Setting Directory
C:\
C:\
System Rebooted!
Running From:
C:\
killing explorer and rundll32.exe
Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003
[email protected]Killing PID 1640 'explorer.exe'
Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003
[email protected]Killing PID 1660 'rundll32.exe'
Scanning First Pass. Please Wait!
First Pass Completed
Second Pass Scanning
Second pass Completed!
Backing Up: C:\WINDOWS\system32\cfadmin.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\dmmclien.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\dndskmgr.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\en22l1fo1.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\fclemgmt.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\h62olgf3162.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\i6lolg3316.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\ir0ml5d11.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\kddsf.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\lt4027hmg.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\m0ls0a37ed.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mjdxmlc.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\ncmsmgr.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\nhprint.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\nulsapi.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\ohedlg.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\rIcpldlg.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\saellstyle.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\spbcsp.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\vdoy.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\wjaueng1.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\wknntbbu.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\wmbvw.dll
1 file(s) copied.
deleting: C:\WINDOWS\system32\cfadmin.dll
Successfully Deleted: C:\WINDOWS\system32\cfadmin.dll
deleting: C:\WINDOWS\system32\dmmclien.dll
Successfully Deleted: C:\WINDOWS\system32\dmmclien.dll
deleting: C:\WINDOWS\system32\dndskmgr.dll
Successfully Deleted: C:\WINDOWS\system32\dndskmgr.dll
deleting: C:\WINDOWS\system32\en22l1fo1.dll
Successfully Deleted: C:\WINDOWS\system32\en22l1fo1.dll
deleting: C:\WINDOWS\system32\fclemgmt.dll
Successfully Deleted: C:\WINDOWS\system32\fclemgmt.dll
deleting: C:\WINDOWS\system32\h62olgf3162.dll
Successfully Deleted: C:\WINDOWS\system32\h62olgf3162.dll
deleting: C:\WINDOWS\system32\i6lolg3316.dll
Successfully Deleted: C:\WINDOWS\system32\i6lolg3316.dll
deleting: C:\WINDOWS\system32\ir0ml5d11.dll
Successfully Deleted: C:\WINDOWS\system32\ir0ml5d11.dll
deleting: C:\WINDOWS\system32\kddsf.dll
Successfully Deleted: C:\WINDOWS\system32\kddsf.dll
deleting: C:\WINDOWS\system32\lt4027hmg.dll
Successfully Deleted: C:\WINDOWS\system32\lt4027hmg.dll
deleting: C:\WINDOWS\system32\m0ls0a37ed.dll
Successfully Deleted: C:\WINDOWS\system32\m0ls0a37ed.dll
deleting: C:\WINDOWS\system32\mjdxmlc.dll
Successfully Deleted: C:\WINDOWS\system32\mjdxmlc.dll
deleting: C:\WINDOWS\system32\ncmsmgr.dll
Successfully Deleted: C:\WINDOWS\system32\ncmsmgr.dll
deleting: C:\WINDOWS\system32\nhprint.dll
Successfully Deleted: C:\WINDOWS\system32\nhprint.dll
deleting: C:\WINDOWS\system32\nulsapi.dll
Successfully Deleted: C:\WINDOWS\system32\nulsapi.dll
deleting: C:\WINDOWS\system32\ohedlg.dll
Successfully Deleted: C:\WINDOWS\system32\ohedlg.dll
deleting: C:\WINDOWS\system32\rIcpldlg.dll
Successfully Deleted: C:\WINDOWS\system32\rIcpldlg.dll
deleting: C:\WINDOWS\system32\saellstyle.dll
Successfully Deleted: C:\WINDOWS\system32\saellstyle.dll
deleting: C:\WINDOWS\system32\spbcsp.dll
Successfully Deleted: C:\WINDOWS\system32\spbcsp.dll
deleting: C:\WINDOWS\system32\vdoy.dll
Successfully Deleted: C:\WINDOWS\system32\vdoy.dll
deleting: C:\WINDOWS\system32\wjaueng1.dll
Successfully Deleted: C:\WINDOWS\system32\wjaueng1.dll
deleting: C:\WINDOWS\system32\wknntbbu.dll
Successfully Deleted: C:\WINDOWS\system32\wknntbbu.dll
deleting: C:\WINDOWS\system32\wmbvw.dll
Successfully Deleted: C:\WINDOWS\system32\wmbvw.dll
Zipping up files for submission:
adding: cfadmin.dll (188 bytes security) (deflated 4%)
adding: dmmclien.dll (188 bytes security) (deflated 5%)
adding: dndskmgr.dll (188 bytes security) (deflated 4%)
adding: en22l1fo1.dll (188 bytes security) (deflated 4%)
adding: fclemgmt.dll (188 bytes security) (deflated 5%)
adding: FL Studio VSTi (Multi).dll (188 bytes security) (deflated 48%)
adding: FL Studio VSTi.dll (188 bytes security) (deflated 48%)
adding: h62olgf3162.dll (188 bytes security) (deflated 4%)
adding: i6lolg3316.dll (188 bytes security) (deflated 5%)
adding: ir0ml5d11.dll (188 bytes security) (deflated 5%)
adding: kddsf.dll (188 bytes security) (deflated 6%)
adding: lt4027hmg.dll (188 bytes security) (deflated 4%)
adding: m0ls0a37ed.dll (188 bytes security) (deflated 5%)
adding: mjdxmlc.dll (188 bytes security) (deflated 4%)
