ambler trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\WY9C8MMI\i[2].js HTML/Iframe.B.Gen virus (deleted - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 09-03-16 0139AM\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\ZLKQ6M4P\652[1].pdf JS/Exploit.Pdfka.NCY trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 09-03-16 0139AM\WINDOWS\services.exe a variant of Win32/Injector.DO trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 09-03-16 0139AM\WINDOWS\system32\a.exe a variant of Win32/Injector.DO trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 09-03-16 0139AM\WINDOWS\system32\uwozizov.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 09-03-16 0139AM\WINDOWS\system32\drivers\etc\hosts Win32/Qhost trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 09-11-28 0551AM\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Client.class-3453216-524c87d6.class a variant of Java/TrojanDownloader.Agent.NAA trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\My Backup -- 09-11-28 0551AM\WINDOWS\system32\drivers\atapi.sys Win32/Olmarik.RF virus (deleted - quarantined) 00000000000000000000000000000000 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\smss32.exe.vir a variant of Win32/Kryptik.BZY trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\warning.html.vir Win32/TrojanDownloader.FakeAlert.AED virus (deleted - quarantined) 00000000000000000000000000000000 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\winlogon32.exe.vir a variant of Win32/Kryptik.BZY trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C

Things seem to be moving along much better. My browser is faster. My desktop and theme were restored, as well as use of my task manager and all media files, my caculator, etc.

shimmeringmisty
Novice
Novice

Status :
Online
Offline

Posts : 25
Joined : 2009-09-01
OS : XP

View user profile

Back to top Go down

Re: Removal of spyware?

Post by Dr Jay on Tue Jan 26, 2010 4:02 pm

Please do these in order:

Please download [You must be registered and logged in to see this link.], and save to your Desktop.
  • Double-click on Cheetah-Anti-Rogue.zip, and extract the file to your Desktop.
  • Double-click on Cheetah-Anti-Rogue.cmd to start.
  • It will finish quickly and launch a log.
  • Post the contents of it in your next reply.


Please re-open Malwarebytes, click the Update tab, and click Check for Updates. Then, click the Scanner tab, select Perform Full Scan, and press Scan. Remove selected, and post the log in your next reply.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Status :
Online
Offline

Posts : 13707
Joined : 2009-09-06
Gender : Male
OS : Windows 10 Home & Pro

View user profile

Back to top Go down

Re: Removal of spyware?

Post by shimmeringmisty on Wed Jan 27, 2010 3:16 am

Cheetah-Anti-Rogue v1.2.5
by DragonMaster Jay

Microsoft Windows XP [Version 5.1.2600]
Date: 01/26/2010 - Time: 19:09:38 - Arch.: x86


-- Malware tools check --
Trend Micro HijackThis 2.0.2
Malwarebytes' Anti-Malware
SUPERAntiSpyware


-- Known infection --



Extra message: Detection only.


EOF




Malwarebytes' Anti-Malware 1.44
Database version: 3642
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

1/26/2010 10:08:54 PM
mbam-log-2010-01-26 (22-08-54).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 408416
Time elapsed: 2 hour(s), 54 minute(s), 11 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 8

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP10\A0003938.sys (Malware.Trace) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP52\A0006912.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP52\A0007912.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP52\A0008000.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP52\A0008082.sys (Malware.Trace) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP7\A0002874.sys (Malware.Trace) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP7\A0002943.sys (Malware.Trace) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{593F298F-B7D6-4A3D-A260-6D7E68E3F587}\RP8\A0003358.sys (Malware.Trace) -> Quarantined and deleted successfully.

shimmeringmisty
Novice
Novice

Status :
Online
Offline

Posts : 25
Joined : 2009-09-01
OS : XP

View user profile

Back to top Go down

Re: Removal of spyware?

Post by Dr Jay on Wed Jan 27, 2010 5:29 am

Now to get you off to a good start we will clean your restore points so that all the bad stuff is gone for good. Then if you need to restore at some stage you will be clean. There are several ways to reset your restore points, but this is my method:
  • Select Start > All Programs > Accessories > System tools > System Restore.
  • On the dialogue box that appears select Create a Restore Point
  • Click NEXT
  • Enter a name e.g. Clean
  • Click CREATE

You now have a clean restore point, to get rid of the bad ones:
  • Select Start > All Programs > Accessories > System tools > Disk Cleanup.
  • In the Drop down box that appears select your main drive e.g. C
  • Click OK
  • The System will do some calculation and the display a dialogue box with TABS
  • Select the More Options Tab.
  • At the bottom will be a system restore box with a CLEANUP button click this
  • Accept the Warning and select OK again, the program will close and you are done


To remove all of the tools we used and the files and folders they created, please do the following:
Please download [You must be registered and logged in to see this link.] by OldTimer:

  • Save it to your Desktop.
  • Double click OTC.exe.
  • Click the CleanUp! button.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes.

Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.

==

Please download [You must be registered and logged in to see this link.] to your desktop
  • Please double-click TFC.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • It will close all programs when run, so make sure you have saved all your work before you begin.
  • Click the Start
    button to begin the process. Depending on how often you clean temp
    files, execution time should be anywhere from a few seconds to a minute
    or two. Let it run uninterrupted to completion.
  • Once it's finished it should reboot your machine. If it does not, please manually reboot the machine yourself to ensure a complete clean.


==

Download Security Check by screen317 from [You must be registered and logged in to see this link.] or [You must be registered and logged in to see this link.].
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Status :
Online
Offline

Posts : 13707
Joined : 2009-09-06
Gender : Male
OS : Windows 10 Home & Pro

View user profile

Back to top Go down

Re: Removal of spyware?

Post by shimmeringmisty on Wed Jan 27, 2010 8:24 am

Results of screen317's Security Check version 0.99.1
Windows XP Service Pack 2
Out of date service pack!!
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Disabled!
ESET Online Scanner v3
McAfee Uninstall Wizard
Antivirus up to date!
``````````````````````````````
Anti-malware/Other Utilities Check:

AOL Spyware Protection
SUPERAntiSpyware Free Edition
HijackThis 2.0.2
Java(TM) 6 Update 17
Adobe Flash Player 10
Adobe Reader 7.0
Out of date Adobe Reader installed!
``````````````````````````````
Process Check:
objlist.exe by Laurent

``````````````````````````````
DNS Vulnerability Check:

GREAT! (Not vulnerable to DNS cache poisoning)

`````````End of Log```````````

shimmeringmisty
Novice
Novice

Status :
Online
Offline

Posts : 25
Joined : 2009-09-01
OS : XP

View user profile

Back to top Go down

Re: Removal of spyware?

Post by Dr Jay on Wed Jan 27, 2010 11:50 am

Please upgrade to Windows XP SP3, because it includes all previously released updates. It also includes a small number of new functionalities. Some of the updates that Service Pack 3 provides, you may not have. It is now available via [You must be registered and logged in to see this link.].

More info about SP3: [You must be registered and logged in to see this link.]

==

Please download the newest version of Adobe Acrobat Reader from [You must be registered and logged in to see this link.]

Before installing: it is important to remove older versions of Acrobat Reader since it does not do so automatically and old versions still leave you vulnerable.
Go to the Control Panel and enter Add or Remove Programs.
Search in the list for all previous installed versions of Adobe Acrobat Reader. Uninstall/Remove each of them.

Once old versions are gone, please install the newest version.

==

Please read the following information that I have provided, which will help you prevent malicious software in the future. Please keep in mind, malware is a continuous danger on the Internet. It is highly important to stay safe while browsing, to prevent re-infection.

Software recommendations

Antivirus/Antispyware

  • [You must be registered and logged in to see this link.]: this is Microsoft's free antivirus/antispyware program. It equips you with protection against viruses, spyware, trojans, rootkits, and worms. It is also light on the computer's performance. Note: when installing this, you have both an antivirus and antispyware. Make sure you also get a firewall.
  • [You must be registered and logged in to see this link.]: this is one of the most powerful, and easiest to use security software. The free version equips you with protection against viruses, spyware, trojans, rootkits, worms, and rogue software. Note: when installing this, you have both an antivirus and antispyware. Make sure you also get a firewall.


Firewall

  • [You must be registered and logged in to see this link.]: the free version is just as good as the premium. I have linked you to the free version.
  • [You must be registered and logged in to see this link.]: the free version is just as good as the premium. I have linked you to the free version. The optional security suite enhances the firewall by 40% increase. If you would like to install the suite that includes antivirus, then remove your old antivirus first.
  • [You must be registered and logged in to see this link.]: free and excellent firewall.


Note: Please keep ALL of these programs up-to-date and run them whenever you suspect a problem to prevent malware problems.

Resident Protection help
A number of programs have resident protection and it is a good idea to run the resident protection of one of each type of program to maintain protection. However, it is important to run only one resident program of each type since they can conflict and become less effective. That means only one antivirus, firewall, and scanning anti-spyware program at a time. Passive protectors such as SpywareBlaster can be run with any of them.

Rogue programs help
There are a lot of rogue programs out there that want to scare you into giving them your money and some malware actually claims to be security programs. If you get a popup for a security program that you did not install yourself, do NOT click on it and ask for help immediately. It is very important to run an antivirus and firewall, but you can't always rely on reviews and ads for information. Ask in a security forum that you trust if you are not sure. If you are unsure and looking for anti-spyware programs, you can find out if it is a rogue here:
[You must be registered and logged in to see this link.]

Securing your computer

  • [You must be registered and logged in to see this link.] - It is very important to make sure that both Internet Explorer and Windows are kept current with the latest critical security patches from Microsoft. To do this just start Internet Explorer and select Tools > Windows Update, and follow the online instructions from there.
  • [You must be registered and logged in to see this link.] replaces your current HOSTS file with one containing well known ad sites and other bad sites. This prevents your computer from connecting to those sites by redirecting them to 127.0.0.1, which is your local computer's loopback address, meaning it will be difficult to infect your computer in the future.


Please consider using an alternate browser
Mozilla's Firefox browser is a very good alternative. In addition to being generally more secure than Internet Explorer, it has a very good built-in popup blocker and add-ons, like NoScript, can make it even more secure. Opera is another good option.

If you are interested:


See [You must be registered and logged in to see this link.] for more info about malware and prevention.

Thank you for choosing GeekPolice. Please see [You must be registered and logged in to see this link.] if you would like to leave feedback or contribute to our site. Do you have any more questions?


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Status :
Online
Offline

Posts : 13707
Joined : 2009-09-06
Gender : Male
OS : Windows 10 Home & Pro

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum