Advertisement
Guest User

Untitled

a guest
Sep 20th, 2016
284
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.46 KB | None | 0 0
  1.  
  2.  
  3. 1. C:\WINDOWS|SYSTEM32\drives\psec.sys(Trojan.FakeAlert)
  4.  
  5. 2. Physical Sector 312576705 on drive 0 (Rootkit.Alureon.E.VBR)
  6.  
  7. 3. C:\Documents and Settings\username1\Local Settings\Application Data\App\vtolhexl.dll (Trojan.FakeMS.ED)
  8.  
  9. 4. HKU\S-1-5-21-29283822-501481981-1191779827-1005\SOFTWARE\MIRCROSOFT\WINDOWS\CURRENTVERSION\RUN\vtolhexl (Trojan.FakeMS.ED)
  10.  
  11. 5. C:\Documents and Settings\username1\Local Settings\Application Data\App\vtolhexl.dll (Trojan.FakeMS.ED)
  12.  
  13. 6. HKU\S-1-5-21-2928383822-501481981-1191779827-501\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{A770354-581D-450C-9E44-A84C4115A6172} (Trojan.FakeAlert)
  14.  
  15. 7. C:Documents and Settings\All Users\ Application Data\ 427B187A-EEDC-1C33-3F41-746881B4FC6D.avi (Trojan.FakeMS.ED)
  16.  
  17. 8. C:\Documents and Settings\All Users\Application Data\BE6HKSxOYirlGO.exe (Rogue.FakeHDD)
  18.  
  19. 9. C:\Documents and Settings\username1\Application Data\427B183A- EKDC-1C33-3F41-746881B4FC6D.avi (Trojan.FakeMS.ED)
  20.  
  21. 10. C:\Program Files\Security Defender\Security Defender.dll(Trojan.FakeMS.ED)
  22.  
  23. 11. C:\WINDOWS\system32\427B183A-EEDC-1C33-3F41-746881B4FC6D.avi(Trojan.FakeMS.ED)
  24.  
  25. 12. C:\Documents and Settings\Guest\Local Settings\Temp\K1aKoDaH1wVy3d.exe.tmp(Rogue.FakeHDD)
  26.  
  27. 13. C:Documents and Settings\username1\Local Settings\Application Data\427B183A-EEDC-1C33-3F41-746881B4FC6D.avi(Trojan.FakeMS.ED)
  28.  
  29. 14. c:\windows\$ntuninstallkb1055$\3728945212\L\yoksnvpa(Backdoor.0Acceess)
  30.  
  31. 15. c:\windows\$ntuninstallkb1055$\3728945212\u\00000001.@ (Backdoor.0Access)
  32.  
  33. 16. c:\windows\$ntuninstallkb1055$\3728945212\u\00000002.@ (Backdoor.0Access)
  34.  
  35. 17. c:\windows\$ntuninstallkb1055$\3728945212\u\00000004.@ (Backdoor.0Access)
  36.  
  37. 18. c:\windows\$ntuninstallkb1055$\3728945212\u\80000000.@ (Backdoor.0Access)
  38.  
  39. 19. c:\windows\$ntuninstallkb1055$\3728945212\u\80000004.@ (Backdoor.0Access)
  40.  
  41. 20. c:\windows\$ntuninstallkb1055$\3728945212\u\80000032.@ (Backdoor.0Access)
  42.  
  43. 21. C:\Documents and Settings\username1\Local Settings\Temporary Interent Files\Content.IE5\DJTKLB65\11[1].exe (Trojan.Dropper)
  44.  
  45. 22. C:\Documents and Settings\username1\Local Settings\Temporary Interent Files\Content.IE5\ISOS46N9122[1].exe (Trojan.FakeMS.ED)
  46.  
  47. 23. C:\Documents and Settings\username1\Application Data\ Security Defender\{5FE83920-7C88-4C45-6C9D-8FOEf7DD7EAA}.pst (Rogue.SecurityDefender)
  48.  
  49. 24. C:\Documents and Settings\username1\Application Data\ Security Defender\(rogue.SecurityDefender)
  50.  
  51. 25. C:\Documents and Settings\username1\Application Data\ Security Defender\{6B757E8f-ACAO-446C-7D8F-ODD8E3F949745}.pst(Rogue.SecurityDenfender)
  52.  
  53. 26. C:\Documents and Settings\username1\Application Data\ Security Defender\{73A82D79--C142-4EC2-2884-9A7310C76AGB}.pst(Rogue.SecurityDefender)
  54.  
  55. 27. C:\Documents and Settings\username1\Desktop\Security Defender.Ink(Rogue.Security Defender)
  56.  
  57. 28. C:\Documents and Settings\username1\Application Data\Microsoft\Internet Explorer\Quick Launch\Security Defender.Ink (Rogue.SecurityDefender)
  58.  
  59. 29. C:\Program Files\Security Defender\Security Defender.ico(Rogue.SecurityDefender)
  60.  
  61. 30. C:\Program Files\Security Defender(Rogue.SecurityDefender)
  62.  
  63. 31. HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\427B183A-EEDC-IC33-3F41-74688/B4FC6D(Trojan.FakeAlert)
  64.  
  65. 32. HKU\S-1-5-21-2928383822-501481981-1191779827-1005\ENVIORNMENT\AVAPP(Rogue.PersonalAntivirus)
  66.  
  67. 33. HKU\S-1-5-21-2928383822-501481981-1191779827-1005\ENVIORNMENT\AVUNINST(Rogue.PersonalAntivirus)
  68.  
  69. 34. HKU\S-1-5-21-2928383822-501481981-1191779827-1005\ENVIORNMENT\Software\Microsoft\Internet Explorer\MenuEXT\& Search\ (Adware.Hotbar)
  70.  
  71. 35. HKU\S-1-5-21-2928383822-501481981-1191779827-1005\ENVIORNMENT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\427B183A-EEDC-IC33-3F41-74688154FC66(Trojan.FakeAlert)
  72.  
  73. 36. HKU\S-1-5-21-2928383822-501481981-1191779827-1005\ENVIORNMENT\SOFTWARE/MICROSOFT\INTERNETEXPLORER\MENUTEXT\&SEARCH\(Adware.Hotbar)
  74.  
  75. 37. c:\windows\$ntuninstallkblo55$\3728945212\L (Backdoor.0Access)
  76.  
  77. 38. c:\windows\$ntuninstallkblo55$\3728945212\U
  78.  
  79. 39. c:\windows\$ntuninstallkblo55$\3728945212\12 (Backdoor.0Access)
  80.  
  81. 40. c:\windows\$ntuninstallkblo55$\3728945212\@
  82.  
  83. 41. c:\windows\$ntuninstallkblo55$\3728945212\bckfg.tmp
  84.  
  85. 42. c:\windows\$ntuninstallkblo55$\3728945212\cfg.ini
  86.  
  87. 43. c:\windows\$ntuninstallkblo55$\3728945212\desktop.ini (Backdoor.0Access)
  88.  
  89. 44. c:\windows\$ntuninstallkblo55$\3728945212\keywords
  90.  
  91. 45. c:\windows\$ntuninstallkblo55$\3728945212\Kwrd.dll
  92.  
  93. 46. c:\windows\$ntuninstallkblo55$\13930054407(Backdoor.0Access)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement