Jump to content

MBAM, PandaActive and HJT Logs


Recommended Posts

I've been hit with the intervalhehehe malware. The Logs I've been told to do will follow. Could someone please analyze these logs and tell me what to do next?

MBAM:

Malwarebytes' Anti-Malware 1.31

Database version: 1482

Windows 6.0.6001 Service Pack 1

10/12/2008 17:35:25

mbam-log-2008-12-10 (17-35-25).txt

Scan type: Quick Scan

Objects scanned: 45730

Time elapsed: 10 minute(s), 31 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 13

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9ff05104-b030-46fc-94b8-81276e4e27df} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59c7fc09-1c83-4648-b3e6-003d2bbc7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68af847f-6e91-45dd-9b68-d6a12c30e5d7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170b96c-28d4-4626-8358-27e6caeef907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d1a71fa0-ff48-48dd-9b6d-7a13a3e42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ddb1968e-ead6-40fd-8dae-ff14757f60c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{f138d901-86f0-4383-99b6-9cdd406036da} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWay) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

The PandaActive Scan and HJT will follow.

Link to post
Share on other sites

Panda ActiveScan:

;*******************************************************************************

********************************************************************************

*

*******************

ANALYSIS: 2008-12-10 21:47:25

PROTECTIONS: 3

MALWARE: 10

SUSPECTS: 0

;*******************************************************************************

********************************************************************************

*

*******************

PROTECTIONS

Description Version Active Updated

;===============================================================================

================================================================================

=

===================

Windows Defender 1.1.4205.0 No Yes

Norton 360 8.2.0.81 No No

Norton Antivirus Internet Security 2008 No No

;===============================================================================

================================================================================

=

===================

MALWARE

Id Description Type Active Severity Disinfectable Disinfected Location

;===============================================================================

================================================================================

=

===================

00167642 Cookie/Com.com TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\Low\daniel@com[2].txt

00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\Low\daniel@ad.yieldmanager[1].txt

00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\daniel@serving-sys[1].txt

00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\Low\daniel@serving-sys[2].txt

00168093 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\daniel@bs.serving-sys[2].txt

00168093 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\Low\daniel@bs.serving-sys[2].txt

00168109 Cookie/Adtech TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\Low\daniel@adtech[1].txt

00168111 Cookie/Servlet TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\Low\daniel@livehelper[1].txt

00170495 Cookie/PointRoll TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\daniel@ads.pointroll[2].txt

00171982 Cookie/QuestionMarket TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\Low\daniel@questionmarket[1].txt

00262025 Cookie/ErrorSafe TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\Low\daniel@errorsafe[2].txt

00286734 Cookie/Adserver TrackingCookie No 0 Yes No C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Cookies\Low\daniel@adserver.filefront[1].txt

;===============================================================================

================================================================================

=

===================

SUSPECTS

Sent Location Ti

C5

;===============================================================================

================================================================================

=

===================

;===============================================================================

================================================================================

=

===================

VULNERABILITIES

Id Severity Description Ti

C5

;===============================================================================

================================================================================

=

===================

;===============================================================================

================================================================================

=

===================

Link to post
Share on other sites

I'm not sure what to put for HijackThis! So I'll put the Info Section.

* Trend Micro HijackThis v2.0.2 *

See bottom for version history.

The different sections of hijacking possibilities have been separated into the following groups.

You can get more detailed information about an item by selecting it from the list of found items OR highlighting the relevant line below, and clicking 'Info on selected item'.

R - Registry, StartPage/SearchPage changes

R0 - Changed registry value

R1 - Created registry value

R2 - Created registry key

R3 - Created extra registry value where only one should be

F - IniFiles, autoloading entries

F0 - Changed inifile value

F1 - Created inifile value

F2 - Changed inifile value, mapped to Registry

F3 - Created inifile value, mapped to Registry

N - Netscape/Mozilla StartPage/SearchPage changes

N1 - Change in prefs.js of Netscape 4.x

N2 - Change in prefs.js of Netscape 6

N3 - Change in prefs.js of Netscape 7

N4 - Change in prefs.js of Mozilla

O - Other, several sections which represent:

O1 - Hijack of auto.search.msn.com with Hosts file

O2 - Enumeration of existing MSIE BHO's

O3 - Enumeration of existing MSIE toolbars

O4 - Enumeration of suspicious autoloading Registry entries

O5 - Blocking of loading Internet Options in Control Panel

O6 - Disabling of 'Internet Options' Main tab with Policies

O7 - Disabling of Regedit with Policies

O8 - Extra MSIE context menu items

O9 - Extra 'Tools' menuitems and buttons

O10 - Breaking of Internet access by New.Net or WebHancer

O11 - Extra options in MSIE 'Advanced' settings tab

O12 - MSIE plugins for file extensions or MIME types

O13 - Hijack of default URL prefixes

O14 - Changing of IERESET.INF

O15 - Trusted Zone Autoadd

O16 - Download Program Files item

O17 - Domain hijack

O18 - Enumeration of existing protocols and filters

O19 - User stylesheet hijack

O20 - AppInit_DLLs autorun Registry value, Winlogon Notify Registry keys

O21 - ShellServiceObjectDelayLoad (SSODL) autorun Registry key

O22 - SharedTaskScheduler autorun Registry key

O23 - Enumeration of NT Services

O24 - Enumeration of ActiveX Desktop Components

Command-line parameters:

