Author Topic: Back again for some much needed help  (Read 7226 times)

Offline guestolo

  • Site Donator
  • Administrator
  • Hero Member
  • *****
  • Posts: 16034
  • Karma: +1/-0
    • View Profile
    • http://
Back again for some much needed help
« Reply #20 on: March 01, 2005, 09:47:56 PM »
EDIT>>One note before proceeding with the below
Can you see if you have Notepad.exe
in the C:\WINDOWS\SYSTEM32 folder
and the C:\WINDOWS folder
If you do can you right click on them and left click properties and let  me know the file size of both and date created
There probably legit, I just want to make sure that there alright



Of course, if you have a legit version of Windows it may be time to jump to Service Pack 2

I would do an online virus scan at Panda's and Housecall's
Restart if anything cleaned out
And clear your System Restore Points one more time


Make sure that if you have Ad-Aware installed you update and check for spyware

Clean those temp files again on startup
Temporarily Disable any Security software such as Trojan Guard before visiting so it won't interfere with the installation
Create a Fresh Restore point

Read this
http://www.microsoft.com/windowsxp/sp2/sp2_whattoknow.mspx
« Last Edit: March 02, 2005, 01:37:56 AM by guestolo »

Do you want to post your own logs from FRST?

Follow the instructions posted http://www.thetechguide.com/forum/index.php/topic/22942-please-read-how-to-post-logs-from-frst/\'>Click Here


Offline SahDu

  • Jr. Member
  • **
  • Posts: 66
  • Karma: +0/-0
    • View Profile
Back again for some much needed help
« Reply #21 on: March 04, 2005, 05:47:01 PM »
Sorry about the late reply, been working a lot this week. The notepad.exe from the C:\Windows folder was created August 23, 2001 and is about 65kb. There didnt seem to be a notepad.exe in the System32 folder. Both Panda and Housecall found some problems, so I saved the logs. Pandas:


Incident                      Status                        Location                                                                                                                                                                                                                                                        

Spyware:Spyware/Cydoor        No disinfected                C:\WINDOWS\System32\cd_clint.dll                                                                                                                                                                                                                                
Adware:Adware/eZula           No disinfected                Windows Registry                                                                                                                                                                                                                                                
Adware:Adware/Gator           No disinfected                C:\WINDOWS\FT*_GEPFAH.EXE                                                                                                                                                                                                                                      
Spyware:Spyware/BetterInet    No disinfected                C:\WINDOWS\inf\payload2.inf                                                                                                                                                                                                                                    
Adware:Adware/CWS             No disinfected                C:\WINDOWS\system.sam                                                                                                                                                                                                                                          
Adware:Adware/BHO             No disinfected                Windows Registry                                                                                                                                                                                                                                                
Adware:Adware/BookedSpace     No disinfected                C:\WINDOWS\bsx32                                                                                                                                                                                                                                                
Adware:Adware/Apropos         No disinfected                Windows Registry                                                                                                                                                                                                                                                
Adware:Adware/FavoriteMan     No disinfected                C:\WINDOWS\downloaded program files\ATPartners.inf                                                                                                                                                                                                              
Adware:Adware/WinTools        No disinfected                Windows Registry                                                                                                                                                                                                                                                
Adware:Adware/VirtualBouncer  No disinfected                C:\WINDOWS\System32\InnerVBInstall.log                                                                                                                                                                                                                          
Adware:Adware/DelFinMedia     No disinfected                C:\keys.ini                                                                                                                                                                                                                                                    
Adware:Adware/MediaTickets    No disinfected                Windows Registry                                                                                                                                                                                                                                                
Adware:Adware/DealHelper      No disinfected                C:\WINDOWS\System32\DealHelper                                                                                                                                                                                                                                  
Adware:Adware/Adroar          No disinfected                C:\WINDOWS\artmmp.ini                                                                                                                                                                                                                                          
Spyware:Spyware/Altnet        No disinfected                Windows Registry                                                                                                                                                                                                                                                
Adware:Adware/ExactSearch     No disinfected                C:\WINDOWS\System32\eXactSetup.dll                                                                                                                                                                                                                              
Adware:Adware/Beginto         No disinfected                C:\WINDOWS\System32\b2s_cache                                                                                                                                                                                                                                  
Adware:Adware/E2Give          No disinfected                Windows Registry                                                                                                                                                                                                                                                
Adware:Adware/MultiMPP        No disinfected                C:\Program Files\Hijack This\backups\backup-20050227-183851-827.dll                                                                                                                                                                                            
Adware:Adware/Lop             No disinfected                C:\RECYCLER\NPROTECT\00186249.EXE                                                                                                                                                                                                                              
Adware:Adware/NetPals         No disinfected                C:\WINDOWS\Downloaded Program Files\ATPartners.inf                                                                                                                                                                                                              
Adware:Adware/BTGrab          No disinfected                C:\WINDOWS\INF\btgrab.inf                                                                                                                                                                                                                                      
Spyware:Spyware/BetterInet    No disinfected                C:\WINDOWS\INF\ceres.inf                                                                                                                                                                                                                                        
Adware:Adware/IPInsight       No disinfected                C:\WINDOWS\INF\farmmext.inf                                                                                                                                                                                                                                    
Adware:Adware/CWS             No disinfected                C:\WINDOWS\system.sam                                                                                                                                                                                                                                          
Virus:Trj/Qhost.Y             Disinfected                   C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts.20041130-070242.backup                                                                                                                                                                                                    
Virus:Trj/Qhost.Y             Disinfected                   C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts.20041201-000713.backup                                                                                                                                                                                                    
Virus:Trj/Qhost.Y             Disinfected                   C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts.20041201-000727.backup                                                                                                                                                                                                    
Virus:Trj/Qhost.Y             Disinfected                   C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts.20050217-211348.backup                                                                                                                                                                                                    
Virus:Trj/Qhost.Y             Disinfected                   C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts.20050217-211442.backup                                                                                                                                                                                                    
Virus:Trj/Qhost.Y             Disinfected                   C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts.20050220-161453.backup                                                                                                                                                                                                    
Virus:Trj/Qhost.Y             Disinfected                   C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts.20050221-172917.backup                                                                                                                                                                                                    
Virus:Trj/Qhost.Y             Disinfected                   C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts.20050228-010232.backup                                                                                                                                                                                                    
Virus:Trj/Qhost.Y             Disinfected                   C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts.20050228-010233.backup                                                                                                                                                                                                    
Virus:Trj/Qhost.Y             Disinfected                   C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts.20050228-010234.backup                                                                                                                                                                                                    
Virus:Trj/Qhost.Y             Disinfected                   C:\WINDOWS\SYSTEM32\DRIVERS\ETC\hosts.bak                                                                                                                                                                                                                      
Adware:Adware/PurityScan      No disinfected                C:\WINDOWS\SYSTEM32\LASS~1.EXE                                                                                                                                                                                                                                  
Spyware:Spyware/Cydoor        No disinfected                C:\WINDOWS\SYSTEM32\netpals.dll                                                                                                                                                                                                                                
Spyware:Spyware/LinkReplacer  No disinfected                C:\WINDOWS\SYSTEM32\uninst.exe                                                                                                                                                                                                                                  
Adware:Adware/SAHAgent        No disinfected                C:\WINDOWS\SYSTEM32\xmlparse.dll                                                                                                                                                                                                                                
Adware:Adware/SAHAgent        No disinfected                C:\WINDOWS\SYSTEM32\xmltok.dll                                                                                                                                                                                                                                  
----------------------

And HouseCall:

Trend Micro Housecall  Virus Scan0 virus cleaned, 2 viruses deleted


                  Results:
                  We have detected 2 infected file(s) with 2 virus(es) on your
                  computer: 0 virus(es) cleaned, 0 virus(es) uncleanable, 2
                  virus(es) deleted, 0 virus(es) undeletable, 0 virus(es)
                  passed.
                        Detected FileAssociated Virus NameAction taken
                              C:\System Volume
                              Information\_restore{21D7D692-4662-421F-93B0-877BC3820711}\RP1\A0000014.exeTROJ_STARTPAG.EODelete
                              successful
                              C:\System Volume
                              Information\_restore{21D7D692-4662-421F-93B0-877BC3820711}\RP1\A0000017.exeTROJ_AGENT.AABDelete
                              successful




        Trojan/Worm Check0 worm/Trojan horse deleted

                  What we checked:
                  Malicious activity by a Trojan horse program. Although a
                  Trojan seems like a harmless program, it contains malicious
                  code and once installed can cause damage to your computer.
                  Results:
                  We have detected 0 Trojan horse program(s) and worm(s) on your
                  computer: 0 Worm(s)/Trojan(s) deleted, 0 worm(s)/Trojan(s)
                  undeletable, 0 worm(s)/Trojan(s) passed.
                        Trojan/Worm NameTrojan/Worm TypeAction taken




        Spyware Check13 spyware programs removed

                  What we checked:
                  Whether personal information was tracked and reported by
                  spyware. Spyware is often installed secretly with legitimate
                  programs downloaded from the Internet.
                  Results:
                  We have detected 22 spyware(s) on your computer: 13 spyware(s)
                  removed, 0 spyware(s) unremovable, 6 spyware(s) passed.
                        Spyware NameSpyware TypeAction taken
                              ADW_MIWAY.AAdwareRemoval successful
                              ADW_SECTHOUGHT.AAdwareRemoval successful
                              COOKIE_255CookiePass
                              COOKIE_281CookiePass
                              COOKIE_346CookiePass
                              COOKIE_442CookiePass
                              COOKIE_1701CookiePass
                              SPYW_PPNETWORK.ASpywareRemoval successful
                              ADW_DESKMEDIA.AAdwareRemoval successful
                              ADW_ELITEBAR.EAdwareRemoval successful
                              ADW_BADBITOR.AAdwareRemoval successful
                              ADW_SAHAGENT.AAdwareRemoval successful
                              SPYW_PPNETWORK.BSpywareUnknown
                              ADW_TARGETSOFT.AAdwareRemoval successful
                              COOKIE_3218CookiePass
                              SPYW_WEBSEARCH.ASpywareRemoval successful
                              ADW_APROPOS.51AdwareRemoval successful
                              ADW_SURFKICKAdwareUnknown
                              ADW_DIA.AAdwareRemoval successful
                              SPYW_SOFTOMATE.ASpywareRemoval successful
                              ADW_HYPLINKER.AAdwareRemoval successful
                              ADW_DEALHELP.AAdwareUnknown




        Microsoft Vulnerability Check42 vulnerabilities detected

                  What we checked:
                  Microsoft known security vulnerabilities. These are issues
                  Microsoft has identified and released Critical Updates to fix.

                  Results:
                  We have detected 42 vulnerability/vulnerabilities on your
                  computer.
                        Risk LevelIssueHow to Fix
                              CriticalThis vulnerability enables a remote
                              attacker to execute arbitrary code by creating an
                              .MP3 or .WMA file that contains a corrupt custom
                              attribute. This is caused by a buffer overflow in
                              the Windows Shell function in Microsoft Windows
                              XP.  MS02-072
                              Highly CriticalThis vulnerability enables local
                              users to execute arbitrary code through an RPC
                              call. This is caused by a buffer overflow in the
                              RPC Locator service for Windows NT 4.0, Windows NT
                              4.0 Terminal Server Edition, Windows 2000, and
                              Windows XP.  MS03-001
                              Highly CriticalThis vulnerability enables a remote
                              attacker to execute arbitrary code through a
                              WebDAV request to IIS 5.0. This is caused by a
                              buffer overflow in NTDLL.DLL on Windows NT 4.0,
                              Windows NT 4.0 Terminal Server Edition, Windows
                              2000, and Windows XP.  MS03-007
                              Highly CriticalThis vulnerability enables a remote
                              attacker to execute any file that can be rendered
                              as text, and be opened as part of a page in
                              Internet Explorer.  MS03-014
                              CriticalThis vulnerability enables a remote
                              attacker to cause a denial of service and execute
                              arbitrary code through a specially formed web page
                              or HTML e-mail. This is caused by a flaw in the
                              way the HTML converter for Microsoft Windows
                              handles a conversion request during a
                              cut-and-paste operation.  MS03-023
                              Highly CriticalThis vulnerability enables a remote
                              attacker to execute arbitrary code through a
                              malformed message. This is caused by a buffer
                              overflow in certain DCOM interface for RPC in
                              Microsoft Windows NT 4.0, 2000, XP, and Server
                              2003.  MS03-026
                              CriticalThis vulnerability could allow a remote
                              attacker to execute arbitrary code via a malformed
                              RPC request with a long filename parameter. This
                              is caused by a heap-based buffer overflow found in
                              the Distributed Component Object Model (DCOM)
                              interface in the RPCSS Service.;This vulnerability
                              could allow a remote attacker to cause a denial of
                              service attack, which could allow local attackers
                              to gain privileges via certain messages sent to
                              the __RemoteGetClassObject interface.;This
                              vulnerability could allow a remote attacker to
                              execute arbitrary code via a malformed activation
                              request packet with modified length fields. This
                              is caused by a heap-based buffer overflow in the
                              Distributed Component Object Model (DCOM)
                              interface in the RPCSS Service.;This vulnerability
                              could allow a remote attacker to cause a denial of
                              service attack. This is caused by two threads
                              processing the same RPC request, which will lead
                              to its using memory after it has been freed.;This
                              vulnerability could allow a remote attacker to
                              cause a denial of service attack via a queue
                              registration request. This is caused by a buffer
                              overflow in the Microsoft Message Queue Manager.  
                              MS03-039
                              Highly CriticalThese vulnerabilities, which are
                              due to Internet Explorer not properly determining
                              an object type returned from a Web server in a
                              popup window or during XML data binding,
                              respectively, could allow an attacker to run
                              arbitrary code on a user's system.  MS03-040
                              CriticalThis vulnerability allows a remote
                              attacker to execute arbitrary code without user
                              approval. This is caused by the authenticode
                              capability in Microsoft Windows NT through Server
                              2003 not prompting the user to download and
                              install ActiveX controls when system is low on
                              memory.  MS03-041
                              CriticalThis vulnerability allows a remote
                              attacker to execute arbitrary code on the affected
                              system. This is caused of a buffer overflow in the
                              Messenger Service for Windows NT through Server
                              2003.  MS03-043
                              ImportantThis vulnerability is due to a buffer
                              overrun in the ListBox and ComboBox controls found
                              in User32.dll. Any program that implements the
                              ListBox control or the ComboBox control could
                              allow arbitrary code to be executed at the same
                              privilege level. This vulnerability cannot be
                              exploited remotely.  MS03-045
                              CriticalThis vulnerability could allow an attacker
                              to access information from other Web sites, access
                              files on a user's system, and run arbitrary code
                              on a user's system, wherein this is executed under
                              the security context of the currently logged on
                              user.;This vulnerability could allow an attacker
                              to save a file on the users system. This is due to
                              dynamic HTML events related to the drag-and-drop
                              of Internet Explorer.;This vulnerability, which is
                              due to the incorrect parsing of URLs which contain
                              special characters, could allow an attacker to
                              trick a user by presenting one URL in the address
                              bar, wherein it actually contains the content of
                              another web site of the attackers choice.  
MS04-004
                              Highly CriticalThe LSASS vulnerability is a buffer
                              overrun vulnerability allows remote code
                              execution.;The LDAP vulnerability is a denial of
                              service (DoS) vulnerability that causes the
                              service in a Windows 2000 domain controller
                              responsible for authenticating users in an Active
