Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1. C:\WINDOWS|SYSTEM32\drives\psec.sys(Trojan.FakeAlert)
- 2. Physical Sector 312576705 on drive 0 (Rootkit.Alureon.E.VBR)
- 3. C:\Documents and Settings\username1\Local Settings\Application Data\App\vtolhexl.dll (Trojan.FakeMS.ED)
- 4. HKU\S-1-5-21-29283822-501481981-1191779827-1005\SOFTWARE\MIRCROSOFT\WINDOWS\CURRENTVERSION\RUN\vtolhexl (Trojan.FakeMS.ED)
- 5. C:\Documents and Settings\username1\Local Settings\Application Data\App\vtolhexl.dll (Trojan.FakeMS.ED)
- 6. HKU\S-1-5-21-2928383822-501481981-1191779827-501\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{A770354-581D-450C-9E44-A84C4115A6172} (Trojan.FakeAlert)
- 7. C:Documents and Settings\All Users\ Application Data\ 427B187A-EEDC-1C33-3F41-746881B4FC6D.avi (Trojan.FakeMS.ED)
- 8. C:\Documents and Settings\All Users\Application Data\BE6HKSxOYirlGO.exe (Rogue.FakeHDD)
- 9. C:\Documents and Settings\username1\Application Data\427B183A- EKDC-1C33-3F41-746881B4FC6D.avi (Trojan.FakeMS.ED)
- 10. C:\Program Files\Security Defender\Security Defender.dll(Trojan.FakeMS.ED)
- 11. C:\WINDOWS\system32\427B183A-EEDC-1C33-3F41-746881B4FC6D.avi(Trojan.FakeMS.ED)
- 12. C:\Documents and Settings\Guest\Local Settings\Temp\K1aKoDaH1wVy3d.exe.tmp(Rogue.FakeHDD)
- 13. C:Documents and Settings\username1\Local Settings\Application Data\427B183A-EEDC-1C33-3F41-746881B4FC6D.avi(Trojan.FakeMS.ED)
- 14. c:\windows\$ntuninstallkb1055$\3728945212\L\yoksnvpa(Backdoor.0Acceess)
- 15. c:\windows\$ntuninstallkb1055$\3728945212\u\00000001.@ (Backdoor.0Access)
- 16. c:\windows\$ntuninstallkb1055$\3728945212\u\00000002.@ (Backdoor.0Access)
- 17. c:\windows\$ntuninstallkb1055$\3728945212\u\00000004.@ (Backdoor.0Access)
- 18. c:\windows\$ntuninstallkb1055$\3728945212\u\80000000.@ (Backdoor.0Access)
- 19. c:\windows\$ntuninstallkb1055$\3728945212\u\80000004.@ (Backdoor.0Access)
- 20. c:\windows\$ntuninstallkb1055$\3728945212\u\80000032.@ (Backdoor.0Access)
- 21. C:\Documents and Settings\username1\Local Settings\Temporary Interent Files\Content.IE5\DJTKLB65\11[1].exe (Trojan.Dropper)
- 22. C:\Documents and Settings\username1\Local Settings\Temporary Interent Files\Content.IE5\ISOS46N9122[1].exe (Trojan.FakeMS.ED)
- 23. C:\Documents and Settings\username1\Application Data\ Security Defender\{5FE83920-7C88-4C45-6C9D-8FOEf7DD7EAA}.pst (Rogue.SecurityDefender)
- 24. C:\Documents and Settings\username1\Application Data\ Security Defender\(rogue.SecurityDefender)
- 25. C:\Documents and Settings\username1\Application Data\ Security Defender\{6B757E8f-ACAO-446C-7D8F-ODD8E3F949745}.pst(Rogue.SecurityDenfender)
- 26. C:\Documents and Settings\username1\Application Data\ Security Defender\{73A82D79--C142-4EC2-2884-9A7310C76AGB}.pst(Rogue.SecurityDefender)
- 27. C:\Documents and Settings\username1\Desktop\Security Defender.Ink(Rogue.Security Defender)
- 28. C:\Documents and Settings\username1\Application Data\Microsoft\Internet Explorer\Quick Launch\Security Defender.Ink (Rogue.SecurityDefender)
- 29. C:\Program Files\Security Defender\Security Defender.ico(Rogue.SecurityDefender)
- 30. C:\Program Files\Security Defender(Rogue.SecurityDefender)
- 31. HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\427B183A-EEDC-IC33-3F41-74688/B4FC6D(Trojan.FakeAlert)
- 32. HKU\S-1-5-21-2928383822-501481981-1191779827-1005\ENVIORNMENT\AVAPP(Rogue.PersonalAntivirus)
- 33. HKU\S-1-5-21-2928383822-501481981-1191779827-1005\ENVIORNMENT\AVUNINST(Rogue.PersonalAntivirus)
- 34. HKU\S-1-5-21-2928383822-501481981-1191779827-1005\ENVIORNMENT\Software\Microsoft\Internet Explorer\MenuEXT\& Search\ (Adware.Hotbar)
- 35. HKU\S-1-5-21-2928383822-501481981-1191779827-1005\ENVIORNMENT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\427B183A-EEDC-IC33-3F41-74688154FC66(Trojan.FakeAlert)
- 36. HKU\S-1-5-21-2928383822-501481981-1191779827-1005\ENVIORNMENT\SOFTWARE/MICROSOFT\INTERNETEXPLORER\MENUTEXT\&SEARCH\(Adware.Hotbar)
- 37. c:\windows\$ntuninstallkblo55$\3728945212\L (Backdoor.0Access)
- 38. c:\windows\$ntuninstallkblo55$\3728945212\U
- 39. c:\windows\$ntuninstallkblo55$\3728945212\12 (Backdoor.0Access)
- 40. c:\windows\$ntuninstallkblo55$\3728945212\@
- 41. c:\windows\$ntuninstallkblo55$\3728945212\bckfg.tmp
- 42. c:\windows\$ntuninstallkblo55$\3728945212\cfg.ini
- 43. c:\windows\$ntuninstallkblo55$\3728945212\desktop.ini (Backdoor.0Access)
- 44. c:\windows\$ntuninstallkblo55$\3728945212\keywords
- 45. c:\windows\$ntuninstallkblo55$\3728945212\Kwrd.dll
- 46. c:\windows\$ntuninstallkblo55$\13930054407(Backdoor.0Access)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement