Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1701.

Solve : A Virus or some sort of Malware?

Answer»

I thought (or at least hoped) it would never happen to me, but alas, it has. I get several msgs (all associated with getting me to buy"AntiVirus SOFT") along with some silly porn page(?s). One of the several msgs has something to do with an application failing to run. It SEEMS that none of my executable run anymore. Can you folks help?Please download exeHelper

  • Double-click on exeHelper.com to run the fix.
  • A black WINDOW should pop up, press any key to close once the fix is COMPLETED.
  • Post the contents of LOG.txt (Will be created in the directory where you ran exeHelper.com)
Note: If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together (they will both be in the one file).
1702.

Solve : Windows Live or something???

Answer»

Hello. for the PAST 3 days something would auto open window LIVE chats on my friends LIST and send a link to them and then close the chat fast.. I can see it open and close.. i asked my friend if i sent them a link and he sent a pic of it.. Why is it doing this? My friend said the link was a key LOGGER.. How do i remove it?Please visit this webpage for a tutorial on downloading and running ComboFix:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

See the AREA: Using ComboFix, and when done, post the log back here.

1703.

Solve : Some virus problems?

Answer»

You need to let MBAM fix those.


Open HijackThis and SELECT Do a system scan only

Place a check mark next to the following ENTRIES: (if there)

- O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
- O9 - Extra \'Tools\' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm


Important: Close all open windows except for HijackThis and then click Fix checked.

Once completed, exit HijackThis.

----------

Please run TDSSKiller per the below steps:

* Go to TDSSKiller and Download TDSSKiller.zip to your Desktop
* Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any sub-folder of the Desktop.
* Click Start > Run and copy/paste the following Red text into Run box and hit Enter on your keyboard.

"%userprofile%\Desktop\TDSSKiller.exe" -v

* Follow the instructions to type in "delete" when it asks you what to do when if finds something.
* When done, a log file should be created on your C: drive called 'TDSSKiller.txt' please add this log to your next reply.Done, TDSSkiller came up with nothing. and saved no logfile.Update: I am now having trouble clicking things in my browser window, I can't open links or click buttons. I am only able to post this by going through history and finding the history link to me posting from before



Okay this is strange. sometimes I can't click links, highlite text, or click buttons like post/modify. but if I minimize then maximize I can then do the previously mentioned, however I can't switch tabs. I minimize and maxmize and its back to the first problemTry this.

Download Rooter.exe to your desktop.

* Double click Rooter.exe to start the tool.
* A DOS window will appear and show the scan progress.
* Once complete a notepad file containing the report will open.
* Copy & paste the results in your next reply.
* Close notepad and Rooter will close.

A log will also save at C:\Rooter.txtRooter.exe (v1.0.2) by Eric_71
.
SeDebugPrivilege granted successfully ...
.
Windows XP Home Edition (5.1.2600) Service Pack 1
[32_bits] - x86 Family 6 Model 7 Stepping 6, GenuineIntel
.
[wscsvc] STOPPED (state:1) : Security Center -> Disabled !
[SharedAccess] RUNNING (state:4)
.
Internet Explorer 6.0.2800.1106
Mozilla Firefox 3.5.7 (en-US)
.
A:\ [Removable]
C:\ [Fixed-NTFS] .. ( Total:68 Go - Free:32 Go )
D:\ [CD_Rom]
E:\ [Fixed-NTFS] .. ( Total:139 Go - Free:114 Go )
F:\ [Fixed-NTFS] .. ( Total:229 Go - Free:222 Go )
.
Scan : 18:04.46
Path : C:\Documents and Settings\Mark\Desktop\Rooter.exe
User : Mark ( Administrator -> YES )
.
----------------------\\ Processes
.
Locked [System Process] (0)
______ System (4)
______ \SystemRoot\System32\smss.exe (968)
______ \??\C:\WINDOWS\system32\csrss.exe (1024)
______ \??\C:\WINDOWS\system32\winlogon.exe (1048)
______ C:\WINDOWS\system32\services.exe (1096)
______ C:\WINDOWS\system32\lsass.exe (1108)
______ C:\WINDOWS\system32\svchost.exe (1304)
______ C:\WINDOWS\system32\svchost.exe (1464)
______ C:\WINDOWS\System32\svchost.exe (1608)
______ C:\WINDOWS\System32\svchost.exe (1900)
______ C:\WINDOWS\System32\svchost.exe (1932)
______ C:\WINDOWS\system32\spoolsv.exe (220)
______ C:\Program Files\Avira\AntiVir Desktop\sched.exe (312)
______ C:\WINDOWS\Explorer.EXE (576)
______ C:\WINDOWS\V0410Mon.exe (772)
______ C:\Program Files\Razer\Lachesis\razerhid.exe (784)
______ C:\Program Files\Avira\AntiVir Desktop\avgnt.exe (792)
______ C:\WINDOWS\System32\devldr32.exe (828)
______ C:\WINDOWS\System32\alg.exe (876)
______ C:\Program Files\Java\jre6\bin\jqs.exe (948)
______ C:\WINDOWS\System32\svchost.exe (1112)
______ C:\Program Files\Razer\Lachesis\OSD.exe (1816)
______ C:\Program Files\Razer\Lachesis\razertra.exe (188)
______ C:\Program Files\Razer\Lachesis\razerofa.exe (404)
______ C:\WINDOWS\RTHDCPL.EXE (496)
______ C:\WINDOWS\SOUNDMAN.EXE (2184)
______ C:\Program Files\Avira\AntiVir Desktop\avguard.exe (1908)
______ C:\Program Files\Mozilla Firefox\firefox.exe (3852)
______ C:\Documents and Settings\Mark\Desktop\Rooter.exe (3068)
.
----------------------\\ Device\Harddisk0\
.
\Device\Harddisk0 [Sectors : 63 x 512 Bytes]
.
\Device\Harddisk0\Partition1 --[ MBR ]-- (Start_Offset:32256 | Length:74052163584)
\Device\Harddisk0\Partition0 (Start_Offset:74052195840 | Length:246018124800)
\Device\Harddisk0\Partition2 (Start_Offset:74052228096 | Length:246018092544)
.
----------------------\\ Scheduled Tasks
.
C:\WINDOWS\Tasks\desktop.ini
C:\WINDOWS\Tasks\SA.DAT
.
----------------------\\ Registry
.
.
----------------------\\ Files & Folders
.
----------------------\\ Scan completed at 18:04.47
.
C:\Rooter$\Rooter_2.txt - (07/02/2010 | 18:04.47)
It looks like Malwarebytes got everything.

Although you will want to run this next scan. Be sure you have time to let it finish as it can take up to 3 hours or more.

Run the F-Secure Online Scanner for Viruses, Spyware and Rootkits.

Note: This Scanner is for Internet Explorer Only!

* Place a check mark next to I have read and accepted the license terms and then click Install
* Accept the warning to install the F-Secure Control in Internet Explorer.
* Click Start once the control is installed.
* Choose the Full Scan option and then click Start
* Once the download completes,the scan will begin automatically.
* The scan will take some time to finish so please be patient.
* When the scan completes, choose the Automatic cleaning (recommended) button then click Next and let the scanner finish cleaning.
* Click the Show Report button. (this will open an Internet Explorer window containing the report)
* Copy & Paste the entire report in your next reply.
canning Report
Sunday, February 7, 2010 20:12:08 - 20:36:25

Computer name: MARK-47805DC06C
Scanning type: Scan system for malware, spyware and rootkits
Target: C:\ E:\ F:\
3 malware found
TrackingCookie.2o7 (spyware)

* System (Disinfected)

TrackingCookie.Atdmt (spyware)

* System (Disinfected)

TrackingCookie.Doubleclick (spyware)

* System (Disinfected)

Statistics
Scanned:

* Files: 22294
* System: 2718
* Not scanned: 6

Actions:

* Disinfected: 3
* Renamed: 0
* Deleted: 0
* Not cleaned: 0
* Submitted: 0

Files not scanned:

* C:\PAGEFILE.SYS
* C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT
* C:\WINDOWS\SYSTEM32\CONFIG\SAM
* C:\WINDOWS\SYSTEM32\CONFIG\SECURITY
* C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE
* C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM All that found was 3 cookies which are not a threat. Looks like you are clean.... again.

How is the computer running now?It seems to be running alright, after the repair install i'm back on SP 1. I have tried to upgrade to SP2 but I get stuck at 'creating cabinets'. been there for about 40 min now.Ignore that last post, problem taken care of.

Thank you so much for your help Evil.

1704.

Solve : Virus causing PC to BSOD??

Answer»

Hi,
A client of MINE was complaining about her PC blue screening occasionally. I have tried different repairs. There were no signs (pop ups, etc.) of a virus but thought I would check anyway. The OS is 32 bit XP and the PC is a Dell Optiplex 755.
Trojans were found after I went thru your procedures (Ccleaner, SA, MBAM and HijackThis (Sniper)).
Attached are three logs. Any further steps I should take?
THANKS

[recovering disk space - OLD attachment deleted by admin]re-run mbam and remove what it finds ( no action taken in other LOG ) and post the log , an expert will be along to helpWill do.
I am working on three PC's at mom so may take a little time.
ThanksHere you go. MBAM found NOTHING and no BSOD so far.
Thanks

[recovering disk space - old attachment deleted by admin]

1705.

Solve : Registry entry ??

Answer»

+1OK I will Delete it. because I don't know what Data it has collected. and I don't know for what PURPOSE it has collected it. Just seems creepy to me.

so we can mark this one as solved, thanks to EVERYONE who helped.
shakes head and waits for the 'My PC has STOPPED WORKING' post!!

1706.

Solve : Lost access to router?

Answer»

From your reply to Rootkit.Agent found in System32 Drivers' on this forum

Please read here for more information about WildTangent. Your choice if you want to remove it or not.

From the link:-

Fourth: There are also claims in the forums and by anti-spyware tool makers that the uninstaller does not remove everything
that was installed by WildTangent and that you still need to run the free remover tools to get everything. Also a classic
spyware tactic.

and...

There is also the increased chance that another piece of malware/spyware could be designed and injected into your machine
that will leverage or redirect the information gathered by their technology for more sinister purposes. Why would a
malicious code writer go to the trouble of writing their own relay software if they know that a large portion of home
systems may already contain the code he needs?

I may be getting paranoid here or have gotten completely the wrong impression from this article, but McAfee SUPPLIES a
removal tool which I had to download. This mysterious file or link or whatever it is, coupled with this information,
has me concerned.Did you run the McAfee Removal tool?Yes. Let's try another scan.

Download ComboFix by sUBs from one of the below links. Be sure to save it to the Desktop.

link # 1
link #2

Close any open web browsers (Firefox, Internet Explorer, etc) before starting ComboFix.

Temporarily disable your anti-virus, and any anti-spyware real-time protection before performing a scan. Click this link to see a list of security programs that should be disabled and how to disable them.

Vista users Right-click combofix.exe and select Run as Administrator and follow the prompts. (you will receive a UAC prompt, please allow it)

Double-click combofix.exe and follow the prompts.
When finished, ComboFix will produce a log for you.
Post the ComboFix log and a new HijackThis log in your next reply.

NOTE: Do not MOUSECLICK ComboFix's window while it is running. That may cause it to stall.

Remember to re-enable your anti-virus and anti-spyware protection when ComboFix is complete.

If you have problems with ComboFix usage, see How to use ComboFixComboFix 10-09-27.05 - Ron 29/09/2010 0:30.4.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.44.1033.18.3069.1691 [GMT 1:00]
Running from: c:\users\Ron\Desktop\ComboFix.exe
SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((( Files Created from 2010-08-28 to 2010-09-28 )))))))))))))))))))))))))))))))
.

2010-09-28 23:42 . 2010-09-28 23:42--------d-----w-c:\users\Ron\AppData\Local\temp
2010-09-28 23:42 . 2010-09-28 23:42--------d-----w-c:\users\Public\AppData\Local\temp
2010-09-28 23:42 . 2010-09-28 23:42--------d-----w-c:\users\Default\AppData\Local\temp
2010-09-28 22:17 . 2010-09-28 22:20--------d-----w-c:\program files\SpywareBlaster
2010-09-28 22:11 . 2010-09-28 22:11--------d-----w-c:\program files\WOT
2010-09-27 13:39 . 2010-09-27 13:39--------d-----w-c:\program files\iPod
2010-09-27 13:39 . 2010-09-27 13:40--------d-----w-c:\program files\iTunes
2010-09-27 13:37 . 2010-09-27 13:37--------d-----w-c:\program files\QuickTime
2010-09-27 13:35 . 2010-09-27 13:35--------d-----w-c:\program files\Apple Software Update
2010-09-27 13:02 . 2010-09-27 13:02--------d-----w-c:\users\Ron\AppData\Local\Secunia PSI
2010-09-27 13:02 . 2010-09-27 13:02--------d-----w-c:\program files\Secunia
2010-09-27 12:34 . 2010-09-28 22:13--------d-----w-c:\users\Ron\AppData\Roaming\OnlineArmor
2010-09-27 12:34 . 2010-09-27 12:53--------d-----w-c:\programdata\OnlineArmor
2010-09-27 12:33 . 2010-07-05 07:4422600----a-w-c:\windows\system32\drivers\OAmon.sys
2010-09-27 12:33 . 2010-07-05 07:4429256----a-w-c:\windows\system32\drivers\OAnet.sys
2010-09-27 12:33 . 2010-07-05 07:43236104----a-w-c:\windows\system32\drivers\OADriver.sys
2010-09-27 12:33 . 2010-09-27 12:33--------d-----w-c:\program files\Emsisoft
2010-09-26 19:23 . 2010-09-26 19:23--------d-----w-c:\programdata\WindowsSearch
2010-09-26 19:08 . 2010-09-27 11:46--------d-----w-c:\programdata\Comodo
2010-09-26 14:59 . 2010-09-26 14:59--------d-----w-c:\programdata\NVIDIA Corporation
2010-09-24 01:51 . 2010-09-24 01:5173000----a-w-c:\programdata\Apple Computer\Installer Cache\iTunes 10.0.1.22\SetupAdmin.exe
2010-09-22 14:02 . 2010-09-22 14:02--------d-----w-c:\program files\ESET
2010-09-17 22:15 . 2010-09-17 22:15388096----a-r-c:\users\Ron\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2010-09-17 21:53 . 2010-09-17 21:53--------d-----w-c:\users\Ron\AppData\Roaming\Malwarebytes
2010-09-17 21:53 . 2010-04-29 14:3938224----a-w-c:\windows\system32\drivers\mbamswissarmy.sys
2010-09-17 21:53 . 2010-09-17 21:53--------d-----w-c:\programdata\Malwarebytes
2010-09-17 21:53 . 2010-09-17 21:53--------d-----w-c:\program files\Malwarebytes' Anti-Malware
2010-09-17 21:53 . 2010-04-29 14:3920952----a-w-c:\windows\system32\drivers\mbam.sys
2010-09-17 09:43 . 2010-09-17 21:4263488----a-w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
2010-09-17 09:43 . 2010-09-17 09:4352224----a-w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-09-17 09:43 . 2010-09-17 21:42117760----a-w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-09-17 09:43 . 2010-09-17 09:43--------d-----w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com
2010-09-17 09:43 . 2010-09-17 09:43--------d-----w-c:\programdata\SUPERAntiSpyware.com
2010-09-17 09:43 . 2010-09-17 21:40--------d-----w-c:\program files\SUPERAntiSpyware
2010-09-17 09:30 . 2010-09-27 15:02--------d-----w-c:\programdata\Yahoo! Companion
2010-09-17 09:30 . 2010-09-17 09:30--------d-----w-c:\users\Ron\AppData\Roaming\Yahoo!
2010-09-17 09:30 . 2010-09-17 09:30--------d-----w-c:\program files\Yahoo!
2010-09-17 09:29 . 2010-09-17 09:30--------d-----w-c:\program files\CCleaner
2010-09-17 07:47 . 2010-04-16 16:46502272----a-w-c:\windows\system32\usp10.dll
2010-09-17 07:47 . 2010-08-17 14:11128000----a-w-c:\windows\system32\spoolsv.exe
2010-09-17 07:47 . 2010-04-05 17:02317952----a-w-c:\windows\system32\MP4SDECD.DLL
2010-09-17 07:47 . 2010-05-27 20:08739328----a-w-c:\windows\system32\inetcomm.dll
2010-09-09 21:00 . 2010-09-09 21:00--------d-sh--w-c:\windows\system32\%APPDATA%
2010-09-06 11:17 . 2010-09-06 11:17--------d-----w-c:\program files\Common Files\Java
2010-09-06 11:14 . 2010-09-06 11:1610787840----a-w-c:\users\Ron\AppData\Roaming\Adobe\Acrobat\7.0\Updater\AcroProUpd710_all_cum.exe
2010-09-04 09:48 . 2010-09-04 09:49--------d-----w-c:\programdata\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-09-04 09:42 . 2010-09-04 09:42--------d-----w-c:\program files\Bonjour
2010-09-01 08:30 . 2010-09-01 08:3015544----a-w-c:\windows\system32\drivers\psi_mf.sys

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-28 23:23 . 2009-07-12 09:53--------d-----w-c:\program files\Spybot - Search & Destroy
2010-09-28 23:23 . 2009-07-12 09:53--------d-----w-c:\programdata\Spybot - Search & Destroy
2010-09-28 23:00 . 2009-11-06 11:281----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\stamp.sys
2010-09-28 21:53 . 2010-06-24 06:2936725----a-w-c:\programdata\nvModes.dat
2010-09-28 21:50 . 2009-07-15 13:5112----a-w-c:\windows\bthservsdp.dat
2010-09-27 13:42 . 2009-11-13 18:53--------d-----w-c:\users\Ron\AppData\Roaming\Apple Computer
2010-09-27 13:39 . 2009-11-13 18:45--------d-----w-c:\program files\Common Files\Apple
2010-09-27 13:15 . 2009-07-06 10:58--------d-----w-c:\program files\Java
2010-09-26 15:24 . 2009-05-31 18:09--------d-----w-c:\programdata\NVIDIA
2010-09-26 15:00 . 2010-06-24 04:42--------d-----w-c:\program files\NVIDIA Corporation
2010-09-22 13:10 . 2009-05-03 04:20175808----a-w-c:\users\Ron\AppData\Local\GDIPFONTCACHEV1.DAT
2010-09-22 13:10 . 2009-05-05 21:40--------d-----w-c:\program files\Common Files\Adobe
2010-09-17 22:32 . 2006-11-02 11:18--------d-----w-c:\program files\Windows Mail
2010-09-13 09:42 . 2009-05-17 18:30--------d-----w-c:\program files\Microsoft Silverlight
2010-08-27 14:15 . 2010-08-27 14:15--------d-----w-c:\program files\Microsoft Security Essentials
2010-08-14 21:06 . 2009-07-19 15:39300384----a-w-c:\users\Ron\AppData\Roaming\McAfee\Supportability\MVTLogs\Results\detect.dll
2010-08-13 14:06 . 2010-08-13 06:10--------d-----w-c:\program files\Common Files\ParetoLogic
2010-08-13 06:33 . 2010-08-13 06:33--------d-----w-c:\users\Ron\AppData\Roaming\AdobeUM
2010-08-13 06:33 . 2010-08-13 06:33--------d-----w-c:\program files\Common Files\Java(0)
2010-08-13 06:10 . 2010-08-13 06:10--------d-----w-c:\programdata\FileCure
2010-08-08 18:48 . 2010-08-08 18:48568832----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\msvcp90.dll
2010-08-08 18:48 . 2010-08-08 18:48686080----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\pdfimport.uno.dll
2010-08-08 18:48 . 2010-08-08 18:48655872----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\msvcr90.dll
2010-08-08 18:48 . 2010-08-08 18:48583168----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\xpdfimport.exe
2010-08-08 18:48 . 2010-08-08 18:48224768----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\msvcm90.dll
2010-08-08 18:42 . 2009-11-06 11:24--------d-----w-c:\program files\OpenOffice.org 3
2010-07-27 17:44 . 2010-07-27 17:4491424----a-w-c:\windows\system32\dnssd.dll
2010-07-27 17:44 . 2010-07-27 17:4475040----a-w-c:\windows\system32\jdns_sd.dll
2010-07-27 17:44 . 2010-07-27 17:44197920----a-w-c:\windows\system32\dnssdX.dll
2010-07-27 17:44 . 2010-07-27 17:44107808----a-w-c:\windows\system32\dns-sd.exe
2010-07-17 04:00 . 2010-05-17 12:09423656----a-w-c:\windows\system32\deployJava1.dll
2010-07-09 15:37 . 2010-07-09 15:371469544----a-w-c:\windows\system32\nvsvc.dll
2010-07-09 15:37 . 2010-07-09 15:3713939816----a-w-c:\windows\system32\nvcpl.dll
2010-07-09 15:37 . 2010-07-09 15:37129640----a-w-c:\windows\system32\nvvsvc.exe
2010-07-09 15:37 . 2010-07-09 15:37110696----a-w-c:\windows\system32\nvmctray.dll
.

((((((((((((((((((((((((((((( [emailprotected]_20.49.29 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-09-22 09:00 . 2010-09-22 09:2565536 c:\windows\tracing\RASPPTP.BIN
+ 2010-09-22 09:00 . 2010-09-22 09:2565536 c:\windows\tracing\RASL2TP.BIN
+ 2010-09-22 09:00 . 2010-09-22 09:2565536 c:\windows\tracing\IPSEC.BIN
+ 2009-05-03 14:56 . 2010-09-28 21:5468536 c:\windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin
+ 2006-11-02 13:05 . 2010-09-28 21:5460142 c:\windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin
+ 2009-05-03 14:40 . 2010-09-28 21:5418796 c:\windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-3891294070-290603237-754910137-1000_UserData.bin
+ 2010-07-10 04:37 . 2010-07-10 04:3756936 c:\windows\System32\OpenCL.dll
+ 2010-09-27 12:33 . 2010-07-05 07:4429256 c:\windows\System32\DriverStore\FileRepository\oanet.inf_536b0972\OAnet.sys
+ 2010-07-10 04:37 . 2010-07-10 04:3756936 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\OpenCL.dll
+ 2006-11-02 13:02 . 2010-09-28 21:5232768 c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
- 2006-11-02 13:02 . 2010-09-19 20:1732768 c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
+ 2010-09-27 13:15 . 2010-09-27 13:1579488 c:\windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\jre1.6.0_20\gtapi.dll
+ 2010-09-28 22:17 . 2010-09-28 21:5232768 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
+ 2006-11-02 13:02 . 2010-09-28 21:5216384 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- 2006-11-02 13:02 . 2010-09-19 20:1716384 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- 2010-09-09 21:00 . 2010-09-09 21:0016384 c:\windows\System32\%APPDATA%\Microsoft\Windows\IETldCache\index.dat
+ 2010-09-09 21:00 . 2010-09-27 13:1616384 c:\windows\System32\%APPDATA%\Microsoft\Windows\IETldCache\index.dat
+ 2009-05-18 19:46 . 2010-09-28 21:5316384 c:\windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
- 2009-05-18 19:46 . 2010-09-19 20:1816384 c:\windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
- 2009-05-18 19:46 . 2010-09-19 20:1832768 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
+ 2009-05-18 19:46 . 2010-09-28 21:5332768 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
+ 2009-05-18 19:46 . 2010-09-28 21:5316384 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- 2009-05-18 19:46 . 2010-09-19 20:1816384 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- 2009-05-18 19:40 . 2010-09-19 20:1716384 c:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
+ 2009-05-18 19:40 . 2010-09-28 21:5216384 c:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
+ 2009-12-14 10:04 . 2010-09-26 14:1432768 c:\windows\ServiceProfiles\LocalService\AppData\Local\Temp\Temporary Internet Files\Content.IE5\index.dat
- 2009-12-14 10:04 . 2010-09-17 17:0632768 c:\windows\ServiceProfiles\LocalService\AppData\Local\Temp\Temporary Internet Files\Content.IE5\index.dat
+ 2009-12-14 10:04 . 2010-09-26 14:1416384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Temp\History\History.IE5\index.dat
- 2009-12-14 10:04 . 2010-09-17 17:0616384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Temp\History\History.IE5\index.dat
+ 2009-12-14 10:04 . 2010-09-26 14:1416384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Temp\Cookies\index.dat
- 2009-12-14 10:04 . 2010-09-17 17:0616384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Temp\Cookies\index.dat
+ 2009-05-18 19:40 . 2010-09-28 21:5232768 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
- 2009-05-18 19:40 . 2010-09-19 20:1732768 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
- 2009-05-18 19:40 . 2010-09-19 20:1716384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
+ 2009-05-18 19:40 . 2010-09-28 21:5216384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
+ 2010-09-27 13:35 . 2010-09-27 13:3527136 c:\windows\Installer\{C41300B9-185D-475E-BFEC-39EF732F19B1}\AppleSoftwareUpdateIco.exe
+ 2009-12-21 19:09 . 2009-12-21 19:0916832 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\ViewerPS.dll
+ 2009-12-22 00:57 . 2009-12-22 00:5735760 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\reader_sl.exe
+ 2009-12-21 19:02 . 2009-12-21 19:0279280 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\PDFPrevHndlr.dll
+ 2009-12-21 22:21 . 2009-12-21 22:2199776 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\eula.exe
+ 2009-12-11 14:57 . 2009-12-11 14:5770584 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\adobeextractfiles.dll
+ 2009-12-21 22:37 . 2009-12-21 22:3727048 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\acrotextextractor.exe
+ 2009-12-21 17:39 . 2009-12-21 17:3915288 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\AcroRd32Info.exe
+ 2009-12-21 17:27 . 2009-12-21 17:2775200 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\acroiehelpershim.dll
+ 2009-12-21 17:27 . 2009-12-21 17:2761888 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\AcroIEHelper.dll
- 2006-11-02 10:25 . 2010-09-04 09:4486016 c:\windows\inf\infstor.dat
+ 2006-11-02 10:25 . 2010-09-27 12:3486016 c:\windows\inf\infstor.dat
+ 2006-11-02 10:25 . 2010-09-27 12:3451200 c:\windows\inf\infpub.dat
- 2006-11-02 10:25 . 2010-09-04 09:4451200 c:\windows\inf\infpub.dat
+ 2010-09-28 21:52 . 2010-09-28 21:522048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
- 2010-09-19 20:17 . 2010-09-19 20:172048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
+ 2010-09-28 21:52 . 2010-09-28 21:522048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
- 2010-09-19 20:17 . 2010-09-19 20:172048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
+ 2010-09-22 09:00 . 2010-09-22 09:25131072 c:\windows\tracing\RASSSTP.BIN
+ 2006-11-02 10:33 . 2010-09-28 21:58608760 c:\windows\System32\perfh009.dat
- 2006-11-02 10:33 . 2010-09-19 20:23608760 c:\windows\System32\perfh009.dat
- 2006-11-02 10:33 . 2010-09-19 20:23108268 c:\windows\System32\perfc009.dat
+ 2006-11-02 10:33 . 2010-09-28 21:58108268 c:\windows\System32\perfc009.dat
+ 2009-05-31 17:14 . 2010-07-10 04:37604776 c:\windows\System32\nvuninst.exe
+ 2008-09-17 22:55 . 2010-07-10 04:37604776 c:\windows\System32\nvudisp.exe
+ 2010-07-10 04:37 . 2010-07-10 04:37236136 c:\windows\System32\nvcod1922.dll
+ 2010-07-10 04:37 . 2010-07-10 04:37236136 c:\windows\System32\nvcod.dll
+ 2010-09-27 13:12 . 2010-09-27 13:12232912 c:\windows\System32\Macromed\Flash\FlashUtil10k_Plugin.exe
+ 2010-09-27 13:18 . 2010-09-27 13:18232912 c:\windows\System32\Macromed\Flash\FlashUtil10k_ActiveX.exe
+ 2010-09-27 13:18 . 2010-09-27 13:18311760 c:\windows\System32\Macromed\Flash\FlashUtil10k_ActiveX.dll
- 2010-09-06 11:17 . 2010-07-17 04:00153376 c:\windows\System32\javaws.exe
+ 2010-09-27 13:15 . 2010-07-17 04:00153376 c:\windows\System32\javaws.exe
- 2010-09-06 11:17 . 2010-07-17 04:00145184 c:\windows\System32\javaw.exe
+ 2010-09-27 13:15 . 2010-07-17 04:00145184 c:\windows\System32\javaw.exe
+ 2010-09-27 13:15 . 2010-07-17 04:00145184 c:\windows\System32\java.exe
- 2010-09-06 11:17 . 2010-07-17 04:00145184 c:\windows\System32\java.exe
+ 2006-11-02 12:47 . 2010-09-22 13:08546176 c:\windows\System32\FNTCACHE.DAT
+ 2010-07-10 04:37 . 2010-07-10 04:37604776 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\nvudisp.exe
+ 2010-07-10 04:37 . 2010-07-10 04:37261268 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\nvdrsdb.bin
+ 2010-07-10 04:37 . 2010-07-10 04:37236136 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\nvcod.dll
+ 2010-07-10 04:37 . 2010-07-10 04:37795104 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\dpinst.exe
+ 2010-07-10 04:37 . 2010-07-10 04:37156264 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\dbInstaller.exe
+ 2009-05-17 18:41 . 2010-09-28 14:24294912 c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\IETldCache\index.dat
- 2009-05-17 18:41 . 2010-09-17 21:47294912 c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\IETldCache\index.dat
+ 2010-09-27 13:15 . 2010-09-27 13:15152576 c:\windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\jre1.6.0_20\lzma.dll
+ 2010-09-27 13:15 . 2010-09-27 13:15581120 c:\windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\jre1.6.0_20\jre1.6.0_20.msi
+ 2010-09-27 13:16 . 2010-09-27 13:16183808 c:\windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\AU\au.msi
+ 2010-09-19 21:26 . 2010-09-19 21:26802304 c:\windows\Installer\3e650b.msi
+ 2010-09-27 13:15 . 2010-09-27 13:15577536 c:\windows\Installer\17f3ac.msi
+ 2010-09-28 22:11 . 2010-09-28 22:11279552 c:\windows\Installer\11c055.msi
+ 2010-09-19 21:26 . 2010-09-19 21:26295606 c:\windows\Installer\{AC76BA86-7AD7-5464-3428-900000000004}\ARPPRODUCTICON.exe
+ 2010-09-27 13:41 . 2010-09-27 13:41380928 c:\windows\Installer\{2CE5A2E7-3437-4CE7-BCF4-85ED6EEFF9E4}\iTunesIco.exe
+ 2008-04-10 08:20 . 2008-04-10 08:20638976 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA746454382090000000040\9.0.0\AdobeLinguistic.dll
+ 2009-12-11 14:57 . 2009-12-11 14:57326056 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\readerupdater.exe
+ 2009-12-21 17:35 . 2009-12-21 17:35378264 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\pdfshell.dll
+ 2009-12-21 17:34 . 2009-12-21 17:34103864 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\nppdf32.dll
+ 2009-11-09 18:18 . 2009-11-09 18:18684032 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\JP2KLib.dll
+ 2009-12-21 19:02 . 2009-12-21 19:02542168 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\AdobeCollabSync.exe
+ 2009-12-11 14:57 . 2009-12-11 14:57948672 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\adobearm.exe
+ 2009-12-21 17:43 . 2009-12-21 17:43120240 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\AcroRdIF.dll
+ 2009-12-22 00:57 . 2009-12-22 00:57349616 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\AcroRd32.exe
+ 2009-12-21 17:15 . 2009-12-21 17:15660912 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\AcroPDF.dll
+ 2009-12-21 18:32 . 2009-12-21 18:32280024 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\acrobroker.exe
+ 2009-12-11 14:57 . 2009-12-11 14:57326056 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\acrobatupdater.exe
+ 2009-12-21 18:15 . 2009-12-21 18:15251296 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\a3dutility.exe
+ 2006-11-02 10:25 . 2010-09-27 12:34143360 c:\windows\inf\infstrng.dat
- 2006-11-02 10:25 . 2010-09-04 09:44143360 c:\windows\inf\infstrng.dat
+ 2008-09-17 22:55 . 2010-07-10 04:379818728 c:\windows\System32\nvd3dum.dll
+ 2010-07-10 04:37 . 2010-07-10 04:372892904 c:\windows\System32\nvcuvid.dll
+ 2010-07-10 04:37 . 2010-07-10 04:372506344 c:\windows\System32\nvcuvenc.dll
+ 2010-07-10 04:37 . 2010-07-10 04:374553832 c:\windows\System32\nvcuda.dll
+ 2008-09-17 22:55 . 2010-07-10 04:371625192 c:\windows\System32\nvapi.dll
+ 2009-02-03 02:15 . 2010-09-27 13:125969360 c:\windows\System32\Macromed\Flash\NPSWF32.dll
+ 2010-07-10 04:37 . 2010-07-10 04:379818728 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\nvd3dum.dll
+ 2010-07-10 04:37 . 2010-07-10 04:372892904 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\nvcuvid.dll
+ 2010-07-10 04:37 . 2010-07-10 04:372506344 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\nvcuvenc.dll
+ 2010-07-10 04:37 . 2010-07-10 04:374553832 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\nvcuda.dll
+ 2010-07-10 04:37 . 2010-07-10 04:371625192 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\nvapi.dll
+ 2010-09-27 13:41 . 2010-09-27 13:416333440 c:\windows\Installer\29a52d.msi
+ 2010-09-27 13:37 . 2010-09-27 13:379472000 c:\windows\Installer\299c8c.msi
+ 2010-09-27 13:35 . 2010-09-27 13:351554944 c:\windows\Installer\2999d8.msi
+ 2010-06-20 08:01 . 2010-06-20 08:018040960 c:\windows\Installer\13fca.msp
+ 2010-09-22 08:34 . 2010-09-22 08:343940352 c:\windows\Installer\13ed7.msi
+ 2009-12-21 17:29 . 2009-12-21 17:292409880 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\rt3d.dll
+ 2009-10-27 19:34 . 2009-10-27 19:345009408 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\authplay.dll
+ 2009-12-21 22:31 . 2009-12-21 22:315713920 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\AGM.dll
+ 2010-07-10 04:37 . 2010-07-10 04:3714092904 c:\windows\System32\nvoglv32.dll
+ 2010-07-10 04:37 . 2010-07-10 04:3710267240 c:\windows\System32\nvcompiler.dll
+ 2010-07-10 04:37 . 2010-07-10 04:3714092904 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\nvoglv32.dll
+ 2010-07-10 04:37 . 2010-07-10 04:3711008040 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\nvlddmkm.sys
+ 2010-07-10 04:37 . 2010-07-10 04:3750354424 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\NvCplSetupInt.exe
+ 2010-07-10 04:37 . 2010-07-10 04:3710267240 c:\windows\System32\DriverStore\FileRepository\nv_disp.inf_a648eb91\nvcompiler.dll
+ 2010-07-10 04:37 . 2010-07-10 04:3711008040 c:\windows\System32\drivers\nvlddmkm.sys
+ 2010-04-04 06:54 . 2010-04-04 06:5411850240 c:\windows\Installer\13fcb.msp
+ 2010-08-13 18:09 . 2010-08-13 18:0912263936 c:\windows\Installer\13fc9.msp
+ 2009-12-21 22:21 . 2009-12-21 22:2120436408 c:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\AcroRd32.dll
.
-- Snapshot reset to current date --
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="c:\program files\Common Files\Ahead\Lib\NMBgMonitor.exe" [2008-01-22 152872]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-11-09 39408]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"NeroFilterCheck"="c:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2008-05-28 570664]
"SigmatelSysTrayApp"="sttray.exe" [2007-03-29 303104]
"MSSE"="c:\program files\Microsoft Security Essentials\msseces.exe" [2010-06-01 1093208]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]
"@OnlineArmor GUI"="c:\program files\Emsisoft\Online Armor\oaui.exe" [2010-07-05 6854984]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-09-08 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-09-24 421160]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"EnableShellExecuteHooks"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\Emsisoft\ONLINE~1\oaevent.dll" [2010-07-05 924488]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

R1 apprngr;AppRanger Scan Driver;c:\windows\system32\Drivers\apprngr.sys


R2 apprngr_svc;AppRanger Service;c:\program files\AppRanger\SWSvc.exe

R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 133104]
R2 SvcOnlineArmor;Online Armor;c:\program files\Emsisoft\Online Armor\oasrv.exe [2010-07-05 3364680]
R3 bepldr;BCL easyPDF SDK 5 Loader;c:\program files\Common Files\BCL Technologies\easyPDF 5\bepldr.exe [2007-02-21 151552]
R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504]
S0 amacpi;Microsoft Away Mode System;c:\windows\system32\DRIVERS\null.sys [2008-01-19 4608]
S0 npf;npf Driver;c:\windows\system32\drivers\npf.sys [2007-11-06 34064]
S1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [2010-07-05 236104]
S1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [2010-07-05 22600]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-02-17 12872]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2010-05-10 67656]
S2 OAcat;Online Armor Helper Service;c:\program files\Emsisoft\Online Armor\OAcat.exe [2010-07-05 1283400]
S2 Secunia Update Agent;Secunia Update Agent;c:\program files\Secunia\PSI\sua.exe [2010-09-01 318520]
S3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\system32\DRIVERS\MpNWMon.sys [2010-03-25 42368]
S3 OAnet;OnlineArmor Service;c:\windows\system32\DRIVERS\oanet.sys [2010-07-05 29256]
S3 PSI;PSI;c:\windows\system32\DRIVERS\psi_mf.sys [2010-09-01 15544]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
bthsvcsREG_MULTI_SZ BthServ
LocalServiceAndNoImpersonationREG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder

2010-09-28 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 12:13]

2010-09-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 12:13]

2010-09-28 c:\windows\Tasks\ParetoLogic Registration3.job
- c:\program files\Common Files\ParetoLogic\UUS3\UUS3.dll [2009-08-04 18:19]

2010-08-13 c:\windows\Tasks\ParetoLogic Update Version3.job
- c:\program files\Common Files\ParetoLogic\UUS3\Pareto_Update3.exe [2009-08-04 18:19]

2010-09-28 c:\windows\Tasks\User_Feed_Synchronization-{AAD29C0A-613E-42B8-9812-D1A798192E3F}.job
- c:\windows\system32\msfeedssync.exe [2010-08-11 04:24]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.co.uk/
mStart Page = hxxp://www.voover.com/
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://uk.search.yahoo.com/search?fr=mcafee&p=%s
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-HostManager - c:\program files\Common Files\AOL\1247602731\ee\AOLSoftware.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-09-29 00:42
Windows 6.0.6002 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2010-09-29 00:50:17
ComboFix-quarantined-files.txt 2010-09-28 23:50
ComboFix2.txt 2010-09-26 14:35
ComboFix3.txt 2010-09-22 13:52
ComboFix4.txt 2010-09-19 20:56
ComboFix5.txt 2010-09-28 23:26

Pre-Run: 58,355,978,240 bytes free
Post-Run: 58,314,850,304 bytes free

- - END Of File - - 0F8EC5D396A3C767211116E26047E049

HJT log to follow.Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 00:59:45, on 29/09/2010
Platform: Windows Vista SP2 (WinNT 6.00.1906)
MSIE: Internet Explorer v8.00 (8.00.6001.18943)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Secunia\PSI\psi.exe
C:\Windows\System32\mobsync.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\sttray.exe
C:\Program Files\Microsoft Security Essentials\msseces.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
C:\Windows\ehome\ehmsas.exe
C:\Windows\Explorer.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Program Files\Trend Micro\HijackThis\sniper.exe.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.voover.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://uk.search.yahoo.com/search?fr=mcafee&p=%s
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: McAfee Phishing Filter - {27B4851A-3207-45A2-B947-BE8AFE6163AB} - (no file)
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.6.5612.1312\swg.dll
O2 - BHO: (no name) - {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - (no file)
O2 - BHO: WOT Helper - {C920E44A-7F78-4E64-BDD7-A57026E7FEB7} - C:\Program Files\WOT\WOT.dll
O2 - BHO: MSN Toolbar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN\Toolbar\3.0.1203.0\msneshellx.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O2 - BHO: SingleInstance Class - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - C:\Program Files\Yahoo!\Companion\Installs\cpn\YTSingleInstance.dll
O3 - Toolbar: MSN Toolbar - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.1203.0\msneshellx.dll
O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: WOT - {71576546-354D-41c9-AAE8-31F2EC22BF0D} - C:\Program Files\WOT\WOT.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [SigmatelSysTrayApp] sttray.exe
O4 - HKLM\..\Run: [MSSE] "C:\Program Files\Microsoft Security Essentials\msseces.exe" -hide -runkey
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [@OnlineArmor GUI] "C:\Program Files\Emsisoft\Online Armor\oaui.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O9 - Extra button: RESEARCH - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} (OnlineScanner Control) - http://download.eset.com/special/eos/OnlineScanner.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O18 - Protocol: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file)
O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file)
O18 - Protocol: wot - {C2A44D6B-CB9F-4663-88A6-DF2F26E4D952} - C:\Program Files\WOT\WOT.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
O23 - Service: AppRanger Service (apprngr_svc) - Unknown owner - C:\Program Files\AppRanger\SWSvc.exe (file missing)
O23 - Service: BCL easyPDF SDK 5 Loader (bepldr) - Unknown owner - C:\Program Files\Common Files\BCL Technologies\easyPDF 5\bepldr.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: EPSON V3 Service4(01) (EPSON_PM_RPCV4_01) - SEIKO EPSON CORPORATION - C:\ProgramData\EPSON\EPW!3 SSRP\E_S40RP7.EXE
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe
O23 - Service: Online Armor Helper Service (OAcat) - Unknown owner - C:\Program Files\Emsisoft\Online Armor\OAcat.exe
O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - C:\Windows\system32\IoctlSvc.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe
O23 - Service: Secunia Update Agent - Secunia - C:\Program Files\Secunia\PSI\sua.exe
O23 - Service: SigmaTel Audio Service (STacSV) - SigmaTel, Inc. - C:\Program Files\SigmaTel\C-Major Audio\WDM\STacSV.exe
O23 - Service: Online Armor (SvcOnlineArmor) - Unknown owner - C:\Program Files\Emsisoft\Online Armor\oasrv.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 8610 bytes
Latest Logs

ComboFix 10-09-28.03 - Ron 29/09/2010 13:06:37.5.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.44.1033.18.3069.1639 [GMT 1:00]
Running from: c:\users\Ron\Desktop\ComboFix.exe
SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((( Files Created from 2010-08-28 to 2010-09-29 )))))))))))))))))))))))))))))))
.

2010-09-29 12:17 . 2010-09-29 12:17--------d-----w-c:\users\Ron\AppData\Local\temp
2010-09-29 12:17 . 2010-09-29 12:17--------d-----w-c:\users\Public\AppData\Local\temp
2010-09-29 12:17 . 2010-09-29 12:17--------d-----w-c:\users\Default\AppData\Local\temp
2010-09-29 12:02 . 2010-09-29 12:02--------d-----w-C:\32788R22FWJFW
2010-09-29 11:57 . 2010-06-22 13:302048----a-w-c:\windows\system32\tzres.dll
2010-09-28 22:17 . 2010-09-28 22:20--------d-----w-c:\program files\SpywareBlaster
2010-09-28 22:11 . 2010-09-28 22:11--------d-----w-c:\program files\WOT
2010-09-27 13:39 . 2010-09-27 13:39--------d-----w-c:\program files\iPod
2010-09-27 13:39 . 2010-09-27 13:40--------d-----w-c:\program files\iTunes
2010-09-27 13:37 . 2010-09-27 13:37--------d-----w-c:\program files\QuickTime
2010-09-27 13:35 . 2010-09-27 13:35--------d-----w-c:\program files\Apple Software Update
2010-09-27 13:02 . 2010-09-27 13:02--------d-----w-c:\users\Ron\AppData\Local\Secunia PSI
2010-09-27 13:02 . 2010-09-27 13:02--------d-----w-c:\program files\Secunia
2010-09-27 12:34 . 2010-09-28 22:13--------d-----w-c:\users\Ron\AppData\Roaming\OnlineArmor
2010-09-27 12:34 . 2010-09-27 12:53--------d-----w-c:\programdata\OnlineArmor
2010-09-27 12:33 . 2010-07-05 07:4422600----a-w-c:\windows\system32\drivers\OAmon.sys
2010-09-27 12:33 . 2010-07-05 07:4429256----a-w-c:\windows\system32\drivers\OAnet.sys
2010-09-27 12:33 . 2010-07-05 07:43236104----a-w-c:\windows\system32\drivers\OADriver.sys
2010-09-27 12:33 . 2010-09-27 12:33--------d-----w-c:\program files\Emsisoft
2010-09-26 19:23 . 2010-09-26 19:23--------d-----w-c:\programdata\WindowsSearch
2010-09-26 19:08 . 2010-09-27 11:46--------d-----w-c:\programdata\Comodo
2010-09-26 14:59 . 2010-09-26 14:59--------d-----w-c:\programdata\NVIDIA Corporation
2010-09-22 14:02 . 2010-09-22 14:02--------d-----w-c:\program files\ESET
2010-09-17 21:53 . 2010-09-17 21:53--------d-----w-c:\users\Ron\AppData\Roaming\Malwarebytes
2010-09-17 21:53 . 2010-04-29 14:3938224----a-w-c:\windows\system32\drivers\mbamswissarmy.sys
2010-09-17 21:53 . 2010-09-17 21:53--------d-----w-c:\programdata\Malwarebytes
2010-09-17 21:53 . 2010-09-17 21:53--------d-----w-c:\program files\Malwarebytes' Anti-Malware
2010-09-17 21:53 . 2010-04-29 14:3920952----a-w-c:\windows\system32\drivers\mbam.sys
2010-09-17 09:43 . 2010-09-17 09:43--------d-----w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com
2010-09-17 09:43 . 2010-09-17 09:43--------d-----w-c:\programdata\SUPERAntiSpyware.com
2010-09-17 09:43 . 2010-09-17 21:40--------d-----w-c:\program files\SUPERAntiSpyware
2010-09-17 09:30 . 2010-09-27 15:02--------d-----w-c:\programdata\Yahoo! Companion
2010-09-17 09:30 . 2010-09-17 09:30--------d-----w-c:\users\Ron\AppData\Roaming\Yahoo!
2010-09-17 09:30 . 2010-09-17 09:30--------d-----w-c:\program files\Yahoo!
2010-09-17 09:29 . 2010-09-17 09:30--------d-----w-c:\program files\CCleaner
2010-09-17 07:47 . 2010-04-16 16:46502272----a-w-c:\windows\system32\usp10.dll
2010-09-17 07:47 . 2010-08-17 14:11128000----a-w-c:\windows\system32\spoolsv.exe
2010-09-17 07:47 . 2010-04-05 17:02317952----a-w-c:\windows\system32\MP4SDECD.DLL
2010-09-17 07:47 . 2010-05-27 20:08739328----a-w-c:\windows\system32\inetcomm.dll
2010-09-09 21:00 . 2010-09-09 21:00--------d-sh--w-c:\windows\system32\%APPDATA%
2010-09-06 11:17 . 2010-09-06 11:17--------d-----w-c:\program files\Common Files\Java
2010-09-04 09:48 . 2010-09-04 09:49--------d-----w-c:\programdata\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-09-04 09:42 . 2010-09-04 09:42--------d-----w-c:\program files\Bonjour
2010-09-01 08:30 . 2010-09-01 08:3015544----a-w-c:\windows\system32\drivers\psi_mf.sys

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-29 11:59 . 2009-05-17 18:30--------d-----w-c:\program files\Microsoft Silverlight
2010-09-29 11:49 . 2010-06-24 06:2936725----a-w-c:\programdata\nvModes.dat
2010-09-29 11:47 . 2009-07-12 09:53--------d-----w-c:\program files\Spybot - Search & Destroy
2010-09-29 00:11 . 2009-07-15 13:5112----a-w-c:\windows\bthservsdp.dat
2010-09-28 23:53 . 2010-09-28 23:53388096----a-r-c:\users\Ron\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2010-09-28 23:23 . 2009-07-12 09:53--------d-----w-c:\programdata\Spybot - Search & Destroy
2010-09-28 10:30 . 2010-09-28 10:302023824----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{C4E298DB-ECDF-46E5-8671-41B2BE418959}\mpavdlta.vdm
2010-09-28 10:30 . 2010-09-28 10:30365968----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{C4E298DB-ECDF-46E5-8671-41B2BE418959}\mpasdlta.vdm
2010-09-27 13:42 . 2009-11-13 18:53--------d-----w-c:\users\Ron\AppData\Roaming\Apple Computer
2010-09-27 13:39 . 2009-11-13 18:45--------d-----w-c:\program files\Common Files\Apple
2010-09-27 13:15 . 2009-07-06 10:58--------d-----w-c:\program files\Java
2010-09-27 12:59 . 2010-08-29 15:491987984----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpavdlta.vdm
2010-09-27 12:59 . 2010-08-29 15:49349584----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpasdlta.vdm
2010-09-26 15:24 . 2009-05-31 18:09--------d-----w-c:\programdata\NVIDIA
2010-09-26 15:00 . 2010-06-24 04:42--------d-----w-c:\program files\NVIDIA Corporation
2010-09-24 01:51 . 2010-09-24 01:5173000----a-w-c:\programdata\Apple Computer\Installer Cache\iTunes 10.0.1.22\SetupAdmin.exe
2010-09-22 13:13 . 2010-09-22 13:1312575488----a-w-c:\users\Ron\AppData\Roaming\Adobe\AIR\Updater\Background\1.0\updater
2010-09-22 13:10 . 2009-05-03 04:20175808----a-w-c:\users\Ron\AppData\Local\GDIPFONTCACHEV1.DAT
2010-09-22 13:10 . 2009-05-05 21:40--------d-----w-c:\program files\Common Files\Adobe
2010-09-17 22:32 . 2006-11-02 11:18--------d-----w-c:\program files\Windows Mail
2010-09-17 21:42 . 2010-09-17 09:4363488----a-w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
2010-09-17 21:42 . 2010-09-17 09:43117760----a-w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-09-17 09:43 . 2010-09-17 09:4352224----a-w-c:\users\Ron\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-09-17 07:50 . 2010-09-28 10:3041722256----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{C4E298DB-ECDF-46E5-8671-41B2BE418959}\mpavbase.vdm
2010-09-17 07:50 . 2010-08-29 15:4941722256----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpavbase.vdm
2010-09-17 07:50 . 2010-09-28 10:3012300688----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{C4E298DB-ECDF-46E5-8671-41B2BE418959}\mpasbase.vdm
2010-09-17 07:50 . 2010-08-29 15:4912300688----a-w-c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpasbase.vdm
2010-09-10 22:41 . 2010-09-10 22:41109512----a-w-c:\programdata\Comodo\Installer\cmddns.tmp
2010-09-06 11:16 . 2010-09-06 11:1410787840----a-w-c:\users\Ron\AppData\Roaming\Adobe\Acrobat\7.0\Updater\AcroProUpd710_all_cum.exe
2010-08-28 12:39 . 2010-08-28 12:3963520----a-w-c:\programdata\Comodo\Installer\crtman.tmp
2010-08-27 14:15 . 2010-08-27 14:15--------d-----w-c:\program files\Microsoft Security Essentials
2010-08-26 18:20 . 2010-08-27 14:11366992----a-w-c:\programdata\Microsoft\Windows Defender\Definition Updates\{8B226FB6-3024-4D43-9F12-F9F3CD893053}\mpasdlta.vdm
2010-08-19 09:25 . 2010-08-27 14:1112120464----a-w-c:\programdata\Microsoft\Windows Defender\Definition Updates\{8B226FB6-3024-4D43-9F12-F9F3CD893053}\mpasbase.vdm
2010-08-14 21:06 . 2009-07-19 15:39300384----a-w-c:\users\Ron\AppData\Roaming\McAfee\Supportability\MVTLogs\Results\detect.dll
2010-08-13 14:06 . 2010-08-13 06:10--------d-----w-c:\program files\Common Files\ParetoLogic
2010-08-13 06:33 . 2010-08-13 06:33--------d-----w-c:\users\Ron\AppData\Roaming\AdobeUM
2010-08-13 06:33 . 2010-08-13 06:33--------d-----w-c:\program files\Common Files\Java(0)
2010-08-13 06:10 . 2010-08-13 06:10--------d-----w-c:\programdata\FileCure
2010-08-08 18:48 . 2010-08-08 18:48568832----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\msvcp90.dll
2010-08-08 18:48 . 2010-08-08 18:48686080----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\pdfimport.uno.dll
2010-08-08 18:48 . 2010-08-08 18:48655872----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\msvcr90.dll
2010-08-08 18:48 . 2010-08-08 18:48583168----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\xpdfimport.exe
2010-08-08 18:48 . 2010-08-08 18:48224768----a-w-c:\users\Ron\AppData\Roaming\OpenOffice.org\3\user\uno_packages\cache\uno_packages\4FE5.tmp_\sun-pdfimport.oxt\msvcm90.dll
2010-08-08 18:42 . 2009-11-06 11:24--------d-----w-c:\program files\OpenOffice.org 3
2010-07-27 17:44 . 2010-07-27 17:4491424----a-w-c:\windows\system32\dnssd.dll
2010-07-27 17:44 . 2010-07-27 17:4475040----a-w-c:\windows\system32\jdns_sd.dll
2010-07-27 17:44 . 2010-07-27 17:44197920----a-w-c:\windows\system32\dnssdX.dll
2010-07-27 17:44 . 2010-07-27 17:44107808----a-w-c:\windows\system32\dns-sd.exe
2010-07-17 04:00 . 2010-05-17 12:09423656----a-w-c:\windows\system32\deployJava1.dll
2010-07-09 15:37 . 2010-07-09 15:371469544----a-w-c:\windows\system32\nvsvc.dll
2010-07-09 15:37 . 2010-07-09 15:3713939816----a-w-c:\windows\system32\nvcpl.dll
2010-07-09 15:37 . 2010-07-09 15:37129640----a-w-c:\windows\system32\nvvsvc.exe
2010-07-09 15:37 . 2010-07-09 15:37110696----a-w-c:\windows\system32\nvmctray.dll
.

((((((((((((((((((((((((((((( SnapShot_2010-09-28_23.42.52 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-09-29 11:57 . 2010-08-26 05:1513312 c:\windows\winsxs\x86_microsoft-windows-ie-iecompat_31bf3856ad364e35_8.0.6001.23061_none_842241d16004f2b8\iecompat.dll
+ 2010-09-29 11:57 . 2010-08-26 04:2313312 c:\windows\winsxs\x86_microsoft-windows-ie-iecompat_31bf3856ad364e35_8.0.6001.18969_none_83a0d11a46dfe78b\iecompat.dll
+ 2010-09-29 11:57 . 2010-06-22 13:2619456 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6002.22429_none_17aad34f1fde10ac\tzupd.exe
+ 2010-02-24 17:50 . 2010-01-23 09:2619456 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6002.18276_none_16e8242406ebb36b\tzupd.exe
+ 2010-09-29 11:57 . 2010-06-22 13:0419456 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6001.22717_none_15cd30bf22b16ce9\tzupd.exe
+ 2010-02-24 17:50 . 2010-01-23 09:4419456 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6001.18497_none_14ed10c809d4b259\tzupd.exe
+ 2009-05-03 14:56 . 2010-09-29 11:5068664 c:\windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin
+ 2006-11-02 13:05 . 2010-09-29 11:5060312 c:\windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin
+ 2009-05-03 14:40 . 2010-09-29 11:5018804 c:\windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-3891294070-290603237-754910137-1000_UserData.bin
+ 2006-11-02 13:02 . 2010-09-29 11:5232768 c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
- 2006-11-02 13:02 . 2010-09-28 21:5232768 c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
+ 2010-09-28 22:17 . 2010-09-29 11:5232768 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
- 2010-09-28 22:17 . 2010-09-28 21:5232768 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
+ 2006-11-02 13:02 . 2010-09-29 11:5216384 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- 2006-11-02 13:02 . 2010-09-28 21:5216384 c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
+ 2010-09-09 21:00 . 2010-09-29 11:5916384 c:\windows\System32\%APPDATA%\Microsoft\Windows\IETldCache\index.dat
- 2010-09-09 21:00 . 2010-09-27 13:1616384 c:\windows\System32\%APPDATA%\Microsoft\Windows\IETldCache\index.dat
- 2009-05-18 19:46 . 2010-09-28 21:5316384 c:\windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
+ 2009-05-18 19:46 . 2010-09-29 11:4916384 c:\windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
- 2009-05-18 19:46 . 2010-09-28 21:5332768 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
+ 2009-05-18 19:46 . 2010-09-29 11:4932768 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
+ 2009-05-18 19:46 . 2010-09-29 11:4916384 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- 2009-05-18 19:46 . 2010-09-28 21:5316384 c:\windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- 2009-05-18 19:40 . 2010-09-28 21:5216384 c:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
+ 2009-05-18 19:40 . 2010-09-29 11:4816384 c:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
+ 2009-05-18 19:40 . 2010-09-29 11:4832768 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
- 2009-05-18 19:40 . 2010-09-28 21:5232768 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
- 2009-05-18 19:40 . 2010-09-28 21:5216384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
+ 2009-05-18 19:40 . 2010-09-29 11:4816384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
+ 2010-06-04 19:35 . 2010-09-29 12:0049152 c:\windows\Installer\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}\ConfigIcon.dll
- 2010-06-04 19:35 . 2010-09-09 21:0149152 c:\windows\Installer\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}\ConfigIcon.dll
+ 2010-09-29 11:57 . 2010-06-22 13:262048 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6002.22429_none_17aad34f1fde10ac\tzres.dll
+ 2010-09-29 11:57 . 2010-06-22 13:302048 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6002.18276_none_16e8242406ebb36b\tzres.dll
+ 2010-09-29 11:57 . 2010-06-22 13:042048 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6001.22717_none_15cd30bf22b16ce9\tzres.dll
+ 2010-09-29 11:57 . 2010-06-22 12:572048 c:\windows\winsxs\x86_microsoft-windows-i..rnational-timezones_31bf3856ad364e35_6.0.6001.18497_none_14ed10c809d4b259\tzres.dll
+ 2010-09-29 11:48 . 2010-09-29 11:482048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
- 2010-09-28 21:52 . 2010-09-28 21:522048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
+ 2010-09-29 11:48 . 2010-09-29 11:482048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
- 2010-09-28 21:52 . 2010-09-28 21:522048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
+ 2006-11-02 10:33 . 2010-09-29 11:54608760 c:\windows\System32\perfh009.dat
- 2006-11-02 10:33 . 2010-09-28 21:58608760 c:\windows\System32\perfh009.dat
- 2006-11-02 10:33 . 2010-09-28 21:58108268 c:\windows\System32\perfc009.dat
+ 2006-11-02 10:33 . 2010-09-29 11:54108268 c:\windows\System32\perfc009.dat
+ 2006-11-02 10:22 . 2010-09-29 11:556553600 c:\windows\System32\SMI\Store\Machine\schema.dat
- 2006-11-02 10:22 . 2010-09-18 08:516553600 c:\windows\System32\SMI\Store\Machine\schema.dat
+ 2010-09-29 12:03 . 2010-09-29 12:036410240 c:\windows\ERDNT\Hiv-backup\schema.dat
+ 2010-09-29 11:58 . 2010-09-29 11:5820303872 c:\windows\Installer\a26be.msp
+ 2009-05-31 17:07 . 2010-09-29 12:00186205553 c:\windows\winsxs\ManifestCache\6.0.6002.18005_001c11ba_blobs.bin
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="c:\program files\Common Files\Ahead\Lib\NMBgMonitor.exe" [2008-01-22 152872]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-11-09 39408]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"NeroFilterCheck"="c:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2008-05-28 570664]
"SigmatelSysTrayApp"="sttray.exe" [2007-03-29 303104]
"MSSE"="c:\program files\Microsoft Security Essentials\msseces.exe" [2010-06-01 1093208]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]
"@OnlineArmor GUI"="c:\program files\Emsisoft\Online Armor\oaui.exe" [2010-07-05 6854984]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-09-08 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-09-24 421160]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"EnableShellExecuteHooks"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\Emsisoft\ONLINE~1\oaevent.dll" [2010-07-05 924488]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

R1 apprngr;AppRanger Scan Driver;c:\windows\system32\Drivers\apprngr.sys

R2 apprngr_svc;AppRanger Service;c:\program files\AppRanger\SWSvc.exe

R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 133104]
R2 SvcOnlineArmor;Online Armor;c:\program files\Emsisoft\Online Armor\oasrv.exe [2010-07-05 3364680]
R3 bepldr;BCL easyPDF SDK 5 Loader;c:\program files\Common Files\BCL Technologies\easyPDF 5\bepldr.exe [2007-02-21 151552]
R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504]
S0 amacpi;Microsoft Away Mode System;c:\windows\system32\DRIVERS\null.sys [2008-01-19 4608]
S0 npf;npf Driver;c:\windows\system32\drivers\npf.sys [2007-11-06 34064]
S1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [2010-07-05 236104]
S1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [2010-07-05 22600]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-02-17 12872]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2010-05-10 67656]
S2 OAcat;Online Armor Helper Service;c:\program files\Emsisoft\Online Armor\OAcat.exe [2010-07-05 1283400]
S2 Secunia Update Agent;Secunia Update Agent;c:\program files\Secunia\PSI\sua.exe [2010-09-01 318520]
S3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\system32\DRIVERS\MpNWMon.sys [2010-03-25 42368]
S3 OAnet;OnlineArmor Service;c:\windows\system32\DRIVERS\oanet.sys [2010-07-05 29256]
S3 PSI;PSI;c:\windows\system32\DRIVERS\psi_mf.sys [2010-09-01 15544]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
bthsvcsREG_MULTI_SZ BthServ
LocalServiceAndNoImpersonationREG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder

2010-09-29 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 12:13]

2010-09-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-10-11 12:13]

2010-09-28 c:\windows\Tasks\ParetoLogic Registration3.job
- c:\program files\Common Files\ParetoLogic\UUS3\UUS3.dll [2009-08-04 18:19]

2010-08-13 c:\windows\Tasks\ParetoLogic Update Version3.job
- c:\program files\Common Files\ParetoLogic\UUS3\Pareto_Update3.exe [2009-08-04 18:19]

2010-09-29 c:\windows\Tasks\User_Feed_Synchronization-{AAD29C0A-613E-42B8-9812-D1A798192E3F}.job
- c:\windows\system32\msfeedssync.exe [2010-08-11 04:24]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.co.uk/
mStart Page = hxxp://www.voover.com/
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://uk.search.yahoo.com/search?fr=mcafee&p=%s
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-09-29 13:17
Windows 6.0.6002 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2010-09-29 13:25:53
ComboFix-quarantined-files.txt 2010-09-29 12:25
ComboFix2.txt 2010-09-28 23:50
ComboFix3.txt 2010-09-26 14:35
ComboFix4.txt 2010-09-22 13:52
ComboFix5.txt 2010-09-29 12:02

Pre-Run: 59,893,477,376 bytes free
Post-Run: 59,291,213,824 bytes free

- - End Of File - - E9C012840EC9B2A6897E8CB2BF14911F


Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 13:30:43, on 29/09/2010
Platform: Windows Vista SP2 (WinNT 6.00.1906)
MSIE: Internet Explorer v8.00 (8.00.6001.18943)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Secunia\PSI\psi.exe
C:\Windows\System32\mobsync.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\sttray.exe
C:\Program Files\Microsoft Security Essentials\msseces.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
C:\Windows\Explorer.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Program Files\Trend Micro\HijackThis\sniper.exe.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.voover.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://uk.search.yahoo.com/search?fr=mcafee&p=%s
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: McAfee Phishing Filter - {27B4851A-3207-45A2-B947-BE8AFE6163AB} - (no file)
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.6.5612.1312\swg.dll
O2 - BHO: (no name) - {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - (no file)
O2 - BHO: WOT Helper - {C920E44A-7F78-4E64-BDD7-A57026E7FEB7} - C:\Program Files\WOT\WOT.dll
O2 - BHO: MSN Toolbar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN\Toolbar\3.0.1203.0\msneshellx.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O2 - BHO: SingleInstance Class - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - C:\Program Files\Yahoo!\Companion\Installs\cpn\YTSingleInstance.dll
O3 - Toolbar: MSN Toolbar - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.1203.0\msneshellx.dll
O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: WOT - {71576546-354D-41c9-AAE8-31F2EC22BF0D} - C:\Program Files\WOT\WOT.dll
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [SigmatelSysTrayApp] sttray.exe
O4 - HKLM\..\Run: [MSSE] "C:\Program Files\Microsoft Security Essentials\msseces.exe" -hide -runkey
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [@OnlineArmor GUI] "C:\Program Files\Emsisoft\Online Armor\oaui.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} (OnlineScanner Control) - http://download.eset.com/special/eos/OnlineScanner.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O18 - Protocol: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file)
O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file)
O18 - Protocol: wot - {C2A44D6B-CB9F-4663-88A6-DF2F26E4D952} - C:\Program Files\WOT\WOT.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
O23 - Service: AppRanger Service (apprngr_svc) - Unknown owner - C:\Program Files\AppRanger\SWSvc.exe (file missing)
O23 - Service: BCL easyPDF SDK 5 Loader (bepldr) - Unknown owner - C:\Program Files\Common Files\BCL Technologies\easyPDF 5\bepldr.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: EPSON V3 Service4(01) (EPSON_PM_RPCV4_01) - SEIKO EPSON CORPORATION - C:\ProgramData\EPSON\EPW!3 SSRP\E_S40RP7.EXE
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe
O23 - Service: Online Armor Helper Service (OAcat) - Unknown owner - C:\Program Files\Emsisoft\Online Armor\OAcat.exe
O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - C:\Windows\system32\IoctlSvc.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe
O23 - Service: Secunia Update Agent - Secunia - C:\Program Files\Secunia\PSI\sua.exe
O23 - Service: SigmaTel Audio Service (STacSV) - SigmaTel, Inc. - C:\Program Files\SigmaTel\C-Major Audio\WDM\STacSV.exe
O23 - Service: Online Armor (SvcOnlineArmor) - Unknown owner - C:\Program Files\Emsisoft\Online Armor\oasrv.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 8610 bytes
Just to keep you up to date, SuperDave, I deleted the back up folder that contained the 'RECYCLE' folder I couldn't find. I had to change a number of permissions and ownerships to do so (temporarily switched UAC off). During this process a message came up 'Are you sure you want to delete RECYCLE...
I scanned with Secunia again and obtained 100%.
All the logs look ok. Just run this to get rid of the latest version of ComboFix and to set a new restore date.

* Click START then RUN - Vista users press the Windows Key and the R keys for the Run box.
* Now type Combofix /uninstall in the runbox
* Make sure there's a space between Combofix and /Uninstall
* Then hit Enter

* The above procedure will:
* Delete the following:
* ComboFix and its associated files and folders.
* Reset the clock settings.
* Hide file extensions, if required.
* Hide System/Hidden files, if required.
* Set a new, clean Restore Point.

ComboFix uninstalled. Incidentally, I failed to do that before because I misunderstood your instruction. [quote * Click START then RUN - Vista users press the Windows Key and the R keys for the Run box.[/quote]
You might consider changing it to 'Vista users press the Windows Key and the R keys together for the Run box'.

Anyway, thanks SuperDave for your considerable help. I'm impressed with your skill and knowledge. This is an excellent site.
Thanks for the advice. I'll have to update my canned speeches one day when I'm not so busy. Tell your friends about this site.
1707.

Solve : help i cant grant myself admin?

Answer»

I am running windows 7 and am TRYING to GRANT my user administration...with cmd.exe that is when i try to ANYTHING weather i be changing user passwords or adding usernames... it displays system error 5 acces denied. someone told me sounds like infection.any HELP. i used aavg FREE scaner and no results were found.Quote from: cmdpro on September 28, 2010, 07:27:05 PM

I am running windows 7 and am trying to grant my user administration...with cmd.exe that is when i try to anything weather i be changing user passwords or adding usernames... it displays system error 5 acces denied. someone told me sounds like infection.any help. i used aavg free scaner and no results were found.

We fixed this, did we not? You simply hadn't run it as Admin?
1708.

Solve : Rootkit.Agent found in System32 Drivers?

Answer»

Here is the ESET removal:

C:\Users\Darren\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\18\3ebcf5d2-3de6c09bmultiple threatsdeleted - quarantined
C:\Users\Darren\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\238ef117-5a87caaemultiple threatsdeleted - quarantined
C:\Users\Darren\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25\16646899-1fc27cbdmultiple threatsdeleted - quarantined
C:\Users\Darren\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\6e741361-22cae4a7multiple threatsdeleted - quarantined
C:\Users\Darren\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\40\42123aa8-34752fe8OSX/Exploit.Smid.B trojandeleted - quarantined
C:\Users\Darren\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\23ea3369-65466a12multiple threatsdeleted - quarantined
C:\Users\Darren\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43\556445eb-367312bbprobably a variant of Win32/Agent.DYXWUMY trojandeleted - quarantined
C:\Users\Darren\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44\5473416c-3dc84921multiple threatsdeleted - quarantined

Thanks SD,
D.So, how's your computer running now? Any issues?Actually, it seems to be running great!

Did another Eset scan and everything seems to be fine.

Just wondering if I should be deleting the ESET quarantined items, I still have the old Java updates in add/remove, will that get rid of them for good?

So basically if MalwareBytes, SAS, AVG and ESET say I'm clear now, I should be good malware/virus-wise?

Quote

Just wondering if I should be deleting the ESET quarantined items, I still have the old Java updates in add/remove, will that get rid of them for good?
Yes, get rid of them. Could you please try that file in Jotti's as described in Reply # 25.

Hey SD,

Got rid of the quarantined items and the old Java Versions seem to have successfully uninstalled (i.e. I rebooted and they didn't come back).

As for "C:\Windows\System32\Drivers\pblkx.sys" I had PUT in reply #26 that when MRT was able to run successfully and restart the computer successfully, I tried going to Jotti's and the file could not be found.

I've checked the Drivers folder manually as well and the pblkx.sys driver no longer exists.
So, is your computer working well now?Yes it's running very well, I've done full scans of SAS, MBAM, AVG, ESET and everything is coming out clean as a whistle!

It's safe to say that you are an absolute lifesaver, and DARE I say a king among men!

Well, that sound goods to my ears. Let's do some cleanup

* Click START then RUN - Vista users press the Windows Key and the R keys for the Run box.
* Now type commy /uninstall in the runbox
* Make sure there's a space between commy and /Uninstall
* Then hit Enter

* The above procedure will:
* Delete the following:
* ComboFix and its associated files and folders.
* Reset the clock settings.
* Hide file extensions, if required.
* Hide System/Hidden files, if required.
* Set a new, clean Restore Point.
***********************************
Clean out your temporary internet files and temp files.

Download TFC by OldTimer to your desktop.

Double-click TFC.exe to run it.

Note: If you are running on Vista, right-click on the file and choose Run As Administrator

TFC will close all programs when run, so make sure you have saved all your work before you begin.

* Click the Start button to begin the CLEANING process.
* Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
* Please let TFC run uninterrupted until it is finished.

Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.

**********************************
Use the Secunia Software Inspector to check for out of date software.

•Click Start Now

•Check the box next to Enable thorough system inspection.

•Click Start

•Allow the scan to finish and scroll down to see if any updates are needed.
•Update anything listed.
.
----------

Go to Microsoft Windows Update and get all critical updates.

----------

I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest IMMUNIZATIONS always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
Safe Surfing!
Well everything is running tip-top, you can consider this matter closed!

Thank you so very much SuperDave for all your help and patience, you do FANTASTIC work!

D.
1709.

Solve : PAID FOR REGISTRY?

Answer»

i NEED HELP i have the NUMBER but i can not find what PC HELP SOFT it belong to can some one help pleaseHelp how? What is your QUESTION?
At some point we need to ignore her POSTS.

1710.

Solve : Cannot access internet; laptop infected...?

Answer»

Well, that is good news. I just want to make sure that your computer is clean. Please run these scans and post the LOGS.

SUPERAntiSpyware

If you already have SUPERAntiSpyware be sure to check for updates before scanning!

Download SuperAntispyware Free Edition (SAS)
* Double-click the icon on your desktop to run the installer.
* When asked to Update the program definitions, click Yes
* If you encounter any problems while downloading the updates, manually download and unzip them from here
* Next click the Preferences button.

•Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts
* Click the Scanning Control tab.
* Under Scanner Options make sure only the FOLLOWING are checked:

•Close browsers before scanning
•Scan for tracking cookies
•Terminate memory threats before quarantining
Please leave the others unchecked

•Click the Close button to leave the control center screen.

* On the main screen click Scan your computer
* On the left check the box for the drive you are scanning.
* On the right choose Perform Complete Scan
* Click Next to start the scan. Please be patient while it scans your computer.
* After the scan is complete a summary box will appear. Click OK
* Make sure everything in the white box has a check next to it, then click Next
* It will quarantine what it found and if it asks if you want to reboot, click Yes

•To retrieve the removal information please do the following:
•After reboot, double-click the SUPERAntiSpyware icon on your desktop.
•Click Preferences. Click the Statistics/Logs tab.

•Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.

•It will open in your default text editor (preferably Notepad).
•Save the notepad file to your desktop by clicking (in notepad) File > Save As...

* Save the log somewhere you can easily find it. (normally the desktop)
* Click close and close again to exit the program.
*Copy and Paste the log in your post.
***************************************
Please download Malwarebytes Anti-Malware from here.

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • Please save the log to a location you will remember.
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the entire report in your next reply.
Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.
****************************************
Download Security Check by screen317 from one of the following links and save it to your desktop.

Link 1
Link 2

* Unzip SecurityCheck.zip and a folder named Security Check should appear.
* Open the Security Check folder and double-click Security Check.bat
* Follow the on-screen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt
* Post the contents of that document in your next reply.

Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.Okay, SD, following are the logs for SuperAntiSpyware, Malware Bytes, and Security Check:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/29/2010 at 09:33 AM

Application Version : 4.43.1000

Core Rules Database Version : 5601
Trace Rules Database Version: 3413

Scan type : Complete Scan
Total Scan Time : 02:24:45

Memory items scanned : 746
Memory threats detected : 0
Registry items scanned : 7722
Registry threats detected : 0
File items scanned : 149764
File threats detected : 36

Adware.Tracking Cookie
.doubleclick.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.specificmedia.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.specificclick.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.specificclick.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.specificclick.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.specificclick.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.liveperson.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
sales.liveperson.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.liveperson.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.at.atwola.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Users\Trace\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
cdn.eyewonder.com [ C:\Users\Trace\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\ABB52LBL ]
ia.media-imdb.com [ C:\Users\Trace\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\ABB52LBL ]
C:\Users\Trace\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
C:\Users\Trace\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
C:\Users\Trace\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt


And next:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4716

Windows 6.0.6002 Service Pack 2
Internet Explorer 7.0.6002.18005

9/29/2010 12:17:22 PM
mbam-log-2010-09-29 (12-17-22).txt

Scan type: Full scan (C:\|D:\|E:\|)
Objects scanned: 260921
Time elapsed: 1 hour(s), 30 minute(s), 51 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


And next:

Results of screen317's Security Check version 0.99.5
Windows Vista Service Pack 2 (UAC is enabled)
Internet Explorer 7 Out of date!
``````````````````````````````
Antivirus/Firewall Check:
Windows Firewall Enabled!
avast! Free Antivirus
WMI entry may not exist for antivirus; attempting automatic update.
```````````````````````````````
Anti-malware/Other Utilities Check:
Malwarebytes' Anti-Malware
CCleaner
Java(TM) 6 Update 21
Adobe Reader 9.3.4
````````````````````````````````
Process Check:
objlist.exe by Laurent
Windows Defender MSASCui.exe
Windows Defender MSASCui.exe
Alwil Software Avast5 AvastSvc.exe
````````````````````````````````
DNS Vulnerability Check:
GREAT! (Not vulnerable to DNS cache poisoning)

``````````End of Log````````````



What do you think, SD? Am I fixed?

Let me know.

-TracePlease download ComboFix from BleepingComputer.com

Alternate link: GeeksToGo.com

Rename ComboFix.exe to commy.exe before you save it to your Desktop
Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools A guide to do this can be found here
Click Start then copy paste the following command into the search box & hit enter: "%userprofile%\desktop\commy.exe" /stepdel
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. This will not install in Vista. Just continue scanning, and skip the console install.
When finished, it shall PRODUCE a log for you. Please include the contents of C:\ComboFix.txt in your next reply.

If you have problems with ComboFix usage, see How to use ComboFixI too was having the same problem and was getting nowhere fast in getting this fixed. I have an Aspire 3690 running MSXPMCE that worked fine when hard-wired but would not when using wireless. I think some one mentioned registry errors and winsock issues. I believe they are correct since my laptop is now working via wireless. Today, I did the following to correct the prroblem:

First, I downloaded the Norton Internet security removal tool and removed Norton (latest version). This was to see if Norton was causing the issue. After removal, I tried connecting via wireless but no go.

Second, I connected via hard-wire and downloaded the Winsockfix program and ran it on the laptop. It ran maybe for 3 seconds.

Third, I disconnected the hard-wire connection to go wireless and it worked. Everything worked like it should.

Fourth, I reinstalled the Norton Internet security to see if it would affect the wireless but it did not. The wireless connection is still working fine.

Prior to this I also ran Registry Mechanic by PCTools which did fix over 300 registry errors but the wireless still would not work. Maybe it is a problem with the winsock file registry? I think you guys will know better about this than me though. Without you guys I'd be still messing around without a clue.

Great job and many kudos.Hey, SD.

My log from Combofix follows:

ComboFix 10-10-01.01 - Trace 10/01/2010 19:39:39.4.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.2037.1195 [GMT -6:00]
Running from: c:\users\Trace\Desktop\Commy.exe
SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((( Files Created from 2010-09-02 to 2010-10-02 )))))))))))))))))))))))))))))))
.

2010-10-02 01:50 . 2010-10-02 01:50--------d-----w-c:\users\Public\AppData\Local\temp
2010-10-02 01:50 . 2010-10-02 01:50--------d-----w-c:\users\Default\AppData\Local\temp
2010-10-02 01:02 . 2010-10-02 01:12--------d-----w-C:\Commy11548C
2010-10-01 16:33 . 2010-10-01 16:46--------d-----w-C:\Commy
2010-09-29 12:49 . 2010-09-29 12:49--------d-----w-c:\program files\Common Files\Macrovision Shared
2010-09-29 12:48 . 2008-04-07 11:3822872----a-r-c:\windows\system32\AdobePDFUI.dll
2010-09-29 06:08 . 2010-06-22 13:302048----a-w-c:\windows\system32\tzres.dll
2010-09-28 02:17 . 2010-09-28 02:17--------d-----w-c:\program files\iPod
2010-09-28 02:17 . 2010-09-28 02:18--------d-----w-c:\program files\iTunes
2010-09-28 02:15 . 2010-09-28 02:16--------d-----w-c:\program files\QuickTime
2010-09-28 02:15 . 2010-09-28 02:15--------d-----w-c:\program files\Apple Software Update
2010-09-28 02:13 . 2010-09-28 02:13--------d-----w-c:\program files\Bonjour
2010-09-28 02:13 . 2010-09-28 02:17--------d-----w-c:\program files\Common Files\Apple
2010-09-25 14:12 . 2010-09-25 14:12--------d-----w-c:\program files\Feedback Tool
2010-09-24 18:22 . 2010-10-02 01:50--------d-----w-c:\users\Trace\AppData\Local\temp
2010-09-24 08:51 . 2010-09-24 08:5173000----a-w-c:\programdata\Apple Computer\Installer Cache\iTunes 10.0.1.22\SetupAdmin.exe
2010-09-22 23:49 . 2010-09-22 23:49388096----a-r-c:\users\Trace\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2010-09-22 23:49 . 2010-09-22 23:49--------d-----w-c:\program files\Trend Micro
2010-09-22 23:33 . 2010-09-22 23:33--------d-----w-c:\program files\Common Files\Java
2010-09-22 22:52 . 2010-09-22 22:52--------d-----w-c:\users\Trace\AppData\Roaming\Malwarebytes
2010-09-22 22:52 . 2010-04-29 21:3938224----a-w-c:\windows\system32\drivers\mbamswissarmy.sys
2010-09-22 22:52 . 2010-09-22 22:52--------d-----w-c:\programdata\Malwarebytes
2010-09-22 22:52 . 2010-09-22 22:52--------d-----w-c:\program files\Malwarebytes' Anti-Malware
2010-09-22 22:52 . 2010-04-29 21:3920952----a-w-c:\windows\system32\drivers\mbam.sys
2010-09-22 20:05 . 2010-09-29 13:0663488----a-w-c:\users\Trace\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
2010-09-22 20:05 . 2010-09-22 20:0552224----a-w-c:\users\Trace\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-09-22 20:05 . 2010-09-29 13:06117760----a-w-c:\users\Trace\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-09-22 20:04 . 2010-09-22 20:04--------d-----w-c:\programdata\SUPERAntiSpyware.com
2010-09-22 20:04 . 2010-09-22 20:04--------d-----w-c:\users\Trace\AppData\Roaming\SUPERAntiSpyware.com
2010-09-22 20:04 . 2010-09-22 20:05--------d-----w-c:\program files\SUPERAntiSpyware
2010-09-22 20:00 . 2010-09-22 20:00--------d-----w-c:\program files\CCleaner
2010-09-22 15:07 . 2010-09-07 14:4717744----a-w-c:\windows\system32\drivers\aswFsBlk.sys
2010-09-22 15:07 . 2010-09-07 14:52165584----a-w-c:\windows\system32\drivers\aswSP.sys
2010-09-22 15:07 . 2010-09-07 14:4723376----a-w-c:\windows\system32\drivers\aswRdr.sys
2010-09-22 15:07 . 2010-09-07 14:5246672----a-w-c:\windows\system32\drivers\aswTdi.sys
2010-09-22 15:07 . 2010-09-07 14:4750768----a-w-c:\windows\system32\drivers\aswMonFlt.sys
2010-09-22 15:06 . 2010-09-07 15:1238848----a-w-c:\windows\avastSS.scr
2010-09-22 15:06 . 2010-09-07 15:11167592----a-w-c:\windows\system32\aswBoot.exe
2010-09-22 15:06 . 2010-09-22 15:06--------d-----w-c:\programdata\Alwil Software
2010-09-22 15:06 . 2010-09-22 15:06--------d-----w-c:\program files\Alwil Software
2010-09-20 19:58 . 2010-09-20 19:58--------d-----w-c:\users\Trace\MSYNC
2010-09-15 17:51 . 2010-04-16 16:46502272----a-w-c:\windows\system32\usp10.dll
2010-09-15 17:50 . 2010-08-17 14:11128000----a-w-c:\windows\system32\spoolsv.exe
2010-09-15 17:50 . 2010-04-05 17:02317952----a-w-c:\windows\system32\MP4SDECD.DLL
2010-09-15 17:49 . 2010-05-27 20:08739328----a-w-c:\windows\system32\inetcomm.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-29 15:43 . 2007-12-18 03:54112376----a-w-c:\users\Trace\AppData\Local\GDIPFONTCACHEV1.DAT
2010-09-29 12:49 . 2008-03-22 02:37--------d-----w-c:\program files\Common Files\Adobe
2010-09-29 12:49 . 2006-11-02 10:2551200----a-w-c:\windows\Inf\infpub.dat
2010-09-29 12:49 . 2006-11-02 10:25143360----a-w-c:\windows\Inf\infstrng.dat
2010-09-29 12:49 . 2006-11-02 10:25143360----a-w-c:\windows\Inf\infstor.dat
2010-09-28 00:46 . 2007-04-10 10:02--------d-----w-c:\programdata\Symantec
2010-09-24 20:54 . 2008-02-26 01:551356----a-w-c:\users\Trace\AppData\Local\d3d9caps.dat
2010-09-24 20:16 . 2008-07-28 18:04--------d-----w-c:\programdata\Microsoft Help
2010-09-22 23:25 . 2010-06-27 16:49423656----a-w-c:\windows\system32\deployJava1.dll
2010-09-22 23:25 . 2008-02-13 20:23--------d-----w-c:\program files\Java
2010-09-21 23:21 . 2009-03-15 22:31--------d-----w-c:\programdata\Spybot - Search & Destroy
2010-09-21 23:15 . 2007-04-10 09:04--------d--h--w-c:\program files\InstallShield Installation Information
2010-09-21 22:50 . 2009-03-15 22:34--------d-----w-c:\programdata\Lavasoft
2010-09-21 22:10 . 2008-01-29 23:10--------d-----w-c:\program files\Google
2010-09-16 09:01 . 2006-11-02 11:18--------d-----w-c:\program files\Windows Mail
2010-07-28 00:44 . 2010-07-28 00:4491424----a-w-c:\windows\system32\dnssd.dll
2010-07-28 00:44 . 2010-07-28 00:4475040----a-w-c:\windows\system32\jdns_sd.dll
2010-07-28 00:44 . 2010-07-28 00:44197920----a-w-c:\windows\system32\dnssdX.dll
2010-07-28 00:44 . 2010-07-28 00:44107808----a-w-c:\windows\system32\dns-sd.exe
2003-08-01 21:54 . 2009-09-06 18:2325852----a-w-c:\program files\TURNBB__.TTF
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"Google Update"="c:\users\Trace\AppData\Local\Google\Update\GoogleUpdate.exe" [2010-09-28 136176]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"RtHDVCpl"="RtHDVCpl.exe" [2007-03-01 4390912]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-10-23 815104]
"eDSMSNfix"="c:\acer\Empowering Technology\eDSMSNfix.exe" [2007-02-08 13312]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-02-12 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-12 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-02-12 133656]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-09-08 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-09-24 421160]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]
"Adobe Acrobat Speed Launcher"="c:\program files\Adobe\Acrobat 9.0\Acrobat\Acrobat_sl.exe" [2008-06-12 37232]
"Acrobat Assistant 8.0"="c:\program files\Adobe\Acrobat 9.0\Acrobat\Acrotray.exe" [2008-06-12 640376]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

R0 Lbd;Lbd;c:\windows\system32\DRIVERS\Lbd.sys

R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504]
R4 sptd;sptd;c:\windows\system32\Drivers\sptd.sys [2009-01-06 717296]
S1 aswSP;aswSP;

S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-02-17 12872]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2010-05-10 67656]
S2 ALaunchService;ALaunch Service;c:\acer\ALaunch\ALaunchSvc.exe [2007-01-26 50688]
S2 aswFsBlk;aswFsBlk;

S2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2010-09-07 50768]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmtREG_MULTI_SZ hpqcxs08
LocalServiceAndNoImpersonationREG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder

2010-10-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4048087957-2194321304-3991422104-1000Core.job
- c:\users\Trace\AppData\Local\Google\Update\GoogleUpdate.exe [2010-09-28 02:01]

2010-10-02 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4048087957-2194321304-3991422104-1000UA.job
- c:\users\Trace\AppData\Local\Google\Update\GoogleUpdate.exe [2010-09-28 02:01]
.
.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
uInternet Settings,ProxyOverride = *.local
IE: Append to existing PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert link target to Adobe PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert link target to existing PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert to Adobe PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECapture.html
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-10-01 19:50
Windows 6.0.6002 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (EVERYONE)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2010-10-01 19:52:29
ComboFix-quarantined-files.txt 2010-10-02 01:52
ComboFix2.txt 2010-10-02 01:12
ComboFix3.txt 2010-10-01 16:46
ComboFix4.txt 2010-09-24 20:44
ComboFix5.txt 2010-10-02 01:38

Pre-Run: 15,775,641,600 bytes free
Post-Run: 15,740,796,928 bytes free

- - End Of File - - C403EDB12089BB9E312013C59EAF5EE0


Let me know what to do next.

Thanks!

-TraceOnly a couple more scans to go.

Please download 7-Zip and install it. If you already have it, no need to reinstall.

Then, download RootkitUnhooker and save the setup to your Desktop.

  • Right-click on the RootkitUnhooker setup and mouse-over 7-Zip then click Extract to "RKU***"
  • Once that is done, enter the folder, and double-click on the setup file. Navigate through setup and finish.
  • Once that is done, you will see another folder that was created inside the RKU folder. Enter that folder, and double-click on the randomly named file. (It will be alpha-numeric and have an EXE extension on it.)
  • It will initialize itself and load the scanner. It will also install its driver. Please wait for the interface to begin.
  • Once inside the interface, do not fix anything. Click on the Report tab.
  • Next, click on the Scan button and a popup will show. Make sure all are checked, then click on OK. It will begin scanning. When it gets to the Files tab, it will ask you what drives to scan. Just select C:\ and hit OK.
  • It will finish in about 5 minutes or a little longer depending on how badly infected the system is, or if your security software is enabled.
  • When finished, it will show the report in the Report tab. Please copy all of it, and post it in your next reply. Depending on how large the log is, you may have to use two or three posts to get all the information in.
1711.

Solve : Challenge to anyone who can explain this.?

Answer»
My son downloaded World of WARCRAFT from Riot Games and put the package on his desktop. He installed the game and left the downloaded package on the desktop. I noticed something was accessing his HDD at a very high rate. I opened resource monitor and traced it to the desktop install package of the game into a file called datacab2.

I HEAR some game suppliers LIKE Origin will scan your comp for hacked/cracked versions of games but this is very UNUSUAL that it was not a file in the game after install causing this thrashing of the hdd. I deleted the install package and removed it from the recycle BIN and it all went away.

other info: I booted the comp and had not opened the game and it was active thrashing the hdd from the install package on the desktop.

If anyone has any info , reason, or can find out, please reply. I posted here because it seems to me this extreme thrashing of the hdd would be destructive to a hdd over time and seems malicious in that way.

You sure it's not data2.cab?

Google shows that games from Riot Games have issues with data2.cab during the install. Some installers "call home" during the install process so that may explain the constnt disk activity if the installer is having issues creating the data2.cab file.

Also I don't see WOW on the Riot Games website. Are you sure this download was from a reliable source?
1712.

Solve : Getting a Microsoft Security Essentials Alert?

Answer»

Hello...I apologize in advance for my zero knowledge of any thing computer! I am getting a box from Microsoft Security Essentials Alert w/ a big RED Box saying Potential threat details. Message is MSE detected potential threats that might compromise your privacy or damage your computer. Your access to these items may be suspended until you taken an action. Click "Show Details" to learn more.
Detected Items: Unknown Win32/Trojan
Alert Level: High
Recommendation: Remove
Status: Suspended

My question is...is this real or if I click on any of the buttons in the box is that the virus. It came up when I was trying to sign into Mozilla. It came up a few days ago and I ran Malaware and Webroot Antivirus and they came up clean.

Thank you so much w/ your help!!! We have used you in the past and as painful as it was to do all the steps it worked!!!I've noticed a few have looked at this question but no replies. Can someone just tell me if I can run the options Microsoft Security Essentials is asking, if that is legit.

ThanksHello and welcome to Computer HOPE Forum. My name is Dave. I will be helping you out with your particular problem on your computer. I am working under the guidance of one of the specialist of this forum so it may take a bit longer to process your logs.

1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
2. The fixes are specific to your problem and should only be used for this ISSUE on this machine.
3. If you don't know or understand something, please don't hesitate to ASK.
4. Please DO NOT run any other tools or scans while I am helping you.
5. It is important that you reply to this thread. Do not start a new topic.
6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
7. Absence of symptoms does not mean that everything is clear.

If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.

SUPERAntiSpyware

If you already have SUPERAntiSpyware be sure to check for updates before scanning!

Download SuperAntispyware Free Edition (SAS)
* Double-click the icon on your desktop to run the installer.
* When asked to Update the program definitions, click Yes
* If you encounter any problems while downloading the updates, manually download and unzip them from here
* Next click the Preferences button.

•Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts
* Click the Scanning Control tab.
* Under Scanner Options make sure only the following are checked:

•Close browsers before scanning
•Scan for tracking cookies
•Terminate memory threats before quarantining
Please leave the others unchecked

•Click the Close button to leave the control center screen.

* On the main screen click Scan your computer
* On the left check the box for the drive you are scanning.
* On the right choose Perform Complete Scan
* Click Next to start the scan. Please be patient while it scans your computer.
* After the scan is complete a summary box will appear. Click OK
* Make sure everything in the white box has a check next to it, then click Next
* It will quarantine what it found and if it asks if you want to reboot, click Yes

•To retrieve the removal information please do the following:
•After reboot, double-click the SUPERAntiSpyware icon on your desktop.
•Click Preferences. Click the Statistics/Logs tab.

•Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.

•It will open in your default text editor (preferably Notepad).
•Save the notepad file to your desktop by clicking (in notepad) File > Save As...

* Save the log somewhere you can easily find it. (normally the desktop)
* Click close and close again to exit the program.
*COPY and Paste the log in your post.
*****************************************
Please download Malwarebytes Anti-Malware from here.

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • Please save the log to a location you will remember.
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the entire report in your next reply.
Extra Note:

If MBAM encounters a file that is DIFFICULT to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.
******************************************
Please download: HiJackThis to your Desktop.
  • Double Click the HijackThis icon, located on your Desktop.
  • By Default, it will install to: C:\Program Files\Trend Micro\HijackThis
  • Accept the license agreement.
  • Click the Open the Misc Tools section button.
  • Place a checkmark beside Calculate MD5 of files if possible. Then, click Back.
  • Click Do a System Scan and Save a Logfile. Or, if you see a white screen, click Scan.
  • Please post the log in your next reply.
1713.

Solve : Ramnit-B virus rampaging through my computer?

Answer»

Hi there, I've seen many people that are having the same problem with this virus but there are no '1-click-fix' things anywhere, so I figured I would just ask away. I am running Windows XP, SP 3 (I think it's 3, it's the latest one whatever it is). I did have Microsoft Security Essentials installed, and this kept detecting and cleaning all the infected files, then seconds later finding them infected again. On the advice of a computer technician, I have also installed Avast! Antivirus, and Malwarebytes anti-malware. I have turned off MSE, and have been running scans on the other two constantly for the last 36 hours. I've run two boot scans by Avast!, two full scans (again Avast!) and two full scans with MWB. The first few scans detected things, and deleted them, but the last Avast! Full scan and boot scan both came up clean. BUT Avast! keeps detecting attempts to infect other files by this virus, even thought the scans are coming back clean.

Something, which i assume is the same virus, although I can't be sure, keeps redirecting both IE and Chrome to strange websites. The same is happening on 3 out of the 4 computers on my network.

The virus detected is always the same, although sometimes it is classified as a trojan or a worm. It is "win32:Ramnit-B". It generally infects .exe files, which means my antivirus is slowly DELETING all my programmes .

I do not use any P2P software, although someone on my LAN does. When the Computer technician I talked about earlier was looking at this computer, he found over 400 separate viruses.

I'm sure I've left out something necessary, so I apologise in advance. I'm desperately putting off reformatting my computer, because i just don't have time.Clik Here and FOLLOW the Guide for posting your LOGS...Sorry, here are the logs.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 10/01/2010 at 05:20 PM

Application Version : 4.44.1000

Core Rules Database Version : 5614
Trace Rules Database Version: 3426

Scan type : Complete Scan
Total Scan Time : 01:22:41

Memory items scanned : 445
Memory threats detected : 0
Registry items scanned : 5783
Registry threats detected : 0
File items scanned : 48184
File threats detected : 27

Adware.Tracking Cookie
C:\Documents and Settings\Rob\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Rob\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Rob\Cookies\[emailprotected][3].txt
C:\Documents and Settings\Rob\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Rob\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Rob\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Rob\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Rob\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Rob\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Rob\Cookies\[emailprotected][1].txt
C:\Documents and Settings\Rob\Cookies\[emailprotected][2].txt
C:\Documents and Settings\Rob\Cookies\[emailprotected][2].txt
media.heavy.com [ C:\Documents and Settings\LocalService\Application Data\Macromedia\Flash Player\#SharedObjects\5ERH872R ]
media1.break.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\5FMR537J ]
objects.tremormedia.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\5FMR537J ]
C:\Documents and Settings\NetworkService\Cookies\[emailprotected][1].txt
C:\Documents and Settings\NetworkService\Cookies\[emailprotected][1].txt
.atdmt.com [ C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.apmebf.com [ C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.mediaplex.com [ C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.mediaplex.com [ C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.doubleclick.net [ C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]

Trojan.Agent/Gen-FakeProt
C:\DOCUMENTS AND SETTINGS\ROB\APPLICATION DATA\ENLUAS\NUWIE.EXE
C:\PROGRAM FILES\TEMP\U21.EXE


Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 21:50:00, on 02/10/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Trusteer\Rapport\bin\RapportMgmtService.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Application Updater\ApplicationUpdater.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\slserv.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Trusteer\Rapport\bin\RapportService.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\DivX\DivX Update\DivXUpdate.exe
C:\Program Files\Alwil Software\Avast5\avastUI.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Windows Media Player\WMPNSCFG.exe
C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Update\1.2.183.29\GoogleCrashHandler.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
\?\C:\WINDOWS\system32\WBEM\WMIADAP.EXE
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Program Files\Trend Micro\HiJackThis\sniper.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = www.tribalwars.net
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [DivXUpdate] "C:\Program Files\DivX\DivX Update\DivXUpdate.exe" /CHECKNOW
O4 - HKLM\..\Run: [avast5] "C:\Program Files\Alwil Software\Avast5\avastUI.exe" /nogui
O4 - HKLM\..\Run: [OutpostMonitor] C:\PROGRA~1\Agnitum\OUTPOS~1\op_mon.exe /tray /noservice
O4 - HKLM\..\Run: [OutpostFeedBack] "C:\Program Files\Agnitum\Outpost Firewall\feedback.exe" /dump:os_startup
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\Rob\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1263736093050
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O20 - AppInit_DLLs: c:\progra~1\agnitum\outpos~1\wl_hook.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
O23 - Service: Agnitum Client Security Service (acssrv) - Agnitum Ltd. - C:\PROGRA~1\Agnitum\OUTPOS~1\acs.exe
O23 - Service: Application Updater - Spigot, Inc. - C:\Program Files\Application Updater\ApplicationUpdater.exe
O23 - Service: avast! Antivirus - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
O23 - Service: avast! Mail Scanner - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
O23 - Service: avast! Web Scanner - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Oracle - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Rapport Management Service (RapportMgmtService) - Trusteer Ltd. - C:\Program Files\Trusteer\Rapport\bin\RapportMgmtService.exe
O23 - Service: SmartLinkService (SLService) - Smart Link - C:\WINDOWS\SYSTEM32\slserv.exe

--
End of file - 6743 bytes


Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4712

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

02/10/2010 15:30:41
mbam-log-2010-10-02 (15-30-41).txt

Scan type: Quick scan
Objects scanned: 143635
Time elapsed: 21 minute(s), 41 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 5
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{0a11b96e-c7d4-82f7-1e77-c699f728b7da} (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\bk (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\idln2 (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nonep (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\registrymonitor2 (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (c:\windows\system32\userinit.exe,c:\program files\java\jre6\bin\jqssrv.exe,c:\program files\microsoft\desktoplayer.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)If it's Ramnit.....

I'm afraid I have very bad news.

Win32/Ramnit.A is a file infector with IRCBot functionality which infects .exe, and .HTML/HTM files, and opens a back door that compromises your computer. Using this backdoor, a remote attacker can access and instruct the infected computer to download and execute more malicious files. The infected .HTML or .HTM files may be detected as Virus:VBS/Ramnit.A. Win32/Ramnit.A!dll is a related file infector often seen with this infection. It too has IRCBot functionality which infects .exe, .dll and .HTML/HTM files and opens a back door that compromises your computer. This component is injected into the default web browser by Worm:Win32/Ramnit.A which is dropped by a Ramnit infected executable file.

-- Note: As with most malware infections, the threat name may be different depending on the anti-virus or anti-malware program which detected it. Each security vendor uses their own naming conventions to identify various types of malware.[/color]

With this particular infection the safest solution and only sure way to remove it effectively is to reformat and reinstall the OS.

Why? The malware injects code in legitimate files similar to the Virut virus and in many cases the infected files (which could number in the thousands) cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files often become corrupted and the system may become unstable or irreparable. The longer Ramnit.A remains on a computer, the more files it infects and corrupts so the degree of infection can vary.

Ramnit is commonly spread via a flash drive (usb, pen, thumb, jump) infection where it copies Worm:Win32/Ramnit.A with a random file name. The infection is often contracted by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and a major source of system infection.

In my opinion, Ramnit.A is not effectively disinfectable, so your best option is to perform a full reformat as there is no guarantee this infection can be completely removed. In most instances it may have caused so much damage to your system files that it cannot be completely cleaned or repaired. Further, your machine has likely been compromised by the backdoor Trojan and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if your anti-virus reports that the malware appears to have been removed.

Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:Quote
Whenever a system has been compromised by a backdoor payload, it is impossible to know if or how much the backdoor has been used to affect your system...There are only a few ways to return a compromised system to a confident security configuration. These include:
• Reimaging the system
• Restoring the entire system using a full system backup from before the backdoor infection
• Reformatting and reinstalling the system
Backdoors and What They Mean to You

This is what Jesper M. Johansson at Microsoft TechNet has to say: Help: I Got Hacked. Now What Do I Do?.Quote
The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications).


Important Note:: If your computer was used for online banking, has credit CARD information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to to include those used for banking, email, eBay, paypal and any online activities which REQUIRE a username and password. You should consider them to be compromised[/b]. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach. Failure to notify your financial institution and local law enforcement can result in refusal to reimburse funds lost due to fraud or similar criminal activity.
Blast, that's exactly what I was hoping not to hear. Thanks anyway. Is there any way to back up my documents whilst still ensuring that I do not bring the virus onto my newly reformatted computer when they are transferred over?Yes, you can, if you follow very strict rules...

* If you'll be using USB flash drive to move files from bad computer to good computer, make sure to install this on good computer...

Download, and run Flash Disinfector, and save it to your desktop (Windows Vista and Windows 7 users, scroll down)

*Please disable any AV / ScriptBlockers as they might detect Flash Disinfector to be malicious and block it. Hence, the failure in executing. You can enable them back after the cleaning process*

  • Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
  • The utility may ask you to insert your flash drive and/or other removable drives. Please do so and allow the utility to clean up those drives as well.
  • Hold down the Shift key when inserting the drive until Windows detects it to keep autorun.inf from executing if it is present.
  • Wait until it has finished scanning and then exit the program.
  • Reboot your computer when done.
Note: As part of its routine, Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive that was plugged in when you ran it. Do not delete this folder...it will help protect your drives from future infection by keeping the autorun file from being installed on the root drive and running other malicious files.

Windows Vista and Windows 7 users
Flash Disinfector is not compatible with the above Windows version.
Please, use Panda USB Vaccine

* If you'll be using external drive to back up your data, make sure to install Flash Disinfector on bad computer after formatting and installing Windows and BEFORE connecting your external drive, or using USB flash drive.

Now, you're safe to connect your external drive, or USB stick.
BEFORE moving anything back from an external drive, or USB stick, make sure to scan them with freshly updated AV program and, for a good measure with one of online scanners, like Eset, or Kaspersky.
Sorry to be dense, but could you just run through that again? Im using windows XP and will be using an external hard drive to transfer data. The hard drive already has data on it that I want to be careful of. Unless it's necessary, i didn't plan to move the files from computer to computer, only from computer to EHD, then back to formatted computer.In that case, I wouldn't be using that external drive.
You don't want to mix clean files with possibly infected files.

Some choices...
- empty external drive to another computer and use it
- get another external drive
- get couple of 8GB/16GB USB sticks, depending on how much data you need to moveSorry, you replied before edit. I'll empty the EHD and use it. So when should i use flashdisinfector on it? And also, how can i get flash disinfector onto the clean computer without inserting USB drive or EHD.You reinstall Windows first, so everything is working, including internet connection.
Download and install Flash Disinfector.
Connect external drive.
Scan all files.Ok, got it. Thanks alot.You're very welcome
1714.

Solve : Infected wuauclt.exe?

Answer»

If ComboFix is still on your computer you should find it on your desktop. If you can't find, please download and install another one and run another scan and post the log.ComboFix 10-09-29.01 - Jinju 09/29/2010 18:12:08.1.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.958.437 [GMT -4:00]
Running from: c:\users\Jinju\Desktop\ComboFix.exe
SP: AVG Anti-Spyware *disabled* (Outdated) {48F2E28D-ED66-4646-9C11-B3055B0AF604}
SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
* Created a new RESTORE point
.

((((((((((((((((((((((((( Files Created from 2010-08-28 to 2010-09-29 )))))))))))))))))))))))))))))))
.

2010-09-29 22:28 . 2010-09-29 22:28--------d-----w-c:\users\Public\AppData\Local\temp
2010-09-29 22:28 . 2010-09-29 22:28--------d-----w-c:\users\Jinhee\AppData\Local\temp
2010-09-29 22:28 . 2010-09-29 22:28--------d-----w-c:\users\Default\AppData\Local\temp
2010-09-29 22:07 . 2010-09-29 22:08--------d-----w-C:\32788R22FWJFW
2010-09-28 20:44 . 2010-06-22 12:572048----a-w-c:\windows\system32\tzres.dll
2010-09-23 20:19 . 2010-09-23 20:191377632----a-w-c:\programdata\avg9\update\backup\avgssff.dll
2010-09-23 20:19 . 2010-09-23 20:19598368----a-w-c:\programdata\avg9\update\backup\avgsrmx.dll
2010-09-23 20:19 . 2010-09-23 20:19942432----a-w-c:\programdata\avg9\update\backup\avgcfgx.dll
2010-09-23 20:19 . 2010-09-23 20:194371296----a-w-c:\programdata\avg9\update\backup\avgcorex.dll
2010-09-23 20:19 . 2010-09-23 20:19300896----a-w-c:\programdata\avg9\update\backup\avgchclx.dll
2010-09-23 20:15 . 2010-09-23 20:151690952----a-w-c:\programdata\avg9\update\backup\avgupd.dll
2010-09-23 07:21 . 2010-04-14 17:47293376----a-w-c:\windows\system32\psisdecd.dll
2010-09-23 07:21 . 2010-04-14 17:46428544----a-w-c:\windows\system32\EncDec.dll
2010-09-23 07:18 . 2009-11-08 14:5599176----a-w-c:\windows\system32\PresentationHostProxy.dll
2010-09-23 07:18 . 2009-11-08 14:5549472----a-w-c:\windows\system32\netfxperf.dll
2010-09-23 07:18 . 2009-11-08 14:55297808----a-w-c:\windows\system32\mscoree.dll
2010-09-23 07:18 . 2009-11-08 14:55295264----a-w-c:\windows\system32\PresentationHost.exe
2010-09-23 07:18 . 2009-11-08 14:551130824----a-w-c:\windows\system32\dfshim.dll
2010-09-23 00:17 . 2010-06-11 15:31274432----a-w-c:\windows\system32\schannel.dll
2010-09-23 00:17 . 2008-08-02 01:01625152----a-w-c:\windows\system32\drivers\dxgkrnl.sys
2010-09-23 00:17 . 2008-06-26 03:29565248----a-w-c:\windows\system32\emdmgmt.dll
2010-09-23 00:17 . 2008-08-02 03:2636864----a-w-c:\windows\system32\cdd.dll
2010-09-23 00:17 . 2008-06-26 03:2945056----a-w-c:\windows\system32\dataclen.dll
2010-09-23 00:17 . 2008-05-20 02:07148480----a-w-c:\windows\system32\drivers\nwifi.sys
2010-09-23 00:17 . 2010-05-27 19:1681920----a-w-c:\windows\system32\iccvid.dll
2010-09-23 00:17 . 2009-08-24 12:16378368----a-w-c:\windows\system32\winhttp.dll
2010-09-23 00:17 . 2010-04-05 16:0767072----a-w-c:\windows\system32\asycfilt.dll
2010-09-23 00:17 . 2010-06-21 13:182036736----a-w-c:\windows\system32\win32k.sys
2010-09-23 00:08 . 2010-06-08 17:003598216----a-w-c:\windows\system32\ntkrnlpa.exe
2010-09-23 00:08 . 2010-06-08 17:003545992----a-w-c:\windows\system32\ntoskrnl.exe
2010-09-23 00:07 . 2010-04-16 16:101314816----a-w-c:\windows\system32\quartz.dll
2010-09-23 00:07 . 2010-06-11 15:301257472----a-w-c:\windows\system32\msxml3.dll
2010-09-23 00:07 . 2008-09-18 04:56125952----a-w-c:\windows\system32\wersvc.dll
2010-09-23 00:07 . 2008-09-18 04:56147456----a-w-c:\windows\system32\Faultrep.dll
2010-09-23 00:07 . 2010-06-18 14:43302080----a-w-c:\windows\system32\drivers\srv.sys
2010-09-23 00:07 . 2010-06-18 14:43144896----a-w-c:\windows\system32\drivers\srv2.sys
2010-09-23 00:07 . 2008-05-08 21:5990112----a-w-c:\windows\system32\wshext.dll
2010-09-23 00:07 . 2008-05-08 21:59155648----a-w-c:\windows\system32\wscript.exe
2010-09-23 00:07 . 2008-05-08 21:59180224----a-w-c:\windows\system32\scrobj.dll
2010-09-23 00:07 . 2008-05-08 21:59172032----a-w-c:\windows\system32\scrrun.dll
2010-09-23 00:07 . 2008-05-08 21:58135168----a-w-c:\windows\system32\cscript.exe
2010-09-23 00:03 . 2008-04-05 03:3415360----a-w-c:\windows\system32\pacerprf.dll
2010-09-23 00:03 . 2008-04-05 01:2172192----a-w-c:\windows\system32\drivers\pacer.sys
2010-09-23 00:03 . 2010-04-16 16:0528672----a-w-c:\windows\system32\Apphlpdm.dll
2010-09-23 00:03 . 2010-04-16 14:174240384----a-w-c:\windows\system32\GameUXLegacyGDFs.dll
2010-09-23 00:02 . 2010-06-18 16:4336352----a-w-c:\windows\system32\rtutils.dll
2010-09-23 00:02 . 2010-05-26 14:25289792----a-w-c:\windows\system32\atmfd.dll
2010-09-23 00:02 . 2009-10-19 14:2472704----a-w-c:\windows\system32\fontsub.dll
2010-09-23 00:02 . 2010-05-26 16:1634304----a-w-c:\windows\system32\atmlib.dll
2010-09-23 00:02 . 2009-06-15 15:2010240----a-w-c:\windows\system32\dciman32.dll
2010-09-23 00:00 . 2010-06-16 15:59898952----a-w-c:\windows\system32\drivers\tcpip.sys
2010-09-22 23:51 . 2010-08-17 13:32126464----a-w-c:\windows\system32\spoolsv.exe
2010-09-22 23:40 . 2010-04-16 16:10501760----a-w-c:\windows\system32\usp10.dll
2010-09-22 23:34 . 2010-04-05 16:08317952----a-w-c:\windows\system32\MP4SDECD.DLL
2010-09-22 23:26 . 2010-05-27 19:16738816----a-w-c:\windows\system32\inetcomm.dll
2010-09-22 23:25 . 2009-10-19 14:27156672----a-w-c:\windows\system32\t2embed.dll
2010-09-22 23:25 . 2010-02-23 11:32105984----a-w-c:\windows\system32\drivers\mrxsmb.sys
2010-09-22 23:25 . 2010-02-23 11:3278848----a-w-c:\windows\system32\drivers\mrxsmb20.sys
2010-09-22 23:25 . 2010-02-23 11:32212992----a-w-c:\windows\system32\drivers\mrxsmb10.sys
2010-09-22 23:24 . 2009-07-11 19:32513024----a-w-c:\windows\system32\wlansvc.dll
2010-09-22 23:24 . 2009-07-11 19:32302592----a-w-c:\windows\system32\wlansec.dll
2010-09-22 23:24 . 2009-07-11 19:32293376----a-w-c:\windows\system32\wlanmsm.dll
2010-09-22 23:24 . 2009-07-11 19:29127488----a-w-c:\windows\system32\L2SecHC.dll
2010-09-22 23:22 . 2009-08-14 14:169728----a-w-c:\windows\system32\TCPSVCS.EXE
2010-09-22 23:22 . 2009-08-14 14:1617920----a-w-c:\windows\system32\ROUTE.EXE
2010-09-22 23:22 . 2009-08-14 14:1627136----a-w-c:\windows\system32\NETSTAT.EXE
2010-09-22 23:21 . 2009-08-14 16:29104960----a-w-c:\windows\system32\netiohlp.dll
2010-09-22 23:21 . 2009-08-14 14:1611264----a-w-c:\windows\system32\MRINFO.EXE
2010-09-22 23:21 . 2009-08-14 14:168704----a-w-c:\windows\system32\HOSTNAME.EXE
2010-09-22 23:21 . 2009-08-14 14:1610240----a-w-c:\windows\system32\finger.exe
2010-09-22 23:21 . 2009-08-14 14:1619968----a-w-c:\windows\system32\ARP.EXE
2010-09-22 23:21 . 2009-08-14 16:2917920----a-w-c:\windows\system32\netevent.dll
2010-09-22 23:19 . 2009-09-10 17:30213504----a-w-c:\windows\system32\msv1_0.dll
2010-09-22 23:09 . 2008-10-22 03:57241152----a-w-c:\windows\system32\PortableDeviceApi.dll
2010-09-22 04:34 . 2008-06-20 01:1497800----a-w-c:\windows\system32\infocardapi.dll
2010-09-22 04:34 . 2008-06-20 01:14105016----a-w-c:\windows\system32\PresentationCFFRasterizerNative_v0300.dll
2010-09-22 04:34 . 2008-06-20 01:1411264----a-w-c:\windows\system32\icardres.dll
2010-09-22 04:34 . 2008-06-20 01:14622080----a-w-c:\windows\system32\icardagt.exe
2010-09-22 04:34 . 2008-06-20 01:14781344----a-w-c:\windows\system32\PresentationNative_v0300.dll
2010-09-22 04:25 . 2008-07-27 18:03158720----a-w-c:\windows\system32\mscorier.dll
2010-09-22 04:25 . 2008-07-27 18:0383968----a-w-c:\windows\system32\mscories.dll
2010-09-22 04:22 . 2010-02-20 23:3924064----a-w-c:\windows\system32\nshhttp.dll
2010-09-22 04:22 . 2010-02-20 23:3731232----a-w-c:\windows\system32\httpapi.dll
2010-09-22 04:22 . 2010-02-20 21:18411136----a-w-c:\windows\system32\drivers\http.sys
2010-09-22 03:59 . 2010-04-29 19:3938224----a-w-c:\windows\system32\drivers\mbamswissarmy.sys
2010-09-22 03:59 . 2010-04-29 19:3920952----a-w-c:\windows\system32\drivers\mbam.sys
2010-09-22 03:40 . 2010-09-22 03:4052224----a-w-c:\users\Jinju\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-09-22 03:40 . 2010-09-22 03:4063488----a-w-c:\users\Jinju\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
2010-09-22 03:40 . 2010-09-22 03:40117760----a-w-c:\users\Jinju\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-09-21 22:00 . 2010-09-21 22:00165632---ha-w-c:\windows\system32\mlfcache.dat
2010-09-21 22:00 . 2010-09-21 22:002788816----a-w-c:\users\Jinju\AppData\Roaming\Macromedia\Flash Player\www.macromedia.com\bin\fpupdatepl\fpupdatepl.exe
2010-09-21 11:56 . 2010-09-21 11:56658184----a-w-c:\programdata\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight\SpotlightResources.dll
2010-09-21 11:28 . 2010-09-21 11:28--------d-----w-c:\programdata\Office Genuine Advantage
2010-09-21 05:37 . 2010-09-21 05:372384752----a-w-c:\programdata\WildTangent\My HP Game Console\Downloads\en-us\Installers\SetupGamesClient.exe
2010-09-21 05:28 . 2010-09-21 05:2920519176----a-w-c:\programdata\WildTangent\My HP Game Console\Downloads\Installers\SetupGamesClient.exe
2010-09-21 05:08 . 2008-01-19 07:361541120----a-w-c:\windows\system32\onex.dll
2010-09-21 05:08 . 2008-01-19 07:332623488----a-w-c:\windows\system32\SLsvc.exe
2010-09-21 05:06 . 2008-01-19 07:361013760----a-w-c:\windows\system32\wevtsvc.dll
2010-09-21 05:04 . 2008-01-19 07:35216064----a-w-c:\windows\system32\ntprint.dll
2010-09-21 05:03 . 2008-01-19 07:36242688----a-w-c:\windows\system32\pdh.dll
2010-09-21 05:02 . 2008-01-19 07:34394240----a-w-c:\windows\system32\dsquery.dll
2010-09-21 05:01 . 2008-01-19 07:371329152----a-w-c:\windows\system32\WMSPDMOE.DLL
2010-09-21 05:00 . 2008-01-19 07:3331744----a-w-c:\windows\system32\bitsigd.dll
2010-09-21 04:59 . 2008-01-19 07:3317408----a-w-c:\windows\system32\cfgmgr32.dll
2010-09-21 04:58 . 2008-01-19 07:33599552----a-w-c:\windows\system32\vsp1cln.exe
2010-09-21 04:57 . 2008-01-19 07:34102400----a-w-c:\windows\system32\wbem\mofinstall.dll
2010-09-21 04:57 . 2008-01-19 07:3683968----a-w-c:\windows\system32\wbem\wmiutils.dll
2010-09-21 04:57 . 2008-01-19 07:36742912----a-w-c:\windows\system32\wbem\wbemcore.dll
2010-09-21 04:57 . 2008-01-19 07:3630208----a-w-c:\windows\system32\wbem\wbemprox.dll
2010-09-21 04:57 . 2008-01-19 07:36357888----a-w-c:\windows\system32\wbemcomn.dll
2010-09-21 04:57 . 2008-01-19 07:36264704----a-w-c:\windows\system32\wbem\repdrvfs.dll
2010-09-21 04:57 . 2008-01-19 07:34191488----a-w-c:\windows\system32\wbem\mofd.dll
2010-09-21 04:57 . 2008-01-19 07:34263168----a-w-c:\windows\system32\wbem\esscli.dll
2010-09-21 04:56 . 2008-01-19 07:36139264----a-w-c:\windows\system32\SmiInstaller.dll
2010-09-21 04:56 . 2008-01-19 07:36704512----a-w-c:\windows\system32\SmiEngine.dll
2010-09-21 04:56 . 2008-01-19 07:36218624----a-w-c:\windows\system32\wdscore.dll
2010-09-21 04:56 . 2008-01-19 07:33130560----a-w-c:\windows\system32\PkgMgr.exe
2010-09-21 04:54 . 2008-01-19 07:34246784----a-w-c:\windows\system32\drvstore.dll
2010-09-21 04:54 . 2008-01-19 07:3535328----a-w-c:\windows\system32\mspatcha.dll
2010-09-21 04:54 . 2008-01-19 07:34305152----a-w-c:\windows\system32\msdelta.dll
2010-09-21 04:54 . 2008-01-19 07:34258560----a-w-c:\windows\system32\dpx.dll
2010-09-21 04:52 . 2008-10-21 05:251645568----a-w-c:\windows\system32\connect.dll
2010-09-21 04:51 . 2010-01-25 08:34511488----a-w-c:\windows\system32\RMActivate.exe
2010-09-21 04:51 . 2010-01-25 08:35523776----a-w-c:\windows\system32\RMActivate_isv.exe
2010-09-21 04:51 . 2010-01-25 12:48472576----a-w-c:\windows\system32\secproc_isv.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-23 22:55 . 2010-09-23 22:550---ha-w-c:\windows\system32\drivers\Msft_User_WpdFs_01_00_00.Wdf
2010-09-23 20:30 . 2008-07-25 21:33--------d-----w-c:\users\Jinju\AppData\Roaming\OpenOffice.org2
2010-09-23 07:54 . 2006-11-02 11:18--------d-----w-c:\program files\Windows Mail
2010-09-23 07:26 . 2007-06-29 13:00--------d-----w-c:\programdata\Microsoft Help
2010-09-22 00:25 . 2007-09-05 00:5097936----a-w-c:\users\Jinju\AppData\Local\GDIPFONTCACHEV1.DAT
2010-09-22 00:16 . 2006-11-02 10:2586016----a-w-c:\windows\Inf\infstor.dat
2010-09-22 00:16 . 2006-11-02 10:2551200----a-w-c:\windows\Inf\infpub.dat
2010-09-22 00:16 . 2006-11-02 10:25143360----a-w-c:\windows\Inf\infstrng.dat
2010-09-22 00:07 . 2006-11-02 12:37--------d-----w-c:\program files\Windows Sidebar
2010-09-22 00:07 . 2006-11-02 12:37--------d-----w-c:\program files\Windows Calendar
2010-09-22 00:07 . 2006-11-02 12:37--------d-----w-c:\program files\Windows Collaboration
2010-09-22 00:07 . 2006-11-02 12:37--------d-----w-c:\program files\Windows Journal
2010-09-22 00:07 . 2006-11-02 12:37--------d-----w-c:\program files\Windows Photo Gallery
2010-09-22 00:07 . 2006-11-02 12:37--------d-----w-c:\program files\Windows Defender
2010-09-22 00:01 . 2006-11-02 10:25665600----a-w-c:\windows\Inf\drvindex.dat
2010-09-21 23:14 . 2006-11-02 10:32101888----a-w-c:\windows\system32\ifxcardm.dll
2010-09-21 23:13 . 2006-11-02 10:3282432----a-w-c:\windows\system32\axaltocm.dll
2010-09-21 06:42 . 2007-06-29 12:58--------d-----w-c:\program files\Microsoft Works
2010-09-21 06:32 . 2008-08-07 02:45--------d-----w-c:\programdata\WildTangent
2010-09-21 06:32 . 2008-03-29 02:28--------d-----w-c:\program files\Safari
2010-09-21 06:32 . 2008-08-11 03:25--------d-----w-c:\program files\QuickTime
2010-09-21 06:32 . 2007-09-10 01:12--------d-----w-c:\program files\NetZero
2010-09-21 06:32 . 2008-08-11 03:29--------d-----w-c:\program files\iTunes
2010-09-21 06:32 . 2006-11-30 22:49--------d-----w-c:\program files\HP Games
2010-09-21 06:32 . 2008-08-11 03:27--------d-----w-c:\program files\Bonjour
2010-09-21 06:29 . 2007-10-22 07:00--------d-----w-c:\users\Jinju\AppData\Roaming\Move Networks
2010-09-21 06:29 . 2007-09-10 01:19--------d-----w-c:\program files\iPod
2010-09-21 06:29 . 2007-06-29 13:05--------d-----w-c:\program files\HP
2010-09-21 03:49 . 2007-09-05 02:3613025----a-w-c:\users\Jinju\AppData\Roaming\nvModes.dat
2010-09-21 03:25 . 2007-10-03 03:09--------d-----w-c:\programdata\Viewpoint
2010-09-19 22:45 . 2008-07-08 21:07--------d-----w-c:\program files\AVG
2010-09-15 22:51 . 2010-06-27 19:43--------d-----w-c:\programdata\WinZip
2010-09-14 04:00 . 2007-11-29 01:091356----a-w-c:\users\Jinju\AppData\Local\d3d9caps.dat
2010-09-13 13:49 . 2010-02-16 20:17--------d-----w-c:\program files\Microsoft Silverlight
2010-09-08 00:30 . 2009-05-28 18:37--------d-----w-c:\programdata\Motive
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*NOTE* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2008-01-19 1233920]
"NetZero_uoltray"="c:\program files\NetZero\exec.exe" [2007-03-07 1629184]
"HPAdvisor"="c:\program files\Hewlett-Packard\HP Advisor\HPAdvisor.exe" [2006-11-21 1474560]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"Aim6"="c:\program files\AIM6\aim6.exe" [2008-03-25 50528]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-05-27 413696]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-07-30 289064]
"QPService"="c:\program files\HP\QuickPlay\QPService.exe" [2006-11-24 167936]
"QlbCtrl"="c:\program files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe" [2006-11-06 159744]
"Mouse Suite 98 Daemon"="ICO.EXE" [2006-11-03 49152]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-12 39792]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-11-15 815104]
"SunJavaUpdateSched"="c:\program files\Java\jre1.6.0_07\bin\jusched.exe" [2008-06-10 144784]
"WAWifiMessage"="c:\program files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe" [2006-10-18 317152]
"hpWirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2006-10-18 472800]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"HP Software Update"="c:\program files\Hp\HP Software Update\HPWuSchd2.exe" [2005-02-17 49152]
"AppleSyncNotifier"="c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe" [2008-07-23 116040]
"HP Health Check Scheduler"="c:\program files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe" [2006-11-10 46704]
"NvSvc"="c:\windows\system32\nvsvc.dll" [2006-11-18 90191]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2006-11-18 7753728]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2006-11-18 81920]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Launcher"="c:\windows\SMINST\launcher.exe" [2006-11-08 44128]

c:\users\Jinju\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
MEMonitor.lnk - c:\program files\V CAST Music Manager\MEMonitor.exe [2007-11-2 951640]
OpenOffice.org 2.4.lnk - c:\program files\OpenOffice.org 2.4\program\quickstart.exe [2008-1-21 393216]

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
HP Connections.lnk - c:\program files\HP Connections\6811507\Program\HP Connections.exe [2007-6-29 34520]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-02-17 12872]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2010-05-10 67656]
S4 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\Drivers\avgtdix.sys




--- Other Services/Drivers In Memory ---

*Deregistered* - AvgLdx86
.
Contents of the 'Scheduled Tasks' folder

2010-09-29 c:\windows\Tasks\User_Feed_Synchronization-{90EE62B4-9066-4567-B527-472EEF2CA871}.job
- c:\windows\system32\msfeedssync.exe [2010-09-21 07:33]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.aol.com/?src=aim
mStart Page = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=71&bd=Pavilion&pf=laptop
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://my.netzero.net/s/SEARCH?r=minisearch
IE: Display All Images with Full Quality - c:\program files\NetZero\qsacc\appres.dll/228
IE: Display Image with Full Quality - c:\program files\NetZero\qsacc\appres.dll/227
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
Trusted Zone: netzero.com
Trusted Zone: netzero.net
FF - ProfilePath - c:\users\Jinju\AppData\Roaming\Mozilla\Firefox\Profiles\w5fweigy.default\
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);
.
- - - - ORPHANS REMOVED - - - -

Toolbar-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
WebBrowser-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-09-29 18:28
Windows 6.0.6001 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2010-09-29 18:33:46
ComboFix-quarantined-files.txt 2010-09-29 22:33

Pre-Run: 73,712,840,704 bytes free
Post-Run: 73,612,976,128 bytes free

- - End Of File - - BAAE23D9312E5BAE78E43F64E6E7ED60oh and what is an HJT? You've never told me to run it before and I have no idea what that is...Re-running ComboFix to remove infections:

  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
  • Open notepad and copy/paste the text in the quotebox below into it:
    Quote
    KillAll::

    DDS::
    Trusted Zone: netzero.com
    Trusted Zone: netzero.net

  • Save this as CFScript.txt, in the same location as ComboFix.exe



  • Referring to the picture above, drag CFScript into ComboFix.exe
  • When finished, it shall produce a log for you at C:\ComboFix.txt
  • I do not need to see the log from this action.
Quote
oh and what is an HJT? You've never told me to run it before and I have no idea what that is...
Sorry.Here it is.

Please download: HiJackThis to your Desktop.
  • Double Click the HijackThis icon, located on your Desktop.
  • By Default, it will install to: C:\Program Files\Trend Micro\HijackThis
  • Accept the license agreement.
  • Click the Open the Misc Tools section button.
  • Place a checkmark beside Calculate MD5 of files if possible. Then, click Back.
  • Click Do a System Scan and Save a Logfile. Or, if you see a white screen, click Scan.
  • Please post the log in your next reply.
Logfile of Trend Micro HijackThis v2.0.2
Scan SAVED at 11:49:34 PM, on 9/29/2010
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18498)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\system32\conime.exe
C:\Windows\system32\wuauclt.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\HP\QuickPlay\QPService.exe
C:\Windows\System32\ICO.EXE
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Program Files\HP\HP Software Update\hpwuSchd2.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\NetZero\exec.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\HP Connections\6811507\Program\HP Connections.exe
C:\Program Files\V CAST Music Manager\MEMonitor.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\OpenOffice.org 2.4\program\soffice.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN
C:\Windows\System32\rundll32.exe
C:\Windows\System32\Pelmiced.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\NetZero\exec.exe
C:\Program Files\NetZero\qsacc\x1exec.exe
C:\Program Files\AIM6\aolsoftware.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\sdclt.exe
C:\Windows\Explorer.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=71&bd=Pavilion&pf=laptop
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://my.netzero.net/s/search?r=minisearch
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: URLSearchHook Class - {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - C:\Program Files\NetZero\SearchEnh1.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll (filesize 62080 bytes, MD5 C11F6A1F61481E24BE3FDC06EA6F7D2A)
O2 - BHO: Pop-up Blocker - {52706EF7-D7A2-49AD-A615-E903858CF284} - C:\Program Files\NetZero\qsacc\X1IEBHO.dll (filesize 211720 bytes, MD5 E194E3DF6BA5487F2B67FFAED9CF4D49)
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll (filesize 509328 bytes, MD5 F921D875A1CBD69A6A462BA2514BC831)
O3 - Toolbar: ZeroBar - {F0F8ECBE-D460-4B34-B007-56A92E8F84A7} - C:\Program Files\NetZero\Toolbar.dll (filesize 297456 bytes, MD5 F65776B8C0C9DF600BC6FBD73796F5D3)
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime (filesize 413696 bytes, MD5 F34EB5D4F145ED5FE50033CA3A41ED24)
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe" (filesize 289064 bytes, MD5 4CED92963F453EB8DCFE67FD4248D657)
O4 - HKLM\..\Run: [QPService] "C:\Program Files\HP\QuickPlay\QPService.exe" (filesize 167936 bytes, MD5 F4810C2DC4F2E92E1B5EBCA2173DBBCE)
O4 - HKLM\..\Run: [QlbCtrl] %ProgramFiles%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start
O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE (filesize 49152 bytes, MD5 EDE74971B94F39238817BD0362FA171A)
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" (filesize 39792 bytes, MD5 8B9145D229D4E89D15ACB820D4A3A90F)
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exeC:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe" (filesize 144784 bytes, MD5 6AB4C021FBD36DC6764924C312428D97)
O4 - HKLM\..\Run: [WAWifiMessage] %ProgramFiles%\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe
O4 - HKLM\..\Run: [hpWirelessAssistant] %ProgramFiles%\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exeC:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exeC:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
O4 - HKLM\..\Run: [HP Health Check Scheduler] C:\Program Files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exeC:\Program Files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart (filesize 44544 bytes, MD5 4B555106290BD117334E9A08761C035A)
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup (filesize 44544 bytes, MD5 4B555106290BD117334E9A08761C035A)
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit (filesize 44544 bytes, MD5 4B555106290BD117334E9A08761C035A)
O4 - HKLM\..\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun (filesize 1233920 bytes, MD5 FD278E51A7D6F52D22FCE6C67E037AD6)
O4 - HKCU\..\Run: [NetZero_uoltray] C:\Program Files\NetZero\exec.exe regrun (filesize 1629184 bytes, MD5 105BCCEF090AE7DA70046E3FB0EC10C8)
O4 - HKCU\..\Run: [HPAdvisor] C:\Program Files\Hewlett-Packard\HP Advisor\HPAdvisor.exeC:\Program Files\Hewlett-Packard\HP Advisor\HPAdvisor.exe
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exeC:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp (filesize 50528 bytes, MD5 A29F21DC5C28D85592E84CFCAD3ED52B)
O4 - Startup: MEMonitor.lnk = C:\Program Files\V CAST Music Manager\MEMonitor.exe (filesize 951640 bytes, MD5 C1EEFC1FC617ED9CC1808C20F5E801A3)
O4 - Startup: OpenOffice.org 2.4.lnk = C:\Program Files\OpenOffice.org 2.4\program\quickstart.exe (filesize 393216 bytes, MD5 F5CECCFE0CF964B209DCAB226D4C1DE3)
O4 - Global Startup: HP Connections.lnk = C:\Program Files\HP Connections\6811507\Program\HP Connections.exe (filesize 34520 bytes, MD5 3754F4C688BFD04BC886112BD6566A9B)
O8 - Extra context menu item: Display All Images with Full Quality - res://C:\Program Files\NetZero\qsacc\appres.dll/228
O8 - Extra context menu item: Display Image with Full Quality - res://C:\Program Files\NetZero\qsacc\appres.dll/227
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~2.0_0\bin\ssv.dll (filesize 509328 bytes, MD5 F921D875A1CBD69A6A462BA2514BC831)
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~2.0_0\bin\ssv.dll (filesize 509328 bytes, MD5 F921D875A1CBD69A6A462BA2514BC831)
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll (filesize 603040 bytes, MD5 79F7DB36E67B9E8365FA824AD96DF400)
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll (filesize 603040 bytes, MD5 79F7DB36E67B9E8365FA824AD96DF400)
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL (filesize 39464 bytes, MD5 AEF204E782BFA2C8448CB43A58960744)
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5) - http://upload.facebook.com/controls/FacebookPhotoUploader5.cab
O16 - DPF: {1239CC52-59EF-4DFA-8C61-90FFA846DF7E} (Musicnotes Viewer) - http://www.musicnotes.com/download/mnviewer.cab
O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebook.com/controls/FacebookPhotoUploader3.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0) - http://dl8-cdn-01.sun.com/s/ESD44/JSCDL/jdk/6u7/jinstall-6u7-windows-i586-jc.cab?e=1217560870556&h=abf1acf1380dd4d78c5840bafbfae17d/&filename=jinstall-6u7-windows-i586-jc.cab
O23 - Service: AddFiltr - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\AddFiltr.exeC:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\AddFiltr.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exeC:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exeC:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\CLCapSvc.exeC:\Program Files\HP\QuickPlay\Kernel\TV\CLCapSvc.exe
O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\CLSched.exeC:\Program Files\HP\QuickPlay\Kernel\TV\CLSched.exe
O23 - Service: SYMANTEC Lic NetConnect service (CLTNetCnService) - Unknown owner - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files\HP Games\My HP Game Console\GameConsoleService.exeC:\Program Files\HP Games\My HP Game Console\GameConsoleService.exe
O23 - Service: HP Health Check Service - Hewlett-Packard - C:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exeC:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe
O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exeC:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exeC:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exeC:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exeC:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exeC:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: stllssvr - MicroVision Development, Inc. - C:\Program Files\Common Files\SureThing Shared\stllssvr.exeC:\Program Files\Common Files\SureThing Shared\stllssvr.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exeC:\Windows\system32\DRIVERS\xaudio.exe

--
End of file - 11542 bytes
The logs look clean. Please go ahead with the cleanup listed in Reply #30Thanks SuperDave!
Okay so just to clarify before I commence clean up, when TFC restarts my computer and if I need to manually restart my computer, what do you mean by that? because last time it restarted and then gave me a choice of restarting normally and then a recommended choice of restarting with the restore because the laptop thought that there was damage which I did and then screwed everything up again. Just skip the TFC. You can do a disk cleanup yourself. Just click on My Computer, right-click on your C drive, click Properties and select Disk cleanup. I don't see disk cleanup. Is that the same as format?No. Not the same as format. After you click Properties, Select General at the top left. Disk Cleanup is just below the pie chart of your C drive to the right. I did it!!! Thank you, SuperDave!!!! It took a bit longer than expected because of the unexpected bump we encountered but I really appreciate all your advice and patience!!You're welcome. Stay safe.Quote
You can uninstall it or download and install MSE which, in my opinion, is a better AV program. If you do decide to change AV's download and install the new one before uninstalling the old one. You will also have to re-install MicroSoft Word.

Microsoft Security Essentials for Windows Vista\Windows 7 - 64 bit Download
Microsoft Security Essentials for Windows XP

The link on the Microsoft Security Essentials for Windows Vista\Windows 7 downloaded a program that wouldn't install saying it wasn't compatible with my system and then the 64 bit Download downloaded SPYWARE DOCTOR WITH ANTIVIRUS. Should I have both on here? I have Vista.Try this site for the download. You can select the one for Vista and you can also keep Spyware Doctor, if you wish.
1715.

Solve : Invalid security certificate for Yahoo mail w/ IE8 and FF, also Comodo warning?

Answer»

I attempted to log in to my Yahoo Mail account using Firefox v3.6.10 and received this message from FF.

Quote

This Connection is Untrusted
You have asked Firefox to connect
securely to login.yahoo.com, but we can't confirm that your connection is secure.

Normally, when you try to connect securely,
sites will present trusted identification to prove that you are
going to the right place. However, this site's identity can't be verified.

What Should I Do?

If you USUALLY connect to
this site WITHOUT problems, this error could mean that someone is
trying to impersonate the site, and you shouldn't continue.

Quote
login.yahoo.com uses an invalid security certificate.

The certificate will not be valid until 1/4/2006 11:09 AM.

(Error code: sec_error_expired_certificate)


Also, soon after this same time, Comodo firewall notified me of an intrusion attempt from another PC and asked whether or not to trust this. I clicked block.
Note; I've working out of town and have been staying at a hotel for ~ 5 weeks using their WIRELESS AP. (There are several 802.11g wireless AP's in this area - 4 truck stops & 6 motel/hotels). I have seen this Comodo firewall WARNING a few TIMES lately and always clicked block.

Why is this happening? What should I do?
1716.

Solve : can a router get a virus?

Answer»

a young man who is supposedly computer savvy says that my computer router has a virus and its in my ethernet? Is this possible? How do i fix it? do i replace my ethernet adapter or my router to get rid of it? VERY CONFUSEDRouters can get viruses, they are removed by doing a factory RESET, and they are avoided by choosing and setting a strong password. But you need to be sure if you have a virus that the the infection is not SOMEWHERE else.
Since routers have no hard drive they can't get viruses but they can get hacked but a simple resets cures that problem.Quote from: SUPERDAVE on October 18, 2010, 12:50:35 PM

Since routers have no hard drive they can't get viruses but they can get hacked but a simple resets cures that problem.

It is definitely not true that because routers "have no hard drive" they can't get viruses. Routers CERTAINLY can get viruses; they usually run a VERSION of Linux in RAM, loaded from ROM, and they can get infected. The Chuck Norris virus attacks Linksys and D-Link routers. Another one is called Psyb0t. Just two off the top of my head.




1717.

Solve : Need help - Trojan\Malware problem!!!?

Answer» [emailprotected] as CAB hook log:
OnlineScanner.ocx - registred OK
# version=7
# iexplore.exe=8.00.6001.18702 (longhorn_ie8_rtm(wmbla).090308-0339)
# OnlineScanner.ocx=1.0.0.6211
# api_version=3.0.2
# EOSSerial=4d93653df50dcc49bc84baf67238bd9b
# end=finished
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2010-10-16 02:32:15
# local_time=2010-10-15 10:32:15 (-0500, Eastern Daylight Time)
# country="United States"
# lang=1033
# osver=5.1.2600 NT Service Pack 2
# compatibility_mode=512 16777215 100 0 1652886 1652886 0 0
# compatibility_mode=1279 16777215 0 0 0 0 0 0
# compatibility_mode=2560 16777215 100 0 0 0 0 0
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=53458
# found=912
# cleaned=907
# scan_time=5500
C:\38fd4a0c5ae793fe57\i386\filterpipelineprintproc.dllWin32/Ramnit.A virus (error while cleaning)00000000000000000000000000000000I
C:\38fd4a0c5ae793fe57\i386\mxdwdrv.dllWin32/Ramnit.A virus (error while cleaning)00000000000000000000000000000000I
C:\38fd4a0c5ae793fe57\i386\xpssvcs.dllWin32/Ramnit.A virus (error while cleaning)00000000000000000000000000000000I
C:\Commy\NircmdBSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Commy10898C\NircmdBSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Commy18057C\NircmdBSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Commy2756C\NircmdBSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Commy9393C\NircmdBSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Compaq\CPQInet\CPQInet.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\CPQInet\CPQNPCSS.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\CPQInet\Hwswal.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\CPQInet\INETSVCS.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\CPQInet\LchApp.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\CPQInet\nzLaunch.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\CPQInet\Stat.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\CPQInet\trcknlog.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\EAKDRV\EAUSBKBD.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\default.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\About My PC-About My PC.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\About My PC-Easy Access Design.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\About My PC-Featured Software.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\About My PC-Smartcard Keyboard Overview.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\Compaq Help & Support-Compaq Help & Support.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\Compaq Help & Support-On-Line Help & Support.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\Compaq Help & Support-Preventative Care & Maintenance.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\Getting Started With My PC-Games.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\Getting Started With My PC-Getting Started With My PC.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\Getting Started With My PC-Home Networking.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\Getting Started With My PC-Music.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\Getting Started With My PC-Photo.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\Getting Started With My PC-Surf the Net.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\Getting Started With My PC-Video.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\Features\Pages\MainPromotion.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\Introreg.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\ISUninst.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\SkyDesk.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\SystemOS.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\WizHost.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\WizMsg.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\WizWom.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\WRegXfer.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\html\NaEnglish\cpqExit.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\html\NaEnglish\errNet.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\html\NaFrench\cpqExit.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Compaq\lutil\html\NaFrench\errNet.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\AUDIO\ADMINCHK.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\AUDIO\INSTALL.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\AUDIO\PROPS32.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\AUDIO\REMOVE.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\KEYBOARD\EAKINSTA.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\KEYBOARD\SETUPEAK.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\keyboardbuttons\EAKInstall.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\keyboardbuttons\SetupEAKDLL.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\QuickenInstall\QWNUE01N1D\CUSTOM\PROGRAM\LICENSE.HTMWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\QuickenInstall\QWNUE01N1D\tools\SANITIZE.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\HCCUTILS.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\HKCMD.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\I81XGDEV.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\I81XGICD.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\IGFXCFG.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\IGFXDEV.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\IGFXDIAG.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\IGFXDO.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\IGFXEUD.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\IGFXHK.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\IGFXPPH.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\IGFXSRVC.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQDRV\VIDEO\IGFXTRAY.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\QUICKSR\CHECKCNF.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\QUICKSR\FASTBOOT.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\QUICKSR\PATCHES.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\QUICKSR\QRIA.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\QUICKSR\RMKEYS.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\CkcUpgrade.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\CpqStartMenu.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\CustomerRegInfo.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\EDID.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\Mailer.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\MemUsage.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\Migrate.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\ModemCheck.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\ModemQuery.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\ModemUtil.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\PCTSCOM.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\ScDmi.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\SCDrivers.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\SCInfoBom.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\SCOS.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\SCPartNumber.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\scom\srmclean .exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\CPQS\TOOLS\UNZIP.EXEWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\All Users\Application Data\Adobe\Reader\9.3\ARM\27816\ReaderUpdaterSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\All Users\Application Data\Skype\Plugins\Plugins\F57B48ADF2224F088EDD1A2B9BAD84E8\PickGame.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\All Users\Desktop\ABC.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\All Users\Desktop\Disney Online.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\All Users\Desktop\ESPN.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Default User\Local Settings\Temp\~rnsetu0\pncrt.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Default User\Local Settings\Temp\~rnsetup\pncrt.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Default User\Start Menu\Programs\Startup\fyfuk.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Default User\Start Menu\Programs\Startup\maqa.exea variant of Win32/Kryptik.GZJ trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Default User\Start Menu\Programs\Startup\qorya.exea variant of Win32/Kryptik.HLM trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Application Data\Asbece\onmuo.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Application Data\Asbece\onmuoSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Application Data\Mozilla\Firefox\Profiles\5tbeccz1.default\bookmarks.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Application Data\Noilab\budi.exea variant of Win32/Kryptik.HLM trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Application Data\Sun\Java\Deployment\SystemCache\6.0\4\7ec4bf04-7c91b2a5-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-47f9ff1d-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-34777ea4-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Local Settings\temp\tmp0a538d8d\kill.exeWin32/Delf.PLO trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Local Settings\temp\tmp0a538d8d\killSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\BTZLGCQF\bnews-pro[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\BTZLGCQF\Sync[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\Q6FKH05K\Include[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\Q6FKH05K\online-scanner[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\Q6FKH05K\Toolbar[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\Q6FKH05K\topic,110296.msg747598[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Local Settings\Temporary Internet Files\Content.IE5\QMN5LQ90\favicon[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Start Menu\Programs\Startup\idlatoSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Freddex\Start Menu\Programs\Startup\pypaSrv.exea variant of Win32/Kryptik.FTE trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Guest\Start Menu\Programs\Startup\ammo.exea variant of Win32/Kryptik.HLM trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Guest\Start Menu\Programs\Startup\faopew.exea variant of Win32/Kryptik.GZJ trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\Guest\Start Menu\Programs\Startup\peyw.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Application Data\Fako\anuq.exea variant of Win32/Kryptik.GZJ trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Application Data\Mozilla\Firefox\Profiles\3mmgr645.default\bookmarks.htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Application Data\Sun\Java\Deployment\SystemCache\6.0\4\7ec4bf04-61f91632-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-367bd4db-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-501e625d-n\msvcr71.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dllWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLLWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Application Data\Ysulne\emxy.exea variant of Win32/Kryptik.GZJ trojan (cleaned by deleting - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Desktop\RkU3.8.388.590\MustBeRandomlyNamed\f2o4rDaewo.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Desktop\SysProt\SysProt\SysProt.exeWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\133101-2nd-car;-forester-vs-outback-need-more-space-than-wrx-i-am-keeping[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\140158-how-possible-moto-content[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\1489-canadian-survey[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\2009[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\25752-has-anybody-received-2011-outback-brought-back-canada[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\2592[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\2592[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\2592[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\74912-wrx-leather-interior-2[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\92953-importing-guide-18[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\aclk[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\aclk[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\aclk[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA190CEE.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA2B7GL2.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA5FAORT.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA5QNWMW.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA5RH878.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA64CVIN.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA6BXCLG.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA6LYC8U.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCA7HMI6U.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCABDT41O.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCABPNP5D.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCACDEBN9.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCACMNYTH.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAI088XH.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAKFATBL.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAOXGUHL.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAP6EV8V.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCARMX88R.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAV6X39L.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAVXYYB2.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\adsCAXMM9P5.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[10].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[11].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[5].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[6].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[7].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[8].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\ads[9].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\basketball_fantasysports_yahoo_com[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\blank[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\board,7.0[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\clk[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\clk[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\data_sync[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\emailleague[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\facebook_share[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\forums[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\gameinfo[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\index[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\login[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\net[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\openmail.app[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\openmail.app[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\topic,110296.msg747408[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\topic,46313.0[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\topicseen[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\toronto-subaru-club_com[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\tpp4[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\watch-toronto-raptors-vs-boston-celtics[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\3AIBL4ZR\_;ord=0[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\105395-van-bortel-customer-appreciation-us-importing-info-session[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\115140[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\134546-rollin-3-6r-2[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\138009-worst-stone-chip-ever-pride-car-slowly-fading[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\139887-need-some-help-buying-subaru[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\140205-new-car-forrester-vs-few-others[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\2010[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\22870-buying-new-outback-importing-canada-2[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\22870-buying-new-outback-importing-canada[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\2397357[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\2592[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\2592[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\30670[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\aclk[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\aclk[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\aclk[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\aclk[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\aclk[5].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA1R1UVJ.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA24EQPT.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA5IQRVB.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA77ICYR.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA77YYQL.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA7UUN87.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA8EWYSO.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCA8PZZL1.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAB29OKH.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAEYSWV9.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAFGJMMT.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAGF39WM.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAHE9Z9X.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAHXR1OT.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAIZ4HT8.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAJ15FW6.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAMUW5BX.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAN8LHXQ.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCANY2TMW.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAOR74EY.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAP44NVU.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAQ1EAKK.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAQ3QCMP.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAUOFASA.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAW2UN2N.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAWVN5Y7.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAWZTDNQ.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\adsCAZR1QD8.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[10].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[11].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[5].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[6].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[7].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[8].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ads[9].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\blank[2].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\blank[4].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\blank[5].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\button[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\button[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ca_yahoo_com[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\commishhome[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\emailleagueca54c271[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\facebook_share[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\fc[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\ga_event_frame[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\gdyn_nba[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\index[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\index[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\index[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\json[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\login[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\net[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\peninsula-imported-cars-ltd-oakville-peninsulaimportedcarsltd[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\raptors[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\rosters[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\sda2[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\search[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\social[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\teams[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\teams[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\watch-toronto-raptors-vs-boston-celtics[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\WebPage[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\WebPage[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\910DENE8\_;ord=0[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\134546-rollin-3-6r[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\140205-new-car-forrester-vs-few-others-2[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\140205-new-car-forrester-vs-few-others-4[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\20379-subaru-canada-specifies-terra-clean-48k-km-my2010[1].htmlWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\2592[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\2592[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\2592[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\2592[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\2[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\aclk[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\aclk[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\aclk[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\aclk[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA0UIVWJ.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA192S6X.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA1PQ3IL.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA1QFV03.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA4EAORQ.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA5FF1L5.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA62X8RK.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA80O2I4.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCA9RP5W3.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCABXFY3T.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCACE2F0T.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCACM745B.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCACREXT7.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAD688SR.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAFJU59V.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAFL7QNN.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAG8T3XD.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAGCFLXY.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAI1NEKP.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAM1W0SB.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCANTPP5N.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAONBG47.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAP3ZNAH.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAR04GFF.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCASJ5SVL.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCATDVCTR.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAV9Q4GC.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAWDAGZN.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAWHFU2T.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\adsCAY6ABO7.htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[10].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[11].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[4].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[5].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[6].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[7].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[8].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\ads[9].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\dealerlisting[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\dealerlisting[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\editstatcategories[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\fc[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\gdyn_nba[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\general-technical-discussion[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\index[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\index[2].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\index[3].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\international-customers[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\Temporary Internet Files\Content.IE5\AO0CK4MF\invitefriends23fabd99[1].htmWin32/Ramnit.A virus (cleaned - quarantined)00000000000000000000000000000000C
C:\Documents and Settings\sey administrator\Local Settings\TeIt's just as I thought. The infections are multiplying. You better save your data before the computer crashes.Great! Looks like I'll be wiping my drive clean. Well thanks for all your help and time spent Dave!

FredI forgot to add this advice in the last post. Good Luck!

Backing up files before formatting

If you backup any files they should be scanned from a clean PROPERLY protected PC before restoring. Also be careful what scanner is used as some are very poor at detecting and even WORSE at protecting from this infection. In fact due to the nature of these new infections there are probably no tools that will properly protect you from the infection. Be very selective and only backup files you can not replace like text documents and personal photos.

Do not back up to another machine! It will likely become infected by Virut. Burn to DVD/CD, a flash drive or to an external drive which has nothing else on it and which you can format should it become infected from the backups.

I SUGGEST running at least 3 of the below scanners on the backup files. Run the first scan then reboot before running the second then reboot after the second before running the THIRD.

-) Dr.Web CureIt!
-) AVG Win32/Virut Removal Tool
-) Symantwc W32.Virut Removal Tool
-) McAfee Avert Stinger
-) Microsoft Windows Malicious Software Removal Tool

If you do not know how to perform a fresh install, use this website -> www.windowsreinstall.com/

1718.

Solve : Microsoft Phone computer virus scam?

Answer» YESTERDAY my father received a phone call. The man on the line said they were a Microsoft representative. They told him that he had a virus and to follow their procedures, they GAINED remote ACCESS to his computer. I'm am going over to his HOUSE later this afternoon, and am wondering how to turn the remote access off?

Luckily he didn't give them his credit card INFO. Hopefully they didn't steal all his info off his computer. I will run scans later and post them. Quote from: johngeo on October 09, 2010, 09:32:46 AM
Yesterday my father received a phone call. The man on the line said they were a Microsoft representative. They told him that he had a virus and to follow their procedures, they gained remote access to his computer. I'm am going over to his house later this afternoon, and am wondering how to turn the remote access off?

Luckily he didn't give them his credit card info. Hopefully they didn't steal all his info off his computer. I will run scans later and post them.

Ok sure yeah.

Im Pretty sure that MS wouldnt track your computer for viruses. Thats invading Privacy. If they can see viruses they could see everything.
Scam.
1719.

Solve : Not sure what is going on?

Answer»

Here is the eset results:
C:\Documents and Settings\Paul_Kara\Application Data\Sun\Java\Deployment\cache\6.0\16\329ed4d0-3cd80ceda variant of Java/Agent.A trojan
C:\Program Files\Registry PATROL\RegistryPatrol.exea variant of Win32/Adware.RegistryPatrol application


Are those ok or should they be removed? I have no idea what the registry patrol isPlease run ESET again and this time, cure the infections and you should be good to go. THANK YOU SO MUCH!!!Quote

Java(TM) 6 Update 15
Out of DATE Java installed!

Adobe READER 8.2.2
Out of date Adobe Reader installed!
Mozilla Firefox (3.6.10) Firefox Out of Date!

On a last note, I see you had a few outdated stuff LISTED earlier. You should update to LATEST versions if you have not done so to keep your computer up to date and secured.
1720.

Solve : RamnitB and Exedropper infection?

Answer»

I am having PROBLEMS with these two horrible things. I have now done everything asked of me in topic 46313.0 loading the various bits of software and attaching the logs. I am hoping someone can help me remove these vriruses as a no of apps now won't run eg. Nero. I get errors on PaperPort (ISscript.msi) casefoundation.dll, pptd40nt.exe, xdocparse.dll and indexsearch.exe at startup.

I also cannot save files to CDs/DVDs or USBs (USB is a bit weird as I saved a Word file but it shows photos as saved but they can't be viewed. I am still getting various popups from Avast warning of threats from these viruses but now need to get get photos on a stick for my daughters 21st celebrations!

Any help gratefully received...

[recovering disk space - old attachment deleted by admin]If it's Ramnit.....

I'm afraid I have very bad news.

Win32/Ramnit.A is a file infector with IRCBot functionality which infects .exe, and .HTML/HTM files, and opens a back door that compromises your computer. Using this backdoor, a remote attacker can access and instruct the infected computer to download and execute more malicious files. The infected .HTML or .HTM files may be detected as Virus:VBS/Ramnit.A. Win32/Ramnit.A!dll is a related file infector often seen with this infection. It too has IRCBot functionality which infects .exe, .dll and .HTML/HTM files and opens a back door that compromises your computer. This component is injected into the default web browser by Worm:Win32/Ramnit.A which is dropped by a Ramnit infected executable file.

-- Note: As with most malware infections, the threat name may be different depending on the anti-virus or anti-malware program which detected it. Each security vendor uses their own naming conventions to identify various types of malware.
Understanding virus names

Threat aliases for Win32/Ramnit.A
With this particular infection the safest solution and only sure way to remove it effectively is to reformat and reinstall the OS.

Why? The malware injects code in legitimate files similar to the Virut virus and in many cases the infected files (which could number in the thousands) cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files often become corrupted and the system may become unstable or irreparable. The longer Ramnit.A remains on a computer, the more files it infects and corrupts so the degree of infection can vary.

Ramnit is commonly spread via a flash drive (usb, pen, thumb, JUMP) infection where it copies Worm:Win32/Ramnit.A with a random file name. The infection is often contracted by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and are a major source of system infection.

In my opinion, Ramnit.A is not effectively disinfectable, so your best option is to perform a full reformat as there is no guarantee this infection can be completely removed. In most instances it may have caused so much damage to your system files that it cannot be completely cleaned or repaired. Further, your machine has likely been compromised by the backdoor Trojan and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if your anti-virus reports that the malware appears to have been removed.

Many experts in the security community BELIEVE that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:
When should I re-format? How should I reinstall?

Where to draw the line? When to recommend a format and reinstall?

Quote

Whenever a system has been compromised by a backdoor payload, it is impossible to KNOW if or how much the backdoor has been used to affect your system...There are only a few ways to return a compromised system to a confident security configuration. These include:
• Reimaging the system
• Restoring the entire system using a full system backup from before the backdoor infection
• Reformatting and reinstalling the system
Backdoors and What They Mean to You
This is what Jesper M. Johansson at Microsoft TechNet has to say: Help: I Got Hacked. Now What Do I Do?

Quote
The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications).

Important Note:: If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to to include those used for banking, email, eBay, paypal and any online activities which require a username and password. You should consider them to be compromised. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach. Failure to notify your financial institution and local law enforcement can result in refusal to reimburse funds lost due to fraud or similar criminal activity.
************************************
Backing up files before formatting

If you backup any files they should be scanned from a clean properly protected PC before restoring. Also be careful what scanner is used as some are very poor at detecting and even worse at protecting from this infection. In fact due to the nature of these new infections there are probably no TOOLS that will properly protect you from the infection. Be very selective and only backup files you can not replace like text documents and personal photos.

Do not back up to another machine! It will likely become infected by Ramnit A. Burn to DVD/CD, a flash drive or to an external drive which has nothing else on it and which you can format should it become infected from the backups.

I suggest running at least 3 of the below scanners on the backup files. Run the first scan then reboot before running the second then reboot after the second before running the third.

-) Dr.Web CureIt!
-) AVG Win32/Virut Removal Tool
-) Symantwc W32.Virut Removal Tool
-) McAfee Avert Stinger
-) Microsoft Windows Malicious Software Removal Tool

SuperDave,

Thanks (I think...).

You mention RamnitA specifically. Mine is B does it make no difference? Am I still dead?

NigelQuote
You mention RamnitA specifically. Mine is B does it make no difference? Am I still dead?

No difference. They're both dangerous. You could try downloading MSE and running a scan but I doubt it will help much. Ramnit.B

Microsoft Security Essentials for Windows Vista\Windows 7 - 64 bit Download
Microsoft Security Essentials for Windows XP

* Go to Start > Run and type mrt.exe then press Enter on the keyboard).
* (Vista and Windows 7 users go to Start and type mrt.exe in the search box then press Enter on the keyboard.
* Click Next.
* Choose Full Scan and click Next.
* Once the scan is finished click View detailed results of the scan.

Look through the list and let me know if anything was found infected.
1721.

Solve : Virus infection/malware/spyware?

Answer»

I am currently trying to remove some sort of an INFECTION from a computer.

It has tried to delete all files on the computer when using AVG so I installed avast. Avast finds a lot of PROBLEMS but when trying tol fix them crashes.

Also installed Agnitum as one of your steps and it didnt work saying sandbox.sys has failed to load. COuld not get it to work properly and then it wouldn't let me uninstall it. So downloaded clean.exe to finally rid the computer of it. Now installed COMODO which appears to be working fine.

Here are some of the filenames it has CAME up with (AVG)

Win32Ramnit-B

BVS:EXEdropper-gen

If this is a repost I apologise but it seems my first one disappeared




[recovering disk space - old attachment deleted by ADMIN]

1722.

Solve : MSE & MRT?

Answer»

I read somewhere that microsoft malicious removal tool has the same scanning ENGINE that microsoft security essentials has. Is this true? If so, would running a complete scan using MRT be the same as running a complete scan using MSE?I think I read somewhere it uses a "SUBSET" of the larger scanning engine that MSE has. I wonder what specifically it targets?Grrr, nope. It's not the same. I just RAN MRT in PE on a computer with 0 results, and a2 command line scanner in PE with only one low RISK virus (wimad). After all of that I hooked the HDD up to another PC, ran MSE and now MSE is finding stuff. Back to the drawing board.

1723.

Solve : how do I remove a virus/spyware?

Answer»

here is the mbam LOG. I have been running this daily and have not found anything since the first running.

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4734

Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.5512

10/2/2010 10:42:34 PM
mbam-log-2010-10-02 (22-42-34).txt

Scan type: Quick scan
Objects scanned: 198178
Time elapsed: 10 minute(s), 3 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)
Edited. What browser are you using to download Adobe updates?I have tried both internet explorer and firefox. They both will download and start to install reader than it fails towards the end stating that I don't have the rights. FLASH player appears to install correctly but every website I go to states that it is not installed.

Error 1402 could not open key.
hkey_local_machine\software\microsoft\windows\currentversion\run\optionalcomponents\imail.
verify that you have sufficient access to that key.Edited.Ignore the above postYou could try creating a new user account and see if it works OK. If so then transfer over DOCUMENTS and settings then delete the OLD account. Perhaps it would be best to start a new thread in the software forum. I'm quite sure it's not malware related.
Virus and mallware are creating big problem for a new computer users. I am not new user but i don't have enough idea about virus. How to enter the virus in our system. What it do with our system.

If some one guide me about virus. It is my pleasure

Thanks in advance.thanks Dave. I will try to do this. If it does not work I will create a post in software. Again thank you for all your help.

1724.

Solve : Infected or something...no one knows and it has returned.?

Answer»

I ran the 3 scans.
Please note:
HJT DID NOT SHOW SOME SERVICES IN TASKMAN LIST (32:40...it is not miscount of System Idle, those absent from HJT report are listed below.)
I was running notepad and taskmanager while HJT was scanning. I unplugged DSL after installing and updating for each SCAN. Taskmanager was refreshed also. SeaPort.exe mysteriously installed; I used Revo deep uninstall but it is still listed in Taskmanager. It does not show in Revo list now.

1800 svchost.exe LOCAL SERVICE
1492 svchost.exe LOCAL SERVICE
1408 svchost.exe NETWORK SERVICE
1108 svchost.exe NETWORK SERVICE
780 csrss.exe SYSTEM
669 taskmgr.exe Marytwelveponies
4 SYSTEM SYSTEM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 10/10/2010 at 10:03 PM

Application Version : 4.44.1000

Core Rules Database Version : 5663
Trace Rules Database Version: 3475

Scan type : Complete Scan
Total Scan Time : 00:34:23

Memory items scanned : 367
Memory threats detected : 0
Registry items scanned : 5706
Registry threats detected : 0
File items scanned : 28830
File threats detected : 2

Adware.Tracking Cookie
C:\Documents and

Settings\Marytwelveponies\Cookies\[emailprotected][1].txt
C:\Documents and

Settings\Marytwelveponies\Cookies\[emailprotected][1].txt

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4792

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

10/10/2010 10:22:59 PM
mbam-log-2010-10-10 (22-22-59).txt

Scan type: Quick scan
Objects scanned: 139749
Time ELAPSED: 4 minute(s), 38 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Logfile of Trend MICRO HijackThis v2.0.4
Scan saved at 10:29:27 PM, on 10/10/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe
C:\WINDOWS\system32\svchost.exe
c:\Program Files\Microsoft Security Essentials\MsMpEng.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
C:\Program Files\Common Files\Acronis\CDP\afcdpsrv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Microsoft Security Essentials\msseces.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Program Files\MSN Toolbar\Platform\4.0.0417.0\mswinext.exe
C:\Program Files\COMODO\COMODO Internet Security\cfp.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SCServer\SCServer.exe
C:\Documents and Settings\Marytwelveponies\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =

http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =

http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =

http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =

http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program

Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program

Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} -

C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: WOT Helper - {C920E44A-7F78-4E64-BDD7-A57026E7FEB7} - C:\Program

Files\WOT\WOT.dll
O2 - BHO: MSN Toolbar BHO - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program

Files\MSN Toolbar\Platform\4.0.0417.0\npwinext.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} -

C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} -

C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: MSN Toolbar - {8dcb7100-df86-4384-8842-8fa844297b3f} - C:\Program

Files\MSN Toolbar\Platform\4.0.0417.0\npwinext.dll
O3 - Toolbar: WOT - {71576546-354D-41c9-AAE8-31F2EC22BF0D} - C:\Program

Files\WOT\WOT.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [nwiz] C:\Program Files\NVIDIA Corporation\nView\nwiz.exe

/installquiet
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE

C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [MSSE] "c:\Program Files\Microsoft Security Essentials\msseces.exe"

-hide -runkey
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader

9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common

Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [MSN Toolbar] "C:\Program Files\MSN

Toolbar\Platform\4.0.0417.0\mswinext.exe"
O4 - HKLM\..\Run: [Microsoft Default Manager] "C:\Program Files\Microsoft\Search

Enhancement Pack\Default Manager\DefMgr.exe" -resume
O4 - HKLM\..\Run: [COMODO Internet Security] "C:\Program Files\COMODO\COMODO Internet

Security\cfp.exe" -h
O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes'

Anti-Malware\mbamgui.exe /install /silent
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O8 - Extra context menu item: E&xport to Microsoft Excel -

RES://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} -

C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote -

{2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} -

C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} -

C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 -

{e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program

Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger -

{FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) -

http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?

1285695162671
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) -

http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_sit

e.cab?1285697002093
O16 - DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} (HP Download Manager) -

https://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} -

http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{8BEC746F-6145-4CFD-8F18-F9B606B0671E}:

NameServer = 156.154.70.22,156.154.71.22
O17 - HKLM\System\CCS\Services\Tcpip\..\{A9727C47-ACC0-49A4-9C92-BD2801705DF6}:

NameServer = 156.154.70.22,156.154.71.22
O18 - Protocol: wot - {C2A44D6B-CB9F-4663-88A6-DF2F26E4D952} - C:\Program

Files\WOT\WOT.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL
O22 - SharedTaskScheduler: Browseui preloader -

{438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon -

{8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Acronis Scheduler2 Service (AcrSch2Svc) - Acronis - C:\Program

Files\Common Files\Acronis\Schedule2\schedul2.exe
O23 - Service: Acronis Nonstop Backup service (afcdpsrv) - Acronis - C:\Program

Files\Common Files\Acronis\CDP\afcdpsrv.exe
O23 - Service: COMODO Internet Security Helper Service (cmdAgent) - COMODO -

C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation -

C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc.

- C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation -

C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 7662 bytes
your hjt this is out of date and you did not post the log correctly go to below and post a new log , click do a system scan and save a log

http://www.filehippo.com/download_hijackthis/

1725.

Solve : Hijackthis log file please help.?

Answer»

SD,

It was BAD but we handled it moved on and had some FUN anyway lol thanks for ASKING.

I ran through your suggested list of procedures and I am just rebooting it now for the results.

I'm almost positive SOMEONE from here reccommended a site that sold memory and actually did the scan on your computer to tell one which one you needed and how much you can hold. Does that ring a bell? It was a while ago for me and a totally other PC.

Can't thank you enough for the time and help but if its not 100% a memory issue this pc might be a paper weight. lol

Well it did load firefox with yahoo as the home PAGE faster then usual. But Limewaire, which her kids use and online gaming, is still the same.

Again thanks much,
MP.Quote

I'm almost positive someone from here reccommended a site that sold memory and actually did the scan on your computer to tell one which one you needed and how much you can hold. Does that ring a bell? It was a while ago for me and a totally other PC.
Sorry. Just start a thread in here and someone will tell you what you will need.Quote from: MP1975 on October 05, 2010, 02:51:54 PM
...I'm almost positive someone from here reccommended a site that sold memory and actually did the scan on your computer to tell one which one you needed and how much you can hold. Does that ring a bell? It was a while ago for me and a totally other PC...
www.crucial.com
BTW, Crucial is the "memory store" for Micron Technology, who makes the memory chips.
1726.

Solve : MSE service locked?

Answer»

Hi All
Got a windows 7 machine with MSE locked. I tried to unload it and reload a fresh copy but started to an error...something like a Critical has happened and the machine will shut down in 1 min.

I did a safe boot and DISABLED MSE using msconfig. I than started in regular mode with the network cable unplugged and was able to uninstall MSE. Now the machine will come up normal but MSE can't be installed.

Ideas?
Thanks
Why cant it be installed? Do you get an error message at all? I ran into issues a long time ago with dirty uninstallers that left registry entries behind so it says its alraedy installed and not. I ended up using karenware Registry Pruner to find orphan entries and REMOVE them and reboot and was then able to reinstall the software.Registry cleaners are extremely powerful applications and their potential for harming your OS far outweighs any small potential for improving your computer's performance.

There are a number of them available and some are more safe than others. Keep in MIND that no two registry cleaners work entirely the same way. Each vendor uses different criteria as to what constitutes a "bad" ENTRY. One cleaner MAY find entries on your system that will not cause a problem when removed, another may not find the same entries, and still another may want to remove entries required for a program to work. Without research into what the registry entry selected for deletion is, a registry cleaner can end up being an automated method to cause problems with the registry.

For routine use by those not familiar with the registry, the benefits to your computer are negligible while the potential risks are great.

Further reading: XP Fixes Myth #1: Registry Cleaners

1727.

Solve : after using kaspersky computer won't boot?

Answer»

Ok so since I cleared cookies, Google seems to be doing better and it hasn't had that search lately
but sometimes it comes up with an extra window (most of the time it's blank) I think this often happens when I open a new tab but once in a while it can happen when I click on a link
I am using Firefox.


C:\Documents and Settings\All Users\Application Data\Tarma Installer\{2E1037EA-038A-425F-86B9-6CD19B8497E9}\_Setupx.dlla variant of Win32/Adware.Yontoo.B application
C:\Documents and Settings\All Users\Application Data\Tarma Installer\{DE3B7BF9-0770-4104-BC0B-B1CCCCE2F053}\_Setupx.dlla variant of Win32/Adware.Yontoo.B application
C:\Documents and Settings\Owner\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\[emailprotected]\components\arcadewebfirefox.dlla variant of Win32/Adware.Gamevance.CM application
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\7edmm5iv.default\extensions\[emailprotected]JS/Redirector.NCA trojan
C:\Documents and Settings\Owner\Local Settings\Application Data\Google\Chrome\User Data\Default\Default\aadggcdddjdjdidjdbdadaggdedagfdf\background.htmlWin32/BHO.OEI trojan
C:\Documents and Settings\Owner\Local Settings\temp\dealcabby.exeWin32/Adware.DealCabby.A application
C:\Documents and Settings\Owner\Local Settings\temp\is135653842\MyBabylonTB.exeWin32/Toolbar.Babylon application
C:\Documents and Settings\Owner\Local Settings\Temporary INTERNET Files\Content.IE5\058G4Y2S\dealcabby[1].exeWin32/Adware.DealCabby.A application
C:\Documents and Settings\Owner\My Documents\Downloads\Angry Smileys Setup%FF_4fd745f23e391043701246_.exeWin32/Adware.MarketScore.A application
C:\Documents and Settings\Owner\My Documents\Downloads\donkey-kong.exea variant of Win32/InstallCore.AL application
C:\My Backup -- 12-02-04 0922PM\Documents and Settings\Owner\My Documents\CyberLink\Downloads\SoftonicDownloader62174.exea variant of Win32/SoftonicDownloader.A application
C:\My Backup -- 12-02-04 0922PM\Documents and Settings\Owner\My Documents\Downloads\FinalMediaPlayer2011Setup.exea variant of Win32/InstallIQ application
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP208\A0043492.dllprobably a variant of Win32/Adware.180Solutions application
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP208\A0043493.exeprobably a variant of Win32/Adware.HotBar.E application
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP223\A0044225.exeWin32/Adware.MarketScore.A application
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP270\A0048237.dlla variant of Win32/Adware.Gamevance.CL application
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP270\A0048370.exea variant of Win32/Adware.Gamevance.CO application
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP283\A0063894.dlla variant of Win32/Adware.Gamevance.CM application


You could try uninstalling and re-installing FireFox.
Please run ESET again. It didn't seem to cure the infections.C:\Documents and Settings\All Users\Application Data\Tarma Installer\{2E1037EA-038A-425F-86B9-6CD19B8497E9}\_Setupx.dlla variant of Win32/Adware.Yontoo.B applicationcleaned by deleting - quarantined
C:\Documents and Settings\All Users\Application Data\Tarma Installer\{DE3B7BF9-0770-4104-BC0B-B1CCCCE2F053}\_Setupx.dlla variant of Win32/Adware.Yontoo.B applicationcleaned by deleting - quarantined
C:\Documents and Settings\Owner\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\[emailprotected]\components\arcadewebfirefox.dlla variant of Win32/Adware.Gamevance.CM applicationcleaned by deleting - quarantined
C:\Documents and Settings\Owner\Application Data\Mozilla\Firefox\Profiles\7edmm5iv.default\extensions\[emailprotected]JS/Redirector.NCA trojandeleted - quarantined
C:\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\cache\6.0\59\180c027b-5cd59b3fmultiple threatsdeleted - quarantined
C:\Documents and Settings\Owner\Local Settings\Application Data\Google\Chrome\User Data\Default\Default\aadggcdddjdjdidjdbdadaggdedagfdf\background.htmlWin32/BHO.OEI trojancleaned by deleting - quarantined
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\WSL101BN\dealcabby[1].exeWin32/Adware.DealCabby.A applicationcleaned by deleting - quarantined
C:\Documents and Settings\Owner\My Documents\Downloads\7zipSetup.exea variant of Win32/Adware.HotBar.P applicationcleaned by deleting - quarantined
C:\Documents and Settings\Owner\My Documents\Downloads\Angry Smileys Setup%FF_4fd745f23e391043701246_.exeWin32/Adware.MarketScore.A applicationcleaned by deleting - quarantined
C:\Documents and Settings\Owner\My Documents\Downloads\donkey-kong.exea variant of Win32/InstallCore.AL applicationcleaned by deleting - quarantined
C:\Documents and Settings\Owner\My Documents\Downloads\PDFcreator.exea variant of Win32/Adware.HotBar.P applicationcleaned by deleting - quarantined
C:\Documents and Settings\Owner\My Documents\Downloads\PlayBryte_FA_Setup.exea variant of Win32/Adware.iBryte.C applicationcleaned by deleting - quarantined
C:\Documents and Settings\Owner\My Documents\Downloads\SlammingsSetup_FF.exeWin32/Adware.MarketScore.A applicationcleaned by deleting - quarantined
C:\My Backup -- 12-02-04 0922PM\Documents and Settings\Owner\My Documents\CyberLink\Downloads\SoftonicDownloader62174.exea variant of Win32/SoftonicDownloader.A applicationcleaned by deleting - quarantined
C:\My Backup -- 12-02-04 0922PM\Documents and Settings\Owner\My Documents\Downloads\FinalMediaPlayer2011Setup.exea variant of Win32/InstallIQ applicationcleaned by deleting - quarantined
C:\Program Files\PDFCreator\Toolbar\pdfforge Toolbar_setup.exeWin32/Toolbar.Widgi applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP208\A0043493.exeprobably a variant of Win32/Adware.HotBar.E applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP223\A0044225.exeWin32/Adware.MarketScore.A applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP270\A0048237.dlla variant of Win32/Adware.Gamevance.CL applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP283\A0063894.dlla variant of Win32/Adware.Gamevance.CM applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP291\A0065084.exeWin32/Toolbar.Widgi applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067315.dllWin32/Toolbar.Funmoods applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067316.dllWin32/Toolbar.Funmoods applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067317.dllWin32/Toolbar.Funmoods applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067318.dllWin32/Toolbar.Funmoods applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067319.dllWin32/Toolbar.Funmoods applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067321.exeWin32/Toolbar.Funmoods applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067323.exeWin32/Adware.DealCabby.A applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067348.exeWin32/Toolbar.Babylon applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067385.dlla variant of Win32/Adware.Yontoo.B applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067386.dlla variant of Win32/Adware.Yontoo.B applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067387.dlla variant of Win32/Adware.Gamevance.CM applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067390.exea variant of Win32/SoftonicDownloader.A applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067391.exea variant of Win32/InstallIQ applicationcleaned by deleting - quarantined
C:\System Volume Information\_restore{F845E3DB-F751-4BE4-A620-64F2CA1BFB5F}\RP298\A0067392.exeWin32/Toolbar.Widgi applicationcleaned by deleting - quarantined
That looks better. How's your computer running now?I still can't mess with the task manager too much and I still get pop ups when I click on certain links but that's about my only problems so far
Please do even if you don't have your OS CD.

Do you have an XP CD?

If so, place it in your CD ROM drive and follow the instructions below:
•Click on Start > Run and type sfc /scannow then press Enter (note the SPACE between scf and /scannow)
*Let this run undisturbed until the window with the blue progress bar goes away
SFC - Which stands for System File Checker, retrieves the correct version of the file from %Systemroot%\System32\Dllcache or the Windows installation source files, and then replaces the incorrect file.
******************************************************
TIGHTEN Internet Explorer's security setting

* Since Internet Explorer is the leading browser it will always be the lead in attacks from the bad guys.
o Make your Internet Explorer more secure
1. From within Internet Explorer click the Tools menu and then on Internet Options.
2. Click once on the Security tab
3. Click once on the Internet icon so it becomes highlighted.
4. Click once on the CUSTOM Level button.
+ Change the Download signed ActiveX controls to Prompt
+ Change the Download unsigned ActiveX controls to Disable
+ Change the Initialize and script ActiveX controls not marked as safe to Disable
+ Change the Installation of desktop items to Prompt
+ Change the Launching programs and files in an IFRAME to Prompt
+ Change the Navigate sub-frames across different domains to Prompt
+ When all these settings have been made, click on the OK button.
+ If it prompts you as to whether or not you want to save the settings, press the Yes button.
5. Next press the Apply button and then the OK to exit the Internet Properties page.

Tighten Internet Explorer's security setting continued - Default Internet Explorer settings should be SET to high.

1. Start up IE then go to Tools > Internet Options > Security
2. Set the Security level for the Internet Zone to High. (If no slider is visible, click Default Level.)
3. Click the Trusted Sites icon.
4. Set the Security level for the this Zone to Medium. (If no slider is visible, click Default Level.)
5. Click OK.

1728.

Solve : Computer runs slow randomly?

Answer»

Quote

Just out of CURIOSITY was there much wrong with my computer?
Just the usual AMOUNT of crap that's going around these DAYS. Nothing too serious.

Quote
Okay, thanks very much SuperDave.
You're WELCOME. I will lock this thread. If you need it re-opened, please SEND me a pm.
1729.

Solve : Mobile Virus Removal?

Answer»

Are there any specific tools I can run from a thumb-drive in order to remove spyware/malware from a LAPTOP without connecting to the internet...?

Thanks in advance, and I am sorry if this topic has already been touched on.There are a few that will run from the flashdrive but all of my tools can be DOWNLOADED and transferred to the computer and run from there. UNFORTUNATELY, some will require an internet connection to FUNCTION.

1730.

Solve : Persistant Multi-Symptom Malware?

Answer»

Its running great!

The offending process no longer runs ( "scvhost.exe 32*") and my ram usage is back to normal levels

Thank you so much for helping me.

Out of curiosity just what exactly did my computer have, and what could it have been doing with a gig or so of ram?Quote

Out of curiosity just what exactly did my computer have, and what could it have been doing with a gig or so of ram?
I do not want to discuss that in an open forum except to say it was some malware. Let's do some cleanup.

To uninstall ComboFix

  • Click the Start button. Click Run. For Vista: type in Run in the Start SEARCH, and click on Run in the results pane.
  • In the field, type in ComboFix /uninstall


(Note: Make sure there's a space between the word ComboFix and the forward-slash.)

  • Then, press Enter, or click OK.
  • This will uninstall ComboFix, DELETE its folders and files, hides System files and folders, and resets System Restore.
******************************************************
Clean out your temporary internet files and temp files.

Download TFC by OldTimer to your desktop.

Double-click TFC.exe to run it.

Note: If you are running on Vista, right-click on the file and choose Run As Administrator

TFC will close all programs when run, so make sure you have saved all your work before you begin.

* Click the Start button to begin the cleaning process.
* Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or TWO.
* Please let TFC run uninterrupted until it is finished.

Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
*****************************************************
Use the Secunia Software Inspector to check for out of date software.

•Click Start Now

•Check the box next to Enable thorough system inspection.

•Click Start

•Allow the scan to finish and scroll down to see if any UPDATES are needed.
•Update anything listed.
.
----------

Go to Microsoft Windows Update and get all critical updates.

----------

I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers LIKE Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
Safe Surfing!
Thank you for taking the time to hunt down the malware on my computer. I have followed the instructions in your last post and will be vigilant about keeping my programs (java in particular) up to date.
1731.

Solve : Blue Screen If I press the wireless button on my Laptop-Hardware Issue or Virus??

Answer»

Hi,
This laptop has been nothing but problems since the day I got it. No I did not purchase an extended warranty. Yesterday I had the (no joke) 500th or so blue screen. This time if I press the wireless button it "Dumps". The time before that bleeko? Lavasoft? <--Viruses?

Advise?

Oh by the way...Malwarebytes and SuperAntiSpyware...0 items found.WHAT? Now I cannot right click on a picture (in my pictures) without the computer freezing? WTH?
Download BlueScreenView to your desktop.
BlueScreenView
unzip downloaded file and double click on BlueScreenView.exe to run the PROGRAM.
when scanning is done, go to EDIT - Select All
Go to FILE - SAVE Selected Items, and save the report as BSOD.txt
Open BSOD.txt in Notepad, copy all of the content, and paste it into your next reply.
Says 0 crashes?? Do you just double click on the application icon?Please try this scanner. It may give me a better idea what's running on your computer.

Download DDS from HERE or HERE and save it to your desktop.

Vista users right click on dds and select Run as administrator (you will receive a UAC prompt, please ALLOW it)

* XP users Double click on dds to run it.
* If your antivirus or firewall try to block DDS then please allow it to run.
* When finished DDS will open two (2) logs.
* Save both reports to your desktop.
* The instructions here ask you to attach the Attach.txt.



1) DDS.txt
2) Attach.txt
Instead of attaching, please copy/past both logs into your Thread

Note: DDS will instruct you to post the Attach.txt log as an attachment.
Please just post it as you would any other log by copying and pasting it into the reply.

•Close the program window, and delete the program from your desktop.

Please note: You may have to disable any script protection running if the scan fails to run.
After downloading the tool, disconnect from the internet and disable all antivirus protection.
Run the scan, enable your A/V and reconnect to the internet.
Information on A/V control HERE .Then post your DDS logs. (DDS.txt and Attach.txt )
Here are those reports.

Just as a side note: I pressed the WLAN button and the blue screen came on and then it shut itself down. I'm back to being wired.

[year+ old attachment deleted by admin]The logs look clean and this is not like a malware infection. Does it do the same thing in Safe Mode? Try it in Safe Mode and let me know what happens.
You could also try running the Recovery Console and doing a repair. If you don't have the disk, the RC should already be installed on your computer.
Recovery Console Repair.Yes Sorry Dave. Blue screen in safe mode as well Quote from: radioflyer91355 on JULY 30, 2012, 08:32:32 PM

Yes Sorry Dave. Blue screen in safe mode as well
Did you try doing a Repair from the Recovery Console?How do i go about doing that?
Attached is my blue screen AFTER I turn on the Wireless

[year+ old attachment deleted by admin]Could you please try running BlueScreenViewer again?I did Dave and it still says zero crashes. Isn't that just bizarre?The next time it bluescreens could you try to get a screenprint? I can't make out any details from that picture.
How to post screenshots or images
Your comment has been removed. Please do not post malware advice, or post here in the malware forum, UNLESS you need help. If you want to help, please go here. Superdave.
1732.

Solve : Free malware removal programs - help??

Answer»

I'm at a friend's house for the next 2 days and she wants me to fix her computer. She says she got the PC as payment in return for a construction job on someone's house a couple years ago, and the computer has been freezing up with a BSOD when she or her kids use it to go online. I'm in school learning to be a computer tech, I'm on summer vacation, I have no job (yet) but I'm looking for my hands-on experience in PC tech stuff.

Earlier today I tried to wipe that computer's HDD and reinstall Windows XP from a Microsoft XP_sp2 disc, but before it would go into the install process, I got a BSOD with a 0x0000007B stop error that said to run chkdsk to test for HDD corruption. However, the computer boots up into XP normally. The friend wants to know if it has a VIRUS on it and what kind of malware removal program I could recommend/install for her, but I'm stumped on this - so can you recommend any free complete malware scan and removal programs that I could d/l and install on her computer so she will not have to keep paying monthly/yearly fees on it? She does not have a lot of money to spend.

Thanks in advance.1) You want to install sp3 not sp2. You can build a slipstream cd with nlite.
2) I would not try to clean the system of malware, I'd install from scratch.
3) BOOT to the Windows CD (you cannot install from within the OS) and first choose a FULL format (that will run chkdsk /r prior to formatting). You will need the sata driver(s) for the HD.
4) To answer your question more directly, good free AV apps include Microsoft Security Essentials, Avira and Avast. Good free malware apps to install in addition to an av app are MalwareBytes and/or SuperAntiSpywareQuote from: Allan on August 01, 2012, 04:09:58 PM

2) I would not try to clean the system of malware, I'd install from scratch.
3) BOOT to the Windows CD (you cannot install from within the OS) and first choose a FULL format (that will run chkdsk /r prior to formatting). You will need the sata driver(s) for the HD.
4) To answer your question more directly, good free AV apps include Microsoft Security Essentials, Avira and Avast. Good free malware apps to install in addition to an av app are MalwareBytes and/or SuperAntiSpyware

That's what I tried to do - boot from the windows CD, but immediately after the stuff from the CD was loaded into RAM, but before it got to the Windows installation (the windows setup program) it gave me a BSOD 0x0000007B stop error.Here's some information about that error.

Please download aswMBR.exe ( 511KB ) to your desktop.

Double click the aswMBR.exe to run it



Click the "Scan" button to START scan

Note: Do not take action against any **Rootkit** entries until I have reviewed the log. Often there are false positives



On completion of the scan click save log, save it to your desktop and post in your next reply
**********************************************************
  • Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop.
  • Once extracted, open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.

  • If an infected file is detected, the default action will be Cure, click on Continue.

  • If a suspicious file is detected, the default action will be Skip, click on Continue.

  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.

  • Click the Report button and copy/paste the contents of it into your next reply
Note:It will also create a log in the C:\ directory..
Thanks, SuperDave - I fixed the problem by getting into the BIOS, changing it from ACHI to IDE and the computer got into the XP setup screen, from where I deleted the existing partition, and installed XP.

Now I would like to get this friend some free malware scanner/removal programs that do not require her to pay a fee every month/year and give her all the protection she needs - can you help?Remember to only install one antivirus!
I'm very happy with MSE.

1) Avast! Home Edition
2) AVG Free Edition
3) Avira AntiVir Personal
4) Microsoft Security Essentials for Windows Vista\Windows 7 - 64 bit Download
4-a) Microsoft Security Essentials for Windows XP
5) Comodo Antivirus (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" if you choose this one)
6) PC Tools AntiVirus Free Edition
7) ThreatFire

It is strongly recommended that you run only one antivirus program at a time. Having more than one antivirus program active in memory uses additional resources and can result in program conflicts and false virus alerts. If you choose to install more than one antivirus program on your computer, then only one of them should be active in memory at a time.
****************************************************
Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors.

Remember only install ONE firewall

1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one)
2) Online Armor
3) Agnitum Outpost
4) PC Tools Firewall Plus

If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
*****************************************************
Malwarebytes' Anti-Malware (MBAM)

If you already have Malwarebytes be sure to check for updates before scanning!

Download Malwarebytes Anti-Malware and save it to your desktop. Alternate download link

•Double-click mbam-setup.exe and follow the prompts to install the program.

•Be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.

If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.

•If an update is found, it will download and install the latest version.
•Once the program has loaded, select Perform Quick Scan, then click Scan.

•When the scan is complete, click OK, then Show Results to view the results.

•Be sure that everything is checked, and click Remove Selected.

•When completed, a log will open in NOTEPAD. Save it to a convenient location like the Desktop.

•The log is also automatically saved and can be viewed later by clicking the Logs tab in MBAM.

•Exit MBAM.
.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will PREVENT MBAM from removing all the malware.

************************************************************
SUPERAntiSpyware

If you already have SUPERAntiSpyware be sure to check for updates before scanning!

Download SuperAntispyware Free Edition (SAS)
* Double-click the icon on your desktop to run the installer.
* When asked to Update the program definitions, click Yes
* If you encounter any problems while downloading the updates, manually download and unzip them from here
* Next click the Preferences button.

•Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts
* Click the Scanning Control tab.
* Under Scanner Options make sure only the following are checked:

•Close browsers before scanning
•Scan for tracking cookies
•Terminate memory threats before quarantining
Please leave the others unchecked

•Click the Close button to leave the control center screen.

* On the main screen click Scan your computer
* On the left check the box for the drive you are scanning.
* On the right choose Perform Complete Scan
* Click Next to start the scan. Please be patient while it scans your computer.
* After the scan is complete a summary box will appear. Click OK
* Make sure everything in the white box has a check next to it, then click Next
* It will QUARANTINE what it found and if it asks if you want to reboot, click Yes

•To retrieve the removal information please do the following:
•After reboot, double-click the SUPERAntiSpyware icon on your desktop.
•Click Preferences. Click the Statistics/Logs tab.

•Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.

•It will open in your default text editor (preferably Notepad).
•Save the notepad file to your desktop by clicking (in notepad) File > Save As...

* Save the log somewhere you can easily find it. (normally the desktop)
* Click close and close again to exit the program.
*Copy and Paste the log in your post.
***************************************************
SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.
1733.

Solve : Very Stubborn Virus; Seems to be Google Redirect Virus.?

Answer»

It appears your system is infected with a rootkit. A rootkit is a powerful piece of malware, that allows hackers full control over your computer for means of sending attacks over the Internet, or using your computer to generate revenue.

Malware experts have recommended that we make it clear that with the system under control of a hacker, your computer might become impossible to clean 100%.

Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. They can disable your antivirus and SECURITY tools to prevent detection and removal. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is sent back to the hacker. To learn more about these types of infections, you can REFER to:

What danger is presented by rootkits?
Rootkits and how to combat them
r00tkit Analysis: What Is A Rootkit

If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable. Do NOT change passwords or do any transactions while using the infected computer because the attacker may get the new passwords and transaction information. (If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connecting again.) Banking and credit card institutions should be notified to apprise them of your situation (possible security breach). To protect your information that may have been compromised, I recommend reading these references:
How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
What Should I Do If I've Become A Victim Of Identity Theft?
Identity Theft Victims Guide - What to do
It is dangerous and incorrect to assume the computer is secure even if the malware appears to have been removed. In some instances an infection may have caused so much damage to your system that it cannot
be completely cleaned or repaired so you can never be sure that you have completely removed a rootkit. The malware may leave so many remnants behind that security tools cannot find them. Tools that claim to be able to remove rootkits cannot GUARANTEE that all traces of it will be removed. Many experts in the security community believe that once infected with such a piece of malware, the best course of action would be a reformat and clean reinstall of the OS. This is something I don't like to recommend normally, but in most cases it is the best solution for your safety. Making this decision is BASED on what the computer is used for, and what information can be accessed from it. For more information, please read these references very carefully:
When should I re-format? How should I reinstall?
Help: I Got Hacked. Now What Do I Do?
Help: I Got Hacked. Now What Do I Do? Part II
Where to draw the line? When to recommend a format and reinstall?

Guides for format and reinstall:

how-to-reformat-and-reinstall-your-operating-system-the-easy-way

However, if you do not have the resources to reinstall your computer's OS and would like me to attempt to clean it, I will be happy to do so. But please consider carefully before deciding against a reformat.
If you do make that decision, I will do my best to help you clean the computer of any infections, but you must understand that once a machine has been taken over by this type of malware, I cannot guarantee that it will be 100% secure even after disinfection or that the removal will be successful.

Please let me KNOW what you have decided to do in your next post. Should you have any questions, please feel free to ask.

1734.

Solve : Malware on Ebay.. Please help!?

Answer»

hi,

every time i press the search button on ebay, avast finds malware showing this:

hxxp://include.ebaystatic.com/v4js/en_US/e637/Finding_Common_e63710150401_6b_en_US.js\Finding_Common_e63710150401_6b_en_US

JS:Pdfka-OE [Expl]

its getting very annoying.. thanks

John

Disabled linkLogfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:40:57 AM, on 10/9/2009
Platform: Windows Vista (WinNT 6.00.1904)
MSIE: Internet Explorer v7.00 (7.00.6000.16890)
Boot MODE: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\System32\rundll32.exe
C:\Program Files\Synaptics\SynTP\SynTPStart.exe
C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\Intel\Intel Matrix Storage MANAGER\IAAnotif.exe
C:\Program Files\HP\QuickPlay\QPService.exe
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe
C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe
C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\HP\HP Software Update\hpwuSchd2.exe
C:\Program Files\Alwil Software\Avast4\ashDisp.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Skype\Phone\Skype.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe
C:\Windows\system32\wuauclt.exe
C:\Program Files\Java\jre6\bin\jucheck.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=81&bd=Pavilion&pf=laptop
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=81&bd=Pavilion&pf=laptop
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=81&bd=Pavilion&pf=laptop
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O1 - Hosts: ::1 localhost
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: NCO 2.0 IE BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - (no file)
O2 - BHO: AOL Toolbar Launcher - {7C554162-8CB7-45A4-B8F4-8EA1C75885F9} - C:\Program Files\AOL\AIM Toolbar 5.0\aoltb.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: HP Smart BHO CLASS - {FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll
O3 - Toolbar: (no name) - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - (no file)
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O3 - Toolbar: AIM Toolbar - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL\AIM Toolbar 5.0\aoltb.dll
O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [SynTPStart] C:\Program Files\Synaptics\SynTP\SynTPStart.exe
O4 - HKLM\..\Run: [SMSERIAL] C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [IAAnotif] C:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe
O4 - HKLM\..\Run: [QPService] "C:\Program Files\HP\QuickPlay\QPService.exe"
O4 - HKLM\..\Run: [QlbCtrl] %ProgramFiles%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start
O4 - HKLM\..\Run: [OnScreenDisplay] C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe
O4 - HKLM\..\Run: [UCam_Menu] "C:\Program Files\CyberLink\YouCam\MUITransfer\MUIStartMenu.exe" "C:\Program Files\CyberLink\YouCam" update "Software\CyberLink\YouCam\1.0"
O4 - HKLM\..\Run: [hpqSRMon] C:\Program Files\HP\Digital Imaging\bin\hpqSRMon.exe
O4 - HKLM\..\Run: [HP Health Check Scheduler] c:\Program Files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
O4 - HKLM\..\Run: [hpWirelessAssistant] C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
O4 - HKLM\..\Run: [WAWifiMessage] C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized
O4 - HKCU\..\Run: [AdobeUpdater] "C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe"
O4 - Startup: OneNote 2007 Screen Clipper and Launcher.lnk = C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\The Print Shop 23\Remind.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Vongo Tray.lnk = ?
O8 - Extra context menu item: &AIM Search - c:\program files\aol\aim toolbar 5.0\resources\en-US\local\search.html
O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra button: AIM Toolbar - {3369AF0D-62E9-4bda-8103-B4C75499B578} - C:\Program Files\AOL\AIM Toolbar 5.0\aoltb.dll
O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe
O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - C:\Windows\bdoscandel.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: HP Smart Select - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll
O13 - Gopher Prefix:
O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab
O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} (BDSCANONLINE Control) - http://download.bitdefender.com/resources/scan8/oscan8.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~2\GOEC62~1.DLL
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Com4Qlb - Hewlett-Packard Development COMPANY, L.P. - C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\Com4Qlb.exe
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files\HP Games\My HP Game Console\GameConsoleService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: HP Health Check Service - Hewlett-Packard - c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe
O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Intuit Update Service (IntuitUpdateService) - Intuit Inc. - C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: Nero BackItUp Scheduler 4.0 - Unknown owner - C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe (file missing)
O23 - Service: QuickPlay Background CAPTURE Service (QBCS) (QPCapSvc) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe
O23 - Service: QuickPlay Task Scheduler (QTS) (QPSched) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe
O23 - Service: Vongo Service - Starz Entertainment Group LLC - C:\Program Files\Vongo\VongoService.exe

--
End of file - 11827 bytes
anyone?When I open that link I get a page cannot be found.
When you go to ebay, how do you go about doing it?i just use firefox as my browser, and go straight to ebay's homepageTry manually updating your antivirus.

1735.

Solve : cannot use search engines such as google?

Answer»

I have problems accessing google and yahoo search engines which I assume is a virus. The relevant logs are attached.



[Saving space, attachment deleted by admin]Welcome to CH.

1. Close all open Web browsers.
2. From the Start menu in Windows select Control Panel.
3. Select Add or Remove Programs.
4. Uninstall any of the following programs associated with Ask.com: (the names may be slightly different)

- Ask.com
- Ask Bar
- Ask Desktop Search
- Ask Search
- Ask Toolbar
- Ask Jeeves

5. Click Change/Remove for each and uninstall all found.

----------

Open HijackThis and select Do a system scan only

Place a check mark next to the following entries: (if there)

  • R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_US&c=Q106&bd=pavilion&pf=desktop
  • R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://register.hp.com/servlet/WebReg.servlets.ProdReg1Servlet?appID=java_wreg_wreg_genpg&prodOS=029&gwCountry=US&language=en&PURCH_DT_MONTH=03&PURCH_DT_DAY=23&PURCH_DT_YEAR=2006&PROD_SERIAL_ID=CNN5510PP4&application=305&modelID=EL470AA&LF=blue
  • O1 - Hosts: 74.125.45.100 secure.privatesecuredpayments.com
  • O1 - Hosts: 74.125.45.100 getantivirusplusnow.com
  • O1 - Hosts: 74.125.45.100 secure-plus-payments.com
  • O1 - Hosts: 74.125.45.100 www.getantivirusplusnow.com
  • O1 - Hosts: 74.125.45.100 www.secure-plus-payments.com
  • O1 - Hosts: 74.125.45.100 www.getavplusnow.com
  • O1 - Hosts: 74.125.45.100 securesoftwarebill.com
  • O1 - Hosts: 74.125.45.100 secure.paysecuresystem.com
  • O1 - Hosts: 74.125.45.100 paysoftbillsolution.com
  • O1 - Hosts: 64.86.17.32 google.ae
  • O1 - Hosts: 64.86.17.32 google.as
  • O1 - Hosts: 64.86.17.32 google.at
  • O1 - Hosts: 64.86.17.32 google.az
  • O1 - Hosts: 64.86.17.32 google.ba
  • O1 - Hosts: 64.86.17.32 google.be
  • O1 - Hosts: 64.86.17.32 google.bg
  • O1 - Hosts: 64.86.17.32 google.bs
  • O1 - Hosts: 64.86.17.32 google.ca
  • O1 - Hosts: 64.86.17.32 google.cd
  • O1 - Hosts: 64.86.17.32 google.com.gh
  • O1 - Hosts: 64.86.17.32 google.com.hk
  • O1 - Hosts: 64.86.17.32 google.com.jm
  • O1 - Hosts: 64.86.17.32 google.com.mx
  • O1 - Hosts: 64.86.17.32 google.com.my
  • O1 - Hosts: 64.86.17.32 google.com.na
  • O1 - Hosts: 64.86.17.32 google.com.nf
  • O1 - Hosts: 64.86.17.32 google.com.ng
  • O1 - Hosts: 64.86.17.32 google.ch
  • O1 - Hosts: 64.86.17.32 google.com.np
  • O1 - Hosts: 64.86.17.32 google.com.pr
  • O1 - Hosts: 64.86.17.32 google.com.qa
  • O1 - Hosts: 64.86.17.32 google.com.sg
  • O1 - Hosts: 64.86.17.32 google.com.tj
  • O1 - Hosts: 64.86.17.32 google.com.tw
  • O1 - Hosts: 64.86.17.32 google.dj
  • O1 - Hosts: 64.86.17.32 google.de
  • O1 - Hosts: 64.86.17.32 google.dk
  • O1 - Hosts: 64.86.17.32 google.dm
  • O1 - Hosts: 64.86.17.32 google.ee
  • O1 - Hosts: 64.86.17.32 google.fi
  • O1 - Hosts: 64.86.17.32 google.fm
  • O1 - Hosts: 64.86.17.32 google.fr
  • O1 - Hosts: 64.86.17.32 google.ge
  • O1 - Hosts: 64.86.17.32 google.gg
  • O1 - Hosts: 64.86.17.32 google.gm
  • O1 - Hosts: 64.86.17.32 google.gr
  • O1 - Hosts: 64.86.17.32 google.ht
  • O1 - Hosts: 64.86.17.32 google.ie
  • O1 - Hosts: 64.86.17.32 google.im
  • O1 - Hosts: 64.86.17.32 google.in
  • O1 - Hosts: 64.86.17.32 google.it
  • O1 - Hosts: 64.86.17.32 google.ki
  • O1 - Hosts: 64.86.17.32 google.la
  • O1 - Hosts: 64.86.17.32 google.li
  • O1 - Hosts: 64.86.17.32 google.lv
  • O1 - Hosts: 64.86.17.32 google.ma
  • O1 - Hosts: 64.86.17.32 google.ms
  • O1 - Hosts: 64.86.17.32 google.mu
  • O1 - Hosts: 64.86.17.32 google.mw
  • O1 - Hosts: 64.86.17.32 google.nl
  • O1 - Hosts: 64.86.17.32 google.no
  • O1 - Hosts: 64.86.17.32 google.nr
  • O1 - Hosts: 64.86.17.32 google.nu
  • O1 - Hosts: 64.86.17.32 google.pl
  • O1 - Hosts: 64.86.17.32 google.pn
  • O1 - Hosts: 64.86.17.32 google.pt
  • O1 - Hosts: 64.86.17.32 google.ro
  • O1 - Hosts: 64.86.17.32 *Blocked Russian URL*
  • O1 - Hosts: 64.86.17.32 google.rw
  • O1 - Hosts: 64.86.17.32 google.sc
  • O1 - Hosts: 64.86.17.32 google.se
  • O1 - Hosts: 64.86.17.32 google.sh
  • O1 - Hosts: 64.86.17.32 google.si
  • O1 - Hosts: 64.86.17.32 google.sm
  • O1 - Hosts: 64.86.17.32 google.sn
  • O1 - Hosts: 64.86.17.32 google.st
  • O1 - Hosts: 64.86.17.32 google.tl
  • O1 - Hosts: 64.86.17.32 google.tm
  • O1 - Hosts: 64.86.17.32 google.tt
  • O1 - Hosts: 64.86.17.32 google.us
  • O1 - Hosts: 64.86.17.32 google.vu
  • O1 - Hosts: 64.86.17.32 google.ws
  • O1 - Hosts: 64.86.17.32 google.co.ck
  • O1 - Hosts: 64.86.17.32 google.co.id
  • O1 - Hosts: 64.86.17.32 google.co.il
  • O1 - Hosts: 64.86.17.32 google.co.in
  • O1 - Hosts: 64.86.17.32 google.co.jp
  • O1 - Hosts: 64.86.17.32 google.co.kr
  • O1 - Hosts: 64.86.17.32 google.co.ls
  • O1 - Hosts: 64.86.17.32 google.co.ma
  • O1 - Hosts: 64.86.17.32 google.co.nz
  • O1 - Hosts: 64.86.17.32 google.co.tz
  • O1 - Hosts: 64.86.17.32 google.co.ug
  • O1 - Hosts: 64.86.17.32 google.co.uk
  • O1 - Hosts: 64.86.17.32 google.co.za
  • O1 - Hosts: 64.86.17.32 google.co.zm
  • O1 - Hosts: 64.86.17.32 google.com
  • O1 - Hosts: 64.86.17.32 google.com.af
  • O1 - Hosts: 64.86.17.32 google.com.ag
  • O1 - Hosts: 64.86.17.32 google.com.ar
  • O1 - Hosts: 64.86.17.32 google.com.au
  • O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
.
Important: Close all open windows except for HijackThis and then click Fix checked.

Once completed, exit HijackThis.

----------

Download HostsXpert[/B][/COLOR] and then follow the below steps.

* Unzip HostXpert to your desktop.
* Open up the HostXpert program.
* Make sure that the "Make Hosts Writable?" button in the upper left corner is enabled (unlocked).
* Click Create Back Up.
* Then click on Restore Microsoft's Host Files.
* Close the HostXpert program.

Note: if you use SpywareBlaster, Spybot and/or IE-SPYAD, it will be necessary to re-install the protection they afford. For SpywareBlaster, run the program and select Enable all protection. For Spybot run the program and select Immunize. For IE-SPYAD, run the batch file and reinstall the protection.

----------

If you already have ComboFix be sure to delete it and download a new copy.

Download ComboFix© by sUBs from one of the below links. Be sure top save it to the Desktop.

Link #1
Link #2

**Note: It is important that it is saved directly to your Desktop

Close any open Web browsers. (Firefox, Internet Explorer, etc) before starting ComboFix.

Temporarily disable your antivirus and any antispyware real time protection before PERFORMING a scan. Click this link to see a LIST of security programs that should be disabled and how to disable them.

Double click combofix.exe & follow the prompts.
Vista users Right-Click on ComboFix.exe and select Run as administrator (you will receive a UAC prompt, please allow it)
When finished ComboFix will produce a log for you.
Post the ComboFix log in your next reply.

Important: Do not mouseclick ComboFix's window while it is running. That may cause it to stall.

Remember to re-enable your antivirus and antispyware protection when ComboFix is complete.

If you have problems with ComboFix usage, see How to use ComboFixThanks for this advice. I am having trouble trying to enable 'Make Hosts Writable?' with HostXpert. I click okay on the two prompts to remove the systems file and hidden file attributes, but it then locks the button as read only - that is, the button simply says 'Make Writable?' but when clicked it will not change.Download OTL to your desktop.

* Open OTL
* Copy and Paste the following text in the codebox into the Custom Scans/Fixes window.

Code: [Select]:OTL

:Services

:Reg

:Files
C:\Program Files\Ask.com

:COMMANDS
[resethosts]
[purity]
[emptytemp]
[start explorer]

* Click Run Fix
* OTLI2 may ask to reboot the machine. Please do so if asked.
* Click OK
* A report will open. Copy and Paste that report in your next reply.

Thanks again. Attached is the log from combofix.

[Saving space, attachment deleted by admin]That's only the top part of the log. Did you remove some of it?

Run it again if needed. I need the entire log.Sorry here is the entire log. Last time the system rebooted midway through obtaining the log.

[Saving space, attachment deleted by admin]Thank you.

* Click START then RUN - Vista users press the Windows Key and the R keys for the Run box.
* Now type Combofix /Uninstall in the runbox
* Make sure there's a space between Combofix and /Uninstall
* Then hit Enter

* The above procedure will:
* Delete the following:
* ComboFix and its associated files and folders.
* Reset the clock settings.
* Hide file extensions, if required.
* Hide System/Hidden files, if required.
* Set a new, clean Restore Point.

----------

Clean out your temporary internet files and temp files.

Download TFC by OldTimer to your desktop.

Double-click TFC.exe to run it.

Note: If you are running on Vista, right-click on the file and choose Run As Administrator

TFC will close all programs when run, so make sure you have saved all your work before you begin.

* Click the Start button to begin the cleaning process.
* Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
* Please let TFC run uninterrupted until it is finished.

Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.

----------

ESET Online Scan

Scan your computer with the ESET FREE Online Virus Scan

* Click the ESET Online Scanner button.

* For alternate browsers only: (Microsoft Internet Explorer users can SKIP these steps)
* Click on the esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop
* Double click on the esetsmartinstaller_enu.exe icon on your desktop.
* Place a check mark next to YES, I accept the Terms of Use.

* Click the Start button.
* Accept any security warnings from your browser.
* Leave the check mark next to Remove found threats and place a check next to Scan archives.
* Click the Start button.
* ESET will then download updates, install, and begin scanning your computer. Please be patient as this can take some time.
* When the scan completes, click List of found threats.
* Next click Export to text file and save the file to your desktop using a name such as ESETScan. Include the contents of this report in your next reply.
* Click the <<Back button then click Finish.

In your next reply please include the ESET Online Scan LogThanks. Attached is the eset log.

[Saving space, attachment deleted by admin]If there are no more malware issues we can finish up now.

Use the Secunia Software Inspector to check for out of date software.
  • Click Start Now
  • Check the box next to Enable thorough system inspection.
  • Click Start
  • Allow the scan to finish and scroll down to see if any updates are needed.
  • Update anything listed.
.
----------

Go to Microsoft Windows Update and get all critical updates.

----------

I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, IDENTITY theft, spyware, spam, viruses and unreliable shopping sites. WOT WARNS you before you interact with a risky website. It's easy and it's free.

SpywareBlaster - Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

Also see Slow Computer? It May Not Be Malware for free cleaning/maintenance tools to help keep your computer running smooth.
1736.

Solve : Still Infected after following the first thread?

Answer»

OK here we go.

Delete Combo-Fix and download a new copy to your desktop. This time don't rename it. http://download.bleepingcomputer.com/sUBs/ComboFix.exe

Delete these files/folders, as follows:

1. Go to Start > Run > type Notepad.exe and click OK to open Notepad.
It must be Notepad, not Wordpad.
2. Copy the text in the below code box by highlighting all the text and pressing Ctrl+C

Code: [Select]KillAll::

Driver::
SessionLauncher
DCTDZCF
GGXIX

DDS::
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background

File::
c:\windows\Tasks\OGALogon.job
c:\windows\system32\OGAEXEC.exe

Folder::
c:\documents and settings\Administrator\Local Settings\Application Data\Symantec
c:\documents and settings\Administrator\Application Data\AVG8
c:\documents and settings\Randy\Local Settings\Application Data\Symantec
c:\documents and settings\All Users\Application Data\Norton
c:\documents and settings\All Users\Application Data\NortonInstaller

Registry::
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"=-


3. Go to the Notepad window and click Edit > Paste
4. Then click File > Save
5. Name the file CFScript.txt - Save the file to your Desktop
6. Then drag the CFScript (hold the left mouse button while dragging the file) and drop it (release the left mouse button) into ComboFix.exe as you see in the screenshot below. Important: Perform this instruction carefully!



ComboFix will begin to execute, just follow the prompts.
After reboot (in case it asks to reboot), it will produce a log for you.
Post that log (Combofix.txt) in your next reply.

Note: Do not mouseclick ComboFix's window while it is running. That may cause your system to freezeThanks evilfantasy...Here is the new ComboFix log:

ComboFix 09-10-11.01 - Randy 10/11/2009 18:48.2.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.393 [GMT -4:00]
Running from: c:\documents and settings\Randy\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Randy\Desktop\CFScript.txt
AV: avast! antivirus 4.8.1356 [VPS 091011-0] *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}

FILE ::
"c:\windows\system32\OGAEXEC.exe"
"c:\windows\Tasks\OGALogon.job"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Administrator\Application Data\AVG8
c:\documents and settings\Administrator\Local Settings\Application Data\Symantec
c:\documents and settings\Administrator\Local Settings\Application Data\Symantec\CEDUrl.txt
c:\documents and settings\All Users\Application Data\Norton
c:\documents and settings\All Users\Application Data\Norton\00000082\00000105\00000349\cltLMS1.dat
c:\documents and settings\All Users\Application Data\Norton\00000082\00000105\00000349\cltLMS2.dat
c:\documents and settings\All Users\Application Data\Norton\00000082\00000105\key.txt
c:\documents and settings\All Users\Application Data\Norton\symdata.xml
c:\documents and settings\All Users\Application Data\NortonInstaller
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-17h50m14s\Install.1.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-17h50m14s\Install.2.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-17h50m14s\Log.Lue
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-17h50m14s\NortonInstall-09-20-2009-17h50m14s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-17h52m03s\BHCA-0x0770.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-17h52m03s\Install.1.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-17h52m03s\Install.2.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-17h52m03s\NortonInstall-09-20-2009-17h52m03s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-17h52m03s\SymIMexe-0x0634.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-17h52m03s\tuIH-0x0404.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h07m52s\Install.1.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h07m52s\Install.2.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h07m52s\Log.Lue
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h07m52s\NortonInstall-09-20-2009-21h07m52s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h09m31s\Install.1.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h09m31s\NortonInstall-09-20-2009-21h09m31s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h10m28s\NortonInstall-09-20-2009-21h10m28s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h14m36s\Install.1.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h14m36s\Install.2.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h14m36s\NortonInstall-09-20-2009-21h14m36s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h15m33s\BHCA-0x09A8.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h15m33s\Install.1.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h15m33s\Install.2.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h15m33s\NortonInstall-09-20-2009-21h15m33s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h15m33s\SymIMexe-0x05A8.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-20-2009-21h15m33s\tuIH-0x03A4.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-16h46m49s\BHCA-0x072C.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-16h46m49s\Install.1.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-16h46m49s\NortonInstall-09-21-2009-16h46m49s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-16h46m49s\OCSCtl-0x0228.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-16h46m49s\SymIMexe-0x0498.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-16h47m42s\NortonInstall-09-21-2009-16h47m42s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-17h28m54s\Install.1.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-17h28m54s\Install.2.mft
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-17h28m54s\Install.2.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-17h28m54s\Log.Lue
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-17h28m54s\NortonInstall-09-21-2009-17h28m54s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-17h30m29s\BHCA-0x0254.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-17h30m29s\Install.1.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-17h30m29s\Install.2.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-17h30m29s\NortonInstall-09-21-2009-17h30m29s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-17h30m29s\SymIMexe-0x0680.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-17h30m29s\tuIH-0x00A0.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-18h57m26s\BHCA-0x0088.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-18h57m26s\Install.1.mft.7z
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-18h57m26s\NortonInstall-09-21-2009-18h57m26s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-18h57m26s\OCSCtl-0x0384.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-18h57m26s\SymIMexe-0x0398.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\09-21-2009-18h58m24s\NortonInstall-09-21-2009-18h58m24s.log
c:\documents and settings\All Users\Application Data\NortonInstaller\Logs\Url.txt
c:\documents and settings\Randy\Local Settings\Application Data\Symantec
c:\documents and settings\Randy\Local Settings\Application Data\Symantec\CEDUrl.txt
c:\program files\messenger\msmsgs.exe
c:\windows\system32\OGAEXEC.exe
c:\windows\Tasks\OGALogon.job

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_DCTDZCF
-------\Legacy_GGXIX
-------\Legacy_SESSIONLAUNCHER
-------\Service_DCTDZCF
-------\Service_GGXIX
-------\Service_SessionLauncher


((((((((((((((((((((((((( Files Created from 2009-09-11 to 2009-10-11 )))))))))))))))))))))))))))))))
.

2009-10-11 01:58 . 2009-10-11 01:58--------d-----w-c:\documents and settings\Randy\Application Data\Office Genuine Advantage
2009-10-11 01:15 . 2008-04-14 00:1156320----a-w-c:\windows\eventlog.dll
2009-09-27 13:00 . 2009-09-27 13:00--------d-----w-c:\program files\iPod
2009-09-26 21:53 . 2009-09-26 22:07--------d-----w-c:\program files\Trend Micro
2009-09-26 15:40 . 2009-09-15 10:5452368----a-w-c:\windows\system32\drivers\aswTdi.sys
2009-09-26 15:40 . 2009-09-15 10:5423152----a-w-c:\windows\system32\drivers\aswRdr.sys
2009-09-26 15:40 . 2009-09-15 10:5327408----a-w-c:\windows\system32\drivers\aavmker4.sys
2009-09-26 15:40 . 2009-09-15 10:5397480----a-w-c:\windows\system32\AvastSS.scr
2009-09-26 15:40 . 2009-09-15 10:5693424----a-w-c:\windows\system32\drivers\aswmon.sys
2009-09-26 15:40 . 2009-09-15 10:5694160----a-w-c:\windows\system32\drivers\aswmon2.sys
2009-09-26 15:40 . 2009-09-15 10:55114768----a-w-c:\windows\system32\drivers\aswSP.sys
2009-09-26 15:40 . 2009-09-15 10:5520560----a-w-c:\windows\system32\drivers\aswFsBlk.sys
2009-09-26 15:39 . 2009-09-15 10:591279968----a-w-c:\windows\system32\aswBoot.exe
2009-09-26 15:39 . 2009-09-26 15:39--------d-----w-c:\program files\Alwil Software
2009-09-25 22:19 . 2009-09-25 22:19--------d-----w-C:\VundoFix Backups
2009-09-24 20:47 . 2009-09-24 20:46411368----a-w-c:\windows\system32\deploytk.dll
2009-09-24 12:26 . 2009-09-24 12:26--------d-----w-c:\windows\system32\Service
2009-09-23 21:49 . 2009-09-23 21:49--------d-----w-c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-09-23 21:49 . 2009-09-23 21:49--------d-----w-c:\documents and settings\Randy\Application Data\SUPERAntiSpyware.com
2009-09-23 21:38 . 2009-09-23 21:38--------d-----w-c:\program files\CCleaner
2009-09-22 03:03 . 2009-09-24 04:3370254592--sha-w-C:\NRTPage.sys
2009-09-21 20:59 . 2009-09-21 20:5991896----a-w-c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-09-21 20:46 . 2009-09-21 20:46--------d-----w-c:\documents and settings\Administrator\Local Settings\Application Data\Downloaded Installations
2009-09-21 02:48 . 2009-09-25 22:07--------d-----w-c:\documents and settings\All Users\Application Data\PC Tools
2009-09-21 01:18 . 2009-09-21 01:18--------d-----w-c:\documents and settings\All Users\Application Data\{7B6BA59A-FB0E-4499-8536-A7420338BF3B}
2009-09-20 21:54 . 2009-09-20 21:54--------d-----w-c:\documents and settings\Randy\Local Settings\Application Data\Downloaded Installations
2009-09-20 21:25 . 2009-09-20 21:25--------d-----w-c:\documents and settings\Randy\Application Data\Malwarebytes
2009-09-20 20:35 . 2009-09-25 22:07--------d---a-w-c:\documents and settings\All Users\Application Data\TEMP
2009-09-20 20:25 . 2009-09-20 20:25--------d-----w-c:\documents and settings\Administrator\Application Data\AT&T
2009-09-20 20:22 . 2009-09-20 20:22--------d-----w-c:\documents and settings\Administrator\Application Data\Malwarebytes
2009-09-20 20:22 . 2009-09-20 20:22--------d-----w-c:\documents and settings\All Users\Application Data\Malwarebytes
2009-09-20 20:20 . 2009-09-20 20:20--------d-sh--w-c:\documents and settings\Administrator\PrivacIE
2009-09-20 04:12 . 2009-09-20 04:12--------d-sh--w-c:\documents and settings\Administrator\IETldCache
2009-09-19 23:02 . 2009-09-19 23:02319----a-w-C:\drmHeader.bin
2009-09-14 11:29 . 2009-09-24 02:1175732---ha-w-c:\windows\system32\mlfcache.dat
2009-09-14 01:02 . 2009-09-14 01:02--------d-----w-c:\program files\iPhone Configuration Utility
2009-09-14 01:01 . 2009-09-14 01:01--------d-----w-c:\program files\Safari
2009-09-14 00:51 . 2009-09-14 00:53--------d-----w-c:\documents and settings\All Users\Application Data\{755AC846-7372-4AC8-8550-C52491DAA8BD}
2009-09-14 00:43 . 2009-09-14 00:44--------d-----w-c:\program files\QuickTime

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-11 18:07 . 2006-07-01 01:03--------d-----w-c:\program files\Common Files\Symantec Shared
2009-10-10 19:47 . 2006-07-01 01:05--------d-----w-c:\program files\MUSICMATCH
2009-09-27 13:01 . 2009-08-16 17:37--------d-----w-c:\program files\iTunes
2009-09-27 13:00 . 2009-08-16 17:31--------d-----w-c:\program files\Common Files\Apple
2009-09-27 12:56 . 2006-07-01 00:44--------d-----w-c:\program files\Java
2009-09-26 00:20 . 2006-07-05 22:06--------d-----w-c:\documents and settings\Randy\Application Data\ATI
2009-09-26 00:20 . 2006-07-01 00:57--------d-----w-c:\documents and settings\Administrator\Application Data\ATI
2009-09-24 12:52 . 2008-07-09 19:51--------d-----w-c:\documents and settings\Randy\Application Data\AT&T
2009-09-24 12:52 . 2008-07-09 19:50--------d-----w-c:\documents and settings\All Users\Application Data\AT&T
2009-09-24 12:52 . 2008-07-09 19:51--------d-----w-c:\program files\AT&T
2009-09-23 21:12 . 2006-07-01 01:00--------d-----w-c:\documents and settings\All Users\Application Data\Viewpoint
2009-09-21 22:15 . 2006-07-08 14:0891896----a-w-c:\documents and settings\Randy\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-09-21 21:21 . 2006-07-05 23:02--------d-----w-c:\documents and settings\All Users\Application Data\WildTangent
2009-09-21 21:21 . 2006-07-01 01:04--------d-----w-c:\program files\WildTangent
2009-09-15 01:21 . 2009-08-16 17:38--------d-----w-c:\documents and settings\Randy\Application Data\Apple Computer
2009-09-09 12:19 . 2009-01-24 17:39--------d-----w-c:\program files\Microsoft Silverlight
2009-08-28 23:42 . 2009-08-16 17:3240448----a-w-c:\windows\system32\drivers\usbaapl.sys
2009-08-28 23:42 . 2009-08-16 17:322065696----a-w-c:\windows\system32\usbaaplrc.dll
2009-08-17 12:04 . 2009-08-17 12:04--------d-----w-c:\program files\MSBuild
2009-08-17 12:04 . 2009-08-17 12:04--------d-----w-c:\program files\Reference Assemblies
2009-08-16 17:38 . 2009-08-16 17:37--------d-----w-c:\documents and settings\All Users\Application Data\{8CD7F5AF-ECFA-4793-BF40-D8F42DBFF906}
2009-08-16 17:37 . 2009-08-16 17:35--------d-----w-c:\documents and settings\All Users\Application Data\Apple Computer
2009-08-16 17:36 . 2009-08-16 17:36--------d-----w-c:\program files\Bonjour
2009-08-16 17:32 . 2009-08-16 17:32--------d-----w-c:\program files\Apple Software Update
2009-08-16 17:31 . 2009-08-16 17:31--------d-----w-c:\documents and settings\All Users\Application Data\Apple
2009-08-14 13:40 . 2009-08-14 13:40--------d-----w-c:\documents and settings\All Users\Application Data\TomTom
2009-08-14 13:39 . 2009-08-14 13:39--------d-----w-c:\documents and settings\Randy\Application Data\TomTom
2009-08-14 13:39 . 2009-08-14 13:39--------d-----w-c:\program files\TomTom International B.V
2009-08-14 13:39 . 2009-08-14 13:39--------d-----w-c:\program files\TomTom HOME 2
2009-08-14 13:37 . 2009-08-14 13:37--------d-----w-c:\program files\TomTom DesktopSuite
2009-08-05 09:01 . 2004-08-11 22:00204800----a-w-c:\windows\system32\mswebdvd.dll
2009-08-03 19:07 . 2009-08-03 19:07403816----a-w-c:\windows\system32\OGACheckControl.dll
2009-08-03 19:07 . 2009-08-03 19:07322928----a-w-c:\windows\system32\OGAAddin.dll
2009-07-17 19:01 . 2004-08-11 22:0058880----a-w-c:\windows\system32\atl.dll
2009-07-14 03:43 . 2004-08-11 22:00286208----a-w-c:\windows\system32\wmpdxm.dll
2009-01-19 14:36 . 2009-01-19 14:361898----a-w-c:\program files\Daily Planner Plus 6.2.lnk
2006-09-10 16:36 . 2006-09-10 16:3656--sh--r-c:\windows\system32\177D90C9E0.sys
2007-11-25 17:37 . 2006-07-30 16:4788--sh--r-c:\windows\system32\77830626E5.sys
2009-04-13 16:33 . 2006-07-30 16:474496--sha-w-c:\windows\system32\KGyGaAvL.sys
.

((((((((((((((((((((((((((((( [emailprotected]_18.27.14 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-10-11 22:55 . 2009-10-11 22:5516384 c:\windows\Temp\Perflib_Perfdata_c4c.dat
+ 2009-10-11 22:55 . 2009-10-11 22:5516384 c:\windows\Temp\Perflib_Perfdata_25c.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\VirtualExpanderFile.1]
@="{E4000AC4-5E5F-4956-807A-C5854405D64F}"
[HKEY_CLASSES_ROOT\CLSID\{E4000AC4-5E5F-4956-807A-C5854405D64F}]
2008-01-03 21:4673728----a-w-c:\windows\system32\VirtualExpander\VEShellExt.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ModemOnHold"="c:\program files\NetWaiting\netWaiting.exe" [2003-09-10 20480]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-05-27 68856]
"DellSupport"="c:\program files\DellSupport\DSAgnt.exe" [2007-03-15 460784]
"DellSupportCenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2008-08-13 206064]
"TomTomHOME.exe"="c:\program files\TomTom HOME 2\TomTomHOMERunner.exe" [2009-08-07 247144]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"SetDefaultMIDI"="MIDIDef.exe" - c:\windows\MIDIDEF.EXE [2004-12-22 24576]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Dell QuickSet"="c:\program files\Dell\QuickSet\quickset.exe" [2006-04-06 1032192]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-03-08 761947]
"CTSysVol"="c:\program files\Creative\SBAudigy\Surround Mixer\CTSysVol.exe" [2005-10-31 57344]
"UpdReg"="c:\windows\UpdReg.EXE" [2000-05-11 90112]
"VoiceCenter"="c:\program files\Creative\VoiceCenter\AndreaVC.exe" [2006-01-02 1126400]
"DVDLauncher"="c:\program files\CyberLink\PowerDVD\DVDLauncher.exe" [2005-12-10 49152]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [2006-10-18 802816]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [2006-10-18 696320]
"dscactivate"="c:\program files\Dell Support Center\gs_agent\custom\dsca.exe" [2007-11-15 16384]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-10-11 39792]
"SSBkgdUpdate"="c:\program files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-01-30 30248]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-01-30 46632]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-02-01 255528]
"BrMfcWnd"="c:\program files\Brother\Brmfcmon\BrMfcWnd.exe" [2007-03-23 663552]
"ControlCenter3"="c:\program files\Brother\ControlCenter3\brctrcen.exe" [2007-01-26 65536]
"RoxWatchTray"="c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxWatchTray10.exe" [2007-08-24 240112]
"DMXLauncher"="c:\program files\Roxio\CinePlayer\DMXLauncher.exe" [2007-08-14 113136]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [2005-05-31 122941]
"DellSupportCenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2008-08-13 206064]
"MSKDetectorExe"="c:\program files\McAfee\SpamKiller\MSKDetct.exe" [2006-11-07 1121280]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-01-15 185872]
"Google Quick Search Box"="c:\program files\Google\Quick Search Box\GoogleQuickSearchBox.exe" [2009-07-23 122368]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-09-05 417792]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-09-24 149280]
"avast!"="c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2009-09-15 81000]
"AppleSyncNotifier"="c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe" [2009-08-13 177440]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-09-21 305440]
"SigmatelSysTrayApp"="stsystra.exe" - c:\windows\stsystra.exe [2006-03-24 282624]
"MBMon"="CTMBHA.DLL" - c:\windows\system32\CTMBHA.DLL [2006-03-03 1355938]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2006-6-30 24576]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecuteREG_MULTI_SZ autocheck autochk /k:C *

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Brother\\Brmfl07a\\FAXRX.exe"=
"c:\\WINDOWS\\system32\\fxsclnt.exe"=
"c:\\Program Files\\Roxio\\Video Convert 10\\VideoConvert10.exe"=
"c:\\Program Files\\Roxio\\Digital Home 10\\RoxioUPnPRenderer10.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"54925:UDP"= 54925:UDP:Brother Network Scanner

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [9/26/2009 11:40 AM 114768]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [9/26/2009 11:40 AM 20560]
R2 IntuitUpdateService;Intuit Update Service;c:\program files\Common Files\Intuit\Update Service\IntuitUpdateService.exe [10/10/2008 6:45 AM 13088]
R2 TomTomHOMEService;TomTomHOMEService;c:\program files\TomTom HOME 2\TomTomHOMEService.exe [8/7/2009 10:31 AM 92008]
S0 TfFsMon;TfFsMon;c:\windows\system32\drivers\TfFsMon.sys --> c:\windows\system32\drivers\TfFsMon.sys [?]
S0 TfSysMon;TfSysMon;c:\windows\system32\drivers\TfSysMon.sys --> c:\windows\system32\drivers\TfSysMon.sys [?]
S1 SASKUTIL;SASKUTIL;\??\c:\program files\SUPERAntiSpyware\SASKUTIL.sys --> c:\program files\SUPERAntiSpyware\SASKUTIL.sys [?]
S2 Roxio Upnp Server 10;Roxio Upnp Server 10;c:\program files\Roxio\Digital Home 10\RoxioUpnpService10.exe [8/24/2007 4:53 PM 362992]
S2 RoxLiveShare10;LiveShare P2P Server 10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxLiveShare10.exe [8/24/2007 4:52 PM 309744]
S2 RoxWatch10;Roxio Hard Drive Watcher 10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxWatch10.exe [8/24/2007 4:52 PM 166384]
S3 pctplsg;pctplsg;\??\c:\windows\system32\drivers\pctplsg.sys --> c:\windows\system32\drivers\pctplsg.sys [?]
S3 Roxio UPnP Renderer 10;Roxio UPnP Renderer 10;c:\program files\Roxio\Digital Home 10\RoxioUPnPRenderer10.exe [8/24/2007 4:53 PM 72176]
S3 RoxMediaDB10;RoxMediaDB10;c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\RoxMediaDB10.exe [8/24/2007 4:52 PM 1083888]
S3 TfNetMon;TfNetMon;\??\c:\windows\system32\drivers\TfNetMon.sys --> c:\windows\system32\drivers\TfNetMon.sys [?]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
Contents of the 'Scheduled Tasks' folder

2009-08-16 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 16:34]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.att.net/
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
mSearch BAR = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
Trusted Zone: turbotax.com
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-10-11 18:55
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(884)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(3104)
c:\windows\system32\WININET.dll
c:\windows\system32\VirtualExpander\VEShellExt.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\ati2evxx.exe
c:\program files\Intel\Wireless\Bin\EvtEng.exe
c:\windows\system32\ati2evxx.exe
c:\program files\Intel\Wireless\Bin\S24EvMon.exe
c:\program files\Intel\Wireless\Bin\WLKEEPER.exe
c:\program files\Alwil Software\Avast4\aswUpdSv.exe
c:\program files\Alwil Software\Avast4\ashServ.exe
c:\windows\system32\rundll32.exe
c:\docume~1\Randy\LOCALS~1\temp\clclean.0001
c:\program files\Brother\ControlCenter3\BrccMCtl.exe
c:\program files\Brother\Brmfcmon\BrMfimon.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Common Files\Creative Labs Shared\Service\CreativeLicensing.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Intel\Wireless\Bin\RegSrvc.exe
c:\program files\Dell Support Center\bin\sprtsvc.exe
c:\program files\Alwil Software\Avast4\ashMaiSv.exe
c:\program files\Alwil Software\Avast4\ashWebSv.exe
c:\program files\Intel\Wireless\Bin\Dot1XCfg.exe
c:\program files\Common Files\Roxio Shared\10.0\SharedCOM\CPSHelpRunner10.exe
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2009-10-11 19:00 - machine was rebooted
ComboFix-quarantined-files.txt 2009-10-11 23:00
ComboFix2.txt 2009-10-11 18:31

Pre-Run: 23,064,145,920 bytes free
Post-Run: 23,044,698,112 bytes free

326--- E O F ---2009-09-22 02:17
Looking good. Lets clean up a little and run a quick scan to see what's left, if anything.

Go ahead and delete any of the special tools and files we downloaded to your desktop. Everything but ComboFix.

* Click START then RUN - Vista users PRESS the Windows Key and the R keys for the Run box.
* Now type Combofix /u in the runbox
* Make sure there's a space between Combofix and /u
* Then hit Enter

* The above procedure will:
* Delete the following:
* ComboFix and its associated files and folders.
* Reset the clock settings.
* Hide file extensions, if required.
* Hide System/Hidden files, if required.
* Set a new, clean Restore Point.

----------

Clean out your temporary internet files and temp files.

Download TFC by OldTimer to your desktop.

Double-click TFC.exe to run it.

Note: If you are running on Vista, right-click on the file and choose Run As Administrator

TFC will close all programs when run, so make sure you have saved all your work before you begin.

* Click the Start button to begin the cleaning process.
* Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
* Please let TFC run uninterrupted until it is finished.

Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.

----------

If you already have Malwarebytes be sure to update it before running the scan!

Download Malwarebytes' Anti-Malware (MBAM)

Alternate MBAM download link

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to the following:

* Update Malwarebytes' Anti-Malware
* Launch Malwarebytes' Anti-Malware

* Then click Finish
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
* The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
* Copy and Paste the entire report in your next reply.

Extra Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.


Also let me know how the computer is running now.

,Well evilfantasy according to this scan looks like you hard work has paid off, but I'll let you tell me...Thank you so much for your dedication in helping folks like me...The MalwareBytes log:

Malwarebytes' Anti-Malware 1.41
Database version: 2944
Windows 5.1.2600 Service Pack 3

10/11/2009 8:14:43 PM
mbam-log-2009-10-11 (20-14-43).txt

Scan type: Quick Scan
Objects scanned: 112363
Time elapsed: 5 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)
Yes it looks good.

How is the computer running now?It's running great...thanks so much for your help...I commend you for your tireless efforts...Thank you!!! Do you recommend any specific AV software...I had been running AT&T's until recently when this problem happened...Thanks again...Your welcome. Glad we got it. I've only helped remove that infection once before now and it shows in my instructions. Oh well, next time I know what to and not to do.

Avast is one of the best there is. I always recommend it or Avira Antivir.

You also might go ahead and run the Kaspersky scan again to see if everything is indeed gone. Malwarebytes and ComboFix aren't virus scanners, they're only antimalware scanners.

Here are some other suggestions. Let me know if you have any questions.

USE the Secunia Software Inspector to check for out of date software.

  • Click Start Now
  • Check the box next to Enable thorough system inspection.
  • Click Start
  • Allow the scan to finish and scroll down to see if any updates are needed.
  • Update anything listed.
.
----------

Go to Microsoft Windows Update and get all critical updates.

----------

I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

SpywareBlaster - Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. GUIDE: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

Also see Slow Computer? It May Not Be Malware for free cleaning/maintenance tools to help keep your computer running smooth.

I ran Kaspersky Online again and my pc came up clean...what a relief...Again thank you for your help evilfantasy...Sounds good.

safe surfing...
1737.

Solve : Windows XP Home Edition help me!!?

Answer»

My desktop has started to do the following:

When I turn on the power button it will boot up and when it gets to the user password it turns off the computer.
If I unplug the computer and LEAVE it unplugged for awhile then restart it, it will boot up and work until I TRY to run the antivirus PROGRAM (both AVG and Onelivecare safety scan) the program starts to run then turns off. (turns off means instantly, without a normal shut down) If I turn on the system it will reboot but turn off as soon as I get to the user password again. and again and again

I have checked all the connections, cleaned out the tower and removed all the dust, replaced the internal battery but don't know how to get an antivirus program to run.

Any ideas as to the problem? Try booting to safe mode and running the av from there - can you do that?My F keys won't respond, I can't get to the safe mode boot screen. I can get into setup screen by pressing the delete keyIs there an "F-Lock" key on the keyboard? If so, use it to toggle the F-keys and then try again. Otherwise you'll need to try a DIFFERENT keyboard. If you still can't get to safe mode, use msconfig's boot.ini tab and the /safeboot OPTION.

1738.

Solve : Serious malware infection - "your system is infected!"- No internet or safe mode?

Answer»

Don't transfer any files....you said in reply#2 that AVG detected Virut.....you will infect another PC if you're not careful.

Sorry Dave ... had to throw in the heads up.Thanks for the heads up karnac, completely forgot that i could infect the pc again!

edit:

However from what i remember only the windows SYSTEM files where infected by virut. What i am saying is, if i transfer only my data for example my documents/photos/movies/Application e.t.c from which none was infected will that be a problem? Or is it better to not take the risk and just wait for guidance in order to disinfect the pc completely before doing anything?Quote from: Sander on October 26, 2009, 08:20:40 PM

better to not take the risk and just wait for guidance
By the way i just found out that the blue screen contains this : STOP 0x00000024

Doesnt that sound like a corrupted ntfs disk? I am not sure but from experience whenever someone had an error like that it had to do with the ntfs.sys files or with a corrupted ntfs disk.

However i dont get anything about ntfs.sys but i do get a zqbuetaxgkdt5.sys file?Hi any updates on my case?Hi again guys.

I searched around and found a backup i made that contains some of my data, or the ones i really need so i decided to go ahead and reformat and have a clean installation of windows xp. I dont have any more time to waste trying to get this fixed. I know that with just a bit more patience i could fix a part of the problem with your guidance but i cant do it anymore. Most of the times a pc got infected with any kind of virus/malware/spyware e.t.c i could have it up and running in less than a day even if the infection was persistent. This is something else!

Anyway THANK you so much for your advice and guidance, thank you karnac, thank you harry and thank you SD fro replying and trying to help me with this issue i really appreciate it and will come back in the future if anything happens.

C ya!Back again! So soon!

I just want to ask you guys, i know everyone has a different opinion on these kind of questions but just to have an idea, i am really considering on buying Antivirus Software for my new Installation. Which one would you advice me to choose?

I used to have free Antivirus but from what i heard everyone is happy with Bit Defender products. Is it TRUE? Should i just stick to the free ones for the moment? Thanks!Hello Sander. Sorry for the delay. I did some research about your stop error and found this link: http://cc.bingj.com/cache.aspx?q=stop+0x00000024&d=4772632121901875&mkt=en-CA&setlang=en-US&w=e360615c,d35fd91a
I was going to suggest that you try to start your computer with your OS Cd and do a repair. It's too bad that you LOST your data. Hi SD!

I did try to everything from my OS cd and from other cd's but nothing seemed to work. I tried recovery console, system restore e.t.c. Anyway, everything happens for a reason, this tought me to not surf around without any protection at all and download suspicious files!.Sander,

I have to bring this to your attention in case it's overlooked.

You had Virut on your pc.

Read Evilfantasys' comments on this infection here

Be certain to follow his instructions regarding banking and passwords.


Sander. Some information to use after you re-format.

Use the Secunia Software Inspector to check for out of date software.

•Click Start Now

•Check the box next to Enable thorough system inspection.

•Click Start

•Allow the scan to finish and scroll down to see if any updates are needed.
•Update anything listed.
.
----------

Go to Microsoft Windows Update and get all critical updates.

----------

I suggest using WOT - WEB of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

Hi,

Thank you for your advice.

By the way is it a sure thing that virut might stole any of my credentials? cause i have so many passwords for so many sites. Where does it get it from? Cookies? saved passwords for web sites? Arent they ciphered-encrypted?

I will change as many as i can however just for a precaution but is it really that bad?

Thanks!Hi Sander. You don't have to buy any Anti-Virus programs if you don't want to. There are some free AV's that are just as GOOD or better than the paid versions. Here are links for some of them.

Avast Home Edition

AVG Free Edition

AntiVir Personal

Microsoft Security Essentials

This last one by MS if relatively new and has some good reviews. I use Avast but I installed MSE on my laptop and it appears to be working wellcc
1739.

Solve : Need help with Web email sending spam to my contacts?

Answer»

Here's what's going on with my laptop:

My Web email is sending bogus emails to my contacts. I can see some of these emails in the Sent folder of my Web email, but not in my OUTLOOK Sent folder.

I use Norton 360, always keep it up to date. Since the email spam began, I've run several different spyware and malware programs and my computer comes up clean.

I don't access my email at public spots, only at home.

I've tried working with my email provider (AT&T) on this problem, but the technicians haven't been able to help and suggested I contacted Yahoo for help, which I know is a dead-end street.

Here are some oddities that no ONE at AT&T can explain (and I don't know if they have anything to do with the spam coming from my email). AT&T and Yahoo ask users to create a sign-in seal as a way to verify that you're on a legit site when you want to check your Web mail. My sign-in seals always disappear from one day to the next. Also, in my settings for my AT&T Webmail, there's an email address there that I didn't enter and that I can't change or delete. The AT&T tech told me it's Yahoo's Hong KONG office; HOWEVER, several months AGO, I received spam from the same address.

I'd really like to find a way to stop the spam and would greatly appreciate any help. Thanks --- Chris

P.S. I have a Lenovo ThinkPad with Vista Home Premium.

1740.

Solve : HOW DO I UPGRADE BIOS?

Answer»

Thanks for viewing and my regards to your effort in reply.
How do i upgrade my BIOS.The booting devices not detecting by bios and thats why i wanted to uphrade itAdemil4vic,
Welcome back. But you still have not told what OS you have and how old your is your COMPUTER. If the computer was made in the last three years, it will not need a BIOS update.aa
To find out what version of BID you have, you can run a utility program that will TELL you.

You can Google for a ANSWER to your question. But first, you want to be sure that it is the right thing to do.

1741.

Solve : Vista security 2012 virus?

Answer»

Ok. Let's try this one.

Please download the Sophos Anti-Rootkit Scanner and save it to your desktop.

You will need to enter your name, e-mail address and location in order to access the download page.

  • Once you have downloaded the file, double click the sarsfx icon
  • Review the licence agreement and click on the Accept button
  • The scanner will prompt you to extract the files to C:\SOPHTEMP - DO NOT change this location, simply click the Install button

  • Once the files have been extracted; using Windows Explorer, navigate to C:\SOPHTEMP and double click on the blue shield icon called sargui
  • Ensure that there are checkmarks next to Running processes, Windows registry and Local hard drives, then click Start scan
  • Allow the program to scan your computer - please be patient as it may take some time
  • Once the scan has completed a window will pop-up with the results of the scan - click OK to this
  • In the main window, you will see each of the entries found by the scan (if any)
    • If the scanner generated any warning messages, please click on each warning and copy and paste the text of it into this thread for me to review
    • Once you have posted any warning messages here, you can close the scanner and wait for me to get back to you
  • If you have not had any warnings, any entries which can be cleaned up by the scanner will have a box with a green checkmark in it next to the entry
  • To clean up these entries click on the Clean up checked items button
  • If you accidentally check a file NOT recommended for clean up, you will get a warning message and if necessary can re-select the entries you want to clean up
  • Once you have cleaned the selected files, you will be prompted to re-boot your computer - please do so
  • When you have re-booted,and tell me how your computer is running now
I don't think I got any warning messages there are 4 files but each one says it is removable but clean up is not recommended. They are all from a copy of a game that was given to me so if that is the problem I have no problems uninstalling it from my computer.