                              Directory domain to stop responding.;The PCT
                              vulnerability is a buffer overrun vulnerability in
                              the Private Communications Transport (PCT)
                              protocol, a part of the SSL library, that allows
                              remote code execution.;The Winlogon vulnerability
                              is a buffer overrun vulnerability in the Windows
                              logon process (winlogon) that allows remote code
                              execution.;The Metafile vulnerability is a buffer
                              overrun vulnerability that exists in the rendering
                              of Windows Metafile (WMF) and Enhanced Metafile
                              (EMF) image formats.;The Help and Support Center
                              vulnerability allows remote code execution and is
                              due to the way Help and Support Center handles HCP
                              URL validation.;The Utility Manager vulnerability
                              is a privilege elevation vulnerability that exists
                              due to the way that Utility Manager launches
                              applications.;The Windows Management vulnerability
                              is a privilege elevation vulnerability that when
                              successfully exploited allows a local attacker to
                              take complete control of a system by executing
                              commands at the system privilege level.;The Local
                              Descriptor Table vulnerability is a privilege
                              elevation vulnerability that when successfully
                              exploited allows a local attacker to take complete
                              control of a system by executing commands at with
                              system privileges.;The H.323 vulnerability is a
                              buffer overrun vulnerability that when
                              successfully exploited can allows attackers to
                              gain full control of a system by arbitrarily
                              executing commands with system privileges.;Virtual
                              DOS Machine vulnerability is a privilege elevation
                              vulnerability that when successfully exploited
                              allows a local attacker to gain full control of a
                              system by executing commands with system
                              privileges.;The Negotiate SSP vulnerability is a
                              buffer overrun vulnerability that exists in
                              Microsoft's Negotiate Security Service Provider
                              (SSP) interface and allows remote code
                              execution.;The SSL vulnerability exists due to the
                              way SSL packets are handled and can causes the
                              affected systems to stop responding to SSL
                              connection requests.;The ASN.1 'Double-Free'
                              vulnerability exists in Microsoft's Abstract
                              Syntax Notation One (ASN.1) Library and allows
                              remote code execution at the system privilege
                              level.  MS04-011
                              CriticalThe RPC Runtime Library vulnerability is a
                              remote code execution vulnerability that results
                              from a race condition when the RPC Runtime Library
                              processes specially crafted messages. An attacker
                              who successfully exploits this vulnerability could
                              take complete control of an affected system.;The
                              RPCSS Service denial of service (DoS)
                              vulnerability allows a malicious user or malware
                              to send specially-crafted messages to a vulnerable
                              system, which causes the RPCSS Service to stop
                              responding.;The RPC Over HTTP vulnerability may be
                              used to launch a denial of service (DoS) attack
                              against a system with CIS or RPC over HTTP Proxy
                              enabled.;When successfully exploited, the Object
                              Identity vulnerability allows an attacker to force
                              currently running applications to open network
                              communication ports, thereby opening a system to
                              remote attacks.  MS04-012
                              CriticalThe MHTML URL Processing Vulnerability
                              allows remote attackers to bypass domain
                              restrictions and execute arbitrary code via script
                              in a compiled help (CHM) file that references the
                              InfoTech Storage (ITS) protocol handlers.This
                              could allow an attacker to take complete control
                              of an affected system.  MS04-013
                              CriticalThis vulnerability exists in the Help and
                              Support Center (HCP) and is due to the way it
                              handles HCP URL validation. This vulnerability
                              could allow an attacker to remotely execute
                              arbitrary code with Local System privileges.  
                              MS04-015
                              ModerateA denial of service (DoS) vulnerability
                              exists in Outlook Express that could cause the
                              said program to fail. The malformed email should
                              be removed before restarting Outlook Express in
                              order to regain its normal operation.  MS04-018
                              CriticalThis vulnerability lies in an unchecked
                              buffer within the Task Scheduler component. When
                              exploited, it allows the attacker to execute
                              arbitrary code on the affected machine with the
                              same privileges as the currently logged on user.  
                              MS04-022
                              CriticalAn attacker who successfully exploits this
                              vulnerability could gain the same privileges as
                              that of the currently logged on user. If the user
                              is logged in with administrative privileges, the
                              attacker could take complete control of the
                              system. User accounts with fewer privileges are at
                              less risk than users with administrative
                              privileges.  MS04-023
                              CriticalThe Navigation Method Cross-Domain
                              Vulnerability is a remote execution vulnerability
                              that exists in Internet Explorer because of the
                              way that it handles navigation methods. An
                              attacker could exploit this vulnerability by
                              constructing a malicious Web page that could
                              potentially allow remote code execution if a user
                              visits a malicious Web site.;The Malformed BMP
                              File Buffer Overrun Vulnerability exists in the
                              processing of BMP image file formats that could
                              allow remote code execution on an affected
                              system.;The Malformed GIF File Double Free
                              Vulnerability is a buffer overrun vulnerability
                              that exists in the processing of GIF image file
                              formats that could allow remote code execution on
                              an affected system.  MS04-025
                              CriticalThis vulnerability lies in the way the
                              affected components process JPEG image files. An
                              unchecked buffer within this process is the cause
                              of the vulnerability.;This remote code execution
                              vulnerability could allow a malicious user or a
                              malware to take complete control of the affected
                              system if the affected user is currently logged on
                              with administrative privileges. The malicious user
                              or malware can execute arbitrary code on the
                              system giving them the ability to install or run
                              programs and view or edit data with full
                              privileges. Thus, this vulnerability can
                              conceivably be used by a malware for replication
                              purposes.  MS04-028
                              ImportantAn unchecked buffer exists in the NetDDE
                              services that could allow remote code execution.
                              An attacker who is able to successfully exploit
                              this vulnerability is capable of gaining complete
                              control over an affected system. However, the
                              NetDDe services are not automatically executed,
                              and so would then have to be manually started for
                              an attacker to exploit this vulnerability. This
                              vulnerability also allows attackers to perform a
                              local elevation of privilege, or a remote denial
                              of service (DoS) attack.  MS04-031
                              CriticalThis cumulative release from Microsoft
                              covers four newly discovered vulnerabilities:
                              Windows Management Vulnerability, Virtual DOS
                              Machine Vulnerability, Graphics Rendering Engine
                              Vulnerability, and Windows Kernel Vulnerability.  
                              MS04-032
                              CriticalThis is another privately reported
                              vulnerability about Windows Compressed Folders.
                              There is vulnerability on the way that Windows
                              processes Compressed (Zipped) Folders that could
                              lead to remote code execution. Windows can not
                              properly handle the extraction of the ZIP folder
                              with a very long file name. Opening a specially
                              crafted compressed file, a stack-based overflow
                              occurs, enabling the remote user to execute
                              arbitrary code.  MS04-034
                              CriticalThis security bulletin focuses on the
                              following vulnerabilities: Shell Vulnerability
                              (CAN-2004-0214), and Program Group Converter
                              Vulnerability (CAN-2004-0572). Shell vulnerability
                              exists on the way Windows Shell launches
                              applications that could enable remote malicious
                              user or malware to execute arbitrary code. Windows
                              Shell function does not properly check the length
                              of the message before copying to the allocated
                              buffer. Program Group Converter is an application
                              used to convert Program Manager Group files that
                              were produced in Windows 3.1, Windows 3.11,
                              Windows for Workgroups 3.1, and Windows for
                              Workgroups 3.11 so that they can still be used by
                              later operating systems. The vulnerability lies in
                              an unchecked buffer within the Group Converter
                              Utility.  MS04-037
                              CriticalThis is a remote code execution
                              vulnerability that exists in the Internet
                              Explorer. It allows remote code execution on an
                              affected system. An attacker could exploit this
                              vulnerability by constructing a malicious Web
                              Page. The said routine could allow remote code
                              execution if a user visited a malicious Web site.
                              An attacker who successfully exploited this
                              vulnerability could take complete control of an
                              affected system. However, significant user
                              interaction is required to exploit this
                              vulnerability.  MS04-038
                              CriticalThis security update addresses and
                              resolves a vulnerability in Internet Explorer that
                              could allow remote code execution. A Web page can
                              be crafted to exploit this vulnerability such that
                              an arbitrary application can be executed on
                              visiting systems with the same priviledge as the
                              currently logged on user.  MS04-040
                              ImportantThis security advisory explains the two
                              discovered vulnerabilities in Microsoft Word for
                              Windows 6.0 Converter, which is used by WordPad in
                              converting Word 6.0 to WordPad file format. Once
                              exploited, this remote code execution
                              vulnerability could allow a malicious user or a
                              malware to take complete control of the affected
                              system if the affected user is currently logged on
                              with administrative privileges.  MS04-041
                              CriticalA remote code execution vulnerability
                              exists in HyperTerminal because of a buffer
                              overrun. If a user is logged on with administrator
                              privileges, an attacker could exploit the
                              vulnerability by constructing a malicious
                              HyperTerminal session file that could potentially
                              allow remote code execution and then persuade a
                              user to open this file. This malicious file may
                              enable the attacker to gain complete control of
                              the affected system. This vulnerability could also
                              be exploited through a malicious Telnet URL if
                              HyperTerminal had been set as the default Telnet
                              client.  MS04-043
                              ImportantThis security update addresses and
                              resolves two windows vulnerabilites, both of which
                              may enable the current user to take control of the
                              affected system. Both of these vulnerabilites
