InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1701. |
Solve : A Virus or some sort of Malware? |
|
Answer» I thought (or at least hoped) it would never happen to me, but alas, it has. I get several msgs (all associated with getting me to buy"AntiVirus SOFT") along with some silly porn page(?s). One of the several msgs has something to do with an application failing to run. It SEEMS that none of my executable run anymore. Can you folks help?Please download exeHelper Note: If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together (they will both be in the one file). |
|
| 1702. |
Solve : Windows Live or something??? |
|
Answer» Hello. for the PAST 3 days something would auto open window LIVE chats on my friends LIST and send a link to them and then close the chat fast.. I can see it open and close.. i asked my friend if i sent them a link and he sent a pic of it.. Why is it doing this? My friend said the link was a key LOGGER.. How do i remove it?Please visit this webpage for a tutorial on downloading and running ComboFix: |
|
| 1703. |
Solve : Some virus problems? |
|
Answer» You need to let MBAM fix those. |
|
| 1704. |
Solve : Virus causing PC to BSOD?? |
|
Answer» Hi, |
|
| 1705. |
Solve : Registry entry ?? |
|
Answer» +1OK I will Delete it. because I don't know what Data it has collected. and I don't know for what PURPOSE it has collected it. Just seems creepy to me. |
|
| 1706. |
Solve : Lost access to router? |
|
Answer» From your reply to Rootkit.Agent found in System32 Drivers' on this forum R2 apprngr_svc;AppRanger Service;c:\program files\AppRanger\SWSvc.exe R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384] R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 133104] R2 SvcOnlineArmor;Online Armor;c:\program files\Emsisoft\Online Armor\oasrv.exe [2010-07-05 3364680] R3 bepldr;BCL easyPDF SDK 5 Loader;c:\program files\Common Files\BCL Technologies\easyPDF 5\bepldr.exe [2007-02-21 151552] R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504] S0 amacpi;Microsoft Away Mode System;c:\windows\system32\DRIVERS\null.sys [2008-01-19 4608] S0 npf;npf Driver;c:\windows\system32\drivers\npf.sys [2007-11-06 34064] S1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [2010-07-05 236104] S1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [2010-07-05 22600] S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-02-17 12872] S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2010-05-10 67656] S2 OAcat;Online Armor Helper Service;c:\program files\Emsisoft\Online Armor\OAcat.exe [2010-07-05 1283400] S2 Secunia Update Agent;Secunia Update Agent;c:\program files\Secunia\PSI\sua.exe [2010-09-01 318520] S3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\system32\DRIVERS\MpNWMon.sys [2010-03-25 42368] S3 OAnet;OnlineArmor Service;c:\windows\system32\DRIVERS\oanet.sys [2010-07-05 29256] S3 PSI;PSI;c:\windows\system32\DRIVERS\psi_mf.sys [2010-09-01 15544] [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost] bthsvcsREG_MULTI_SZ BthServ LocalServiceAndNoImpersonationREG_MULTI_SZ FontCache . Contents of the 'Scheduled Tasks' folder 2010-09-28 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job - c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 12:13] 2010-09-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job - c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 12:13] 2010-09-28 c:\windows\Tasks\ParetoLogic Registration3.job - c:\program files\Common Files\ParetoLogic\UUS3\UUS3.dll [2009-08-04 18:19] 2010-08-13 c:\windows\Tasks\ParetoLogic Update Version3.job - c:\program files\Common Files\ParetoLogic\UUS3\Pareto_Update3.exe [2009-08-04 18:19] 2010-09-28 c:\windows\Tasks\User_Feed_Synchronization-{AAD29C0A-613E-42B8-9812-D1A798192E3F}.job - c:\windows\system32\msfeedssync.exe [2010-08-11 04:24] . . ------- Supplementary Scan ------- . uStart Page = hxxp://www.google.co.uk/ mStart Page = hxxp://www.voover.com/ uInternet Settings,ProxyOverride = *.local uSearchURL,(Default) = hxxp://uk.search.yahoo.com/search?fr=mcafee&p=%s . - - - - ORPHANS REMOVED - - - - HKLM-Run-HostManager - c:\program files\Common Files\AOL\1247602731\ee\AOLSoftware.exe ************************************************************************** catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2010-09-29 00:42 Windows 6.0.6002 Service Pack 2 NTFS scanning hidden processes ... scanning hidden autostart entries ... scanning hidden files ... scan completed successfully hidden files: 0 ************************************************************************** . --------------------- LOCKED REGISTRY KEYS --------------------- [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}] @Denied: (A 2) (Everyone) @="FlashBroker" "LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe,-101" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation] "Enabled"=dword:00000001 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32] @="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}] @Denied: (A 2) (Everyone) @="IFlashBroker4" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" "Version"="1.0" [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 . Completion time: 2010-09-29 00:50:17 ComboFix-quarantined-files.txt 2010-09-28 23:50 ComboFix2.txt 2010-09-26 14:35 ComboFix3.txt 2010-09-22 13:52 ComboFix4.txt 2010-09-19 20:56 ComboFix5.txt 2010-09-28 23:26 Pre-Run: 58,355,978,240 bytes free Post-Run: 58,314,850,304 bytes free - - END Of File - - 0F8EC5D396A3C767211116E26047E049 HJT log to follow.Logfile of Trend Micro HijackThis v2.0.4 Scan saved at 00:59:45, on 29/09/2010 Platform: Windows Vista SP2 (WinNT 6.00.1906) MSIE: Internet Explorer v8.00 (8.00.6001.18943) Boot mode: Normal Running processes: C:\Windows\system32\Dwm.exe C:\Windows\system32\taskeng.exe C:\Windows\system32\taskeng.exe C:\Program Files\Secunia\PSI\psi.exe C:\Windows\System32\mobsync.exe C:\Program Files\Windows Media Player\wmpnscfg.exe C:\Windows\sttray.exe C:\Program Files\Microsoft Security Essentials\msseces.exe C:\Program Files\Common Files\Java\Java Update\jusched.exe C:\Program Files\iTunes\iTunesHelper.exe C:\Program Files\Windows Sidebar\sidebar.exe C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe C:\Windows\ehome\ehtray.exe C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe C:\Windows\ehome\ehmsas.exe C:\Windows\Explorer.exe C:\Windows\system32\SearchFilterHost.exe C:\Program Files\Trend Micro\HijackThis\sniper.exe.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.voover.com/ R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://uk.search.yahoo.com/search?fr=mcafee&p=%s R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: McAfee Phishing Filter - {27B4851A-3207-45A2-B947-BE8AFE6163AB} - (no file) O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.6.5612.1312\swg.dll O2 - BHO: (no name) - {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - (no file) O2 - BHO: WOT Helper - {C920E44A-7F78-4E64-BDD7-A57026E7FEB7} - C:\Program Files\WOT\WOT.dll O2 - BHO: MSN Toolbar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN\Toolbar\3.0.1203.0\msneshellx.dll O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll O2 - BHO: SingleInstance Class - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - C:\Program Files\Yahoo!\Companion\Installs\cpn\YTSingleInstance.dll O3 - Toolbar: MSN Toolbar - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.1203.0\msneshellx.dll O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll O3 - Toolbar: WOT - {71576546-354D-41c9-AAE8-31F2EC22BF0D} - C:\Program Files\WOT\WOT.dll O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe O4 - HKLM\..\Run: [SigmatelSysTrayApp] sttray.exe O4 - HKLM\..\Run: [MSSE] "C:\Program Files\Microsoft Security Essentials\msseces.exe" -hide -runkey O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe" O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" O4 - HKLM\..\Run: [@OnlineArmor GUI] "C:\Program Files\Emsisoft\Online Armor\oaui.exe" O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe" O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe" O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe O9 - Extra button: RESEARCH - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} (OnlineScanner Control) - http://download.eset.com/special/eos/OnlineScanner.cab O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab O18 - Protocol: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file) O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file) O18 - Protocol: wot - {C2A44D6B-CB9F-4663-88A6-DF2F26E4D952} - C:\Program Files\WOT\WOT.dll O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe O23 - Service: AppRanger Service (apprngr_svc) - Unknown owner - C:\Program Files\AppRanger\SWSvc.exe (file missing) O23 - Service: BCL easyPDF SDK 5 Loader (bepldr) - Unknown owner - C:\Program Files\Common Files\BCL Technologies\easyPDF 5\bepldr.exe O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe O23 - Service: EPSON V3 Service4(01) (EPSON_PM_RPCV4_01) - SEIKO EPSON CORPORATION - C:\ProgramData\EPSON\EPW!3 SSRP\E_S40RP7.EXE O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe O23 - Service: Online Armor Helper Service (OAcat) - Unknown owner - C:\Program Files\Emsisoft\Online Armor\OAcat.exe O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - C:\Windows\system32\IoctlSvc.exe O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe O23 - Service: Secunia Update Agent - Secunia - C:\Program Files\Secunia\PSI\sua.exe O23 - Service: SigmaTel Audio Service (STacSV) - SigmaTel, Inc. - C:\Program Files\SigmaTel\C-Major Audio\WDM\STacSV.exe O23 - Service: Online Armor (SvcOnlineArmor) - Unknown owner - C:\Program Files\Emsisoft\Online Armor\oasrv.exe O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe -- End of file - 8610 bytes Latest Logs ComboFix 10-09-28.03 - Ron 29/09/2010 13:06:37.5.2 - x86 Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.44.1033.18.3069.1639 [GMT 1:00] Running from: c:\users\Ron\Desktop\ComboFix.exe SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7} SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46} . ((((((((((((((((((((((((( Files Created from 2010-08-28 to 2010-09-29 ))))))))))))))))))))))))))))))) . 2010-09-29 12:17 . 2010-09-29 12:17--------d-----w-c:\users\Ron\AppData\Local\temp 2010-09-29 12:17 . 2010-09-29 12:17--------d-----w-c:\users\Public\AppData\Local\temp 2010-09-29 12:17 . 2010-09-29 12:17--------d-----w-c:\users\Default\AppData\Local\temp 2010-09-29 12:02 . 2010-09-29 12:02--------d-----w-C:\32788R22FWJFW 2010-09-29 11:57 . 2010-06-22 13:302048----a-w-c:\windows\system32\tzres.dll 2010-09-28 22:17 . 2010-09-28 22:20--------d-----w-c:\program files\SpywareBlaster 2010-09-28 22:11 . 2010-09-28 22:11--------d-----w-c:\program files\WOT 2010-09-27 13:39 . 2010-09-27 13:39--------d-----w-c:\program files\iPod 2010-09-27 13:39 . 2010-09-27 13:40--------d-----w-c:\program files\iTunes 2010-09-27 13:37 . 2010-09-27 13:37--------d-----w-c:\program files\QuickTime 2010-09-27 13:35 . 2010-09-27 13:35--------d-----w-c:\program files\Apple Software Update 2010-09-27 13:02 . 2010-09-27 13:02--------d-----w-c:\users\Ron\AppData\Local\Secunia PSI 2010-09-27 13:02 . 2010-09-27 13:02--------d-----w-c:\program files\Secunia 2010-09-27 12:34 . 2010-09-28 22:13--------d-----w-c:\users\Ron\AppData\Roaming\OnlineArmor 2010-09-27 12:34 . 2010-09-27 12:53--------d-----w-c:\programdata\OnlineArmor 2010-09-27 12:33 . 2010-07-05 07:4422600----a-w-c:\windows\system32\drivers\OAmon.sys 2010-09-27 12:33 . 2010-07-05 07:4429256----a-w-c:\windows\system32\drivers\OAnet.sys 2010-09-27 12:33 . 2010-07-05 07:43236104----a-w-c:\windows\system32\drivers\OADriver.sys 2010-09-27 12:33 . 2010-09-27 12:33--------d-----w-c:\program files\Emsisoft 2010-09-26 19:23 . 2010-09-26 19:23--------d-----w-c:\programdata\WindowsSearch 2010-09-26 19:08 . 2010-09-27 11:46--------d-----w-c:\programdata\Comodo 2010-09-26 14:59 . 2010-09-26 14:59--------d-----w-c:\programdata\NVIDIA Corporation 2010-09-22 14:02 . 2010-09-22 14:02--------d-----w-c:\program files\ESET 2010-09-17 21:53 . 2010-09-17 21:53--------d-----w-c:\users\Ron\AppData\Roaming\Malwarebytes 2010-09-17 21:53 . 2010-04-29 14:3938224----a-w-c:\windows\system32\drivers\mbamswissarmy.sys 2010-09-17 21:53 . 2010-09-17 21:53--------d-----w-c:\programdata\Malwarebytes 2010-09-17 21:53 . 2010-09-17 21:53--------d-----w-c:\program files\Malwarebytes' Anti-Malware 2010-09-17 21:53 . 2010-04-29 14:3920952----a-w-c:\windows\system32\drivers\mbam.sys 2010-09-17 09:43 . 2010-09-17 09:43--------d-----w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com 2010-09-17 09:43 . 2010-09-17 09:43--------d-----w-c:\programdata\SUPERAntiSpyware.com 2010-09-17 09:43 . 2010-09-17 21:40--------d-----w-c:\program files\SUPERAntiSpyware 2010-09-17 09:30 . 2010-09-27 15:02--------d-----w-c:\programdata\Yahoo! Companion 2010-09-17 09:30 . 2010-09-17 09:30--------d-----w-c:\users\Ron\AppData\Roaming\Yahoo! 2010-09-17 09:30 . 2010-09-17 09:30--------d-----w-c:\program files\Yahoo! 2010-09-17 09:29 . 2010-09-17 09:30--------d-----w-c:\program files\CCleaner 2010-09-17 07:47 . 2010-04-16 16:46502272----a-w-c:\windows\system32\usp10.dll 2010-09-17 07:47 . 2010-08-17 14:11128000----a-w-c:\windows\system32\spoolsv.exe 2010-09-17 07:47 . 2010-04-05 17:02317952----a-w-c:\windows\system32\MP4SDECD.DLL 2010-09-17 07:47 . 2010-05-27 20:08739328----a-w-c:\windows\system32\inetcomm.dll 2010-09-09 21:00 . 2010-09-09 21:00--------d-sh--w-c:\windows\system32\%APPDATA% 2010-09-06 11:17 . 2010-09-06 11:17--------d-----w-c:\program files\Common Files\Java 2010-09-04 09:48 . 2010-09-04 09:49--------d-----w-c:\programdata\{429CAD59-35B1-4DBC-BB6D-1DB246563521} 2010-09-04 09:42 . 2010-09-04 09:42--------d-----w-c:\program files\Bonjour 2010-09-01 08:30 . 2010-09-01 08:3015544----a-w-c:\windows\system32\drivers\psi_mf.sys . (((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))) . 2010-09-29 11:59 . 2009-05-17 18:30--------d-----w-c:\program files\Microsoft Silverlight 2010-09-29 11:49 . 2010-06-24 06:2936725----a-w-c:\programdata\nvModes.dat 2010-09-29 11:47 . 2009-07-12 09:53--------d-----w-c:\program files\Spybot - Search & Destroy 2010-09-29 00:11 . 2009-07-15 13:5112----a-w-c:\windows\bthservsdp.dat 2010-09-28 23:53 . 2010-09-28 23:53388096----a-r-c:\users\Ron\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe 2010-09-28 23:23 . 2009-07-12 09:53--------d-----w-c:\programdata\Spybot - Search & Destroy 2010-09-28 10:30 . 2010-09-28 10:302023824----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{C4E298DB-ECDF-46E5-8671-41B2BE418959}\mpavdlta.vdm 2010-09-28 10:30 . 2010-09-28 10:30365968----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{C4E298DB-ECDF-46E5-8671-41B2BE418959}\mpasdlta.vdm 2010-09-27 13:42 . 2009-11-13 18:53--------d-----w-c:\users\Ron\AppData\Roaming\Apple Computer 2010-09-27 13:39 . 2009-11-13 18:45--------d-----w-c:\program files\Common Files\Apple 2010-09-27 13:15 . 2009-07-06 10:58--------d-----w-c:\program files\Java 2010-09-27 12:59 . 2010-08-29 15:491987984----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpavdlta.vdm 2010-09-27 12:59 . 2010-08-29 15:49349584----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpasdlta.vdm 2010-09-26 15:24 . 2009-05-31 18:09--------d-----w-c:\programdata\NVIDIA 2010-09-26 15:00 . 2010-06-24 04:42--------d-----w-c:\program files\NVIDIA Corporation 2010-09-24 01:51 . 2010-09-24 01:5173000----a-w-c:\programdata\Apple Computer\Installer Cache\iTunes 10.0.1.22\SetupAdmin.exe 2010-09-22 13:13 . 2010-09-22 13:1312575488----a-w-c:\users\Ron\AppData\Roaming\Adobe\AIR\Updater\Background\1.0\updater 2010-09-22 13:10 . 2009-05-03 04:20175808----a-w-c:\users\Ron\AppData\Local\GDIPFONTCACHEV1.DAT 2010-09-22 13:10 . 2009-05-05 21:40--------d-----w-c:\program files\Common Files\Adobe 2010-09-17 22:32 . 2006-11-02 11:18--------d-----w-c:\program files\Windows Mail 2010-09-17 21:42 . 2010-09-17 09:4363488----a-w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll 2010-09-17 21:42 . 2010-09-17 09:43117760----a-w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL 2010-09-17 09:43 . 2010-09-17 09:4352224----a-w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll 2010-09-17 07:50 . 2010-09-28 10:3041722256----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{C4E298DB-ECDF-46E5-8671-41B2BE418959}\mpavbase.vdm 2010-09-17 07:50 . 2010-08-29 15:4941722256----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpavbase.vdm 2010-09-17 07:50 . 2010-09-28 10:3012300688----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{C4E298DB-ECDF-46E5-8671-41B2BE418959}\mpasbase.vdm 2010-09-17 07:50 . 2010-08-29 15:4912300688----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpasbase.vdm 2010-09-10 22:41 . 2010-09-10 22:41109512----a-w-c:\programdata\Comodo\Installer\cmddns.tmp 2010-09-06 11:16 . 2010-09-06 11:1410787840----a-w-c:\users\Ron\AppData\Roaming\Adobe\Acrobat\7.0\Updater\AcroProUpd710_all_cum.exe 2010-08-28 12:39 . 2010-08-28 12:3963520----a-w-c:\programdata\Comodo\Installer\crtman.tmp 2010-08-27 14:15 . 2010-08-27 14:15--------d-----w-c:\program files\Microsoft Security Essentials 2010-08-26 18:20 . 2010-08-27 14:11366992----a-w-c:\programdata\Microsoft\Windows Defender\Definition Updates\{8B226FB6-3024-4D43-9F12-F9F3CD893053}\mpasdlta.vdm 2010-08-19 09:25 . 2010-08-27 14:1112120464----a-w-c:\programdata\Microsoft\Windows Defender\Definition Updates\{8B226FB6-3024-4D43-9F12-F9F3CD893053}\mpasbase.vdm 2010-08-14 21:06 . 2009-07-19 15:39300384----a-w-c:\users\Ron\AppData\Roaming\McAfee\Supportability\MVTLogs\Results\detect.dll 2010-08-13 14:06 . 2010-08-13 06:10--------d-----w-c:\program files\Common Files\ParetoLogic 2010-08-13 06:33 . 2010-08-13 06:33--------d-----w-c:\users\Ron\AppData\Roaming\AdobeUM 2010-08-13 06:33 . 2010-08-13 06:33--------d-----w-c:\program files\Common Files\Java(0) 2010-08-13 06:10 . 2010-08-13 06:10--------d-----w-c:\programdata\FileCure 2010-08-08 18:48 . 2010-08-08 18:48568832----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\msvcp90.dll 2010-08-08 18:48 . 2010-08-08 18:48686080----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\pdfimport.uno.dll 2010-08-08 18:48 . 2010-08-08 18:48655872----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\msvcr90.dll 2010-08-08 18:48 . 2010-08-08 18:48583168----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\xpdfimport.exe 2010-08-08 18:48 . 2010-08-08 18:48224768----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\msvcm90.dll 2010-08-08 18:42 . 2009-11-06 11:24--------d-----w-c:\program files\OpenOffice.org 3 2010-07-27 17:44 . 2010-07-27 17:4491424----a-w-c:\windows\system32\dnssd.dll 2010-07-27 17:44 . 2010-07-27 17:4475040----a-w-c:\windows\system32\jdns_sd.dll 2010-07-27 17:44 . 2010-07-27 17:44197920----a-w-c:\windows\system32\dnssdX.dll 2010-07-27 17:44 . 2010-07-27 17:44107808----a-w-c:\windows\system32\dns-sd.exe 2010-07-17 04:00 . 2010-05-17 12:09423656----a-w-c:\windows\system32\deployJava1.dll 2010-07-09 15:37 . 2010-07-09 15:371469544----a-w-c:\windows\system32\nvsvc.dll 2010-07-09 15:37 . 2010-07-09 15:3713939816----a-w-c:\windows\system32\nvcpl.dll 2010-07-09 15:37 . 2010-07-09 15:37129640----a-w-c:\windows\system32\nvvsvc.exe 2010-07-09 15:37 . 2010-07-09 15:37110696----a-w-c:\windows\system32\nvmctray.dll . ((((((((((((((((((((((((((((( SnapShot_2010-09-28_23.42.52 ))))))))))))))))))))))))))))))))))))))))) . + 2010-09-29 11:57 . 2010-08-26 05:1513312 c:\windows\winsxs\x86_microsoft-windows-ie-iecompat_31bf3856ad364e35_8.0.6001.23061_none_842241d16004f2b8\iecompat.dll + 2010-09-29 11:57 . 2010-08-26 04:2313312 c:\windows\winsxs\x86_microsoft-windows-ie-iecompat_31bf3856ad364e35_8.0.6001.18969_none_83a0d11a46dfe78b\iecompat.dll + 2010-09-29 11:57 . 2010-06-22 13:2619456 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6002.22429_none_17aad34f1fde10ac\tzupd.exe + 2010-02-24 17:50 . 2010-01-23 09:2619456 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6002.18276_none_16e8242406ebb36b\tzupd.exe + 2010-09-29 11:57 . 2010-06-22 13:0419456 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6001.22717_none_15cd30bf22b16ce9\tzupd.exe + 2010-02-24 17:50 . 2010-01-23 09:4419456 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6001.18497_none_14ed10c809d4b259\tzupd.exe + 2009-05-03 14:56 . 2010-09-29 11:5068664 c:\windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin + 2006-11-02 13:05 . 2010-09-29 11:5060312 c:\windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin + 2009-05-03 14:40 . 2010-09-29 11:5018804 c:\windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-3891294070-290603237-754910137-1000_UserData.bin + 2006-11-02 13:02 . 2010-09-29 11:5232768 c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat - 2006-11-02 13:02 . 2010-09-28 21:5232768 c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat + 2010-09-28 22:17 . 2010-09-29 11:5232768 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat - 2010-09-28 22:17 . 2010-09-28 21:5232768 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat + 2006-11-02 13:02 . 2010-09-29 11:5216384 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat - 2006-11-02 13:02 . 2010-09-28 21:5216384 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat + 2010-09-09 21:00 . 2010-09-29 11:5916384 c:\windows\System32\%APPDATA%\Microsoft\Windows\IETldCache\index.dat - 2010-09-09 21:00 . 2010-09-27 13:1616384 c:\windows\System32\%APPDATA%\Microsoft\Windows\IETldCache\index.dat - 2009-05-18 19:46 . 2010-09-28 21:5316384 c:\windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat + 2009-05-18 19:46 . 2010-09-29 11:4916384 c:\windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat - 2009-05-18 19:46 . 2010-09-28 21:5332768 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat + 2009-05-18 19:46 . 2010-09-29 11:4932768 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat + 2009-05-18 19:46 . 2010-09-29 11:4916384 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat - 2009-05-18 19:46 . 2010-09-28 21:5316384 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat - 2009-05-18 19:40 . 2010-09-28 21:5216384 c:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat + 2009-05-18 19:40 . 2010-09-29 11:4816384 c:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat + 2009-05-18 19:40 . 2010-09-29 11:4832768 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat - 2009-05-18 19:40 . 2010-09-28 21:5232768 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat - 2009-05-18 19:40 . 2010-09-28 21:5216384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat + 2009-05-18 19:40 . 2010-09-29 11:4816384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat + 2010-06-04 19:35 . 2010-09-29 12:0049152 c:\windows\Installer\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}\ConfigIcon.dll - 2010-06-04 19:35 . 2010-09-09 21:0149152 c:\windows\Installer\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}\ConfigIcon.dll + 2010-09-29 11:57 . 2010-06-22 13:262048 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6002.22429_none_17aad34f1fde10ac\tzres.dll + 2010-09-29 11:57 . 2010-06-22 13:302048 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6002.18276_none_16e8242406ebb36b\tzres.dll + 2010-09-29 11:57 . 2010-06-22 13:042048 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6001.22717_none_15cd30bf22b16ce9\tzres.dll + 2010-09-29 11:57 . 2010-06-22 12:572048 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6001.18497_none_14ed10c809d4b259\tzres.dll + 2010-09-29 11:48 . 2010-09-29 11:482048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat - 2010-09-28 21:52 . 2010-09-28 21:522048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat + 2010-09-29 11:48 . 2010-09-29 11:482048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat - 2010-09-28 21:52 . 2010-09-28 21:522048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat + 2006-11-02 10:33 . 2010-09-29 11:54608760 c:\windows\System32\perfh009.dat - 2006-11-02 10:33 . 2010-09-28 21:58608760 c:\windows\System32\perfh009.dat - 2006-11-02 10:33 . 2010-09-28 21:58108268 c:\windows\System32\perfc009.dat + 2006-11-02 10:33 . 2010-09-29 11:54108268 c:\windows\System32\perfc009.dat + 2006-11-02 10:22 . 2010-09-29 11:556553600 c:\windows\System32\SMI\Store\Machine\schema.dat - 2006-11-02 10:22 . 2010-09-18 08:516553600 c:\windows\System32\SMI\Store\Machine\schema.dat + 2010-09-29 12:03 . 2010-09-29 12:036410240 c:\windows\ERDNT\Hiv-backup\schema.dat + 2010-09-29 11:58 . 2010-09-29 11:5820303872 c:\windows\Installer\a26be.msp + 2009-05-31 17:07 . 2010-09-29 12:00186205553 c:\windows\winsxs\ManifestCache\6.0.6002.18005_001c11ba_blobs.bin . ((((((((((((((((((((((((((((((((((((( Reg Loading Points )))))))))))))))))))))))))))))))))))))))))))))))))) . . *Note* empty entries & legit default entries are not shown REGEDIT4 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920] "BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="c:\program files\Common Files\Ahead\Lib\NMBgMonitor.exe" [2008-01-22 152872] "ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952] "swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-11-09 39408] "WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240] [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184] "NeroFilterCheck"="c:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2008-05-28 570664] "SigmatelSysTrayApp"="sttray.exe" [2007-03-29 303104] "MSSE"="c:\program files\Microsoft Security Essentials\msseces.exe" [2010-06-01 1093208] "SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552] "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760] "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832] "@OnlineArmor GUI"="c:\program files\Emsisoft\Online Armor\oaui.exe" [2010-07-05 6854984] "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-09-08 421888] "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-09-24 421160] [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system] "EnableUIADesktopToggle"= 0 (0x0) [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer] "EnableShellExecuteHooks"= 1 (0x1) [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks] "{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\Emsisoft\ONLINE~1\oaevent.dll" [2010-07-05 924488] [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS] @="" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc] @="Service" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend] @="Service" R1 apprngr;AppRanger Scan Driver;c:\windows\system32\Drivers\apprngr.sys R2 apprngr_svc;AppRanger Service;c:\program files\AppRanger\SWSvc.exe R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384] R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 133104] R2 SvcOnlineArmor;Online Armor;c:\program files\Emsisoft\Online Armor\oasrv.exe [2010-07-05 3364680] R3 bepldr;BCL easyPDF SDK 5 Loader;c:\program files\Common Files\BCL Technologies\easyPDF 5\bepldr.exe [2007-02-21 151552] R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504] S0 amacpi;Microsoft Away Mode System;c:\windows\system32\DRIVERS\null.sys [2008-01-19 4608] S0 npf;npf Driver;c:\windows\system32\drivers\npf.sys [2007-11-06 34064] S1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [2010-07-05 236104] S1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [2010-07-05 22600] S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-02-17 12872] S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2010-05-10 67656] S2 OAcat;Online Armor Helper Service;c:\program files\Emsisoft\Online Armor\OAcat.exe [2010-07-05 1283400] S2 Secunia Update Agent;Secunia Update Agent;c:\program files\Secunia\PSI\sua.exe [2010-09-01 318520] S3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\system32\DRIVERS\MpNWMon.sys [2010-03-25 42368] S3 OAnet;OnlineArmor Service;c:\windows\system32\DRIVERS\oanet.sys [2010-07-05 29256] S3 PSI;PSI;c:\windows\system32\DRIVERS\psi_mf.sys [2010-09-01 15544] [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost] bthsvcsREG_MULTI_SZ BthServ LocalServiceAndNoImpersonationREG_MULTI_SZ FontCache . Contents of the 'Scheduled Tasks' folder 2010-09-29 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job - c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 12:13] 2010-09-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job - c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 12:13] 2010-09-28 c:\windows\Tasks\ParetoLogic Registration3.job - c:\program files\Common Files\ParetoLogic\UUS3\UUS3.dll [2009-08-04 18:19] 2010-08-13 c:\windows\Tasks\ParetoLogic Update Version3.job - c:\program files\Common Files\ParetoLogic\UUS3\Pareto_Update3.exe [2009-08-04 18:19] 2010-09-29 c:\windows\Tasks\User_Feed_Synchronization-{AAD29C0A-613E-42B8-9812-D1A798192E3F}.job - c:\windows\system32\msfeedssync.exe [2010-08-11 04:24] . . ------- Supplementary Scan ------- . uStart Page = hxxp://www.google.co.uk/ mStart Page = hxxp://www.voover.com/ uInternet Settings,ProxyOverride = *.local uSearchURL,(Default) = hxxp://uk.search.yahoo.com/search?fr=mcafee&p=%s . ************************************************************************** catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2010-09-29 13:17 Windows 6.0.6002 Service Pack 2 NTFS scanning hidden processes ... scanning hidden autostart entries ... scanning hidden files ... scan completed successfully hidden files: 0 ************************************************************************** . --------------------- LOCKED REGISTRY KEYS --------------------- [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}] @Denied: (A 2) (Everyone) @="FlashBroker" "LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe,-101" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation] "Enabled"=dword:00000001 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32] @="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}] @Denied: (A 2) (Everyone) @="IFlashBroker4" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" "Version"="1.0" [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 . Completion time: 2010-09-29 13:25:53 ComboFix-quarantined-files.txt 2010-09-29 12:25 ComboFix2.txt 2010-09-28 23:50 ComboFix3.txt 2010-09-26 14:35 ComboFix4.txt 2010-09-22 13:52 ComboFix5.txt 2010-09-29 12:02 Pre-Run: 59,893,477,376 bytes free Post-Run: 59,291,213,824 bytes free - - End Of File - - E9C012840EC9B2A6897E8CB2BF14911F Logfile of Trend Micro HijackThis v2.0.4 Scan saved at 13:30:43, on 29/09/2010 Platform: Windows Vista SP2 (WinNT 6.00.1906) MSIE: Internet Explorer v8.00 (8.00.6001.18943) Boot mode: Normal Running processes: C:\Windows\system32\Dwm.exe C:\Windows\system32\taskeng.exe C:\Windows\system32\taskeng.exe C:\Program Files\Secunia\PSI\psi.exe C:\Windows\System32\mobsync.exe C:\Program Files\Windows Media Player\wmpnscfg.exe C:\Windows\sttray.exe C:\Program Files\Microsoft Security Essentials\msseces.exe C:\Program Files\Common Files\Java\Java Update\jusched.exe C:\Program Files\iTunes\iTunesHelper.exe C:\Program Files\Windows Sidebar\sidebar.exe C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe C:\Windows\ehome\ehtray.exe C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe C:\Windows\ehome\ehmsas.exe C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe C:\Windows\Explorer.exe C:\Windows\system32\SearchFilterHost.exe C:\Program Files\Trend Micro\HijackThis\sniper.exe.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.voover.com/ R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://uk.search.yahoo.com/search?fr=mcafee&p=%s R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: McAfee Phishing Filter - {27B4851A-3207-45A2-B947-BE8AFE6163AB} - (no file) O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.6.5612.1312\swg.dll O2 - BHO: (no name) - {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - (no file) O2 - BHO: WOT Helper - {C920E44A-7F78-4E64-BDD7-A57026E7FEB7} - C:\Program Files\WOT\WOT.dll O2 - BHO: MSN Toolbar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN\Toolbar\3.0.1203.0\msneshellx.dll O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll O2 - BHO: SingleInstance Class - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - C:\Program Files\Yahoo!\Companion\Installs\cpn\YTSingleInstance.dll O3 - Toolbar: MSN Toolbar - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.1203.0\msneshellx.dll O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll O3 - Toolbar: WOT - {71576546-354D-41c9-AAE8-31F2EC22BF0D} - C:\Program Files\WOT\WOT.dll O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe O4 - HKLM\..\Run: [SigmatelSysTrayApp] sttray.exe O4 - HKLM\..\Run: [MSSE] "C:\Program Files\Microsoft Security Essentials\msseces.exe" -hide -runkey O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe" O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" O4 - HKLM\..\Run: [@OnlineArmor GUI] "C:\Program Files\Emsisoft\Online Armor\oaui.exe" O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe" O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe" O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} (OnlineScanner Control) - http://download.eset.com/special/eos/OnlineScanner.cab O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab O18 - Protocol: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file) O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file) O18 - Protocol: wot - {C2A44D6B-CB9F-4663-88A6-DF2F26E4D952} - C:\Program Files\WOT\WOT.dll O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe O23 - Service: AppRanger Service (apprngr_svc) - Unknown owner - C:\Program Files\AppRanger\SWSvc.exe (file missing) O23 - Service: BCL easyPDF SDK 5 Loader (bepldr) - Unknown owner - C:\Program Files\Common Files\BCL Technologies\easyPDF 5\bepldr.exe O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe O23 - Service: EPSON V3 Service4(01) (EPSON_PM_RPCV4_01) - SEIKO EPSON CORPORATION - C:\ProgramData\EPSON\EPW!3 SSRP\E_S40RP7.EXE O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe O23 - Service: Online Armor Helper Service (OAcat) - Unknown owner - C:\Program Files\Emsisoft\Online Armor\OAcat.exe O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - C:\Windows\system32\IoctlSvc.exe O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe O23 - Service: Secunia Update Agent - Secunia - C:\Program Files\Secunia\PSI\sua.exe O23 - Service: SigmaTel Audio Service (STacSV) - SigmaTel, Inc. - C:\Program Files\SigmaTel\C-Major Audio\WDM\STacSV.exe O23 - Service: Online Armor (SvcOnlineArmor) - Unknown owner - C:\Program Files\Emsisoft\Online Armor\oasrv.exe O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe -- End of file - 8610 bytes Just to keep you up to date, SuperDave, I deleted the back up folder that contained the 'RECYCLE' folder I couldn't find. I had to change a number of permissions and ownerships to do so (temporarily switched UAC off). During this process a message came up 'Are you sure you want to delete RECYCLE... I scanned with Secunia again and obtained 100%. All the logs look ok. Just run this to get rid of the latest version of ComboFix and to set a new restore date. * Click START then RUN - Vista users press the Windows Key and the R keys for the Run box. * Now type Combofix /uninstall in the runbox * Make sure there's a space between Combofix and /Uninstall * Then hit Enter * The above procedure will: * Delete the following: * ComboFix and its associated files and folders. * Reset the clock settings. * Hide file extensions, if required. * Hide System/Hidden files, if required. * Set a new, clean Restore Point. ComboFix uninstalled. Incidentally, I failed to do that before because I misunderstood your instruction. [quote * Click START then RUN - Vista users press the Windows Key and the R keys for the Run box.[/quote] You might consider changing it to 'Vista users press the Windows Key and the R keys together for the Run box'. Anyway, thanks SuperDave for your considerable help. I'm impressed with your skill and knowledge. This is an excellent site. Thanks for the advice. I'll have to update my canned speeches one day when I'm not so busy. Tell your friends about this site. |
|
| 1707. |
Solve : help i cant grant myself admin? |
|
Answer» I am running windows 7 and am TRYING to GRANT my user administration...with cmd.exe that is when i try to ANYTHING weather i be changing user passwords or adding usernames... it displays system error 5 acces denied. someone told me sounds like infection.any HELP. i used aavg FREE scaner and no results were found.Quote from: cmdpro on September 28, 2010, 07:27:05 PM I am running windows 7 and am trying to grant my user administration...with cmd.exe that is when i try to anything weather i be changing user passwords or adding usernames... it displays system error 5 acces denied. someone told me sounds like infection.any help. i used aavg free scaner and no results were found. We fixed this, did we not? You simply hadn't run it as Admin? |
|
| 1708. |
Solve : Rootkit.Agent found in System32 Drivers? |
|
Answer» Here is the ESET removal: Just wondering if I should be deleting the ESET quarantined items, I still have the old Java updates in add/remove, will that get rid of them for good?Yes, get rid of them. Could you please try that file in Jotti's as described in Reply # 25. Hey SD, Got rid of the quarantined items and the old Java Versions seem to have successfully uninstalled (i.e. I rebooted and they didn't come back). As for "C:\Windows\System32\Drivers\pblkx.sys" I had PUT in reply #26 that when MRT was able to run successfully and restart the computer successfully, I tried going to Jotti's and the file could not be found. I've checked the Drivers folder manually as well and the pblkx.sys driver no longer exists. So, is your computer working well now?Yes it's running very well, I've done full scans of SAS, MBAM, AVG, ESET and everything is coming out clean as a whistle! It's safe to say that you are an absolute lifesaver, and DARE I say a king among men! Well, that sound goods to my ears. Let's do some cleanup * Click START then RUN - Vista users press the Windows Key and the R keys for the Run box. * Now type commy /uninstall in the runbox * Make sure there's a space between commy and /Uninstall * Then hit Enter * The above procedure will: * Delete the following: * ComboFix and its associated files and folders. * Reset the clock settings. * Hide file extensions, if required. * Hide System/Hidden files, if required. * Set a new, clean Restore Point. *********************************** Clean out your temporary internet files and temp files. Download TFC by OldTimer to your desktop. Double-click TFC.exe to run it. Note: If you are running on Vista, right-click on the file and choose Run As Administrator TFC will close all programs when run, so make sure you have saved all your work before you begin. * Click the Start button to begin the CLEANING process. * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two. * Please let TFC run uninterrupted until it is finished. Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning. ********************************** Use the Secunia Software Inspector to check for out of date software. •Click Start Now •Check the box next to Enable thorough system inspection. •Click Start •Allow the scan to finish and scroll down to see if any updates are needed. •Update anything listed. . ---------- Go to Microsoft Windows Update and get all critical updates. ---------- I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free. SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox. * Using SpywareBlaster to protect your computer from Spyware and Malware * If you don't know what ActiveX controls are, see here Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest IMMUNIZATIONS always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future. Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly. Safe Surfing! Well everything is running tip-top, you can consider this matter closed! Thank you so very much SuperDave for all your help and patience, you do FANTASTIC work! D. |
|
| 1709. |
Solve : PAID FOR REGISTRY? |
|
Answer» i NEED HELP i have the NUMBER but i can not find what PC HELP SOFT it belong to can some one help pleaseHelp how? What is your QUESTION? |
|
| 1710. |
Solve : Cannot access internet; laptop infected...? |
|
Answer» Well, that is good news. I just want to make sure that your computer is clean. Please run these scans and post the LOGS.
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. **************************************** Download Security Check by screen317 from one of the following links and save it to your desktop. Link 1 Link 2 * Unzip SecurityCheck.zip and a folder named Security Check should appear. * Open the Security Check folder and double-click Security Check.bat * Follow the on-screen instructions inside of the black box. * A Notepad document should open automatically called checkup.txt * Post the contents of that document in your next reply. Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.Okay, SD, following are the logs for SuperAntiSpyware, Malware Bytes, and Security Check: SUPERAntiSpyware Scan Log http://www.superantispyware.com Generated 09/29/2010 at 09:33 AM Application Version : 4.43.1000 Core Rules Database Version : 5601 Trace Rules Database Version: 3413 Scan type : Complete Scan Total Scan Time : 02:24:45 Memory items scanned : 746 Memory threats detected : 0 Registry items scanned : 7722 Registry threats detected : 0 File items scanned : 149764 File threats detected : 36 Adware.Tracking Cookie .doubleclick.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .specificmedia.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .specificclick.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .specificclick.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .specificclick.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .specificclick.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] ad.yieldmanager.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .invitemedia.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .liveperson.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] sales.liveperson.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .liveperson.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .atdmt.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .invitemedia.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .atdmt.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] ad.yieldmanager.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .invitemedia.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .at.atwola.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .revsci.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .revsci.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .revsci.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .revsci.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] .revsci.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ] cdn.eyewonder.com [ C:\Users\Trace\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\ABB52LBL ] ia.media-imdb.com [ C:\Users\Trace\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\ABB52LBL ] C:\Users\Trace\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt C:\Users\Trace\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt C:\Users\Trace\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt And next: Malwarebytes' Anti-Malware 1.46 www.malwarebytes.org Database version: 4716 Windows 6.0.6002 Service Pack 2 Internet Explorer 7.0.6002.18005 9/29/2010 12:17:22 PM mbam-log-2010-09-29 (12-17-22).txt Scan type: Full scan (C:\|D:\|E:\|) Objects scanned: 260921 Time elapsed: 1 hour(s), 30 minute(s), 51 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 0 Registry Values Infected: 0 Registry Data Items Infected: 0 Folders Infected: 0 Files Infected: 0 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: (No malicious items detected) Registry Values Infected: (No malicious items detected) Registry Data Items Infected: (No malicious items detected) Folders Infected: (No malicious items detected) Files Infected: (No malicious items detected) And next: Results of screen317's Security Check version 0.99.5 Windows Vista Service Pack 2 (UAC is enabled) Internet Explorer 7 Out of date! `````````````````````````````` Antivirus/Firewall Check: Windows Firewall Enabled! avast! Free Antivirus WMI entry may not exist for antivirus; attempting automatic update. ``````````````````````````````` Anti-malware/Other Utilities Check: Malwarebytes' Anti-Malware CCleaner Java(TM) 6 Update 21 Adobe Reader 9.3.4 ```````````````````````````````` Process Check: objlist.exe by Laurent Windows Defender MSASCui.exe Windows Defender MSASCui.exe Alwil Software Avast5 AvastSvc.exe ```````````````````````````````` DNS Vulnerability Check: GREAT! (Not vulnerable to DNS cache poisoning) ``````````End of Log```````````` What do you think, SD? Am I fixed? Let me know. -TracePlease download ComboFix from BleepingComputer.com Alternate link: GeeksToGo.com Rename ComboFix.exe to commy.exe before you save it to your Desktop Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools A guide to do this can be found here Click Start then copy paste the following command into the search box & hit enter: "%userprofile%\desktop\commy.exe" /stepdel As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. This will not install in Vista. Just continue scanning, and skip the console install. When finished, it shall PRODUCE a log for you. Please include the contents of C:\ComboFix.txt in your next reply. If you have problems with ComboFix usage, see How to use ComboFixI too was having the same problem and was getting nowhere fast in getting this fixed. I have an Aspire 3690 running MSXPMCE that worked fine when hard-wired but would not when using wireless. I think some one mentioned registry errors and winsock issues. I believe they are correct since my laptop is now working via wireless. Today, I did the following to correct the prroblem: First, I downloaded the Norton Internet security removal tool and removed Norton (latest version). This was to see if Norton was causing the issue. After removal, I tried connecting via wireless but no go. Second, I connected via hard-wire and downloaded the Winsockfix program and ran it on the laptop. It ran maybe for 3 seconds. Third, I disconnected the hard-wire connection to go wireless and it worked. Everything worked like it should. Fourth, I reinstalled the Norton Internet security to see if it would affect the wireless but it did not. The wireless connection is still working fine. Prior to this I also ran Registry Mechanic by PCTools which did fix over 300 registry errors but the wireless still would not work. Maybe it is a problem with the winsock file registry? I think you guys will know better about this than me though. Without you guys I'd be still messing around without a clue. Great job and many kudos.Hey, SD. My log from Combofix follows: ComboFix 10-10-01.01 - Trace 10/01/2010 19:39:39.4.2 - x86 Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.2037.1195 [GMT -6:00] Running from: c:\users\Trace\Desktop\Commy.exe SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7} SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46} . ((((((((((((((((((((((((( Files Created from 2010-09-02 to 2010-10-02 ))))))))))))))))))))))))))))))) . 2010-10-02 01:50 . 2010-10-02 01:50--------d-----w-c:\users\Public\AppData\Local\temp 2010-10-02 01:50 . 2010-10-02 01:50--------d-----w-c:\users\Default\AppData\Local\temp 2010-10-02 01:02 . 2010-10-02 01:12--------d-----w-C:\Commy11548C 2010-10-01 16:33 . 2010-10-01 16:46--------d-----w-C:\Commy 2010-09-29 12:49 . 2010-09-29 12:49--------d-----w-c:\program files\Common Files\Macrovision Shared 2010-09-29 12:48 . 2008-04-07 11:3822872----a-r-c:\windows\system32\AdobePDFUI.dll 2010-09-29 06:08 . 2010-06-22 13:302048----a-w-c:\windows\system32\tzres.dll 2010-09-28 02:17 . 2010-09-28 02:17--------d-----w-c:\program files\iPod 2010-09-28 02:17 . 2010-09-28 02:18--------d-----w-c:\program files\iTunes 2010-09-28 02:15 . 2010-09-28 02:16--------d-----w-c:\program files\QuickTime 2010-09-28 02:15 . 2010-09-28 02:15--------d-----w-c:\program files\Apple Software Update 2010-09-28 02:13 . 2010-09-28 02:13--------d-----w-c:\program files\Bonjour 2010-09-28 02:13 . 2010-09-28 02:17--------d-----w-c:\program files\Common Files\Apple 2010-09-25 14:12 . 2010-09-25 14:12--------d-----w-c:\program files\Feedback Tool 2010-09-24 18:22 . 2010-10-02 01:50--------d-----w-c:\users\Trace\AppData\Local\temp 2010-09-24 08:51 . 2010-09-24 08:5173000----a-w-c:\programdata\Apple Computer\Installer Cache\iTunes 10.0.1.22\SetupAdmin.exe 2010-09-22 23:49 . 2010-09-22 23:49388096----a-r-c:\users\Trace\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe 2010-09-22 23:49 . 2010-09-22 23:49--------d-----w-c:\program files\Trend Micro 2010-09-22 23:33 . 2010-09-22 23:33--------d-----w-c:\program files\Common Files\Java 2010-09-22 22:52 . 2010-09-22 22:52--------d-----w-c:\users\Trace\AppData\Roaming\Malwarebytes 2010-09-22 22:52 . 2010-04-29 21:3938224----a-w-c:\windows\system32\drivers\mbamswissarmy.sys 2010-09-22 22:52 . 2010-09-22 22:52--------d-----w-c:\programdata\Malwarebytes 2010-09-22 22:52 . 2010-09-22 22:52--------d-----w-c:\program files\Malwarebytes' Anti-Malware 2010-09-22 22:52 . 2010-04-29 21:3920952----a-w-c:\windows\system32\drivers\mbam.sys 2010-09-22 20:05 . 2010-09-29 13:0663488----a-w-c:\users\Trace\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll 2010-09-22 20:05 . 2010-09-22 20:0552224----a-w-c:\users\Trace\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll 2010-09-22 20:05 . 2010-09-29 13:06117760----a-w-c:\users\Trace\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL 2010-09-22 20:04 . 2010-09-22 20:04--------d-----w-c:\programdata\SUPERAntiSpyware.com 2010-09-22 20:04 . 2010-09-22 20:04--------d-----w-c:\users\Trace\AppData\Roaming\SUPERAntiSpyware.com 2010-09-22 20:04 . 2010-09-22 20:05--------d-----w-c:\program files\SUPERAntiSpyware 2010-09-22 20:00 . 2010-09-22 20:00--------d-----w-c:\program files\CCleaner 2010-09-22 15:07 . 2010-09-07 14:4717744----a-w-c:\windows\system32\drivers\aswFsBlk.sys 2010-09-22 15:07 . 2010-09-07 14:52165584----a-w-c:\windows\system32\drivers\aswSP.sys 2010-09-22 15:07 . 2010-09-07 14:4723376----a-w-c:\windows\system32\drivers\aswRdr.sys 2010-09-22 15:07 . 2010-09-07 14:5246672----a-w-c:\windows\system32\drivers\aswTdi.sys 2010-09-22 15:07 . 2010-09-07 14:4750768----a-w-c:\windows\system32\drivers\aswMonFlt.sys 2010-09-22 15:06 . 2010-09-07 15:1238848----a-w-c:\windows\avastSS.scr 2010-09-22 15:06 . 2010-09-07 15:11167592----a-w-c:\windows\system32\aswBoot.exe 2010-09-22 15:06 . 2010-09-22 15:06--------d-----w-c:\programdata\Alwil Software 2010-09-22 15:06 . 2010-09-22 15:06--------d-----w-c:\program files\Alwil Software 2010-09-20 19:58 . 2010-09-20 19:58--------d-----w-c:\users\Trace\MSYNC 2010-09-15 17:51 . 2010-04-16 16:46502272----a-w-c:\windows\system32\usp10.dll 2010-09-15 17:50 . 2010-08-17 14:11128000----a-w-c:\windows\system32\spoolsv.exe 2010-09-15 17:50 . 2010-04-05 17:02317952----a-w-c:\windows\system32\MP4SDECD.DLL 2010-09-15 17:49 . 2010-05-27 20:08739328----a-w-c:\windows\system32\inetcomm.dll . (((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))) . 2010-09-29 15:43 . 2007-12-18 03:54112376----a-w-c:\users\Trace\AppData\Local\GDIPFONTCACHEV1.DAT 2010-09-29 12:49 . 2008-03-22 02:37--------d-----w-c:\program files\Common Files\Adobe 2010-09-29 12:49 . 2006-11-02 10:2551200----a-w-c:\windows\Inf\infpub.dat 2010-09-29 12:49 . 2006-11-02 10:25143360----a-w-c:\windows\Inf\infstrng.dat 2010-09-29 12:49 . 2006-11-02 10:25143360----a-w-c:\windows\Inf\infstor.dat 2010-09-28 00:46 . 2007-04-10 10:02--------d-----w-c:\programdata\Symantec 2010-09-24 20:54 . 2008-02-26 01:551356----a-w-c:\users\Trace\AppData\Local\d3d9caps.dat 2010-09-24 20:16 . 2008-07-28 18:04--------d-----w-c:\programdata\Microsoft Help 2010-09-22 23:25 . 2010-06-27 16:49423656----a-w-c:\windows\system32\deployJava1.dll 2010-09-22 23:25 . 2008-02-13 20:23--------d-----w-c:\program files\Java 2010-09-21 23:21 . 2009-03-15 22:31--------d-----w-c:\programdata\Spybot - Search & Destroy 2010-09-21 23:15 . 2007-04-10 09:04--------d--h--w-c:\program files\InstallShield Installation Information 2010-09-21 22:50 . 2009-03-15 22:34--------d-----w-c:\programdata\Lavasoft 2010-09-21 22:10 . 2008-01-29 23:10--------d-----w-c:\program files\Google 2010-09-16 09:01 . 2006-11-02 11:18--------d-----w-c:\program files\Windows Mail 2010-07-28 00:44 . 2010-07-28 00:4491424----a-w-c:\windows\system32\dnssd.dll 2010-07-28 00:44 . 2010-07-28 00:4475040----a-w-c:\windows\system32\jdns_sd.dll 2010-07-28 00:44 . 2010-07-28 00:44197920----a-w-c:\windows\system32\dnssdX.dll 2010-07-28 00:44 . 2010-07-28 00:44107808----a-w-c:\windows\system32\dns-sd.exe 2003-08-01 21:54 . 2009-09-06 18:2325852----a-w-c:\program files\TURNBB__.TTF . ((((((((((((((((((((((((((((((((((((( Reg Loading Points )))))))))))))))))))))))))))))))))))))))))))))))))) . . *Note* empty entries & legit default entries are not shown REGEDIT4 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952] "Google Update"="c:\users\Trace\AppData\Local\Google\Update\GoogleUpdate.exe" [2010-09-28 136176] [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184] "RtHDVCpl"="RtHDVCpl.exe" [2007-03-01 4390912] "SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-10-23 815104] "eDSMSNfix"="c:\acer\Empowering Technology\eDSMSNfix.exe" [2007-02-08 13312] "IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-02-12 141848] "HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-12 166424] "Persistence"="c:\windows\system32\igfxpers.exe" [2008-02-12 133656] "SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552] "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-09-08 421888] "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-09-24 421160] "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760] "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832] "Adobe Acrobat Speed Launcher"="c:\program files\Adobe\Acrobat 9.0\Acrobat\Acrobat_sl.exe" [2008-06-12 37232] "Acrobat Assistant 8.0"="c:\program files\Adobe\Acrobat 9.0\Acrobat\Acrotray.exe" [2008-06-12 640376] [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system] "EnableUIADesktopToggle"= 0 (0x0) [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend] @="Service" [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring] "DisableMonitoring"=dword:00000001 [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus] "DisableMonitoring"=dword:00000001 [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall] "DisableMonitoring"=dword:00000001 R0 Lbd;Lbd;c:\windows\system32\DRIVERS\Lbd.sys R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384] R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504] R4 sptd;sptd;c:\windows\system32\Drivers\sptd.sys [2009-01-06 717296] S1 aswSP;aswSP; S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-02-17 12872] S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2010-05-10 67656] S2 ALaunchService;ALaunch Service;c:\acer\ALaunch\ALaunchSvc.exe [2007-01-26 50688] S2 aswFsBlk;aswFsBlk; S2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2010-09-07 50768] [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost] HPZ12REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12 hpdevmgmtREG_MULTI_SZ hpqcxs08 LocalServiceAndNoImpersonationREG_MULTI_SZ FontCache . Contents of the 'Scheduled Tasks' folder 2010-10-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4048087957-2194321304-3991422104-1000Core.job - c:\users\Trace\AppData\Local\Google\Update\GoogleUpdate.exe [2010-09-28 02:01] 2010-10-02 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4048087957-2194321304-3991422104-1000UA.job - c:\users\Trace\AppData\Local\Google\Update\GoogleUpdate.exe [2010-09-28 02:01] . . ------- Supplementary Scan ------- . uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7 uInternet Settings,ProxyOverride = *.local IE: Append to existing PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html IE: Convert link target to Adobe PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html IE: Convert link target to existing PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html IE: Convert to Adobe PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECapture.html . ************************************************************************** catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2010-10-01 19:50 Windows 6.0.6002 Service Pack 2 NTFS scanning hidden processes ... scanning hidden autostart entries ... scanning hidden files ... scan completed successfully hidden files: 0 ************************************************************************** . --------------------- LOCKED REGISTRY KEYS --------------------- [HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (EVERYONE) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 . Completion time: 2010-10-01 19:52:29 ComboFix-quarantined-files.txt 2010-10-02 01:52 ComboFix2.txt 2010-10-02 01:12 ComboFix3.txt 2010-10-01 16:46 ComboFix4.txt 2010-09-24 20:44 ComboFix5.txt 2010-10-02 01:38 Pre-Run: 15,775,641,600 bytes free Post-Run: 15,740,796,928 bytes free - - End Of File - - C403EDB12089BB9E312013C59EAF5EE0 Let me know what to do next. Thanks! -TraceOnly a couple more scans to go. Please download 7-Zip and install it. If you already have it, no need to reinstall. Then, download RootkitUnhooker and save the setup to your Desktop.
|
|
| 1711. |
Solve : Challenge to anyone who can explain this.? |
|
Answer» My son downloaded World of WARCRAFT from Riot Games and put the package on his desktop. He installed the game and left the downloaded package on the desktop. I noticed something was accessing his HDD at a very high rate. I opened resource monitor and traced it to the desktop install package of the game into a file called datacab2. I HEAR some game suppliers LIKE Origin will scan your comp for hacked/cracked versions of games but this is very UNUSUAL that it was not a file in the game after install causing this thrashing of the hdd. I deleted the install package and removed it from the recycle BIN and it all went away. other info: I booted the comp and had not opened the game and it was active thrashing the hdd from the install package on the desktop. If anyone has any info , reason, or can find out, please reply. I posted here because it seems to me this extreme thrashing of the hdd would be destructive to a hdd over time and seems malicious in that way. You sure it's not data2.cab? Google shows that games from Riot Games have issues with data2.cab during the install. Some installers "call home" during the install process so that may explain the constnt disk activity if the installer is having issues creating the data2.cab file. Also I don't see WOW on the Riot Games website. Are you sure this download was from a reliable source? |
|
| 1712. |
Solve : Getting a Microsoft Security Essentials Alert? |
|
Answer» Hello...I apologize in advance for my zero knowledge of any thing computer! I am getting a box from Microsoft Security Essentials Alert w/ a big RED Box saying Potential threat details. Message is MSE detected potential threats that might compromise your privacy or damage your computer. Your access to these items may be suspended until you taken an action. Click "Show Details" to learn more.
If MBAM encounters a file that is DIFFICULT to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. ****************************************** Please download: HiJackThis to your Desktop.
|
|
| 1713. |
Solve : Ramnit-B virus rampaging through my computer? |
|
Answer» Hi there, I've seen many people that are having the same problem with this virus but there are no '1-click-fix' things anywhere, so I figured I would just ask away. I am running Windows XP, SP 3 (I think it's 3, it's the latest one whatever it is). I did have Microsoft Security Essentials installed, and this kept detecting and cleaning all the infected files, then seconds later finding them infected again. On the advice of a computer technician, I have also installed Avast! Antivirus, and Malwarebytes anti-malware. I have turned off MSE, and have been running scans on the other two constantly for the last 36 hours. I've run two boot scans by Avast!, two full scans (again Avast!) and two full scans with MWB. The first few scans detected things, and deleted them, but the last Avast! Full scan and boot scan both came up clean. BUT Avast! keeps detecting attempts to infect other files by this virus, even thought the scans are coming back clean. Why? The malware injects code in legitimate files similar to the Virut virus and in many cases the infected files (which could number in the thousands) cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files often become corrupted and the system may become unstable or irreparable. The longer Ramnit.A remains on a computer, the more files it infects and corrupts so the degree of infection can vary. Ramnit is commonly spread via a flash drive (usb, pen, thumb, jump) infection where it copies Worm:Win32/Ramnit.A with a random file name. The infection is often contracted by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and a major source of system infection. In my opinion, Ramnit.A is not effectively disinfectable, so your best option is to perform a full reformat as there is no guarantee this infection can be completely removed. In most instances it may have caused so much damage to your system files that it cannot be completely cleaned or repaired. Further, your machine has likely been compromised by the backdoor Trojan and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if your anti-virus reports that the malware appears to have been removed. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:
Whenever a system has been compromised by a backdoor payload, it is impossible to know if or how much the backdoor has been used to affect your system...There are only a few ways to return a compromised system to a confident security configuration. These include:Backdoors and What They Mean to You This is what Jesper M. Johansson at Microsoft TechNet has to say: Help: I Got Hacked. Now What Do I Do?.Quote The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications). Important Note:: If your computer was used for online banking, has credit CARD information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to to include those used for banking, email, eBay, paypal and any online activities which REQUIRE a username and password. You should consider them to be compromised[/b]. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach. Failure to notify your financial institution and local law enforcement can result in refusal to reimburse funds lost due to fraud or similar criminal activity. Blast, that's exactly what I was hoping not to hear. Thanks anyway. Is there any way to back up my documents whilst still ensuring that I do not bring the virus onto my newly reformatted computer when they are transferred over?Yes, you can, if you follow very strict rules... * If you'll be using USB flash drive to move files from bad computer to good computer, make sure to install this on good computer... Download, and run Flash Disinfector, and save it to your desktop (Windows Vista and Windows 7 users, scroll down) *Please disable any AV / ScriptBlockers as they might detect Flash Disinfector to be malicious and block it. Hence, the failure in executing. You can enable them back after the cleaning process*
Windows Vista and Windows 7 users Flash Disinfector is not compatible with the above Windows version. Please, use Panda USB Vaccine * If you'll be using external drive to back up your data, make sure to install Flash Disinfector on bad computer after formatting and installing Windows and BEFORE connecting your external drive, or using USB flash drive. Now, you're safe to connect your external drive, or USB stick. BEFORE moving anything back from an external drive, or USB stick, make sure to scan them with freshly updated AV program and, for a good measure with one of online scanners, like Eset, or Kaspersky. Sorry to be dense, but could you just run through that again? Im using windows XP and will be using an external hard drive to transfer data. The hard drive already has data on it that I want to be careful of. Unless it's necessary, i didn't plan to move the files from computer to computer, only from computer to EHD, then back to formatted computer.In that case, I wouldn't be using that external drive. You don't want to mix clean files with possibly infected files. Some choices... - empty external drive to another computer and use it - get another external drive - get couple of 8GB/16GB USB sticks, depending on how much data you need to moveSorry, you replied before edit. I'll empty the EHD and use it. So when should i use flashdisinfector on it? And also, how can i get flash disinfector onto the clean computer without inserting USB drive or EHD.You reinstall Windows first, so everything is working, including internet connection. Download and install Flash Disinfector. Connect external drive. Scan all files.Ok, got it. Thanks alot.You're very welcome |
|
| 1714. |
Solve : Infected wuauclt.exe? |
|
Answer» If ComboFix is still on your computer you should find it on your desktop. If you can't find, please download and install another one and run another scan and post the log.ComboFix 10-09-29.01 - Jinju 09/29/2010 18:12:08.1.2 - x86 --- Other Services/Drivers In Memory --- *Deregistered* - AvgLdx86 . Contents of the 'Scheduled Tasks' folder 2010-09-29 c:\windows\Tasks\User_Feed_Synchronization-{90EE62B4-9066-4567-B527-472EEF2CA871}.job - c:\windows\system32\msfeedssync.exe [2010-09-21 07:33] . . ------- Supplementary Scan ------- . uStart Page = hxxp://www.aol.com/?src=aim mStart Page = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=71&bd=Pavilion&pf=laptop uInternet Settings,ProxyOverride = *.local uSearchURL,(Default) = hxxp://my.netzero.net/s/SEARCH?r=minisearch IE: Display All Images with Full Quality - c:\program files\NetZero\qsacc\appres.dll/228 IE: Display Image with Full Quality - c:\program files\NetZero\qsacc\appres.dll/227 IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000 Trusted Zone: netzero.com Trusted Zone: netzero.net FF - ProfilePath - c:\users\Jinju\AppData\Roaming\Mozilla\Firefox\Profiles\w5fweigy.default\ FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ ---- FIREFOX POLICIES ---- c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true); c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false); . - - - - ORPHANS REMOVED - - - - Toolbar-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file) WebBrowser-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file) ************************************************************************** catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2010-09-29 18:28 Windows 6.0.6001 Service Pack 1 NTFS scanning hidden processes ... scanning hidden autostart entries ... scanning hidden files ... scan completed successfully hidden files: 0 ************************************************************************** . --------------------- LOCKED REGISTRY KEYS --------------------- [HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 . Completion time: 2010-09-29 18:33:46 ComboFix-quarantined-files.txt 2010-09-29 22:33 Pre-Run: 73,712,840,704 bytes free Post-Run: 73,612,976,128 bytes free - - End Of File - - BAAE23D9312E5BAE78E43F64E6E7ED60oh and what is an HJT? You've never told me to run it before and I have no idea what that is...Re-running ComboFix to remove infections:
oh and what is an HJT? You've never told me to run it before and I have no idea what that is...Sorry.Here it is. Please download: HiJackThis to your Desktop.
Scan SAVED at 11:49:34 PM, on 9/29/2010 Platform: Windows Vista SP1 (WinNT 6.00.1905) MSIE: Internet Explorer v7.00 (7.00.6001.18498) Boot mode: Normal Running processes: C:\Windows\system32\taskeng.exe C:\Windows\system32\Dwm.exe C:\Windows\system32\conime.exe C:\Windows\system32\wuauclt.exe C:\Program Files\iTunes\iTunesHelper.exe C:\Program Files\HP\QuickPlay\QPService.exe C:\Windows\System32\ICO.EXE C:\Program Files\Synaptics\SynTP\SynTPEnh.exe C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe C:\Program Files\HP\HP Software Update\hpwuSchd2.exe C:\Program Files\Windows Sidebar\sidebar.exe C:\Program Files\NetZero\exec.exe C:\Windows\ehome\ehtray.exe C:\Program Files\AIM6\aim6.exe C:\Program Files\HP Connections\6811507\Program\HP Connections.exe C:\Program Files\V CAST Music Manager\MEMonitor.exe C:\Program Files\Windows Media Player\wmpnscfg.exe C:\Program Files\OpenOffice.org 2.4\program\soffice.exe C:\Windows\ehome\ehmsas.exe C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN C:\Windows\System32\rundll32.exe C:\Windows\System32\Pelmiced.exe C:\Program Files\Windows Sidebar\sidebar.exe C:\Program Files\NetZero\exec.exe C:\Program Files\NetZero\qsacc\x1exec.exe C:\Program Files\AIM6\aolsoftware.exe C:\Windows\system32\taskeng.exe C:\Windows\system32\sdclt.exe C:\Windows\Explorer.exe C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=71&bd=Pavilion&pf=laptop R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.netzero.net/s/search?r=minisearch R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - C:\Program Files\NetZero\SearchEnh1.dll O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll (filesize 62080 bytes, MD5 C11F6A1F61481E24BE3FDC06EA6F7D2A) O2 - BHO: Pop-up Blocker - {52706EF7-D7A2-49AD-A615-E903858CF284} - C:\Program Files\NetZero\qsacc\X1IEBHO.dll (filesize 211720 bytes, MD5 E194E3DF6BA5487F2B67FFAED9CF4D49) O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll (filesize 509328 bytes, MD5 F921D875A1CBD69A6A462BA2514BC831) O3 - Toolbar: ZeroBar - {F0F8ECBE-D460-4B34-B007-56A92E8F84A7} - C:\Program Files\NetZero\Toolbar.dll (filesize 297456 bytes, MD5 F65776B8C0C9DF600BC6FBD73796F5D3) O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime (filesize 413696 bytes, MD5 F34EB5D4F145ED5FE50033CA3A41ED24) O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe" (filesize 289064 bytes, MD5 4CED92963F453EB8DCFE67FD4248D657) O4 - HKLM\..\Run: [QPService] "C:\Program Files\HP\QuickPlay\QPService.exe" (filesize 167936 bytes, MD5 F4810C2DC4F2E92E1B5EBCA2173DBBCE) O4 - HKLM\..\Run: [QlbCtrl] %ProgramFiles%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE (filesize 49152 bytes, MD5 EDE74971B94F39238817BD0362FA171A) O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" (filesize 39792 bytes, MD5 8B9145D229D4E89D15ACB820D4A3A90F) O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exeC:\Program Files\Synaptics\SynTP\SynTPEnh.exe O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe" (filesize 144784 bytes, MD5 6AB4C021FBD36DC6764924C312428D97) O4 - HKLM\..\Run: [WAWifiMessage] %ProgramFiles%\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe O4 - HKLM\..\Run: [hpWirelessAssistant] %ProgramFiles%\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exeC:\Program Files\Hp\HP Software Update\HPWuSchd2.exe O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exeC:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe O4 - HKLM\..\Run: [HP Health Check Scheduler] C:\Program Files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exeC:\Program Files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart (filesize 44544 bytes, MD5 4B555106290BD117334E9A08761C035A) O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup (filesize 44544 bytes, MD5 4B555106290BD117334E9A08761C035A) O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit (filesize 44544 bytes, MD5 4B555106290BD117334E9A08761C035A) O4 - HKLM\..\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun (filesize 1233920 bytes, MD5 FD278E51A7D6F52D22FCE6C67E037AD6) O4 - HKCU\..\Run: [NetZero_uoltray] C:\Program Files\NetZero\exec.exe regrun (filesize 1629184 bytes, MD5 105BCCEF090AE7DA70046E3FB0EC10C8) O4 - HKCU\..\Run: [HPAdvisor] C:\Program Files\Hewlett-Packard\HP Advisor\HPAdvisor.exeC:\Program Files\Hewlett-Packard\HP Advisor\HPAdvisor.exe O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exeC:\Windows\ehome\ehTray.exe O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp (filesize 50528 bytes, MD5 A29F21DC5C28D85592E84CFCAD3ED52B) O4 - Startup: MEMonitor.lnk = C:\Program Files\V CAST Music Manager\MEMonitor.exe (filesize 951640 bytes, MD5 C1EEFC1FC617ED9CC1808C20F5E801A3) O4 - Startup: OpenOffice.org 2.4.lnk = C:\Program Files\OpenOffice.org 2.4\program\quickstart.exe (filesize 393216 bytes, MD5 F5CECCFE0CF964B209DCAB226D4C1DE3) O4 - Global Startup: HP Connections.lnk = C:\Program Files\HP Connections\6811507\Program\HP Connections.exe (filesize 34520 bytes, MD5 3754F4C688BFD04BC886112BD6566A9B) O8 - Extra context menu item: Display All Images with Full Quality - res://C:\Program Files\NetZero\qsacc\appres.dll/228 O8 - Extra context menu item: Display Image with Full Quality - res://C:\Program Files\NetZero\qsacc\appres.dll/227 O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000 O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~2.0_0\bin\ssv.dll (filesize 509328 bytes, MD5 F921D875A1CBD69A6A462BA2514BC831) O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~2.0_0\bin\ssv.dll (filesize 509328 bytes, MD5 F921D875A1CBD69A6A462BA2514BC831) O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll (filesize 603040 bytes, MD5 79F7DB36E67B9E8365FA824AD96DF400) O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll (filesize 603040 bytes, MD5 79F7DB36E67B9E8365FA824AD96DF400) O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL (filesize 39464 bytes, MD5 AEF204E782BFA2C8448CB43A58960744) O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5) - http://upload.facebook.com/controls/FacebookPhotoUploader5.cab O16 - DPF: {1239CC52-59EF-4DFA-8C61-90FFA846DF7E} (Musicnotes Viewer) - http://www.musicnotes.com/download/mnviewer.cab O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebook.com/controls/FacebookPhotoUploader3.cab O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0) - http://dl8-cdn-01.sun.com/s/ESD44/JSCDL/jdk/6u7/jinstall-6u7-windows-i586-jc.cab?e=1217560870556&h=abf1acf1380dd4d78c5840bafbfae17d/&filename=jinstall-6u7-windows-i586-jc.cab O23 - Service: AddFiltr - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\AddFiltr.exeC:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\AddFiltr.exe O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exeC:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exeC:\Program Files\Bonjour\mDNSResponder.exe O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\CLCapSvc.exeC:\Program Files\HP\QuickPlay\Kernel\TV\CLCapSvc.exe O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\CLSched.exeC:\Program Files\HP\QuickPlay\Kernel\TV\CLSched.exe O23 - Service: SYMANTEC Lic NetConnect service (CLTNetCnService) - Unknown owner - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing) O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files\HP Games\My HP Game Console\GameConsoleService.exeC:\Program Files\HP Games\My HP Game Console\GameConsoleService.exe O23 - Service: HP Health Check Service - Hewlett-Packard - C:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exeC:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exeC:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exeC:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exeC:\Program Files\iPod\bin\iPodService.exe O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exeC:\Program Files\Common Files\LightScribe\LSSrvc.exe O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exeC:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe O23 - Service: stllssvr - MicroVision Development, Inc. - C:\Program Files\Common Files\SureThing Shared\stllssvr.exeC:\Program Files\Common Files\SureThing Shared\stllssvr.exe O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exeC:\Windows\system32\DRIVERS\xaudio.exe -- End of file - 11542 bytes The logs look clean. Please go ahead with the cleanup listed in Reply #30Thanks SuperDave! Okay so just to clarify before I commence clean up, when TFC restarts my computer and if I need to manually restart my computer, what do you mean by that? because last time it restarted and then gave me a choice of restarting normally and then a recommended choice of restarting with the restore because the laptop thought that there was damage which I did and then screwed everything up again. Just skip the TFC. You can do a disk cleanup yourself. Just click on My Computer, right-click on your C drive, click Properties and select Disk cleanup. I don't see disk cleanup. Is that the same as format?No. Not the same as format. After you click Properties, Select General at the top left. Disk Cleanup is just below the pie chart of your C drive to the right. I did it!!! Thank you, SuperDave!!!! It took a bit longer than expected because of the unexpected bump we encountered but I really appreciate all your advice and patience!!You're welcome. Stay safe.Quote You can uninstall it or download and install MSE which, in my opinion, is a better AV program. If you do decide to change AV's download and install the new one before uninstalling the old one. You will also have to re-install MicroSoft Word. The link on the Microsoft Security Essentials for Windows Vista\Windows 7 downloaded a program that wouldn't install saying it wasn't compatible with my system and then the 64 bit Download downloaded SPYWARE DOCTOR WITH ANTIVIRUS. Should I have both on here? I have Vista.Try this site for the download. You can select the one for Vista and you can also keep Spyware Doctor, if you wish. |
|
| 1715. |
Solve : Invalid security certificate for Yahoo mail w/ IE8 and FF, also Comodo warning? |
|
Answer» I attempted to log in to my Yahoo Mail account using Firefox v3.6.10 and received this message from FF. This Connection is Untrusted Quote login.yahoo.com uses an invalid security certificate. Also, soon after this same time, Comodo firewall notified me of an intrusion attempt from another PC and asked whether or not to trust this. I clicked block. Note; I've working out of town and have been staying at a hotel for ~ 5 weeks using their WIRELESS AP. (There are several 802.11g wireless AP's in this area - 4 truck stops & 6 motel/hotels). I have seen this Comodo firewall WARNING a few TIMES lately and always clicked block. Why is this happening? What should I do? |
|
| 1716. |
Solve : can a router get a virus? |
|
Answer» a young man who is supposedly computer savvy says that my computer router has a virus and its in my ethernet? Is this possible? How do i fix it? do i replace my ethernet adapter or my router to get rid of it? VERY CONFUSEDRouters can get viruses, they are removed by doing a factory RESET, and they are avoided by choosing and setting a strong password. But you need to be sure if you have a virus that the the infection is not SOMEWHERE else. Since routers have no hard drive they can't get viruses but they can get hacked but a simple resets cures that problem. It is definitely not true that because routers "have no hard drive" they can't get viruses. Routers CERTAINLY can get viruses; they usually run a VERSION of Linux in RAM, loaded from ROM, and they can get infected. The Chuck Norris virus attacks Linksys and D-Link routers. Another one is called Psyb0t. Just two off the top of my head. |
|
| 1717. |
Solve : Need help - Trojan\Malware problem!!!? |
|
Answer» [emailprotected] as CAB hook log: OnlineScanner.ocx - registred OK # version=7 # iexplore.exe=8.00.6001.18702 (longhorn_ie8_rtm(wmbla).090308-0339) # OnlineScanner.ocx=1.0.0.6211 # api_version=3.0.2 # EOSSerial=4d93653df50dcc49bc84baf67238bd9b # end=finished # remove_checked=true # archives_checked=true # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2010-10-16 02:32:15 # local_time=2010-10-15 10:32:15 (-0500, Eastern Daylight Time) # country="United States" # lang=1033 # osver=5.1.2600 NT Service Pack 2 # compatibility_mode=512 16777215 100 0 1652886 1652886 0 0 # compatibility_mode=1279 16777215 0 0 0 0 0 0 # compatibility_mode=2560 16777215 100 0 0 0 0 0 # compatibility_mode=8192 67108863 100 0 0 0 0 0 # scanned=53458 # found=912 # cleaned=907 # scan_time=5500 C:\38fd4a0c5ae793fe57\i386\filterpipelineprintproc.dllWin32/Ramnit.A virus (error while cleaning)00000000000000000000000000000000I C:\38fd4a0c5ae793fe57\i386\mxdwdrv.dllWin32/Ramnit.A virus (error while cleaning)00000000000000000000000000000000I C:\38fd4a0c5ae793fe57\i386\xpssvcs.dllWin32/Ramnit.A virus (error while cleaning)00000000000000000000000000000000I C:\Commy\NircmdBSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Commy10898C\NircmdBSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Commy18057C\NircmdBSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Commy2756C\NircmdBSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Commy9393C\NircmdBSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Compaq\CPQInet\CPQInet.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\CPQInet\CPQNPCSS.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\CPQInet\Hwswal.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\CPQInet\INETSVCS.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\CPQInet\LchApp.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\CPQInet\nzLaunch.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\CPQInet\Stat.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\CPQInet\trcknlog.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\EAKDRV\EAUSBKBD.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\default.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\About My PC-About My PC.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\About My PC-Easy Access Design.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\About My PC-Featured Software.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\About My PC-Smartcard Keyboard Overview.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\Compaq Help & Support-Compaq Help & Support.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\Compaq Help & Support-On-Line Help & Support.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\Compaq Help & Support-Preventative Care & Maintenance.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\Getting Started With My PC-Games.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\Getting Started With My PC-Getting Started With My PC.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\Getting Started With My PC-Home Networking.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\Getting Started With My PC-Music.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\Getting Started With My PC-Photo.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\Getting Started With My PC-Surf the Net.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\Getting Started With My PC-Video.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\Features\Pages\MainPromotion.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\Introreg.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\ISUninst.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\SkyDesk.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\SystemOS.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\WizHost.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\WizMsg.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\WizWom.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\WRegXfer.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\html\NaEnglish\cpqExit.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\html\NaEnglish\errNet.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\html\NaFrench\cpqExit.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Compaq\lutil\html\NaFrench\errNet.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\AUDIO\ADMINCHK.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\AUDIO\INSTALL.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\AUDIO\PROPS32.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\AUDIO\REMOVE.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\KEYBOARD\EAKINSTA.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\KEYBOARD\SETUPEAK.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\keyboardbuttons\EAKInstall.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\keyboardbuttons\SetupEAKDLL.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\QuickenInstall\QWNUE01N1D\CUSTOM\PROGRAM\LICENSE.HTMWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\QuickenInstall\QWNUE01N1D\tools\SANITIZE.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\HCCUTILS.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\HKCMD.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\I81XGDEV.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\I81XGICD.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\IGFXCFG.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\IGFXDEV.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\IGFXDIAG.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\IGFXDO.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\IGFXEUD.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\IGFXHK.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\IGFXPPH.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\IGFXSRVC.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQDRV\VIDEO\IGFXTRAY.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\QUICKSR\CHECKCNF.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\QUICKSR\FASTBOOT.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\QUICKSR\PATCHES.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\QUICKSR\QRIA.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\QUICKSR\RMKEYS.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\CkcUpgrade.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\CpqStartMenu.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\CustomerRegInfo.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\EDID.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\Mailer.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\MemUsage.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\Migrate.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\ModemCheck.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\ModemQuery.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\ModemUtil.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\PCTSCOM.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\ScDmi.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\SCDrivers.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\SCInfoBom.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\SCOS.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\SCPartNumber.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\scom\srmclean .exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\CPQS\TOOLS\UNZIP.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\All Users\Application Data\Adobe\Reader\9.3\ARM\27816\ReaderUpdaterSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\All Users\Application Data\Skype\Plugins\Plugins\F57B48ADF2224F088EDD1A2B9BAD84E8\PickGame.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\All Users\Desktop\ABC.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\All Users\Desktop\Disney Online.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\All Users\Desktop\ESPN.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Default User\Local Settings\Temp\~rnsetu0\pncrt.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Default User\Local Settings\Temp\~rnsetup\pncrt.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Default User\Start Menu\Programs\Startup\fyfuk.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Default User\Start Menu\Programs\Startup\maqa.exea variant of Win32/Kryptik.GZJ trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Default User\Start Menu\Programs\Startup\qorya.exea variant of Win32/Kryptik.HLM trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Application Data\Asbece\onmuo.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Application Data\Asbece\onmuoSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Application Data\Mozilla\Firefox\Profiles\5tbeccz1.default\bookmarks.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Application Data\Noilab\budi.exea variant of Win32/Kryptik.HLM trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Application Data\Sun\Java\Deployment\SystemCache\6.0\4\7ec4bf04-7c91b2a5-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-47f9ff1d-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-34777ea4-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Local Settings\temp\tmp0a538d8d\kill.exeWin32/Delf.PLO trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Local Settings\temp\tmp0a538d8d\killSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\BTZLGCQF\bnews-pro[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\BTZLGCQF\Sync[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\Q6FKH05K\Include[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\Q6FKH05K\online-scanner[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\Q6FKH05K\Toolbar[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\Q6FKH05K\topic,110296.msg747598[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\QMN5LQ90\favicon[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Start Menu\Programs\Startup\idlatoSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Freddex\Start Menu\Programs\Startup\pypaSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Guest\Start Menu\Programs\Startup\ammo.exea variant of Win32/Kryptik.HLM trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Guest\Start Menu\Programs\Startup\faopew.exea variant of Win32/Kryptik.GZJ trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\Guest\Start Menu\Programs\Startup\peyw.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Application Data\Fako\anuq.exea variant of Win32/Kryptik.GZJ trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Application Data\Mozilla\Firefox\Profiles\3mmgr645.default\bookmarks.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Application Data\Sun\Java\Deployment\SystemCache\6.0\4\7ec4bf04-61f91632-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-367bd4db-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-501e625d-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Application Data\Ysulne\emxy.exea variant of Win32/Kryptik.GZJ trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Desktop\RkU3.8.388.590\MustBeRandomlyNamed\f2o4rDaewo.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Desktop\SysProt\SysProt\SysProt.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\133101-2nd-car;-forester-vs-outback-need-more-space-than-wrx-i-am-keeping[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\140158-how-possible-moto-content[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\1489-canadian-survey[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\2009[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\25752-has-anybody-received-2011-outback-brought-back-canada[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\2592[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\2592[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\2592[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\74912-wrx-leather-interior-2[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\92953-importing-guide-18[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\aclk[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\aclk[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\aclk[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA190CEE.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA2B7GL2.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA5FAORT.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA5QNWMW.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA5RH878.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA64CVIN.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA6BXCLG.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA6LYC8U.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA7HMI6U.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCABDT41O.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCABPNP5D.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCACDEBN9.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCACMNYTH.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAI088XH.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAKFATBL.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAOXGUHL.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAP6EV8V.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCARMX88R.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAV6X39L.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAVXYYB2.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAXMM9P5.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[10].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[11].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[5].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[6].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[7].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[8].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[9].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\basketball_fantasysports_yahoo_com[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\blank[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\board,7.0[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\clk[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\clk[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\data_sync[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\emailleague[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\facebook_share[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\forums[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\gameinfo[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\index[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\login[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\net[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\openmail.app[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\openmail.app[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\topic,110296.msg747408[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\topic,46313.0[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\topicseen[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\toronto-subaru-club_com[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\tpp4[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\watch-toronto-raptors-vs-boston-celtics[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\_;ord=0[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\105395-van-bortel-customer-appreciation-us-importing-info-session[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\115140[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\134546-rollin-3-6r-2[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\138009-worst-stone-chip-ever-pride-car-slowly-fading[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\139887-need-some-help-buying-subaru[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\140205-new-car-forrester-vs-few-others[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\2010[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\22870-buying-new-outback-importing-canada-2[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\22870-buying-new-outback-importing-canada[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\2397357[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\2592[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\2592[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\30670[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\aclk[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\aclk[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\aclk[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\aclk[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\aclk[5].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA1R1UVJ.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA24EQPT.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA5IQRVB.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA77ICYR.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA77YYQL.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA7UUN87.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA8EWYSO.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA8PZZL1.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAB29OKH.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAEYSWV9.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAFGJMMT.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAGF39WM.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAHE9Z9X.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAHXR1OT.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAIZ4HT8.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAJ15FW6.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAMUW5BX.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAN8LHXQ.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCANY2TMW.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAOR74EY.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAP44NVU.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAQ1EAKK.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAQ3QCMP.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAUOFASA.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAW2UN2N.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAWVN5Y7.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAWZTDNQ.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAZR1QD8.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[10].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[11].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[5].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[6].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[7].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[8].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[9].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\blank[2].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\blank[4].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\blank[5].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\button[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\button[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ca_yahoo_com[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\commishhome[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\emailleagueca54c271[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\facebook_share[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\fc[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ga_event_frame[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\gdyn_nba[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\index[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\index[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\index[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\json[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\login[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\net[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\peninsula-imported-cars-ltd-oakville-peninsulaimportedcarsltd[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\raptors[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\rosters[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\sda2[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\search[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\social[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\teams[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\teams[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\watch-toronto-raptors-vs-boston-celtics[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\WebPage[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\WebPage[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\_;ord=0[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\134546-rollin-3-6r[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\140205-new-car-forrester-vs-few-others-2[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\140205-new-car-forrester-vs-few-others-4[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\20379-subaru-canada-specifies-terra-clean-48k-km-my2010[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\2592[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\2592[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\2592[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\2592[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\2[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\aclk[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\aclk[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\aclk[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\aclk[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA0UIVWJ.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA192S6X.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA1PQ3IL.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA1QFV03.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA4EAORQ.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA5FF1L5.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA62X8RK.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA80O2I4.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA9RP5W3.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCABXFY3T.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCACE2F0T.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCACM745B.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCACREXT7.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAD688SR.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAFJU59V.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAFL7QNN.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAG8T3XD.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAGCFLXY.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAI1NEKP.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAM1W0SB.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCANTPP5N.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAONBG47.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAP3ZNAH.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAR04GFF.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCASJ5SVL.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCATDVCTR.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAV9Q4GC.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAWDAGZN.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAWHFU2T.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAY6ABO7.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[10].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[11].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[5].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[6].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[7].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[8].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[9].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\dealerlisting[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\dealerlisting[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\editstatcategories[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\fc[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\gdyn_nba[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\general-technical-discussion[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\index[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\index[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\index[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\international-customers[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\invitefriends23fabd99[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C C:\Documents and Settings\sey administrator\Local Settings\TeIt's just as I thought. The infections are multiplying. You better save your data before the computer crashes.Great! Looks like I'll be wiping my drive clean. Well thanks for all your help and time spent Dave! FredI forgot to add this advice in the last post. Good Luck! Backing up files before formatting If you backup any files they should be scanned from a clean PROPERLY protected PC before restoring. Also be careful what scanner is used as some are very poor at detecting and even WORSE at protecting from this infection. In fact due to the nature of these new infections there are probably no tools that will properly protect you from the infection. Be very selective and only backup files you can not replace like text documents and personal photos. Do not back up to another machine! It will likely become infected by Virut. Burn to DVD/CD, a flash drive or to an external drive which has nothing else on it and which you can format should it become infected from the backups. I SUGGEST running at least 3 of the below scanners on the backup files. Run the first scan then reboot before running the second then reboot after the second before running the THIRD. -) Dr.Web CureIt! -) AVG Win32/Virut Removal Tool -) Symantwc W32.Virut Removal Tool -) McAfee Avert Stinger -) Microsoft Windows Malicious Software Removal Tool If you do not know how to perform a fresh install, use this website -> www.windowsreinstall.com/ |
|
| 1718. |
Solve : Microsoft Phone computer virus scam? |
|
Answer» YESTERDAY my father received a phone call. The man on the line said they were a Microsoft representative. They told him that he had a virus and to follow their procedures, they GAINED remote ACCESS to his computer. I'm am going over to his HOUSE later this afternoon, and am wondering how to turn the remote access off? Luckily he didn't give them his credit card INFO. Hopefully they didn't steal all his info off his computer. I will run scans later and post them. Quote from: johngeo on October 09, 2010, 09:32:46 AM Yesterday my father received a phone call. The man on the line said they were a Microsoft representative. They told him that he had a virus and to follow their procedures, they gained remote access to his computer. I'm am going over to his house later this afternoon, and am wondering how to turn the remote access off? Ok sure yeah. Im Pretty sure that MS wouldnt track your computer for viruses. Thats invading Privacy. If they can see viruses they could see everything. Scam. |
|
| 1719. |
Solve : Not sure what is going on? |
|
Answer» Here is the eset results: Java(TM) 6 Update 15 On a last note, I see you had a few outdated stuff LISTED earlier. You should update to LATEST versions if you have not done so to keep your computer up to date and secured. |
|
| 1720. |
Solve : RamnitB and Exedropper infection? |
|
Answer» I am having PROBLEMS with these two horrible things. I have now done everything asked of me in topic 46313.0 loading the various bits of software and attaching the logs. I am hoping someone can help me remove these vriruses as a no of apps now won't run eg. Nero. I get errors on PaperPort (ISscript.msi) casefoundation.dll, pptd40nt.exe, xdocparse.dll and indexsearch.exe at startup. Whenever a system has been compromised by a backdoor payload, it is impossible to KNOW if or how much the backdoor has been used to affect your system...There are only a few ways to return a compromised system to a confident security configuration. These include:Backdoors and What They Mean to You This is what Jesper M. Johansson at Microsoft TechNet has to say: Help: I Got Hacked. Now What Do I Do? Quote The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications). Important Note:: If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to to include those used for banking, email, eBay, paypal and any online activities which require a username and password. You should consider them to be compromised. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach. Failure to notify your financial institution and local law enforcement can result in refusal to reimburse funds lost due to fraud or similar criminal activity. ************************************ Backing up files before formatting If you backup any files they should be scanned from a clean properly protected PC before restoring. Also be careful what scanner is used as some are very poor at detecting and even worse at protecting from this infection. In fact due to the nature of these new infections there are probably no TOOLS that will properly protect you from the infection. Be very selective and only backup files you can not replace like text documents and personal photos. Do not back up to another machine! It will likely become infected by Ramnit A. Burn to DVD/CD, a flash drive or to an external drive which has nothing else on it and which you can format should it become infected from the backups. I suggest running at least 3 of the below scanners on the backup files. Run the first scan then reboot before running the second then reboot after the second before running the third. -) Dr.Web CureIt! -) AVG Win32/Virut Removal Tool -) Symantwc W32.Virut Removal Tool -) McAfee Avert Stinger -) Microsoft Windows Malicious Software Removal Tool SuperDave, Thanks (I think...). You mention RamnitA specifically. Mine is B does it make no difference? Am I still dead? NigelQuote You mention RamnitA specifically. Mine is B does it make no difference? Am I still dead?No difference. They're both dangerous. You could try downloading MSE and running a scan but I doubt it will help much. Ramnit.B Microsoft Security Essentials for Windows Vista\Windows 7 - 64 bit Download Microsoft Security Essentials for Windows XP * Go to Start > Run and type mrt.exe then press Enter on the keyboard). * (Vista and Windows 7 users go to Start and type mrt.exe in the search box then press Enter on the keyboard. * Click Next. * Choose Full Scan and click Next. * Once the scan is finished click View detailed results of the scan. Look through the list and let me know if anything was found infected. |
|
| 1721. |
Solve : Virus infection/malware/spyware? |
|
Answer» I am currently trying to remove some sort of an INFECTION from a computer. |
|
| 1722. |
Solve : MSE & MRT? |
|
Answer» I read somewhere that microsoft malicious removal tool has the same scanning ENGINE that microsoft security essentials has. Is this true? If so, would running a complete scan using MRT be the same as running a complete scan using MSE?I think I read somewhere it uses a "SUBSET" of the larger scanning engine that MSE has. I wonder what specifically it targets?Grrr, nope. It's not the same. I just RAN MRT in PE on a computer with 0 results, and a2 command line scanner in PE with only one low RISK virus (wimad). After all of that I hooked the HDD up to another PC, ran MSE and now MSE is finding stuff. Back to the drawing board. |
|
| 1723. |
Solve : how do I remove a virus/spyware? |
|
Answer» here is the mbam LOG. I have been running this daily and have not found anything since the first running. |
|
| 1724. |
Solve : Infected or something...no one knows and it has returned.? |
|
Answer» I ran the 3 scans. |
|
| 1725. |
Solve : Hijackthis log file please help.? |
|
Answer» SD, I'm almost positive someone from here reccommended a site that sold memory and actually did the scan on your computer to tell one which one you needed and how much you can hold. Does that ring a bell? It was a while ago for me and a totally other PC.Sorry. Just start a thread in here and someone will tell you what you will need.Quote from: MP1975 on October 05, 2010, 02:51:54 PM ...I'm almost positive someone from here reccommended a site that sold memory and actually did the scan on your computer to tell one which one you needed and how much you can hold. Does that ring a bell? It was a while ago for me and a totally other PC...www.crucial.com BTW, Crucial is the "memory store" for Micron Technology, who makes the memory chips. |
|
| 1726. |
Solve : MSE service locked? |
|
Answer» Hi All |
|
| 1727. |
Solve : after using kaspersky computer won't boot? |
|
Answer» Ok so since I cleared cookies, Google seems to be doing better and it hasn't had that search lately |
|
| 1728. |
Solve : Computer runs slow randomly? |
|
Answer» Quote Just out of CURIOSITY was there much wrong with my computer?Just the usual AMOUNT of crap that's going around these DAYS. Nothing too serious. Quote Okay, thanks very much SuperDave.You're WELCOME. I will lock this thread. If you need it re-opened, please SEND me a pm. |
|
| 1729. |
Solve : Mobile Virus Removal? |
|
Answer» Are there any specific tools I can run from a thumb-drive in order to remove spyware/malware from a LAPTOP without connecting to the internet...? |
|
| 1730. |
Solve : Persistant Multi-Symptom Malware? |
|
Answer» Its running great! Out of curiosity just what exactly did my computer have, and what could it have been doing with a gig or so of ram?I do not want to discuss that in an open forum except to say it was some malware. Let's do some cleanup. To uninstall ComboFix
(Note: Make sure there's a space between the word ComboFix and the forward-slash.)
Clean out your temporary internet files and temp files. Download TFC by OldTimer to your desktop. Double-click TFC.exe to run it. Note: If you are running on Vista, right-click on the file and choose Run As Administrator TFC will close all programs when run, so make sure you have saved all your work before you begin. * Click the Start button to begin the cleaning process. * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or TWO. * Please let TFC run uninterrupted until it is finished. Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning. ***************************************************** Use the Secunia Software Inspector to check for out of date software. •Click Start Now •Check the box next to Enable thorough system inspection. •Click Start •Allow the scan to finish and scroll down to see if any UPDATES are needed. •Update anything listed. . ---------- Go to Microsoft Windows Update and get all critical updates. ---------- I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free. SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers LIKE Firefox. * Using SpywareBlaster to protect your computer from Spyware and Malware * If you don't know what ActiveX controls are, see here Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future. Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly. Safe Surfing! Thank you for taking the time to hunt down the malware on my computer. I have followed the instructions in your last post and will be vigilant about keeping my programs (java in particular) up to date. |
|
| 1731. |
Solve : Blue Screen If I press the wireless button on my Laptop-Hardware Issue or Virus?? |
|
Answer» Hi, Yes Sorry Dave. Blue screen in safe mode as wellDid you try doing a Repair from the Recovery Console?How do i go about doing that? Attached is my blue screen AFTER I turn on the Wireless [year+ old attachment deleted by admin]Could you please try running BlueScreenViewer again?I did Dave and it still says zero crashes. Isn't that just bizarre?The next time it bluescreens could you try to get a screenprint? I can't make out any details from that picture. How to post screenshots or images Your comment has been removed. Please do not post malware advice, or post here in the malware forum, UNLESS you need help. If you want to help, please go here. Superdave. |
|
| 1732. |
Solve : Free malware removal programs - help?? |
|
Answer» I'm at a friend's house for the next 2 days and she wants me to fix her computer. She says she got the PC as payment in return for a construction job on someone's house a couple years ago, and the computer has been freezing up with a BSOD when she or her kids use it to go online. I'm in school learning to be a computer tech, I'm on summer vacation, I have no job (yet) but I'm looking for my hands-on experience in PC tech stuff. 2) I would not try to clean the system of malware, I'd install from scratch. That's what I tried to do - boot from the windows CD, but immediately after the stuff from the CD was loaded into RAM, but before it got to the Windows installation (the windows setup program) it gave me a BSOD 0x0000007B stop error.Here's some information about that error. Please download aswMBR.exe ( 511KB ) to your desktop. Double click the aswMBR.exe to run it Click the "Scan" button to START scan Note: Do not take action against any **Rootkit** entries until I have reviewed the log. Often there are false positives On completion of the scan click save log, save it to your desktop and post in your next reply **********************************************************
Thanks, SuperDave - I fixed the problem by getting into the BIOS, changing it from ACHI to IDE and the computer got into the XP setup screen, from where I deleted the existing partition, and installed XP. Now I would like to get this friend some free malware scanner/removal programs that do not require her to pay a fee every month/year and give her all the protection she needs - can you help?Remember to only install one antivirus! I'm very happy with MSE. 1) Avast! Home Edition 2) AVG Free Edition 3) Avira AntiVir Personal 4) Microsoft Security Essentials for Windows Vista\Windows 7 - 64 bit Download 4-a) Microsoft Security Essentials for Windows XP 5) Comodo Antivirus (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" if you choose this one) 6) PC Tools AntiVirus Free Edition 7) ThreatFire It is strongly recommended that you run only one antivirus program at a time. Having more than one antivirus program active in memory uses additional resources and can result in program conflicts and false virus alerts. If you choose to install more than one antivirus program on your computer, then only one of them should be active in memory at a time. **************************************************** Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors. Remember only install ONE firewall 1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one) 2) Online Armor 3) Agnitum Outpost 4) PC Tools Firewall Plus If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time. ***************************************************** Malwarebytes' Anti-Malware (MBAM) If you already have Malwarebytes be sure to check for updates before scanning! Download Malwarebytes Anti-Malware and save it to your desktop. Alternate download link •Double-click mbam-setup.exe and follow the prompts to install the program. •Be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish. •If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. •If an update is found, it will download and install the latest version. •Once the program has loaded, select Perform Quick Scan, then click Scan. •When the scan is complete, click OK, then Show Results to view the results. •Be sure that everything is checked, and click Remove Selected. •When completed, a log will open in NOTEPAD. Save it to a convenient location like the Desktop. •The log is also automatically saved and can be viewed later by clicking the Logs tab in MBAM. •Exit MBAM. . Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will PREVENT MBAM from removing all the malware. ************************************************************ SUPERAntiSpyware If you already have SUPERAntiSpyware be sure to check for updates before scanning! Download SuperAntispyware Free Edition (SAS) * Double-click the icon on your desktop to run the installer. * When asked to Update the program definitions, click Yes * If you encounter any problems while downloading the updates, manually download and unzip them from here * Next click the Preferences button. •Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts * Click the Scanning Control tab. * Under Scanner Options make sure only the following are checked: •Close browsers before scanning •Scan for tracking cookies •Terminate memory threats before quarantining •Please leave the others unchecked •Click the Close button to leave the control center screen. * On the main screen click Scan your computer * On the left check the box for the drive you are scanning. * On the right choose Perform Complete Scan * Click Next to start the scan. Please be patient while it scans your computer. * After the scan is complete a summary box will appear. Click OK * Make sure everything in the white box has a check next to it, then click Next * It will QUARANTINE what it found and if it asks if you want to reboot, click Yes •To retrieve the removal information please do the following: •After reboot, double-click the SUPERAntiSpyware icon on your desktop. •Click Preferences. Click the Statistics/Logs tab. •Under Scanner Logs, double-click SUPERAntiSpyware Scan Log. •It will open in your default text editor (preferably Notepad). •Save the notepad file to your desktop by clicking (in notepad) File > Save As... * Save the log somewhere you can easily find it. (normally the desktop) * Click close and close again to exit the program. *Copy and Paste the log in your post. *************************************************** SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox. * Using SpywareBlaster to protect your computer from Spyware and Malware * If you don't know what ActiveX controls are, see here Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future. |
|
| 1733. |
Solve : Very Stubborn Virus; Seems to be Google Redirect Virus.? |
|
Answer» It appears your system is infected with a rootkit. A rootkit is a powerful piece of malware, that allows hackers full control over your computer for means of sending attacks over the Internet, or using your computer to generate revenue. |
|
| 1734. |
Solve : Malware on Ebay.. Please help!? |
|
Answer» hi, |
|
| 1735. |
Solve : cannot use search engines such as google? |
|
Answer» I have problems accessing google and yahoo search engines which I assume is a virus. The relevant logs are attached.
Important: Close all open windows except for HijackThis and then click Fix checked. Once completed, exit HijackThis. ---------- Download HostsXpert[/B][/COLOR] and then follow the below steps. * Unzip HostXpert to your desktop. * Open up the HostXpert program. * Make sure that the "Make Hosts Writable?" button in the upper left corner is enabled (unlocked). * Click Create Back Up. * Then click on Restore Microsoft's Host Files. * Close the HostXpert program. Note: if you use SpywareBlaster, Spybot and/or IE-SPYAD, it will be necessary to re-install the protection they afford. For SpywareBlaster, run the program and select Enable all protection. For Spybot run the program and select Immunize. For IE-SPYAD, run the batch file and reinstall the protection. ---------- If you already have ComboFix be sure to delete it and download a new copy. Download ComboFix© by sUBs from one of the below links. Be sure top save it to the Desktop. Link #1 Link #2 **Note: It is important that it is saved directly to your Desktop Close any open Web browsers. (Firefox, Internet Explorer, etc) before starting ComboFix. Temporarily disable your antivirus and any antispyware real time protection before PERFORMING a scan. Click this link to see a LIST of security programs that should be disabled and how to disable them. Double click combofix.exe & follow the prompts. Vista users Right-Click on ComboFix.exe and select Run as administrator (you will receive a UAC prompt, please allow it) When finished ComboFix will produce a log for you. Post the ComboFix log in your next reply. Important: Do not mouseclick ComboFix's window while it is running. That may cause it to stall. Remember to re-enable your antivirus and antispyware protection when ComboFix is complete. If you have problems with ComboFix usage, see How to use ComboFixThanks for this advice. I am having trouble trying to enable 'Make Hosts Writable?' with HostXpert. I click okay on the two prompts to remove the systems file and hidden file attributes, but it then locks the button as read only - that is, the button simply says 'Make Writable?' but when clicked it will not change.Download OTL to your desktop. * Open OTL * Copy and Paste the following text in the codebox into the Custom Scans/Fixes window. Code: [Select]:OTL :Services :Reg :Files C:\Program Files\Ask.com :COMMANDS [resethosts] [purity] [emptytemp] [start explorer] * Click Run Fix * OTLI2 may ask to reboot the machine. Please do so if asked. * Click OK * A report will open. Copy and Paste that report in your next reply. Thanks again. Attached is the log from combofix. [Saving space, attachment deleted by admin]That's only the top part of the log. Did you remove some of it? Run it again if needed. I need the entire log.Sorry here is the entire log. Last time the system rebooted midway through obtaining the log. [Saving space, attachment deleted by admin]Thank you. * Click START then RUN - Vista users press the Windows Key and the R keys for the Run box. * Now type Combofix /Uninstall in the runbox * Make sure there's a space between Combofix and /Uninstall * Then hit Enter * The above procedure will: * Delete the following: * ComboFix and its associated files and folders. * Reset the clock settings. * Hide file extensions, if required. * Hide System/Hidden files, if required. * Set a new, clean Restore Point. ---------- Clean out your temporary internet files and temp files. Download TFC by OldTimer to your desktop. Double-click TFC.exe to run it. Note: If you are running on Vista, right-click on the file and choose Run As Administrator TFC will close all programs when run, so make sure you have saved all your work before you begin. * Click the Start button to begin the cleaning process. * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two. * Please let TFC run uninterrupted until it is finished. Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning. ---------- ESET Online Scan Scan your computer with the ESET FREE Online Virus Scan * Click the ESET Online Scanner button. * For alternate browsers only: (Microsoft Internet Explorer users can SKIP these steps) * Click on the esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop * Double click on the esetsmartinstaller_enu.exe icon on your desktop. * Place a check mark next to YES, I accept the Terms of Use. * Click the Start button. * Accept any security warnings from your browser. * Leave the check mark next to Remove found threats and place a check next to Scan archives. * Click the Start button. * ESET will then download updates, install, and begin scanning your computer. Please be patient as this can take some time. * When the scan completes, click List of found threats. * Next click Export to text file and save the file to your desktop using a name such as ESETScan. Include the contents of this report in your next reply. * Click the <<Back button then click Finish. In your next reply please include the ESET Online Scan LogThanks. Attached is the eset log. [Saving space, attachment deleted by admin]If there are no more malware issues we can finish up now. Use the Secunia Software Inspector to check for out of date software.
---------- Go to Microsoft Windows Update and get all critical updates. ---------- I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, IDENTITY theft, spyware, spam, viruses and unreliable shopping sites. WOT WARNS you before you interact with a risky website. It's easy and it's free. SpywareBlaster - Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox. * Using SpywareBlaster to protect your computer from Spyware and Malware * If you don't know what ActiveX controls are, see here Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future. Also see Slow Computer? It May Not Be Malware for free cleaning/maintenance tools to help keep your computer running smooth. |
|
| 1736. |
Solve : Still Infected after following the first thread? |
|
Answer» OK here we go.
---------- Go to Microsoft Windows Update and get all critical updates. ---------- I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free. SpywareBlaster - Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox. * Using SpywareBlaster to protect your computer from Spyware and Malware * If you don't know what ActiveX controls are, see here Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. GUIDE: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future. Also see Slow Computer? It May Not Be Malware for free cleaning/maintenance tools to help keep your computer running smooth. I ran Kaspersky Online again and my pc came up clean...what a relief...Again thank you for your help evilfantasy...Sounds good. safe surfing... |
|
| 1737. |
Solve : Windows XP Home Edition help me!!? |
|
Answer» My desktop has started to do the following: |
|
| 1738. |
Solve : Serious malware infection - "your system is infected!"- No internet or safe mode? |
|
Answer» Don't transfer any files....you said in reply#2 that AVG detected Virut.....you will infect another PC if you're not careful. better to not take the risk and just wait for guidanceBy the way i just found out that the blue screen contains this : STOP 0x00000024 Doesnt that sound like a corrupted ntfs disk? I am not sure but from experience whenever someone had an error like that it had to do with the ntfs.sys files or with a corrupted ntfs disk. However i dont get anything about ntfs.sys but i do get a zqbuetaxgkdt5.sys file?Hi any updates on my case?Hi again guys. I searched around and found a backup i made that contains some of my data, or the ones i really need so i decided to go ahead and reformat and have a clean installation of windows xp. I dont have any more time to waste trying to get this fixed. I know that with just a bit more patience i could fix a part of the problem with your guidance but i cant do it anymore. Most of the times a pc got infected with any kind of virus/malware/spyware e.t.c i could have it up and running in less than a day even if the infection was persistent. This is something else! Anyway THANK you so much for your advice and guidance, thank you karnac, thank you harry and thank you SD fro replying and trying to help me with this issue i really appreciate it and will come back in the future if anything happens. C ya!Back again! So soon! I just want to ask you guys, i know everyone has a different opinion on these kind of questions but just to have an idea, i am really considering on buying Antivirus Software for my new Installation. Which one would you advice me to choose? I used to have free Antivirus but from what i heard everyone is happy with Bit Defender products. Is it TRUE? Should i just stick to the free ones for the moment? Thanks!Hello Sander. Sorry for the delay. I did some research about your stop error and found this link: http://cc.bingj.com/cache.aspx?q=stop+0x00000024&d=4772632121901875&mkt=en-CA&setlang=en-US&w=e360615c,d35fd91a I was going to suggest that you try to start your computer with your OS Cd and do a repair. It's too bad that you LOST your data. Hi SD! I did try to everything from my OS cd and from other cd's but nothing seemed to work. I tried recovery console, system restore e.t.c. Anyway, everything happens for a reason, this tought me to not surf around without any protection at all and download suspicious files!.Sander, I have to bring this to your attention in case it's overlooked. You had Virut on your pc. Read Evilfantasys' comments on this infection here Be certain to follow his instructions regarding banking and passwords. Sander. Some information to use after you re-format. Use the Secunia Software Inspector to check for out of date software. •Click Start Now •Check the box next to Enable thorough system inspection. •Click Start •Allow the scan to finish and scroll down to see if any updates are needed. •Update anything listed. . ---------- Go to Microsoft Windows Update and get all critical updates. ---------- I suggest using WOT - WEB of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free. SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox. * Using SpywareBlaster to protect your computer from Spyware and Malware * If you don't know what ActiveX controls are, see here Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future. Hi, Thank you for your advice. By the way is it a sure thing that virut might stole any of my credentials? cause i have so many passwords for so many sites. Where does it get it from? Cookies? saved passwords for web sites? Arent they ciphered-encrypted? I will change as many as i can however just for a precaution but is it really that bad? Thanks!Hi Sander. You don't have to buy any Anti-Virus programs if you don't want to. There are some free AV's that are just as GOOD or better than the paid versions. Here are links for some of them. Avast Home Edition AVG Free Edition AntiVir Personal Microsoft Security Essentials This last one by MS if relatively new and has some good reviews. I use Avast but I installed MSE on my laptop and it appears to be working wellcc |
|
| 1739. |
Solve : Need help with Web email sending spam to my contacts? |
|
Answer» Here's what's going on with my laptop: |
|
| 1740. |
Solve : HOW DO I UPGRADE BIOS? |
|
Answer» Thanks for viewing and my regards to your effort in reply. |
|
| 1741. |
Solve : Vista security 2012 virus? |
|
Answer» Ok. Let's try this one.
While this scan was running AVG popped up twice and said it found a few things and asked if I wanted to quarentine them or leave them be. I didn't think to write down the names of the files at the time but I just let them be since that scan was running. I'd like to scan your machine with ESET OnlineScan •Hold down Control and click on the following link to open ESET OnlineScan in a new window. ESET OnlineScan •Click the button. •For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
•Click the button. •Accept any security warnings from your browser. •Check •Push the Start button. •ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time. •When the scan completes, push •Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply. •Push the button. •Push A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt tried running this and it gets stuck in the Initialization process. I just stops and says "can not get update. Is proxy configured?"Ok. Please try this one. Run the BitDefender Online scanner Agree to the license and then select Scan. DO NOT CHANGE THE OPTIONS TO SHOW ALL FILES SCANNED. That will make your logs huge and we don't need to see clean files. Once Bitdefender completes the scan: Click-on the Detected Problems tab. Then select Click here to export the scan report. When the window comes up to save the report, change the Save as type: box to: Text (Tab Delimited) (*.txt) and then in the File name box enter change to bdscan then click Save. This will save a file named bdscan.txt. I would suggest saving it to the Desktop so you can easily find it. (take notice of where you save it so you can find it later). This bdcan.txt file will actually contain HTML code that we can easily view later while reviewing your log. All we have to do is rename the file to bdscan.html. If you do not follow these step, you will have an incorrect log or worse a log summary which is useless to us. Post the bdscan.txt file as an Attachment. Okay I clicked that link and I ran the quick scan however the instructions you gave me don't quite match what I saw. I never saw an option to to show all files scanned. After it ran it said it found 1 infected file. However I see no Detected Problems tab and I clicked on the link that said "Found 1 infected file" and it gave me the following log. So I don't know if this helps but that's all I got. QuickScan Beta 32-bit v0.9.9.99 ------------------------------- Scan date: Thu Aug 25 18:45:14 2011 Machine ID: C8CD3BCA Found 1 infected file! ---------------------- C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe --> Gen:Variant.Kates.2 --> HKLM\Software\Microsoft\Windows\CurrentVersion\Run\"SunJavaUpdateSched" Processes --------- AVG Internet Security 4360 C:\Program Files (x86)\AVG\AVG10\avgtray.exe AVG Internet Security 1396 C:\Program Files (x86)\AVG\AVG10\avgwdsvc.exe AVG Internet Security 3516 C:\Program Files (x86)\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSAgent.exe AVGIDSMonitor.exe 4844 C:\Program Files (x86)\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSMonitor.exe Bluetooth Stack for Windows by Toshiba 4880 C:\Program Files (x86)\Toshiba\Bluetooth Toshiba Stack\ItSecMng.exe ConfigFree 1256 C:\Program Files (x86)\Toshiba\ConfigFree\CFProcSRVC.exe ConfigFree(TM) 1852 C:\Program Files (x86)\Toshiba\ConfigFree\CFSvcs.exe ConfigFree(TM) 3016 C:\Program Files (x86)\Toshiba\ConfigFree\CFSwMgr.exe ConfigFree(TM) Tray 5076 C:\Program Files (x86)\Toshiba\ConfigFree\NDSTray.exe CyberLink MediaLibray Service 4276 C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\CLML\CLMLSvc.exe CyberLink PowerCinema 4252 C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\PCMAgent.exe Dropbox 4556 C:\Users\Amber\AppData\Roaming\Dropbox\bin\Dropbox.exe En-us 4504 C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe Flash® Player Installer/Uninstaller 4780 C:\Windows\SysWOW64\Macromed\Flash\FlashUtil10t_ActiveX.exe KeNotify Application 4136 C:\Program Files (x86)\Toshiba\Utilities\KeNotify.exe Microsoft Search Enhancement Pack 2312 C:\Program Files (x86)\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe Microsoft® Windows® Operating SYSTEM 3956 C:\Windows\SysWOW64\PING.EXE NVIDIA Update Components 5540 C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe OpenOffice.org 3.3 5060 C:\Program Files (x86)\OpenOffice.org 3\program\soffice.bin OpenOffice.org 3.3 4612 C:\Program Files (x86)\OpenOffice.org 3\program\soffice.exe pinger.exe 2220 C:\Toshiba\IVP\ISM\pinger.exe RAID Event Monitor 4240 C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAAnotif.exe RAID Monitor 2932 C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAANTmon.exe Spybot - Search & Destroy 3024 C:\Program Files (x86)\Spybot - Search & Destroy\SDWinSec.exe Stereo Vision Control Panel API Server 744 C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe swupdtmr.exe 2416 C:\Toshiba\IVP\swupdate\swupdtmr.exe TeaTimer.exe 4532 C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe TOSHIBA DVD Player 2452 C:\Program Files (x86)\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe Ulead Systems ULCDRSvr 2608 C:\Program Files (x86)\Common Files\Ulead Systems\DVD\ULCDRSvr.exe Windows® Internet Explorer 4012 C:\Program Files (x86)\Internet Explorer\iexplore.exe Windows® Internet Explorer 3776 C:\Program Files (x86)\Internet Explorer\iexplore.exe Windows® Internet Explorer 5068 C:\Program Files (x86)\Internet Explorer\iexplore.exe Windows® Internet Explorer 1712 C:\Program Files (x86)\Internet Explorer\iexplore.exe Windows® Internet Explorer 5668 C:\Program Files (x86)\Internet Explorer\iexplore.exe Network activity ---------------- Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.17.26 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.17.26 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 64.215.172.244 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 64.215.172.244 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 96.17.70.66 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.239.163 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.239.163 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.5.232 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.5.232 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.5.233 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.5.233 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 74.125.224.91 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 74.125.224.91 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 64.215.172.244 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.87.11 Process iexplore.exe (1712) connected on port 80 (HTTP) --> 69.72.169.241 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.17.26 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.17.26 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 64.215.172.244 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 64.215.172.244 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.87.131 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.239.163 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 96.17.70.11 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.239.163 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.239.163 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.239.163 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 64.215.172.237 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.232 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.232 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.232 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.233 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.233 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.233 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.87.59 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.87.140 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 74.125.224.91 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 74.125.224.91 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 74.125.224.155 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 74.125.224.155 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.87.130 Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.87.140 Process Dropbox.exe (4556) connected on port 80 (HTTP) --> 199.47.216.144 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.127.95 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.127.95 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.86.64.162 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.6.95.139 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 184.28.64.124 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 184.28.64.124 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.139 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.139 Process iexplore.exe (5068) connected on port 443 (HTTP over SSL) --> 74.125.53.96 Process iexplore.exe (5068) connected on port 443 (HTTP over SSL) --> 74.125.224.159 Process iexplore.exe (5068) connected on port 443 (HTTP over SSL) --> 74.125.224.159 Process iexplore.exe (5068) connected on port 443 (HTTP over SSL) --> 74.125.224.141 Process iexplore.exe (5068) connected on port 443 (HTTP over SSL) --> 74.125.224.141 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.136 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.53.96 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.153 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.153 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 69.171.228.39 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 69.171.228.39 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.19 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.19 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.19 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 66.132.220.193 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 199.68.156.31 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 199.68.156.83 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.114 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.114 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.114 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.114 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.114 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.127 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.127 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.36 Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.36 Process Dropbox.exe (4556) listens on ports: 17500 Autoruns and critical files --------------------------- HWSetup C:\Program Files\TOSHIBA\Utilities\HWSetup.exe AVG Internet Security C:\Program Files (x86)\AVG\AVG10\avgtray.exe Bluetooth Stack for Windows by Toshiba C:\Program Files (x86)\Toshiba\Bluetooth Toshiba Stack\ItSecMng.exe Chicony traybar C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe CyberLink MediaLibray Service C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\CLML\CLMLSvc.exe CyberLink PowerCinema C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\PCMAgent.exe Dropbox C:\Users\Amber\AppData\Roaming\Dropbox\bin\Dropbox.exe En-us C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe jusched.exe C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe KeNotify Application C:\Program Files (x86)\Toshiba\Utilities\KeNotify.exe Microsoft® Windows® Operating System c:\windows\system32\browseui.dll Microsoft® Windows® Operating System C:\Windows\system32\Mystify.scr quickstart.exe C:\Program Files (x86)\OpenOffice.org 3\program\quickstart.exe SVPWUTIL Application C:\Program Files (x86)\TOSHIBA\Utilities\SVPWUTIL.exe TeaTimer.exe C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe Windows Live Messenger C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe Windows® Internet Explorer c:\windows\syswow64\webcheck.dll (verified) Microsoft® Windows® Operating System c:\windows\system32\userinit.exe Browser plugins --------------- AcroIEHelper Library C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll AVG Internet Security c:\program files (x86)\avg\avg10\avgssie.dll Bing Bar c:\program files (x86)\msn toolbar\platform\6.3.2322.0\npwinext.dll BitDefender QuickScan C:\Windows\Downloaded Program Files\qsax.dll Conduit Toolbar c:\program files (x86)\conduitengine\conduitengine.dll Conduit Toolbar c:\program files (x86)\utorrentbar\tbutor.dll Java(TM) Platform SE 6 U26 C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll Java(TM) Platform SE 6 U26 C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll Microsoft Search Enhancement Pack c:\program files (x86)\microsoft\search enhancement pack\search helper\sepsearchhelperie.dll Microsoft® CoReXT C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll NVIDIA 3D Vision C:\Program Files (x86)\NVIDIA Corporation\3D Vision\npnv3dv.dll NVIDIA 3D VISION C:\Program Files (x86)\NVIDIA Corporation\3D Vision\npnv3dvstreaming.dll SDHelper.dll C:\Program Files (x86)\Spybot - Search & Destroy\SDHelper.dll Silverlight Plug-In c:\Program Files (x86)\Microsoft Silverlight\4.0.60531.0\npctrl.dll System REQUIREMENTS Lab C:\Windows\Downloaded Program Files\sysreqlab_nvd.dll Windows Live Messenger Companion c:\program files (x86)\windows live\companion\companioncore.dll Windows Live Photo Gallery C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll Windows Presentation Foundation c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll Windows® Internet Explorer c:\windows\syswow64\ieframe.dll (verified) Microsoft® Windows® Operating System C:\Windows\System32\mswsock.dll (verified) Microsoft® Windows® Operating System C:\Windows\system32\napinsp.dll (verified) Microsoft® Windows® Operating System C:\Windows\system32\NLAapi.dll (verified) Microsoft® Windows® Operating System C:\Windows\system32\pnrpnsp.dll (verified) Microsoft® Windows® Operating System C:\Windows\System32\winrnr.dll Missing files ------------- File not found: NDSTray.exe --> HKLM\Software\Microsoft\Windows\CurrentVersion\Run\"NDSTray.exe" Scan ---- MD5: de81240bd5476bb8aa2261349ab32ff8 C:\Program Files (x86)\AVG\AVG10\avgamnot.dll MD5: ac7e2d24a082bea90b3a884647fedff5 C:\Program Files (x86)\AVG\AVG10\avgcfgx.dll MD5: b01e5e3cfb0ce27cbef9011eb09a0a71 C:\Program Files (x86)\AVG\AVG10\avgcslx.dll MD5: 8f2e5f841df279c41fa011e8f2e945bc C:\Program Files (x86)\AVG\AVG10\avgidpsdkx.dll MD5: 199f9addb1c1e633169b9f6cb40d7724 C:\Program Files (x86)\AVG\AVG10\avglngx.dll MD5: 3fa61ef87e49fface4ed58c4f1a98eb1 C:\Program Files (x86)\AVG\AVG10\avglogx.dll MD5: e8efbf473a01ddcb363576fb4ccc40f8 C:\Program Files (x86)\AVG\AVG10\avgsched.dll MD5: 90f4c3d61c6722bb0962962dbc29ad7a C:\Program Files (x86)\AVG\AVG10\avgsrmx.dll MD5: 4109b81aedeed60102542554f4e69f10 c:\program files (x86)\avg\avg10\avgssie.dll MD5: 140f771cada8724200434c39918f2ea0 C:\Program Files (x86)\AVG\AVG10\avgtray.exe MD5: 61b12427ccbf5512e3439664c00d5fcd C:\Program Files (x86)\AVG\AVG10\avguires.dll MD5: f5d2494cee652b5d0d75ba5a77309b66 C:\Program Files (x86)\AVG\AVG10\avgwd.dll MD5: fc2bc51120a945f7c70376495e4e7737 C:\Program Files (x86)\AVG\AVG10\avgwdsvc.exe MD5: 80aec7987f4f315dc8b65fa1a42ff554 C:\Program Files (x86)\AVG\AVG10\avgwdwsc.dll MD5: 37dff4cee590b6d081efe18fb2c377db C:\Program Files (x86)\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSAgent.exe MD5: 350a0c2cc411a6b0982604c8893c3e93 C:\Program Files (x86)\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSMonitor.exe MD5: c11f6a1f61481e24be3fdc06ea6f7d2a C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll MD5: 25b1e852ff65f5400e2d0c965d01c3bf C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe MD5: 6bf01e200063d7274f3af06d226671f5 C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll MD5: da579734b4375740efee86ffdfed57a7 C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\wlidcli.dll MD5: 332d341d92b933600d41953b08360dfb C:\Program Files (x86)\Common Files\Ulead Systems\DVD\ULCDRSvr.exe MD5: d9a0ce26ada5bd15b1b03a752ddf14a6 c:\program files (x86)\conduitengine\conduitengine.dll MD5: 8755df630f5477ee1a3ccb00d0a3d0cd C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\CLML\CLMediaLibrary.dll MD5: 166d74046ce5d2b0696a335b8a8633e1 C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\CLML\CLMLSvc.exe MD5: d6b5c9dc1df4a8140bd2fc4bb26a5031 C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\CLML\CLMLSvcPS.dll MD5: b1cda377b2c8dcd8fa3db8501647031d C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\Common\CLRCEngine3.dll MD5: 9b271ead0ae5907eabc3a7be072c323e C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\PCMAgent.exe MD5: 0ecc0901aebcb6b5c5c551c67e4e026a C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAAMon_ENU.dll MD5: cb686f44bf955ea02520710a56874fa4 C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAANTmon.exe MD5: 974ee55b9a17d606a783add021aa65ad C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\ISDI.dll MD5: ac31c3fc0b28f54f4873c5136be525f8 C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\PlugInRAID_ENU.dll MD5: a1659e4d08fe8d0f0bc61960d8c0369e C:\Program Files (x86)\Internet Explorer\ieproxy.dll MD5: 7d8e146a863d62c8f88128a30872a18f C:\Program Files (x86)\Internet Explorer\IEShims.dll MD5: 904e13ba41af2e353a32cf351ca53639 C:\Program Files (x86)\Internet Explorer\iexplore.exe MD5: e7d55e121ff1951cb86c7e0dc6a33877 C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll MD5: 1040bd9bf3ddab7cda2346f8375480a2 C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll MD5: 74ca33b3daac6c4f1de9df67ff61b9ec c:\Program Files (x86)\Microsoft Silverlight\4.0.60531.0\agcore.dll MD5: c3e42cbf8215171a524d123a54ae3233 c:\Program Files (x86)\Microsoft Silverlight\4.0.60531.0\npctrl.dll MD5: 16a252022535b680046f6e34e136d378 C:\Program Files (x86)\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe MD5: a4ad1aa4c57409480c1d84bbca6becf0 c:\program files (x86)\microsoft\search enhancement pack\search helper\sepsearchhelperie.dll MD5: da7763dbf7d7679b52a3f1484fbd3fb7 c:\program files (x86)\msn toolbar\platform\6.3.2322.0\npwinext.dll MD5: cff7b34d91fcc4b05e61a8ebf5987b12 C:\Program Files (x86)\NVIDIA Corporation\3D Vision\npnv3dv.dll MD5: 7fea176d89ef2063128e6d906c9e1f11 C:\Program Files (x86)\NVIDIA Corporation\3D Vision\npnv3dvstreaming.dll MD5: 6086b60f2e36d06a063cb07ed0524332 C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe MD5: e7818cd4fb51284c948d68a7a85a69b8 C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe MD5: ccf523b951afaa0147f22e2a7aae4976 C:\Program Files (x86)\NXP\FM Radio\OpenLibSysX64.sys MD5: 9a62bcaa15bf7f2b289cc5a50fbdde49 C:\Program Files (x86)\OpenOffice.org 3\program\basegfxmi.dll MD5: 4b2f87de85b721ab4051443cf79a926f C:\Program Files (x86)\OpenOffice.org 3\program\comphelp4MSC.dll MD5: 42ed1f2f4cb5f25ea9aa608429f2e45a C:\Program Files (x86)\OpenOffice.org 3\program\configmgr.uno.dll MD5: 29467c0949f41a414918e1ebb371bec4 C:\Program Files (x86)\OpenOffice.org 3\program\deploymentmiscmi.dll MD5: 97a4c67dc092e7edeaf296bc80cdcffb C:\Program Files (x86)\OpenOffice.org 3\program\emsermi.dll MD5: c0bdeafdb1ceba29dc444ffb08fc4f4a C:\Program Files (x86)\OpenOffice.org 3\program\fwemi.dll MD5: 7a3371350068d50cd55a55ac7c109b41 C:\Program Files (x86)\OpenOffice.org 3\program\fwimi.dll MD5: 368ae415c04fc2ea99aa3e43b79319ee C:\Program Files (x86)\OpenOffice.org 3\program\fwkmi.dll MD5: d62b776209a6fe8a712f2b914bd696e3 C:\Program Files (x86)\OpenOffice.org 3\program\i18nisolang1MSC.dll MD5: 7147a3ad6f43c75e0737eb8396ce84ed C:\Program Files (x86)\OpenOffice.org 3\program\i18npapermi.dll MD5: 18d9bc9be65494bcc4b5c274dee681d5 C:\Program Files (x86)\OpenOffice.org 3\program\i18npool.uno.dll MD5: 33a73277383831bfee37c36cc7d7918a C:\Program Files (x86)\OpenOffice.org 3\program\i18nutilMSC.dll MD5: 9fd93f8c9e800a01dec03c0f985719bf C:\Program Files (x86)\OpenOffice.org 3\program\icudt40.dll MD5: 495e820cac608b05a76e14efaab92692 C:\Program Files (x86)\OpenOffice.org 3\program\icuin40.dll MD5: 5bdeb78f1c8f89e5820ea9df80a30beb C:\Program Files (x86)\OpenOffice.org 3\program\icuuc40.dll MD5: f85d55d1a0f08c098034899ff812c07a C:\Program Files (x86)\OpenOffice.org 3\program\libdb47.dll MD5: 59b11c7e3525c7222271e000ab33f694 C:\Program Files (x86)\OpenOffice.org 3\program\libxml2.dll MD5: 5b7fcc26067bad888870234c7abc74ad C:\Program Files (x86)\OpenOffice.org 3\program\localebe1.uno.dll MD5: eed8e244d73e86a05562b597d3559208 C:\Program Files (x86)\OpenOffice.org 3\program\oleautobridge.uno.dll MD5: 6d6df7fdf72e2f47140ddd5e56dbdaf4 C:\Program Files (x86)\OpenOffice.org 3\program\oooimprovementmi.dll MD5: f7dce54077ee9d8a351c4b1ffa866ee7 C:\Program Files (x86)\OpenOffice.org 3\program\quickstart.exe MD5: 7c27f5ad651035a99aa84ccf0f6e9b43 C:\Program Files (x86)\OpenOffice.org 3\program\saxmi.dll MD5: 007402c0a0f353ab297897cf42b8f151 C:\Program Files (x86)\OpenOffice.org 3\program\sbmi.dll MD5: ac0f6a47f9ad9788f9fc9ff86fe470d3 C:\Program Files (x86)\OpenOffice.org 3\program\sfxmi.dll MD5: 2337ec951c4af6e1af65d10bd9615beb C:\Program Files (x86)\OpenOffice.org 3\program\soffice.bin MD5: 11e8d8272fdbe213ade3dad91427ce35 C:\Program Files (x86)\OpenOffice.org 3\program\soffice.exe MD5: eec33ec9c51e95f2a0b3667513597566 C:\Program Files (x86)\OpenOffice.org 3\program\sofficeapp.dll MD5: 52d2d656a6c354c63c1d43cb97a84fcd C:\Program Files (x86)\OpenOffice.org 3\program\sotmi.dll MD5: 45e1212280f611c21b4de033d1d7c420 C:\Program Files (x86)\OpenOffice.org 3\program\svlmi.dll MD5: 4447f1e6f1552f8162063f60b69ee67a C:\Program Files (x86)\OpenOffice.org 3\program\svtmi.dll MD5: e29cef43fdaf8598302180174dc61388 C:\Program Files (x86)\OpenOffice.org 3\program\tkmi.dll MD5: cadebeb36d91229ea468e40704e0607a C:\Program Files (x86)\OpenOffice.org 3\program\tlmi.dll MD5: e1e6c70b09630486c9b31e265d6bc3e1 C:\Program Files (x86)\OpenOffice.org 3\program\ucb1.dll MD5: 53d36c9e672280e63331a7db93ff24d3 C:\Program Files (x86)\OpenOffice.org 3\program\ucbhelper4MSC.dll MD5: a0bf508f0ad56275530778d9655f4013 C:\Program Files (x86)\OpenOffice.org 3\program\ucpfile1.dll MD5: 381c38d5a96dc48df531f83a6566840c C:\Program Files (x86)\OpenOffice.org 3\program\utlmi.dll MD5: 008034f50f1cf56ea6b028f9f3f5e8b6 C:\Program Files (x86)\OpenOffice.org 3\program\vclmi.dll MD5: d9dfc0a179981dd82fa1e575ba4a071d C:\Program Files (x86)\OpenOffice.org 3\program\vos3MSC.dll MD5: ddb5aff679932c1616305a7292178947 C:\Program Files (x86)\OpenOffice.org 3\program\xcrmi.dll MD5: 2045e825effe34ce14305f92075f2ffc C:\Program Files (x86)\OpenOffice.org 3\URE\bin\bootstrap.uno.dll MD5: ead61b24a7183cad672ca911310b0a98 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\cppu3.dll MD5: 25bd70c53c7da635f58e32ffcb9145b5 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\cppuhelper3MSC.dll MD5: 9c5c49d3c4dbc3a76bc16ef3825467c8 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\jvmfwk3.dll MD5: 32b01485db7ad870c49c56135345766e C:\Program Files (x86)\OpenOffice.org 3\URE\bin\msci_uno.dll MD5: f8f8961b601fa7bafd9578b542299284 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\reg3.dll MD5: 535a2814b074947101a1d1501d557199 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\sal3.dll MD5: 4b6e83cd4163bb13fd82146f3f68caeb C:\Program Files (x86)\OpenOffice.org 3\URE\bin\salhelper3MSC.dll MD5: 75f27f38a18b6c980c89d32450b4e690 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\stlport_vc7145.dll MD5: 4fe48fc083fd237a632d0b9fb7ae7b5c C:\Program Files (x86)\OpenOffice.org 3\URE\bin\stocservices.uno.dll MD5: e622be084fab62a57493810f7c8c0378 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\store3.dll MD5: 1358c3c04f2480b57e536b3aca6d93e2 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\uwinapi.dll MD5: 390679f7a217a5e73d756276c40ae887 C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe MD5: 3eafdd637416393722aa98e940dfd0a0 C:\Program Files (x86)\TOSHIBA Games\TOSHIBA Game Console\GameConsoleService.exe MD5: ce0999910d37f61f2314c998f4f9d1d4 C:\Program Files (x86)\Toshiba\Bluetooth Toshiba Stack\ItSecMng.exe MD5: 4e5a8546709591d31ba086ca2a69cecd C:\Program Files (x86)\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe MD5: 7df1e7b35c39d656850cfe237503f3f7 C:\Program Files (x86)\Toshiba\ConfigFree\CFP2API.dll MD5: 5ac8a997e8d9c131b5f90b4f3ccfae34 C:\Program Files (x86)\Toshiba\ConfigFree\CFProcSRVC.exe MD5: d10d01b2dfcd8d2f32a32ed29e8da1c2 C:\Program Files (x86)\Toshiba\ConfigFree\CFSvcs.exe MD5: 9a815510679c7ecd04ed194a9c9c25e5 C:\Program Files (x86)\Toshiba\ConfigFree\CFSwMgr.exe MD5: 53835c26153df03322b6378addf070b4 C:\Program Files (x86)\Toshiba\ConfigFree\CFUPNP.dll MD5: e0d99e3acef09bd225912f977290a0d1 C:\Program Files (x86)\TOSHIBA\ConfigFree\CFWLAPI.dll MD5: 7e3479c704f208c85954d9e7442533c4 C:\Program Files (x86)\TOSHIBA\ConfigFree\CFWRP_CS.dll MD5: 386206f09d969f809b76b8e10355f703 C:\Program Files (x86)\TOSHIBA\ConfigFree\CFWRPAR_CS.dll MD5: f3e8e67dc455012aaad4364cbc3bca0b C:\Program Files (x86)\TOSHIBA\ConfigFree\IpAdrSet.dll MD5: e114083008a623323c8d9df5550f82d2 C:\Program Files (x86)\TOSHIBA\ConfigFree\NDSAPI.dll MD5: ab62a8f77c0e2ec8bfdac6bb379b3ecb C:\Program Files (x86)\TOSHIBA\ConfigFree\NDSNLS.dll MD5: 0172f917a624d08620a8ae94f5950a30 C:\Program Files (x86)\TOSHIBA\ConfigFree\NDSParts.dll MD5: 6e3fefb74326a230237613f2b035c71f C:\Program Files (x86)\Toshiba\ConfigFree\NDSTray.exe MD5: 7a3e47a6f167e6b9835a6dc2ca20c9d8 C:\Program Files (x86)\Toshiba\ConfigFree\OpenProp.dll MD5: fd9515297d79e1ac8965e384467b6f6b C:\Program Files (x86)\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe MD5: afd400aebcab252c99e60991ff00d9d2 C:\Program Files (x86)\Toshiba\Utilities\KeNotify.exe MD5: a7e2ff99e82eca03a16f5d31c820f697 C:\Program Files (x86)\TOSHIBA\Utilities\SVPWUTIL.exe MD5: d9a0ce26ada5bd15b1b03a752ddf14a6 c:\program files (x86)\utorrentbar\tbutor.dll MD5: 47bdbce3e2d819b17ab9fa4539b9df71 c:\program files (x86)\windows live\companion\companioncore.dll MD5: 4ce9dac1518ff7e77bd213e6394b9d77 C:\Program Files (x86)\Windows Live\Family Safety\fsssvc.exe MD5: 6f0dab13529bcb7c0f8a3082a8b1cde9 C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe MD5: ac421a44de902f2627f1e63793ed89cd C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll MD5: b1db5edb658f3ff4f13ac069ce622893 C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe MD5: 7a917120a62bcf2883fdd5c352447556 C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe MD5: 7e47c328fc4768cb8beafbcfafa70362 C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE MD5: 7cd2f2c63693ef90b73f5362a52cae26 C:\Program Files\Intel\WiFi\bin\EvtEng.exe MD5: 7d9d615201a483d6fa99491c2e655a5a C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE MD5: 3289766038db2cb14d07dc84392138d5 C:\Program Files\SUPERAntiSpyware\SASDIFSV64.SYS MD5: 58a38e75f3316a83c23df6173d41f2b5 C:\Program Files\SUPERAntiSpyware\SASKUTIL64.SYS MD5: e17a81e6ad0e89630a3b0f2ed5cbbdf5 C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe MD5: 071f0d1f23b82b56939fb036b8f4456f C:\Program Files\TOSHIBA\SmartFaceV\SmartFaceVWatchSrv.exe MD5: 19d979b9f6373a7cb17ebb7594feb819 C:\Program Files\TOSHIBA\SMARTLogService\TosIPCSrv.exe MD5: 137149b37e9c9dbde30e4c40867252e4 C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe MD5: 9a0e769cb3ac06b5ef443cfb6228b137 C:\Program Files\TOSHIBA\Utilities\HWSetup.exe MD5: 06c8fa1cf39de6a735b54d906ba791c6 C:\Program Files\Windows Live\Mesh\wlcrasvc.exe MD5: 6dbf2ac2bdaff355995ab25eccc4cfe1 C:\Toshiba\IVP\ISM\pinger.exe MD5: e1292c1ed4deb17b8a9b586d22cb2061 C:\Toshiba\IVP\swupdate\swupdtmr.exe MD5: fe36976864a30ea91e14d024f8bf7dd8 C:\Users\Amber\AppData\Roaming\Dropbox\bin\Dropbox.exe MD5: 0b02d9aa67eea2c5524943b69418512e C:\Users\Amber\AppData\Roaming\Dropbox\bin\PYTHON25.DLL MD5: 823451876778f382b23afe20ef2ddc20 C:\Windows\Downloaded Program Files\qsax.dll MD5: 14ce384d2e27b64c256bda4dc39c312d C:\Windows\ehome\ehRecvr.exe MD5: b93159c1313d66fdfbbe876f5189cd52 C:\Windows\ehome\ehsched.exe MD5: f5ee2527d74449868e3c3227a59bcd28 C:\Windows\ehome\ehstart.dll MD5: ce07a466201096f021cd09d631b21540 C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe MD5: 749f5f8cedca70f2a512945325fc489d C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\infocard.exe MD5: 74751dda198165947fd7454d83f49825 C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\SMSvcHost.exe MD5: bc5b0be5af3510b0fd8c140ee42c6d3e C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe MD5: ab87eeffd18f2baafc274e7075ea6c67 c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll MD5: 66328b08ef5a9305d8ede36b93930369 C:\Windows\servicing\TrustedInstaller.exe MD5: e9b9c1b98c8d6d48407e1c1203eac659 C:\Windows\system32\adsldpc.dll MD5: da7478ba9e41b60b3d5da456e253002a C:\Windows\system32\audioeng.dll MD5: 4acf748a8e576761e4c610acab67b1bc C:\Windows\system32\bcrypt.dll MD5: 74f26fc01b180d4a99a168ed69c30a53 C:\Windows\system32\cmd.exe MD5: 93e317d7ad783d8eaee2e3500bfe889d C:\Windows\system32\credui.dll MD5: 3dfeec45e5f22993216083fb777719d5 