adding: ncmsmgr.dll (188 bytes security) (deflated 4%)
adding: nhprint.dll (188 bytes security) (deflated 6%)
adding: nulsapi.dll (188 bytes security) (deflated 4%)
adding: ohedlg.dll (188 bytes security) (deflated 5%)
adding: rIcpldlg.dll (188 bytes security) (deflated 5%)
adding: saellstyle.dll (188 bytes security) (deflated 5%)
adding: spbcsp.dll (188 bytes security) (deflated 5%)
adding: vdoy.dll (188 bytes security) (deflated 6%)
adding: wjaueng1.dll (188 bytes security) (deflated 4%)
adding: wknntbbu.dll (188 bytes security) (deflated 5%)
adding: wmbvw.dll (188 bytes security) (deflated 5%)
adding: clear.reg (188 bytes security) (deflated 63%)
adding: EULA.txt (188 bytes security) (deflated 54%)
adding: FAQ.txt (188 bytes security) (deflated 60%)
adding: Instruct.txt (188 bytes security) (deflated 55%)
adding: lo2.txt (188 bytes security) (deflated 85%)
adding: palsound.txt (188 bytes security) (stored 0%)
adding: test.txt (188 bytes security) (deflated 80%)
adding: test2.txt (188 bytes security) (deflated 44%)
adding: test3.txt (188 bytes security) (deflated 44%)
adding: test5.txt (188 bytes security) (deflated 44%)
adding: VerHist.txt (188 bytes security) (deflated 55%)
adding: vx2logs.txt (188 bytes security) (stored 0%)
adding: xfind.txt (188 bytes security) (deflated 74%)
Restoring Registry Permissions:
RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (
http://www.heysoft.de)
This program is Freeware, use it on your own risk!
Revoking access for predefined group "Administrators"
Inherited ACE can not be revoked here!
Inherited ACE can not be revoked here!
Registry permissions set too:
RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (
http://www.heysoft.de)
This program is Freeware, use it on your own risk!
Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER
Restoring Sedebugprivilege:
Granting SeDebugPrivilege to Administrators ... successful
Restoring Windows Update Certificates.:
deleting local copy: cfadmin.dll
deleting local copy: dmmclien.dll
deleting local copy: dndskmgr.dll
deleting local copy: en22l1fo1.dll
deleting local copy: fclemgmt.dll
deleting local copy: h62olgf3162.dll
deleting local copy: i6lolg3316.dll
deleting local copy: ir0ml5d11.dll
deleting local copy: kddsf.dll
deleting local copy: lt4027hmg.dll
deleting local copy: m0ls0a37ed.dll
deleting local copy: mjdxmlc.dll
deleting local copy: ncmsmgr.dll
deleting local copy: nhprint.dll
deleting local copy: nulsapi.dll
deleting local copy: ohedlg.dll
deleting local copy: rIcpldlg.dll
deleting local copy: saellstyle.dll
deleting local copy: spbcsp.dll
deleting local copy: vdoy.dll
deleting local copy: wjaueng1.dll
deleting local copy: wknntbbu.dll
deleting local copy: wmbvw.dll
The following Is the Current Export of the Winlogon notify key:
****************************************************************************
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\AtiExtEvent]
"DLLName"="Ati2evxx.dll"
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000001
"Lock"="AtiLockEvent"
"Logoff"="AtiLogoffEvent"
"Logon"="AtiLogonEvent"
"Disconnect"="AtiDisConnectEvent"
"Reconnect"="AtiReConnectEvent"
"Safe"=dword:00000000
"Shutdown"="AtiShutdownEvent"
"StartScreenSaver"="AtiStartScreenSaverEvent"
"StartShell"="AtiStartShellEvent"
"Startup"="AtiStartupEvent"
"StopScreenSaver"="AtiStopScreenSaverEvent"
"Unlock"="AtiUnLockEvent"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\MS-DOS Emulation]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS\\system32\\enjql1151.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Reinstall]
"Asynchronous"=dword:00000000
"DllName"="C:\\WINDOWS\\system32\\f02mlaf11d2.dll"
"Impersonate"=dword:00000000
"Logon"="WinLogon"
"Logoff"="WinLogoff"
"Shutdown"="WinShutdown"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\WRNotifier]
"Asynchronous"=dword:00000000
"DllName"="WRLogonNTF.dll"
"Impersonate"=dword:00000001
"Lock"="WRLock"
"StartScreenSaver"="WRStartScreenSaver"
"StartShell"="WRStartShell"
"Startup"="WRStartup"
"StopScreenSaver"="WRStopScreenSaver"
"Unlock"="WRUnlock"
"Shutdown"="WRShutdown"
"Logoff"="WRLogoff"
"Logon"="WRLogon"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wzcnotif]
"DLLName"="wzcdlg.dll"
"Logon"="WZCEventLogon"
"Logoff"="WZCEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000000
The following are the files found:
****************************************************************************
C:\WINDOWS\system32\cfadmin.dll
C:\WINDOWS\system32\dmmclien.dll
C:\WINDOWS\system32\dndskmgr.dll
C:\WINDOWS\system32\en22l1fo1.dll
C:\WINDOWS\system32\fclemgmt.dll
C:\WINDOWS\system32\h62olgf3162.dll
C:\WINDOWS\system32\i6lolg3316.dll
C:\WINDOWS\system32\ir0ml5d11.dll
C:\WINDOWS\system32\kddsf.dll
C:\WINDOWS\system32\lt4027hmg.dll
C:\WINDOWS\system32\m0ls0a37ed.dll
C:\WINDOWS\system32\mjdxmlc.dll
C:\WINDOWS\system32\ncmsmgr.dll
C:\WINDOWS\system32\nhprint.dll
C:\WINDOWS\system32\nulsapi.dll