* /autolog - automatically scan the system, save a logfile and open it

* /ihatewhitelists - ignore all internal whitelists

* /uninstall - remove all HijackThis Registry entries, backups and quit

* /silentautuolog - the same as /autolog, except with no required user intervention

* Version history *

[v2.00.0]

* AnalyzeThis added for log file statistics

* Recognizes Windows Vista and IE7

* Fixed a few bugs in the O23 method

* Fixed a bug in the O22 method (SharedTaskScheduler)

* Did a few tweaks on the log format

* Fixed and improved ADS Spy

* Improved Itty Bitty Procman (processes are frozen before they are killed)

* Added listing of O4 autoruns from other users

* Added listing of the Policies Run items in O4 method, used by SmitFraud trojan

* Added /silentautolog parameter for system admins

* Added /deleteonreboot [file] parameter for system admins

* Added O24 - ActiveX Desktop Components enumeration

* Added Enhanced Security Confirguration (ESC) Zones to O15 Trusted Sites check

[v1.99.1]

* Added Winlogon Notify keys to O20 listing

* Fixed crashing bug on certain Win2000 and WinXP systems at O23 listing

* Fixed lots and lots of 'unexpected error' bugs

* Fixed lots of inproper functioning bugs (i.e. stuff that didn't work)

* Added 'Delete NT Service' function in Misc Tools section

* Added ProtocolDefaults to O15 listing

* Fixed MD5 hashing not working

* Fixed 'ISTSVC' autorun entries with garbage data not being fixed

* Fixed HijackThis uninstall entry not being updated/created on new versions

* Added Uninstall Manager in Misc Tools to manage 'Add/Remove Software' list

* Added option to scan the system at startup, then show results or quit if nothing found

[v1.99]

* Added O23 (NT Services) in light of newer trojans

* Integrated ADS Spy into Misc Tools section

* Added 'Action taken' to info in 'More info on this item'

[v1.98]

* Definitive support for Japanese/Chinese/Korean systems

* Added O20 (AppInit_DLLs) in light of newer trojans

* Added O21 (ShellServiceObjectDelayLoad, SSODL) in light of newer trojans

* Added O22 (SharedTaskScheduler) in light of newer trojans

* Backups of fixed items are now saved in separate folder

* HijackThis now checks if it was started from a temp folder

* Added a small process manager (Misc Tools section)

[v1.96]

* Lots of bugfixes and small enhancements! Among others:

* Fix for Japanese IE toolbars

* Fix for searchwww.com fake CLSID trick in IE toolbars and BHO's

* Attributes on Hosts file will now be restored when scanning/fixing/restoring it.

* Added several files to the LSP whitelist

* Fixed some issues with incorrectly re-encrypting data, making R0/R1 go undetected until a restart

* All sites in the Trusted Zone are now shown, with the exception of those on the nonstandard but safe domain list

[v1.95]

* Added a new regval to check for from Whazit hijack (Start Page_bak).

* Excluded IE logo change tweak from toolbar detection (BrandBitmap and SmBrandBitmap).

* New in logfile: Running processes at time of scan.

* Checkmarks for running StartupList with /full and /complete in HijackThis UI.

* New O19 method to check for Datanotary hijack of user stylesheet.

* Google.com IP added to whitelist for Hosts file check.

[v1.94]

* Fixed a bug in the Check for Updates function that could cause corrupt downloads on certain systems.

* Fixed a bug in enumeration of toolbars (Lop toolbars are now listed!).

* Added imon.dll, drwhook.dll and wspirda.dll to LSP safelist.

* Fixed a bug where DPF could not be deleted.

* Fixed a stupid bug in enumeration of autostarting shortcuts.

* Fixed info on Netscape 6/7 and Mozilla saying '%shitbrowser%' (oops).

* Fixed bug where logfile would not auto-open on systems that don't have .log filetype registered.

* Added support for backing up F0 and F1 items (d'oh!).

[v1.93]

* Added mclsp.dll (McAfee), WPS.DLL (Sygate Firewall), zklspr.dll (Zero Knowledge) and mxavlsp.dll (OnTrack) to LSP safelist.

* Fixed a bug in LSP routine for Win95.

* Made taborder nicer.

* Fixed a bug in backup/restore of IE plugins.

