Browser problems opening websites and also popup ads

Status
Not open for further replies.

Bryce

Posts: 12   +0
I've tried using FireFox Opera and IE but all have the same problems

Some sites work, most sites don't (luckily this one does). They try to load but nothing happens. Also I've been getting hit with pop ups every now and then too.

The popups are kinda annoying but I can deal with that it's not too important. But sites I usually go on can't load anymore even though I know the sites are perfectly fine.

I've run a scan with NOD32 but it didn't pick up anything. I've run hijackthis but kinda clueless to what I should be getting rid of. If someone can tell me what should and/or shouldn't be there that would be great.

Your help would be very much appreciated!

(CPU2) AMD Athlon™ 64 X2 Dual Core Processor 3600+ @ 1900MHz (AMD R690A-M2T mainboard) (RAM) 2GB, 1.15GB free (HDDs) 530GB, 119GB free
(VGA1) ATI Radeon Xpress 1250 Series (700MB), 1680x1050x32, 60Hz (OS) Microsoft Windows XP Professional (SP2),

Here's a log from highjackthis

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:54:37 AM, on 05/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\TGTSoft\StyleXP\StyleXPService.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2H1.EXE
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\Program Files\Common Files\Logitech\LComMgr\Communications_Helper.exe
C:\Program Files\Common Files\Logitech\LComMgr\LVComSX.exe
C:\Program Files\Eset\nod32kui.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Google\Gmail Notifier\gnotify.exe
C:\Program Files\COMODO\Firewall\cfp.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Google\Google Talk\googletalk.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe
C:\Program Files\KlipFolio\KlipFolio.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\COMODO\Firewall\cmdagent.exe
C:\Program Files\Eset\nod32krn.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\NetPerSec\NetPerSec.exe
C:\WINDOWS\ALCFDRTM.EXE
C:\Program Files\Common Files\Logitech\KhalShared\KHALMNPR.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
D:\mIRC\mirc.exe
C:\Program Files\Winamp\winamp.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = somesite
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = somesite
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [EPSON Stylus Photo R200 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2H1.EXE /P30 "EPSON Stylus Photo R200 Series" /O6 "USB001" /M "Stylus Photo R200"
O4 - HKLM\..\Run: [LogitechCommunicationsManager] "C:\Program Files\Common Files\Logitech\LComMgr\Communications_Helper.exe"
O4 - HKLM\..\Run: [LVCOMSX] "C:\Program Files\Common Files\Logitech\LComMgr\LVComSX.exe"
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"
O4 - HKLM\..\Run: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] C:\Program Files\Google\Gmail Notifier\gnotify.exe
O4 - HKLM\..\Run: [COMODO Firewall Pro] "C:\Program Files\COMODO\Firewall\cfp.exe" -h
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [BMb748a9a2] Rundll32.exe "C:\WINDOWS\system32\crvadywu.dll",s
O4 - HKLM\..\Run: [b47b9a3e] rundll32.exe "C:\WINDOWS\system32\ngfhljye.dll",b
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [KlipFolio] "C:\Program Files\KlipFolio\KlipFolio.exe" /BOOT
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [STYLEXP] C:\Program Files\TGTSoft\StyleXP\StyleXP.exe -Hide
O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized
O4 - HKCU\..\Run: [kek] c:\WINDOWS\system32\kek.exe
O4 - HKCU\..\Run: [mpt] c:\WINDOWS\system32\mpt.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Startup: NetPerSec.lnk = C:\Program Files\NetPerSec\NetPerSec.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = ?
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - www[DOT]update.microsoft[DOT]com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1204073412218
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - messenger[DOT]zone[DOT]msn[DOT]com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - messenger[DOT]zone[DOT]msn[DOT]com/binary/MineSweeper.cab56986.cab
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\PROGRA~1\MICROS~2\Office12\GR99D3~1.DLL
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: COMODO Firewall Pro Helper Service (cmdAgent) - COMODO - C:\Program Files\COMODO\Firewall\cmdagent.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe
O23 - Service: StyleXPService - Unknown owner - C:\Program Files\TGTSoft\StyleXP\StyleXPService.exe

--
End of file - 8522 bytes
 
Hi Bryce

You got a nice little collection of malware going.