C:\WINDOWS\system32\ohedlg.dll
C:\WINDOWS\system32\rIcpldlg.dll
C:\WINDOWS\system32\saellstyle.dll
C:\WINDOWS\system32\spbcsp.dll
C:\WINDOWS\system32\vdoy.dll
C:\WINDOWS\system32\wjaueng1.dll
C:\WINDOWS\system32\wknntbbu.dll
C:\WINDOWS\system32\wmbvw.dll
Registry Entries that were Deleted:
Please verify that the listing looks ok.
If there was something deleted wrongly there are backups in the backreg folder.
****************************************************************************
REGEDIT4
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{DF4890D8-F4F2-444A-94BE-8C68513CA8E1}"=-
"{62A808F8-596E-4841-A368-BA51F247CA7B}"=-
"{2FB583E9-7FB6-4ECE-A798-7FA4F9107D2F}"=-
"{783D2719-CCAA-4CB0-9E07-B67C843563CD}"=-
"{732EE58A-4CC6-4D87-B460-77CDC894C9B1}"=-
"{6C9E77BC-F5CE-4955-9641-EFAF9B6BED5D}"=-
"{179399B4-0986-4FF6-9F9B-5478B5E93105}"=-
"{9C9B372D-169B-4D5F-BC3C-EE73474AFD21}"=-
"{2D391FDC-600E-4AF9-9F41-C6F38A324111}"=-
[-HKEY_CLASSES_ROOT\CLSID\{DF4890D8-F4F2-444A-94BE-8C68513CA8E1}]
[-HKEY_CLASSES_ROOT\CLSID\{62A808F8-596E-4841-A368-BA51F247CA7B}]
[-HKEY_CLASSES_ROOT\CLSID\{2FB583E9-7FB6-4ECE-A798-7FA4F9107D2F}]
[-HKEY_CLASSES_ROOT\CLSID\{783D2719-CCAA-4CB0-9E07-B67C843563CD}]
[-HKEY_CLASSES_ROOT\CLSID\{732EE58A-4CC6-4D87-B460-77CDC894C9B1}]
[-HKEY_CLASSES_ROOT\CLSID\{6C9E77BC-F5CE-4955-9641-EFAF9B6BED5D}]
[-HKEY_CLASSES_ROOT\CLSID\{179399B4-0986-4FF6-9F9B-5478B5E93105}]
[-HKEY_CLASSES_ROOT\CLSID\{9C9B372D-169B-4D5F-BC3C-EE73474AFD21}]
[-HKEY_CLASSES_ROOT\CLSID\{2D391FDC-600E-4AF9-9F41-C6F38A324111}]
REGEDIT4
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"SV1"=""
****************************************************************************
Desktop.ini Contents:
****************************************************************************
****************************************************************************
********
10:16 AM: | Start of Session, Tuesday, November 08, 2005 |
10:16 AM: Spy Sweeper started
10:16 AM: Sweep initiated using definitions version 569
10:16 AM: Starting Memory Sweep
10:16 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:16 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:16 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:16 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:17 AM: Found Adware: icannnews
10:17 AM: Detected running threat: C:\WINDOWS\system32\enj8l11u1.dll (ID = 83)
10:17 AM: Detected running threat: C:\WINDOWS\system32\kxdtuf.dll (ID = 83)
10:17 AM: Memory Sweep Complete, Elapsed Time: 00:01:50
10:17 AM: Starting Registry Sweep
10:18 AM: Found Trojan Horse: sdbot
10:18 AM: HKU\.default\software\microsoft\windows\currentversion\run\ || microsoft windows update (ID = 140586)
10:18 AM: HKU\.default\software\microsoft\windows\currentversion\run\ || win32 usb2 driver (ID = 140589)
10:18 AM: HKU\.default\software\microsoft\windows\currentversion\runonce\ || win32 usb2 driver (ID = 140594)
10:18 AM: HKLM\software\microsoft\windows\currentversion\run\ || microsoft windows update (ID = 140617)
10:18 AM: HKLM\software\microsoft\windows\currentversion\run\ || win32 usb2 driver (ID = 140622)
10:18 AM: Found Adware: search helping wizard
10:18 AM: HKCR\ngsh35.clsdw\ (1 subtraces) (ID = 958369)
10:18 AM: HKCR\ngsh35.clsis\ (1 subtraces) (ID = 958373)
10:18 AM: HKLM\software\classes\ngsh35.clsdw\ (1 subtraces) (ID = 958516)
10:18 AM: HKLM\software\classes\ngsh35.clsis\ (1 subtraces) (ID = 958520)
10:18 AM: HKU\S-1-5-18\software\microsoft\windows\currentversion\run\ || microsoft windows update (ID = 140604)
10:18 AM: HKU\S-1-5-18\software\microsoft\windows\currentversion\run\ || win32 usb2 driver (ID = 140608)
10:18 AM: HKU\S-1-5-18\software\microsoft\windows\currentversion\runonce\ || win32 usb2 driver (ID = 140631)
10:18 AM: Registry Sweep Complete, Elapsed Time:00:00:12
10:18 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:18 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:18 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:18 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:18 AM: Starting Cookie Sweep
10:18 AM: Cookie Sweep Complete, Elapsed Time: 00:00:00
10:18 AM: Starting File Sweep
10:18 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:18 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:18 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:18 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:19 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:19 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:19 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:19 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:19 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:19 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:19 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:19 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:20 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:20 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:20 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:20 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:20 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:20 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:20 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:20 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:21 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:21 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:21 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:21 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:22 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:22 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:22 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:22 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:22 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:22 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:22 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:22 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:23 AM: Found Adware: apropos
10:23 AM: wingenerics.dll (ID = 50187)
10:23 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:23 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:23 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:23 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:24 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:24 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:24 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:24 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:24 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:24 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:24 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:24 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:25 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:25 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:25 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:25 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:25 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:25 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:25 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:25 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:26 AM: Found Adware: targetsaver
10:26 AM: 113_dollarrevenue_4_0_3_9.exe (ID = 166444)
10:26 AM: contextplus.exe (ID = 185940)
10:26 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:26 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:26 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:26 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:26 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:26 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:26 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:26 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:27 AM: installer_1.exe (ID = 185727)
10:27 AM: atmtd.dll (ID = 166754)
10:27 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:27 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:27 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:27 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:27 AM: atmtd.dll._ (ID = 166754)
10:28 AM: Found System Monitor: potentially rootkit-masked files
10:28 AM: syntmsft.exe (ID = 0)
10:28 AM: ace.dll (ID = 0)
10:28 AM: data.bin (ID = 0)
10:28 AM: 00007ff5_436efcdf_0002a291 (ID = 0)
10:28 AM: updarvdm.sys (ID = 0)
10:28 AM: 00000822_436eff25_00099dce (ID = 0)
10:28 AM: 00000bdb_436efd8d_00022dfe (ID = 0)
10:28 AM: 00003bf6_436efe26_0001dfc4 (ID = 0)
10:28 AM: 0000491c_436efc6b_0008083e (ID = 0)
10:28 AM: 00004d06_436efc6b_0009b68c (ID = 0)
10:28 AM: 00003a9e_436efe26_00042a8c (ID = 0)
10:28 AM: 00005991_436eff25_0009ec0b (ID = 0)
10:28 AM: 00000f3e_436efc27_000c0a04 (ID = 0)
10:28 AM: 00004db7_436efc6b_000aa143 (ID = 0)
10:28 AM: 00002350_436efd8f_0000b20e (ID = 0)
10:28 AM: 00001547_436efc6c_00001bb1 (ID = 0)
10:28 AM: 0000323b_436efd4c_000d20fc (ID = 0)
10:28 AM: 00005f49_436efe2a_000d6c2c (ID = 0)
10:28 AM: 00003d6c_436efaf7_00018a0c (ID = 0)
10:28 AM: 000054de_436efc77_00014448 (ID = 0)
10:28 AM: 0000366b_436efeb1_000402ee (ID = 0)
10:28 AM: 00002213_436efd4d_0002744c (ID = 0)
10:28 AM: 00004823_436efaea_000dc8a9 (ID = 0)
10:28 AM: 000039b3_436efc77_0002a459 (ID = 0)
10:28 AM: 00006b89_436efd89_00039eae (ID = 0)
10:28 AM: 000066c4_436efeb1_00049f68 (ID = 0)
10:28 AM: 00000ddc_436efe2a_000e08a6 (ID = 0)
10:28 AM: 0000030a_436efd89_00048964 (ID = 0)
10:28 AM: 00006e5d_436efcbd_000baaeb (ID = 0)
10:28 AM: 0000074d_436efc7f_0001230b (ID = 0)
10:28 AM: 00004dc8_436efc7f_00025bfe (ID = 0)
10:28 AM: 00004cad_436efe3a_000e62a6 (ID = 0)
10:28 AM: 0000301c_436efd8c_000ed739 (ID = 0)
10:28 AM: 000026e9_436efbe8_00068770 (ID = 0)
10:28 AM: 00005cfd_436efdc1_00092101 (ID = 0)
10:28 AM: 00000099_436efc29_00031143 (ID = 0)
10:28 AM: 00006443_436efc7f_00031f96 (ID = 0)
10:28 AM: 00000124_436efc29_00042318 (ID = 0)
10:28 AM: 0000314f_436efe3a_000ed801 (ID = 0)
10:28 AM: 00003e12_436efdc2_0000bf19 (ID = 0)
10:28 AM: 00006df1_436efb12_0003f759 (ID = 0)
10:28 AM: 00001ad4_436efcbd_000cbcc0 (ID = 0)
10:28 AM: 000001eb_436efbe8_000e2b60 (ID = 0)
10:28 AM: 000066bb_436efc80_000b3e81 (ID = 0)
10:28 AM: 00005e14_436efe3b_0002cb40 (ID = 0)
10:28 AM: 00000bb3_436efbf4_00051ca1 (ID = 0)
10:28 AM: 00000732_436efd8e_000148e8 (ID = 0)
10:28 AM: 0000428b_436efc80_000db068 (ID = 0)
10:28 AM: 0000409d_436eff3f_00026500 (ID = 0)
10:28 AM: 0000440d_436efc2e_0004b493 (ID = 0)
10:28 AM: 00005f90_436efb03_0008116b (ID = 0)
10:28 AM: 00004230_436efeb2_000828c3 (ID = 0)
10:28 AM: 00004b40_436efdb5_000d4bf3 (ID = 0)
10:28 AM: 00007eb7_436efeb6_000690f4 (ID = 0)
10:28 AM: 000026a6_436efc80_000e9b1e (ID = 0)
10:28 AM: 00004944_436efe80_000c8fc9 (ID = 0)
10:28 AM: 00000120_436efd8e_00031e54 (ID = 0)
10:28 AM: 000012e1_436eff42_000add68 (ID = 0)
10:28 AM: 00002ea6_436efc12_000501c9 (ID = 0)
10:28 AM: 0000759a_436efd8e_00067af1 (ID = 0)
10:28 AM: 00002e40_436efe80_000cde06 (ID = 0)
10:28 AM: 00006032_436efeb6_000b9be0 (ID = 0)
10:28 AM: 00002c3b_436efeb6_000c3859 (ID = 0)
10:28 AM: 0000798b_436eff61_00014ed3 (ID = 0)
10:28 AM: 000018be_436efaf4_00054b24 (ID = 0)
10:28 AM: 0000121f_436eff70_000a8016 (ID = 0)
10:28 AM: 00001a49_436efdce_0008f4c6 (ID = 0)
10:28 AM: 000012db_436efc14_0003d416 (ID = 0)
10:28 AM: 000015a1_436efeb9_0007b3a9 (ID = 0)
10:28 AM: 0000701f_436efc87_00085781 (ID = 0)
10:28 AM: 00005f32_436efdce_000bb4e9 (ID = 0)
10:28 AM: 00006bfc_436efcd3_0000ff00 (ID = 0)
10:28 AM: 00007f96_436efcdf_000190bc (ID = 0)
10:28 AM: 00005422_436efeb9_00085023 (ID = 0)
10:28 AM: 00003ef6_436efeb9_000a2590 (ID = 0)
10:28 AM: 00005d03_436efc87_0008a5be (ID = 0)
10:28 AM: dns (ID = 0)
10:28 AM: 00006952_436efb03_0006631c (ID = 0)
10:28 AM: 000073da_436eff7b_000df374 (ID = 0)
10:28 AM: 00007a5a_436efca4_00072534 (ID = 0)
10:28 AM: 000058b0_436eff7b_000e68d0 (ID = 0)
10:28 AM: 0000767d_436efca4_0007e8cc (ID = 0)
10:28 AM: 00004509_436efcb8_000aa414 (ID = 0)
10:28 AM: 00004e45_436efd4c_000555ee (ID = 0)
10:28 AM: 000026ca_436eff8f_00086e53 (ID = 0)
10:28 AM: 00007e87_436efc20_000810ac (ID = 0)
10:28 AM: 00003699_436eff8f_000a6ade (ID = 0)
10:28 AM: 00006b36_436efdc1_000687fc (ID = 0)
10:28 AM: index (ID = 0)
10:28 AM: 0000390c_436efc24_000b0e6e (ID = 0)
10:28 AM: spumsapi.exe (ID = 0)
10:28 AM: 00001238_436efcb8_000c2b44 (ID = 0)
10:28 AM: 00001cd0_436efeb1_0002a2dc (ID = 0)
10:28 AM: imeprddm.exe (ID = 0)
10:28 AM: 00003b25_436efcb9_00010939 (ID = 0)
10:28 AM: ai_08-11-2005.log (ID = 0)
10:28 AM: ai_07-11-2005.log (ID = 0)
10:28 AM: 000056ae_436efd8d_00058a9b (ID = 0)
10:28 AM: 00006784_436efaf6_00013630 (ID = 0)
10:28 AM: 00004ae1_436efaf6_000380f8 (ID = 0)
10:28 AM: 00002cd6_436efafd_00088c24 (ID = 0)
10:28 AM: 00001649_436efb07_00036b3c (ID = 0)
10:28 AM: 00001366_436efeb0_000f24f9 (ID = 0)
10:28 AM: 00005af1_436efbe6_00096371 (ID = 0)
10:28 AM: 000041bb_436efbe7_000a53c8 (ID = 0)
10:28 AM: ai_04-11-2005.log (ID = 0)
10:28 AM: ai_06-11-2005.log (ID = 0)
10:28 AM: ai_05-11-2005.log (ID = 0)
10:28 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:28 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:28 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:28 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:28 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:28 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:28 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:28 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:29 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:29 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:29 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:29 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:29 AM: File Sweep Complete, Elapsed Time: 00:11:15
10:29 AM: Full Sweep has completed. Elapsed time 00:13:20
10:29 AM: Traces Found: 132
10:30 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:30 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:30 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:30 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:30 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:30 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:30 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:30 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:31 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:31 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:31 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:31 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:32 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:32 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:32 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:32 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:32 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:32 