C:\Windows\system32\d2d1.dll MD5: 8b02d2ecc7ef6e1f6af08459e3f741f6 C:\Windows\system32\d3d10.dll MD5: 29e4ea31c6debe5efb384eefa4f1ef63 C:\Windows\system32\d3d10_1.dll MD5: 556f1cbe9ba19e2ccd6f8d9af71af5c7 C:\Windows\system32\d3d10_1core.dll MD5: 9c7094f537782a82b6a29b4a7172e180 C:\Windows\system32\d3d10core.dll MD5: 85e861d0b88db2b54acb0839654c09f7 C:\Windows\system32\DNSAPI.dll MD5: 9c551a9121639a9779862cb8a6cabf03 C:\Windows\system32\DRIVERS\LPCFilter.sys MD5: 6843926aff733d46a04f9d4e1c1a6b14 C:\Windows\system32\DWrite.dll MD5: aaae543c535ed596ecad2ab8761c2c6f C:\Windows\system32\dxgi.dll MD5: 05b6a5ce1c7767c32df35966107cb1ec C:\Windows\system32\hhctrl.ocx MD5: d5c9f778d0ed2954eb83e1cf87dc0b65 C:\Windows\system32\IEFRAME.dll MD5: 417011fac541c62837d29d1c9f834156 C:\Windows\system32\IEUI.dll MD5: 68563ac389f92ee79f1c714288ba1dce C:\Windows\system32\ImgUtil.dll MD5: b8fbe5f40b09f5d20e1e5ccfef893d62 C:\Windows\system32\IMM32.DLL MD5: 7d62fa39463aa90ee0b32401038b26a5 C:\Windows\system32\jsproxy.dll MD5: ef24642d5fb52a1eef56de9e47cbb993 C:\Windows\system32\MFC42.DLL MD5: f35a584e947a5b401feb0fe01db4a0d7 C:\Windows\system32\MFC71.DLL MD5: 56e315acfb08a177b4d01e42b9044db5 C:\Windows\system32\MPRAPI.dll MD5: 7940c04ce581288a3498d57ec4ee47d2 C:\Windows\system32\msfeeds.dll MD5: e6d5c7e4aac0c682169aa5021386eff3 C:\Windows\system32\MSHTML.dll MD5: 35aae2e841aa1a949775168e119482c9 C:\Windows\system32\msls31.dll MD5: 39ba737ebf8e7da1cd019fe95333fd70 C:\Windows\system32\Mystify.scr MD5: aabe6452dfff3baa664a33795b2166fc C:\Windows\system32\nvwgf2um.dll MD5: 862363973dcbcc31dd161ef41a69153c C:\Windows\system32\ODBC32.dll MD5: 2dd6af8e97f59c9d39329bbc2a81f13f C:\Windows\system32\RASDLG.dll MD5: ab530fdd34c67b497a20171d1234cfe9 C:\Windows\system32\RICHED32.DLL MD5: 0a990afb9f2726323d61c8ecb8b70b17 C:\Windows\system32\security.dll MD5: 167ac31450c0c53a01fa1491e94d7678 C:\Windows\System32\shdocvw.dll MD5: c7230fbee14437716701c15be02c27b8 C:\Windows\System32\shsvcs.dll MD5: 2cdef39641bc63a337b6ea13e61b32c6 C:\Windows\system32\TosBdAPI.dll MD5: c385d4d4ec16e637aa4d2d18a06e80c9 C:\Windows\system32\TosBtAPI.dll MD5: 88b630f6aeb5a11f6ad064930b38c2c0 C:\Windows\system32\UxTheme.dll MD5: 83c2f5076e1b4a63c04f2b14ee7cad47 C:\Windows\system32\wbem\wbemdisp.dll MD5: 2c3b09e586bda2cc49a292be7badc589 C:\Windows\system32\wbem\wmiutils.dll MD5: 5ec8fb83f31aa2d6f421f02c3f4f4475 C:\Windows\system32\WINSPOOL.DRV MD5: 28b9dba6201aeddc65c15fa48939804a C:\Windows\system32\wmp.dll MD5: 9441a231c0aa0712f7cf3b10d9cfcf76 C:\Windows\system32\wmploc.dll MD5: 1908cc7673f72601affdca022689cedf C:\Windows\system32\xmllite.dll MD5: 85e861d0b88db2b54acb0839654c09f7 C:\Windows\Syswow64\DNSAPI.dll MD5: 4312debdacbe338f0b90e7f08e7672be C:\Windows\SysWOW64\Dxtmsft.dll MD5: ca493a92da9880b6f1a89c3dbd54ba5b C:\Windows\SysWOW64\Dxtrans.dll MD5: 9a75518600fba10980ee94267ca98489 C:\Windows\SysWOW64\gameux.dll MD5: 05c8c8767e29163fc251164ff6839ea5 C:\Windows\syswow64\GDI32.dll MD5: ee9d715af1b928982f417238b9914484 C:\Windows\SysWOW64\ieapfltr.dll MD5: d5c9f778d0ed2954eb83e1cf87dc0b65 c:\windows\syswow64\ieframe.dll MD5: ab0e44c70c5c732c1e312eaeabecc1d5 C:\Windows\syswow64\iertutil.dll MD5: b8fbe5f40b09f5d20e1e5ccfef893d62 C:\Windows\syswow64\IMM32.dll MD5: 4be78e80530451f5ff970bd109c6df77 C:\Windows\SysWOW64\jscript9.dll MD5: 7f4caeac24592fa9f574e1f8cd1d0604 C:\Windows\syswow64\kernel32.dll MD5: df37346ea13082e3e1b423b54014e641 C:\Windows\syswow64\LPK.DLL MD5: efbef826c183cf8edab324ce514d69b7 C:\Windows\SysWOW64\Macromed\Flash\Flash10t.ocx MD5: 73d4dea1a876f78feb83862d514bfe63 C:\Windows\SysWOW64\Macromed\Flash\FlashUtil10t_ActiveX.dll MD5: 0ab420b203bfc541de65cfbd88470d3a C:\Windows\SysWOW64\Macromed\Flash\FlashUtil10t_ActiveX.exe MD5: 56007cfc52167c26e4a3f899b8d29ccd C:\Windows\SysWOW64\ntdll.dll MD5: 9586e7cb2255a8b097a7e4538202585e C:\Windows\syswow64\ole32.dll MD5: de4cd76c254e143f40e62952788d3be7 C:\Windows\syswow64\OLEAUT32.dll MD5: 0ed8727ea0172860f47258456c06caea C:\Windows\SysWow64\perfhost.exe MD5: 015e1f472a5633520903353375f7e69d C:\Windows\SysWOW64\PING.EXE MD5: 0abe67004eb4c162f4456e64f90a11fd C:\Windows\syswow64\RPCRT4.dll MD5: 2ab58991862153a248779174d4e4212b C:\Windows\SysWOW64\schannel.dll MD5: 33ae914c24f546aabf281ba7b138186d C:\Windows\syswow64\SHELL32.dll MD5: 9176285122b7b849fec2aa1b72a8f7a8 C:\Windows\syswow64\SHLWAPI.dll MD5: d217b0da82fdd942c048749993275ac6 C:\Windows\syswow64\urlmon.dll MD5: d29fdb5dedbdc1bd882164dc6dc4dd53 C:\Windows\syswow64\USER32.dll MD5: 80fff14f1757b9af8be9d314fc1ae88b C:\Windows\syswow64\USP10.dll MD5: 88b630f6aeb5a11f6ad064930b38c2c0 C:\Windows\SysWOW64\UxTheme.dll MD5: 5193de33f3284c447e0d31dafbf92570 c:\windows\syswow64\webcheck.dll MD5: 2c7332c222d1fe1fc57d622699a8c001 C:\Windows\syswow64\WININET.dll MD5: 1d109ed0d660654ea7ff1574558031c4 C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6195_none_d09154e044272b9a\msvcm80.dll MD5: c9564cf4976e7e96b4052737aa2492b4 C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6195_none_d09154e044272b9a\MSVCR80.dll MD5: 1f5afd468eb5e09e9ed75a087529eab5 C:\Windows\WinSxS\x86_microsoft.vc80.mfc_1fc8b3b9a1e18e3b_8.0.50727.6195_none_cbf5e994470a1a8f\MFC80.DLL MD5: e2c48cd0132d4d1dc7d0df9a6bef686a C:\Windows\WinSxS\x86_microsoft.vc80.mfc_1fc8b3b9a1e18e3b_8.0.50727.6195_none_cbf5e994470a1a8f\MFC80U.DLL MD5: 28a09777d2d952122567a8a82f1a2c7b C:\Windows\WinSxS\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.6195_none_03ce2c72205943d3\MFC80ENU.DLL MD5: 4c39358ebdd2ffcd9132a30e1ec31e16 C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\MSVCP90.dll MD5: cdbe9690cf2b8409facad94fac9479c9 C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\MSVCR90.dll MD5: ca6ade4f7761bb15b3325356dc3b82bb C:\Windows\WinSxS\x86_microsoft.vc90.mfc_1fc8b3b9a1e18e3b_9.0.30729.6161_none_4bf7e3e2bf9ada4c\mfc90u.dll MD5: fbfca1a574d47ee575448b719cbbf2e4 C:\Windows\WinSxS\x86_microsoft.vc90.mfcloc_1fc8b3b9a1e18e3b_9.0.30729.6161_none_49768ef57548175e\MFC90ENU.DLL MD5: 35acd5ea63d75e97dd0e9a1629e582b2 C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.6002.18305_none_88f3a38569c2c436\COMCTL32.dll MD5: be3c082837866c4c291adaf163c10ea6 C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.6002.18305_none_5cb72f2a088b0ed3\comctl32.dll MD5: b5b09091b0e33c396ceec8995515bd41 C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll The following file(s) must be uploaded for server-side scanning: C:\Program Files (x86)\OpenOffice.org 3\program\svlmi.dll C:\Program Files (x86)\OpenOffice.org 3\program\fwemi.dll C:\Program Files (x86)\OpenOffice.org 3\program\deploymentmiscmi.dll C:\Program Files (x86)\OpenOffice.org 3\program\i18nutilMSC.dll C:\Program Files (x86)\OpenOffice.org 3\program\ucpfile1.dll C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe C:\Program Files (x86)\OpenOffice.org 3\program\libdb47.dll C:\Program Files (x86)\OpenOffice.org 3\program\oooimprovementmi.dll C:\Program Files (x86)\OpenOffice.org 3\URE\bin\cppu3.dll C:\Program Files (x86)\OpenOffice.org 3\program\basegfxmi.dll C:\Program Files (x86)\OpenOffice.org 3\program\xcrmi.dll C:\Program Files (x86)\OpenOffice.org 3\program\vos3MSC.dll C:\Program Files (x86)\OpenOffice.org 3\URE\bin\store3.dll C:\Program Files (x86)\OpenOffice.org 3\URE\bin\msci_uno.dll C:\Program Files (x86)\OpenOffice.org 3\program\oleautobridge.uno.dll C:\Program Files (x86)\OpenOffice.org 3\program\sotmi.dll C:\Program Files (x86)\OpenOffice.org 3\program\i18npapermi.dll C:\Program Files (x86)\OpenOffice.org 3\program\emsermi.dll C:\Program Files (x86)\OpenOffice.org 3\program\localebe1.uno.dll C:\Program Files (x86)\OpenOffice.org 3\URE\bin\uwinapi.dll C:\Program Files (x86)\OpenOffice.org 3\program\icuuc40.dll C:\Program Files (x86)\OpenOffice.org 3\URE\bin\stlport_vc7145.dll C:\Program Files (x86)\OpenOffice.org 3\URE\bin\stocservices.uno.dll C:\Program Files (x86)\OpenOffice.org 3\program\configmgr.uno.dll C:\Program Files (x86)\OpenOffice.org 3\program\utlmi.dll C:\Program Files (x86)\OpenOffice.org 3\URE\bin\reg3.dll C:\Program Files (x86)\OpenOffice.org 3\program\comphelp4MSC.dll C:\Program Files (x86)\OpenOffice.org 3\program\ucbhelper4MSC.dll C:\Program Files (x86)\OpenOffice.org 3\program\ucb1.dll C:\Program Files (x86)\OpenOffice.org 3\URE\bin\salhelper3MSC.dll C:\Program Files (x86)\OpenOffice.org 3\URE\bin\jvmfwk3.dll C:\Program Files (x86)\OpenOffice.org 3\URE\bin\cppuhelper3MSC.dll C:\Program Files (x86)\OpenOffice.org 3\URE\bin\bootstrap.uno.dll C:\Program Files (x86)\OpenOffice.org 3\program\libxml2.dll C:\Program Files (x86)\OpenOffice.org 3\program\fwimi.dll C:\Program Files (x86)\OpenOffice.org 3\program\sofficeapp.dll C:\Program Files (x86)\OpenOffice.org 3\program\tlmi.dll C:\Program Files (x86)\OpenOffice.org 3\program\i18nisolang1MSC.dll Upload started - 35 file(s) jusched.exe (39428) salhelper3MSC.dll (13312) localebe1.uno.dll (24064) i18nisolang1MSC.dll (26112) i18npapermi.dll (29184) msci_uno.dll (51712) store3.dll (53248) i18nutilMSC.dll (66560) oooimprovementmi.dll (83968) uwinapi.dll (86016) jvmfwk3.dll (92160) stocservices.uno.dll (92672) reg3.dll (92672) vos3MSC.dll (94208) deploymentmiscmi.dll (135680) cppu3.dll (142848) emsermi.dll (148480) ucb1.dll (212992) sotmi.dll (256000) ucpfile1.dll (257024) oleautobridge.uno.dll (287232) fwimi.dll (311296) ucbhelper4MSC.dll (358912) sofficeapp.dll (379904) configmgr.uno.dll (396800) cppuhelper3MSC.dll (432128) bootstrap.uno.dll (452608) tlmi.dll (529408) xcrmi.dll (531456) stlport_vc7145.dll (597504) basegfxmi.dll (700928) svlmi.dll (777216) libdb47.dll (832000) fwemi.dll (869888) icuuc40.dll (951296) Upload speed - 113 KB/s Upload finished - 35 uploaded, 0 failed Scan finished - communication took 90 sec Total traffic - 9.95 MB sent, 0.72 KB recvd Scanned 407 files and modules - 139 seconds ============================================================================== Quote however the instructions you gave me don't quite match what I sawThis is an old canned speech that I'm using and the program probably has changed. The main thing is that you got the log. Good job. Please run this scan for me. BTW, how's the computer running now? Run the F-Secure Online Scanner for Viruses, Spyware and Rootkits. Note: This Scanner is for Internet Explorer Only! •Click on Online Services and then Online Scanner •Accept the License Agreement. •Once the ActiveX installs,Click Full System Scan •Once the download completes,the scan will begin automatically. •The scan will take some time to finish,so please be patient. •When the scan completes, click the Automatic cleaning (recommended) button. •Click the Show Report button and Copy&Paste the entire report in your next reply. My computer is running pretty good actually. I've had AVG pop up a few times wanting to quarentine a couple files but it's only been during scans that were running so I have left it alone because I didn't want to interrupt the scan. Other than that I haven't had any more issues in the last few days. Scanning Report Friday, August 26, 2011 19:54:32 - 21:17:44 Computer name: AMBER-PC Scanning type: Scan system for malware, spyware and rootkits Target: C:\ -------------------------------------------------------------------------------- 1 malware found TrackingCookie.Webtrends (spyware) System (Disinfected) -------------------------------------------------------------------------------- Statistics Scanned: Files: 120496 System: 5116 Not scanned: 47 Actions: Disinfected: 1 Renamed: 0 Deleted: 0 Not cleaned: 0 Submitted: 0 Files not scanned: C:\HIBERFIL.SYS C:\PAGEFILE.SYS C:\WINDOWS\SYSTEM32\DRIVERS\SPTD.SYS C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT C:\WINDOWS\SYSTEM32\CONFIG\SAM C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM C:\WINDOWS\SYSTEM32\CONFIG\SECURITY C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE C:\WINDOWS\SYSTEM32\CONFIG\COMPONENTS C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\COMPONENTS C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\DEFAULT C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SAM C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SECURITY C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SOFTWARE C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SYSTEM C:\WINDOWS\SYSTEM32\CATROOT2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\CATDB C:\WINDOWS\SYSTEM32\CATROOT2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\CATDB C:\SYSTEM VOLUME INFORMATION\{1299DB9B-CEB2-11E0-A746-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{1CD89F6F-CF7B-11E0-B7C1-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{20A90029-CC43-11E0-97AF-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{20A90037-CC43-11E0-97AF-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{267F3139-C932-11E0-9F82-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{29387294-CC52-11E0-8230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{29387298-CC52-11E0-8230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{1B83358B-B635-11E0-A230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{490D2353-CDEC-11E0-9BA8-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{490D2360-CDEC-11E0-9BA8-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{5D13C5D8-BB90-11E0-AE43-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{63AE920C-B7F2-11E0-BD42-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{671E6E1B-CB5B-11E0-B6CA-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{671E6E29-CB5B-11E0-B6CA-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{6C834577-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{6C8345B1-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{50D2F3C1-C877-11E0-A002-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{6E9DB58C-B4C6-11E0-B7FB-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{7C68BD1A-C490-11E0-BB21-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{86F24C33-C7B0-11E0-B90F-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{8A6FF7E5-B6E8-11E0-9F7E-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{8E26F00C-BC8F-11E0-8D57-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{6C8345B5-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{A1BE2E39-CB50-11E0-93F5-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{ADC52BA2-B569-11E0-98C1-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{A1BE2E49-CB50-11E0-93F5-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{DBA90858-C3C5-11E0-8FDC-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\PROGRAM FILES (X86)\COMMON FILES\JAVA\JAVA UPDATE\JUSCHED.EXE C:\BOOT\BCD -------------------------------------------------------------------------------- Options Scanning engines: Scanning options: Scan defined files: COM EXE SYS OV? BIN SCR DLL SHS HTM HTML HTT VBS JS INF VXD DO? XL? RTF CPL WIZ HTA PP? PWZ P?T MSO PIF . ACM ASP AX CNV CSC DRV INI MDB MPD MPP MPT OBD OBT OCX PCI TLB TSP WBK WBT WPC WSH VWP WML BOO HLP TD0 TT6 MSG ASD JSE VBE WSC CHM EML PRC SHB LNK WSF {* PDF ZL? XML XXX ANI AVB BAT CMD JOB LSP MAP MHT MIF PHP POT SWF WMF NWS TAR Use advanced heuristics -------------------------------------------------------------------------------- Copyright © 1998-2009 Product support | Send virus sample to F-Secure Scanning Report Friday, August 26, 2011 19:54:32 - 21:17:44 Computer name: AMBER-PC Scanning type: Scan system for malware, spyware and rootkits Target: C:\ -------------------------------------------------------------------------------- 1 malware found TrackingCookie.Webtrends (spyware) System (Disinfected) -------------------------------------------------------------------------------- Statistics Scanned: Files: 120496 System: 5116 Not scanned: 47 Actions: Disinfected: 1 Renamed: 0 Deleted: 0 Not cleaned: 0 Submitted: 0 Files not scanned: C:\HIBERFIL.SYS C:\PAGEFILE.SYS C:\WINDOWS\SYSTEM32\DRIVERS\SPTD.SYS C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT C:\WINDOWS\SYSTEM32\CONFIG\SAM C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM C:\WINDOWS\SYSTEM32\CONFIG\SECURITY C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE C:\WINDOWS\SYSTEM32\CONFIG\COMPONENTS C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\COMPONENTS C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\DEFAULT C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SAM C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SECURITY C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SOFTWARE C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SYSTEM C:\WINDOWS\SYSTEM32\CATROOT2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\CATDB C:\WINDOWS\SYSTEM32\CATROOT2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\CATDB C:\SYSTEM VOLUME INFORMATION\{1299DB9B-CEB2-11E0-A746-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{1CD89F6F-CF7B-11E0-B7C1-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{20A90029-CC43-11E0-97AF-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{20A90037-CC43-11E0-97AF-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{267F3139-C932-11E0-9F82-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{29387294-CC52-11E0-8230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{29387298-CC52-11E0-8230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{1B83358B-B635-11E0-A230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{490D2353-CDEC-11E0-9BA8-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{490D2360-CDEC-11E0-9BA8-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{5D13C5D8-BB90-11E0-AE43-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{63AE920C-B7F2-11E0-BD42-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{671E6E1B-CB5B-11E0-B6CA-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{671E6E29-CB5B-11E0-B6CA-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{6C834577-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{6C8345B1-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{50D2F3C1-C877-11E0-A002-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{6E9DB58C-B4C6-11E0-B7FB-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{7C68BD1A-C490-11E0-BB21-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{86F24C33-C7B0-11E0-B90F-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{8A6FF7E5-B6E8-11E0-9F7E-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{8E26F00C-BC8F-11E0-8D57-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{6C8345B5-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{A1BE2E39-CB50-11E0-93F5-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{ADC52BA2-B569-11E0-98C1-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{A1BE2E49-CB50-11E0-93F5-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\SYSTEM VOLUME INFORMATION\{DBA90858-C3C5-11E0-8FDC-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752} C:\PROGRAM FILES (X86)\COMMON FILES\JAVA\JAVA UPDATE\JUSCHED.EXE C:\BOOT\BCD -------------------------------------------------------------------------------- Options Scanning engines: Scanning options: Scan defined files: COM EXE SYS OV? BIN SCR DLL SHS HTM HTML HTT VBS JS INF VXD DO? XL? RTF CPL WIZ HTA PP? PWZ P?T MSO PIF . ACM ASP AX CNV CSC DRV INI MDB MPD MPP MPT OBD OBT OCX PCI TLB TSP WBK WBT WPC WSH VWP WML BOO HLP TD0 TT6 MSG ASD JSE VBE WSC CHM EML PRC SHB LNK WSF {* PDF ZL? XML XXX ANI AVB BAT CMD JOB LSP MAP MHT MIF PHP POT SWF WMF NWS TAR Use advanced heuristics That looks good. We can do some cleanup. Update Your Java (JRE) Old versions of Java have vulnerabilities that malware can use to infect your system. First Verify your Java Version If there are any other version(s) installed then update now. Get the new version (if needed) If your version is out of date install the newest version of the Sun Java Runtime Environment. Note: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update. Be sure to close ALL open web browsers before starting the installation. Remove any old versions 1. Download JavaRa and unzip the file to your Desktop. 2. Open JavaRA.exe and choose Remove Older Versions 3. Once complete exit JavaRA. Additional Note: The Java Quick STARTER (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and reboot your computer. *************************************************** To uninstall ComboFix
(Note: Make sure there's a space between the word ComboFix and the forward-slash.)
To remove the tools we used and the files and folders they created do the following: Double click OTL.exe.
**************************************************** Clean out your temporary internet files and temp files. Download TFC by OldTimer to your desktop. Double-click TFC.exe to run it. Note: If you are running on Vista, right-click on the file and choose Run As Administrator TFC will close all programs when run, so make sure you have saved all your work before you begin. * Click the Start button to begin the cleaning process. * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two. * Please let TFC run uninterrupted until it is finished. Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning. ********************************************************* Looking over your log it seems you don't have any evidence of a third party firewall. Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors. Remember only install ONE firewall 1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one) 2) Online Armor 3) Agnitum Outpost 4) PC Tools Firewall Plus If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time. ****************************************************** Use the Secunia Software Inspector to check for out of date software. •Click Start Now •Check the box next to Enable thorough system inspection. •Click Start •Allow the scan to finish and scroll down to see if any updates are needed. •Update anything listed. . ---------- Go to Microsoft Windows Update and get all critical updates. ---------- I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free. SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox. * Using SpywareBlaster to protect your computer from Spyware and Malware * If you don't know what ActiveX controls are, see here Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future. Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly. Safe Surfing! Got through all that without any problems. Thanks for all your help! Quote from: Elyse_2301 on August 28, 2011, 08:53:27 PM Got through all that without any problems.You're welcome. I will lock this thread. If you need it re-opened, please send me a pm. |
|
| 1742. |
Solve : What does everyone recommend for an AV?? |
Answer» QUOTE from: boragivinay on August 29, 2011, 10:02:11 AMBut your copy of windows must be genuine not an PIRATED one. It RUNS an genuine validation test before installing and doesnt install if the genuine check fails. That is what he said. |
|
| 1743. |
Solve : Why do I get "redirected" when doing searches?? |
|
Answer» Also, when I go to Comodo and hit browse, then put the file name in, it says it doesn't exist. I'm not sure where to find it using the browse command, I went through some of the documents on my computer, but didn't see it? Not sure if I'm doing that option correctly.Quote when I go to Comodo and hit browse, then put the file name in, it says it doesn't existIf you use the Browse method, you need to show Comodo where to find the file. EX. You need to click on the C drive, click System32 and then click on the atl32.dll file. I'd like to scan your machine with ESET OnlineScan •Hold down Control and click on the following link to open ESET OnlineScan in a new window. ESET OnlineScan •Click the button. •For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
•Click the button. •Accept any security warnings from your BROWSER. •Check •Push the Start button. •ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time. •When the scan completes, push •Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply. •Push the button. •Push A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt Okay, when I held down the control button and clicked on the link you gave me, an error page popped up everytime, but it said I could click a link to go back to the eset home page. Did that, found the online scanner green button as in your instructions, clicked it, tried to right click it to get it to go...nothing. Now what?There MUST be some problems with ESET. Please try this one. Run the BitDefender Online scanner Agree to the license and then select Scan. DO NOT CHANGE THE OPTIONS TO SHOW ALL FILES SCANNED. That will MAKE your logs huge and we don't need to see clean files. Once Bitdefender completes the scan: Click-on the Detected Problems tab. Then select Click here to export the scan report. When the window comes up to save the report, change the Save as type: box to: Text (Tab DELIMITED) (*.txt) and then in the File name box enter change to bdscan then click Save. This will save a file named bdscan.txt. I would suggest saving it to the Desktop so you can easily find it. (take notice of where you save it so you can find it later). This bdcan.txt file will actually contain HTML code that we can easily view later while reviewing your log. All we have to do is rename the file to bdscan.html. If you do not follow these step, you will have an incorrect log or worse a log summary which is useless to us. Post the bdscan.txt file as an Attachment. Good lord, this is getting extremely frustrating!! That didn't work either! Got to the page to start the scan, and get this message: Loading Bitdefender QuickScan... Notice the browser confirmation message above and accept the plug-in installation by clicking the bar above. From the contextual menu please choose 'Install ActiveX control...' and you will be prompted to install the application. To be able to use Bitdefender QuickScan please click 'Install'.. * using default browser settings except there is no bar or anything to accept ActiveX. Nothing happens, just sits there. Tried it 3 times. Quote from: mcummings36 on August 21, 2011, 08:16:30 PM Good lord, this is getting extremely frustrating!! That didn't work either! Got to the page to start the scan, and get this message:I tried it with IE and FireFox and they both worked well. What browser are you using? You don't get that yellow band across the top of your browser window telling you to allow ActiveX?I am using Internet Explorer 8 (I think, I don't know how to find out which version of IE it is) Just tried it again, did the same thing, nothingQuote from: mcummings36 on August 23, 2011, 05:12:07 PM I am using Internet Explorer 8 (I think, I don't know how to find out which version of IE it is) Just tried it again, did the same thing, nothingAre you receiving the warning at the top of your browser that you will need to allow ActiveX to your browser? |
|
| 1744. |
Solve : WIndow update error will not work - error message 80070422? |
|
Answer» Hello, I have a Compaq Presario C500 Laptop with VISTA Home EDITION installed (Intel Celeron M CPU 1.86 GHz/1.50 GB Ram/Vista SP 2. I've had my Windows update set to automatically download and install any updates. However I've recently had this error message occur that states "Errors found - Code 80070422. Windows update encountered an unknown error." I've tried the "Get Help With This Error" link but it's very confusing. I've also RUN my antivirus (MICROSOFT security essentials)/Superantispyware/Malwarebytes to make sure I don't have any VIRUS' and haven't found anything. Can somebody help me? Thanks. While your computer might not be infected with a virus, it is recommended that you follow steps to scan for viruses, and then turn the services on. |
|
| 1745. |
Solve : Random pictures appearing on my desktop?? |
|
Answer» Your computer has keygens, which is a form of software piracy. What is so bad about Cracks, Hacks, Pirated software, warez, or Keygens? Most popular cracks or keygens I see, are for Adobe CS3, a lot of different games, Nero, Kaspersky ANTIVIRUS, and much more. All of these cracks and keygens have what is called "cloaked malware," which is a form of spyware or viruses or trojans that hide themselves inside the keygen or crack files. Most hacks for games that come in the form of a program or installer, will also be infected. It is the opportunity for attackers to present a seemingly safe situation where the opportunity to steal something is in play, while the malware infects your system in the process. YES, it will install what you were looking for, but also allow malware to potentially take control of your computer. Lastly, it is illegal. I will counsel you that we do not report such incidents. However, it is not good practice to pirate software. ********************************************** We can do some cleanup. To uninstall ComboFix
(Note: Make sure there's a space between the word ComboFix and the forward-slash.)
To remove all of the tools we used and the files and folders they created do the following: Double click OTL.exe.