My name is Blind Dragon and I will be helping you with your Malware problem. During the course of our interactions please be sure to follow all instructions carefully, and ask questions if you are unsure of how to proceed at any point.

Please have a read here-> Is your system infected? Read this before Cleaning or Formatting

If you decide to clean your system please follow these Viruses/Spyware/Malware, preliminary removal instructions and post back in this thread with the requested logs. There should be at least 3.

1)MBAM log
2)SAS log
3)Hijackthis log (last step)

This thread is for the use of Bryce only. Please don't post your own virus/spyware problems in this thread. Instead, open a new thread in our security and the web forum.
 
Hi Blind Dragon,

Thanks for going over this headache with me!

I went through the preliminary procedures and it seems I can access the websites I couldn't before now.

When I started up SAS I tried to update it, but for some reason it said my firewall wasn't letting me.
 
Malwarebytes' Anti-Malware 1.24
Database version: 1028
Windows 5.1.2600 Service Pack 2

4:17:14 PM 05/08/2008
mbam-log-8-5-2008 (16-17-08).txt

Scan type: Full Scan (C:\|D:\|E:\|F:\|G:\|)
Objects scanned: 211031
Time elapsed: 1 hour(s), 5 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 4
Registry Keys Infected: 16
Registry Values Infected: 3
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 21

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\ngfhljye.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\yayWpqQk.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\crvadywu.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\qoMgeBSI.dll (Trojan.Vundo) -> No action taken.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0593b9d8-2aa4-42c2-a5f1-3ed9cdac633c} (Trojan.Vundo) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{0593b9d8-2aa4-42c2-a5f1-3ed9cdac633c} (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5520bfda-0c8e-4340-be57-c94441deceae} (Trojan.Vundo) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{5520bfda-0c8e-4340-be57-c94441deceae} (Trojan.Vundo) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{bb81fe02-f70b-46c2-82c3-de5c6652e677} (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bb81fe02-f70b-46c2-82c3-de5c6652e677} (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\qomgebsi (Trojan.Vundo) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IProxyProvider (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> No action taken.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b47b9a3e (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bmb748a9a2 (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{bb81fe02-f70b-46c2-82c3-de5c6652e677} (Trojan.Vundo) -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\yaywpqqk -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\yaywpqqk -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\cjdhki.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\yayWpqQk.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\kQqpWyay.ini (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\kQqpWyay.ini2 (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\ngfhljye.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\eyjlhfgn.ini (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\crvadywu.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\qoMgeBSI.dll (Trojan.Vundo) -> No action taken.
C:\System Volume Information\_restore{3F141973-C6E7-4CDF-BC5B-DEF6AD8F1517}\RP175\A0032137.exe (Trojan.Agent) -> No action taken.
C:\System Volume Information\_restore{3F141973-C6E7-4CDF-BC5B-DEF6AD8F1517}\RP175\A0032310.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\opnopQjj.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\ffmjavke.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\pmnoPghH.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\vrotjamg.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\awtqpMFx.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\bctpjy.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\system32\hxobohpm.dll (Trojan.Vundo) -> No action taken.
C:\WINDOWS\cookies.ini (Malware.Trace) -> No action taken.
C:\WINDOWS\pskt.ini (Trojan.Vundo) -> No action taken.
C:\WINDOWS\BMb748a9a2.xml (Trojan.Vundo) -> No action taken.
C:\WINDOWS\BMb748a9a2.txt (Trojan.Vundo) -> No action taken.
 
SUPERAntiSpyware Scan Log


Generated 08/05/2008 at 04:56 PM

Application Version : 4.15.1000

Core Rules Database Version : 3469
Trace Rules Database Version: 1460

Scan type : Complete Scan
Total Scan Time : 00:26:14

Memory items scanned : 524
Memory threats detected : 0
Registry items scanned : 6098
Registry threats detected : 0
File items scanned : 19502
File threats detected : 0

Adware.Tracking Cookie
.doubleclick.net [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
ad.yieldmanager.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.atdmt.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.mediaplex.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
m.rmbclick.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
adopt.euroclick.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
cache.trafficmp.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
cache.trafficmp.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.trafficmp.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.trafficmp.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.trafficmp.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.trafficmp.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.trafficmp.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.adserver.easyad.info [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.lotsofads.smilingtraffic.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
rotator.adjuggler.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
rotator.adjuggler.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
rotator.adjuggler.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.zedo.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.zedo.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.zedo.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.zedo.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.zedo.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.zedo.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.lotsofads.smilingtraffic.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.lotsofads.smilingtraffic.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.lotsofads.smilingtraffic.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.fastclick.net [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.fastclick.net [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.fastclick.net [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.fastclick.net [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
statse.webtrendslive.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.apmebf.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.tribalfusion.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.tradedoubler.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
.tradedoubler.com [ C:\Documents and Settings\Bryce Z\Application Data\Mozilla\Firefox\Profiles\rp7wuypb.default\cookies.txt ]
 
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:37:30 PM, on 05/08/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\TGTSoft\StyleXP\StyleXPService.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\COMODO\Firewall\cmdagent.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\ATI Technologies\ATI.ACE\CLI.EXE
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2H1.EXE
C:\Program Files\Common Files\Logitech\LComMgr\Communications_Helper.exe
C:\Program Files\Common Files\Logitech\LComMgr\LVComSX.exe
C:\Program Files\Eset\nod32kui.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Google\Gmail Notifier\gnotify.exe
C:\Program Files\COMODO\Firewall\cfp.exe
C:\Program Files\Eset\nod32krn.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Google\Google Talk\googletalk.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\NetPerSec\NetPerSec.exe
C:\WINDOWS\ALCFDRTM.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Common Files\Logitech\KhalShared\KHALMNPR.EXE
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Winamp\winamp.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.isoshu.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.isoshu.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: AddTask Class - {24F06550-65E3-4D1C-8CFE-839C296B5530} - C:\Program Files\eREAD6.0\eREAD6.0\IEeREAD.dll (file missing)
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: AddTask Class - {6A19C29D-ED45-4483-8999-9F939C8161F2} - C:\Program Files\eREAD\eREAD\WebHook.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [EPSON Stylus Photo R200 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2H1.EXE /P30 "EPSON Stylus Photo R200 Series" /O6 "USB001" /M "Stylus Photo R200"
O4 - HKLM\..\Run: [LogitechCommunicationsManager] "C:\Program Files\Common Files\Logitech\LComMgr\Communications_Helper.exe"
O4 - HKLM\..\Run: [LVCOMSX] "C:\Program Files\Common Files\Logitech\LComMgr\LVComSX.exe"
O4 - HKLM\..\Run: [nod32kui] "C:\Program Files\Eset\nod32kui.exe" /WAITSERVICE
O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"
O4 - HKLM\..\Run: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] C:\Program Files\Google\Gmail Notifier\gnotify.exe
O4 - HKLM\..\Run: [COMODO Firewall Pro] "C:\Program Files\COMODO\Firewall\cfp.exe" -h
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [googletalk] C:\Program Files\Google\Google Talk\googletalk.exe /autostart
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [KlipFolio] "C:\Program Files\KlipFolio\KlipFolio.exe" /BOOT
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [STYLEXP] C:\Program Files\TGTSoft\StyleXP\StyleXP.exe -Hide
O4 - HKCU\..\Run: [kek] c:\WINDOWS\system32\kek.exe
O4 - HKCU\..\Run: [mpt] c:\WINDOWS\system32\mpt.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Startup: NetPerSec.lnk = C:\Program Files\NetPerSec\NetPerSec.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = ?
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/win...ls/en/x86/client/wuweb_site.cab?1204073412218
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab56986.cab
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\PROGRA~1\MICROS~2\Office12\GR99D3~1.DLL
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Ad-Aware 2007 Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: COMODO Firewall Pro Helper Service (cmdAgent) - COMODO - C:\Program Files\COMODO\Firewall\cmdagent.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NOD32 Kernel Service (NOD32krn) - Eset - C:\Program Files\Eset\nod32krn.exe
O23 - Service: StyleXPService - Unknown owner - C:\Program Files\TGTSoft\StyleXP\StyleXPService.exe