                              require that the curernt user be able to log on
                              locally and execute programs. They cannot be
                              exploited remotely, or by anonymous users. A
                              privilege elevation vulnerability exists in the
                              way that the Windows Kernel launches applications.
                              This vulnerability could allow the current user to
                              take complete control of the system. A privilege
                              elevation vulnerability exists in the way that the
                              LSASS validates identity tokens. This
                              vulnerability could allow the current user to take
                              complete control of the affected system.  MS04-044
                              CriticalThis update resolves a newly-discovered,
                              publicly reported vulnerability. A vulnerability
                              exists in the HTML Help ActiveX control in Windows
                              that could allow information disclosure or remote
                              code execution on an affected system.  MS05-001
                              CriticalThis update resolves several
                              newly-discovered, privately reported and public
                              vulnerabilities. An attacker who successfully
                              exploited the most severe of these vulnerabilities
                              could take complete control of an affected system,
                              install programs, view, change, or delete data, or
                              create new accounts that have full privileges.  
                              MS05-002
                              ImportantThis update resolves a newly-discovered,
                              privately reported vulnerability. An attacker who
                              successfully exploited this vulnerability could
                              take complete control of an affected system. An
                              attacker could then install programs, view,
                              change, or delete data, or create new accounts
                              with full privileges. While remote code execution
                              is possible, an attack would most likely result in
                              a denial of service condition.  MS05-003
                              ImportantA vulnerability in ASP.NET allows an
                              attacker to bypass the security of an ASP.NET Web
                              site, and access a machine. The attacker gains
                              unauthorized access to some areas of the said Web
                              site, and is able to control it accordingly. The
                              actions that the attacker could take would depend
                              on the specific content being protected.  MS05-004
                              ImportantThis is an information disclosure
                              vulnerability. An attacker who successfully
                              exploits this vulnerability could remotely read
                              the user names for users who have an open
                              connection to an available shared resource.  
                              MS05-007
                              ImportantThis remote code execution vulnerability
                              exists in the way Windows handles drag-and-drop
                              events. An attacker could exploit the
                              vulnerability by constructing a malicious Web page
                              that could potentially allow an attacker to save a
                              file on the users system if a user visited a
                              malicious Web site or viewed a malicious e-mail
                              message.  MS05-008
                              CriticalThis remote code execution vulnerability
                              exists in the processing of PNG image formats. An
                              attacker who successfully exploits this
                              vulnerability could take complete control of an
                              affected system.  MS05-009
                              CriticalThis remote code execution vulnerability
                              exists in Server Message Block (SMB). It allows an
                              attacker who successfully exploits this
                              vulnerability to take complete control of the
                              affected system.  MS05-011
                              CriticalThis privilege elevation vulnerability
                              exists in the way that the affected operating
                              systems and programs access memory when they
                              process COM structured storage files. This
                              vulnerability could grant a currently logged-on
                              user to take complete control of the system.;This
                              remote code execution vulnerability exists in OLE
                              because of the way that it handles input
                              validation. An attacker could exploit the
                              vulnerability by constructing a malicious document
                              that could potentially allow remote code
                              execution.  MS05-012
                              CriticalThis vulnerability exists in the DHTML
                              Editing Component ActiveX Control. This
                              vulnerability could allow information disclosure
                              or remote code execution on an affected system.  
                              MS05-013
                              CriticalThis update resolves known vulnerabilities
                              affecting Internet Explorer. An attacker who
                              successfully exploits these vulnerabilities could
                              take complete control of an affected system. An
                              attacker could then install programs; view,
                              change, or delete data; or create new accounts
                              with full user rights.  MS05-014
                              CriticalA remote code execution vulnerability
                              exists in the Hyperlink Object Library. This
                              problem exists because of an unchecked buffer
                              while handling hyperlinks. An attacker could
                              exploit the vulnerability by constructing a
                              malicious hyperlink which could potentially lead
                              to remote code execution if a user clicks a
                              malicious link within a Web site or e-mail
                              message.  MS05-015
-------------------------

Dont know if this is of any use but I figured better safe then sorry. If everything seems to be ok I will run AdAware and Spybot. In your opinion do you think I should update to SP2? Thanks!

Jeff

Offline guestolo

  • Site Donator
  • Administrator
  • Hero Member
  • *****
  • Posts: 16034
  • Karma: +1/-0
    • View Profile
    • http://
Back again for some much needed help
« Reply #22 on: March 05, 2005, 12:35:22 AM »
Obviously, delete any files found bad by Pandas or Trend Micros
Let me know what it didnt clean and you couldn't delete manually

Finally, clear your System Restore Points by disabling system restore
Restarting your computer and then enabling system restore

Let me know how you make out

Do you want to post your own logs from FRST?

Follow the instructions posted http://www.thetechguide.com/forum/index.php/topic/22942-please-read-how-to-post-logs-from-frst/\'>Click Here