************************************************ Clean out your temporary internet files and temp files. Download TFC by OldTimer to your desktop. Double-click TFC.exe to run it. Note: If you are running on Vista, right-click on the file and choose Run As Administrator TFC will close all programs when run, so make sure you have saved all your work before you begin. * Click the Start button to begin the CLEANING process. * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two. * Please let TFC run uninterrupted until it is finished. Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning. **************************************************** Looking over your log it seems you don't have any evidence of a third party firewall. Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors. Remember only install ONE firewall 1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one) 2) Online Armor 3) Agnitum Outpost 4) PC Tools Firewall Plus If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time. ***************************************************** Use the Secunia Software Inspector to check for out of date software. •Click Start Now •Check the box next to Enable thorough system inspection. •Click Start •Allow the scan to finish and scroll down to see if any updates are needed. •Update anything LISTED. . ---------- Go to Microsoft Windows Update and get all critical updates. ---------- I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free. SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox. * Using SpywareBlaster to protect your computer from Spyware and Malware * If you don't know what ActiveX controls are, see here Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future. Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly. Safe Surfing! Hmm I usually like to test a game or a program before buying it. If its illigal - OK, I wont do it. So.. I'd like to thank you Dave, for helping me. I dont know what I wouldve done without you. You are a really good guy, I cant believe you used so much of your time on helping a total stranger I hope I dont have anymore problems with malware, I will try to be more careful with what I am downloading You're welcome. I will lock this thread. If you need it re-opened, please send me a pm. |
|
| 1746. |
Solve : Ugh! IE problem or virus or...?? |
|
Answer» Quote Any suggestions? And out of curiosity, how are things looking, based on all the logs I have posted? Have we made some headway or not so much? Thanks again for all this help you have been giving me. This is SEEMING to drag on and must be at least a bit frustrating for you.Sorry. I was not aware that you couldn't connect to the net. What happens when you try to open a BROWSER? Please try this to start analyzing that problem. Please run Notepad (start > All Programs > Accessories > Notepad) and copy and paste the text in the code box into a new file: Code: [Select]@echo off >Log1.txt ( ipconfig /all nslookup google.com nslookup yahoo.com ping -n 2 google.com ping -n 2 yahoo.com route print ) start Log1.txt del %0 •Go to the File MENU at the top of the Notepad and select Save as. •Select save in: desktop •Fill in File name: test.bat •Save as TYPE: All file TYPES (*.*) •Click save. •Close the Notepad. •Locate and double-click test.bat on the desktop. •A notepad opens, copy and paste the content it (log1.txt) to your reply. |
|
| 1747. |
Solve : deep rooted virus? |
|
Answer» Hi, i a new here so hopefully ive posted in the right place, please can you help me i cant get on certain websites it says web site is blocked by filter, its a black screen with the words across the middle, i have tried everything i can think of to rectify it but with no luck at all, even a FULL system recovery with the discs i made when i 1st purchased my PC, ive scanned my computer, done malaware scan but it isnt picking anything up, it started on friday i left my pc to go make food and when i came back it wouldnt work, facebook will allow me on if i put in https:// first, but then it changes from secure to unsecure, but when i go to play games which only needs HTTP:// im blocked, and last night the same happened to youtube so im blocked on that too now, my operating system is vista, my computer is acer aspire ag 3760 can you please help me am at my wits END now, please advise me on what to do next, many thanks julie |
|
| 1748. |
Solve : just when things were looking up.....? |
|
Answer» OK. Let's try to see what's going on. Download BlueScreenView to your desktop. BlueScreenView unzip downloaded file and double click on BlueScreenView.exe to run the program. when scanning is done, go to EDIT - Select All Go to FILE - SAVE Selected Items, and save the report as BSOD.txt Open BSOD.txt in Notepad, copy all of the content, and paste it into your next reply p File : Mini072711-01.dmp Crash Time : 7/26/2011 11:47:05 PM Bug Check String : Bug Check Code : 0x00000117 Parameter 1 : 0x84f05008 Parameter 2 : 0x8b610190 Parameter 3 : 0x00000000 Parameter 4 : 0x00000000 Caused By Driver : igdkmd32.sys Caused By Address : igdkmd32.sys+6190 File Description : Intel Graphics Kernel Mode Driver Product Name : Intel Graphics Accelerator Drivers for WINDOWS Vista(R) Company : Intel Corporation File Version : 7.14.10.1147 Processor : 32-bit Crash Address : dxgkrnl.sys+7c265 Stack Address 1 : dxgkrnl.sys+7cb46 Stack Address 2 : dxgkrnl.sys+776f7 Stack Address 3 : dxgkrnl.sys+7cd1a COMPUTER Name : Full Path : C:\Windows\Minidump\Mini072711-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 174,061 ================================================== ================================================== Dump File : Mini032411-01.dmp Crash Time : 3/24/2011 7:50:52 PM Bug Check String : Bug Check Code : 0x00000116 Parameter 1 : 0x84340008 Parameter 2 : 0x8a615190 Parameter 3 : 0x00000000 Parameter 4 : 0x00000002 Caused By Driver : igdkmd32.sys Caused By Address : igdkmd32.sys+6190 File Description : Intel Graphics Kernel Mode Driver Product Name : Intel Graphics Accelerator Drivers for Windows Vista(R) Company : Intel Corporation File Version : 7.14.10.1147 Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : dxgkrnl.sys+7bf71 Stack Address 2 : dxgkrnl.sys+7cc61 Stack Address 3 : dxgkrnl.sys+1938f Computer Name : Full Path : C:\Windows\Minidump\Mini032411-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 168,904 ================================================== ================================================== Dump File : Mini032311-01.dmp Crash Time : 3/23/2011 6:11:34 PM Bug Check String : Bug Check Code : 0x00000116 Parameter 1 : 0x84a6f510 Parameter 2 : 0x8a60d190 Parameter 3 : 0x00000000 Parameter 4 : 0x00000002 Caused By Driver : igdkmd32.sys Caused By Address : igdkmd32.sys+6190 File Description : Intel Graphics Kernel Mode Driver Product Name : Intel Graphics Accelerator Drivers for Windows Vista(R) Company : Intel Corporation File Version : 7.14.10.1147 Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : dxgkrnl.sys+7bf71 Stack Address 2 : dxgkrnl.sys+7cc61 Stack Address 3 : dxgkrnl.sys+1938f Computer Name : Full Path : C:\Windows\Minidump\Mini032311-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 168,904 ================================================== ================================================== Dump File : Mini031911-01.dmp Crash Time : 3/19/2011 10:21:53 AM Bug Check String : Bug Check Code : 0x00000119 Parameter 1 : 0x00000001 Parameter 2 : 0x00000000 Parameter 3 : 0x00000004 Parameter 4 : 0x00000004 Caused By Driver : watchdog.sys Caused By Address : watchdog.sys+1230 File Description : Watchdog Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : watchdog.sys+1230 Stack Address 2 : dxgkrnl.sys+50b0 Stack Address 3 : dxgkrnl.sys+138f Computer Name : Full Path : C:\Windows\Minidump\Mini031911-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,640 ================================================== ================================================== Dump File : Mini031811-01.dmp Crash Time : 3/18/2011 5:39:11 PM Bug Check String : KERNEL_MODE_EXCEPTION_NOT_HANDLED Bug Check Code : 0x1000008e Parameter 1 : 0xc0000005 Parameter 2 : 0x00000000 Parameter 3 : 0xbd1c18dd Parameter 4 : 0x00000000 Caused By Driver : Caused By Address : File Description : Product Name : Company : File Version : Processor : 32-bit Crash Address : Stack Address 1 : Stack Address 2 : Stack Address 3 : Computer Name : Full Path : C:\Windows\Minidump\Mini031811-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,632 ================================================== ================================================== Dump File : Mini021811-01.dmp Crash Time : 2/18/2011 6:38:31 PM Bug Check String : Bug Check Code : 0x00000119 Parameter 1 : 0x00000001 Parameter 2 : 0x000000c7 Parameter 3 : 0x00000000 Parameter 4 : 0x00000000 Caused By Driver : watchdog.sys Caused By Address : watchdog.sys+1230 File Description : Watchdog Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : watchdog.sys+1230 Stack Address 2 : dxgkrnl.sys+50b0 Stack Address 3 : dxgkrnl.sys+138f Computer Name : Full Path : C:\Windows\Minidump\Mini021811-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,632 ================================================== ================================================== Dump File : Mini021311-01.dmp Crash Time : 2/13/2011 2:58:45 PM Bug Check String : Bug Check Code : 0x00000116 Parameter 1 : 0x84d9a008 Parameter 2 : 0x8a211190 Parameter 3 : 0x00000000 Parameter 4 : 0x00000002 Caused By Driver : igdkmd32.sys Caused By Address : igdkmd32.sys+6190 File Description : Intel Graphics Kernel Mode Driver Product Name : Intel Graphics Accelerator Drivers for Windows Vista(R) Company : Intel Corporation File Version : 7.14.10.1147 Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : dxgkrnl.sys+7bf71 Stack Address 2 : dxgkrnl.sys+7cc61 Stack Address 3 : dxgkrnl.sys+1938f Computer Name : Full Path : C:\Windows\Minidump\Mini021311-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 168,912 ================================================== ================================================== Dump File : Mini021111-01.dmp Crash Time : 2/11/2011 5:21:58 PM Bug Check String : Bug Check Code : 0x00000119 Parameter 1 : 0x00000001 Parameter 2 : 0x00002900 Parameter 3 : 0x0000297f Parameter 4 : 0x0000297f Caused By Driver : watchdog.sys Caused By Address : watchdog.sys+1230 File Description : Watchdog Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : watchdog.sys+1230 Stack Address 2 : dxgkrnl.sys+50b0 Stack Address 3 : dxgkrnl.sys+12fe Computer Name : Full Path : C:\Windows\Minidump\Mini021111-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,656 ================================================== ================================================== Dump File : Mini010211-01.dmp Crash Time : 1/2/2011 3:47:32 PM Bug Check String : Bug Check Code : 0x00000119 Parameter 1 : 0x00000001 Parameter 2 : 0x00000008 Parameter 3 : 0x00000004 Parameter 4 : 0x00000004 Caused By Driver : watchdog.sys Caused By Address : watchdog.sys+1230 File Description : Watchdog Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : watchdog.sys+1230 Stack Address 2 : dxgkrnl.sys+50b0 Stack Address 3 : dxgkrnl.sys+138f Computer Name : Full Path : C:\Windows\Minidump\Mini010211-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,592 ================================================== ================================================== Dump File : Mini121410-01.dmp Crash Time : 12/14/2010 11:29:33 AM Bug Check String : IRQL_NOT_LESS_OR_EQUAL Bug Check Code : 0x0000000a Parameter 1 : 0x00070034 Parameter 2 : 0x00000002 Parameter 3 : 0x00000001 Parameter 4 : 0x82222fe9 Caused By Driver : hal.dll Caused By Address : hal.dll+3fe9 File Description : Hardware Abstraction Layer DLL Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+4dfd9 Stack Address 1 : hal.dll+3fe9 Stack Address 2 : ntkrnlpa.exe+ab693 Stack Address 3 : Ntfs.sys+9bb44 Computer Name : Full Path : C:\Windows\Minidump\Mini121410-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,656 ================================================== ================================================== Dump File : Mini120710-01.dmp Crash Time : 12/7/2010 1:56:12 PM Bug Check String : MEMORY_MANAGEMENT Bug Check Code : 0x0000001a Parameter 1 : 0x00041790 Parameter 2 : 0xc08027be Parameter 3 : 0x0000ffff Parameter 4 : 0x00000000 Caused By Driver : ntkrnlpa.exe Caused By Address : ntkrnlpa.exe+b680c File Description : NT Kernel & System Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18209 (vistasp2_gdr.100218-0019) Processor : 32-bit Crash Address : ntkrnlpa.exe+b680c Stack Address 1 : ntkrnlpa.exe+84a73 Stack Address 2 : ntkrnlpa.exe+83fc5 Stack Address 3 : ntkrnlpa.exe+2100ad Computer Name : Full Path : C:\Windows\Minidump\Mini120710-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,648 ================================================== ================================================== Dump File : Mini100910-02.dmp Crash Time : 10/9/2010 12:42:31 PM Bug Check String : DRIVER_IRQL_NOT_LESS_OR_EQUAL Bug Check Code : 0x000000d1 Parameter 1 : 0x00000004 Parameter 2 : 0x00000002 Parameter 3 : 0x00000000 Parameter 4 : 0x8b98e0b7 Caused By Driver : usbuhci.sys Caused By Address : usbuhci.sys+40b7 File Description : UHCI USB Miniport Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6001.18000 (longhorn_rtm.080118-1840) Processor : 32-bit Crash Address : ntkrnlpa.exe+4dfd9 Stack Address 1 : usbuhci.sys+40b7 Stack Address 2 : usbuhci.sys+482e Stack Address 3 : usbuhci.sys+1c34 Computer Name : Full Path : C:\Windows\Minidump\Mini100910-02.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,872 ================================================== ================================================== Dump File : Mini100910-01.dmp Crash Time : 10/9/2010 12:51:25 AM Bug Check String : IRQL_NOT_LESS_OR_EQUAL Bug Check Code : 0x0000000a Parameter 1 : 0x1187c28b Parameter 2 : 0x00000002 Parameter 3 : 0x00000001 Parameter 4 : 0x822eab69 Caused By Driver : hal.dll Caused By Address : hal.dll+4061 File Description : Hardware Abstraction Layer DLL Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+4dfd9 Stack Address 1 : ntkrnlpa.exe+a6b69 Stack Address 2 : tcpip.sys+103ac Stack Address 3 : tcpip.sys+106f9 Computer Name : Full Path : C:\Windows\Minidump\Mini100910-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 137,568 ================================================== ================================================== Dump File : Mini081310-01.dmp Crash Time : 8/13/2010 5:09:40 AM Bug Check String : Bug Check Code : 0x00000119 Parameter 1 : 0x00000001 Parameter 2 : 0x000004c0 Parameter 3 : 0x0000046e Parameter 4 : 0x0000046e Caused By Driver : watchdog.sys Caused By Address : watchdog.sys+1230 File Description : Watchdog Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : watchdog.sys+1230 Stack Address 2 : dxgkrnl.sys+50b0 Stack Address 3 : dxgkrnl.sys+138f Computer Name : Full Path : C:\Windows\Minidump\Mini081310-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,872 ================================================== ================================================== Dump File : Mini072610-01.dmp Crash Time : 7/26/2010 11:38:47 AM Bug Check String : DRIVER_IRQL_NOT_LESS_OR_EQUAL Bug Check Code : 0x000000d1 Parameter 1 : 0x00000006 Parameter 2 : 0x00000002 Parameter 3 : 0x00000000 Parameter 4 : 0x8b7af5f5 Caused By Driver : USBSTOR.SYS Caused By Address : USBSTOR.SYS+25f5 File Description : USB Mass STORAGE Class Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+4dfd9 Stack Address 1 : USBSTOR.SYS+25f5 Stack Address 2 : USBSTOR.SYS+2dea Stack Address 3 : USBSTOR.SYS+447f Computer Name : Full Path : C:\Windows\Minidump\Mini072610-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 181,456 ================================================== ================================================== Dump File : Mini072510-01.dmp Crash Time : 7/25/2010 8:46:07 PM Bug Check String : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED Bug Check Code : 0x1000007e Parameter 1 : 0xc0000005 Parameter 2 : 0x8b5ab154 Parameter 3 : 0x88805adc Parameter 4 : 0x888057d8 Caused By Driver : usbccgp.sys Caused By Address : usbccgp.sys+13154 File Description : USB Common Class GENERIC Parent Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6001.18000 (longhorn_rtm.080118-1840) Processor : 32-bit Crash Address : usbccgp.sys+13154 Stack Address 1 : usbccgp.sys+1f94 Stack Address 2 : usbccgp.sys+13e2 Stack Address 3 : usbccgp.sys+1675 Computer Name : Full Path : C:\Windows\Minidump\Mini072510-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,872 ================================================== ================================================== Dump File : Mini072310-02.dmp Crash Time : 7/23/2010 10:50:01 AM Bug Check String : Bug Check Code : 0x00000119 Parameter 1 : 0x00000001 Parameter 2 : 0x00000040 Parameter 3 : 0x00000000 Parameter 4 : 0x00000000 Caused By Driver : watchdog.sys Caused By Address : watchdog.sys+1230 File Description : Watchdog Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : watchdog.sys+1230 Stack Address 2 : dxgkrnl.sys+50b0 Stack Address 3 : dxgkrnl.sys+138f Computer Name : Full Path : C:\Windows\Minidump\Mini072310-02.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,872 ================================================== ================================================== Dump File : Mini072310-01.dmp Crash Time : 7/23/2010 10:44:33 AM Bug Check String : BUGCODE_USB_DRIVER Bug Check Code : 0x000000fe Parameter 1 : 0x00000006 Parameter 2 : 0x8caef303 Parameter 3 : 0x66725045 Parameter 4 : 0x00000000 Caused By Driver : USBPORT.SYS Caused By Address : USBPORT.SYS+1025 File Description : USB 1.1 & 2.0 Port Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : USBPORT.SYS+1025 Stack Address 2 : USBPORT.SYS+3272 Stack Address 3 : USBPORT.SYS+cd80 Computer Name : Full Path : C:\Windows\Minidump\Mini072310-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 139,064 ================================================== ================================================== Dump File : Mini072110-01.dmp Crash Time : 7/21/2010 11:22:43 AM Bug Check String : DRIVER_IRQL_NOT_LESS_OR_EQUAL Bug Check Code : 0x000000d1 Parameter 1 : 0x00000006 Parameter 2 : 0x00000002 Parameter 3 : 0x00000000 Parameter 4 : 0x8b39f5f5 Caused By Driver : USBSTOR.SYS Caused By Address : USBSTOR.SYS+25f5 File Description : USB Mass Storage Class Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+4dfd9 Stack Address 1 : USBSTOR.SYS+25f5 Stack Address 2 : USBSTOR.SYS+2dea Stack Address 3 : USBSTOR.SYS+447f Computer Name : Full Path : C:\Windows\Minidump\Mini072110-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 181,456 ================================================== ================================================== Dump File : Mini071010-01.dmp Crash Time : 7/10/2010 7:19:07 PM Bug Check String : Bug Check Code : 0x00000116 Parameter 1 : 0x85cd0510 Parameter 2 : 0x8a61aba0 Parameter 3 : 0x00000000 Parameter 4 : 0x0000000d Caused By Driver : igdkmd32.sys Caused By Address : igdkmd32.sys+cba0 File Description : Intel Graphics Kernel Mode Driver Product Name : Intel Graphics Accelerator Drivers for Windows Vista(R) Company : Intel Corporation File Version : 7.14.10.1147 Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : dxgkrnl.sys+7bf71 Stack Address 2 : dxgkrnl.sys+7cc61 Stack Address 3 : dxgkrnl.sys+1938f Computer Name : Full Path : C:\Windows\Minidump\Mini071010-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 159,872 ================================================== ================================================== Dump File : Mini070510-01.dmp Crash Time : 7/5/2010 10:59:02 AM Bug Check String : Bug Check Code : 0x00000119 Parameter 1 : 0x00000001 Parameter 2 : 0x00000301 Parameter 3 : 0x0000031e Parameter 4 : 0x0000031d Caused By Driver : watchdog.sys Caused By Address : watchdog.sys+1230 File Description : Watchdog Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : watchdog.sys+1230 Stack Address 2 : dxgkrnl.sys+50b0 Stack Address 3 : dxgkrnl.sys+13a8 Computer Name : Full Path : C:\Windows\Minidump\Mini070510-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,872 ================================================== ================================================== Dump File : Mini070110-01.dmp Crash Time : 7/1/2010 7:16:08 PM Bug Check String : CRITICAL_OBJECT_TERMINATION Bug Check Code : 0x000000f4 Parameter 1 : 0x00000003 Parameter 2 : 0x9088ed90 Parameter 3 : 0x9088eedc Parameter 4 : 0x82434710 Caused By Driver : ntkrnlpa.exe Caused By Address : ntkrnlpa.exe+cdb8d File Description : NT Kernel & System Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18209 (vistasp2_gdr.100218-0019) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : ntkrnlpa.exe+29270c Stack Address 2 : ntkrnlpa.exe+1f0fbd Stack Address 3 : ntkrnlpa.exe+1f0f64 Computer Name : Full Path : C:\Windows\Minidump\Mini070110-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,872 ================================================== ================================================== Dump File : Mini063010-01.dmp Crash Time : 6/30/2010 10:58:40 AM Bug Check String : Bug Check Code : 0x00000119 Parameter 1 : 0x00000001 Parameter 2 : 0x00000000 Parameter 3 : 0x00000001 Parameter 4 : 0x00000001 Caused By Driver : watchdog.sys Caused By Address : watchdog.sys+1230 File Description : Watchdog Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : watchdog.sys+1230 Stack Address 2 : dxgkrnl.sys+50b0 Stack Address 3 : dxgkrnl.sys+138f Computer Name : Full Path : C:\Windows\Minidump\Mini063010-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,872 ================================================== ================================================== Dump File : Mini062610-01.dmp Crash Time : 6/26/2010 3:26:48 PM Bug Check String : Bug Check Code : 0x00000119 Parameter 1 : 0x00000001 Parameter 2 : 0x00002201 Parameter 3 : 0x00002207 Parameter 4 : 0x00002206 Caused By Driver : watchdog.sys Caused By Address : watchdog.sys+1230 File Description : Watchdog Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : watchdog.sys+1230 Stack Address 2 : dxgkrnl.sys+50b0 Stack Address 3 : dxgkrnl.sys+12fe Computer Name : Full Path : C:\Windows\Minidump\Mini062610-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,872 ================================================== ================================================== Dump File : Mini060910-01.dmp Crash Time : 6/9/2010 6:05:19 PM Bug Check String : Bug Check Code : 0x00000119 Parameter 1 : 0x00000001 Parameter 2 : 0x000009cb Parameter 3 : 0x000009f7 Parameter 4 : 0x000009f6 Caused By Driver : watchdog.sys Caused By Address : watchdog.sys+1230 File Description : Watchdog Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : watchdog.sys+1230 Stack Address 2 : dxgkrnl.sys+50b0 Stack Address 3 : dxgkrnl.sys+12fe Computer Name : Full Path : C:\Windows\Minidump\Mini060910-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,928 ================================================== ================================================== Dump File : Mini060810-01.dmp Crash Time : 6/8/2010 12:42:47 PM Bug Check String : Bug Check Code : 0x00000119 Parameter 1 : 0x00000001 Parameter 2 : 0x00000a54 Parameter 3 : 0x00000a0a Parameter 4 : 0x00000a09 Caused By Driver : watchdog.sys Caused By Address : watchdog.sys+1230 File Description : Watchdog Driver Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+cdb8d Stack Address 1 : watchdog.sys+1230 Stack Address 2 : dxgkrnl.sys+50b0 Stack Address 3 : dxgkrnl.sys+13a8 Computer Name : Full Path : C:\Windows\Minidump\Mini060810-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,928 ================================================== ================================================== Dump File : Mini041210-02.dmp Crash Time : 4/12/2010 11:26:26 AM Bug Check String : IRQL_NOT_LESS_OR_EQUAL Bug Check Code : 0x0000000a Parameter 1 : 0x00000000 Parameter 2 : 0x0000001b Parameter 3 : 0x00000001 Parameter 4 : 0x822b96e5 Caused By Driver : ntkrnlpa.exe Caused By Address : ntkrnlpa.exe+4dfd9 File Description : NT Kernel & System Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18209 (vistasp2_gdr.100218-0019) Processor : 32-bit Crash Address : ntkrnlpa.exe+4dfd9 Stack Address 1 : ntkrnlpa.exe+a76e5 Stack Address 2 : ntkrnlpa.exe+a769b Stack Address 3 : ntkrnlpa.exe+b10d8 Computer Name : Full Path : C:\Windows\Minidump\Mini041210-02.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,928 ================================================== ================================================== Dump File : Mini041210-01.dmp Crash Time : 4/12/2010 11:21:28 AM Bug Check String : IRQL_NOT_LESS_OR_EQUAL Bug Check Code : 0x0000000a Parameter 1 : 0x00000000 Parameter 2 : 0x00000002 Parameter 3 : 0x00000001 Parameter 4 : 0x822ced28 Caused By Driver : hal.dll Caused By Address : hal.dll+770c File Description : Hardware Abstraction Layer DLL Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+4dfd9 Stack Address 1 : ntkrnlpa.exe+b6d28 Stack Address 2 : ntkrnlpa.exe+84a73 Stack Address 3 : ntkrnlpa.exe+83fc5 Computer Name : Full Path : C:\Windows\Minidump\Mini041210-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6002 Dump File Size : 142,880 ================================================== ================================================== Dump File : Mini100409-01.dmp Crash Time : 10/4/2009 5:23:56 PM Bug Check String : UNEXPECTED_KERNEL_MODE_TRAP Bug Check Code : 0x0000007f Parameter 1 : 0x0000000d Parameter 2 : 0x00000000 Parameter 3 : 0x00000000 Parameter 4 : 0x00000000 Caused By Driver : nsiproxy.sys Caused By Address : nsiproxy.sys+319c File Description : NSI Proxy Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6001.18000 (longhorn_rtm.080118-1840) Processor : 32-bit Crash Address : ntkrnlpa.exe+5b497 Stack Address 1 : nsiproxy.sys+319c Stack Address 2 : nsiproxy.sys+2ea8 Stack Address 3 : nsiproxy.sys+2f91 Computer Name : Full Path : C:\Windows\Minidump\Mini100409-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6001 Dump File Size : 142,976 ================================================== ================================================== Dump File : Mini111208-01.dmp Crash Time : 11/12/2008 7:42:09 PM Bug Check String : PAGE_FAULT_IN_NONPAGED_AREA Bug Check Code : 0x00000050 Parameter 1 : 0xfcf88ce8 Parameter 2 : 0x00000000 Parameter 3 : 0x8cd90936 Parameter 4 : 0x00000000 Caused By Driver : hal.dll Caused By Address : hal.dll+75b0 File Description : Hardware Abstraction Layer DLL Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830) Processor : 32-bit Crash Address : ntkrnlpa.exe+a50f5 Stack Address 1 : ntkrnlpa.exe+5ab54 Stack Address 2 : win32k.sys+120936 Stack Address 3 : win32k.sys+1209dc Computer Name : Full Path : C:\Windows\Minidump\Mini111208-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6001 Dump File Size : 138,480 ================================================== ================================================== Dump File : Mini022408-01.dmp Crash Time : 2/24/2008 8:20:16 PM Bug Check String : DRIVER_POWER_STATE_FAILURE Bug Check Code : 0x0000009f Parameter 1 : 0x00000003 Parameter 2 : 0x84544700 Parameter 3 : 0x881363d0 Parameter 4 : 0x85f34008 Caused By Driver : ntkrnlpa.exe Caused By Address : ntkrnlpa.exe+d8681 File Description : NT Kernel & System Product Name : Microsoft® Windows® Operating System Company : Microsoft Corporation File Version : 6.0.6002.18209 (vistasp2_gdr.100218-0019) Processor : 32-bit Crash Address : ntkrnlpa.exe+d8681 Stack Address 1 : ntkrnlpa.exe+4b118 Stack Address 2 : ntkrnlpa.exe+4f166 Stack Address 3 : ntkrnlpa.exe+a99d1 Computer Name : Full Path : C:\Windows\Minidump\Mini022408-01.dmp Processors Count : 2 Major Version : 15 Minor Version : 6000 Dump File Size : 138,480 ================================================== You only had one BSOD since March/11. It was caused By Driver : igdkmd32.sys File Description : Intel Graphics Kernel Mode Driver. You could go to Intel and try to update that driver. I'd like to scan your machine with ESET OnlineScan •Hold down Control and click on the following link to open ESET OnlineScan in a new window. ESET OnlineScan •Click the button. •For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
•Click the button. •Accept any security warnings from your browser. •Check •Push the Start button. •ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time. •When the scan completes, push •Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply. •Push the button. •Push A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt |
|
| 1749. |
Solve : malware,.virus? |
|
Answer» UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG. IF REQUESTED, ZIP IT UP & ATTACH IT . DDS (Ver_2011-06-23.01) . Microsoft Windows XP Professional Boot Device: \Device\HarddiskVolume1 Install Date: 3/12/2011 9:08:41 AM System Uptime: 8/8/2011 11:25:10 PM (0 hours ago) . MOTHERBOARD: Intel Corporation | | D845PT Processor: Intel(R) Pentium(R) 4 CPU 1.70GHz | J1E1 | 1694/100mhz . ==== Disk Partitions ========================= . A: is Removable C: is FIXED (NTFS) - 38 GiB total, 21.918 GiB free. D: is CDROM () E: is FIXED (NTFS) - 93 GiB total, 75.583 GiB free. . ==== Disabled Device Manager Items ============= . Class GUID: {4D36E96F-E325-11CE-BFC1-08002BE10318} Description: Microsoft PS/2 Mouse Device ID: ACPI\PNP0F03\4&268D196D&0 Manufacturer: Microsoft Name: Microsoft PS/2 Mouse PNP Device ID: ACPI\PNP0F03\4&268D196D&0 Service: i8042prt . ==== System Restore Points =================== . RP99: 5/28/2011 1:47:55 AM - Software Distribution Service 3.0 RP100: 5/29/2011 1:48:23 AM - Software Distribution Service 3.0 RP101: 5/29/2011 2:12:10 AM - Software Distribution Service 3.0 RP102: 5/30/2011 1:48:06 AM - Software Distribution Service 3.0 RP103: 5/31/2011 1:48:15 AM - Software Distribution Service 3.0 RP104: 6/1/2011 1:49:15 AM - Software Distribution Service 3.0 RP105: 6/2/2011 4:24:45 PM - Software Distribution Service 3.0 RP106: 6/3/2011 4:18:44 PM - Software Distribution Service 3.0 RP107: 6/4/2011 4:18:56 PM - Software Distribution Service 3.0 RP108: 6/5/2011 1:39:41 AM - Software Distribution Service 3.0 RP109: 6/8/2011 12:11:50 AM - Software Distribution Service 3.0 RP110: 6/8/2011 11:56:50 PM - Software Distribution Service 3.0 RP111: 6/9/2011 11:57:18 PM - Software Distribution Service 3.0 RP112: 6/10/2011 11:57:05 PM - Software Distribution Service 3.0 RP113: 6/11/2011 11:57:03 PM - Software Distribution Service 3.0 RP114: 6/12/2011 2:01:40 AM - Software Distribution Service 3.0 RP115: 6/12/2011 11:56:53 PM - Software Distribution Service 3.0 RP116: 6/13/2011 11:57:06 PM - Software Distribution Service 3.0 RP117: 6/14/2011 11:56:48 PM - Software Distribution Service 3.0 RP118: 6/15/2011 11:57:02 PM - Software Distribution Service 3.0 RP119: 6/16/2011 11:56:46 PM - Software Distribution Service 3.0 RP120: 6/17/2011 7:00:15 AM - Software Distribution Service 3.0 RP121: 6/18/2011 7:41:53 AM - Software Distribution Service 3.0 RP122: 6/19/2011 2:13:18 AM - Software Distribution Service 3.0 RP123: 6/20/2011 2:39:41 AM - System Checkpoint RP124: 6/20/2011 7:41:56 AM - Software Distribution Service 3.0 RP125: 6/21/2011 7:46:43 AM - Software Distribution Service 3.0 RP126: 6/22/2011 7:41:30 AM - Software Distribution Service 3.0 RP127: 6/23/2011 7:41:44 AM - Software Distribution Service 3.0 RP128: 6/24/2011 7:41:32 AM - Software Distribution Service 3.0 RP129: 6/25/2011 7:55:19 AM - System Checkpoint RP130: 6/25/2011 6:57:31 PM - Software Distribution Service 3.0 RP131: 6/26/2011 2:30:03 AM - Software Distribution Service 3.0 RP132: 6/26/2011 6:57:16 PM - Software Distribution Service 3.0 RP133: 6/27/2011 6:57:21 PM - Software Distribution Service 3.0 RP134: 6/28/2011 6:58:12 PM - System Checkpoint RP135: 6/28/2011 10:56:14 PM - Software Distribution Service 3.0 RP136: 6/28/2011 11:59:56 PM - Software Distribution Service 3.0 RP137: 6/30/2011 12:32:27 AM - System Checkpoint RP138: 6/30/2011 1:34:47 AM - Software Distribution Service 3.0 RP139: 7/1/2011 1:34:18 AM - Software Distribution Service 3.0 RP140: 7/2/2011 1:34:46 AM - Software Distribution Service 3.0 RP141: 7/3/2011 1:34:12 AM - Software Distribution Service 3.0 RP142: 7/3/2011 1:55:10 AM - Software Distribution Service 3.0 RP143: 7/4/2011 1:34:07 AM - Software Distribution Service 3.0 RP144: 7/5/2011 1:34:19 AM - Software Distribution Service 3.0 RP145: 7/6/2011 1:34:32 AM - Software Distribution Service 3.0 RP146: 7/7/2011 1:34:37 AM - Software Distribution Service 3.0 RP147: 7/8/2011 1:34:18 AM - Software Distribution Service 3.0 RP148: 7/9/2011 2:21:46 AM - System Checkpoint RP149: 7/9/2011 5:23:43 PM - Software Distribution Service 3.0 RP150: 7/10/2011 1:47:26 AM - Software Distribution Service 3.0 RP151: 7/10/2011 5:23:32 PM - Software Distribution Service 3.0 RP152: 7/11/2011 5:23:49 PM - Software Distribution Service 3.0 RP153: 7/12/2011 5:23:55 PM - Software Distribution Service 3.0 RP154: 7/13/2011 7:00:16 AM - Software Distribution Service 3.0 RP155: 7/14/2011 7:23:58 AM - System Checkpoint RP156: 7/14/2011 7:25:56 AM - Software Distribution Service 3.0 RP157: 7/15/2011 7:25:50 AM - Software Distribution Service 3.0 RP158: 7/16/2011 7:25:16 AM - Software Distribution Service 3.0 RP159: 7/17/2011 2:29:50 AM - Software Distribution Service 3.0 RP160: 7/18/2011 3:23:39 AM - System Checkpoint RP161: 7/18/2011 7:26:01 AM - Software Distribution Service 3.0 RP162: 7/19/2011 7:25:32 AM - Software Distribution Service 3.0 RP163: 7/20/2011 7:25:33 AM - Software Distribution Service 3.0 RP164: 7/21/2011 7:25:49 AM - Software Distribution Service 3.0 RP165: 7/22/2011 7:25:31 AM - Software Distribution Service 3.0 RP166: 7/23/2011 7:25:22 AM - Software Distribution Service 3.0 RP167: 7/24/2011 2:29:00 AM - Software Distribution Service 3.0 RP168: 7/25/2011 3:23:22 AM - System Checkpoint RP169: 7/25/2011 7:25:26 AM - Software Distribution Service 3.0 RP170: 7/26/2011 7:25:11 AM - Software Distribution Service 3.0 RP171: 7/27/2011 7:27:37 AM - System Checkpoint RP172: 7/28/2011 7:53:52 AM - System Checkpoint RP173: 7/28/2011 11:13:09 PM - Installed STOPzilla. Available with Windows Installer version 1.2 and later. RP174: 7/29/2011 7:15:45 PM - Removed Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 RP175: 7/29/2011 7:16:31 PM - Removed Microsoft Silverlight RP176: 7/30/2011 2:32:58 PM - Online Armor installation RP177: 7/31/2011 10:00:03 AM - Removed STOPzilla. Available with Windows Installer version 1.2 and later. RP178: 8/1/2011 10:02:17 AM - System Checkpoint RP179: 8/2/2011 10:11:38 AM - System Checkpoint RP180: 8/3/2011 6:49:37 PM - System Checkpoint RP181: 8/4/2011 7:38:15 PM - System Checkpoint RP182: 8/7/2011 10:52:47 PM - System Checkpoint . ==== Installed Programs ====================== . Adobe AIR Adobe Flash Player 10 ActiveX Adobe Flash Player 10 Plugin Adobe Reader 9.4.5 CCleaner HOTFIX for Windows XP (KB2443685) Hotfix for Windows XP (KB952287) Hotfix for Windows XP (KB981793) Java Auto Updater Java(TM) 6 Update 24 JDownloader 0.9 Microsoft Antimalware Microsoft Application Error Reporting Microsoft Security Client Microsoft Security Essentials Mozilla Firefox (3.6.18) Online Armor 5.0 Security Update for Windows Internet Explorer 8 (KB2482017) Security Update for Windows Internet Explorer 8 (KB2497640) Security Update for Windows Internet Explorer 8 (KB2510531) Security Update for Windows Internet Explorer 8 (KB2530548) Security Update for Windows Internet Explorer 8 (KB2544521) Security Update for Windows Internet Explorer 8 (KB971961) Security Update for Windows Internet Explorer 8 (KB981332) Security Update for Windows Internet Explorer 8 (KB982381) Security Update for Windows Media Player (KB2378111) Security Update for Windows Media Player (KB952069) Security Update for Windows Media Player (KB954155) Security Update for Windows Media Player (KB973540) Security Update for Windows Media Player (KB975558) Security Update for Windows Media Player (KB978695) Security Update for Windows Media Player (KB979402) Security Update for Windows XP (KB2079403) Security Update for Windows XP (KB2115168) Security Update for Windows XP (KB2121546) Security Update for Windows XP (KB2229593) Security Update for Windows XP (KB2259922) Security Update for Windows XP (KB2296011) Security Update for Windows XP (KB2347290) Security Update for Windows XP (KB2360937) Security Update for Windows XP (KB2387149) Security Update for Windows XP (KB2393802) Security Update for Windows XP (KB2412687) Security Update for Windows XP (KB2419632) Security Update for Windows XP (KB2423089) Security Update for Windows XP (KB2440591) Security Update for Windows XP (KB2443105) Security Update for Windows XP (KB2476490) Security Update for Windows XP (KB2476687) Security Update for Windows XP (KB2478960) Security Update for Windows XP (KB2478971) Security Update for Windows XP (KB2479628) Security Update for Windows XP (KB2479943) Security Update for Windows XP (KB2481109) Security Update for Windows XP (KB2482017) Security Update for Windows XP (KB2483185) Security Update for Windows XP (KB2485376) Security Update for Windows XP (KB2485663) Security Update for Windows XP (KB2503658) Security Update for Windows XP (KB2503665) Security Update for Windows XP (KB2506212) Security Update for Windows XP (KB2506223) Security Update for Windows XP (KB2507618) Security Update for Windows XP (KB2507938) Security Update for Windows XP (KB2508272) Security Update for Windows XP (KB2508429) Security Update for Windows XP (KB2509553) Security Update for Windows XP (KB2511455) Security Update for Windows XP (KB2524375) Security Update for Windows XP (KB2535512) Security Update for Windows XP (KB2536276) Security Update for Windows XP (KB2544893) Security Update for Windows XP (KB2555917) Security Update for Windows XP (KB923561) Security Update for Windows XP (KB923789) Security Update for Windows XP (KB946648) Security Update for Windows XP (KB950762) Security Update for Windows XP (KB950974) Security Update for Windows XP (KB951376-v2) Security Update for Windows XP (KB951748) Security Update for Windows XP (KB952004) Security Update for Windows XP (KB952954) Security Update for Windows XP (KB955069) Security Update for Windows XP (KB956572) Security Update for Windows XP (KB956744) Security Update for Windows XP (KB956802) Security Update for Windows XP (KB956803) Security Update for Windows XP (KB956844) Security Update for Windows XP (KB958644) Security Update for Windows XP (KB958869) Security Update for Windows XP (KB959426) Security Update for Windows XP (KB960225) Security Update for Windows XP (KB960803) Security Update for Windows XP (KB960859) Security Update for Windows XP (KB961501) Security Update for Windows XP (KB969059) Security Update for Windows XP (KB970238) Security Update for Windows XP (KB970430) Security Update for Windows XP (KB971468) Security Update for Windows XP (KB971657) Security Update for Windows XP (KB971961) Security Update for Windows XP (KB972270) Security Update for Windows XP (KB973507) Security Update for Windows XP (KB973869) Security Update for Windows XP (KB973904) Security Update for Windows XP (KB974112) Security Update for Windows XP (KB974318) Security Update for Windows XP (KB974392) Security Update for Windows XP (KB974571) Security Update for Windows XP (KB975025) Security Update for Windows XP (KB975467) Security Update for Windows XP (KB975560) Security Update for Windows XP (KB975561) Security Update for Windows XP (KB975562) Security Update for Windows XP (KB975713) Security Update for Windows XP (KB977816) Security Update for Windows XP (KB977914) Security Update for Windows XP (KB978037) Security Update for Windows XP (KB978338) Security Update for Windows XP (KB978542) Security Update for Windows XP (KB978601) Security Update for Windows XP (KB978706) Security Update for Windows XP (KB979309) Security Update for Windows XP (KB979482) Security Update for Windows XP (KB979559) Security Update for Windows XP (KB979683) Security Update for Windows XP (KB979687) Security Update for Windows XP (KB980195) Security Update for Windows XP (KB980218) Security Update for Windows XP (KB980232) Security Update for Windows XP (KB980436) Security Update for Windows XP (KB981322) Security Update for Windows XP (KB981349) Security Update for Windows XP (KB981997) Security Update for Windows XP (KB982132) Security Update for Windows XP (KB982214) Security Update for Windows XP (KB982381) Security Update for Windows XP (KB982665) SUPERAntiSpyware Update for Windows Internet Explorer 8 (KB2447568) Update for Windows Internet Explorer 8 (KB976662) Update for Windows XP (KB2141007) Update for Windows XP (KB2345886) Update for Windows XP (KB2467659) Update for Windows XP (KB2541763) Update for Windows XP (KB951978) Update for Windows XP (KB955759) Update for Windows XP (KB967715) Update for Windows XP (KB968389) Update for Windows XP (KB971029) Update for Windows XP (KB971737) Update for Windows XP (KB973687) Update for Windows XP (KB973815) VLC media player 1.1.9 WebFldrs XP Windows Genuine Advantage Notifications (KB905474) Windows Internet Explorer 8 Windows XP Service Pack 3 WinRAR 4.00 (32-bit) Xvid 1.2.2 final uninstall . ==== Event Viewer Messages From Past Week ======== . 8/8/2011 8:27:21 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\Administrator Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 8:27:21 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\Administrator Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 8:27:21 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\Administrator Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 8:27:21 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\Administrator Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 8:27:19 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/8/2011 7:22:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 7:22:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 7:22:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 7:22:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 7:21:48 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/8/2011 7:12:33 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 7:12:33 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 7:12:33 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 7:12:33 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 7:12:28 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/8/2011 6:33:29 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 6:33:29 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 6:33:29 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 6:33:29 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 6:33:09 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/8/2011 6:31:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 6:31:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 6:31:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 6:31:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 6:30:56 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/8/2011 6:23:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 6:23:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 6:23:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 6:23:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 6:23:13 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/8/2011 4:47:05 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 4:47:05 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 4:47:05 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 4:47:05 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied. 8/8/2011 4:46:44 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/8/2011 4:32:29 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 4:32:29 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 4:32:29 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 4:32:29 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/8/2011 4:32:05 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/7/2011 2:09:25 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/7/2011 2:09:25 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/7/2011 2:09:25 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/7/2011 2:09:25 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/7/2011 2:09:24 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/6/2011 11:40:11 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/6/2011 11:40:11 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/6/2011 11:40:11 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/6/2011 11:40:11 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/6/2011 11:39:49 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/5/2011 11:40:10 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/5/2011 11:40:10 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/5/2011 11:40:10 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/5/2011 11:40:10 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/5/2011 11:39:49 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/4/2011 6:40:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/4/2011 6:40:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/4/2011 6:40:07 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/4/2011 6:40:07 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found 8/4/2011 6:39:43 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/3/2011 5:01:05 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service EventSystem with arguments "" in order to run the server: {1BE1F766-5536-11D1-B726-00C04FB926AF} 8/2/2011 9:50:23 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/2/2011 10:55:30 PM, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: Fips MpFilter OADevice oahlpXX Processor SASDIFSV SASKUTIL 8/1/2011 9:55:29 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service netman with arguments "" in order to run the server: {BA126AE5-2166-11D1-B1D0-00805FC1270E} 8/1/2011 6:08:47 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service. 8/1/2011 11:00:30 PM, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: AFD Fips IPSec MpFilter MRxSmb NetBIOS NetBT OADevice oahlpXX OAmon OAnet Processor RasAcd Rdbss SASDIFSV SASKUTIL Tcpip 8/1/2011 11:00:30 PM, error: Service Control Manager [7001] - The TCP/IP NetBIOS Helper service depends on the AFD service which failed to start because of the following error: A device attached to the system is not functioning. 8/1/2011 11:00:30 PM, error: Service Control Manager [7001] - The IPSEC Services service depends on the IPSEC driver service which failed to start because of the following error: A device attached to the system is not functioning. 8/1/2011 11:00:30 PM, error: Service Control Manager [7001] - The DNS Client service depends on the TCP/IP Protocol Driver service which failed to start because of the following error: A device attached to the system is not functioning. 8/1/2011 11:00:30 PM, error: Service Control Manager [7001] - The DHCP Client service depends on the NetBios over Tcpip service which failed to start because of the following error: A device attached to the system is not functioning. . ==== End Of File ===========================What happens when you try to boot in Normal Mode? Download OTL to your desktop. * Open OTL * Copy and Paste the following text in the codebox into the Custom Scans/Fixes window. Code: [Select]:OTL BHO: {c3721e85-f0ac-4b7e-ae4c-3e738011dc9d} - No File TB: {c3721e85-f0ac-4b7e-ae4c-3e738011dc9d} - No File :COMMANDS [resethosts] [purity] [emptytemp] [start explorer] * Click Run Fix * OTLI2 may ask to reboot the machine. Please do so if asked. * Click OK * A report will open. Copy and Paste that report in your next reply. ***************************************************************** Please download ComboFix from BleepingComputer.com Alternate link: GeeksToGo.com and save it to your Desktop. It would be easiest to download using Internet Explorer. If you insist on using Firefox, make sure that your download settings are as follows: * Tools->Options->Main tab * Set to "Always ask me where to Save the files". Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools A guide to do this can be found here Double click ComboFix.exe & follow the prompts. As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware. Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures. Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message: Click on Yes, to continue scanning for malware. When finished, it shall PRODUCE a log for you. Please include the contents of C:\ComboFix.txt in your next reply. If you have problems with ComboFix usage, see How to use ComboFixAll processes killed Error: Unable to interpret in the current context! Error: Unable to interpret in the current context! ========== COMMANDS ========== C:\WINDOWS\System32\drivers\etc\Hosts moved successfully. HOSTS file reset successfully [EMPTYTEMP] User: Administrator ->Temp folder emptied: 1167840 bytes ->Temporary Internet Files folder emptied: 116929 bytes User: Administrator.REBUILT-8C81CD7 ->Temp folder emptied: 903874 bytes ->Temporary Internet Files folder emptied: 25268254 bytes ->Flash cache emptied: 56958 bytes User: All Users User: All Users.WINDOWS User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33170 bytes User: Default User.WINDOWS ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33170 bytes ->Flash cache emptied: 56502 bytes User: Guest ->Temp folder emptied: 513062 bytes ->Temporary Internet Files folder emptied: 28352944 bytes ->Flash cache emptied: 434 bytes User: LocalService ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 16001632 bytes ->Flash cache emptied: 24843 bytes User: LocalService.NT AUTHORITY ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33664 bytes User: nelson burke ->Temp folder emptied: 28738620 bytes ->Temporary Internet Files folder emptied: 2098148 bytes ->Java cache emptied: 331395 bytes ->FireFox cache emptied: 46943515 bytes ->Flash cache emptied: 622 bytes User: NetworkService ->Temp folder emptied: 23540886 bytes ->Temporary Internet Files folder emptied: 365879419 bytes ->Flash cache emptied: 53771 bytes User: NetworkService.NT AUTHORITY ->Temp folder emptied: 585062 bytes ->Temporary Internet Files folder emptied: 33170 bytes User: new ->Temp folder emptied: 484 bytes ->Temporary Internet Files folder emptied: 46054554 bytes ->Flash cache emptied: 434 bytes User: Owner ->Temp folder emptied: 49423059 bytes ->Temporary Internet Files folder emptied: 1370736 bytes ->Java cache emptied: 35673306 bytes ->Flash cache emptied: 66514 bytes %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 4360845 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32\dllcache .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 91711 bytes %systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 33170 bytes RecycleBin emptied: 0 bytes Total Files Cleaned = 646.00 mb ComboFix 11-08-09.02 - Administrator 08/09/2011 22:21:57.1.1 - x86 NETWORK Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1023.750 [GMT -4:00] Running from: c:\documents and settings\Administrator.REBUILT-8C81CD7\Desktop\ComboFix.exe AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095} FW: Online Armor Firewall *Enabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A} . . ((((((((((((((((((((((((((((((((((((((( Other Deletions ))))))))))))))))))))))))))))))))))))))))))))))))) . . c:\windows\ystem3~1 . . ((((((((((((((((((((((((( Files Created from 2011-07-10 to 2011-08-10 ))))))))))))))))))))))))))))))) . . 2011-08-10 01:59 . 2011-07-20 13:446881616----a-w-c:\documents and settings\All Users.WINDOWS\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll 2011-08-10 01:59 . 2011-07-20 13:446881616----a-w-c:\documents and settings\All Users.WINDOWS\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F8A0CFBE-7BB8-4C64-9E1A-AC53421E6F88}\mpengine.dll 2011-08-09 23:38 . 2011-08-09 23:38--------d-----w-C:\_OTL 2011-08-09 03:57 . 2011-08-09 03:57--------d-----w-c:\documents and settings\All Users.WINDOWS\Application Data\WinZip 2011-08-03 21:31 . 2011-08-03 21:319830----a-w-c:\program files\exefix.reg 2011-08-03 20:45 . 2008-04-14 00:12146432----a-w-c:\windows\regedit.com 2011-07-31 03:07 . 2011-07-31 03:07--------d-----w-c:\documents and settings\nelson burke\Application Data\SUPERAntiSpyware.com 2011-07-31 03:07 . 2011-07-31 03:07--------d-----w-c:\documents and settings\All Users.WINDOWS\Application Data\SUPERAntiSpyware.com 2011-07-31 03:06 . 2011-08-09 03:34--------d-----w-c:\program files\SUPERAntiSpyware 2011-07-30 22:35 . 2011-07-30 22:35--------d-----w-c:\program files\CCleaner 2011-07-30 18:34 . 2011-07-30 19:00--------d-----w-c:\documents and settings\All Users.WINDOWS\Application Data\OnlineArmor 2011-07-30 18:34 . 2011-07-30 18:35--------d-----w-c:\documents and settings\nelson burke\Application Data\OnlineArmor 2011-07-30 18:32 . 2011-04-06 17:0239048----a-w-c:\windows\system32\drivers\oahlp32.sys 2011-07-30 18:32 . 2011-04-06 17:0129464----a-w-c:\windows\system32\drivers\OAnet.sys 2011-07-30 18:32 . 2011-04-06 17:0125192----a-w-c:\windows\system32\drivers\OAmon.sys 2011-07-30 18:32 . 2011-04-06 17:01205864----a-w-c:\windows\system32\drivers\OADriver.sys 2011-07-30 18:31 . 2011-08-09 04:56--------d-----w-c:\program files\Online Armor 2011-07-30 11:51 . 2011-08-08 23:12--------d-----w-c:\program files\Microsoft Security Client 2011-07-29 23:16 . 2011-07-30 03:13--------d-----w-c:\windows\SxsCaPendDel 2011-07-29 23:03 . 2011-07-29 23:03--------d--h--w-c:\windows\PIF 2011-07-29 03:13 . 2011-07-31 14:00--------d-----w-c:\documents and settings\All Users.WINDOWS\Application Data\STOPzilla! 2011-07-29 03:01 . 2011-07-29 03:01--------d-sh--w-c:\documents and settings\LocalService.NT AUTHORITY\IETldCache 2011-07-29 02:54 . 2011-07-31 13:12--------d-----w-c:\program files\PC Tools Security 2011-07-29 02:51 . 2011-07-29 02:51--------d--h--w-c:\windows\system32\GroupPolicy 2011-07-29 02:51 . 2011-07-30 19:22--------d---a-w-c:\documents and settings\All Users.WINDOWS\Application Data\TEMP 2011-07-27 20:49 . 2011-07-27 20:49--------d-----w-c:\documents and settings\nelson burke\Application Data\Malwarebytes 2011-07-27 20:47 . 2011-07-27 20:47--------d-----w-c:\documents and settings\nelson burke\Local Settings\Application Data\Thinstall 2011-07-27 20:47 . 2011-07-27 20:47--------d-----w-c:\documents and settings\nelson burke\Application Data\Thinstall 2011-07-27 03:48 . 2011-07-27 03:49--------d-----w-c:\program files\File Scanner Library (Spybot - Search & Destroy) 2011-07-27 03:46 . 2011-07-30 22:43--------d-----w-c:\documents and settings\All Users.WINDOWS\Application Data\Spybot - Search & Destroy 2011-07-27 03:42 . 2011-07-27 03:43--------d-----w-c:\documents and settings\Administrator.REBUILT-8C81CD7 2011-07-18 04:26 . 2011-08-08 23:18--------d-----w-c:\program files\JDownloader . . . (((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))) . 2011-07-30 18:29 . 2011-06-18 10:26404640----a-w-c:\windows\system32\FlashPlayerCPLApp.cpl 2011-06-02 14:02 . 2007-07-27 12:001858944----a-w-c:\windows\system32\win32k.sys . . ((((((((((((((((((((((((((((((((((((( Reg Loading Points )))))))))))))))))))))))))))))))))))))))))))))))))) . . *Note* empty entries & legit default entries are not shown REGEDIT4 . [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-06-08 37296] "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920] "SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-10-29 249064] "@OnlineArmor GUI"="c:\program files\Online Armor\OAui.exe" [2011-04-06 2477032] . c:\documents and settings\All Users.WINDOWS\Start Menu\Programs\Startup\ WinZip Quick Pick.lnk - e:\program files\WinZip\WZQKPICK.EXE [2009-1-14 525664] . [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks] "{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\ONLINE~2\oaevent.dll" [2011-04-06 354720] "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824] . [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon] 2009-09-03 22:21548352----a-w-c:\program files\SUPERAntiSpyware\SASWINLO.DLL . [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc] @="Service" . [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile] "EnableFirewall"= 0 (0x0) . [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List] "%windir%\\system32\\sessmgr.exe"= "%windir%\\Network Diagnostic\\xpnetdiag.exe"= . R1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [7/30/2011 2:32 PM 25192] R1 OAnet;OAnet;c:\windows\system32\drivers\OAnet.sys [7/30/2011 2:32 PM 29464] S1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [7/30/2011 2:32 PM 205864] S1 oahlpXX;Online Armor helper driver;c:\windows\system32\drivers\oahlp32.sys [7/30/2011 2:32 PM 39048] S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/12/2011 5:55 PM 12880] S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 5:55 PM 67664] S2 OAcat;Online Armor Helper Service;c:\program files\Online Armor\oacat.exe [7/30/2011 2:31 PM 381512] S2 SvcOnlineArmor;Online Armor;c:\program files\Online Armor\oasrv.exe [7/30/2011 2:31 PM 4326472] . Contents of the 'Scheduled Tasks' folder . 2011-08-10 c:\windows\Tasks\MP Scheduled Scan.job - c:\program files\Microsoft Security Client\Antimalware\MpCmdRun.exe [2010-11-11 16:26] . . ------- Supplementary Scan ------- . TCP: DhcpNameServer = 192.168.1.1 FF - ProfilePath - . - - - - ORPHANS REMOVED - - - - . Toolbar-Locked - (no file) HKLM-Run-MSC - c:\program files\Microsoft Security Client\msseces.exe Notify-TPSvc - TPSvc.dll . . . ************************************************************************** . catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2011-08-09 22:28 Windows 5.1.2600 Service Pack 3 NTFS . scanning hidden processes ... . scanning hidden autostart entries ... . scanning hidden files ... . scan completed successfully hidden files: 0 . ************************************************************************** . --------------------- LOCKED REGISTRY KEYS --------------------- . [HKEY_USERS\S-1-5-21-842925246-1425521274-725345543-500\Software\Microsoft\Internet Explorer\User Preferences] @Denied: (2) (Administrator) "88D7D0879DAB32E14DE5B3A805A34F98AFF34F5 977"=hex:01,00,00,00,d0,8c,9d,df,01,15, d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,a0,e4,c9,e9,40,c9,78,40,93,3e,2c,\ "2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839 E81"=hex:01,00,00,00,d0,8c,9d,df,01,15, d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,a0,e4,c9,e9,40,c9,78,40,93,3e,2c,\ . --------------------- DLLs Loaded Under Running Processes --------------------- . - - - - - - - > 'winlogon.exe'(384) c:\program files\SUPERAntiSpyware\SASWINLO.DLL c:\windows\system32\WININET.dll c:\windows\system32\l3codeca.acm . - - - - - - - > 'explorer.exe'(1212) c:\windows\system32\WININET.dll c:\windows\system32\ieframe.dll . Completion time: 2011-08-09 22:31:20 ComboFix-quarantined-files.txt 2011-08-10 02:31 . Pre-Run: 24,017,367,040 bytes free Post-Run: 23,975,112,704 bytes free . WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe [boot loader] timeout=2 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons UnsupportedDebug="do not select this" /debug multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /noexecute=optin multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect [spybotsd] timeout.old=30 . - - End Of File - - 16DB893E0679898BE3BFC50328BE0710 OTL by OldTimer - Version 3.2.26.1 log created on 08092011_193854 Files\Folders moved on Reboot... File\Folder C:\Documents and Settings\Administrator.REBUILT-8C81CD7\Local Settings\Temp\~DFB35B.tmp not found! File\Folder C:\Documents and Settings\Administrator.REBUILT-8C81CD7\Local Settings\Temp\~DFB378.tmp not found! File\Folder C:\Documents and Settings\Administrator.REBUILT-8C81CD7\Local Settings\Temp\~DFB63D.tmp not found! File\Folder C:\Documents and Settings\Administrator.REBUILT-8C81CD7\Local Settings\Temp\~DFB6DE.tmp not found! C:\Documents and Settings\Administrator.REBUILT-8C81CD7\Local Settings\Temporary Internet Files\Content.IE5\R1OYDZ9H\topic,121989.15[1].html moved successfully. Registry entries deleted on Reboot... hi SuperDave, it looks like my system is fixedI still cannot run some programs by double clicking I think I may have renamed them so as I load them I will undo rename them Is there any way you can tell if it is cleaned? Thank you for all your help I will let others know about this site N.B.Quote it looks like my system is fixedI still cannot run some programs by double clicking I think I may have renamed them so as I load them I will undo rename them Is there any way you can tell if it is cleaned? Thank you for all your help I will let others know about this site N.B.I'm not finished cleaning the computer. Please stick with me for a few more scans. Please download Rooter and Save it to your desktop.
. SeDebugPrivilege granted successfully ... . Windows XP . (5.1.2600) Service Pack 3 [32_bits] - x86 Family 15 Model 1 Stepping 2, GenuineIntel . [wscsvc] (Security Center) RUNNING (state:4) [SharedAccess] RUNNING (state:4) Windows Firewall -> Disabled ! . Internet Explorer 8.0.6001.18702 Mozilla Firefox 3.6.18 (en-US) . A:\ [Removable] C:\ [Fixed-NTFS] .. ( Total:38 Go - Free:20 Go ) D:\ [CD_Rom] E:\ [Fixed-NTFS] .. ( Total:93 Go - Free:74 Go ) . Scan : 16:34.27 Path : C:\Documents and Settings\nelson burke\Desktop\Rooter.exe User : nelson burke ( Administrator -> YES ) . ----------------------\\ Processes . Locked [System Process] (0) ______ System (4) ______ \SystemRoot\System32\smss.exe (360) ______ \??\C:\WINDOWS\system32\csrss.exe (408) ______ \??\C:\WINDOWS\system32\winlogon.exe (432) ______ C:\WINDOWS\system32\services.exe (476) ______ C:\WINDOWS\system32\lsass.exe (488) ______ C:\WINDOWS\system32\svchost.exe (640) ______ C:\WINDOWS\system32\svchost.exe (696) ______ C:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe (736) ______ C:\WINDOWS\System32\svchost.exe (772) ______ C:\WINDOWS\system32\svchost.exe (864) ______ C:\WINDOWS\system32\svchost.exe (1028) ______ C:\Program Files\Online Armor\OAcat.exe (1216) ______ C:\WINDOWS\Explorer.EXE (1224) ______ C:\Program Files\Online Armor\oasrv.exe (1296) ______ C:\WINDOWS\system32\spoolsv.exe (1652) ______ C:\WINDOWS\system32\svchost.exe (1968) ______ C:\Program Files\Java\jre6\bin\jqs.exe (212) ______ C:\WINDOWS\System32\alg.exe (2224) ______ C:\WINDOWS\system32\devldr32.exe (2704) ______ C:\Program Files\Common Files\Java\Java Update\jusched.exe (3160) ______ C:\Program Files\Online Armor\OAui.exe (3192) ______ C:\WINDOWS\system32\ctfmon.exe (3228) ______ E:\Program Files\WinZip\WZQKPICK.EXE (3308) ______ C:\Program Files\Online Armor\OAhlp.exe (3420) ______ C:\Program Files\internet explorer\iexplore.exe (3796) ______ C:\Program Files\internet explorer\iexplore.exe (2908) ______ C:\WINDOWS\system32\wuauclt.exe (400) ______ C:\Program Files\internet explorer\iexplore.exe (2680) ______ C:\Documents and Settings\nelson burke\Desktop\Rooter.exe (388) . ----------------------\\ Device\Harddisk0\ . \Device\Harddisk0 [Sectors : 63 x 512 Bytes] . \Device\Harddisk0\Partition1 --[ MBR ]-- (Start_Offset:32256 | Length:41101691904) . ----------------------\\ Scheduled Tasks . C:\WINDOWS\Tasks\desktop.ini C:\WINDOWS\Tasks\MP Scheduled Scan.job C:\WINDOWS\Tasks\SA.DAT . ----------------------\\ Registry . . ----------------------\\ Files & Folders . ----------------------\\ Scan completed at 16:34.29 . C:\Rooter$\Rooter_1.txt - (13/08/2011 | 16:34.29) Here is the ROOTER Log,I'd like to scan your machine with ESET OnlineScan •Hold down Control and click on the following link to open ESET OnlineScan in a new window. ESET OnlineScan •Click the button. •For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
•Click the button. •Accept any security warnings from your browser. •Check •Push the Start button. •ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time. •When the scan completes, push •Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply. •Push the button. •Push A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt Here is ESETS LOGC :\Documents and Settings\nelson burke\My Documents\Downloads\Xvid-Setup-dm-6.exeWin32/Toolbar.Zugo applicationdeleted - quarantined C:\System Volume Information\_restore{25A6172B-8545-494B-A5E8-CA595D0FB942}\RP178\A0010372.exeWin32/RegistryBooster applicationdeleted - quarantined C:\System Volume Information\_restore{25A6172B-8545-494B-A5E8-CA595D0FB942}\RP178\A0010377.exeWin32/RegistryBooster applicationdeleted - quarantined That looks good. If there are no other issues, we can do some cleanup. To uninstall ComboFix
(Note: Make sure there's a space between the word ComboFix and the forward-slash.)
To remove all of the tools we used and the files and folders they created do the following: Double click OTL.exe.
**************************************************** Clean out your temporary internet files and temp files. Download TFC by OldTimer to your desktop. Double-click TFC.exe to run it. Note: If you are running on Vista, right-click on the file and choose Run As Administrator TFC will close all programs when run, so make sure you have saved all your work before you begin. * Click the Start button to begin the cleaning process. * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two. * Please let TFC run uninterrupted until it is finished. Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning. ****************************************************** Use the Secunia Software Inspector to check for out of date software. •Click Start Now •Check the box next to Enable thorough system inspection. •Click Start •Allow the scan to finish and scroll down to see if any updates are needed. •Update anything listed. . ---------- Go to Microsoft Windows Update and get all critical updates. ---------- I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free. SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox. * Using SpywareBlaster to protect your computer from Spyware and Malware * If you don't know what ActiveX controls are, see here Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future. Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly. Safe Surfing! |
|
| 1750. |
Solve : Virus from a website?? |
|
Answer» A while back my friend told me that you could get a virus, just by going to a certain site. You didn't NEED to download anything, just by visiting the site, you get a virus. Is this even possible?you can get a lot from sex or porn sites and other bad ones Quote from: harry 48 on May 10, 2009, 11:48:18 AM you can get a lot from sex or porn sites and other bad onesLike just by going to the site, not clicking on any links, not downloading anything...just by going to the site?If you have no (or a very bad) antivirus software installed, you can get infected just by clicking websites. Some basic information here: http://askabouttech.com/can-you-get-a-virus-from-visiting-a-website/Quote from: Carbon Dudeoxide on May 10, 2009, 11:55:59 AM If you have no (or a very bad) antivirus software installed, you can get infected just by clicking websites.If I have IE6 and McAfee (which get's updated maybe once a year) and Windows Firewall is disabled (I'm not sure if McAfee has a firewall), do you think if I went to an infected site I would get infected too?Yes. First, McAfee has a very low detection rate. ALSO, updating it once a year? Might as well not have an antivirus. Remove McAfee with its tool here: http://service.mcafee.com/FAQDocument.aspx?id=TS100507&lc=1033 Now get a REAL antivirus software. A few free antivirus software include Avira, Avast and AVG Free. http://www.free-av.com/ http://www.avast.com/eng/download-avast-home.html http://free.avg.com/ Any reason why your Firiewall is turned off?Quote from: Helpmeh on May 10, 2009, 12:01:13 PM do you think if I went to an infected site I would get infected too? Yes ... of course ... I can send you to a nice site.....you'll understand fully as soon as the page opens. I use it to practice .....you may be in for a shock when you run a decent AV program.Try downloading this: http://www.eicar.org/download/eicar_com.zip What does your antivirus do? (Note: It is a completely harmless Antivirus Test File by Eicar: http://www.eicar.org/anti_virus_test_file.htm)There are many 'experts' who think that if you are very carefully you will not ever be infected by any kind of bad virus, worm or Trojan or something like that. The truth is that all AV software is based on the premise that we already know what the virus will look like or what it can do. That is a false assumption. Nobody has calculated how many different ways there are to compromise a PC or any other kind of electronic information transport system. But this is not said here to discourage you from being careful. No, always be careful. The more effort you take to protect your PC puts the odds in your favor.In beginners terms... Back yourself up with a really good anti-virus software. Dont open any emails unless you regonise the author. Use a anti-virus software that recognises dodgy websites.Quote In beginners terms... Back yourself up with a really good anti-virus software. Dont open any emails unless you regonise the author. Use a anti-virus software that recognises dodgy websites.Exactly. The only THING I would add to that is put your valuable documents, photos and music ONTO CDs or DVDS for safekeeping. I may not be a "specialist" but I talked with a guy that had alot of experince and you guys are seeming flakey. You can go to myspace and get infected, its not a matter of if I go to pornusall.com I'm going to get trojans. Not a real site only example.Quote from: Carbon Dudeoxide on May 10, 2009, 07:59:17 PM Yes.Because if anything bad does happen, deepfreeze just resets...so "It's all good girls"...I love that quote. |
|