While this scan was running AVG popped up twice and said it found a few things and asked if I wanted to quarentine them or leave them be. I didn't think to write down the names of the files at the time but I just let them be since that scan was running. I'd like to scan your machine with ESET OnlineScan

•Hold down Control and click on the following link to open ESET OnlineScan in a new window.
ESET OnlineScan
•Click the button.
•For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the icon on your desktop.
•Check
•Click the button.
•Accept any security warnings from your browser.
•Check
•Push the Start button.
•ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
•When the scan completes, push
•Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
•Push the button.
•Push
A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt
tried running this and it gets stuck in the Initialization process. I just stops and says "can not get update. Is proxy configured?"Ok. Please try this one.

Run the BitDefender Online scanner

Agree to the license and then select Scan. DO NOT CHANGE THE OPTIONS TO SHOW ALL FILES SCANNED. That will make your logs huge and we don't need to see clean files.

Once Bitdefender completes the scan:
Click-on the Detected Problems tab.
Then select Click here to export the scan report.

When the window comes up to save the report, change the Save as type: box to:
Text (Tab Delimited) (*.txt) and then in the File name box enter change to bdscan then click Save.

This will save a file named bdscan.txt. I would suggest saving it to the Desktop so you can easily find it. (take notice of where you save it so you can find it later).
This bdcan.txt file will actually contain HTML code that we can easily view later while reviewing your log. All we have to do is rename the file to bdscan.html.

If you do not follow these step, you will have an incorrect log or worse a log summary which is useless to us.

Post the bdscan.txt file as an Attachment.
Okay I clicked that link and I ran the quick scan however the instructions you gave me don't quite match what I saw. I never saw an option to to show all files scanned. After it ran it said it found 1 infected file. However I see no Detected Problems tab and I clicked on the link that said "Found 1 infected file" and it gave me the following log. So I don't know if this helps but that's all I got.


QuickScan Beta 32-bit v0.9.9.99
-------------------------------
Scan date: Thu Aug 25 18:45:14 2011
Machine ID: C8CD3BCA



Found 1 infected file!
----------------------

C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe --> Gen:Variant.Kates.2
--> HKLM\Software\Microsoft\Windows\CurrentVersion\Run\"SunJavaUpdateSched"



Processes
---------
AVG Internet Security 4360 C:\Program Files (x86)\AVG\AVG10\avgtray.exe
AVG Internet Security 1396 C:\Program Files (x86)\AVG\AVG10\avgwdsvc.exe
AVG Internet Security 3516 C:\Program Files (x86)\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSAgent.exe
AVGIDSMonitor.exe 4844 C:\Program Files (x86)\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSMonitor.exe
Bluetooth Stack for Windows by Toshiba 4880 C:\Program Files (x86)\Toshiba\Bluetooth Toshiba Stack\ItSecMng.exe
ConfigFree 1256 C:\Program Files (x86)\Toshiba\ConfigFree\CFProcSRVC.exe
ConfigFree(TM) 1852 C:\Program Files (x86)\Toshiba\ConfigFree\CFSvcs.exe
ConfigFree(TM) 3016 C:\Program Files (x86)\Toshiba\ConfigFree\CFSwMgr.exe
ConfigFree(TM) Tray 5076 C:\Program Files (x86)\Toshiba\ConfigFree\NDSTray.exe
CyberLink MediaLibray Service 4276 C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\CLML\CLMLSvc.exe
CyberLink PowerCinema 4252 C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\PCMAgent.exe
Dropbox 4556 C:\Users\Amber\AppData\Roaming\Dropbox\bin\Dropbox.exe
En-us 4504 C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe
Flash® Player Installer/Uninstaller 4780 C:\Windows\SysWOW64\Macromed\Flash\FlashUtil10t_ActiveX.exe
KeNotify Application 4136 C:\Program Files (x86)\Toshiba\Utilities\KeNotify.exe
Microsoft Search Enhancement Pack 2312 C:\Program Files (x86)\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
Microsoft® Windows® Operating SYSTEM 3956 C:\Windows\SysWOW64\PING.EXE
NVIDIA Update Components 5540 C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe
OpenOffice.org 3.3 5060 C:\Program Files (x86)\OpenOffice.org 3\program\soffice.bin
OpenOffice.org 3.3 4612 C:\Program Files (x86)\OpenOffice.org 3\program\soffice.exe
pinger.exe 2220 C:\Toshiba\IVP\ISM\pinger.exe
RAID Event Monitor 4240 C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAAnotif.exe
RAID Monitor 2932 C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAANTmon.exe
Spybot - Search & Destroy 3024 C:\Program Files (x86)\Spybot - Search & Destroy\SDWinSec.exe
Stereo Vision Control Panel API Server 744 C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe
swupdtmr.exe 2416 C:\Toshiba\IVP\swupdate\swupdtmr.exe
TeaTimer.exe 4532 C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
TOSHIBA DVD Player 2452 C:\Program Files (x86)\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe
Ulead Systems ULCDRSvr 2608 C:\Program Files (x86)\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
Windows® Internet Explorer 4012 C:\Program Files (x86)\Internet Explorer\iexplore.exe
Windows® Internet Explorer 3776 C:\Program Files (x86)\Internet Explorer\iexplore.exe
Windows® Internet Explorer 5068 C:\Program Files (x86)\Internet Explorer\iexplore.exe
Windows® Internet Explorer 1712 C:\Program Files (x86)\Internet Explorer\iexplore.exe
Windows® Internet Explorer 5668 C:\Program Files (x86)\Internet Explorer\iexplore.exe


Network activity
----------------
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.17.26
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.17.26
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 64.215.172.244
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 64.215.172.244
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 96.17.70.66
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.239.163
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.239.163
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.5.232
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.5.232
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.5.233
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.5.233
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 74.125.224.91
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 74.125.224.91
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 64.215.172.244
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 65.55.87.11
Process iexplore.exe (1712) connected on port 80 (HTTP) --> 69.72.169.241
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.17.26
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.17.26
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 64.215.172.244
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 64.215.172.244
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.87.131
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.239.163
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 96.17.70.11
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.239.163
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.239.163
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.239.163
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 64.215.172.237
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.232
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.232
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.232
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.233
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.233
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.5.233
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.87.59
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.87.140
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 74.125.224.91
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 74.125.224.91
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 74.125.224.155
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 74.125.224.155
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.87.130
Process iexplore.exe (3776) connected on port 80 (HTTP) --> 65.55.87.140
Process Dropbox.exe (4556) connected on port 80 (HTTP) --> 199.47.216.144
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.127.95
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.127.95
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.35
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.86.64.162
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.6.95.139
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 184.28.64.124
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 184.28.64.124
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.139
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.139
Process iexplore.exe (5068) connected on port 443 (HTTP over SSL) --> 74.125.53.96
Process iexplore.exe (5068) connected on port 443 (HTTP over SSL) --> 74.125.224.159
Process iexplore.exe (5068) connected on port 443 (HTTP over SSL) --> 74.125.224.159
Process iexplore.exe (5068) connected on port 443 (HTTP over SSL) --> 74.125.224.141
Process iexplore.exe (5068) connected on port 443 (HTTP over SSL) --> 74.125.224.141
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.136
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.53.96
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.153
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.153
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 69.171.228.39
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 69.171.228.39
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.19
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.19
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 96.17.70.19
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 66.132.220.193
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 199.68.156.31
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 199.68.156.83
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.114
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.114
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.114
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.114
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.114
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.127
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 216.137.35.127
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.36
Process iexplore.exe (5068) connected on port 80 (HTTP) --> 74.125.224.36

Process Dropbox.exe (4556) listens on ports: 17500


Autoruns and critical files
---------------------------
HWSetup C:\Program Files\TOSHIBA\Utilities\HWSetup.exe
AVG Internet Security C:\Program Files (x86)\AVG\AVG10\avgtray.exe
Bluetooth Stack for Windows by Toshiba C:\Program Files (x86)\Toshiba\Bluetooth Toshiba Stack\ItSecMng.exe
Chicony traybar C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe
CyberLink MediaLibray Service C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\CLML\CLMLSvc.exe
CyberLink PowerCinema C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\PCMAgent.exe
Dropbox C:\Users\Amber\AppData\Roaming\Dropbox\bin\Dropbox.exe
En-us C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe
jusched.exe C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
KeNotify Application C:\Program Files (x86)\Toshiba\Utilities\KeNotify.exe
Microsoft® Windows® Operating System c:\windows\system32\browseui.dll
Microsoft® Windows® Operating System C:\Windows\system32\Mystify.scr
quickstart.exe C:\Program Files (x86)\OpenOffice.org 3\program\quickstart.exe
SVPWUTIL Application C:\Program Files (x86)\TOSHIBA\Utilities\SVPWUTIL.exe
TeaTimer.exe C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
Windows Live Messenger C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe
Windows® Internet Explorer c:\windows\syswow64\webcheck.dll
(verified) Microsoft® Windows® Operating System c:\windows\system32\userinit.exe


Browser plugins
---------------
AcroIEHelper Library C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
AVG Internet Security c:\program files (x86)\avg\avg10\avgssie.dll
Bing Bar c:\program files (x86)\msn toolbar\platform\6.3.2322.0\npwinext.dll
BitDefender QuickScan C:\Windows\Downloaded Program Files\qsax.dll
Conduit Toolbar c:\program files (x86)\conduitengine\conduitengine.dll
Conduit Toolbar c:\program files (x86)\utorrentbar\tbutor.dll
Java(TM) Platform SE 6 U26 C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
Java(TM) Platform SE 6 U26 C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll
Microsoft Search Enhancement Pack c:\program files (x86)\microsoft\search enhancement pack\search helper\sepsearchhelperie.dll
Microsoft® CoReXT C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
NVIDIA 3D Vision C:\Program Files (x86)\NVIDIA Corporation\3D Vision\npnv3dv.dll
NVIDIA 3D VISION C:\Program Files (x86)\NVIDIA Corporation\3D Vision\npnv3dvstreaming.dll
SDHelper.dll C:\Program Files (x86)\Spybot - Search & Destroy\SDHelper.dll
Silverlight Plug-In c:\Program Files (x86)\Microsoft Silverlight\4.0.60531.0\npctrl.dll
System REQUIREMENTS Lab C:\Windows\Downloaded Program Files\sysreqlab_nvd.dll
Windows Live Messenger Companion c:\program files (x86)\windows live\companion\companioncore.dll
Windows Live™ Photo Gallery C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll
Windows Presentation Foundation c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll
Windows® Internet Explorer c:\windows\syswow64\ieframe.dll
(verified) Microsoft® Windows® Operating System C:\Windows\System32\mswsock.dll
(verified) Microsoft® Windows® Operating System C:\Windows\system32\napinsp.dll
(verified) Microsoft® Windows® Operating System C:\Windows\system32\NLAapi.dll
(verified) Microsoft® Windows® Operating System C:\Windows\system32\pnrpnsp.dll
(verified) Microsoft® Windows® Operating System C:\Windows\System32\winrnr.dll


Missing files
-------------
File not found: NDSTray.exe
--> HKLM\Software\Microsoft\Windows\CurrentVersion\Run\"NDSTray.exe"


Scan
----
MD5: de81240bd5476bb8aa2261349ab32ff8 C:\Program Files (x86)\AVG\AVG10\avgamnot.dll
MD5: ac7e2d24a082bea90b3a884647fedff5 C:\Program Files (x86)\AVG\AVG10\avgcfgx.dll
MD5: b01e5e3cfb0ce27cbef9011eb09a0a71 C:\Program Files (x86)\AVG\AVG10\avgcslx.dll
MD5: 8f2e5f841df279c41fa011e8f2e945bc C:\Program Files (x86)\AVG\AVG10\avgidpsdkx.dll
MD5: 199f9addb1c1e633169b9f6cb40d7724 C:\Program Files (x86)\AVG\AVG10\avglngx.dll
MD5: 3fa61ef87e49fface4ed58c4f1a98eb1 C:\Program Files (x86)\AVG\AVG10\avglogx.dll
MD5: e8efbf473a01ddcb363576fb4ccc40f8 C:\Program Files (x86)\AVG\AVG10\avgsched.dll
MD5: 90f4c3d61c6722bb0962962dbc29ad7a C:\Program Files (x86)\AVG\AVG10\avgsrmx.dll
MD5: 4109b81aedeed60102542554f4e69f10 c:\program files (x86)\avg\avg10\avgssie.dll
MD5: 140f771cada8724200434c39918f2ea0 C:\Program Files (x86)\AVG\AVG10\avgtray.exe
MD5: 61b12427ccbf5512e3439664c00d5fcd C:\Program Files (x86)\AVG\AVG10\avguires.dll
MD5: f5d2494cee652b5d0d75ba5a77309b66 C:\Program Files (x86)\AVG\AVG10\avgwd.dll
MD5: fc2bc51120a945f7c70376495e4e7737 C:\Program Files (x86)\AVG\AVG10\avgwdsvc.exe
MD5: 80aec7987f4f315dc8b65fa1a42ff554 C:\Program Files (x86)\AVG\AVG10\avgwdwsc.dll
MD5: 37dff4cee590b6d081efe18fb2c377db C:\Program Files (x86)\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSAgent.exe
MD5: 350a0c2cc411a6b0982604c8893c3e93 C:\Program Files (x86)\AVG\AVG10\Identity Protection\Agent\Bin\AVGIDSMonitor.exe
MD5: c11f6a1f61481e24be3fdc06ea6f7d2a C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
MD5: 25b1e852ff65f5400e2d0c965d01c3bf C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
MD5: 6bf01e200063d7274f3af06d226671f5 C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
MD5: da579734b4375740efee86ffdfed57a7 C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\wlidcli.dll
MD5: 332d341d92b933600d41953b08360dfb C:\Program Files (x86)\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
MD5: d9a0ce26ada5bd15b1b03a752ddf14a6 c:\program files (x86)\conduitengine\conduitengine.dll
MD5: 8755df630f5477ee1a3ccb00d0a3d0cd C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\CLML\CLMediaLibrary.dll
MD5: 166d74046ce5d2b0696a335b8a8633e1 C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\CLML\CLMLSvc.exe
MD5: d6b5c9dc1df4a8140bd2fc4bb26a5031 C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\CLML\CLMLSvcPS.dll
MD5: b1cda377b2c8dcd8fa3db8501647031d C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\Kernel\Common\CLRCEngine3.dll
MD5: 9b271ead0ae5907eabc3a7be072c323e C:\Program Files (x86)\CyberLink\PowerCinema for TOSHIBA\PCMAgent.exe
MD5: 0ecc0901aebcb6b5c5c551c67e4e026a C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAAMon_ENU.dll
MD5: cb686f44bf955ea02520710a56874fa4 C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAANTmon.exe
MD5: 974ee55b9a17d606a783add021aa65ad C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\ISDI.dll
MD5: ac31c3fc0b28f54f4873c5136be525f8 C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\PlugInRAID_ENU.dll
MD5: a1659e4d08fe8d0f0bc61960d8c0369e C:\Program Files (x86)\Internet Explorer\ieproxy.dll
MD5: 7d8e146a863d62c8f88128a30872a18f C:\Program Files (x86)\Internet Explorer\IEShims.dll
MD5: 904e13ba41af2e353a32cf351ca53639 C:\Program Files (x86)\Internet Explorer\iexplore.exe
MD5: e7d55e121ff1951cb86c7e0dc6a33877 C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
MD5: 1040bd9bf3ddab7cda2346f8375480a2 C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll
MD5: 74ca33b3daac6c4f1de9df67ff61b9ec c:\Program Files (x86)\Microsoft Silverlight\4.0.60531.0\agcore.dll
MD5: c3e42cbf8215171a524d123a54ae3233 c:\Program Files (x86)\Microsoft Silverlight\4.0.60531.0\npctrl.dll
MD5: 16a252022535b680046f6e34e136d378 C:\Program Files (x86)\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
MD5: a4ad1aa4c57409480c1d84bbca6becf0 c:\program files (x86)\microsoft\search enhancement pack\search helper\sepsearchhelperie.dll
MD5: da7763dbf7d7679b52a3f1484fbd3fb7 c:\program files (x86)\msn toolbar\platform\6.3.2322.0\npwinext.dll
MD5: cff7b34d91fcc4b05e61a8ebf5987b12 C:\Program Files (x86)\NVIDIA Corporation\3D Vision\npnv3dv.dll
MD5: 7fea176d89ef2063128e6d906c9e1f11 C:\Program Files (x86)\NVIDIA Corporation\3D Vision\npnv3dvstreaming.dll
MD5: 6086b60f2e36d06a063cb07ed0524332 C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe
MD5: e7818cd4fb51284c948d68a7a85a69b8 C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe
MD5: ccf523b951afaa0147f22e2a7aae4976 C:\Program Files (x86)\NXP\FM Radio\OpenLibSysX64.sys
MD5: 9a62bcaa15bf7f2b289cc5a50fbdde49 C:\Program Files (x86)\OpenOffice.org 3\program\basegfxmi.dll
MD5: 4b2f87de85b721ab4051443cf79a926f C:\Program Files (x86)\OpenOffice.org 3\program\comphelp4MSC.dll
MD5: 42ed1f2f4cb5f25ea9aa608429f2e45a C:\Program Files (x86)\OpenOffice.org 3\program\configmgr.uno.dll
MD5: 29467c0949f41a414918e1ebb371bec4 C:\Program Files (x86)\OpenOffice.org 3\program\deploymentmiscmi.dll
MD5: 97a4c67dc092e7edeaf296bc80cdcffb C:\Program Files (x86)\OpenOffice.org 3\program\emsermi.dll
MD5: c0bdeafdb1ceba29dc444ffb08fc4f4a C:\Program Files (x86)\OpenOffice.org 3\program\fwemi.dll
MD5: 7a3371350068d50cd55a55ac7c109b41 C:\Program Files (x86)\OpenOffice.org 3\program\fwimi.dll
MD5: 368ae415c04fc2ea99aa3e43b79319ee C:\Program Files (x86)\OpenOffice.org 3\program\fwkmi.dll
MD5: d62b776209a6fe8a712f2b914bd696e3 C:\Program Files (x86)\OpenOffice.org 3\program\i18nisolang1MSC.dll
MD5: 7147a3ad6f43c75e0737eb8396ce84ed C:\Program Files (x86)\OpenOffice.org 3\program\i18npapermi.dll
MD5: 18d9bc9be65494bcc4b5c274dee681d5 C:\Program Files (x86)\OpenOffice.org 3\program\i18npool.uno.dll
MD5: 33a73277383831bfee37c36cc7d7918a C:\Program Files (x86)\OpenOffice.org 3\program\i18nutilMSC.dll
MD5: 9fd93f8c9e800a01dec03c0f985719bf C:\Program Files (x86)\OpenOffice.org 3\program\icudt40.dll
MD5: 495e820cac608b05a76e14efaab92692 C:\Program Files (x86)\OpenOffice.org 3\program\icuin40.dll
MD5: 5bdeb78f1c8f89e5820ea9df80a30beb C:\Program Files (x86)\OpenOffice.org 3\program\icuuc40.dll
MD5: f85d55d1a0f08c098034899ff812c07a C:\Program Files (x86)\OpenOffice.org 3\program\libdb47.dll
MD5: 59b11c7e3525c7222271e000ab33f694 C:\Program Files (x86)\OpenOffice.org 3\program\libxml2.dll
MD5: 5b7fcc26067bad888870234c7abc74ad C:\Program Files (x86)\OpenOffice.org 3\program\localebe1.uno.dll
MD5: eed8e244d73e86a05562b597d3559208 C:\Program Files (x86)\OpenOffice.org 3\program\oleautobridge.uno.dll
MD5: 6d6df7fdf72e2f47140ddd5e56dbdaf4 C:\Program Files (x86)\OpenOffice.org 3\program\oooimprovementmi.dll
MD5: f7dce54077ee9d8a351c4b1ffa866ee7 C:\Program Files (x86)\OpenOffice.org 3\program\quickstart.exe
MD5: 7c27f5ad651035a99aa84ccf0f6e9b43 C:\Program Files (x86)\OpenOffice.org 3\program\saxmi.dll
MD5: 007402c0a0f353ab297897cf42b8f151 C:\Program Files (x86)\OpenOffice.org 3\program\sbmi.dll
MD5: ac0f6a47f9ad9788f9fc9ff86fe470d3 C:\Program Files (x86)\OpenOffice.org 3\program\sfxmi.dll
MD5: 2337ec951c4af6e1af65d10bd9615beb C:\Program Files (x86)\OpenOffice.org 3\program\soffice.bin
MD5: 11e8d8272fdbe213ade3dad91427ce35 C:\Program Files (x86)\OpenOffice.org 3\program\soffice.exe
MD5: eec33ec9c51e95f2a0b3667513597566 C:\Program Files (x86)\OpenOffice.org 3\program\sofficeapp.dll
MD5: 52d2d656a6c354c63c1d43cb97a84fcd C:\Program Files (x86)\OpenOffice.org 3\program\sotmi.dll
MD5: 45e1212280f611c21b4de033d1d7c420 C:\Program Files (x86)\OpenOffice.org 3\program\svlmi.dll
MD5: 4447f1e6f1552f8162063f60b69ee67a C:\Program Files (x86)\OpenOffice.org 3\program\svtmi.dll
MD5: e29cef43fdaf8598302180174dc61388 C:\Program Files (x86)\OpenOffice.org 3\program\tkmi.dll
MD5: cadebeb36d91229ea468e40704e0607a C:\Program Files (x86)\OpenOffice.org 3\program\tlmi.dll
MD5: e1e6c70b09630486c9b31e265d6bc3e1 C:\Program Files (x86)\OpenOffice.org 3\program\ucb1.dll
MD5: 53d36c9e672280e63331a7db93ff24d3 C:\Program Files (x86)\OpenOffice.org 3\program\ucbhelper4MSC.dll
MD5: a0bf508f0ad56275530778d9655f4013 C:\Program Files (x86)\OpenOffice.org 3\program\ucpfile1.dll
MD5: 381c38d5a96dc48df531f83a6566840c C:\Program Files (x86)\OpenOffice.org 3\program\utlmi.dll
MD5: 008034f50f1cf56ea6b028f9f3f5e8b6 C:\Program Files (x86)\OpenOffice.org 3\program\vclmi.dll
MD5: d9dfc0a179981dd82fa1e575ba4a071d C:\Program Files (x86)\OpenOffice.org 3\program\vos3MSC.dll
MD5: ddb5aff679932c1616305a7292178947 C:\Program Files (x86)\OpenOffice.org 3\program\xcrmi.dll
MD5: 2045e825effe34ce14305f92075f2ffc C:\Program Files (x86)\OpenOffice.org 3\URE\bin\bootstrap.uno.dll
MD5: ead61b24a7183cad672ca911310b0a98 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\cppu3.dll
MD5: 25bd70c53c7da635f58e32ffcb9145b5 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\cppuhelper3MSC.dll
MD5: 9c5c49d3c4dbc3a76bc16ef3825467c8 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\jvmfwk3.dll
MD5: 32b01485db7ad870c49c56135345766e C:\Program Files (x86)\OpenOffice.org 3\URE\bin\msci_uno.dll
MD5: f8f8961b601fa7bafd9578b542299284 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\reg3.dll
MD5: 535a2814b074947101a1d1501d557199 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\sal3.dll
MD5: 4b6e83cd4163bb13fd82146f3f68caeb C:\Program Files (x86)\OpenOffice.org 3\URE\bin\salhelper3MSC.dll
MD5: 75f27f38a18b6c980c89d32450b4e690 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\stlport_vc7145.dll
MD5: 4fe48fc083fd237a632d0b9fb7ae7b5c C:\Program Files (x86)\OpenOffice.org 3\URE\bin\stocservices.uno.dll
MD5: e622be084fab62a57493810f7c8c0378 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\store3.dll
MD5: 1358c3c04f2480b57e536b3aca6d93e2 C:\Program Files (x86)\OpenOffice.org 3\URE\bin\uwinapi.dll
MD5: 390679f7a217a5e73d756276c40ae887 C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
MD5: 3eafdd637416393722aa98e940dfd0a0 C:\Program Files (x86)\TOSHIBA Games\TOSHIBA Game Console\GameConsoleService.exe
MD5: ce0999910d37f61f2314c998f4f9d1d4 C:\Program Files (x86)\Toshiba\Bluetooth Toshiba Stack\ItSecMng.exe
MD5: 4e5a8546709591d31ba086ca2a69cecd C:\Program Files (x86)\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
MD5: 7df1e7b35c39d656850cfe237503f3f7 C:\Program Files (x86)\Toshiba\ConfigFree\CFP2API.dll
MD5: 5ac8a997e8d9c131b5f90b4f3ccfae34 C:\Program Files (x86)\Toshiba\ConfigFree\CFProcSRVC.exe
MD5: d10d01b2dfcd8d2f32a32ed29e8da1c2 C:\Program Files (x86)\Toshiba\ConfigFree\CFSvcs.exe
MD5: 9a815510679c7ecd04ed194a9c9c25e5 C:\Program Files (x86)\Toshiba\ConfigFree\CFSwMgr.exe
MD5: 53835c26153df03322b6378addf070b4 C:\Program Files (x86)\Toshiba\ConfigFree\CFUPNP.dll
MD5: e0d99e3acef09bd225912f977290a0d1 C:\Program Files (x86)\TOSHIBA\ConfigFree\CFWLAPI.dll
MD5: 7e3479c704f208c85954d9e7442533c4 C:\Program Files (x86)\TOSHIBA\ConfigFree\CFWRP_CS.dll
MD5: 386206f09d969f809b76b8e10355f703 C:\Program Files (x86)\TOSHIBA\ConfigFree\CFWRPAR_CS.dll
MD5: f3e8e67dc455012aaad4364cbc3bca0b C:\Program Files (x86)\TOSHIBA\ConfigFree\IpAdrSet.dll
MD5: e114083008a623323c8d9df5550f82d2 C:\Program Files (x86)\TOSHIBA\ConfigFree\NDSAPI.dll
MD5: ab62a8f77c0e2ec8bfdac6bb379b3ecb C:\Program Files (x86)\TOSHIBA\ConfigFree\NDSNLS.dll
MD5: 0172f917a624d08620a8ae94f5950a30 C:\Program Files (x86)\TOSHIBA\ConfigFree\NDSParts.dll
MD5: 6e3fefb74326a230237613f2b035c71f C:\Program Files (x86)\Toshiba\ConfigFree\NDSTray.exe
MD5: 7a3e47a6f167e6b9835a6dc2ca20c9d8 C:\Program Files (x86)\Toshiba\ConfigFree\OpenProp.dll
MD5: fd9515297d79e1ac8965e384467b6f6b C:\Program Files (x86)\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe
MD5: afd400aebcab252c99e60991ff00d9d2 C:\Program Files (x86)\Toshiba\Utilities\KeNotify.exe
MD5: a7e2ff99e82eca03a16f5d31c820f697 C:\Program Files (x86)\TOSHIBA\Utilities\SVPWUTIL.exe
MD5: d9a0ce26ada5bd15b1b03a752ddf14a6 c:\program files (x86)\utorrentbar\tbutor.dll
MD5: 47bdbce3e2d819b17ab9fa4539b9df71 c:\program files (x86)\windows live\companion\companioncore.dll
MD5: 4ce9dac1518ff7e77bd213e6394b9d77 C:\Program Files (x86)\Windows Live\Family Safety\fsssvc.exe
MD5: 6f0dab13529bcb7c0f8a3082a8b1cde9 C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe
MD5: ac421a44de902f2627f1e63793ed89cd C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll
MD5: b1db5edb658f3ff4f13ac069ce622893 C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe
MD5: 7a917120a62bcf2883fdd5c352447556 C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
MD5: 7e47c328fc4768cb8beafbcfafa70362 C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
MD5: 7cd2f2c63693ef90b73f5362a52cae26 C:\Program Files\Intel\WiFi\bin\EvtEng.exe
MD5: 7d9d615201a483d6fa99491c2e655a5a C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE
MD5: 3289766038db2cb14d07dc84392138d5 C:\Program Files\SUPERAntiSpyware\SASDIFSV64.SYS
MD5: 58a38e75f3316a83c23df6173d41f2b5 C:\Program Files\SUPERAntiSpyware\SASKUTIL64.SYS
MD5: e17a81e6ad0e89630a3b0f2ed5cbbdf5 C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe
MD5: 071f0d1f23b82b56939fb036b8f4456f C:\Program Files\TOSHIBA\SmartFaceV\SmartFaceVWatchSrv.exe
MD5: 19d979b9f6373a7cb17ebb7594feb819 C:\Program Files\TOSHIBA\SMARTLogService\TosIPCSrv.exe
MD5: 137149b37e9c9dbde30e4c40867252e4 C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe
MD5: 9a0e769cb3ac06b5ef443cfb6228b137 C:\Program Files\TOSHIBA\Utilities\HWSetup.exe
MD5: 06c8fa1cf39de6a735b54d906ba791c6 C:\Program Files\Windows Live\Mesh\wlcrasvc.exe
MD5: 6dbf2ac2bdaff355995ab25eccc4cfe1 C:\Toshiba\IVP\ISM\pinger.exe
MD5: e1292c1ed4deb17b8a9b586d22cb2061 C:\Toshiba\IVP\swupdate\swupdtmr.exe
MD5: fe36976864a30ea91e14d024f8bf7dd8 C:\Users\Amber\AppData\Roaming\Dropbox\bin\Dropbox.exe
MD5: 0b02d9aa67eea2c5524943b69418512e C:\Users\Amber\AppData\Roaming\Dropbox\bin\PYTHON25.DLL
MD5: 823451876778f382b23afe20ef2ddc20 C:\Windows\Downloaded Program Files\qsax.dll
MD5: 14ce384d2e27b64c256bda4dc39c312d C:\Windows\ehome\ehRecvr.exe
MD5: b93159c1313d66fdfbbe876f5189cd52 C:\Windows\ehome\ehsched.exe
MD5: f5ee2527d74449868e3c3227a59bcd28 C:\Windows\ehome\ehstart.dll
MD5: ce07a466201096f021cd09d631b21540 C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
MD5: 749f5f8cedca70f2a512945325fc489d C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\infocard.exe
MD5: 74751dda198165947fd7454d83f49825 C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\SMSvcHost.exe
MD5: bc5b0be5af3510b0fd8c140ee42c6d3e C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
MD5: ab87eeffd18f2baafc274e7075ea6c67 c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll
MD5: 66328b08ef5a9305d8ede36b93930369 C:\Windows\servicing\TrustedInstaller.exe
MD5: e9b9c1b98c8d6d48407e1c1203eac659 C:\Windows\system32\adsldpc.dll
MD5: da7478ba9e41b60b3d5da456e253002a C:\Windows\system32\audioeng.dll
MD5: 4acf748a8e576761e4c610acab67b1bc C:\Windows\system32\bcrypt.dll
MD5: 74f26fc01b180d4a99a168ed69c30a53 C:\Windows\system32\cmd.exe
MD5: 93e317d7ad783d8eaee2e3500bfe889d C:\Windows\system32\credui.dll
MD5: 3dfeec45e5f22993216083fb777719d5 C:\Windows\system32\d2d1.dll
MD5: 8b02d2ecc7ef6e1f6af08459e3f741f6 C:\Windows\system32\d3d10.dll
MD5: 29e4ea31c6debe5efb384eefa4f1ef63 C:\Windows\system32\d3d10_1.dll
MD5: 556f1cbe9ba19e2ccd6f8d9af71af5c7 C:\Windows\system32\d3d10_1core.dll
MD5: 9c7094f537782a82b6a29b4a7172e180 C:\Windows\system32\d3d10core.dll
MD5: 85e861d0b88db2b54acb0839654c09f7 C:\Windows\system32\DNSAPI.dll
MD5: 9c551a9121639a9779862cb8a6cabf03 C:\Windows\system32\DRIVERS\LPCFilter.sys
MD5: 6843926aff733d46a04f9d4e1c1a6b14 C:\Windows\system32\DWrite.dll
MD5: aaae543c535ed596ecad2ab8761c2c6f C:\Windows\system32\dxgi.dll
MD5: 05b6a5ce1c7767c32df35966107cb1ec C:\Windows\system32\hhctrl.ocx
MD5: d5c9f778d0ed2954eb83e1cf87dc0b65 C:\Windows\system32\IEFRAME.dll
MD5: 417011fac541c62837d29d1c9f834156 C:\Windows\system32\IEUI.dll
MD5: 68563ac389f92ee79f1c714288ba1dce C:\Windows\system32\ImgUtil.dll
MD5: b8fbe5f40b09f5d20e1e5ccfef893d62 C:\Windows\system32\IMM32.DLL
MD5: 7d62fa39463aa90ee0b32401038b26a5 C:\Windows\system32\jsproxy.dll
MD5: ef24642d5fb52a1eef56de9e47cbb993 C:\Windows\system32\MFC42.DLL
MD5: f35a584e947a5b401feb0fe01db4a0d7 C:\Windows\system32\MFC71.DLL
MD5: 56e315acfb08a177b4d01e42b9044db5 C:\Windows\system32\MPRAPI.dll
MD5: 7940c04ce581288a3498d57ec4ee47d2 C:\Windows\system32\msfeeds.dll
MD5: e6d5c7e4aac0c682169aa5021386eff3 C:\Windows\system32\MSHTML.dll
MD5: 35aae2e841aa1a949775168e119482c9 C:\Windows\system32\msls31.dll
MD5: 39ba737ebf8e7da1cd019fe95333fd70 C:\Windows\system32\Mystify.scr
MD5: aabe6452dfff3baa664a33795b2166fc C:\Windows\system32\nvwgf2um.dll
MD5: 862363973dcbcc31dd161ef41a69153c C:\Windows\system32\ODBC32.dll
MD5: 2dd6af8e97f59c9d39329bbc2a81f13f C:\Windows\system32\RASDLG.dll
MD5: ab530fdd34c67b497a20171d1234cfe9 C:\Windows\system32\RICHED32.DLL
MD5: 0a990afb9f2726323d61c8ecb8b70b17 C:\Windows\system32\security.dll
MD5: 167ac31450c0c53a01fa1491e94d7678 C:\Windows\System32\shdocvw.dll
MD5: c7230fbee14437716701c15be02c27b8 C:\Windows\System32\shsvcs.dll
MD5: 2cdef39641bc63a337b6ea13e61b32c6 C:\Windows\system32\TosBdAPI.dll
MD5: c385d4d4ec16e637aa4d2d18a06e80c9 C:\Windows\system32\TosBtAPI.dll
MD5: 88b630f6aeb5a11f6ad064930b38c2c0 C:\Windows\system32\UxTheme.dll
MD5: 83c2f5076e1b4a63c04f2b14ee7cad47 C:\Windows\system32\wbem\wbemdisp.dll
MD5: 2c3b09e586bda2cc49a292be7badc589 C:\Windows\system32\wbem\wmiutils.dll
MD5: 5ec8fb83f31aa2d6f421f02c3f4f4475 C:\Windows\system32\WINSPOOL.DRV
MD5: 28b9dba6201aeddc65c15fa48939804a C:\Windows\system32\wmp.dll
MD5: 9441a231c0aa0712f7cf3b10d9cfcf76 C:\Windows\system32\wmploc.dll
MD5: 1908cc7673f72601affdca022689cedf C:\Windows\system32\xmllite.dll
MD5: 85e861d0b88db2b54acb0839654c09f7 C:\Windows\Syswow64\DNSAPI.dll
MD5: 4312debdacbe338f0b90e7f08e7672be C:\Windows\SysWOW64\Dxtmsft.dll
MD5: ca493a92da9880b6f1a89c3dbd54ba5b C:\Windows\SysWOW64\Dxtrans.dll
MD5: 9a75518600fba10980ee94267ca98489 C:\Windows\SysWOW64\gameux.dll
MD5: 05c8c8767e29163fc251164ff6839ea5 C:\Windows\syswow64\GDI32.dll
MD5: ee9d715af1b928982f417238b9914484 C:\Windows\SysWOW64\ieapfltr.dll
MD5: d5c9f778d0ed2954eb83e1cf87dc0b65 c:\windows\syswow64\ieframe.dll
MD5: ab0e44c70c5c732c1e312eaeabecc1d5 C:\Windows\syswow64\iertutil.dll
MD5: b8fbe5f40b09f5d20e1e5ccfef893d62 C:\Windows\syswow64\IMM32.dll
MD5: 4be78e80530451f5ff970bd109c6df77 C:\Windows\SysWOW64\jscript9.dll
MD5: 7f4caeac24592fa9f574e1f8cd1d0604 C:\Windows\syswow64\kernel32.dll
MD5: df37346ea13082e3e1b423b54014e641 C:\Windows\syswow64\LPK.DLL
MD5: efbef826c183cf8edab324ce514d69b7 C:\Windows\SysWOW64\Macromed\Flash\Flash10t.ocx
MD5: 73d4dea1a876f78feb83862d514bfe63 C:\Windows\SysWOW64\Macromed\Flash\FlashUtil10t_ActiveX.dll
MD5: 0ab420b203bfc541de65cfbd88470d3a C:\Windows\SysWOW64\Macromed\Flash\FlashUtil10t_ActiveX.exe
MD5: 56007cfc52167c26e4a3f899b8d29ccd C:\Windows\SysWOW64\ntdll.dll
MD5: 9586e7cb2255a8b097a7e4538202585e C:\Windows\syswow64\ole32.dll
MD5: de4cd76c254e143f40e62952788d3be7 C:\Windows\syswow64\OLEAUT32.dll
MD5: 0ed8727ea0172860f47258456c06caea C:\Windows\SysWow64\perfhost.exe
MD5: 015e1f472a5633520903353375f7e69d C:\Windows\SysWOW64\PING.EXE
MD5: 0abe67004eb4c162f4456e64f90a11fd C:\Windows\syswow64\RPCRT4.dll
MD5: 2ab58991862153a248779174d4e4212b C:\Windows\SysWOW64\schannel.dll
MD5: 33ae914c24f546aabf281ba7b138186d C:\Windows\syswow64\SHELL32.dll
MD5: 9176285122b7b849fec2aa1b72a8f7a8 C:\Windows\syswow64\SHLWAPI.dll
MD5: d217b0da82fdd942c048749993275ac6 C:\Windows\syswow64\urlmon.dll
MD5: d29fdb5dedbdc1bd882164dc6dc4dd53 C:\Windows\syswow64\USER32.dll
MD5: 80fff14f1757b9af8be9d314fc1ae88b C:\Windows\syswow64\USP10.dll
MD5: 88b630f6aeb5a11f6ad064930b38c2c0 C:\Windows\SysWOW64\UxTheme.dll
MD5: 5193de33f3284c447e0d31dafbf92570 c:\windows\syswow64\webcheck.dll
MD5: 2c7332c222d1fe1fc57d622699a8c001 C:\Windows\syswow64\WININET.dll
MD5: 1d109ed0d660654ea7ff1574558031c4 C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6195_none_d09154e044272b9a\msvcm80.dll
MD5: c9564cf4976e7e96b4052737aa2492b4 C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.6195_none_d09154e044272b9a\MSVCR80.dll
MD5: 1f5afd468eb5e09e9ed75a087529eab5 C:\Windows\WinSxS\x86_microsoft.vc80.mfc_1fc8b3b9a1e18e3b_8.0.50727.6195_none_cbf5e994470a1a8f\MFC80.DLL
MD5: e2c48cd0132d4d1dc7d0df9a6bef686a C:\Windows\WinSxS\x86_microsoft.vc80.mfc_1fc8b3b9a1e18e3b_8.0.50727.6195_none_cbf5e994470a1a8f\MFC80U.DLL
MD5: 28a09777d2d952122567a8a82f1a2c7b C:\Windows\WinSxS\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.6195_none_03ce2c72205943d3\MFC80ENU.DLL
MD5: 4c39358ebdd2ffcd9132a30e1ec31e16 C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\MSVCP90.dll
MD5: cdbe9690cf2b8409facad94fac9479c9 C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\MSVCR90.dll
MD5: ca6ade4f7761bb15b3325356dc3b82bb C:\Windows\WinSxS\x86_microsoft.vc90.mfc_1fc8b3b9a1e18e3b_9.0.30729.6161_none_4bf7e3e2bf9ada4c\mfc90u.dll
MD5: fbfca1a574d47ee575448b719cbbf2e4 C:\Windows\WinSxS\x86_microsoft.vc90.mfcloc_1fc8b3b9a1e18e3b_9.0.30729.6161_none_49768ef57548175e\MFC90ENU.DLL
MD5: 35acd5ea63d75e97dd0e9a1629e582b2 C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.6002.18305_none_88f3a38569c2c436\COMCTL32.dll
MD5: be3c082837866c4c291adaf163c10ea6 C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.6002.18305_none_5cb72f2a088b0ed3\comctl32.dll
MD5: b5b09091b0e33c396ceec8995515bd41 C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll

The following file(s) must be uploaded for server-side scanning:
C:\Program Files (x86)\OpenOffice.org 3\program\svlmi.dll
C:\Program Files (x86)\OpenOffice.org 3\program\fwemi.dll
C:\Program Files (x86)\OpenOffice.org 3\program\deploymentmiscmi.dll
C:\Program Files (x86)\OpenOffice.org 3\program\i18nutilMSC.dll
C:\Program Files (x86)\OpenOffice.org 3\program\ucpfile1.dll
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
C:\Program Files (x86)\OpenOffice.org 3\program\libdb47.dll
C:\Program Files (x86)\OpenOffice.org 3\program\oooimprovementmi.dll
C:\Program Files (x86)\OpenOffice.org 3\URE\bin\cppu3.dll
C:\Program Files (x86)\OpenOffice.org 3\program\basegfxmi.dll
C:\Program Files (x86)\OpenOffice.org 3\program\xcrmi.dll
C:\Program Files (x86)\OpenOffice.org 3\program\vos3MSC.dll
C:\Program Files (x86)\OpenOffice.org 3\URE\bin\store3.dll
C:\Program Files (x86)\OpenOffice.org 3\URE\bin\msci_uno.dll
C:\Program Files (x86)\OpenOffice.org 3\program\oleautobridge.uno.dll
C:\Program Files (x86)\OpenOffice.org 3\program\sotmi.dll
C:\Program Files (x86)\OpenOffice.org 3\program\i18npapermi.dll
C:\Program Files (x86)\OpenOffice.org 3\program\emsermi.dll
C:\Program Files (x86)\OpenOffice.org 3\program\localebe1.uno.dll
C:\Program Files (x86)\OpenOffice.org 3\URE\bin\uwinapi.dll
C:\Program Files (x86)\OpenOffice.org 3\program\icuuc40.dll
C:\Program Files (x86)\OpenOffice.org 3\URE\bin\stlport_vc7145.dll
C:\Program Files (x86)\OpenOffice.org 3\URE\bin\stocservices.uno.dll
C:\Program Files (x86)\OpenOffice.org 3\program\configmgr.uno.dll
C:\Program Files (x86)\OpenOffice.org 3\program\utlmi.dll
C:\Program Files (x86)\OpenOffice.org 3\URE\bin\reg3.dll
C:\Program Files (x86)\OpenOffice.org 3\program\comphelp4MSC.dll
C:\Program Files (x86)\OpenOffice.org 3\program\ucbhelper4MSC.dll
C:\Program Files (x86)\OpenOffice.org 3\program\ucb1.dll
C:\Program Files (x86)\OpenOffice.org 3\URE\bin\salhelper3MSC.dll
C:\Program Files (x86)\OpenOffice.org 3\URE\bin\jvmfwk3.dll
C:\Program Files (x86)\OpenOffice.org 3\URE\bin\cppuhelper3MSC.dll
C:\Program Files (x86)\OpenOffice.org 3\URE\bin\bootstrap.uno.dll
C:\Program Files (x86)\OpenOffice.org 3\program\libxml2.dll
C:\Program Files (x86)\OpenOffice.org 3\program\fwimi.dll
C:\Program Files (x86)\OpenOffice.org 3\program\sofficeapp.dll
C:\Program Files (x86)\OpenOffice.org 3\program\tlmi.dll
C:\Program Files (x86)\OpenOffice.org 3\program\i18nisolang1MSC.dll

Upload started - 35 file(s)
jusched.exe (39428)
salhelper3MSC.dll (13312)
localebe1.uno.dll (24064)
i18nisolang1MSC.dll (26112)
i18npapermi.dll (29184)
msci_uno.dll (51712)
store3.dll (53248)
i18nutilMSC.dll (66560)
oooimprovementmi.dll (83968)
uwinapi.dll (86016)
jvmfwk3.dll (92160)
stocservices.uno.dll (92672)
reg3.dll (92672)
vos3MSC.dll (94208)
deploymentmiscmi.dll (135680)
cppu3.dll (142848)
emsermi.dll (148480)
ucb1.dll (212992)
sotmi.dll (256000)
ucpfile1.dll (257024)
oleautobridge.uno.dll (287232)
fwimi.dll (311296)
ucbhelper4MSC.dll (358912)
sofficeapp.dll (379904)
configmgr.uno.dll (396800)
cppuhelper3MSC.dll (432128)
bootstrap.uno.dll (452608)
tlmi.dll (529408)
xcrmi.dll (531456)
stlport_vc7145.dll (597504)
basegfxmi.dll (700928)
svlmi.dll (777216)
libdb47.dll (832000)
fwemi.dll (869888)
icuuc40.dll (951296)
Upload speed - 113 KB/s
Upload finished - 35 uploaded, 0 failed

Scan finished - communication took 90 sec
Total traffic - 9.95 MB sent, 0.72 KB recvd
Scanned 407 files and modules - 139 seconds

==============================================================================

Quote
however the instructions you gave me don't quite match what I saw
This is an old canned speech that I'm using and the program probably has changed. The main thing is that you got the log. Good job.
Please run this scan for me.
BTW, how's the computer running now?

Run the F-Secure Online Scanner for Viruses, Spyware and Rootkits.

Note: This Scanner is for Internet Explorer Only!

•Click on Online Services and then Online Scanner
•Accept the License Agreement.
•Once the ActiveX installs,Click Full System Scan
•Once the download completes,the scan will begin automatically.
•The scan will take some time to finish,so please be patient.
•When the scan completes, click the Automatic cleaning (recommended) button.

•Click the Show Report button and Copy&Paste the entire report in your next reply.
My computer is running pretty good actually. I've had AVG pop up a few times wanting to quarentine a couple files but it's only been during scans that were running so I have left it alone because I didn't want to interrupt the scan. Other than that I haven't had any more issues in the last few days.


Scanning Report
Friday, August 26, 2011 19:54:32 - 21:17:44
Computer name: AMBER-PC
Scanning type: Scan system for malware, spyware and rootkits
Target: C:\


--------------------------------------------------------------------------------

1 malware found
TrackingCookie.Webtrends (spyware)
System (Disinfected)

--------------------------------------------------------------------------------

Statistics
Scanned:
Files: 120496
System: 5116
Not scanned: 47
Actions:
Disinfected: 1
Renamed: 0
Deleted: 0
Not cleaned: 0
Submitted: 0
Files not scanned:
C:\HIBERFIL.SYS
C:\PAGEFILE.SYS
C:\WINDOWS\SYSTEM32\DRIVERS\SPTD.SYS
C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT
C:\WINDOWS\SYSTEM32\CONFIG\SAM
C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM
C:\WINDOWS\SYSTEM32\CONFIG\SECURITY
C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE
C:\WINDOWS\SYSTEM32\CONFIG\COMPONENTS
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\COMPONENTS
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\DEFAULT
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SAM
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SECURITY
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SOFTWARE
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SYSTEM
C:\WINDOWS\SYSTEM32\CATROOT2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\CATDB
C:\WINDOWS\SYSTEM32\CATROOT2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\CATDB
C:\SYSTEM VOLUME INFORMATION\{1299DB9B-CEB2-11E0-A746-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{1CD89F6F-CF7B-11E0-B7C1-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{20A90029-CC43-11E0-97AF-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{20A90037-CC43-11E0-97AF-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{267F3139-C932-11E0-9F82-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{29387294-CC52-11E0-8230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{29387298-CC52-11E0-8230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{1B83358B-B635-11E0-A230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{490D2353-CDEC-11E0-9BA8-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{490D2360-CDEC-11E0-9BA8-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{5D13C5D8-BB90-11E0-AE43-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{63AE920C-B7F2-11E0-BD42-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{671E6E1B-CB5B-11E0-B6CA-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{671E6E29-CB5B-11E0-B6CA-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{6C834577-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{6C8345B1-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{50D2F3C1-C877-11E0-A002-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{6E9DB58C-B4C6-11E0-B7FB-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{7C68BD1A-C490-11E0-BB21-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{86F24C33-C7B0-11E0-B90F-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{8A6FF7E5-B6E8-11E0-9F7E-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{8E26F00C-BC8F-11E0-8D57-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{6C8345B5-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{A1BE2E39-CB50-11E0-93F5-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{ADC52BA2-B569-11E0-98C1-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{A1BE2E49-CB50-11E0-93F5-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{DBA90858-C3C5-11E0-8FDC-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\PROGRAM FILES (X86)\COMMON FILES\JAVA\JAVA UPDATE\JUSCHED.EXE
C:\BOOT\BCD

--------------------------------------------------------------------------------

Options
Scanning engines:
Scanning options:
Scan defined files: COM EXE SYS OV? BIN SCR DLL SHS HTM HTML HTT VBS JS INF VXD DO? XL? RTF CPL WIZ HTA PP? PWZ P?T MSO PIF . ACM ASP AX CNV CSC DRV INI MDB MPD MPP MPT OBD OBT OCX PCI TLB TSP WBK WBT WPC WSH VWP WML BOO HLP TD0 TT6 MSG ASD JSE VBE WSC CHM EML PRC SHB LNK WSF {* PDF ZL? XML XXX ANI AVB BAT CMD JOB LSP MAP MHT MIF PHP POT SWF WMF NWS TAR
Use advanced heuristics

--------------------------------------------------------------------------------

Copyright © 1998-2009 Product support | Send virus sample to F-Secure
Scanning Report
Friday, August 26, 2011 19:54:32 - 21:17:44
Computer name: AMBER-PC
Scanning type: Scan system for malware, spyware and rootkits
Target: C:\


--------------------------------------------------------------------------------

1 malware found
TrackingCookie.Webtrends (spyware)
System (Disinfected)

--------------------------------------------------------------------------------

Statistics
Scanned:
Files: 120496
System: 5116
Not scanned: 47
Actions:
Disinfected: 1
Renamed: 0
Deleted: 0
Not cleaned: 0
Submitted: 0
Files not scanned:
C:\HIBERFIL.SYS
C:\PAGEFILE.SYS
C:\WINDOWS\SYSTEM32\DRIVERS\SPTD.SYS
C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT
C:\WINDOWS\SYSTEM32\CONFIG\SAM
C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM
C:\WINDOWS\SYSTEM32\CONFIG\SECURITY
C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE
C:\WINDOWS\SYSTEM32\CONFIG\COMPONENTS
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\COMPONENTS
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\DEFAULT
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SAM
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SECURITY
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SOFTWARE
C:\WINDOWS\SYSTEM32\CONFIG\REGBACK\SYSTEM
C:\WINDOWS\SYSTEM32\CATROOT2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\CATDB
C:\WINDOWS\SYSTEM32\CATROOT2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\CATDB
C:\SYSTEM VOLUME INFORMATION\{1299DB9B-CEB2-11E0-A746-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{1CD89F6F-CF7B-11E0-B7C1-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{20A90029-CC43-11E0-97AF-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{20A90037-CC43-11E0-97AF-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{267F3139-C932-11E0-9F82-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{29387294-CC52-11E0-8230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{29387298-CC52-11E0-8230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{1B83358B-B635-11E0-A230-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{490D2353-CDEC-11E0-9BA8-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{490D2360-CDEC-11E0-9BA8-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{5D13C5D8-BB90-11E0-AE43-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{63AE920C-B7F2-11E0-BD42-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{671E6E1B-CB5B-11E0-B6CA-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{671E6E29-CB5B-11E0-B6CA-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{6C834577-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{6C8345B1-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{50D2F3C1-C877-11E0-A002-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{6E9DB58C-B4C6-11E0-B7FB-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{7C68BD1A-C490-11E0-BB21-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{86F24C33-C7B0-11E0-B90F-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{8A6FF7E5-B6E8-11E0-9F7E-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{8E26F00C-BC8F-11E0-8D57-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{6C8345B5-C16E-11E0-9C37-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{A1BE2E39-CB50-11E0-93F5-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{ADC52BA2-B569-11E0-98C1-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{A1BE2E49-CB50-11E0-93F5-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\SYSTEM VOLUME INFORMATION\{DBA90858-C3C5-11E0-8FDC-001EEC3DE1B0}{3808876B-C176-4E48-B7AE-04046E6CC752}
C:\PROGRAM FILES (X86)\COMMON FILES\JAVA\JAVA UPDATE\JUSCHED.EXE
C:\BOOT\BCD

--------------------------------------------------------------------------------

Options
Scanning engines:
Scanning options:
Scan defined files: COM EXE SYS OV? BIN SCR DLL SHS HTM HTML HTT VBS JS INF VXD DO? XL? RTF CPL WIZ HTA PP? PWZ P?T MSO PIF . ACM ASP AX CNV CSC DRV INI MDB MPD MPP MPT OBD OBT OCX PCI TLB TSP WBK WBT WPC WSH VWP WML BOO HLP TD0 TT6 MSG ASD JSE VBE WSC CHM EML PRC SHB LNK WSF {* PDF ZL? XML XXX ANI AVB BAT CMD JOB LSP MAP MHT MIF PHP POT SWF WMF NWS TAR
Use advanced heuristics
That looks good. We can do some cleanup.

Update Your Java (JRE)

Old versions of Java have vulnerabilities that malware can use to infect your system.

First Verify your Java Version

