Rick210468 Posted May 11, 2005 Report Share Posted May 11, 2005 Hi all,I have recently experienced spyware intalling itself on my machine. Quite frankly I need help. I have downloaded spybot search and destroy, paid for adaware se pro and spyware eliminator (something like £80 in all) all of which have not been able remove anything from my laptop.My symptoms are:1 Sites automatically added to my favourites.2 My browser resetting itself to : about:blankAfter scanning my laptop with the relevant spyware software the results are:Cooolwwwsearch.aff.winshowURLSearchHook.AtlpzStartpage-EHI have printed off and read through the the case that was resolved for cultchie_girlbut am not too sure if I am doing the right trhing firstly and secondly am slightly worried about deletingthings from the registry that could eally damage my system.I have conducted a hijackthis scan and the results are:Logfile of HijackThis v1.99.1Scan saved at 21:23:40, on 10/05/2005Platform: Windows XP SP2 (WinNT 5.01.2600)MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)Running processes:C:\WINDOWS\System32\smss.exeC:\WINDOWS\system32\winlogon.exeC:\WINDOWS\system32\services.exeC:\WINDOWS\system32\lsass.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\System32\svchost.exeC:\Program Files\Common Files\Symantec Shared\ccSetMgr.exeC:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exeC:\WINDOWS\system32\spoolsv.exeC:\PROGRA~1\ALURIA~1\asKernel.exeC:\Program Files\Symantec AntiVirus\DefWatch.exeC:\Program Files\Dantz\Retrospect\retrorun.exeC:\Program Files\Symantec AntiVirus\SavRoam.exeC:\Program Files\Analog Devices\SoundMAX\SMAgent.exeC:\WINDOWS\System32\svchost.exeC:\Program Files\Symantec AntiVirus\Rtvscan.exeC:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VCSW\VCSW.exeC:\Program Files\TightVNC\WinVNC.exeC:\WINDOWS\System32\MsPMSPSv.exeC:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exeC:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzCdbSvc.exeC:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzFw.exeC:\WINDOWS\Explorer.EXEC:\WINDOWS\system32\wscntfy.exeC:\WINDOWS\System32\ezSP_Px.exeC:\WINDOWS\system32\ICO.EXEC:\WINDOWS\system32\rundll32.exeC:\Program Files\Sony\HotKey Utility\HKserv.exeC:\Program Files\sony\vaio power management\SPMgr.exeC:\Program Files\sony\vaio update 2\VAIOUpdt.exeC:\Program Files\Sony\Wireless Switch Setting Utility\Switcher.exeC:\WINDOWS\Logi_MwX.ExeC:\PROGRA~1\Maxtor\OneTouch\Utils\OneTouch.exeC:\Program Files\MSN Apps\Updater\01.02.3000.1001\en-gb\msnappau.exeC:\Program Files\Common Files\Symantec Shared\ccApp.exeC:\PROGRA~1\SYMANT~1\VPTray.exeC:\WINDOWS\system32\appvy.exeC:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exeC:\Program Files\Aluria Software\DrSpeed Suite\drspeed.exeC:\Program Files\Maximizer\Mxalarm.exeC:\Program Files\Maximizer\Mxfinder.exeC:\Program Files\Nikon\NkView6\NkvMon.exeC:\Program Files\sony\BlueSpace\BlueSpaceNE.exeC:\Program Files\Sony\HotKey Utility\HKWnd.exeC:\WINDOWS\system32\wuauclt.exeC:\Program Files\Lavasoft\Ad-Aware SE Professional\Ad-Watch.exeC:\Documents and Settings\Roderick Thorn\Desktop\HijackThis.exeR1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blankR1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R3 - Default URLSearchHook is missingO2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocxO2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dllO2 - BHO: Class - {B784881A-C236-6F52-D86B-285DC0FC4011} - C:\WINDOWS\syskb32.dllO3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\01.02.3000.1001\en-us\msntb.dllO3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dllO3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_5_7_0.dllO4 - HKLM\..\Run: [igfxTray] C:\WINDOWS\System32\igfxtray.exeO4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exeO4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\System32\ezSP_Px.exeO4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXEO4 - HKLM\..\Run: [bluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgentO4 - HKLM\..\Run: [HKSERV.EXE] C:\Program Files\Sony\HotKey Utility\HKserv.exeO4 - HKLM\..\Run: [sonyPowerCfg] C:\Program Files\sony\vaio power management\SPMgr.exeO4 - HKLM\..\Run: [VAIO Update 2] "C:\Program Files\sony\vaio update 2\VAIOUpdt.exe" /StationaryO4 - HKLM\..\Run: [switcher.exe] C:\Program Files\Sony\Wireless Switch Setting Utility\Switcher.exeO4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.ExeO4 - HKLM\..\Run: [WinVNC] "C:\Program Files\TightVNC\WinVNC.exe" -servicehelperO4 - HKLM\..\Run: [MaxtorOneTouch] C:\PROGRA~1\Maxtor\OneTouch\Utils\OneTouch.exeO4 - HKLM\..\Run: [msnappau] "C:\Program Files\MSN Apps\Updater\01.02.3000.1001\en-gb\msnappau.exe"O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exeO4 - HKLM\..\Run: [iexplore.exe] C:\Program Files\Internet Explorer\iexplore.exeO4 - HKLM\..\Run: [appvy.exe] C:\WINDOWS\system32\appvy.exeO4 - HKLM\..\RunOnce: [ipju32.exe] C:\WINDOWS\system32\ipju32.exeO4 - Startup: BlueSpace NE.lnk = C:\Program Files\sony\BlueSpace\BlueSpaceNE.exeO4 - Startup: Mortgage Brain Scheduler.LNK = C:\MBL\scheduler\MBScheduler.exeO4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exeO4 - Global Startup: Dr.Speed NetRx.lnk = C:\Program Files\Aluria Software\DrSpeed Suite\drspeed.exeO4 - Global Startup: MaxAlarm.lnk = C:\Program Files\Maximizer\Mxalarm.exeO4 - Global Startup: MaxFinder.lnk = C:\Program Files\Maximizer\Mxfinder.exeO4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXEO4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView6\NkvMon.exeO8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.htmlO8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.htmlO8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.htmlO8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.htmlO8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.htmlO9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dllO9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dllO9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dllO14 - IERESET.INF: START_PAGE_URL=http://www.wanadoo.co.uk/O15 - Trusted Zone: *.sony-europe.comO15 - Trusted Zone: *.sonystyle-europe.comO15 - Trusted Zone: *.vaio-link.comO15 - Trusted IP range: http://192.168.0.1O15 - Trusted IP range: http://81.77.11.109O17 - HKLM\System\CCS\Services\Tcpip\..\{CCA264C7-B389-495F-82BF-939BF9C043C6}: NameServer = 195.92.195.94,195.92.195.95O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dllO20 - Winlogon Notify: NavLogon - C:\WINDOWS\system32\NavLogon.dllO23 - Service: Workstation NetLogon Service ( 11Fßä#·ºÄÖ`I) - Unknown owner - C:\WINDOWS\system32\ntsg32.exe (file missing)O23 - Service: Aluria Security Center Spyware Eliminator Service (ASCService) - Unknown owner - C:\PROGRA~1\ALURIA~1\ascserv.exeO23 - Service: asKernel - Unknown owner - C:\PROGRA~1\ALURIA~1\asKernel.exeO23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exeO23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exeO23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exeO23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exeO23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exeO23 - Service: Retrospect Launcher (RetroLauncher) - Dantz Development Corporation - C:\Program Files\Dantz\Retrospect\retrorun.exeO23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exeO23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exeO23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exeO23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exeO23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exeO23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exeO23 - Service: VAIO Entertainment TV Device Arbitration Service - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCs\VzHardwareResourceManager\VzHardwareResourceManager.exeO23 - Service: VAIO Media Integrated Server (VAIOMediaPlatform-IntegratedServer-AppServer) - Sony Corporation - C:\Program Files\sony\VAIO Media Integrated Server\VMISrv.exeO23 - Service: VAIO Media Integrated Server (HTTP) (VAIOMediaPlatform-IntegratedServer-HTTP) - Unknown owner - C:\Program Files\sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe" /Service=VAIOMediaPlatform-IntegratedServer-HTTP /RegRoot="SOFTWARE\Sony Corporation\VAIO Media Platform\2.0" /RegExt="Applications\IntegratedServer\HTTP (file missing)O23 - Service: VAIO Media Integrated Server (UPnP) (VAIOMediaPlatform-IntegratedServer-UPnP) - Sony Corporation - C:\Program Files\sony\VAIO Media Integrated Server\Platform\UPnPFramework.exeO23 - Service: VAIO Media Gateway Server (VAIOMediaPlatform-Mobile-Gateway) - Unknown owner - C:\Program Files\sony\VAIO Media Integrated Server\Platform\VmGateway.exe" /Service=VAIOMediaPlatform-Mobile-Gateway /RegRoot="SOFTWARE\Sony Corporation\VAIO Media Platform\2.0" /RegExt="\Addons\Packages\Mobile\Gateway" /DisplayName="VAIO Media Gateway Server (file missing)O23 - Service: VAIO Entertainment UPnP Client Adapter (Vcsw) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VCSW\VCSW.exeO23 - Service: VAIO Entertainment Database Service (VzCdbSvc) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzCdbSvc.exeO23 - Service: VAIO Entertainment File Import Service (VzFw) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzFw.exeO23 - Service: VNC Server (winvnc) - Unknown owner - C:\Program Files\TightVNC\WinVNC.exe" -service (file missing)I really do not know what the hell I am doing and need step by step guidance in plane english as to how to get rid of this stuff off my laptop. I have to say I did not know that services / forums like this existed. I am really impressed. Thank you in advance.RegardsRick Link to post Share on other sites
alsocom Posted May 12, 2005 Report Share Posted May 12, 2005 Hello Rick and welcome to BestTechie.You may want to print out these instructions or save them to your desktop as a text file with Notepad because we will be restarting into Safe Mode later on in the fix and you might not be able to access the Internet.Prepare CWShredder for use:Download CWShredder.Save CWShredder.exe to a convenient location.Please do not do anything with it yet.[*]Prepare AboutBuster for use:Download AboutBuster.Unzip the contents of AboutBuster.zip and an AboutBuster directory will be created.Navigate to the AboutBuster directory and double-click on AboutBuster.exe.Click "OK" at the prompt with instructions.Click "Update" and then "Check For Update" to begin the update process.If any updates exist please download them by clicking "Download Update".You should not run the program yet so click "Exit".[*]Prepare cwsserviceremove.reg for use:Download cwsserviceremove.zip.Unzip the contents of cwsserviceremove.zip (cwsserviceremove.reg) to your desktop.Delete the cwsserviceremove.zip folder.Please do not do anything with it yet.[*]Reconfigure Windows XP to show hidden files:Click Start. Open My Computer.Select the Tools menu and click Folder Options. Select the View Tab.Under the Hidden files and folders heading select "Show hidden files and folders".Uncheck the "Hide protected operating system files (recommended)" option.Uncheck the "Hide file extensions for known file types" option.Click Yes to confirm. Click OK.[*]Disable the offending service.Go to Start->Run and type Services.msc then hit OkScroll down and find the service called : Workstation NetLogon Service When you find it, double-click on it. In the next window that opens, click the Stop button, then click on properties and under the General Tab, change the Startup Type to Disabled. Now hit Apply and then Ok and close any open windows. If you don´t find this service listed go ahead with the next steps.Boot into Safe Mode:Restart your computer and immediately begin tapping the F8 key on your keyboard.If done right a Windows Advanced Options menu will appear. Select the Safe Mode option and press Enter.To return to normal mode just restart your computer as you normally would.Run CWShredder:Double-click on CWShredder.exe.Click "Fix ->" and click "OK" at the prompt.CWShredder will scan and clean your system of CWS files.Click "Next->" and then "Exit".[*]Remove the offending service:Double-click on cwsserviceremove.reg you downloaded earlier.When it asks you to merge the information to the registry click "Yes".[*]Run AboutBuster and save the logs:Browse to where you saved AboutBuster and run AboutBuster.exe.Click OK at the directions prompt.Click Start and then OK to allow AboutBuster to scan for Alternate Data Streams.Click Yes to allow it to shutdown explorer.exe.It will begin to your computer for malicious files. If it asks if you would like to do a second pass, allow it to do so.When it has finished, click Save Log. Make sure you save it as I need a copy of it.[*]Fix with Hijackthis:Open Hijackthis, Run a scan and check the following:R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blankR1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system32\lhuvy.dll/sp.html#83556R3 - Default URLSearchHook is missingO2 - BHO: Class - {B784881A-C236-6F52-D86B-285DC0FC4011} - C:\WINDOWS\syskb32.dllO4 - HKLM\..\Run: [appvy.exe] C:\WINDOWS\system32\appvy.exeO4 - HKLM\..\RunOnce: [ipju32.exe] C:\WINDOWS\system32\ipju32.exeO23 - Service: Workstation NetLogon Service ( 11Fßä#·ºÄÖ`I) - Unknown owner - C:\WINDOWS\system32\ntsg32.exe (file missing)With all other programs and browsers closed, click fix checked.[*]Delete the following files:C:\WINDOWS\system32\appvy.exeC:\WINDOWS\system32\ipju32.exeC:\WINDOWS\system32\ntsg32.exe[*]Clean out temporary files:Start | Run | type cleanmgr | OKLet it scan your system for files to remove.Make sure Temporary Files, Temporary Internet Files, and Recycle Bin are the only things checked.Click "OK" to remove them.Click "Yes" to confirm the deletion.[*]Restart your computer normally to return to normal mode.[*]Free TrendMicro Housecall scan:You'll need to use Internet Explorer or Netscape browsers to run this scan.Vist the TrendMicro Housecall website.Select your country from the drop-down list and click "Go".Choose "Yes" at the ActiveX Security Warning prompt.Please wait while the Housecall engine is updated.Select the drives to be scanned by placing a check in their respective boxes.Check the "Auto Clean" box.Click "SCAN" in order to begin scanning your system.Please be patient while Housecall scans your system for malicious files.If not auto-cleaned, remove anything it finds.Click "Close" to exit the Housecall scanner.Choose "Yes" at the HouseCall message prompt.[*]Prepare your reply:Please post a fresh HijackThis log as a reply to this thread.Please post the AboutBuster log.Please note any complications you had. Link to post Share on other sites