* Added UltimateSearch hijack in O17 method (I think).

* Fixed a bug with detecting/removing BHO's disabled by BHODemon.

* Also fixed a bug in StartupList (now version 1.52.1).

[v1.92]

* Fixed two stupid bugs in backup restore function.

* Added DiamondCS file to LSP files safelist.

* Added a few more items to the protocol safelist.

* Log is now opened immediately after saving.

* Removed rd.yahoo.com from NSBSD list (spammers are starting to use this, no doubt spyware authors will follow).

* Updated integrated StartupList to v1.52.

* In light of SpywareNuker/BPS Spyware Remover, any strings relevant to reverse-engineers are now encrypted.

* Rudimentary proxy support for the Check for Updates function.

[v1.91]

* Added rd.yahoo.com to the Nonstandard But Safe Domains list.

* Added 8 new protocols to the protocol check safelist, as well as showing the file that handles the protocol in the log (O18).

* Added listing of programs/links in Startup folders (O4).

* Fixed 'Check for Update' not detecting new versions.

[v1.9]

* Added check for Lop.com 'Domain' hijack (O17).

* Bugfix in URLSearchHook (R3) fix.

* Improved O1 (Hosts file) check.

* Rewrote code to delete BHO's, fixing a really nasty bug with orphaned BHO keys.

* Added AutoConfigURL and proxyserver checks (R1).

* IE Extensions (Button/Tools menuitem) in HKEY_CURRENT_USER are now also detected.

* Added check for extra protocols (O18).

[v1.81]

* Added 'ignore non-standard but safe domains' option.

* Improved Winsock LSP hijackers detection.

* Integrated StartupList updated to v1.4.

[v1.8]

* Fixed a few bugs.

* Adds detecting of free.aol.com in Trusted Zone.

* Adds checking of URLSearchHooks key, which should have only one value.

* Adds listing/deleting of Download Program Files.

* Integrated StartupList into the new 'Misc Tools' section of the Config screen!

[v1.71]

* Improves detecting of O6.

* Some internal changes/improvements.

[v1.7]

* Adds backup function! Yay!

* Added check for default URL prefix

* Added check for changing of IERESET.INF

* Added check for changing of Netscape/Mozilla homepage and default search engine.

[v1.61]

* Fixes Runtime Error when Hosts file is empty.

[v1.6]

* Added enumerating of MSIE plugins

* Added check for extra options in 'Advanced' tab of 'Internet Options'.

[v1.5]

* Adds 'Uninstall & Exit' and 'Check for update online' functions.

* Expands enumeration of autoloading Registry entries (now also scans for .vbs, .js, .dll, rundll32 and service)

[v1.4]

* Adds repairing of broken Internet access (aka Winsock or LSP fix) by New.Net/WebHancer

* A few bugfixes/enhancements

[v1.3]

* Adds detecting of extra MSIE context menu items

* Added detecting of extra 'Tools' menu items and extra buttons

* Added 'Confirm deleting/ignoring items' checkbox

[v1.2]

* Adds 'Ignorelist' and 'Info' functions

[v1.1]

* Supports BHO's, some default URL changes

[v1.0]

* Original release

Is this what I should put?

Link to post
Share on other sites

Aha, found the HJT logfile ^^;

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 15:54:16, on 11/12/2008

Platform: Windows Vista SP1 (WinNT 6.00.1905)

MSIE: Internet Explorer v7.00 (7.00.6001.18000)

Boot mode: Normal

Running processes:

C:\Windows\Explorer.EXE

C:\Windows\system32\taskeng.exe

C:\Program Files\Windows Defender\MSASCui.exe

C:\Windows\RtHDVCpl.exe

C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe

C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe

C:\Program Files\Common Files\Real\Update_OB\realsched.exe

C:\Windows\System32\igfxtray.exe

C:\Windows\System32\hkcmd.exe

C:\Windows\System32\igfxpers.exe

C:\Windows\system32\igfxsrvc.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

C:\Program Files\Windows Live\Messenger\msnmsgr.exe

C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe

C:\Windows\ehome\ehtray.exe

C:\Program Files\Skype\Phone\Skype.exe

C:\Program Files\Windows Media Player\wmpnscfg.exe

C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

C:\Windows\ehome\ehmsas.exe

C:\Windows\system32\wbem\unsecapp.exe

C:\Program Files\Skype\Plugin Manager\skypePM.exe

C:\Windows\system32\Dwm.exe

C:\Program Files\iTunes\iTunes.exe

C:\Program Files\Microsoft Office\Office\WINWORD.EXE

C:\Program Files\Internet Explorer\ieuser.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.gaiaonline.com/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://support.thetechguys.com

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 10.1.1.100:8080

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

R3 - URLSearchHook: (no name) - - (no file)