--
End of file - 8775 bytes
 
Please ATTACH the logs as instructed (not copy & paste) ! unless you can't somehow.
 
adu123, yeah I know, sorry about that. I misread it as link instead of attach, which I couldn't do because I didn't have 5 posts yet. I will make sure to use the attach button from now on.
 
Please download VundoFix.exe to your desktop.
  • Double-click VundoFix.exe to run it.
  • Click the Scan for Vundo button.
  • Once it's done scanning, click the Remove Vundo button.
  • You will receive a prompt asking if you want to remove the files, click YES
  • Once you click yes, your desktop will go blank as it starts removing Vundo.
  • When completed, it will prompt that it will reboot your computer, click OK.
  • Please attach the C:\vundofix.txt and a new HiJackThis log.
Note: It is possible that VundoFix encountered a file it could not remove.
In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the Scan for Vundo button." when VundoFix appears at reboot.

-----------------------------------------------------------------

I also want you to rename hijackthis before next scan as vundo sometimes hides from it

Navigate to:
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

and rename hijackthis.exe to bryce.exe
 
Please download VundoFix.exe to your desktop.
  • Double-click VundoFix.exe to run it.
  • Click the Scan for Vundo button.
  • Once it's done scanning, click the Remove Vundo button.
  • You will receive a prompt asking if you want to remove the files, click YES
  • Once you click yes, your desktop will go blank as it starts removing Vundo.
  • When completed, it will prompt that it will reboot your computer, click OK.
  • Please attach the C:\vundofix.txt and a new HiJackThis log.
Note: It is possible that VundoFix encountered a file it could not remove.
In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the Scan for Vundo button." when VundoFix appears at reboot.

-----------------------------------------------------------------

I also want you to rename hijackthis before next scan as vundo sometimes hides from it

Navigate to:
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

and rename hijackthis.exe to bryce.exe

Hi Blind Dragon,

I downloaded and ran VundoFix.exe but it didn't find anything.

I went to c:\program files\Trend Micro\hijacthis\ and renamed HijackThis.exe to Bryce.exe then ran it.
 
color=blue]Remove bad HijackThis entries[/color]
  • Run HijackThis
  • Click on the System Scan Only button
  • Put a check beside all of the items listed below (if present):

    O4 - HKCU\..\Run: [kek] c:\WINDOWS\system32\kek.exe
    O4 - HKCU\..\Run: [mpt] c:\WINDOWS\system32\mpt.exe
  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

-----------------------------------------------------------------

OTMoveit2 by OldTimer
Please download the OTMoveIt2 by OldTimer.
  • Save it to your desktop.
  • Please double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
  • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    Code:
    [b]c:\WINDOWS\system32\kek.exe
    c:\WINDOWS\system32\mpt.exe[/b]
  • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to Move" window (under the light Yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • A log of files and folders moved will be created in the c:\_OTMoveIt\MovedFiles folder in the form of Date and Time (mmddyyyy_hhmmss.log). Please open this log in Notepad and post its contents in your next reply.
  • Close OTMoveIt2
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

----------------------------------------------------------------------------------

f_Logo1m_7c1b64d.png
Run Kaspersky Online AV Scanner

In order to use it you have to use Internet Explorer.
Go to Kaspersky and click the Accept button at the end of the page.

Note for Internet Explorer 7 users: If at any time you have trouble with the accept button of the licence, click on the Zoom tool located at the right bottom of the IE window and set the zoom to 75 %. Once the license accepted, reset to 100%.
  • Read the Requirements and limitations before you click Accept.
  • Allow the ActiveX download if necessary.
  • Once the database has downloaded, click Next.
  • Click on "My Computer"
  • When the scan has completed, click Save Report As...
  • Enter a name for the file in the Filename: text box and then click the down arrow to the right of Save as type: and select text file (*.txt)
  • Click Save - by default the file will be saved to your Desktop, but you can change this if you wish.
Attach the report into your next reply


Attach here:
1) OTMoveit2! log
2) Kaspersky log
3) A fresh hijackthis run after
 
Most of these are the installers and not the programs themselves - I recommend you first go to add/remove programs and uninstall mIRC or anything affiliated with it - you can reinstall it later if you use it -

OTMoveit2 by OldTimer
Please download the OTMoveIt2 by OldTimer.
  • Save it to your desktop.
  • Please double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
  • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    Code:
    [b][kill explorer]
    purity
    D:\mIRC	
    C:\Program Files\ESET\infected\CSP3ZGAA.NQF
    D:\amIRC
    D:\nnsmIRC
    E:\40GB\Applications\fgf140.exe
    E:\40GB\Applications\Invision2.00_Build_1420_on_mIRC_6.01(IRC_Script).rar	
    E:\40GB\Applications\Invision2b1515.exe
    E:\40GB\Applications\jetaud.exe
    E:\40GB\Applications\jetaud.exe
    E:\40GB\Applications\mirc612.exe
    E:\40GB\Applications\netants.zip
    E:\40GB\Applications\polaris01a.zip
    E:\40GB\Applications\polaris2001v4.0.zip	
    E:\40GB\Applications\susetup.exe
    E:\40GB\Applications\syris.zip	
    E:\40GB\Applications\Syris1-9-1.zip
    E:\40GB\Applications\Syris1-9.zip
    E:\40GB\Applications\upp.zip
    E:\40GB\i2Old\mIRC32.exe	
    E:\40GB\Invis\mIRC32.exe
    E:\40GB\mIRC
    E:\40GB\Syris\mirc32.exe	
    E:\40GB\UPP\mIRC
    E:\40GB\UPP\upp.exe
    E:\Games\EuphRO2_Client_R83_Ver_1.3.exe
    E:\Games\EuphRO2_R97ClientPatchV1.6.exe
    F:\2008 02 25\Back up\movies\eMule0.46c\Pal2\PAL2.TMP0
    F:\Invision2\mirc.exe	
    F:\Invision2\mIRC32.exe
    F:\mIRC
    F:\software\ALCOHOL 120 1.9.7.Build 6221+crack.rar
    F:\software\Alcohol 120% 1.9.6.5403 + crack - oFFiCaL.zip
    F:\software\Aplus.Video.Joiner.v5.0.WinAll.Incl.Keygen-CRD\Setup\AplusVideoJoiner_se.exe
    F:\software\daemon4121-lite.exe
    F:\software\FlashGet.v1.65.Incl.Keygen-TSRh.RB0
    F:\software\mirc616.exe
    F:\software\mirc621.exe
    F:\software\ServUSetup.exe
    F:\software\setup_ares.exe
    F:\software\TMPGEnc.DVD.Author.v1.6.26.73.Incl.Keygen-PARADOX.zip
    F:\Sun Java Runtime Environment (JRE) v6.0_01.zip
    F:\UPP\upp.exe
    [start explorer][/b]
  • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to Move" window (under the light Yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • A log of files and folders moved will be created in the c:\_OTMoveIt\MovedFiles folder in the form of Date and Time (mmddyyyy_hhmmss.log). Please open this log in Notepad and post its contents in your next reply.
  • Close OTMoveIt2
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.
 
well, the problem is that this is probably how they have control of your system - which means they may be able to install additional malware through mIRC

I wouldn't risk messing around with it but if you want to try that be my guest. Most of these look like installers through - so after you install the program then what is the big deal of removing the installer package - the programs should still function
 
Yeah it's not the installers I'm worried about but the entire D:\mirc folder with the files I downloaded via irc.
 
Why not just move the files that you want to keep to a new folder on your desktop

uninstall it - delete the folder - reinstall then move the files back
 
I forgot to have you clear temp files so lets do that now, then we can clean up - how is the computer running

ATF.gif
ATF Cleaner by Atribune

  • Please download ATF Cleaner to your desktop from HERE
  • Double-click ATF Cleaner.exe to open it. Vista users: Right Click and Select Run as Administrator

  • Under Main choose:
    Windows Temp
    Current User Temp
    All Users Temp
    Cookies
    Temporary Internet Files
    Prefetch
    Java Cache

    *The other boxes are optional*
    Then click the Empty Selected button.

  • Firefox or Opera installed:
    Click Firefox or Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    Click Exit on the Main menu to close the program.

========================================================

OTCleanit! by Oldtimer
  • Launch OTMoveit2! again and click the green Cleanup! button

---------------------------------------------------------------------------

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  1. Set correct settings for files
    • Click Start > My Computer > Tools menu (at top of page) > Folder Options > View tab.
    • Under "Hidden files and folders" if necessary select Do not show hidden files and folders.
    • If unchecked please check Hide protected operating system files (Recommended)
    • If necessary check "Display content of system folders"
    • If necessary Uncheck Hide file extensions for known file types.
    • Click OK

    clear system restore points

    • This is a good time to clear your existing system restore points and establish a new clean restore point:
      • Go to Start > All Programs > Accessories > System Tools > System Restore
      • Select Create a restore point, and Ok it.
      • Next, go to Start > Run and type in cleanmgr
      • Select the More options tab
      • Choose the option to clean up system restore and OK it.
      This will remove all restore points except the new one you just created.

  2. Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    5. Next press the Apply button and then the OK to exit the Internet Properties page.
  3. Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  4. Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  5. Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  6. Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.This is done in Vista through control panel -> windows updates.

  7. Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  8. Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

here are some additional utilities that will enhance your safety

  • IE/Spyad <= IE/Spyad places over 4000 websites and domains in the IE Restricted list which will severely impair attempts to infect your system. It basically prevents any downloads (Cookies etc) from the sites listed, although you will still be able to connect to the sites.
  • MVPS Hosts file <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your coputer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
  • Google Toolbar <= Get the free google toolbar to help stop pop up windows.
  • Winpatrol <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
    Using Winpatrol to protect your computer from malicious software
 
Done!

Thanks for all the help Blind Dragon. I wouldn't have known how to take care of this without ya.
 
Gosh ! What can I say... you guys are first class!!!
I came across this thread while looking for updates on my anti-every bugs activities and.... I found the best knowledge I could think of righ now.
I thought I knew my bit about keeping PCs clean and stealth to any kind of thread. Well this goes together with my way to look at things, there is always someone that knows better.
I thought I was smart with my firewall, my proxy stealth, antivirus, antispy and threats and dutiful cleaning and redundant checking.
Well, you brought to my attention some other Interesting tools.
Don't think I am a maniac chasing malware 24/7, but I loved for the last 30 years to my tools free and ready to use (mind you I don't need malware to hang my computers, I can perform it all by myself!).
There again Hurrah and keep well. A very special thanks to Blind Dragon. Good Job.
 
Status
Not open for further replies.
Back