Rick210468 Posted May 12, 2005 Author Report Share Posted May 12, 2005 Alan,I have followed the intructions that you provided. At point 5 the instruction stated to delete the following files C:\WINDOWS\system32\appvy.exeC:\WINDOWS\system32\ipju32.exeC:\WINDOWS\system32\ntsg32.exeI did this by going to search under start and searched for each file. The last one did not appear. I checked for it three times in order to be sure.Also, in point 4 the only files that appeared and that I checked were:04 - HKLM\..\Run:[appvy.exe]C:\WINDOWS\system32\appvy.exe04 - HKLM\..\RunOnce[ipju32.exe]C:\WINDOWS\system32\ipju.exeSo I checked the boxes and clicked on fix checked.Here is the about blaster log:Scanned at: 18:46:45 on: 12/05/2005-- Scan 1 ---------------------------About:Buster Version 4.0Reference List : 26Removed Data Streams:C:\WINDOWS\KB885835.log:azuhtC:\WINDOWS\opt_5030.ini:vgqlzC:\WINDOWS\Q323183.log:abzruC:\WINDOWS\SLSPTLNO.INI:pdaniRemoved! : C:\WINDOWS\hswjz.datRemoved! : C:\WINDOWS\system32\ekrge.datAttempted Clean Of Temp folder.Pages Reset... Done!-- Scan 2 ---------------------------About:Buster Version 4.0Reference List : 26Removed Data Streams:C:\WINDOWS\KB885835.log:azuhtC:\WINDOWS\opt_5030.ini:vgqlzC:\WINDOWS\Q323183.log:abzruC:\WINDOWS\SLSPTLNO.INI:pdaniAttempted Clean Of Temp folder.Pages Reset... Done!Here is the hijackthis log:Logfile of HijackThis v1.99.1Scan saved at 18:50:34, on 12/05/2005Platform: Windows XP SP2 (WinNT 5.01.2600)MSIE: Unable to get Internet Explorer version!Running processes:C:\WINDOWS\System32\smss.exeC:\WINDOWS\system32\winlogon.exeC:\WINDOWS\system32\services.exeC:\WINDOWS\system32\lsass.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\Explorer.EXEC:\Documents and Settings\Roderick Thorn\Desktop\HijackThis.exeO1 - Hosts: 84.66.219.98 cfm.zapto.orgO1 - Hosts: 70.85.147.68 forum.iamnotageek.comO1 - Hosts: 66.197.95.135 gallys.40somethingmag.comO1 - Hosts: 66.35.253.32 housecall.trendmicro.comO1 - Hosts: 207.246.157.244 oldsexlinks.comO1 - Hosts: 67.138.240.11 primehostreviews.comO1 - Hosts: 66.28.176.86 shadow.atkingdom.comO1 - Hosts: 207.246.157.249 spunkermovies.comO1 - Hosts: 195.171.171.21 www.bankofscotland.co.ukO1 - Hosts: 67.43.1.57 www.besttechie.netO1 - Hosts: 66.55.148.147 www.cosmic-cum.comO1 - Hosts: 66.28.176.236 www.erotiqlinks.comO1 - Hosts: 194.60.170.7 www.experian.co.ukO1 - Hosts: 63.105.4.85 www.hsbc.comO1 - Hosts: 66.250.223.113 www.localfoxes.netO1 - Hosts: 64.255.176.12 www.naughtyofficegallery.comO1 - Hosts: 63.105.4.113 www.offshore.hsbc.comO1 - Hosts: 205.241.15.113 www.offshore.hsbc.comO1 - Hosts: 212.227.253.104 www.safer-networking.orgO1 - Hosts: 69.50.130.78 www.snakesworld.comO1 - Hosts: 69.50.130.77 www.sonofsnake.comO1 - Hosts: 69.50.130.77 www.sonofsnake.comO2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocxO2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dllO3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\01.02.3000.1001\en-us\msntb.dllO3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dllO3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_5_7_0.dllO4 - HKLM\..\Run: [igfxTray] C:\WINDOWS\System32\igfxtray.exeO4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\System32\ezSP_Px.exeO4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXEO4 - HKLM\..\Run: [HKSERV.EXE] C:\Program Files\Sony\HotKey Utility\HKserv.exeO4 - HKLM\..\Run: [sonyPowerCfg] C:\Program Files\sony\vaio power management\SPMgr.exeO4 - HKLM\..\Run: [VAIO Update 2] "C:\Program Files\sony\vaio update 2\VAIOUpdt.exe" /StationaryO4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.ExeO4 - HKLM\..\Run: [MaxtorOneTouch] C:\PROGRA~1\Maxtor\OneTouch\Utils\OneTouch.exeO4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exeO4 - HKLM\..\Run: [appvy.exe] C:\WINDOWS\system32\appvy.exeO4 - HKLM\..\RunOnce: [ipju32.exe] C:\WINDOWS\system32\ipju32.exeO4 - HKLM\..\RunOnce: [javaml.exe] C:\WINDOWS\javaml.exeO4 - HKLM\..\RunOnce: [addjw32.exe] C:\WINDOWS\addjw32.exeO4 - HKLM\..\RunOnce: [appsk32.exe] C:\WINDOWS\appsk32.exeO4 - HKLM\..\RunOnce: [mfcgm.exe] C:\WINDOWS\mfcgm.exeO4 - HKLM\..\RunOnce: [ielg32.exe] C:\WINDOWS\system32\ielg32.exeO4 - HKLM\..\RunOnce: [d3os.exe] C:\WINDOWS\system32\d3os.exeO4 - HKLM\..\RunOnce: [iptm32.exe] C:\WINDOWS\iptm32.exeO4 - HKLM\..\RunOnce: [apixw.exe] C:\WINDOWS\apixw.exeO4 - HKLM\..\RunOnce: [ipod.exe] C:\WINDOWS\system32\ipod.exeO4 - HKLM\..\RunOnce: [appby32.exe] C:\WINDOWS\appby32.exeO4 - HKLM\..\RunOnce: [netat.exe] C:\WINDOWS\netat.exeO4 - HKLM\..\RunOnce: [javaev.exe] C:\WINDOWS\javaev.exeO4 - HKLM\..\RunOnce: [mfcfj32.exe] C:\WINDOWS\system32\mfcfj32.exeO4 - HKLM\..\RunOnce: [ntyh32.exe] C:\WINDOWS\ntyh32.exeO4 - HKLM\..\RunOnce: [appdk.exe] C:\WINDOWS\system32\appdk.exeO4 - HKLM\..\RunOnce: [ntqp32.exe] C:\WINDOWS\system32\ntqp32.exeO4 - HKLM\..\RunOnce: [d3xi32.exe] C:\WINDOWS\system32\d3xi32.exeO4 - HKLM\..\RunOnce: [ipdd.exe] C:\WINDOWS\system32\ipdd.exeO4 - HKLM\..\RunOnce: [ipiz.exe] C:\WINDOWS\ipiz.exeO4 - HKLM\..\RunOnce: [appwb32.exe] C:\WINDOWS\appwb32.exeO4 - HKLM\..\RunOnce: [sysfc.exe] C:\WINDOWS\sysfc.exeO4 - HKLM\..\RunOnce: [javalw32.exe] C:\WINDOWS\javalw32.exeO4 - HKLM\..\RunOnce: [sdkwc32.exe] C:\WINDOWS\sdkwc32.exeO4 - HKLM\..\RunOnce: [mfcke.exe] C:\WINDOWS\mfcke.exeO4 - HKLM\..\RunOnce: [winar.exe] C:\WINDOWS\system32\winar.exeO4 - HKLM\..\RunOnce: [mfcev.exe] C:\WINDOWS\mfcev.exeO4 - HKLM\..\RunOnce: [ippo32.exe] C:\WINDOWS\system32\ippo32.exeO4 - HKLM\..\RunOnce: [apisy32.exe] C:\WINDOWS\apisy32.exeO4 - HKLM\..\RunOnce: [ipmj.exe] C:\WINDOWS\system32\ipmj.exeO4 - HKLM\..\RunOnce: [crin32.exe] C:\WINDOWS\system32\crin32.exeO4 - HKLM\..\RunOnce: [ntrv.exe] C:\WINDOWS\system32\ntrv.exeO4 - HKLM\..\RunOnce: [sdkfk32.exe] C:\WINDOWS\system32\sdkfk32.exeO4 - HKLM\..\RunOnce: [sdklh32.exe] C:\WINDOWS\sdklh32.exeO4 - HKLM\..\RunOnce: [atlqd32.exe] C:\WINDOWS\atlqd32.exeO4 - HKLM\..\RunOnce: [sdktp32.exe] C:\WINDOWS\sdktp32.exeO4 - HKLM\..\RunOnce: [d3yt.exe] C:\WINDOWS\system32\d3yt.exeO4 - HKLM\..\RunOnce: [crzb32.exe] C:\WINDOWS\crzb32.exeO4 - HKLM\..\RunOnce: [javanq.exe] C:\WINDOWS\system32\javanq.exeO4 - HKLM\..\RunOnce: [crtn.exe] C:\WINDOWS\system32\crtn.exeO4 - HKLM\..\RunOnce: [mfchr.exe] C:\WINDOWS\system32\mfchr.exeO4 - HKLM\..\RunOnce: [d3bd.exe] C:\WINDOWS\system32\d3bd.exeO4 - HKLM\..\RunOnce: [sdkqk.exe] C:\WINDOWS\system32\sdkqk.exeO4 - HKLM\..\RunOnce: [sysgf32.exe] C:\WINDOWS\system32\sysgf32.exeO4 - HKLM\..\RunOnce: [ipgf.exe] C:\WINDOWS\system32\ipgf.exeO4 - HKLM\..\RunOnce: [mfckr32.exe] C:\WINDOWS\system32\mfckr32.exeO4 - HKLM\..\RunOnce: [winig.exe] C:\WINDOWS\winig.exeO4 - HKLM\..\RunOnce: [javahw32.exe] C:\WINDOWS\javahw32.exeO4 - HKLM\..\RunOnce: [netxe32.exe] C:\WINDOWS\system32\netxe32.exeO4 - HKLM\..\RunOnce: [ipfu.exe] C:\WINDOWS\ipfu.exeO4 - HKLM\..\RunOnce: [netgu.exe] C:\WINDOWS\system32\netgu.exeO4 - HKLM\..\RunOnce: [d3vj.exe] C:\WINDOWS\d3vj.exeO4 - HKLM\..\RunOnce: [sdkly32.exe] C:\WINDOWS\system32\sdkly32.exeO4 - HKLM\..\RunOnce: [javaej.exe] C:\WINDOWS\system32\javaej.exeO4 - Startup: BlueSpace NE.lnk = C:\Program Files\sony\BlueSpace\BlueSpaceNE.exeO4 - Startup: Mortgage Brain Scheduler.LNK = C:\MBL\scheduler\MBScheduler.exeO4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exeO4 - Global Startup: Dr.Speed NetRx.lnk = C:\Program Files\Aluria Software\DrSpeed Suite\drspeed.exeO4 - Global Startup: MaxAlarm.lnk = C:\Program Files\Maximizer\Mxalarm.exeO4 - Global Startup: MaxFinder.lnk = C:\Program Files\Maximizer\Mxfinder.exeO4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXEO4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView6\NkvMon.exeO8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.htmlO8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.htmlO8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.htmlO8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.htmlO8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.htmlO9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dllO9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dllO9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dllO14 - IERESET.INF: START_PAGE_URL=http://www.wanadoo.co.uk/O15 - Trusted Zone: *.sony-europe.comO15 - Trusted Zone: *.sonystyle-europe.comO15 - Trusted Zone: *.vaio-link.comO15 - Trusted IP range: http://192.168.0.1O15 - Trusted IP range: http://81.77.11.109O17 - HKLM\System\CCS\Services\Tcpip\..\{CCA264C7-B389-495F-82BF-939BF9C043C6}: NameServer = 195.92.195.94,195.92.195.95O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dllO23 - Service: Aluria Security Center Spyware Eliminator Service (ASCService) - Unknown owner - C:\PROGRA~1\ALURIA~1\ascserv.exeO23 - Service: asKernel - Unknown owner - C:\PROGRA~1\ALURIA~1\asKernel.exeO23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exeO23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exeO23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exeO23 - Service: CWShredder Service - InterMute, Inc. - C:\Documents and Settings\Roderick Thorn\Desktop\CWShredder.exeO23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exeO23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exeO23 - Service: Retrospect Launcher (RetroLauncher) - Dantz Development Corporation - C:\Program Files\Dantz\Retrospect\retrorun.exeO23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exeO23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exeO23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exeO23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exeO23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exeO23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exeO23 - Service: VAIO Entertainment TV Device Arbitration Service - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCs\VzHardwareResourceManager\VzHardwareResourceManager.exeO23 - Service: VAIO Media Integrated Server (VAIOMediaPlatform-IntegratedServer-AppServer) - Sony Corporation - C:\Program Files\sony\VAIO Media Integrated Server\VMISrv.exeO23 - Service: VAIO Media Integrated Server (HTTP) (VAIOMediaPlatform-IntegratedServer-HTTP) - Unknown owner - C:\Program Files\sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe" /Service=VAIOMediaPlatform-IntegratedServer-HTTP /RegRoot="SOFTWARE\Sony Corporation\VAIO Media Platform\2.0" /RegExt="Applications\IntegratedServer\HTTP (file missing)O23 - Service: VAIO Media Integrated Server (UPnP) (VAIOMediaPlatform-IntegratedServer-UPnP) - Sony Corporation - C:\Program Files\sony\VAIO Media Integrated Server\Platform\UPnPFramework.exeO23 - Service: VAIO Media Gateway Server (VAIOMediaPlatform-Mobile-Gateway) - Unknown owner - C:\Program Files\sony\VAIO Media Integrated Server\Platform\VmGateway.exe" /Service=VAIOMediaPlatform-Mobile-Gateway /RegRoot="SOFTWARE\Sony Corporation\VAIO Media Platform\2.0" /RegExt="\Addons\Packages\Mobile\Gateway" /DisplayName="VAIO Media Gateway Server (file missing)O23 - Service: VAIO Entertainment UPnP Client Adapter (Vcsw) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VCSW\VCSW.exeO23 - Service: VAIO Entertainment Database Service (VzCdbSvc) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzCdbSvc.exeO23 - Service: VAIO Entertainment File Import Service (VzFw) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzFw.exeO23 - Service: VNC Server (winvnc) - Unknown owner - C:\Program Files\TightVNC\WinVNC.exe" -service (file missing)I tried to follow the steps that you provided in section 8 however when trying to launch internet explorer my system had to search for the interent explorer. It then asked if I wanted to fix the problem as it could locate it. I said to fix it which it did and I was then able to get onto the interent as eplorer reactivated. However, the webpage set itself to about:blank and al of the favourates that had intalled themselves had not been removed from the favourates list. I then trid to log onto the free trendmicro housecall site and was initally able to do this. I disambled all of the pop up blockers and when trying to install the relevant software from the site (which I assume was the active x controls it experienced difficulties and asked if I wanted to send a report to Msoft. I clicked on no and explorer closed itself down. I tried to follow the same steps twice but to no avail.This is really worrying, what do you think?Thanks for your time and help, it is much appreciated. I will await your next guidance.Rick Link to post Share on other sites
Rick210468 Posted May 12, 2005 Author Report Share Posted May 12, 2005 Alan,Just to let you know that I have also just noticed that there has appeared a folder on my desk top called backups. The folder has two file in there which have been modified on today date. I have checked the other four computers in my office and after checking the history on all of them is one other that has been surfing porn sites today. I noticed from the hijack this log that my laptop has been surfing pornsites today. I assume that this is how this stuff intalls itself on the system?Please advise in order for me to investigate this internally with my staff. Link to post Share on other sites
Rick210468 Posted May 12, 2005 Author Report Share Posted May 12, 2005 Alan,Just at home now and trying to go through your instructions again. However when I got to section 5 of your instructions and typed services.msc. I looked for Workstation NetLog services it was not there. What was there was Workstation .I just thought this might be relevant. I am not going to do anything until I hear from you.RegardsRick Link to post Share on other sites
alsocom Posted May 13, 2005 Report Share Posted May 13, 2005 To be honest with you, I am not entirely sure where the infection comes from. Many people have been infected that have not been to porn sites.The folder called backups on the desktop was created by Hijackthis. It stores everything fixed just in case they may be needed later.The service in step 5 was successfully removed.Boot into Safe Mode:Restart your computer and immediately begin tapping the F8 key on your keyboard.If done right a Windows Advanced Options menu will appear. Select the Safe Mode option and press Enter.To return to normal mode just restart your computer as you normally would.Run CWShredder:Double-click on CWShredder.exe.Click "Fix ->" and click "OK" at the prompt.CWShredder will scan and clean your system of CWS files.Click "Next->" and then "Exit".[*]Run AboutBuster and save the logs:Browse to where you saved AboutBuster and run AboutBuster.exe.Click "OK" at the directions Read: Important! prompt.Click "Start" and then "OK" to allow AboutBuster to scan for Alternate Data Streams.Click "Yes" at the About:Buster prompt to allow it to shutdown explorer.exe.Please wait while AboutBuster scans your computer for malicious files. If it asks if you would like to do a second pass, allow it to do so.When it has finished, click "Save Log...". Make sure you save it as I will need a copy of it.Click "Exit" and "Exit" again to exit AboutBuster.[*]Clean out temporary files:Start | Run | type cleanmgr | OKLet it scan your system for files to remove.Make sure Temporary Files, Temporary Internet Files, and Recycle Bin are the only things checked.Click "OK" to remove them.Click "Yes" to confirm the deletion.[*]Restart your computer normally to return to normal mode.[*]Free online antivirus scans:Run at least two of the following online virus scans making sure to reboot in between each one. Allow them to fix anything they find.You need to use Internet Explorer or Netscape browsers.BitdefenderPandasoftwareTrend Micro << Click Auto Clean Symantec Security Check << click scan for virusesRAV Online Virus Scanner << Enter your e-mail address and click on To continue without subscribing McAfee[*]Prepare your reply:Please post a fresh HijackThis log as a reply to this thread.Please post the AboutBuster log.Please note any complications you had. Link to post Share on other sites
Rick210468 Posted May 13, 2005 Author Report Share Posted May 13, 2005 Hi,Right then here we go:I ran through the last set of instructions that you provided. Here is a copy of the report that I obtained from the scan that was conducted on the RAV website:started at 13/05/2005 16:13:40 Scanning memory...Scanning boot sectors...Scanning files...C:\WINDOWS\002629_.tmp->ADS:ymwlp - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\002629_.tmp->ADS:cxhtcd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\aaxexfg.cfg->ADS:fdnuj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\addad.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addci32.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\addep32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addfd32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addhj32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addhv.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addiw.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addjn.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addjw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addkg32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addkv32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addnf32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addnk.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addoh.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addqw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addrd.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addry32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addsp32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addtk.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addyh32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\addzv32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apibw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apidt32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apidu.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apidv.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apidw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apiee32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apihq.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apihy.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apiif.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apije32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apijh32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apilq.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apilr.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apipm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apipr32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apiqf32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apirt.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apisy32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apiut.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apivt32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apixw.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apiyp.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apiyv32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appaj32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appav.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appay.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appby32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appdg.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appet32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appeu.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appft.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appge32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appha.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apphd32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apphn.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appih32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appkl32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appky.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\applf.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appmm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appnw.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appoi.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appra.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\apprz32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appsk32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appuu.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appwb32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appwv32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\appxa.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlbg.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlcr.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlcv.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlfd.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlfo.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlgi.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlhp32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlhw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlin32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atliw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atljn32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlmg.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlnd32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlnw.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlqd32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atltc.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atlyy.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\atzrz.log->ADS:gdxjs - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\aucfg.ini->ADS:hlzmwx - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Bclwdde.ini->ADS:kdzkw - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Bclwdde.ini->ADS:dteig - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Bclwdde.ini->ADS:aicmu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Blue Lace 16.bmp->ADS:osukd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Blue Lace 16.bmp->ADS:fqgwr - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\BlueSpaceNE.INI->ADS:fcamv - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\BRRBATOM_1430->ADS:fvfbk - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\BRWMARK.INI->ADS:rsxqq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\BRWMARK.INI->ADS:qkymt - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\BTI.INI->ADS:kzyzte - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\BTI.INI->ADS:gzyzs - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\cmsetacl.log->ADS:sjceh - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\crbe32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crdv.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crek.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crey32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crgf32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crhy32.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\crio32.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\crle.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crlo.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crml.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crne.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\croh32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crpo.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crtl32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crtm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crto32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crvg.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crvn.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crxy.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\cryi.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\cryu32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crzb32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\crzo.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\CTPDB.INI->ADS:hzpnm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\CTPDB.INI->ADS:gsmfo - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\CTPDEMO.INI->ADS:ycjfh - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\CTPDEMO.INI->ADS:qnepb - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\CTPEDI.INI->ADS:xootn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\CTPEDI.INI->ADS:czivw - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\CTPEDI.INI->ADS:bectw - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\CTPEDI.INI->ADS:adbrx - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\cwydf.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\d3ad.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3ao32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3ar.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\d3bn32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3ca32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3ec.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3ep.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3fo32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3he32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3iz.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3lf32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3mg32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3pb.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3qs32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3qu.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3qz32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3sr32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3sz32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3tg32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3tk32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3vg32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3vj.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3vs32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\d3wt.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\dahotfix.log->ADS:kwrcb - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\DBNAMES.CFG->ADS:yewue - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\desktop.ini->ADS:cjdvl - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\dsmwq.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\DtcInstall.log->ADS:cmbrq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\EQIMEX.INI->ADS:bzlsm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\eXInsUtl.ini->ADS:vtzed - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\eXInsUtl.ini->ADS:iirmj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\explorer.scf->ADS:jgqzg - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\FaxSetup.log->ADS:aicmu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\FeatherTexture.bmp->ADS:upwlu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ftbqo.txt->ADS:gvgll - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\gatbn.txt->ADS:zwbws - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\gatbn.txt->ADS:lboua - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Gone Fishing.bmp->ADS:pqbkt - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Gone Fishing.bmp->ADS:hcsrw - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Gone Fishing.bmp->ADS:gleyq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\gvhpv.txt->ADS:gysfc - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\hcmgc.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\IE4 Error Log.txt->ADS:zylkw - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\IE4 Error Log.txt->ADS:yxuab - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\IE4 Error Log.txt->ADS:lusxy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\iecc32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iecd32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ieck32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iecm.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ieec32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iegh.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iehm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iehu32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iein32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ieiq.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iekd32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ielh.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ieli.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ielj32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iepe32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iepk.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iepw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ieqm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ierl32.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\iesm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iesq.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ieto32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ieuu.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ievo32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ievy.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iewj32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iexc.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ieyd.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iezh.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\iezx.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iis6.log->ADS:qgcfc - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\imsins.BAK->ADS:gjkcb - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\imsins.BAK->ADS:dybqf - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\intuprof.ini->ADS:ypfoc - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\intuprof.ini->ADS:kyghj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\intuprof.ini->ADS:dfyxq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ipam32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipbs32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipcb32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipdf32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipfh.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipfn.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipfu.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipgr32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iphc.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iphy.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipiz.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipjb.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipjn.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iplf.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\iplp.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iptm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipwt32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ipxm.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\iuijk.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\jautoexp.dat->ADS:snnfj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\javabr32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javacf32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javaev.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javafx32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javaho32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javahw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javajm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javako.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javakq32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javaku32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javakx32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javalw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javamc32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javaml.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javapl.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javaqz.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javavo.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javawc.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javaxd.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javayg.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javayx32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javaza.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\javazo.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\KB810217.log->ADS:eqfiq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB817611.log->ADS:wkdds - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB817611.log->ADS:swmgm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB820291.log->ADS:hfriu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB822603.log->ADS:vgest - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB822603.log->ADS:ialjdj - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\KB822827.log->ADS:jsjuc - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB822827.log->ADS:jnfnsq - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\KB823182.log->ADS:olujp - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB823182.log->ADS:fmrqy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB823182.log->ADS:erudg - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB824105.log->ADS:nhxxn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB824105.log->ADS:clxrp - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB824141.log->ADS:ywaeh - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB824141.log->ADS:bihro - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB825119.log->ADS:qqsaj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB826942.log->ADS:ueunj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB826942.log->ADS:mpiggd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB828028.log->ADS:tbrhr - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB828028.log->ADS:ksldl - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB828028.log->ADS:jrdom - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB828028.log->ADS:gbklm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB833987.log->ADS:lepkq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB834707-IE6SP1-20040929.091901.log->ADS:ieunl - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB839643-DirectX9.log->ADS:qutzd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB840315.log->ADS:popvyx - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\KB840374.log->ADS:secry - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB840374.log->ADS:clial - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB841356.log->ADS:ujbow - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB841356.log->ADS:fxakk - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB841533.log->ADS:txkux - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB873339.log->ADS:dvtoc - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB873376.log->ADS:ppton - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB887811.log->ADS:aobmg - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\KB889293-IE6SP1-20041111.235619.log->ADS:jrmrsz - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\kqbvj.log->ADS:iukcy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ktmqz.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\Max75.tsf->ADS:myclj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Maximizer.MIF->ADS:taynu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Maximizer.MIF->ADS:crwxub - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\MaxSelfreg.log->ADS:zxedyv - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\MedCtrOC.log->ADS:lbxzp - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\MedCtrOC.log->ADS:khcwz - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\mfcae32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcej32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfces32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcev.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcfo.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcgm.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcjq32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfckb.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcke.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcml.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcmp.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcmv.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcqb.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcqu32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mfcyc.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\mfcyy.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mlanj.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\mmroa.log->ADS:fleyl - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ModemLog_CXT AC-Link Modem for Intel.txt->ADS:lwysq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ModemLog_Standard Modem over Bluetooth link.txt->ADS:mqwms - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\msan.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msbt32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msdfmap.ini->ADS:lmjab - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\msdfmap.ini->ADS:cyzwg - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\msdfmap.ini->ADS:ciuctx - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msfa32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msga32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msge.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msgr32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msgt32.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\msgw.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mshx32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msjg32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mskv.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\mskx32.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\mslw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msmqinst.log->ADS:jtayw - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\msmqinst.log->ADS:itqrd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\msmqinst.log->ADS:iamxh - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\msmqinst.log->ADS:fqxez - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\msmy.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msnl.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mssz.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mstx32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msvq.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msvy32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msvz.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msxe.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msxi.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msxo.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\msyb32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\mszn32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\naxmxtg.dat->ADS:auiwx - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\nbupj.txt->ADS:njyupj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\netat.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netau.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netaz32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netbz.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netbz32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netcw.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netdk.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netfxocm.log->ADS:odexm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\netfxocm.log->ADS:mvysr - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\netfy32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netij32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netir32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netji32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netkg.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netlz.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netmm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netmr32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netmv.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netoz.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netsb.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netya.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\netyo32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netyp32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netyv.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\netzw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntat32.exe - Trojan:Win32/Agent.BI -> InfectedC:\WINDOWS\ntbt.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntbtlog.txt->ADS:zuqql - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ntbtlog.txt->ADS:rapmt - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ntde32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntdj32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntdn.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntdtcsetup.log->ADS:gzdun - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ntdtcsetup.log->ADS:bqadn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\nteh.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntet.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\nthk32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntja.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntjs32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntmh32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntmz.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntnu.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntnu32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntpa.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntqt32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\nttc.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntyh32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntym.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\ntzr.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\oaybq.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\ocgen.log->ADS:svidf - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ocgen.log->ADS:bmmrd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ocmsn.log->ADS:uxjok - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ocmsn.log->ADS:upyfu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ocmsn.log->ADS:rtpzt - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ocmsn.log->ADS:gqgcn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ODBC.INI->ADS:mbnmi - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ODBC.INI->ADS:jdupw - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\ODBCINST.INI->ADS:wzbya - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\OEWABLog.txt->ADS:pnper - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\opt_5030.ini->ADS:ugfoa - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\opt_5030.ini->ADS:kcmqh - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\oqdgt.txt->ADS:zorxr - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\otqdl.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\PCPCONT.INI->ADS:hpnqxb - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\PCPCONT.INI->ADS:hcnhj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\PKFI.INI->ADS:lnkpn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\pqxvx.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\psql.MIF->ADS:qajdt - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\pvsw.log->ADS:zilbq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\pvsw.log->ADS:xpvwu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\pvsw.log->ADS:evmnb - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q307419.log->ADS:uxvfa - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q327979.log->ADS:ukhro - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q327979.log->ADS:ajxjv - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q811228.log->ADS:xymwm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q811228.log->ADS:jwyvk - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q811789.log->ADS:rktmqz - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q811789.log->ADS:nlswi - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q813818.log->ADS:hknpfy - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\Q813818.log->ADS:hayas - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q813818.log->ADS:fvaek - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q813862.log->ADS:lckkr - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q813862.log->ADS:hsbit - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q813942.log->ADS:ycdxe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q813942.log->ADS:adnut - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q814995.log->ADS:nporp - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q815917.log->ADS:vprcx - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q816048.log->ADS:zbiof - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q816048.log->ADS:qwxce - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Q816048.log->ADS:cmwwm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\quicken.lic->ADS:lzztv - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\QUOTES.INI->ADS:excqqn - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\qwimp.ini->ADS:lvkpi - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\qwimp.ini->ADS:ebtpn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\REGKEYCR.INI->ADS:uugim - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\REGLOCS.OLD->ADS:wquwsx - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\REGLOCS.OLD->ADS:jychw - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\REGLOCS.OLD->ADS:fribo - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Rhododendron.bmp->ADS:mvzca - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\rvtov.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\Santa Fe Stucco.bmp->ADS:nxfwr - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\sccli.dat->ADS:mwmfn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\SchedLgU.Txt->ADS:uhfad - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\SchedLgU.Txt->ADS:qgklv - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\sdkcs32.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\sdkdm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sdkfh32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sdkhm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sdklh32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sdkoo.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sdkqh.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sdkri.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sdktj.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sdktp32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sdkwc32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sdkxh32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sdkzb32.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\sdkzq32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sessmgr.setup.log->ADS:vhdbc - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\sessmgr.setup.log->ADS:fckni - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\setupact.log->ADS:urmfp - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\setupapi.log->ADS:vznrxw - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\setuperr.log->ADS:zazse - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\setuperr.log->ADS:oqyfv - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\setuperr.log->ADS:myndo - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\setuplog.txt->ADS:fselr - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\sgdhz.txt->ADS:nzxfrg - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\sgdhz.txt->ADS:jtzjq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\SLS.INI->ADS:vyypf - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\SLS.INI->ADS:iimeb - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\SLS.INI->ADS:gpmyj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\SLS.INI->ADS:fuopg - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\SLSPMODM.INI->ADS:giyiu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\smscfg.ini->ADS:vxutyn - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\smscfg.ini->ADS:owhhn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\smscfg.ini->ADS:fzrta - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\spupdsvc.log->ADS:yrugr - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\spupdsvc.log->ADS:nymysy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\sysal32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sysaz32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sysbj.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sysfc.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sysix32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\syski.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\syskr.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\syslm.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sysls32.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\syslv32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sysnq.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sysnt32.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\sysny32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sysro32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\system.ini->ADS:lnrnd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\system.ini->ADS:aelxf - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\sysuv32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sysvq32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\syswt32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\sysxl32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\tabletoc.log->ADS:tyrie - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\tabletoc.log->ADS:atbzb - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\tmupdate.ini->ADS:lmukr - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\tmupdate.ini->ADS:jzyih - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\tsoc.log->ADS:kujyi - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\tsoc.log->ADS:bumiko - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\txllx.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\uemhs.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\uoyag.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\uwdeb.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 1024x768.bmp->ADS:uvenm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 1024x768.bmp->ADS:ggtuh - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 1280x1024.bmp->ADS:vwpwq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 1400x1050.bmp->ADS:fabyz - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 1600x1200.bmp->ADS:ufudc - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 1600x1200.bmp->ADS:lfiom - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 1600x1200.bmp->ADS:hiqvk - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 1920x1200.bmp->ADS:qhddlz - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 768x1024.bmp->ADS:wzetd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 768x1024.bmp->ADS:rfvmp - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 768x1024.bmp->ADS:jnkvcq - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\VAIO GrandBlue Wallpaper TrueColor 768x1024.bmp->ADS:akzsn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1024x768.bmp->ADS:zjjam - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1024x768.bmp->ADS:dfsth - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1024x768.bmp->ADS:apkcj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1280x1024.bmp->ADS:ihvifj - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1280x1024.bmp->ADS:bvjed - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1280x768.bmp->ADS:zyenw - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1280x768.bmp->ADS:cgubea - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1280x800.bmp->ADS:jcmif - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1280x800.bmp->ADS:gjitt - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1280x800.bmp->ADS:atzrz - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1400x1050.bmp->ADS:xegzl - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1400x1050.bmp->ADS:tiovhm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1600x1200.bmp->ADS:tdnak - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1600x1200.bmp->ADS:fsdaz - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1920x1200.bmp->ADS:knjws - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 1920x1200.bmp->ADS:bdxvz - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 768x1024.bmp->ADS:xjiwy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Pattern Wallpaper TrueColor 768x1024.bmp->ADS:hkkra - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Scene Wallpaper TrueColor 1280x1024.bmp->ADS:euhba - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Scene Wallpaper TrueColor 1280x768.bmp->ADS:uatiq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Scene Wallpaper TrueColor 1280x800.bmp->ADS:vyjnp - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Scene Wallpaper TrueColor 1400x1050.bmp->ADS:ujmdi - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Scene Wallpaper TrueColor 1400x1050.bmp->ADS:ualmq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Scene Wallpaper TrueColor 1400x1050.bmp->ADS:ftxuw - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Scene Wallpaper TrueColor 1600x1200.bmp->ADS:xrdtiz - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\VAIO SLIT Scene Wallpaper TrueColor 1920x1200.bmp->ADS:ovavf - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\VAIO SLIT Scene Wallpaper TrueColor 1920x1200.bmp->ADS:mtxmq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\vbaddin.ini->ADS:vpeifs - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\vbaddin.ini->ADS:qjwyi - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\vbaddin.ini->ADS:pswycj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\vbaddin.ini->ADS:igogu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\W32UCADM.INI->ADS:qkbrrk - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\wgvlk.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\wiadebug.log->ADS:nixozc - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\wiadebug.log->ADS:mwask - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\wiaservc.log->ADS:yoybd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\win.ini->ADS:qirpv - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\win.ini->ADS:duxrk - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\winau.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winco.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\wincz32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\WindowsUpdate.log->ADS:fsesup - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\windx.exe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\winea.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winfs32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\wingc32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\wingo32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winib32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winig.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winjw32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winkj32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winky32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winle32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winlm32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winmc.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winnt.bmp->ADS:mvsej - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\winnt.bmp->ADS:kzpwq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\winnt.bmp->ADS:kmfch - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\winnt.bmp->ADS:efzbz - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\winpl32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winql32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winqt.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winrb32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winrj32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winrx.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winuu32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winxh32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winze.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\winzk32.exe - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\WMPrfCSY.prx->ADS:oigbp - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfCSY.prx->ADS:mxraj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfDeu.prx->ADS:ewkkd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfFIN.prx->ADS:qiybn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfFIN.prx->ADS:fcfjl - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfFIN.prx->ADS:cyzwg - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfFRA.prx->ADS:vvvhpt - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\WMPrfFRA.prx->ADS:svyvg - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfFRA.prx->ADS:sllpj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfFRA.prx->ADS:mfiel - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfITA.prx->ADS:xggdo - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfITA.prx->ADS:mlkzul - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfITA.prx->ADS:igjtf - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfITA.prx->ADS:gofgz - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfNLD.prx->ADS:pnzui - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMPrfPTG.prx->ADS:cuvpa - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\wmsetup10.log->ADS:rlnjc - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\wmsetup10.log->ADS:hmlzg - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\wmsetup10.log->ADS:ajbci - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMSysPr9.prx->ADS:oxntx - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMSysPr9.prx->ADS:opfei - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMSysPr9.prx->ADS:iqibd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WMSysPrx.prx->ADS:exaehp - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\WUCADMIN.INI->ADS:pjsmy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WUCADMIN.INI->ADS:lsjqq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\WUCADMIN.INI->ADS:lehpn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\xaafg.log->ADS:sgvlo - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\xaafg.log->ADS:epfzj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\xaafg.log->ADS:cytga - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\xpsp1hfm.log->ADS:vxyfn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\xpsp1hfm.log->ADS:fgqfu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\xuqfs.txt->ADS:wgrdv - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\xuqfs.txt->ADS:jkwow - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\yafyj.log->ADS:tbugzi - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\yhbzq.dll - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\Zapotec.bmp->ADS:pgjix - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\Zapotec.bmp->ADS:etcvk - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:kduyj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:kbtmdw - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\_default.pif->ADS:jxabgf - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jvuem - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:juqqf - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jtrlj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jrbsl - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jraby - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jqlbi - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:joshm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:joljf - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jmciy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jlnzb - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jkwow - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jjkup - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jjkru - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jeojnu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jccav - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:jbncul - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\_default.pif->ADS:irxke - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:irrdv - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:irnkk - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:iqqdy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ipnark - Trojan:Win32/Small.DV -> InfectedC:\WINDOWS\_default.pif->ADS:iowsj - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:imlnu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:iihea - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ifhah - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ieffq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:iduoy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:hzxok - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:hozbd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:hizqa - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:hiqrl - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:hbxqk - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:hblrn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:gzuur - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:gywkb - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:gyvog - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:gufgp - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:gmyra - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:gjkgz - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ghxzo - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ghfxm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ghaeq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:gefqa - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:gbtin - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:gatbnh - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ftoor - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ftndx - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ftbqog - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:fkylq - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:fcflw - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:fauspc - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ezwgk - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ezpzwi - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\_default.pif->ADS:ewhvr - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ewdcm - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:embuu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ekvjy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ejouzl - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:efhxu - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:eekbd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:ebcmv - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:eaaosd - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:dyris - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:dwzvxy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:dwsyr - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:dtwpnc - TrojanDownloader:Win32/WinShow.AK -> SuspiciousC:\WINDOWS\_default.pif->ADS:dphcs - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:dnkps - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:dnjqi - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:dmsbo - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:dfgtzb - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:dcqmn - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:cxxke - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:cwfjp - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:cukyl - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:cjhtc - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:cinya - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:chtln - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:cehoqf - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:cdrbe - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:cblrfy - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_default.pif->ADS:cbgza - TrojanDownloader:Win32/Agent.BX -> InfectedC:\WINDOWS\_defaul Link to post Share on other sites
Rick210468 Posted May 13, 2005 Author Report Share Posted May 13, 2005 OK:here is the last hijackthis lof that I conducted:Logfile of HijackThis v1.99.1Scan saved at 18:33:30, on 13/05/2005Platform: Windows XP SP2 (WinNT 5.01.2600)MSIE: Unable to get Internet Explorer version!Running processes:C:\WINDOWS\System32\smss.exeC:\WINDOWS\system32\winlogon.exeC:\WINDOWS\system32\services.exeC:\WINDOWS\system32\lsass.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\Explorer.EXEC:\Documents and Settings\Roderick Thorn\Desktop\HijackThis.exeR1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blankR1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R3 - Default URLSearchHook is missingO1 - Hosts: 84.66.219.98 cfm.zapto.orgO1 - Hosts: 70.85.147.68 forum.iamnotageek.comO1 - Hosts: 66.197.95.135 gallys.40somethingmag.comO1 - Hosts: 66.35.253.32 housecall.trendmicro.comO1 - Hosts: 207.246.157.244 oldsexlinks.comO1 - Hosts: 67.138.240.11 primehostreviews.comO1 - Hosts: 206.204.52.6 security.symantec.comO1 - Hosts: 66.28.176.86 shadow.atkingdom.comO1 - Hosts: 207.246.157.249 spunkermovies.comO1 - Hosts: 195.171.171.21 www.bankofscotland.co.ukO1 - Hosts: 67.43.1.57 www.besttechie.netO1 - Hosts: 213.150.62.120 www.bitdefender.comO1 - Hosts: 66.55.148.147 www.cosmic-cum.comO1 - Hosts: 66.28.176.236 www.erotiqlinks.comO1 - Hosts: 194.60.170.7 www.experian.co.ukO1 - Hosts: 66.249.87.99 www.google.co.ukO1 - Hosts: 63.105.4.85 www.hsbc.comO1 - Hosts: 66.250.223.113 www.localfoxes.netO1 - Hosts: 64.255.176.12 www.naughtyofficegallery.comO1 - Hosts: 63.105.4.113 www.offshore.hsbc.comO1 - Hosts: 205.241.15.113 www.offshore.hsbc.comO1 - Hosts: 193.108.153.116 www.pandasoftware.comO1 - Hosts: 213.233.121.11 www.ravantivirus.comO1 - Hosts: 212.227.253.104 www.safer-networking.orgO1 - Hosts: 69.50.130.78 www.snakesworld.comO1 - Hosts: 69.50.130.77 www.sonofsnake.comO1 - Hosts: 69.50.130.77 www.sonofsnake.comO1 - Hosts: 202.27.184.102 www.xtra.co.nzO1 - Hosts: 202.27.184.102 www.xtra.co.nzO1 - Hosts: 202.27.184.102 www.xtra.co.nzO1 - Hosts: 202.27.184.102 www.xtra.co.nzO2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocxO2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dllO2 - BHO: Class - {FBF77D9B-CA17-A517-257C-C38A16C5AD4F} - C:\WINDOWS\mfcae32.dllO3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\01.02.3000.1001\en-us\msntb.dllO3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dllO3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_5_7_0.dllO4 - HKLM\..\Run: [igfxTray] C:\WINDOWS\System32\igfxtray.exeO4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\System32\ezSP_Px.exeO4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXEO4 - HKLM\..\Run: [HKSERV.EXE] C:\Program Files\Sony\HotKey Utility\HKserv.exeO4 - HKLM\..\Run: [sonyPowerCfg] C:\Program Files\sony\vaio power management\SPMgr.exeO4 - HKLM\..\Run: [VAIO Update 2] "C:\Program Files\sony\vaio update 2\VAIOUpdt.exe" /StationaryO4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.ExeO4 - HKLM\..\Run: [MaxtorOneTouch] C:\PROGRA~1\Maxtor\OneTouch\Utils\OneTouch.exeO4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exeO4 - HKLM\..\Run: [netmp32.exe] C:\WINDOWS\system32\netmp32.exeO4 - HKLM\..\RunOnce: [javaml.exe] C:\WINDOWS\javaml.exeO4 - HKLM\..\RunOnce: [ipya32.exe] C:\WINDOWS\system32\ipya32.exeO4 - HKLM\..\RunOnce: [sysbj.exe] C:\WINDOWS\sysbj.exeO4 - HKLM\..\RunOnce: [appsm.exe] C:\WINDOWS\system32\appsm.exeO4 - HKLM\..\RunOnce: [apiif.exe] C:\WINDOWS\apiif.exeO4 - HKLM\..\RunOnce: [winmq.exe] C:\WINDOWS\system32\winmq.exeO4 - HKLM\..\RunOnce: [msfq.exe] C:\WINDOWS\system32\msfq.exeO4 - HKLM\..\RunOnce: [ntks32.exe] C:\WINDOWS\system32\ntks32.exeO4 - HKLM\..\RunOnce: [javafp32.exe] C:\WINDOWS\system32\javafp32.exeO4 - HKLM\..\RunOnce: [mfclj.exe] C:\WINDOWS\system32\mfclj.exeO4 - HKLM\..\RunOnce: [wingj32.exe] C:\WINDOWS\system32\wingj32.exeO4 - HKLM\..\RunOnce: [apiqf32.exe] C:\WINDOWS\apiqf32.exeO4 - HKLM\..\RunOnce: [winea.exe] C:\WINDOWS\winea.exeO4 - HKLM\..\RunOnce: [d3am.exe] C:\WINDOWS\system32\d3am.exeO4 - HKLM\..\RunOnce: [mfcxm.exe] C:\WINDOWS\system32\mfcxm.exeO4 - HKLM\..\RunOnce: [mslj.exe] C:\WINDOWS\system32\mslj.exeO4 - HKLM\..\RunOnce: [appvf32.exe] C:\WINDOWS\system32\appvf32.exeO4 - HKLM\..\RunOnce: [winql32.exe] C:\WINDOWS\winql32.exeO4 - HKLM\..\RunOnce: [crvn.exe] C:\WINDOWS\crvn.exeO4 - HKLM\..\RunOnce: [appuu.exe] C:\WINDOWS\appuu.exeO4 - HKLM\..\RunOnce: [sdkgr32.exe] C:\WINDOWS\system32\sdkgr32.exeO4 - HKLM\..\RunOnce: [mfcml.exe] C:\WINDOWS\mfcml.exeO4 - HKLM\..\RunOnce: [javagz.exe] C:\WINDOWS\system32\javagz.exeO4 - HKLM\..\RunOnce: [winkj32.exe] C:\WINDOWS\winkj32.exeO4 - HKLM\..\RunOnce: [crpl32.exe] C:\WINDOWS\system32\crpl32.exeO4 - HKLM\..\RunOnce: [d3pt32.exe] C:\WINDOWS\system32\d3pt32.exeO4 - HKLM\..\RunOnce: [netcv.exe] C:\WINDOWS\system32\netcv.exeO4 - HKLM\..\RunOnce: [ipwh32.exe] C:\WINDOWS\system32\ipwh32.exeO4 - HKLM\..\RunOnce: [addcj32.exe] C:\WINDOWS\system32\addcj32.exeO4 - HKLM\..\RunOnce: [ntkj.exe] C:\WINDOWS\system32\ntkj.exeO4 - HKLM\..\RunOnce: [javakx32.exe] C:\WINDOWS\javakx32.exeO4 - HKLM\..\RunOnce: [apipr32.exe] C:\WINDOWS\apipr32.exeO4 - HKLM\..\RunOnce: [sysuv32.exe] C:\WINDOWS\sysuv32.exeO4 - HKLM\..\RunOnce: [javazp.exe] C:\WINDOWS\system32\javazp.exeO4 - HKLM\..\RunOnce: [iesq.exe] C:\WINDOWS\iesq.exeO4 - HKLM\..\RunOnce: [ntxk.exe] C:\WINDOWS\system32\ntxk.exeO4 - HKLM\..\RunOnce: [sdkdh32.exe] C:\WINDOWS\system32\sdkdh32.exeO4 - HKLM\..\RunOnce: [mfcqb.exe] C:\WINDOWS\mfcqb.exeO4 - HKLM\..\RunOnce: [winmn.exe] C:\WINDOWS\system32\winmn.exeO4 - HKLM\..\RunOnce: [crzh32.exe] C:\WINDOWS\system32\crzh32.exeO4 - HKLM\..\RunOnce: [apilj32.exe] C:\WINDOWS\system32\apilj32.exeO4 - HKLM\..\RunOnce: [sysyd.exe] C:\WINDOWS\system32\sysyd.exeO4 - HKLM\..\RunOnce: [ieec32.exe] C:\WINDOWS\ieec32.exeO4 - HKLM\..\RunOnce: [sdkjw.exe] C:\WINDOWS\system32\sdkjw.exeO4 - HKLM\..\RunOnce: [atlie32.exe] C:\WINDOWS\system32\atlie32.exeO4 - HKLM\..\RunOnce: [javaxs32.exe] C:\WINDOWS\system32\javaxs32.exeO4 - HKLM\..\RunOnce: [appxa.exe] C:\WINDOWS\appxa.exeO4 - HKLM\..\RunOnce: [sysbe.exe] C:\WINDOWS\system32\sysbe.exeO4 - HKLM\..\RunOnce: [mfcqu32.exe] C:\WINDOWS\mfcqu32.exeO4 - HKLM\..\RunOnce: [ntgb32.exe] C:\WINDOWS\system32\ntgb32.exeO4 - HKLM\..\RunOnce: [netbn.exe] C:\WINDOWS\system32\netbn.exeO4 - HKLM\..\RunOnce: [mfcfo.exe] C:\WINDOWS\mfcfo.exeO4 - HKLM\..\RunOnce: [ntjs32.exe] C:\WINDOWS\ntjs32.exeO4 - HKLM\..\RunOnce: [netsb.exe] C:\WINDOWS\netsb.exeO4 - HKLM\..\RunOnce: [netyp32.exe] C:\WINDOWS\netyp32.exeO4 - HKLM\..\RunOnce: [netnm32.exe] C:\WINDOWS\system32\netnm32.exeO4 - HKLM\..\RunOnce: [winrj32.exe] C:\WINDOWS\winrj32.exeO4 - HKLM\..\RunOnce: [iehm32.exe] C:\WINDOWS\iehm32.exeO4 - HKLM\..\RunOnce: [appft.exe] C:\WINDOWS\appft.exeO4 - HKLM\..\RunOnce: [addpr.exe] C:\WINDOWS\system32\addpr.exeO4 - HKLM\..\RunOnce: [croh32.exe] C:\WINDOWS\croh32.exeO4 - HKLM\..\RunOnce: [sdkjl.exe] C:\WINDOWS\system32\sdkjl.exeO4 - HKLM\..\RunOnce: [ipeu32.exe] C:\WINDOWS\system32\ipeu32.exeO4 - HKLM\..\RunOnce: [apihy.exe] C:\WINDOWS\apihy.exeO4 - HKLM\..\RunOnce: [wingo32.exe] C:\WINDOWS\wingo32.exeO4 - HKLM\..\RunOnce: [netcx32.exe] C:\WINDOWS\system32\netcx32.exeO4 - HKLM\..\RunOnce: [javaaf.exe] C:\WINDOWS\system32\javaaf.exeO4 - HKLM\..\RunOnce: [iewj32.exe] C:\WINDOWS\iewj32.exeO4 - HKLM\..\RunOnce: [crgr.exe] C:\WINDOWS\system32\crgr.exeO4 - HKLM\..\RunOnce: [d3tg32.exe] C:\WINDOWS\d3tg32.exeO4 - HKLM\..\RunOnce: [crid32.exe] C:\WINDOWS\system32\crid32.exeO4 - HKLM\..\RunOnce: [ieiq.exe] C:\WINDOWS\ieiq.exeO4 - HKLM\..\RunOnce: [crxy.exe] C:\WINDOWS\crxy.exeO4 - HKLM\..\RunOnce: [nethq32.exe] C:\WINDOWS\system32\nethq32.exeO4 - HKLM\..\RunOnce: [syswt32.exe] C:\WINDOWS\syswt32.exeO4 - HKLM\..\RunOnce: [syskq32.exe] C:\WINDOWS\system32\syskq32.exeO4 - HKLM\..\RunOnce: [sdkhm32.exe] C:\WINDOWS\sdkhm32.exeO4 - HKLM\..\RunOnce: [ipfh.exe] C:\WINDOWS\ipfh.exeO4 - HKLM\..\RunOnce: [addep32.exe] C:\WINDOWS\addep32.exeO4 - HKLM\..\RunOnce: [winnn32.exe] C:\WINDOWS\system32\winnn32.exeO4 - HKLM\..\RunOnce: [msxo.exe] C:\WINDOWS\msxo.exeO4 - HKLM\..\RunOnce: [ieck32.exe] C:\WINDOWS\ieck32.exeO4 - HKLM\..\RunOnce: [apilq.exe] C:\WINDOWS\apilq.exeO4 - HKLM\..\RunOnce: [crbf32.exe] C:\WINDOWS\system32\crbf32.exeO4 - HKLM\..\RunOnce: [winle32.exe] C:\WINDOWS\winle32.exeO4 - HKLM\..\RunOnce: [addtk.exe] C:\WINDOWS\addtk.exeO4 - HKLM\..\RunOnce: [addnd32.exe] C:\WINDOWS\system32\addnd32.exeO4 - HKLM\..\RunOnce: [d3bn32.exe] C:\WINDOWS\d3bn32.exeO4 - HKLM\..\RunOnce: [addkg32.exe] C:\WINDOWS\addkg32.exeO4 - HKLM\..\RunOnce: [javako.exe] C:\WINDOWS\system32\javako.exeO4 - HKLM\..\RunOnce: [netoa.exe] C:\WINDOWS\system32\netoa.exeO4 - HKLM\..\RunOnce: [mfcyy.exe] C:\WINDOWS\mfcyy.exeO4 - HKLM\..\RunOnce: [apphz32.exe] C:\WINDOWS\system32\apphz32.exeO4 - HKLM\..\RunOnce: [appnw.exe] C:\WINDOWS\appnw.exeO4 - HKLM\..\RunOnce: [appbs.exe] C:\WINDOWS\system32\appbs.exeO4 - HKLM\..\RunOnce: [netmr32.exe] C:\WINDOWS\netmr32.exeO4 - HKLM\..\RunOnce: [crwk32.exe] C:\WINDOWS\system32\crwk32.exeO4 - HKLM\..\RunOnce: [mfces32.exe] C:\WINDOWS\mfces32.exeO4 - HKLM\..\RunOnce: [javazd32.exe] C:\WINDOWS\system32\javazd32.exeO4 - HKLM\..\RunOnce: [msdi.exe] C:\WINDOWS\system32\msdi.exeO4 - HKLM\..\RunOnce: [crmi32.exe] C:\WINDOWS\system32\crmi32.exeO4 - HKLM\..\RunOnce: [apigz.exe] C:\WINDOWS\system32\apigz.exeO4 - HKLM\..\RunOnce: [msak.exe] C:\WINDOWS\system32\msak.exeO4 - HKLM\..\RunOnce: [javaqz.exe] C:\WINDOWS\javaqz.exeO4 - HKLM\..\RunOnce: [msvc.exe] C:\WINDOWS\system32\msvc.exeO4 - HKLM\..\RunOnce: [javazo.exe] C:\WINDOWS\javazo.exeO4 - HKLM\..\RunOnce: [winod32.exe] C:\WINDOWS\system32\winod32.exeO4 - HKLM\..\RunOnce: [iesm32.exe] C:\WINDOWS\iesm32.exeO4 - HKLM\..\RunOnce: [sysdy.exe] C:\WINDOWS\system32\sysdy.exeO4 - HKLM\..\RunOnce: [atlhc32.exe] C:\WINDOWS\system32\atlhc32.exeO4 - HKLM\..\RunOnce: [addqc.exe] C:\WINDOWS\system32\addqc.exeO4 - HKLM\..\RunOnce: [sdkri.exe] C:\WINDOWS\sdkri.exeO4 - HKLM\..\RunOnce: [mfcqy32.exe] C:\WINDOWS\system32\mfcqy32.exeO4 - HKLM\..\RunOnce: [ntjw32.exe] C:\WINDOWS\system32\ntjw32.exeO4 - HKLM\..\RunOnce: [sdkci32.exe] C:\WINDOWS\sdkci32.exeO4 - HKLM\..\RunOnce: [apibv32.exe] C:\WINDOWS\system32\apibv32.exeO4 - HKLM\..\RunOnce: [sysyr32.exe] C:\WINDOWS\system32\sysyr32.exeO4 - HKLM\..\RunOnce: [netbd.exe] C:\WINDOWS\system32\netbd.exeO4 - HKLM\..\RunOnce: [javazy32.exe] C:\WINDOWS\javazy32.exeO4 - HKLM\..\RunOnce: [netmi.exe] C:\WINDOWS\system32\netmi.exeO4 - HKLM\..\RunOnce: [nteq.exe] C:\WINDOWS\nteq.exeO4 - HKLM\..\RunOnce: [crwr32.exe] C:\WINDOWS\system32\crwr32.exeO4 - HKLM\..\RunOnce: [sysmy.exe] C:\WINDOWS\system32\sysmy.exeO4 - HKLM\..\RunOnce: [iewx.exe] C:\WINDOWS\iewx.exeO4 - HKLM\..\RunOnce: [ntum32.exe] C:\WINDOWS\ntum32.exeO4 - HKLM\..\RunOnce: [mfctc32.exe] C:\WINDOWS\system32\mfctc32.exeO4 - HKLM\..\RunOnce: [sdkpe32.exe] C:\WINDOWS\sdkpe32.exeO4 - HKLM\..\RunOnce: [syset.exe] C:\WINDOWS\syset.exeO4 - HKLM\..\RunOnce: [appda.exe] C:\WINDOWS\system32\appda.exeO4 - HKLM\..\RunOnce: [apinb.exe] C:\WINDOWS\apinb.exeO4 - HKLM\..\RunOnce: [sysmj32.exe] C:\WINDOWS\sysmj32.exeO4 - HKLM\..\RunOnce: [netby32.exe] C:\WINDOWS\system32\netby32.exeO4 - HKLM\..\RunOnce: [appsl32.exe] C:\WINDOWS\appsl32.exeO4 - HKLM\..\RunOnce: [d3wh32.exe] C:\WINDOWS\d3wh32.exeO4 - HKLM\..\RunOnce: [atlzt32.exe] C:\WINDOWS\atlzt32.exeO4 - HKLM\..\RunOnce: [netex32.exe] C:\WINDOWS\system32\netex32.exeO4 - HKLM\..\RunOnce: [netzp32.exe] C:\WINDOWS\netzp32.exeO4 - HKLM\..\RunOnce: [sdkxw.exe] C:\WINDOWS\sdkxw.exeO4 - HKLM\..\RunOnce: [ieta32.exe] C:\WINDOWS\system32\ieta32.exeO4 - HKLM\..\RunOnce: [crdb.exe] C:\WINDOWS\system32\crdb.exeO4 - HKLM\..\RunOnce: [mfclh.exe] C:\WINDOWS\system32\mfclh.exeO4 - HKLM\..\RunOnce: [iekw32.exe] C:\WINDOWS\system32\iekw32.exeO4 - HKLM\..\RunOnce: [javaam.exe] C:\WINDOWS\javaam.exeO4 - HKLM\..\RunOnce: [apizt32.exe] C:\WINDOWS\apizt32.exeO4 - HKLM\..\RunOnce: [winxj32.exe] C:\WINDOWS\system32\winxj32.exeO4 - HKLM\..\RunOnce: [sysbs.exe] C:\WINDOWS\sysbs.exeO4 - HKLM\..\RunOnce: [atlxw32.exe] C:\WINDOWS\atlxw32.exeO4 - HKLM\..\RunOnce: [wingx.exe] C:\WINDOWS\wingx.exeO4 - HKLM\..\RunOnce: [sdkpd.exe] C:\WINDOWS\system32\sdkpd.exeO4 - HKLM\..\RunOnce: [atlot32.exe] C:\WINDOWS\system32\atlot32.exeO4 - HKLM\..\RunOnce: [sysea.exe] C:\WINDOWS\sysea.exeO4 - HKLM\..\RunOnce: [msik.exe] C:\WINDOWS\msik.exeO4 - HKLM\..\RunOnce: [addeo32.exe] C:\WINDOWS\system32\addeo32.exeO4 - HKLM\..\RunOnce: [ipqy32.exe] C:\WINDOWS\system32\ipqy32.exeO4 - HKLM\..\RunOnce: [netcd32.exe] C:\WINDOWS\system32\netcd32.exeO4 - HKLM\..\RunOnce: [appgn.exe] C:\WINDOWS\appgn.exeO4 - HKLM\..\RunOnce: [ntsx.exe] C:\WINDOWS\ntsx.exeO4 - Startup: BlueSpace NE.lnk = C:\Program Files\sony\BlueSpace\BlueSpaceNE.exeO4 - Startup: Mortgage Brain Scheduler.LNK = C:\MBL\scheduler\MBScheduler.exeO4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exeO4 - Global Startup: Dr.Speed NetRx.lnk = C:\Program Files\Aluria Software\DrSpeed Suite\drspeed.exeO4 - Global Startup: MaxAlarm.lnk = C:\Program Files\Maximizer\Mxalarm.exeO4 - Global Startup: MaxFinder.lnk = C:\Program Files\Maximizer\Mxfinder.exeO4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXEO4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView6\NkvMon.exeO8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.htmlO8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.htmlO8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.htmlO8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.htmlO8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.htmlO9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dllO9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dllO9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dllO14 - IERESET.INF: START_PAGE_URL=http://www.wanadoo.co.uk/O15 - Trusted Zone: *.sony-europe.comO15 - Trusted Zone: *.sonystyle-europe.comO15 - Trusted Zone: *.vaio-link.comO15 - Trusted IP range: http://192.168.0.1O15 - Trusted IP range: http://81.77.11.109O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/SSC/SharedCon...bin/AvSniff.cabO16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cabO16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061...all/xscan53.cabO16 - DPF: {A3009861-330C-4E10-822B-39D16EC8829D} (CRAVOnline Object) - http://www.ravantivirus.com/scan/ravonline.cabO17 - HKLM\System\CCS\Services\Tcpip\..\{CCA264C7-B389-495F-82BF-939BF9C043C6}: NameServer = 195.92.195.94,195.92.195.95O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dllO23 - Service: Remote Procedure Call (RPC) Helper ( 11Fßä#·ºÄÖ`I) - Unknown owner - C:\WINDOWS\javaml.exe" /s (file missing)O23 - Service: Aluria Security Center Spyware Eliminator Service (ASCService) - Unknown owner - C:\PROGRA~1\ALURIA~1\ascserv.exeO23 - Service: asKernel - Unknown owner - C:\PROGRA~1\ALURIA~1\asKernel.exeO23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exeO23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exeO23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exeO23 - Service: CWShredder Service - InterMute, Inc. - C:\Documents and Settings\Roderick Thorn\Desktop\CWShredder.exeO23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exeO23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exeO23 - Service: Retrospect Launcher (RetroLauncher) - Dantz Development Corporation - C:\Program Files\Dantz\Retrospect\retrorun.exeO23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exeO23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exeO23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exeO23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exeO23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exeO23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exeO23 - Service: VAIO Entertainment TV Device Arbitration Service - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCs\VzHardwareResourceManager\VzHardwareResourceManager.exeO23 - Service: VAIO Media Integrated Server (VAIOMediaPlatform-IntegratedServer-AppServer) - Sony Corporation - C:\Program Files\sony\VAIO Media Integrated Server\VMISrv.exeO23 - Service: VAIO Media Integrated Server (HTTP) (VAIOMediaPlatform-IntegratedServer-HTTP) - Unknown owner - C:\Program Files\sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe" /Service=VAIOMediaPlatform-IntegratedServer-HTTP /RegRoot="SOFTWARE\Sony Corporation\VAIO Media Platform\2.0" /RegExt="Applications\IntegratedServer\HTTP (file missing)O23 - Service: VAIO Media Integrated Server (UPnP) (VAIOMediaPlatform-IntegratedServer-UPnP) - Sony Corporation - C:\Program Files\sony\VAIO Media Integrated Server\Platform\UPnPFramework.exeO23 - Service: VAIO Media Gateway Server (VAIOMediaPlatform-Mobile-Gateway) - Unknown owner - C:\Program Files\sony\VAIO Media Integrated Server\Platform\VmGateway.exe" /Service=VAIOMediaPlatform-Mobile-Gateway /RegRoot="SOFTWARE\Sony Corporation\VAIO Media Platform\2.0" /RegExt="\Addons\Packages\Mobile\Gateway" /DisplayName="VAIO Media Gateway Server (file missing)O23 - Service: VAIO Entertainment UPnP Client Adapter (Vcsw) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VCSW\VCSW.exeO23 - Service: VAIO Entertainment Database Service (VzCdbSvc) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzCdbSvc.exeO23 - Service: VAIO Entertainment File Import Service (VzFw) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzFw.exeO23 - Service: VNC Server (winvnc) - Unknown owner - C:\Program Files\TightVNC\WinVNC.exe" -service (file missing)I hope this is getting one step closer to where I need to be, but it doesn't feel like it. Your help and assistance is invaluable, thank you.Now.....It's friday, i'm fed up, irritated and tired. I'm going to drink a beer.RegardsRck Link to post Share on other sites