O1 - Hosts: 61.157.217.210 www.yahoo.com

O1 - Hosts: 61.157.217.210 www.google.com

O1 - Hosts: 61.157.217.210 www.google.co.uk

O1 - Hosts: 61.157.217.210 www.myspace.com

O1 - Hosts: 61.157.217.210 www.youtube.com

O1 - Hosts: 61.157.217.210 www.facebook.com

O1 - Hosts: 61.157.217.210 www.live.com

O1 - Hosts: 61.157.217.210 www.yahoo.com

O1 - Hosts: 61.157.217.210 www.yahoo.co.uk

O1 - Hosts: 61.157.217.210 www.antispyware.com

O1 - Hosts: 61.157.217.210 antispyware.com

O1 - Hosts: 61.157.217.210 antispy.com

O1 - Hosts: 61.157.217.210 www.msn.com

O1 - Hosts: 204.16.197.121 www.asfvb.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.3.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.657.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.34.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.45.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.asdv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvtrv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.g.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.bb.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.dfyu.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.bb.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.dfyu.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.bb.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.dfyu.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.bb.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.dfyu.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 204.16.197.121 www.xvv.com

O1 - Hosts: 61.157.217.210 www.antispy.com

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll

O2 - BHO: Skype add-on (mastermind) - {22BF413B-C6D2-4d91-82A9-A0F997BA588C} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll

O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll

O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll

O2 - BHO: NCO 2.0 IE BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\2.6\coIEPlg.dll

O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\PROGRA~1\COMMON~1\SYMANT~1\IDS\IPSBHO.dll

O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll

O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll

O2 - BHO: FCTB00108Pos - {B1BE275B-78BF-4A33-81AB-380699CFF329} - C:\Program Files\Gaia Online Toolbar\Toolbar.dll

O3 - Toolbar: (no name) - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - (no file)

O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\Windows\system32\Msdxm6.ocx

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll

O3 - Toolbar: Gaia Online Toolbar - {B3535C18-0E70-4D4B-B36B-BBFE139BB144} - C:\Program Files\Gaia Online Toolbar\Toolbar.dll

O3 - Toolbar: Show Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\2.6\CoIEPlg.dll

O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide

O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe

O4 - HKLM\..\Run: [sMSERIAL] C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"

O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot

O4 - HKLM\..\Run: [igfxTray] C:\Windows\system32\igfxtray.exe

O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe

O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe

O4 - HKLM\..\Run: [NapsterShell] C:\Program Files\Napster\napster.exe /systray

O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe

O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"

O4 - HKLM\..\Run: [osCheck] "C:\Program Files\Norton 360\osCheck.exe"

O4 - HKLM\..\Run: [skytel] Skytel.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime

O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"

O4 - HKCU\..\Run: [sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun

O4 - HKCU\..\Run: [Reminder_MUI] C:\Applications\oem\Reminder\Reminder_MUI.exe

O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background

O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe

O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe

O4 - HKCU\..\Run: [skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized

O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe

O4 - HKCU\..\Run: [spybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

O4 - HKUS\S-1-5-19\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')

O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')

O4 - HKUS\S-1-5-20\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')

O4 - Startup: IMVU.lnk = C:\Users\Daniel\AppData\Roaming\IMVUClient\IMVUClient.exe

O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~4.0_0\bin\ssv.dll

O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~4.0_0\bin\ssv.dll

O9 - Extra button: Skype - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll

O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - C:\Users\Daniel\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)

O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll

O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll

O13 - Gopher Prefix:

O16 - DPF: {2D8ED06D-3C30-438B-96AE-4D110FDC1FB8} (ActiveScan 2.0 Installer Class) - http://www.pandasecurity.com/activescan/cabs/as2stubie.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{6A8D8DCF-1D4D-435F-B813-E10BFD3F9E55}: NameServer = 4.2.2.2

O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL

O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

O23 - Service: Autodesk Licensing Service - Autodesk - C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe

O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe

O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe

O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

O23 - Service: COM Host (comHost) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\VAScanner\comHost.exe

O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe

O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: LiveUpdate - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\LuComServer_3_4.EXE

O23 - Service: LiveUpdate Notice - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

O23 - Service: mental ray 3.6 Satellite for Autodesk 3ds Max 2008 32-bit 32-bit (mi-raysat_3dsMax2008_32) - Unknown owner - C:\Program Files\Autodesk\3ds Max 2008\mentalray\satellite\raysat_3dsMax2008_32server.exe

O23 - Service: O2Micro Flash Memory (O2Flash) - O2Micro International - C:\Windows\system32\o2flash.exe

O23 - Service: Symantec Core LC - Unknown owner - C:\PROGRA~1\COMMON~1\SYMANT~1\CCPD-LC\symlcsvc.exe

--

End of file - 13059 bytes

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.