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:32 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:32 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:33 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:33 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:33 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:33 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:33 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:33 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:33 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:33 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:34 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:34 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:34 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:34 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:34 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:34 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:34 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:34 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:35 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:35 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:35 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:35 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:35 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:35 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:35 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:35 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:36 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:36 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:36 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:36 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:36 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:36 AM: The Spy Communication shield has blocked access to:
www.ad-w-a-r-e.com10:36 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:36 AM: The Spy Communication shield has blocked access to:
www.a-d-w-a-r-e.com10:37 AM: Removal process initiated
10:37 AM: Quarantining All Traces: icannnews
10:37 AM: icannnews is in use. It will be removed on reboot.
10:37 AM: C:\WINDOWS\system32\enj8l11u1.dll is in use. It will be removed on reboot.
10:37 AM: C:\WINDOWS\system32\kxdtuf.dll is in use. It will be removed on reboot.
10:37 AM: Quarantining All Traces: potentially rootkit-masked files
10:38 AM: potentially rootkit-masked files is in use. It will be removed on reboot.
10:38 AM: syntmsft.exe is in use. It will be removed on reboot.
10:38 AM: ace.dll is in use. It will be removed on reboot.
10:38 AM: data.bin is in use. It will be removed on reboot.
10:38 AM: 00007ff5_436efcdf_0002a291 is in use. It will be removed on reboot.
10:38 AM: updarvdm.sys is in use. It will be removed on reboot.
10:38 AM: 00000822_436eff25_00099dce is in use. It will be removed on reboot.
10:38 AM: 00000bdb_436efd8d_00022dfe is in use. It will be removed on reboot.
10:38 AM: 00003bf6_436efe26_0001dfc4 is in use. It will be removed on reboot.
10:38 AM: 0000491c_436efc6b_0008083e is in use. It will be removed on reboot.
10:38 AM: 00004d06_436efc6b_0009b68c is in use. It will be removed on reboot.
10:38 AM: 00003a9e_436efe26_00042a8c is in use. It will be removed on reboot.
10:38 AM: 00005991_436eff25_0009ec0b is in use. It will be removed on reboot.
10:38 AM: 00000f3e_436efc27_000c0a04 is in use. It will be removed on reboot.
10:38 AM: 00004db7_436efc6b_000aa143 is in use. It will be removed on reboot.
10:38 AM: 00002350_436efd8f_0000b20e is in use. It will be removed on reboot.
10:38 AM: 00001547_436efc6c_00001bb1 is in use. It will be removed on reboot.
10:38 AM: 0000323b_436efd4c_000d20fc is in use. It will be removed on reboot.
10:38 AM: 00005f49_436efe2a_000d6c2c is in use. It will be removed on reboot.
10:38 AM: 00003d6c_436efaf7_00018a0c is in use. It will be removed on reboot.
10:38 AM: 000054de_436efc77_00014448 is in use. It will be removed on reboot.
10:38 AM: 0000366b_436efeb1_000402ee is in use. It will be removed on reboot.
10:38 AM: 00002213_436efd4d_0002744c is in use. It will be removed on reboot.
10:38 AM: 00004823_436efaea_000dc8a9 is in use. It will be removed on reboot.
10:38 AM: 000039b3_436efc77_0002a459 is in use. It will be removed on reboot.
10:38 AM: 00006b89_436efd89_00039eae is in use. It will be removed on reboot.
10:38 AM: 000066c4_436efeb1_00049f68 is in use. It will be removed on reboot.
10:38 AM: 00000ddc_436efe2a_000e08a6 is in use. It will be removed on reboot.
10:38 AM: 0000030a_436efd89_00048964 is in use. It will be removed on reboot.
10:38 AM: 00006e5d_436efcbd_000baaeb is in use. It will be removed on reboot.
10:38 AM: 0000074d_436efc7f_0001230b is in use. It will be removed on reboot.
10:38 AM: 00004dc8_436efc7f_00025bfe is in use. It will be removed on reboot.
10:38 AM: 00004cad_436efe3a_000e62a6 is in use. It will be removed on reboot.
10:38 AM: 0000301c_436efd8c_000ed739 is in use. It will be removed on reboot.
10:38 AM: 000026e9_436efbe8_00068770 is in use. It will be removed on reboot.
10:38 AM: 00005cfd_436efdc1_00092101 is in use. It will be removed on reboot.
10:38 AM: 00000099_436efc29_00031143 is in use. It will be removed on reboot.
10:38 AM: 00006443_436efc7f_00031f96 is in use. It will be removed on reboot.
10:38 AM: 00000124_436efc29_00042318 is in use. It will be removed on reboot.
10:38 AM: 0000314f_436efe3a_000ed801 is in use. It will be removed on reboot.
10:38 AM: 00003e12_436efdc2_0000bf19 is in use. It will be removed on reboot.
10:38 AM: 00006df1_436efb12_0003f759 is in use. It will be removed on reboot.
10:38 AM: 00001ad4_436efcbd_000cbcc0 is in use. It will be removed on reboot.
10:38 AM: 000001eb_436efbe8_000e2b60 is in use. It will be removed on reboot.
10:38 AM: 000066bb_436efc80_000b3e81 is in use. It will be removed on reboot.
10:38 AM: 00005e14_436efe3b_0002cb40 is in use. It will be removed on reboot.
10:38 AM: 00000bb3_436efbf4_00051ca1 is in use. It will be removed on reboot.
10:38 AM: 00000732_436efd8e_000148e8 is in use. It will be removed on reboot.
10:38 AM: 0000428b_436efc80_000db068 is in use. It will be removed on reboot.
10:38 AM: 0000409d_436eff3f_00026500 is in use. It will be removed on reboot.
10:38 AM: 0000440d_436efc2e_0004b493 is in use. It will be removed on reboot.
10:38 AM: 00005f90_436efb03_0008116b is in use. It will be removed on reboot.
10:38 AM: 00004230_436efeb2_000828c3 is in use. It will be removed on reboot.
10:38 AM: 00004b40_436efdb5_000d4bf3 is in use. It will be removed on reboot.
10:38 AM: 00007eb7_436efeb6_000690f4 is in use. It will be removed on reboot.
10:38 AM: 000026a6_436efc80_000e9b1e is in use. It will be removed on reboot.
10:38 AM: 00004944_436efe80_000c8fc9 is in use. It will be removed on reboot.
10:38 AM: 00000120_436efd8e_00031e54 is in use. It will be removed on reboot.
10:38 AM: 000012e1_436eff42_000add68 is in use. It will be removed on reboot.
10:38 AM: 00002ea6_436efc12_000501c9 is in use. It will be removed on reboot.
10:38 AM: 0000759a_436efd8e_00067af1 is in use. It will be removed on reboot.
10:38 AM: 00002e40_436efe80_000cde06 is in use. It will be removed on reboot.
10:38 AM: 00006032_436efeb6_000b9be0 is in use. It will be removed on reboot.
10:38 AM: 00002c3b_436efeb6_000c3859 is in use. It will be removed on reboot.
10:38 AM: 0000798b_436eff61_00014ed3 is in use. It will be removed on reboot.
10:38 AM: 000018be_436efaf4_00054b24 is in use. It will be removed on reboot.
10:38 AM: 0000121f_436eff70_000a8016 is in use. It will be removed on reboot.
10:38 AM: 00001a49_436efdce_0008f4c6 is in use. It will be removed on reboot.
10:38 AM: 000012db_436efc14_0003d416 is in use. It will be removed on reboot.
10:38 AM: 000015a1_436efeb9_0007b3a9 is in use. It will be removed on reboot.
10:38 AM: 0000701f_436efc87_00085781 is in use. It will be removed on reboot.
10:38 AM: 00005f32_436efdce_000bb4e9 is in use. It will be removed on reboot.
10:38 AM: 00006bfc_436efcd3_0000ff00 is in use. It will be removed on reboot.
10:38 AM: 00007f96_436efcdf_000190bc is in use. It will be removed on reboot.
10:38 AM: 00005422_436efeb9_00085023 is in use. It will be removed on reboot.
10:38 AM: 00003ef6_436efeb9_000a2590 is in use. It will be removed on reboot.
10:38 AM: 00005d03_436efc87_0008a5be is in use. It will be removed on reboot.
10:38 AM: dns is in use. It will be removed on reboot.
10:38 AM: 00006952_436efb03_0006631c is in use. It will be removed on reboot.
10:38 AM: 000073da_436eff7b_000df374 is in use. It will be removed on reboot.
10:38 AM: 00007a5a_436efca4_00072534 is in use. It will be removed on reboot.
10:38 AM: 000058b0_436eff7b_000e68d0 is in use. It will be removed on reboot.
10:38 AM: 0000767d_436efca4_0007e8cc is in use. It will be removed on reboot.
10:38 AM: 00004509_436efcb8_000aa414 is in use. It will be removed on reboot.
10:38 AM: 00004e45_436efd4c_000555ee is in use. It will be removed on reboot.
10:38 AM: 000026ca_436eff8f_00086e53 is in use. It will be removed on reboot.
10:38 AM: 00007e87_436efc20_000810ac is in use. It will be removed on reboot.
10:38 AM: 00003699_436eff8f_000a6ade is in use. It will be removed on reboot.
10:38 AM: 00006b36_436efdc1_000687fc is in use. It will be removed on reboot.
10:38 AM: index is in use. It will be removed on reboot.
10:38 AM: 0000390c_436efc24_000b0e6e is in use. It will be removed on reboot.
10:38 AM: spumsapi.exe is in use. It will be removed on reboot.
10:38 AM: 00001238_436efcb8_000c2b44 is in use. It will be removed on reboot.
10:38 AM: 00001cd0_436efeb1_0002a2dc is in use. It will be removed on reboot.
10:38 AM: imeprddm.exe is in use. It will be removed on reboot.
10:38 AM: 00003b25_436efcb9_00010939 is in use. It will be removed on reboot.
10:38 AM: ai_08-11-2005.log is in use. It will be removed on reboot.
10:38 AM: ai_07-11-2005.log is in use. It will be removed on reboot.
10:38 AM: 000056ae_436efd8d_00058a9b is in use. It will be removed on reboot.
10:38 AM: 00006784_436efaf6_00013630 is in use. It will be removed on reboot.
10:38 AM: 00004ae1_436efaf6_000380f8 is in use. It will be removed on reboot.
10:38 AM: 00002cd6_436efafd_00088c24 is in use. It will be removed on reboot.
10:38 AM: 00001649_436efb07_00036b3c is in use. It will be removed on reboot.
10:38 AM: 00001366_436efeb0_000f24f9 is in use. It will be removed on reboot.
10:38 AM: 00005af1_436efbe6_00096371 is in use. It will be removed on reboot.
10:38 AM: 000041bb_436efbe7_000a53c8 is in use. It will be removed on reboot.
10:38 AM: ai_04-11-2005.log is in use. It will be removed on reboot.
10:38 AM: ai_06-11-2005.log is in use. It will be removed on reboot.
10:38 AM: ai_05-11-2005.log is in use. It will be removed on reboot.
10:38 AM: Quarantining All Traces: sdbot
10:38 AM: Quarantining All Traces: apropos
10:38 AM: apropos is in use. It will be removed on reboot.
10:38 AM: wingenerics.dll is in use. It will be removed on reboot.
10:38 AM: Quarantining All Traces: search helping wizard
10:38 AM: Quarantining All Traces: targetsaver
10:38 AM: Preparing to restart your computer. Please wait...
10:38 AM: Removal process completed. Elapsed time 00:01:22
********
10:14 AM: | Start of Session, Tuesday, November 08, 2005 |
10:14 AM: Spy Sweeper started
10:14 AM: Your spyware definitions have been updated.
10:14 AM: Processing Hosts File Alerts
10:14 AM: Fixed Hosts File entry: idenupdate.motorola.com
10:14 AM: Fixed Hosts File entry: idenupdate.motorola.com
10:14 AM: Updating spyware definitions
10:14 AM: Your definitions are up to date.
10:14 AM: Updating spyware definitions
10:14 AM: Your definitions are up to date.
10:16 AM: | End of Session, Tuesday, November 08, 2005 |
Logfile of HijackThis v1.99.1
Scan saved at 10:47:44 AM, on 11/8/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\netdde.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Archive\hijackthis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Favorites
R3 - URLSearchHook: (no name) - - (no file)
O3 - Toolbar: (no name) - {BA52B914-B692-46c4-B683-905236F6F655} - (no file)
O4 - HKLM\..\Run: [Systmesy] Systmesy.exe
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [RefreshLock] C:\RefreshLock.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\System32\\NeroCheck.exe
O4 - HKLM\..\Run: [LVCOMS] C:\Program Files\Common Files\Logitech\QCDriver3\LVCOMS.EXE
O4 - HKLM\..\Run: [LogitechImageStudioTray] C:\Program Files\Logitech\ImageStudio\LogiTray.exe
O4 - HKLM\..\Run: [LogitechGalleryRepair] C:\Program Files\Logitech\ImageStudio\ISStart.exe
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [DeadAIM] rundll32.exe "C:\Program Files\AIM\\DeadAIM.ocm",ExportedCheckODLs
O4 - HKLM\..\Run: [CTHelper] CTHELPER.EXE
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG Free\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [AtiPTA] atiptaxx.exe
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime
O4 - HKLM\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /startintray
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\ypager.exe" -quiet
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - Startup: Tclock.lnk = C:\Program Files\T-Clock\tclock.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O20 - Winlogon Notify: MS-DOS Emulation - C:\WINDOWS\system32\enjql1151.dll (file missing)
O20 - Winlogon Notify: Reinstall - C:\WINDOWS\system32\f02mlaf11d2.dll (file missing)
O20 - Winlogon Notify: WRNotifier - C:\WINDOWS\SYSTEM32\WRLogonNTF.dll
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Webroot Spy Sweeper Engine (svcWRSSSDK) - Webroot Software, Inc. - C:\Program Files\Webroot\Spy Sweeper\WRSSSDK.exe
thank you so much!