alsocom Posted May 14, 2005 Report Share Posted May 14, 2005 It appears from the RAV Online Virus Scanner that the trojans you have on your computer have overwritten many valid files. This is one of those case where you may be better off to save what you can and reformat the computer. I will give you a fix but can not guarantee how well/or if the computer will be operational afterwards.Download the free trojan scanner A2 Squared, update and run a scan with it. Fix anything found then reboot when completed.Reconfigure Windows XP to show hidden files:Click Start. Open My Computer.Select the Tools menu and click Folder Options. Select the View Tab.Under the Hidden files and folders heading select "Show hidden files and folders".Uncheck the "Hide protected operating system files (recommended)" option.Uncheck the "Hide file extensions for known file types" option.Click Yes to confirm. Click OK.[*]Disable the offending service.Go to Start->Run and type Services.msc then hit OkScroll down and find the service called : Remote Procedure Call (RPC) Helper << There are 2 similar named services, be sure to remove the correct one.When you find it, double-click on it. In the next window that opens, click the Stop button, then click on properties and under the General Tab, change the Startup Type to Disabled. Now hit Apply and then Ok and close any open windows. If you don´t find this service listed go ahead with the next steps.Boot into Safe Mode:Restart your computer and immediately begin tapping the F8 key on your keyboard.If done right a Windows Advanced Options menu will appear. Select the Safe Mode option and press Enter.To return to normal mode just restart your computer as you normally would.Run CWShredder:Double-click on CWShredder.exe.Click "Fix ->" and click "OK" at the prompt.CWShredder will scan and clean your system of CWS files.Click "Next->" and then "Exit".[*]Remove the offending service:Double-click on cwsserviceremove.reg you downloaded earlier.When it asks you to merge the information to the registry click "Yes".[*]Run AboutBuster and save the logs:Browse to where you saved AboutBuster and run AboutBuster.exe.Click OK at the directions prompt.Click Start and then OK to allow AboutBuster to scan for Alternate Data Streams.Click Yes to allow it to shutdown explorer.exe.It will begin to your computer for malicious files. If it asks if you would like to do a second pass, allow it to do so.When it has finished, click Save Log. Make sure you save it as I need a copy of it.[*]Fix with Hijackthis:Open Hijackthis, Run a scan and check the following: (Many of these may have been removed by A2)R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blankR1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\pqxvx.dll/sp.html#37049R3 - Default URLSearchHook is missingO2 - BHO: Class - {FBF77D9B-CA17-A517-257C-C38A16C5AD4F} - C:\WINDOWS\mfcae32.dllO4 - HKLM\..\Run: [netmp32.exe] C:\WINDOWS\system32\netmp32.exeO4 - HKLM\..\RunOnce: [javaml.exe] C:\WINDOWS\javaml.exeO4 - HKLM\..\RunOnce: [ipya32.exe] C:\WINDOWS\system32\ipya32.exeO4 - HKLM\..\RunOnce: [sysbj.exe] C:\WINDOWS\sysbj.exeO4 - HKLM\..\RunOnce: [appsm.exe] C:\WINDOWS\system32\appsm.exeO4 - HKLM\..\RunOnce: [apiif.exe] C:\WINDOWS\apiif.exeO4 - HKLM\..\RunOnce: [winmq.exe] C:\WINDOWS\system32\winmq.exeO4 - HKLM\..\RunOnce: [msfq.exe] C:\WINDOWS\system32\msfq.exeO4 - HKLM\..\RunOnce: [ntks32.exe] C:\WINDOWS\system32\ntks32.exeO4 - HKLM\..\RunOnce: [javafp32.exe] C:\WINDOWS\system32\javafp32.exeO4 - HKLM\..\RunOnce: [mfclj.exe] C:\WINDOWS\system32\mfclj.exeO4 - HKLM\..\RunOnce: [wingj32.exe] C:\WINDOWS\system32\wingj32.exeO4 - HKLM\..\RunOnce: [apiqf32.exe] C:\WINDOWS\apiqf32.exeO4 - HKLM\..\RunOnce: [winea.exe] C:\WINDOWS\winea.exeO4 - HKLM\..\RunOnce: [d3am.exe] C:\WINDOWS\system32\d3am.exeO4 - HKLM\..\RunOnce: [mfcxm.exe] C:\WINDOWS\system32\mfcxm.exeO4 - HKLM\..\RunOnce: [mslj.exe] C:\WINDOWS\system32\mslj.exeO4 - HKLM\..\RunOnce: [appvf32.exe] C:\WINDOWS\system32\appvf32.exeO4 - HKLM\..\RunOnce: [winql32.exe] C:\WINDOWS\winql32.exeO4 - HKLM\..\RunOnce: [crvn.exe] C:\WINDOWS\crvn.exeO4 - HKLM\..\RunOnce: [appuu.exe] C:\WINDOWS\appuu.exeO4 - HKLM\..\RunOnce: [sdkgr32.exe] C:\WINDOWS\system32\sdkgr32.exeO4 - HKLM\..\RunOnce: [mfcml.exe] C:\WINDOWS\mfcml.exeO4 - HKLM\..\RunOnce: [javagz.exe] C:\WINDOWS\system32\javagz.exeO4 - HKLM\..\RunOnce: [winkj32.exe] C:\WINDOWS\winkj32.exeO4 - HKLM\..\RunOnce: [crpl32.exe] C:\WINDOWS\system32\crpl32.exeO4 - HKLM\..\RunOnce: [d3pt32.exe] C:\WINDOWS\system32\d3pt32.exeO4 - HKLM\..\RunOnce: [netcv.exe] C:\WINDOWS\system32\netcv.exeO4 - HKLM\..\RunOnce: [ipwh32.exe] C:\WINDOWS\system32\ipwh32.exeO4 - HKLM\..\RunOnce: [addcj32.exe] C:\WINDOWS\system32\addcj32.exeO4 - HKLM\..\RunOnce: [ntkj.exe] C:\WINDOWS\system32\ntkj.exeO4 - HKLM\..\RunOnce: [javakx32.exe] C:\WINDOWS\javakx32.exeO4 - HKLM\..\RunOnce: [apipr32.exe] C:\WINDOWS\apipr32.exeO4 - HKLM\..\RunOnce: [sysuv32.exe] C:\WINDOWS\sysuv32.exeO4 - HKLM\..\RunOnce: [javazp.exe] C:\WINDOWS\system32\javazp.exeO4 - HKLM\..\RunOnce: [iesq.exe] C:\WINDOWS\iesq.exeO4 - HKLM\..\RunOnce: [ntxk.exe] C:\WINDOWS\system32\ntxk.exeO4 - HKLM\..\RunOnce: [sdkdh32.exe] C:\WINDOWS\system32\sdkdh32.exeO4 - HKLM\..\RunOnce: [mfcqb.exe] C:\WINDOWS\mfcqb.exeO4 - HKLM\..\RunOnce: [winmn.exe] C:\WINDOWS\system32\winmn.exeO4 - HKLM\..\RunOnce: [crzh32.exe] C:\WINDOWS\system32\crzh32.exeO4 - HKLM\..\RunOnce: [apilj32.exe] C:\WINDOWS\system32\apilj32.exeO4 - HKLM\..\RunOnce: [sysyd.exe] C:\WINDOWS\system32\sysyd.exeO4 - HKLM\..\RunOnce: [ieec32.exe] C:\WINDOWS\ieec32.exeO4 - HKLM\..\RunOnce: [sdkjw.exe] C:\WINDOWS\system32\sdkjw.exeO4 - HKLM\..\RunOnce: [atlie32.exe] C:\WINDOWS\system32\atlie32.exeO4 - HKLM\..\RunOnce: [javaxs32.exe] C:\WINDOWS\system32\javaxs32.exeO4 - HKLM\..\RunOnce: [appxa.exe] C:\WINDOWS\appxa.exeO4 - HKLM\..\RunOnce: [sysbe.exe] C:\WINDOWS\system32\sysbe.exeO4 - HKLM\..\RunOnce: [mfcqu32.exe] C:\WINDOWS\mfcqu32.exeO4 - HKLM\..\RunOnce: [ntgb32.exe] C:\WINDOWS\system32\ntgb32.exeO4 - HKLM\..\RunOnce: [netbn.exe] C:\WINDOWS\system32\netbn.exeO4 - HKLM\..\RunOnce: [mfcfo.exe] C:\WINDOWS\mfcfo.exeO4 - HKLM\..\RunOnce: [ntjs32.exe] C:\WINDOWS\ntjs32.exeO4 - HKLM\..\RunOnce: [netsb.exe] C:\WINDOWS\netsb.exeO4 - HKLM\..\RunOnce: [netyp32.exe] C:\WINDOWS\netyp32.exeO4 - HKLM\..\RunOnce: [netnm32.exe] C:\WINDOWS\system32\netnm32.exeO4 - HKLM\..\RunOnce: [winrj32.exe] C:\WINDOWS\winrj32.exeO4 - HKLM\..\RunOnce: [iehm32.exe] C:\WINDOWS\iehm32.exeO4 - HKLM\..\RunOnce: [appft.exe] C:\WINDOWS\appft.exeO4 - HKLM\..\RunOnce: [addpr.exe] C:\WINDOWS\system32\addpr.exeO4 - HKLM\..\RunOnce: [croh32.exe] C:\WINDOWS\croh32.exeO4 - HKLM\..\RunOnce: [sdkjl.exe] C:\WINDOWS\system32\sdkjl.exeO4 - HKLM\..\RunOnce: [ipeu32.exe] C:\WINDOWS\system32\ipeu32.exeO4 - HKLM\..\RunOnce: [apihy.exe] C:\WINDOWS\apihy.exeO4 - HKLM\..\RunOnce: [wingo32.exe] C:\WINDOWS\wingo32.exeO4 - HKLM\..\RunOnce: [netcx32.exe] C:\WINDOWS\system32\netcx32.exeO4 - HKLM\..\RunOnce: [javaaf.exe] C:\WINDOWS\system32\javaaf.exeO4 - HKLM\..\RunOnce: [iewj32.exe] C:\WINDOWS\iewj32.exeO4 - HKLM\..\RunOnce: [crgr.exe] C:\WINDOWS\system32\crgr.exeO4 - HKLM\..\RunOnce: [d3tg32.exe] C:\WINDOWS\d3tg32.exeO4 - HKLM\..\RunOnce: [crid32.exe] C:\WINDOWS\system32\crid32.exeO4 - HKLM\..\RunOnce: [ieiq.exe] C:\WINDOWS\ieiq.exeO4 - HKLM\..\RunOnce: [crxy.exe] C:\WINDOWS\crxy.exeO4 - HKLM\..\RunOnce: [nethq32.exe] C:\WINDOWS\system32\nethq32.exeO4 - HKLM\..\RunOnce: [syswt32.exe] C:\WINDOWS\syswt32.exeO4 - HKLM\..\RunOnce: [syskq32.exe] C:\WINDOWS\system32\syskq32.exeO4 - HKLM\..\RunOnce: [sdkhm32.exe] C:\WINDOWS\sdkhm32.exeO4 - HKLM\..\RunOnce: [ipfh.exe] C:\WINDOWS\ipfh.exeO4 - HKLM\..\RunOnce: [addep32.exe] C:\WINDOWS\addep32.exeO4 - HKLM\..\RunOnce: [winnn32.exe] C:\WINDOWS\system32\winnn32.exeO4 - HKLM\..\RunOnce: [msxo.exe] C:\WINDOWS\msxo.exeO4 - HKLM\..\RunOnce: [ieck32.exe] C:\WINDOWS\ieck32.exeO4 - HKLM\..\RunOnce: [apilq.exe] C:\WINDOWS\apilq.exeO4 - HKLM\..\RunOnce: [crbf32.exe] C:\WINDOWS\system32\crbf32.exeO4 - HKLM\..\RunOnce: [winle32.exe] C:\WINDOWS\winle32.exeO4 - HKLM\..\RunOnce: [addtk.exe] C:\WINDOWS\addtk.exeO4 - HKLM\..\RunOnce: [addnd32.exe] C:\WINDOWS\system32\addnd32.exeO4 - HKLM\..\RunOnce: [d3bn32.exe] C:\WINDOWS\d3bn32.exeO4 - HKLM\..\RunOnce: [addkg32.exe] C:\WINDOWS\addkg32.exeO4 - HKLM\..\RunOnce: [javako.exe] C:\WINDOWS\system32\javako.exeO4 - HKLM\..\RunOnce: [netoa.exe] C:\WINDOWS\system32\netoa.exeO4 - HKLM\..\RunOnce: [mfcyy.exe] C:\WINDOWS\mfcyy.exeO4 - HKLM\..\RunOnce: [apphz32.exe] C:\WINDOWS\system32\apphz32.exeO4 - HKLM\..\RunOnce: [appnw.exe] C:\WINDOWS\appnw.exeO4 - HKLM\..\RunOnce: [appbs.exe] C:\WINDOWS\system32\appbs.exeO4 - HKLM\..\RunOnce: [netmr32.exe] C:\WINDOWS\netmr32.exeO4 - HKLM\..\RunOnce: [crwk32.exe] C:\WINDOWS\system32\crwk32.exeO4 - HKLM\..\RunOnce: [mfces32.exe] C:\WINDOWS\mfces32.exeO4 - HKLM\..\RunOnce: [javazd32.exe] C:\WINDOWS\system32\javazd32.exeO4 - HKLM\..\RunOnce: [msdi.exe] C:\WINDOWS\system32\msdi.exeO4 - HKLM\..\RunOnce: [crmi32.exe] C:\WINDOWS\system32\crmi32.exeO4 - HKLM\..\RunOnce: [apigz.exe] C:\WINDOWS\system32\apigz.exeO4 - HKLM\..\RunOnce: [msak.exe] C:\WINDOWS\system32\msak.exeO4 - HKLM\..\RunOnce: [javaqz.exe] C:\WINDOWS\javaqz.exeO4 - HKLM\..\RunOnce: [msvc.exe] C:\WINDOWS\system32\msvc.exeO4 - HKLM\..\RunOnce: [javazo.exe] C:\WINDOWS\javazo.exeO4 - HKLM\..\RunOnce: [winod32.exe] C:\WINDOWS\system32\winod32.exeO4 - HKLM\..\RunOnce: [iesm32.exe] C:\WINDOWS\iesm32.exeO4 - HKLM\..\RunOnce: [sysdy.exe] C:\WINDOWS\system32\sysdy.exeO4 - HKLM\..\RunOnce: [atlhc32.exe] C:\WINDOWS\system32\atlhc32.exeO4 - HKLM\..\RunOnce: [addqc.exe] C:\WINDOWS\system32\addqc.exeO4 - HKLM\..\RunOnce: [sdkri.exe] C:\WINDOWS\sdkri.exeO4 - HKLM\..\RunOnce: [mfcqy32.exe] C:\WINDOWS\system32\mfcqy32.exeO4 - HKLM\..\RunOnce: [ntjw32.exe] C:\WINDOWS\system32\ntjw32.exeO4 - HKLM\..\RunOnce: [sdkci32.exe] C:\WINDOWS\sdkci32.exeO4 - HKLM\..\RunOnce: [apibv32.exe] C:\WINDOWS\system32\apibv32.exeO4 - HKLM\..\RunOnce: [sysyr32.exe] C:\WINDOWS\system32\sysyr32.exeO4 - HKLM\..\RunOnce: [netbd.exe] C:\WINDOWS\system32\netbd.exeO4 - HKLM\..\RunOnce: [javazy32.exe] C:\WINDOWS\javazy32.exeO4 - HKLM\..\RunOnce: [netmi.exe] C:\WINDOWS\system32\netmi.exeO4 - HKLM\..\RunOnce: [nteq.exe] C:\WINDOWS\nteq.exeO4 - HKLM\..\RunOnce: [crwr32.exe] C:\WINDOWS\system32\crwr32.exeO4 - HKLM\..\RunOnce: [sysmy.exe] C:\WINDOWS\system32\sysmy.exeO4 - HKLM\..\RunOnce: [iewx.exe] C:\WINDOWS\iewx.exeO4 - HKLM\..\RunOnce: [ntum32.exe] C:\WINDOWS\ntum32.exeO4 - HKLM\..\RunOnce: [mfctc32.exe] C:\WINDOWS\system32\mfctc32.exeO4 - HKLM\..\RunOnce: [sdkpe32.exe] C:\WINDOWS\sdkpe32.exeO4 - HKLM\..\RunOnce: [syset.exe] C:\WINDOWS\syset.exeO4 - HKLM\..\RunOnce: [appda.exe] C:\WINDOWS\system32\appda.exeO4 - HKLM\..\RunOnce: [apinb.exe] C:\WINDOWS\apinb.exeO4 - HKLM\..\RunOnce: [sysmj32.exe] C:\WINDOWS\sysmj32.exeO4 - HKLM\..\RunOnce: [netby32.exe] C:\WINDOWS\system32\netby32.exeO4 - HKLM\..\RunOnce: [appsl32.exe] C:\WINDOWS\appsl32.exeO4 - HKLM\..\RunOnce: [d3wh32.exe] C:\WINDOWS\d3wh32.exeO4 - HKLM\..\RunOnce: [atlzt32.exe] C:\WINDOWS\atlzt32.exeO4 - HKLM\..\RunOnce: [netex32.exe] C:\WINDOWS\system32\netex32.exeO4 - HKLM\..\RunOnce: [netzp32.exe] C:\WINDOWS\netzp32.exeO4 - HKLM\..\RunOnce: [sdkxw.exe] C:\WINDOWS\sdkxw.exeO4 - HKLM\..\RunOnce: [ieta32.exe] C:\WINDOWS\system32\ieta32.exeO4 - HKLM\..\RunOnce: [crdb.exe] C:\WINDOWS\system32\crdb.exeO4 - HKLM\..\RunOnce: [mfclh.exe] C:\WINDOWS\system32\mfclh.exeO4 - HKLM\..\RunOnce: [iekw32.exe] C:\WINDOWS\system32\iekw32.exeO4 - HKLM\..\RunOnce: [javaam.exe] C:\WINDOWS\javaam.exeO4 - HKLM\..\RunOnce: [apizt32.exe] C:\WINDOWS\apizt32.exeO4 - HKLM\..\RunOnce: [winxj32.exe] C:\WINDOWS\system32\winxj32.exeO4 - HKLM\..\RunOnce: [sysbs.exe] C:\WINDOWS\sysbs.exeO4 - HKLM\..\RunOnce: [atlxw32.exe] C:\WINDOWS\atlxw32.exeO4 - HKLM\..\RunOnce: [wingx.exe] C:\WINDOWS\wingx.exeO4 - HKLM\..\RunOnce: [sdkpd.exe] C:\WINDOWS\system32\sdkpd.exeO4 - HKLM\..\RunOnce: [atlot32.exe] C:\WINDOWS\system32\atlot32.exeO4 - HKLM\..\RunOnce: [sysea.exe] C:\WINDOWS\sysea.exeO4 - HKLM\..\RunOnce: [msik.exe] C:\WINDOWS\msik.exeO4 - HKLM\..\RunOnce: [addeo32.exe] C:\WINDOWS\system32\addeo32.exeO4 - HKLM\..\RunOnce: [ipqy32.exe] C:\WINDOWS\system32\ipqy32.exeO4 - HKLM\..\RunOnce: [netcd32.exe] C:\WINDOWS\system32\netcd32.exeO4 - HKLM\..\RunOnce: [appgn.exe] C:\WINDOWS\appgn.exeO4 - HKLM\..\RunOnce: [ntsx.exe] C:\WINDOWS\ntsx.exeO23 - Service: Remote Procedure Call (RPC) Helper ( 11Fßä#·ºÄÖ`I) - Unknown owner - C:\WINDOWS\javaml.exe" /s (file missing)With all other programs and browsers closed, click fix checked.[*]Clean out temporary files:Start | Run | type cleanmgr | OKLet it scan your system for files to remove.Make sure Temporary Files, Temporary Internet Files, and Recycle Bin are the only things checked.Click "OK" to remove them.Click "Yes" to confirm the deletion.[*]Restart your computer normally to return to normal mode.[*]Free online antivirus scans:Run at least two of the following online virus scans making sure to reboot in between each one. Allow them to fix anything they find.You need to use Internet Explorer or Netscape browsers.BitdefenderPandasoftwareTrend Micro << Click Auto Clean Symantec Security Check << click scan for virusesRAV Online Virus Scanner << Enter your e-mail address and click on To continue without subscribing McAfee[*]Reset Trusted/Restricted SitesDownload DelDomains.inf file to your desktop.Right-click on the deldomains.inf file and select Install.Note : Since the Domains are deleted SpywareBlaster protection must be re-enabled, Spybot's Immunize feature must be used again, and you'll also have to re-install IE-SpyAd if installed.[*]Prepare your reply:Please post a fresh HijackThis log as a reply to this thread.Please post the AboutBuster log.Please note any complications you had. Link to post Share on other sites
Rick210468 Posted May 17, 2005 Author Report Share Posted May 17, 2005 I folllowed the instruction that you kindly provided. Here are the follwing results:About buster log:Scanned at: 18:46:45 on: 12/05/2005-- Scan 1 ---------------------------About:Buster Version 4.0Reference List : 26Removed Data Streams:C:\WINDOWS\KB885835.log:azuhtC:\WINDOWS\opt_5030.ini:vgqlzC:\WINDOWS\Q323183.log:abzruC:\WINDOWS\SLSPTLNO.INI:pdaniRemoved! : C:\WINDOWS\hswjz.datRemoved! : C:\WINDOWS\system32\ekrge.datAttempted Clean Of Temp folder.Pages Reset... Done!-- Scan 2 ---------------------------About:Buster Version 4.0Reference List : 26Removed Data Streams:C:\WINDOWS\KB885835.log:azuhtC:\WINDOWS\opt_5030.ini:vgqlzC:\WINDOWS\Q323183.log:abzruC:\WINDOWS\SLSPTLNO.INI:pdaniAttempted Clean Of Temp folder.Pages Reset... Done!Scanned at: 09:36:13 on: 13/05/2005-- Scan 1 ---------------------------About:Buster Version 4.0Reference List : 26No ADS found on systemRemoved! : C:\WINDOWS\ddndf.datRemoved! : C:\WINDOWS\gzdjs.datRemoved! : C:\WINDOWS\lriyi.datRemoved! : C:\WINDOWS\uylmc.datRemoved! : C:\WINDOWS\system32\bnjdj.datAttempted Clean Of Temp folder.Pages Reset... Done!-- Scan 2 ---------------------------About:Buster Version 4.0Reference List : 26No ADS found on systemAttempted Clean Of Temp folder.Pages Reset... Done!Scanned at: 10:08:03 on: 13/05/2005-- Scan 1 ---------------------------About:Buster Version 4.0Reference List : 26No ADS found on systemAttempted Clean Of Temp folder.Pages Reset... Done!-- Scan 2 ---------------------------About:Buster Version 4.0Reference List : 26No ADS found on systemAttempted Clean Of Temp folder.Pages Reset... Done!Scanned at: 14:54:59 on: 16/05/2005-- Scan 1 ---------------------------About:Buster Version 4.0Reference List : 26Removed Data Streams:C:\WINDOWS\njyup.txt:dyhdoRemoved 2 Random Key EntriesRemoved! : C:\WINDOWS\system32\gripi.datRemoved! : C:\WINDOWS\system32\grxxl.datRemoved! : C:\WINDOWS\system32\jhkuo.datAttempted Clean Of Temp folder.Pages Reset... Done!-- Scan 2 ---------------------------About:Buster Version 4.0Reference List : 26Removed Data Streams:C:\WINDOWS\njyup.txt:dyhdoAttempted Clean Of Temp folder.Pages Reset... Done!Hijackthis log:Logfile of HijackThis v1.99.1Scan saved at 14:55:29, on 16/05/2005Platform: Windows XP SP2 (WinNT 5.01.2600)MSIE: Unable to get Internet Explorer version!Running processes:C:\WINDOWS\System32\smss.exeC:\WINDOWS\system32\winlogon.exeC:\WINDOWS\system32\services.exeC:\WINDOWS\system32\lsass.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\Explorer.EXEC:\Documents and Settings\Roderick Thorn\Desktop\HijackThis.exeO1 - Hosts: 84.66.219.98 cfm.zapto.orgO1 - Hosts: 70.85.147.68 forum.iamnotageek.comO1 - Hosts: 66.197.95.135 gallys.40somethingmag.comO1 - Hosts: 66.35.253.32 housecall.trendmicro.comO1 - Hosts: 207.246.157.244 oldsexlinks.comO1 - Hosts: 67.138.240.11 primehostreviews.comO1 - Hosts: 66.28.176.86 shadow.atkingdom.comO1 - Hosts: 207.246.157.249 spunkermovies.comO1 - Hosts: 195.171.171.21 www.bankofscotland.co.ukO1 - Hosts: 67.43.1.57 www.besttechie.netO1 - Hosts: 213.150.62.120 www.bitdefender.comO1 - Hosts: 66.55.148.147 www.cosmic-cum.comO1 - Hosts: 66.98.132.62 www.emsisoft.comO1 - Hosts: 66.28.176.236 www.erotiqlinks.comO1 - Hosts: 194.60.170.7 www.experian.co.ukO1 - Hosts: 63.105.4.85 www.hsbc.comO1 - Hosts: 66.250.223.113 www.localfoxes.netO1 - Hosts: 64.255.176.12 www.naughtyofficegallery.comO1 - Hosts: 63.105.4.113 www.offshore.hsbc.comO1 - Hosts: 205.241.15.113 www.offshore.hsbc.comO1 - Hosts: 193.108.153.116 www.pandasoftware.comO1 - Hosts: 213.233.121.11 www.ravantivirus.comO1 - Hosts: 212.227.253.104 www.safer-networking.orgO1 - Hosts: 69.50.130.78 www.snakesworld.comO1 - Hosts: 69.50.130.77 www.sonofsnake.comO1 - Hosts: 69.50.130.77 www.sonofsnake.comO1 - Hosts: 62.149.140.14 www.spamihilator.comO1 - Hosts: 202.27.184.102 www.xtra.co.nzO1 - Hosts: 202.27.184.102 www.xtra.co.nzO1 - Hosts: 202.27.184.102 www.xtra.co.nzO1 - Hosts: 202.27.184.102 www.xtra.co.nzO1 - Hosts: 202.27.184.102 www.xtra.co.nzO1 - Hosts: 202.27.184.102 www.xtra.co.nzO2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocxO2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dllO2 - BHO: Class - {FEDF758B-DA6A-9E13-D256-1A83178C70DC} - C:\WINDOWS\system32\mszc32.dllO3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\01.02.3000.1001\en-us\msntb.dllO3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dllO3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_5_7_0.dllO4 - HKLM\..\Run: [igfxTray] C:\WINDOWS\System32\igfxtray.exeO4 - HKLM\..\Run: [ezShieldProtector for Px] C:\WINDOWS\System32\ezSP_Px.exeO4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXEO4 - HKLM\..\Run: [HKSERV.EXE] C:\Program Files\Sony\HotKey Utility\HKserv.exeO4 - HKLM\..\Run: [sonyPowerCfg] C:\Program Files\sony\vaio power management\SPMgr.exeO4 - HKLM\..\Run: [VAIO Update 2] "C:\Program Files\sony\vaio update 2\VAIOUpdt.exe" /StationaryO4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.ExeO4 - HKLM\..\Run: [MaxtorOneTouch] C:\PROGRA~1\Maxtor\OneTouch\Utils\OneTouch.exeO4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exeO4 - HKLM\..\Run: [netmp32.exe] C:\WINDOWS\system32\netmp32.exeO4 - HKLM\..\Run: [iezf32.exe] C:\WINDOWS\iezf32.exeO4 - HKLM\..\RunOnce: [javaml.exe] C:\WINDOWS\javaml.exeO4 - HKLM\..\RunOnce: [ipya32.exe] C:\WINDOWS\system32\ipya32.exeO4 - HKLM\..\RunOnce: [iplx.exe] C:\WINDOWS\system32\iplx.exeO4 - HKLM\..\RunOnce: [winrc.exe] C:\WINDOWS\system32\winrc.exeO4 - HKLM\..\RunOnce: [mfciq32.exe] C:\WINDOWS\mfciq32.exeO4 - HKLM\..\RunOnce: [iens.exe] C:\WINDOWS\system32\iens.exeO4 - HKLM\..\RunOnce: [mfcaa.exe] C:\WINDOWS\system32\mfcaa.exeO4 - HKLM\..\RunOnce: [iefc32.exe] C:\WINDOWS\system32\iefc32.exeO4 - HKLM\..\RunOnce: [addkg.exe] C:\WINDOWS\system32\addkg.exeO4 - HKLM\..\RunOnce: [d3pa.exe] C:\WINDOWS\system32\d3pa.exeO4 - HKLM\..\RunOnce: [sdkxz.exe] C:\WINDOWS\sdkxz.exeO4 - HKLM\..\RunOnce: [atlcu.exe] C:\WINDOWS\atlcu.exeO4 - HKLM\..\RunOnce: [ntlu.exe] C:\WINDOWS\system32\ntlu.exeO4 - HKLM\..\RunOnce: [mseq.exe] C:\WINDOWS\mseq.exeO4 - HKLM\..\RunOnce: [sdkod.exe] C:\WINDOWS\system32\sdkod.exeO4 - HKLM\..\RunOnce: [atltg32.exe] C:\WINDOWS\system32\atltg32.exeO4 - HKLM\..\RunOnce: [ipkn32.exe] C:\WINDOWS\system32\ipkn32.exeO4 - HKLM\..\RunOnce: [sysst32.exe] C:\WINDOWS\sysst32.exeO4 - HKLM\..\RunOnce: [javaxn.exe] C:\WINDOWS\system32\javaxn.exeO4 - HKLM\..\RunOnce: [mfccr.exe] C:\WINDOWS\system32\mfccr.exeO4 - HKLM\..\RunOnce: [javaxp32.exe] C:\WINDOWS\system32\javaxp32.exeO4 - HKLM\..\RunOnce: [addgv.exe] C:\WINDOWS\addgv.exeO4 - HKLM\..\RunOnce: [crly32.exe] C:\WINDOWS\system32\crly32.exeO4 - HKLM\..\RunOnce: [ieqc.exe] C:\WINDOWS\ieqc.exeO4 - HKLM\..\RunOnce: [mszc32.exe] C:\WINDOWS\system32\mszc32.exeO4 - HKLM\..\RunOnce: [d3nz32.exe] C:\WINDOWS\d3nz32.exeO4 - HKLM\..\RunOnce: [ipsv32.exe] C:\WINDOWS\ipsv32.exeO4 - HKLM\..\RunOnce: [msnh32.exe] C:\WINDOWS\msnh32.exeO4 - HKLM\..\RunOnce: [winsl.exe] C:\WINDOWS\system32\winsl.exeO4 - HKLM\..\RunOnce: [ipwv.exe] C:\WINDOWS\ipwv.exeO4 - HKLM\..\RunOnce: [ipvf32.exe] C:\WINDOWS\ipvf32.exeO4 - HKLM\..\RunOnce: [apiof32.exe] C:\WINDOWS\apiof32.exeO4 - HKLM\..\RunOnce: [msla32.exe] C:\WINDOWS\system32\msla32.exeO4 - HKLM\..\RunOnce: [ieti.exe] C:\WINDOWS\system32\ieti.exeO4 - HKLM\..\RunOnce: [ipjm.exe] C:\WINDOWS\system32\ipjm.exeO4 - HKLM\..\RunOnce: [mfcws.exe] C:\WINDOWS\system32\mfcws.exeO4 - HKLM\..\RunOnce: [addep.exe] C:\WINDOWS\system32\addep.exeO4 - HKLM\..\RunOnce: [d3jr32.exe] C:\WINDOWS\d3jr32.exeO4 - HKLM\..\RunOnce: [sysvh32.exe] C:\WINDOWS\sysvh32.exeO4 - HKLM\..\RunOnce: [crlx32.exe] C:\WINDOWS\system32\crlx32.exeO4 - HKLM\..\RunOnce: [d3tf32.exe] C:\WINDOWS\system32\d3tf32.exeO4 - HKLM\..\RunOnce: [apppw32.exe] C:\WINDOWS\system32\apppw32.exeO4 - HKLM\..\RunOnce: [atlwe.exe] C:\WINDOWS\atlwe.exeO4 - HKLM\..\RunOnce: [appxf.exe] C:\WINDOWS\system32\appxf.exeO4 - HKLM\..\RunOnce: [ipnu32.exe] C:\WINDOWS\ipnu32.exeO4 - HKLM\..\RunOnce: [crlb32.exe] C:\WINDOWS\crlb32.exeO4 - HKLM\..\RunOnce: [sdkgn.exe] C:\WINDOWS\system32\sdkgn.exeO4 - HKCU\..\Run: [a-squared] "C:\Program Files\a2\a2guard.exe"O4 - Startup: BlueSpace NE.lnk = C:\Program Files\sony\BlueSpace\BlueSpaceNE.exeO4 - Startup: Mortgage Brain Scheduler.LNK = C:\MBL\scheduler\MBScheduler.exeO4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exeO4 - Global Startup: Dr.Speed NetRx.lnk = C:\Program Files\Aluria Software\DrSpeed Suite\drspeed.exeO4 - Global Startup: MaxAlarm.lnk = C:\Program Files\Maximizer\Mxalarm.exeO4 - Global Startup: MaxFinder.lnk = C:\Program Files\Maximizer\Mxfinder.exeO4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXEO4 - Global Startup: NkvMon.exe.lnk = C:\Program Files\Nikon\NkView6\NkvMon.exeO8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.htmlO8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.htmlO8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.htmlO8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.htmlO8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.htmlO9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dllO9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dllO9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dllO14 - IERESET.INF: START_PAGE_URL=http://www.wanadoo.co.uk/O15 - Trusted Zone: *.sony-europe.comO15 - Trusted Zone: *.sonystyle-europe.comO15 - Trusted Zone: *.vaio-link.comO15 - Trusted IP range: http://192.168.0.1O15 - Trusted IP range: http://81.77.11.109O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/SSC/SharedCon...bin/AvSniff.cabO16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cabO16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061...all/xscan53.cabO16 - DPF: {A3009861-330C-4E10-822B-39D16EC8829D} (CRAVOnline Object) - http://www.ravantivirus.com/scan/ravonline.cabO17 - HKLM\System\CCS\Services\Tcpip\..\{CCA264C7-B389-495F-82BF-939BF9C043C6}: NameServer = 195.92.195.94,195.92.195.95O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dllO23 - Service: Aluria Security Center Spyware Eliminator Service (ASCService) - Unknown owner - C:\PROGRA~1\ALURIA~1\ascserv.exeO23 - Service: asKernel - Unknown owner - C:\PROGRA~1\ALURIA~1\asKernel.exeO23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exeO23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exeO23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exeO23 - Service: CWShredder Service - InterMute, Inc. - C:\Documents and Settings\Roderick Thorn\Desktop\CWShredder.exeO23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exeO23 - Service: PACSPTISVR - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exeO23 - Service: Retrospect Launcher (RetroLauncher) - Dantz Development Corporation - C:\Program Files\Dantz\Retrospect\retrorun.exeO23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exeO23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exeO23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exeO23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exeO23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exeO23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exeO23 - Service: VAIO Entertainment TV Device Arbitration Service - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCs\VzHardwareResourceManager\VzHardwareResourceManager.exeO23 - Service: VAIO Media Integrated Server (VAIOMediaPlatform-IntegratedServer-AppServer) - Sony Corporation - C:\Program Files\sony\VAIO Media Integrated Server\VMISrv.exeO23 - Service: VAIO Media Integrated Server (HTTP) (VAIOMediaPlatform-IntegratedServer-HTTP) - Unknown owner - C:\Program Files\sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe" /Service=VAIOMediaPlatform-IntegratedServer-HTTP /RegRoot="SOFTWARE\Sony Corporation\VAIO Media Platform\2.0" /RegExt="Applications\IntegratedServer\HTTP (file missing)O23 - Service: VAIO Media Integrated Server (UPnP) (VAIOMediaPlatform-IntegratedServer-UPnP) - Sony Corporation - C:\Program Files\sony\VAIO Media Integrated Server\Platform\UPnPFramework.exeO23 - Service: VAIO Media Gateway Server (VAIOMediaPlatform-Mobile-Gateway) - Unknown owner - C:\Program Files\sony\VAIO Media Integrated Server\Platform\VmGateway.exe" /Service=VAIOMediaPlatform-Mobile-Gateway /RegRoot="SOFTWARE\Sony Corporation\VAIO Media Platform\2.0" /RegExt="\Addons\Packages\Mobile\Gateway" /DisplayName="VAIO Media Gateway Server (file missing)O23 - Service: VAIO Entertainment UPnP Client Adapter (Vcsw) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VCSW\VCSW.exeO23 - Service: VAIO Entertainment Database Service (VzCdbSvc) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzCdbSvc.exeO23 - Service: VAIO Entertainment File Import Service (VzFw) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzFw.exeO23 - Service: VNC Server (winvnc) - Unknown owner - C:\Program Files\TightVNC\WinVNC.exe" -service (file missing)The problem still seems to be there. I think the only solution is to reinstall windows. When rebooting the machine I was informed of a whole load of files that could not be found. I assume by reinstalling windows these files will be restored?Many thanks for your help.Rick Link to post Share on other sites
alsocom Posted May 18, 2005 Report Share Posted May 18, 2005 Step 1Download this file to your desktop.http://www.mvps.org/winhelp2002/DelDomains.infRight-click on the deldomains.inf file and select Install.Note : Since the Domains are deleted SpywareBlaster protection must be re-enabled, Spybot's Immunize feature must be used again, and you'll also have to re-install IE-SpyAd if installed.Step 2Click Here to download Killbox by Option^Explicit.Extract the program to your desktop and double-click on its folder, then double-click on Killbox.exe to start the program.In the killbox program, select the Delete on Reboot option.In the field labeled Full Path of File to Delete enter the file paths listed below ONE AT A TIME (EXACTLY as it appears, please double check to make sure!):C:\WINDOWS\system32\mszc32.dllC:\WINDOWS\system32\netmp32.exeC:\WINDOWS\iezf32.exeC:\WINDOWS\javaml.exeC:\WINDOWS\system32\ipya32.exeC:\WINDOWS\system32\iplx.exeC:\WINDOWS\system32\winrc.exeC:\WINDOWS\mfciq32.exeC:\WINDOWS\system32\iens.exeC:\WINDOWS\system32\mfcaa.exeC:\WINDOWS\system32\iefc32.exeC:\WINDOWS\system32\addkg.exeC:\WINDOWS\system32\d3pa.exeC:\WINDOWS\sdkxz.exeC:\WINDOWS\atlcu.exeC:\WINDOWS\system32\ntlu.exeC:\WINDOWS\mseq.exeC:\WINDOWS\system32\sdkod.exeC:\WINDOWS\system32\atltg32.exeC:\WINDOWS\system32\ipkn32.exeC:\WINDOWS\sysst32.exeC:\WINDOWS\system32\javaxn.exeC:\WINDOWS\system32\mfccr.exeC:\WINDOWS\system32\javaxp32.exeC:\WINDOWS\addgv.exeC:\WINDOWS\system32\crly32.exeC:\WINDOWS\ieqc.exeC:\WINDOWS\system32\mszc32.exeC:\WINDOWS\d3nz32.exeC:\WINDOWS\ipsv32.exeC:\WINDOWS\msnh32.exeC:\WINDOWS\system32\winsl.exeC:\WINDOWS\ipwv.exeC:\WINDOWS\ipvf32.exeC:\WINDOWS\apiof32.exeC:\WINDOWS\system32\msla32.exeC:\WINDOWS\system32\ieti.exeC:\WINDOWS\system32\ipjm.exeC:\WINDOWS\system32\mfcws.exeC:\WINDOWS\system32\addep.exeC:\WINDOWS\d3jr32.exeC:\WINDOWS\sysvh32.exeC:\WINDOWS\system32\crlx32.exeC:\WINDOWS\system32\d3tf32.exeC:\WINDOWS\system32\apppw32.exeC:\WINDOWS\atlwe.exeC:\WINDOWS\system32\appxf.exeC:\WINDOWS\ipnu32.exeC:\WINDOWS\crlb32.exeC:\WINDOWS\system32\sdkgn.exePress the button that looks like a red circle with a white X in it after each one. When it asks if you would like to delete on reboot, press the YES button, when it asks if you want to reboot now, press the NO button. Do this after each one until you have entered the LAST file path I have listed above. After that LAST file path has been entered, press the YES button at both prompts so that your computer restarts. If you get a "PendingFileRenameOperations Registry Data has been Removed by External Process!" message then just restart manually.Step 3Scan with HijackThis and check the following:O2 - BHO: Class - {FEDF758B-DA6A-9E13-D256-1A83178C70DC} - C:\WINDOWS\system32\mszc32.dllO4 - HKLM\..\Run: [netmp32.exe] C:\WINDOWS\system32\netmp32.exeO4 - HKLM\..\Run: [iezf32.exe] C:\WINDOWS\iezf32.exeO4 - HKLM\..\RunOnce: [javaml.exe] C:\WINDOWS\javaml.exeO4 - HKLM\..\RunOnce: [ipya32.exe] C:\WINDOWS\system32\ipya32.exeO4 - HKLM\..\RunOnce: [iplx.exe] C:\WINDOWS\system32\iplx.exeO4 - HKLM\..\RunOnce: [winrc.exe] C:\WINDOWS\system32\winrc.exeO4 - HKLM\..\RunOnce: [mfciq32.exe] C:\WINDOWS\mfciq32.exeO4 - HKLM\..\RunOnce: [iens.exe] C:\WINDOWS\system32\iens.exeO4 - HKLM\..\RunOnce: [mfcaa.exe] C:\WINDOWS\system32\mfcaa.exeO4 - HKLM\..\RunOnce: [iefc32.exe] C:\WINDOWS\system32\iefc32.exeO4 - HKLM\..\RunOnce: [addkg.exe] C:\WINDOWS\system32\addkg.exeO4 - HKLM\..\RunOnce: [d3pa.exe] C:\WINDOWS\system32\d3pa.exeO4 - HKLM\..\RunOnce: [sdkxz.exe] C:\WINDOWS\sdkxz.exeO4 - HKLM\..\RunOnce: [atlcu.exe] C:\WINDOWS\atlcu.exeO4 - HKLM\..\RunOnce: [ntlu.exe] C:\WINDOWS\system32\ntlu.exeO4 - HKLM\..\RunOnce: [mseq.exe] C:\WINDOWS\mseq.exeO4 - HKLM\..\RunOnce: [sdkod.exe] C:\WINDOWS\system32\sdkod.exeO4 - HKLM\..\RunOnce: [atltg32.exe] C:\WINDOWS\system32\atltg32.exeO4 - HKLM\..\RunOnce: [ipkn32.exe] C:\WINDOWS\system32\ipkn32.exeO4 - HKLM\..\RunOnce: [sysst32.exe] C:\WINDOWS\sysst32.exeO4 - HKLM\..\RunOnce: [javaxn.exe] C:\WINDOWS\system32\javaxn.exeO4 - HKLM\..\RunOnce: [mfccr.exe] C:\WINDOWS\system32\mfccr.exeO4 - HKLM\..\RunOnce: [javaxp32.exe] C:\WINDOWS\system32\javaxp32.exeO4 - HKLM\..\RunOnce: [addgv.exe] C:\WINDOWS\addgv.exeO4 - HKLM\..\RunOnce: [crly32.exe] C:\WINDOWS\system32\crly32.exeO4 - HKLM\..\RunOnce: [ieqc.exe] C:\WINDOWS\ieqc.exeO4 - HKLM\..\RunOnce: [mszc32.exe] C:\WINDOWS\system32\mszc32.exeO4 - HKLM\..\RunOnce: [d3nz32.exe] C:\WINDOWS\d3nz32.exeO4 - HKLM\..\RunOnce: [ipsv32.exe] C:\WINDOWS\ipsv32.exeO4 - HKLM\..\RunOnce: [msnh32.exe] C:\WINDOWS\msnh32.exeO4 - HKLM\..\RunOnce: [winsl.exe] C:\WINDOWS\system32\winsl.exeO4 - HKLM\..\RunOnce: [ipwv.exe] C:\WINDOWS\ipwv.exeO4 - HKLM\..\RunOnce: [ipvf32.exe] C:\WINDOWS\ipvf32.exeO4 - HKLM\..\RunOnce: [apiof32.exe] C:\WINDOWS\apiof32.exeO4 - HKLM\..\RunOnce: [msla32.exe] C:\WINDOWS\system32\msla32.exeO4 - HKLM\..\RunOnce: [ieti.exe] C:\WINDOWS\system32\ieti.exeO4 - HKLM\..\RunOnce: [ipjm.exe] C:\WINDOWS\system32\ipjm.exeO4 - HKLM\..\RunOnce: [mfcws.exe] C:\WINDOWS\system32\mfcws.exeO4 - HKLM\..\RunOnce: [addep.exe] C:\WINDOWS\system32\addep.exeO4 - HKLM\..\RunOnce: [d3jr32.exe] C:\WINDOWS\d3jr32.exeO4 - HKLM\..\RunOnce: [sysvh32.exe] C:\WINDOWS\sysvh32.exeO4 - HKLM\..\RunOnce: [crlx32.exe] C:\WINDOWS\system32\crlx32.exeO4 - HKLM\..\RunOnce: [d3tf32.exe] C:\WINDOWS\system32\d3tf32.exeO4 - HKLM\..\RunOnce: [apppw32.exe] C:\WINDOWS\system32\apppw32.exeO4 - HKLM\..\RunOnce: [atlwe.exe] C:\WINDOWS\atlwe.exeO4 - HKLM\..\RunOnce: [appxf.exe] C:\WINDOWS\system32\appxf.exeO4 - HKLM\..\RunOnce: [ipnu32.exe] C:\WINDOWS\ipnu32.exeO4 - HKLM\..\RunOnce: [crlb32.exe] C:\WINDOWS\crlb32.exeO4 - HKLM\..\RunOnce: [sdkgn.exe] C:\WINDOWS\system32\sdkgn.exeWith all other programs and browsers closed, click fix checked.Step 4Scan with HijackThis and post a new log as a reply to this thread. Link to post Share on other sites
Recommended Posts