If there are any other version(s) installed then update now.

Get the new version (if needed)

If your version is out of date install the newest version of the Sun Java Runtime Environment.

Note: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

Be sure to close ALL open web browsers before starting the installation.

Remove any old versions

1. Download JavaRa and unzip the file to your Desktop.
2. Open JavaRA.exe and choose Remove Older Versions
3. Once complete exit JavaRA.

Additional Note: The Java Quick STARTER (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and reboot your computer.
***************************************************

To uninstall ComboFix

  • Click the Start button. Click Run. For Vista: type in Run in the Start search, and click on Run in the results pane.
  • In the field, type in ComboFix /uninstall


(Note: Make sure there's a space between the word ComboFix and the forward-slash.)

  • Then, press Enter, or click OK.
  • This will uninstall ComboFix, delete its folders and files, hides System files and folders, and resets System Restore.
****************************************************
To remove the tools we used and the files and folders they created do the following:
Double click OTL.exe.
  • Click the CleanUp button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes.
Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
****************************************************
Clean out your temporary internet files and temp files.

Download TFC by OldTimer to your desktop.

Double-click TFC.exe to run it.

Note: If you are running on Vista, right-click on the file and choose Run As Administrator

TFC will close all programs when run, so make sure you have saved all your work before you begin.

* Click the Start button to begin the cleaning process.
* Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
* Please let TFC run uninterrupted until it is finished.

Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
*********************************************************
Looking over your log it seems you don't have any evidence of a third party firewall.

Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors.

Remember only install ONE firewall

1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one)
2) Online Armor
3) Agnitum Outpost
4) PC Tools Firewall Plus

If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
******************************************************
Use the Secunia Software Inspector to check for out of date software.

•Click Start Now

•Check the box next to Enable thorough system inspection.

•Click Start

•Allow the scan to finish and scroll down to see if any updates are needed.
•Update anything listed.
.
----------

Go to Microsoft Windows Update and get all critical updates.

----------

I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
Safe Surfing!
Got through all that without any problems.

Thanks for all your help! Quote from: Elyse_2301 on August 28, 2011, 08:53:27 PM
Got through all that without any problems.

Thanks for all your help!
You're welcome. I will lock this thread. If you need it re-opened, please send me a pm.
1742.

Solve : What does everyone recommend for an AV??

Answer» QUOTE from: boragivinay on August 29, 2011, 10:02:11 AM
But your copy of windows must be genuine not an PIRATED one. It RUNS an genuine validation test before installing and doesnt install if the genuine check fails.

That is what he said.
1743.

Solve : Why do I get "redirected" when doing searches??

Answer»

Also, when I go to Comodo and hit browse, then put the file name in, it says it doesn't exist. I'm not sure where to find it using the browse command, I went through some of the documents on my computer, but didn't see it? Not sure if I'm doing that option correctly.Quote

when I go to Comodo and hit browse, then put the file name in, it says it doesn't exist
If you use the Browse method, you need to show Comodo where to find the file. EX. You need to click on the C drive, click System32 and then click on the atl32.dll file.

I'd like to scan your machine with ESET OnlineScan

•Hold down Control and click on the following link to open ESET OnlineScan in a new window.
ESET OnlineScan
•Click the button.
•For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the icon on your desktop.
•Check
•Click the button.
•Accept any security warnings from your BROWSER.
•Check
•Push the Start button.
•ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
•When the scan completes, push
•Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
•Push the button.
•Push
A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt
Okay, when I held down the control button and clicked on the link you gave me, an error page popped up everytime, but it said I could click a link to go back to the eset home page. Did that, found the online scanner green button as in your instructions, clicked it, tried to right click it to get it to go...nothing. Now what?There MUST be some problems with ESET. Please try this one.

Run the BitDefender Online scanner

Agree to the license and then select Scan. DO NOT CHANGE THE OPTIONS TO SHOW ALL FILES SCANNED. That will MAKE your logs huge and we don't need to see clean files.

Once Bitdefender completes the scan:
Click-on the Detected Problems tab.
Then select Click here to export the scan report.

When the window comes up to save the report, change the Save as type: box to:
Text (Tab DELIMITED) (*.txt) and then in the File name box enter change to bdscan then click Save.

This will save a file named bdscan.txt. I would suggest saving it to the Desktop so you can easily find it. (take notice of where you save it so you can find it later).
This bdcan.txt file will actually contain HTML code that we can easily view later while reviewing your log. All we have to do is rename the file to bdscan.html.

If you do not follow these step, you will have an incorrect log or worse a log summary which is useless to us.

Post the bdscan.txt file as an Attachment.
Good lord, this is getting extremely frustrating!! That didn't work either! Got to the page to start the scan, and get this message:

Loading Bitdefender QuickScan...
Notice the browser confirmation message above and accept the plug-in installation by clicking the bar above. From the contextual menu please choose 'Install ActiveX control...' and you will be prompted to install the application. To be able to use Bitdefender QuickScan please click 'Install'..
* using default browser settings

except there is no bar or anything to accept ActiveX. Nothing happens, just sits there. Tried it 3 times. Quote from: mcummings36 on August 21, 2011, 08:16:30 PM
Good lord, this is getting extremely frustrating!! That didn't work either! Got to the page to start the scan, and get this message:

Loading Bitdefender QuickScan...
Notice the browser confirmation message above and accept the plug-in installation by clicking the bar above. From the contextual menu please choose 'Install ActiveX control...' and you will be prompted to install the application. To be able to use Bitdefender QuickScan please click 'Install'..
* using default browser settings

except there is no bar or anything to accept ActiveX. Nothing happens, just sits there. Tried it 3 times.
I tried it with IE and FireFox and they both worked well. What browser are you using? You don't get that yellow band across the top of your browser window telling you to allow ActiveX?I am using Internet Explorer 8 (I think, I don't know how to find out which version of IE it is) Just tried it again, did the same thing, nothingQuote from: mcummings36 on August 23, 2011, 05:12:07 PM
I am using Internet Explorer 8 (I think, I don't know how to find out which version of IE it is) Just tried it again, did the same thing, nothing
Are you receiving the warning at the top of your browser that you will need to allow ActiveX to your browser?
1744.

Solve : WIndow update error will not work - error message 80070422?

Answer»

Hello, I have a Compaq Presario C500 Laptop with VISTA Home EDITION installed (Intel Celeron M CPU 1.86 GHz/1.50 GB Ram/Vista SP 2. I've had my Windows update set to automatically download and install any updates. However I've recently had this error message occur that states "Errors found - Code 80070422. Windows update encountered an unknown error." I've tried the "Get Help With This Error" link but it's very confusing. I've also RUN my antivirus (MICROSOFT security essentials)/Superantispyware/Malwarebytes to make sure I don't have any VIRUS' and haven't found anything. Can somebody help me? Thanks.
P.S. User Mulreay said I should repost in this area. Hi, hope this link helps.

According to Microsoft:
Quote

While your computer might not be infected with a virus, it is recommended that you follow steps to scan for viruses, and then turn the services on.
1745.

Solve : Random pictures appearing on my desktop??

Answer» Your computer has keygens, which is a form of software piracy. What is so bad about Cracks, Hacks, Pirated software, warez, or Keygens?

Most popular cracks or keygens I see, are for Adobe CS3, a lot of different games, Nero, Kaspersky ANTIVIRUS, and much more. All of these cracks and keygens have what is called "cloaked malware," which is a form of spyware or viruses or trojans that hide themselves inside the keygen or crack files. Most hacks for games that come in the form of a program or installer, will also be infected. It is the opportunity for attackers to present a seemingly safe situation where the opportunity to steal something is in play, while the malware infects your system in the process. YES, it will install what you were looking for, but also allow malware to potentially take control of your computer.

Lastly, it is illegal. I will counsel you that we do not report such incidents. However, it is not good practice to pirate software.

**********************************************
We can do some cleanup.

To uninstall ComboFix

  • Click the Start button. Click Run. For Vista: type in Run in the Start search, and click on Run in the results pane.
  • In the field, type in ComboFix /uninstall


(Note: Make sure there's a space between the word ComboFix and the forward-slash.)

  • Then, press Enter, or click OK.
  • This will uninstall ComboFix, delete its folders and files, hides System files and folders, and resets System Restore.
**********************************************
To remove all of the tools we used and the files and folders they created do the following:
Double click OTL.exe.
  • Click the CleanUp button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes.
Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
************************************************
Clean out your temporary internet files and temp files.

Download TFC by OldTimer to your desktop.

Double-click TFC.exe to run it.

Note: If you are running on Vista, right-click on the file and choose Run As Administrator

TFC will close all programs when run, so make sure you have saved all your work before you begin.

* Click the Start button to begin the CLEANING process.
* Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
* Please let TFC run uninterrupted until it is finished.

Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
****************************************************
Looking over your log it seems you don't have any evidence of a third party firewall.

Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors.

Remember only install ONE firewall

1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one)
2) Online Armor
3) Agnitum Outpost
4) PC Tools Firewall Plus

If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
*****************************************************
Use the Secunia Software Inspector to check for out of date software.

•Click Start Now

•Check the box next to Enable thorough system inspection.

•Click Start

•Allow the scan to finish and scroll down to see if any updates are needed.
•Update anything LISTED.
.
----------

Go to Microsoft Windows Update and get all critical updates.

----------

I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
Safe Surfing!
Hmm I usually like to test a game or a program before buying it. If its illigal - OK, I wont do it.
So.. I'd like to thank you Dave, for helping me. I dont know what I wouldve done without you. You are a really good guy, I cant believe you used so much of your time on helping a total stranger
I hope I dont have anymore problems with malware, I will try to be more careful with what I am downloading You're welcome. I will lock this thread. If you need it re-opened, please send me a pm.
1746.

Solve : Ugh! IE problem or virus or...??

Answer»

Quote

Any suggestions? And out of curiosity, how are things looking, based on all the logs I have posted? Have we made some headway or not so much? Thanks again for all this help you have been giving me. This is SEEMING to drag on and must be at least a bit frustrating for you.
Sorry. I was not aware that you couldn't connect to the net. What happens when you try to open a BROWSER? Please try this to start analyzing that problem.

Please run Notepad (start > All Programs > Accessories >
Notepad) and copy and paste the text in the code box into a new file:

Code: [Select]@echo off
>Log1.txt (
ipconfig /all
nslookup google.com
nslookup yahoo.com
ping -n 2 google.com
ping -n 2 yahoo.com
route print
)
start Log1.txt
del %0

•Go to the File MENU at the top of the Notepad and select Save as.

•Select save in: desktop

•Fill in File name: test.bat

•Save as TYPE: All file TYPES (*.*)

•Click save.

•Close the Notepad.

•Locate and double-click test.bat on the desktop.

•A notepad opens, copy and paste the content it (log1.txt) to your reply.
1747.

Solve : deep rooted virus?

Answer»

Hi, i a new here so hopefully ive posted in the right place, please can you help me i cant get on certain websites it says web site is blocked by filter, its a black screen with the words across the middle, i have tried everything i can think of to rectify it but with no luck at all, even a FULL system recovery with the discs i made when i 1st purchased my PC, ive scanned my computer, done malaware scan but it isnt picking anything up, it started on friday i left my pc to go make food and when i came back it wouldnt work, facebook will allow me on if i put in https:// first, but then it changes from secure to unsecure, but when i go to play games which only needs HTTP:// im blocked, and last night the same happened to youtube so im blocked on that too now, my operating system is vista, my computer is acer aspire ag 3760 can you please help me am at my wits END now, please advise me on what to do next, many thanks julie
just to say i have solved the problem, it is my internet provider thats doing it got a technician coming to sort it x

1748.

Solve : just when things were looking up.....?

Answer» OK. Let's try to see what's going on.

Download BlueScreenView to your desktop.
BlueScreenView
unzip downloaded file and double click on BlueScreenView.exe to run the program.
when scanning is done, go to EDIT - Select All
Go to FILE - SAVE Selected Items, and save the report as BSOD.txt
Open BSOD.txt in Notepad, copy all of the content, and paste it into your next reply
p File : Mini072711-01.dmp
Crash Time : 7/26/2011 11:47:05 PM
Bug Check String :
Bug Check Code : 0x00000117
Parameter 1 : 0x84f05008
Parameter 2 : 0x8b610190
Parameter 3 : 0x00000000
Parameter 4 : 0x00000000
Caused By Driver : igdkmd32.sys
Caused By Address : igdkmd32.sys+6190
File Description : Intel Graphics Kernel Mode Driver
Product Name : Intel Graphics Accelerator Drivers for WINDOWS Vista(R)
Company : Intel Corporation
File Version : 7.14.10.1147
Processor : 32-bit
Crash Address : dxgkrnl.sys+7c265
Stack Address 1 : dxgkrnl.sys+7cb46
Stack Address 2 : dxgkrnl.sys+776f7
Stack Address 3 : dxgkrnl.sys+7cd1a
COMPUTER Name :
Full Path : C:\Windows\Minidump\Mini072711-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 174,061
==================================================

==================================================
Dump File : Mini032411-01.dmp
Crash Time : 3/24/2011 7:50:52 PM
Bug Check String :
Bug Check Code : 0x00000116
Parameter 1 : 0x84340008
Parameter 2 : 0x8a615190
Parameter 3 : 0x00000000
Parameter 4 : 0x00000002
Caused By Driver : igdkmd32.sys
Caused By Address : igdkmd32.sys+6190
File Description : Intel Graphics Kernel Mode Driver
Product Name : Intel Graphics Accelerator Drivers for Windows Vista(R)
Company : Intel Corporation
File Version : 7.14.10.1147
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : dxgkrnl.sys+7bf71
Stack Address 2 : dxgkrnl.sys+7cc61
Stack Address 3 : dxgkrnl.sys+1938f
Computer Name :
Full Path : C:\Windows\Minidump\Mini032411-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 168,904
==================================================

==================================================
Dump File : Mini032311-01.dmp
Crash Time : 3/23/2011 6:11:34 PM
Bug Check String :
Bug Check Code : 0x00000116
Parameter 1 : 0x84a6f510
Parameter 2 : 0x8a60d190
Parameter 3 : 0x00000000
Parameter 4 : 0x00000002
Caused By Driver : igdkmd32.sys
Caused By Address : igdkmd32.sys+6190
File Description : Intel Graphics Kernel Mode Driver
Product Name : Intel Graphics Accelerator Drivers for Windows Vista(R)
Company : Intel Corporation
File Version : 7.14.10.1147
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : dxgkrnl.sys+7bf71
Stack Address 2 : dxgkrnl.sys+7cc61
Stack Address 3 : dxgkrnl.sys+1938f
Computer Name :
Full Path : C:\Windows\Minidump\Mini032311-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 168,904
==================================================

==================================================
Dump File : Mini031911-01.dmp
Crash Time : 3/19/2011 10:21:53 AM
Bug Check String :
Bug Check Code : 0x00000119
Parameter 1 : 0x00000001
Parameter 2 : 0x00000000
Parameter 3 : 0x00000004
Parameter 4 : 0x00000004
Caused By Driver : watchdog.sys
Caused By Address : watchdog.sys+1230
File Description : Watchdog Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : watchdog.sys+1230
Stack Address 2 : dxgkrnl.sys+50b0
Stack Address 3 : dxgkrnl.sys+138f
Computer Name :
Full Path : C:\Windows\Minidump\Mini031911-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,640
==================================================

==================================================
Dump File : Mini031811-01.dmp
Crash Time : 3/18/2011 5:39:11 PM
Bug Check String : KERNEL_MODE_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x1000008e
Parameter 1 : 0xc0000005
Parameter 2 : 0x00000000
Parameter 3 : 0xbd1c18dd
Parameter 4 : 0x00000000
Caused By Driver :
Caused By Address :
File Description :
Product Name :
Company :
File Version :
Processor : 32-bit
Crash Address :
Stack Address 1 :
Stack Address 2 :
Stack Address 3 :
Computer Name :
Full Path : C:\Windows\Minidump\Mini031811-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,632
==================================================

==================================================
Dump File : Mini021811-01.dmp
Crash Time : 2/18/2011 6:38:31 PM
Bug Check String :
Bug Check Code : 0x00000119
Parameter 1 : 0x00000001
Parameter 2 : 0x000000c7
Parameter 3 : 0x00000000
Parameter 4 : 0x00000000
Caused By Driver : watchdog.sys
Caused By Address : watchdog.sys+1230
File Description : Watchdog Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : watchdog.sys+1230
Stack Address 2 : dxgkrnl.sys+50b0
Stack Address 3 : dxgkrnl.sys+138f
Computer Name :
Full Path : C:\Windows\Minidump\Mini021811-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,632
==================================================

==================================================
Dump File : Mini021311-01.dmp
Crash Time : 2/13/2011 2:58:45 PM
Bug Check String :
Bug Check Code : 0x00000116
Parameter 1 : 0x84d9a008
Parameter 2 : 0x8a211190
Parameter 3 : 0x00000000
Parameter 4 : 0x00000002
Caused By Driver : igdkmd32.sys
Caused By Address : igdkmd32.sys+6190
File Description : Intel Graphics Kernel Mode Driver
Product Name : Intel Graphics Accelerator Drivers for Windows Vista(R)
Company : Intel Corporation
File Version : 7.14.10.1147
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : dxgkrnl.sys+7bf71
Stack Address 2 : dxgkrnl.sys+7cc61
Stack Address 3 : dxgkrnl.sys+1938f
Computer Name :
Full Path : C:\Windows\Minidump\Mini021311-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 168,912
==================================================

==================================================
Dump File : Mini021111-01.dmp
Crash Time : 2/11/2011 5:21:58 PM
Bug Check String :
Bug Check Code : 0x00000119
Parameter 1 : 0x00000001
Parameter 2 : 0x00002900
Parameter 3 : 0x0000297f
Parameter 4 : 0x0000297f
Caused By Driver : watchdog.sys
Caused By Address : watchdog.sys+1230
File Description : Watchdog Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : watchdog.sys+1230
Stack Address 2 : dxgkrnl.sys+50b0
Stack Address 3 : dxgkrnl.sys+12fe
Computer Name :
Full Path : C:\Windows\Minidump\Mini021111-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,656
==================================================

==================================================
Dump File : Mini010211-01.dmp
Crash Time : 1/2/2011 3:47:32 PM
Bug Check String :
Bug Check Code : 0x00000119
Parameter 1 : 0x00000001
Parameter 2 : 0x00000008
Parameter 3 : 0x00000004
Parameter 4 : 0x00000004
Caused By Driver : watchdog.sys
Caused By Address : watchdog.sys+1230
File Description : Watchdog Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : watchdog.sys+1230
Stack Address 2 : dxgkrnl.sys+50b0
Stack Address 3 : dxgkrnl.sys+138f
Computer Name :
Full Path : C:\Windows\Minidump\Mini010211-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,592
==================================================

==================================================
Dump File : Mini121410-01.dmp
Crash Time : 12/14/2010 11:29:33 AM
Bug Check String : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code : 0x0000000a
Parameter 1 : 0x00070034
Parameter 2 : 0x00000002
Parameter 3 : 0x00000001
Parameter 4 : 0x82222fe9
Caused By Driver : hal.dll
Caused By Address : hal.dll+3fe9
File Description : Hardware Abstraction Layer DLL
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+4dfd9
Stack Address 1 : hal.dll+3fe9
Stack Address 2 : ntkrnlpa.exe+ab693
Stack Address 3 : Ntfs.sys+9bb44
Computer Name :
Full Path : C:\Windows\Minidump\Mini121410-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,656
==================================================

==================================================
Dump File : Mini120710-01.dmp
Crash Time : 12/7/2010 1:56:12 PM
Bug Check String : MEMORY_MANAGEMENT
Bug Check Code : 0x0000001a
Parameter 1 : 0x00041790
Parameter 2 : 0xc08027be
Parameter 3 : 0x0000ffff
Parameter 4 : 0x00000000
Caused By Driver : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+b680c
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18209 (vistasp2_gdr.100218-0019)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+b680c
Stack Address 1 : ntkrnlpa.exe+84a73
Stack Address 2 : ntkrnlpa.exe+83fc5
Stack Address 3 : ntkrnlpa.exe+2100ad
Computer Name :
Full Path : C:\Windows\Minidump\Mini120710-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,648
==================================================

==================================================
Dump File : Mini100910-02.dmp
Crash Time : 10/9/2010 12:42:31 PM
Bug Check String : DRIVER_IRQL_NOT_LESS_OR_EQUAL
Bug Check Code : 0x000000d1
Parameter 1 : 0x00000004
Parameter 2 : 0x00000002
Parameter 3 : 0x00000000
Parameter 4 : 0x8b98e0b7
Caused By Driver : usbuhci.sys
Caused By Address : usbuhci.sys+40b7
File Description : UHCI USB Miniport Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6001.18000 (longhorn_rtm.080118-1840)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+4dfd9
Stack Address 1 : usbuhci.sys+40b7
Stack Address 2 : usbuhci.sys+482e
Stack Address 3 : usbuhci.sys+1c34
Computer Name :
Full Path : C:\Windows\Minidump\Mini100910-02.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,872
==================================================

==================================================
Dump File : Mini100910-01.dmp
Crash Time : 10/9/2010 12:51:25 AM
Bug Check String : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code : 0x0000000a
Parameter 1 : 0x1187c28b
Parameter 2 : 0x00000002
Parameter 3 : 0x00000001
Parameter 4 : 0x822eab69
Caused By Driver : hal.dll
Caused By Address : hal.dll+4061
File Description : Hardware Abstraction Layer DLL
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+4dfd9
Stack Address 1 : ntkrnlpa.exe+a6b69
Stack Address 2 : tcpip.sys+103ac
Stack Address 3 : tcpip.sys+106f9
Computer Name :
Full Path : C:\Windows\Minidump\Mini100910-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 137,568
==================================================

==================================================
Dump File : Mini081310-01.dmp
Crash Time : 8/13/2010 5:09:40 AM
Bug Check String :
Bug Check Code : 0x00000119
Parameter 1 : 0x00000001
Parameter 2 : 0x000004c0
Parameter 3 : 0x0000046e
Parameter 4 : 0x0000046e
Caused By Driver : watchdog.sys
Caused By Address : watchdog.sys+1230
File Description : Watchdog Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : watchdog.sys+1230
Stack Address 2 : dxgkrnl.sys+50b0
Stack Address 3 : dxgkrnl.sys+138f
Computer Name :
Full Path : C:\Windows\Minidump\Mini081310-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,872
==================================================

==================================================
Dump File : Mini072610-01.dmp
Crash Time : 7/26/2010 11:38:47 AM
Bug Check String : DRIVER_IRQL_NOT_LESS_OR_EQUAL
Bug Check Code : 0x000000d1
Parameter 1 : 0x00000006
Parameter 2 : 0x00000002
Parameter 3 : 0x00000000
Parameter 4 : 0x8b7af5f5
Caused By Driver : USBSTOR.SYS
Caused By Address : USBSTOR.SYS+25f5
File Description : USB Mass STORAGE Class Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+4dfd9
Stack Address 1 : USBSTOR.SYS+25f5
Stack Address 2 : USBSTOR.SYS+2dea
Stack Address 3 : USBSTOR.SYS+447f
Computer Name :
Full Path : C:\Windows\Minidump\Mini072610-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 181,456
==================================================

==================================================
Dump File : Mini072510-01.dmp
Crash Time : 7/25/2010 8:46:07 PM
Bug Check String : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x1000007e
Parameter 1 : 0xc0000005
Parameter 2 : 0x8b5ab154
Parameter 3 : 0x88805adc
Parameter 4 : 0x888057d8
Caused By Driver : usbccgp.sys
Caused By Address : usbccgp.sys+13154
File Description : USB Common Class GENERIC Parent Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6001.18000 (longhorn_rtm.080118-1840)
Processor : 32-bit
Crash Address : usbccgp.sys+13154
Stack Address 1 : usbccgp.sys+1f94
Stack Address 2 : usbccgp.sys+13e2
Stack Address 3 : usbccgp.sys+1675
Computer Name :
Full Path : C:\Windows\Minidump\Mini072510-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,872
==================================================

==================================================
Dump File : Mini072310-02.dmp
Crash Time : 7/23/2010 10:50:01 AM
Bug Check String :
Bug Check Code : 0x00000119
Parameter 1 : 0x00000001
Parameter 2 : 0x00000040
Parameter 3 : 0x00000000
Parameter 4 : 0x00000000
Caused By Driver : watchdog.sys
Caused By Address : watchdog.sys+1230
File Description : Watchdog Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : watchdog.sys+1230
Stack Address 2 : dxgkrnl.sys+50b0
Stack Address 3 : dxgkrnl.sys+138f
Computer Name :
Full Path : C:\Windows\Minidump\Mini072310-02.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,872
==================================================

==================================================
Dump File : Mini072310-01.dmp
Crash Time : 7/23/2010 10:44:33 AM
Bug Check String : BUGCODE_USB_DRIVER
Bug Check Code : 0x000000fe
Parameter 1 : 0x00000006
Parameter 2 : 0x8caef303
Parameter 3 : 0x66725045
Parameter 4 : 0x00000000
Caused By Driver : USBPORT.SYS
Caused By Address : USBPORT.SYS+1025
File Description : USB 1.1 & 2.0 Port Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : USBPORT.SYS+1025
Stack Address 2 : USBPORT.SYS+3272
Stack Address 3 : USBPORT.SYS+cd80
Computer Name :
Full Path : C:\Windows\Minidump\Mini072310-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 139,064
==================================================

==================================================
Dump File : Mini072110-01.dmp
Crash Time : 7/21/2010 11:22:43 AM
Bug Check String : DRIVER_IRQL_NOT_LESS_OR_EQUAL
Bug Check Code : 0x000000d1
Parameter 1 : 0x00000006
Parameter 2 : 0x00000002
Parameter 3 : 0x00000000
Parameter 4 : 0x8b39f5f5
Caused By Driver : USBSTOR.SYS
Caused By Address : USBSTOR.SYS+25f5
File Description : USB Mass Storage Class Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+4dfd9
Stack Address 1 : USBSTOR.SYS+25f5
Stack Address 2 : USBSTOR.SYS+2dea
Stack Address 3 : USBSTOR.SYS+447f
Computer Name :
Full Path : C:\Windows\Minidump\Mini072110-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 181,456
==================================================

==================================================
Dump File : Mini071010-01.dmp
Crash Time : 7/10/2010 7:19:07 PM
Bug Check String :
Bug Check Code : 0x00000116
Parameter 1 : 0x85cd0510
Parameter 2 : 0x8a61aba0
Parameter 3 : 0x00000000
Parameter 4 : 0x0000000d
Caused By Driver : igdkmd32.sys
Caused By Address : igdkmd32.sys+cba0
File Description : Intel Graphics Kernel Mode Driver
Product Name : Intel Graphics Accelerator Drivers for Windows Vista(R)
Company : Intel Corporation
File Version : 7.14.10.1147
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : dxgkrnl.sys+7bf71
Stack Address 2 : dxgkrnl.sys+7cc61
Stack Address 3 : dxgkrnl.sys+1938f
Computer Name :
Full Path : C:\Windows\Minidump\Mini071010-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 159,872
==================================================

==================================================
Dump File : Mini070510-01.dmp
Crash Time : 7/5/2010 10:59:02 AM
Bug Check String :
Bug Check Code : 0x00000119
Parameter 1 : 0x00000001
Parameter 2 : 0x00000301
Parameter 3 : 0x0000031e
Parameter 4 : 0x0000031d
Caused By Driver : watchdog.sys
Caused By Address : watchdog.sys+1230
File Description : Watchdog Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : watchdog.sys+1230
Stack Address 2 : dxgkrnl.sys+50b0
Stack Address 3 : dxgkrnl.sys+13a8
Computer Name :
Full Path : C:\Windows\Minidump\Mini070510-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,872
==================================================

==================================================
Dump File : Mini070110-01.dmp
Crash Time : 7/1/2010 7:16:08 PM
Bug Check String : CRITICAL_OBJECT_TERMINATION
Bug Check Code : 0x000000f4
Parameter 1 : 0x00000003
Parameter 2 : 0x9088ed90
Parameter 3 : 0x9088eedc
Parameter 4 : 0x82434710
Caused By Driver : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+cdb8d
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18209 (vistasp2_gdr.100218-0019)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : ntkrnlpa.exe+29270c
Stack Address 2 : ntkrnlpa.exe+1f0fbd
Stack Address 3 : ntkrnlpa.exe+1f0f64
Computer Name :
Full Path : C:\Windows\Minidump\Mini070110-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,872
==================================================

==================================================
Dump File : Mini063010-01.dmp
Crash Time : 6/30/2010 10:58:40 AM
Bug Check String :
Bug Check Code : 0x00000119
Parameter 1 : 0x00000001
Parameter 2 : 0x00000000
Parameter 3 : 0x00000001
Parameter 4 : 0x00000001
Caused By Driver : watchdog.sys
Caused By Address : watchdog.sys+1230
File Description : Watchdog Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : watchdog.sys+1230
Stack Address 2 : dxgkrnl.sys+50b0
Stack Address 3 : dxgkrnl.sys+138f
Computer Name :
Full Path : C:\Windows\Minidump\Mini063010-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,872
==================================================

==================================================
Dump File : Mini062610-01.dmp
Crash Time : 6/26/2010 3:26:48 PM
Bug Check String :
Bug Check Code : 0x00000119
Parameter 1 : 0x00000001
Parameter 2 : 0x00002201
Parameter 3 : 0x00002207
Parameter 4 : 0x00002206
Caused By Driver : watchdog.sys
Caused By Address : watchdog.sys+1230
File Description : Watchdog Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : watchdog.sys+1230
Stack Address 2 : dxgkrnl.sys+50b0
Stack Address 3 : dxgkrnl.sys+12fe
Computer Name :
Full Path : C:\Windows\Minidump\Mini062610-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,872
==================================================

==================================================
Dump File : Mini060910-01.dmp
Crash Time : 6/9/2010 6:05:19 PM
Bug Check String :
Bug Check Code : 0x00000119
Parameter 1 : 0x00000001
Parameter 2 : 0x000009cb
Parameter 3 : 0x000009f7
Parameter 4 : 0x000009f6
Caused By Driver : watchdog.sys
Caused By Address : watchdog.sys+1230
File Description : Watchdog Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : watchdog.sys+1230
Stack Address 2 : dxgkrnl.sys+50b0
Stack Address 3 : dxgkrnl.sys+12fe
Computer Name :
Full Path : C:\Windows\Minidump\Mini060910-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,928
==================================================

==================================================
Dump File : Mini060810-01.dmp
Crash Time : 6/8/2010 12:42:47 PM
Bug Check String :
Bug Check Code : 0x00000119
Parameter 1 : 0x00000001
Parameter 2 : 0x00000a54
Parameter 3 : 0x00000a0a
Parameter 4 : 0x00000a09
Caused By Driver : watchdog.sys
Caused By Address : watchdog.sys+1230
File Description : Watchdog Driver
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+cdb8d
Stack Address 1 : watchdog.sys+1230
Stack Address 2 : dxgkrnl.sys+50b0
Stack Address 3 : dxgkrnl.sys+13a8
Computer Name :
Full Path : C:\Windows\Minidump\Mini060810-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,928
==================================================

==================================================
Dump File : Mini041210-02.dmp
Crash Time : 4/12/2010 11:26:26 AM
Bug Check String : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code : 0x0000000a
Parameter 1 : 0x00000000
Parameter 2 : 0x0000001b
Parameter 3 : 0x00000001
Parameter 4 : 0x822b96e5
Caused By Driver : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+4dfd9
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18209 (vistasp2_gdr.100218-0019)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+4dfd9
Stack Address 1 : ntkrnlpa.exe+a76e5
Stack Address 2 : ntkrnlpa.exe+a769b
Stack Address 3 : ntkrnlpa.exe+b10d8
Computer Name :
Full Path : C:\Windows\Minidump\Mini041210-02.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,928
==================================================

==================================================
Dump File : Mini041210-01.dmp
Crash Time : 4/12/2010 11:21:28 AM
Bug Check String : IRQL_NOT_LESS_OR_EQUAL
Bug Check Code : 0x0000000a
Parameter 1 : 0x00000000
Parameter 2 : 0x00000002
Parameter 3 : 0x00000001
Parameter 4 : 0x822ced28
Caused By Driver : hal.dll
Caused By Address : hal.dll+770c
File Description : Hardware Abstraction Layer DLL
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+4dfd9
Stack Address 1 : ntkrnlpa.exe+b6d28
Stack Address 2 : ntkrnlpa.exe+84a73
Stack Address 3 : ntkrnlpa.exe+83fc5
Computer Name :
Full Path : C:\Windows\Minidump\Mini041210-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 142,880
==================================================

==================================================
Dump File : Mini100409-01.dmp
Crash Time : 10/4/2009 5:23:56 PM
Bug Check String : UNEXPECTED_KERNEL_MODE_TRAP
Bug Check Code : 0x0000007f
Parameter 1 : 0x0000000d
Parameter 2 : 0x00000000
Parameter 3 : 0x00000000
Parameter 4 : 0x00000000
Caused By Driver : nsiproxy.sys
Caused By Address : nsiproxy.sys+319c
File Description : NSI Proxy
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6001.18000 (longhorn_rtm.080118-1840)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+5b497
Stack Address 1 : nsiproxy.sys+319c
Stack Address 2 : nsiproxy.sys+2ea8
Stack Address 3 : nsiproxy.sys+2f91
Computer Name :
Full Path : C:\Windows\Minidump\Mini100409-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6001
Dump File Size : 142,976
==================================================

==================================================
Dump File : Mini111208-01.dmp
Crash Time : 11/12/2008 7:42:09 PM
Bug Check String : PAGE_FAULT_IN_NONPAGED_AREA
Bug Check Code : 0x00000050
Parameter 1 : 0xfcf88ce8
Parameter 2 : 0x00000000
Parameter 3 : 0x8cd90936
Parameter 4 : 0x00000000
Caused By Driver : hal.dll
Caused By Address : hal.dll+75b0
File Description : Hardware Abstraction Layer DLL
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+a50f5
Stack Address 1 : ntkrnlpa.exe+5ab54
Stack Address 2 : win32k.sys+120936
Stack Address 3 : win32k.sys+1209dc
Computer Name :
Full Path : C:\Windows\Minidump\Mini111208-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6001
Dump File Size : 138,480
==================================================

==================================================
Dump File : Mini022408-01.dmp
Crash Time : 2/24/2008 8:20:16 PM
Bug Check String : DRIVER_POWER_STATE_FAILURE
Bug Check Code : 0x0000009f
Parameter 1 : 0x00000003
Parameter 2 : 0x84544700
Parameter 3 : 0x881363d0
Parameter 4 : 0x85f34008
Caused By Driver : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+d8681
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18209 (vistasp2_gdr.100218-0019)
Processor : 32-bit
Crash Address : ntkrnlpa.exe+d8681
Stack Address 1 : ntkrnlpa.exe+4b118
Stack Address 2 : ntkrnlpa.exe+4f166
Stack Address 3 : ntkrnlpa.exe+a99d1
Computer Name :
Full Path : C:\Windows\Minidump\Mini022408-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6000
Dump File Size : 138,480
==================================================

You only had one BSOD since March/11. It was caused By Driver : igdkmd32.sys
File Description : Intel Graphics Kernel Mode Driver. You could go to Intel and try to update that driver.

I'd like to scan your machine with ESET OnlineScan

•Hold down Control and click on the following link to open ESET OnlineScan in a new window.
ESET OnlineScan
•Click the button.
•For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the icon on your desktop.
•Check
•Click the button.
•Accept any security warnings from your browser.
•Check
•Push the Start button.
•ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
•When the scan completes, push
•Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
•Push the button.
•Push
A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt
1749.

Solve : malware,.virus?

Answer»
UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT
.
DDS (Ver_2011-06-23.01)
.
Microsoft Windows XP Professional
Boot Device: \Device\HarddiskVolume1
Install Date: 3/12/2011 9:08:41 AM
System Uptime: 8/8/2011 11:25:10 PM (0 hours ago)
.
MOTHERBOARD: Intel Corporation | | D845PT
Processor: Intel(R) Pentium(R) 4 CPU 1.70GHz | J1E1 | 1694/100mhz
.
==== Disk Partitions =========================
.
A: is Removable
C: is FIXED (NTFS) - 38 GiB total, 21.918 GiB free.
D: is CDROM ()
E: is FIXED (NTFS) - 93 GiB total, 75.583 GiB free.
.
==== Disabled Device Manager Items =============
.
Class GUID: {4D36E96F-E325-11CE-BFC1-08002BE10318}
Description: Microsoft PS/2 Mouse
Device ID: ACPI\PNP0F03\4&268D196D&0
Manufacturer: Microsoft
Name: Microsoft PS/2 Mouse
PNP Device ID: ACPI\PNP0F03\4&268D196D&0
Service: i8042prt
.
==== System Restore Points ===================
.
RP99: 5/28/2011 1:47:55 AM - Software Distribution Service 3.0
RP100: 5/29/2011 1:48:23 AM - Software Distribution Service 3.0
RP101: 5/29/2011 2:12:10 AM - Software Distribution Service 3.0
RP102: 5/30/2011 1:48:06 AM - Software Distribution Service 3.0
RP103: 5/31/2011 1:48:15 AM - Software Distribution Service 3.0
RP104: 6/1/2011 1:49:15 AM - Software Distribution Service 3.0
RP105: 6/2/2011 4:24:45 PM - Software Distribution Service 3.0
RP106: 6/3/2011 4:18:44 PM - Software Distribution Service 3.0
RP107: 6/4/2011 4:18:56 PM - Software Distribution Service 3.0
RP108: 6/5/2011 1:39:41 AM - Software Distribution Service 3.0
RP109: 6/8/2011 12:11:50 AM - Software Distribution Service 3.0
RP110: 6/8/2011 11:56:50 PM - Software Distribution Service 3.0
RP111: 6/9/2011 11:57:18 PM - Software Distribution Service 3.0
RP112: 6/10/2011 11:57:05 PM - Software Distribution Service 3.0
RP113: 6/11/2011 11:57:03 PM - Software Distribution Service 3.0
RP114: 6/12/2011 2:01:40 AM - Software Distribution Service 3.0
RP115: 6/12/2011 11:56:53 PM - Software Distribution Service 3.0
RP116: 6/13/2011 11:57:06 PM - Software Distribution Service 3.0
RP117: 6/14/2011 11:56:48 PM - Software Distribution Service 3.0
RP118: 6/15/2011 11:57:02 PM - Software Distribution Service 3.0
RP119: 6/16/2011 11:56:46 PM - Software Distribution Service 3.0
RP120: 6/17/2011 7:00:15 AM - Software Distribution Service 3.0
RP121: 6/18/2011 7:41:53 AM - Software Distribution Service 3.0
RP122: 6/19/2011 2:13:18 AM - Software Distribution Service 3.0
RP123: 6/20/2011 2:39:41 AM - System Checkpoint
RP124: 6/20/2011 7:41:56 AM - Software Distribution Service 3.0
RP125: 6/21/2011 7:46:43 AM - Software Distribution Service 3.0
RP126: 6/22/2011 7:41:30 AM - Software Distribution Service 3.0
RP127: 6/23/2011 7:41:44 AM - Software Distribution Service 3.0
RP128: 6/24/2011 7:41:32 AM - Software Distribution Service 3.0
RP129: 6/25/2011 7:55:19 AM - System Checkpoint
RP130: 6/25/2011 6:57:31 PM - Software Distribution Service 3.0
RP131: 6/26/2011 2:30:03 AM - Software Distribution Service 3.0
RP132: 6/26/2011 6:57:16 PM - Software Distribution Service 3.0
RP133: 6/27/2011 6:57:21 PM - Software Distribution Service 3.0
RP134: 6/28/2011 6:58:12 PM - System Checkpoint
RP135: 6/28/2011 10:56:14 PM - Software Distribution Service 3.0
RP136: 6/28/2011 11:59:56 PM - Software Distribution Service 3.0
RP137: 6/30/2011 12:32:27 AM - System Checkpoint
RP138: 6/30/2011 1:34:47 AM - Software Distribution Service 3.0
RP139: 7/1/2011 1:34:18 AM - Software Distribution Service 3.0
RP140: 7/2/2011 1:34:46 AM - Software Distribution Service 3.0
RP141: 7/3/2011 1:34:12 AM - Software Distribution Service 3.0
RP142: 7/3/2011 1:55:10 AM - Software Distribution Service 3.0
RP143: 7/4/2011 1:34:07 AM - Software Distribution Service 3.0
RP144: 7/5/2011 1:34:19 AM - Software Distribution Service 3.0
RP145: 7/6/2011 1:34:32 AM - Software Distribution Service 3.0
RP146: 7/7/2011 1:34:37 AM - Software Distribution Service 3.0
RP147: 7/8/2011 1:34:18 AM - Software Distribution Service 3.0
RP148: 7/9/2011 2:21:46 AM - System Checkpoint
RP149: 7/9/2011 5:23:43 PM - Software Distribution Service 3.0
RP150: 7/10/2011 1:47:26 AM - Software Distribution Service 3.0
RP151: 7/10/2011 5:23:32 PM - Software Distribution Service 3.0
RP152: 7/11/2011 5:23:49 PM - Software Distribution Service 3.0
RP153: 7/12/2011 5:23:55 PM - Software Distribution Service 3.0
RP154: 7/13/2011 7:00:16 AM - Software Distribution Service 3.0
RP155: 7/14/2011 7:23:58 AM - System Checkpoint
RP156: 7/14/2011 7:25:56 AM - Software Distribution Service 3.0
RP157: 7/15/2011 7:25:50 AM - Software Distribution Service 3.0
RP158: 7/16/2011 7:25:16 AM - Software Distribution Service 3.0
RP159: 7/17/2011 2:29:50 AM - Software Distribution Service 3.0
RP160: 7/18/2011 3:23:39 AM - System Checkpoint
RP161: 7/18/2011 7:26:01 AM - Software Distribution Service 3.0
RP162: 7/19/2011 7:25:32 AM - Software Distribution Service 3.0
RP163: 7/20/2011 7:25:33 AM - Software Distribution Service 3.0
RP164: 7/21/2011 7:25:49 AM - Software Distribution Service 3.0
RP165: 7/22/2011 7:25:31 AM - Software Distribution Service 3.0
RP166: 7/23/2011 7:25:22 AM - Software Distribution Service 3.0
RP167: 7/24/2011 2:29:00 AM - Software Distribution Service 3.0
RP168: 7/25/2011 3:23:22 AM - System Checkpoint
RP169: 7/25/2011 7:25:26 AM - Software Distribution Service 3.0
RP170: 7/26/2011 7:25:11 AM - Software Distribution Service 3.0
RP171: 7/27/2011 7:27:37 AM - System Checkpoint
RP172: 7/28/2011 7:53:52 AM - System Checkpoint
RP173: 7/28/2011 11:13:09 PM - Installed STOPzilla. Available with Windows Installer version 1.2 and later.
RP174: 7/29/2011 7:15:45 PM - Removed Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
RP175: 7/29/2011 7:16:31 PM - Removed Microsoft Silverlight
RP176: 7/30/2011 2:32:58 PM - Online Armor installation
RP177: 7/31/2011 10:00:03 AM - Removed STOPzilla. Available with Windows Installer version 1.2 and later.
RP178: 8/1/2011 10:02:17 AM - System Checkpoint
RP179: 8/2/2011 10:11:38 AM - System Checkpoint
RP180: 8/3/2011 6:49:37 PM - System Checkpoint
RP181: 8/4/2011 7:38:15 PM - System Checkpoint
RP182: 8/7/2011 10:52:47 PM - System Checkpoint
.
==== Installed Programs ======================
.
Adobe AIR
Adobe Flash Player 10 ActiveX
Adobe Flash Player 10 Plugin
Adobe Reader 9.4.5
CCleaner
HOTFIX for Windows XP (KB2443685)
Hotfix for Windows XP (KB952287)
Hotfix for Windows XP (KB981793)
Java Auto Updater
Java(TM) 6 Update 24
JDownloader 0.9
Microsoft Antimalware
Microsoft Application Error Reporting
Microsoft Security Client
Microsoft Security Essentials
Mozilla Firefox (3.6.18)
Online Armor 5.0
Security Update for Windows Internet Explorer 8 (KB2482017)
Security Update for Windows Internet Explorer 8 (KB2497640)
Security Update for Windows Internet Explorer 8 (KB2510531)
Security Update for Windows Internet Explorer 8 (KB2530548)
Security Update for Windows Internet Explorer 8 (KB2544521)
Security Update for Windows Internet Explorer 8 (KB971961)
Security Update for Windows Internet Explorer 8 (KB981332)
Security Update for Windows Internet Explorer 8 (KB982381)
Security Update for Windows Media Player (KB2378111)
Security Update for Windows Media Player (KB952069)
Security Update for Windows Media Player (KB954155)
Security Update for Windows Media Player (KB973540)
Security Update for Windows Media Player (KB975558)
Security Update for Windows Media Player (KB978695)
Security Update for Windows Media Player (KB979402)
Security Update for Windows XP (KB2079403)
Security Update for Windows XP (KB2115168)
Security Update for Windows XP (KB2121546)
Security Update for Windows XP (KB2229593)
Security Update for Windows XP (KB2259922)
Security Update for Windows XP (KB2296011)
Security Update for Windows XP (KB2347290)
Security Update for Windows XP (KB2360937)
Security Update for Windows XP (KB2387149)
Security Update for Windows XP (KB2393802)
Security Update for Windows XP (KB2412687)
Security Update for Windows XP (KB2419632)
Security Update for Windows XP (KB2423089)
Security Update for Windows XP (KB2440591)
Security Update for Windows XP (KB2443105)
Security Update for Windows XP (KB2476490)
Security Update for Windows XP (KB2476687)
Security Update for Windows XP (KB2478960)
Security Update for Windows XP (KB2478971)
Security Update for Windows XP (KB2479628)
Security Update for Windows XP (KB2479943)
Security Update for Windows XP (KB2481109)
Security Update for Windows XP (KB2482017)
Security Update for Windows XP (KB2483185)
Security Update for Windows XP (KB2485376)
Security Update for Windows XP (KB2485663)
Security Update for Windows XP (KB2503658)
Security Update for Windows XP (KB2503665)
Security Update for Windows XP (KB2506212)
Security Update for Windows XP (KB2506223)
Security Update for Windows XP (KB2507618)
Security Update for Windows XP (KB2507938)
Security Update for Windows XP (KB2508272)
Security Update for Windows XP (KB2508429)
Security Update for Windows XP (KB2509553)
Security Update for Windows XP (KB2511455)
Security Update for Windows XP (KB2524375)
Security Update for Windows XP (KB2535512)
Security Update for Windows XP (KB2536276)
Security Update for Windows XP (KB2544893)
Security Update for Windows XP (KB2555917)
Security Update for Windows XP (KB923561)
Security Update for Windows XP (KB923789)
Security Update for Windows XP (KB946648)
Security Update for Windows XP (KB950762)
Security Update for Windows XP (KB950974)
Security Update for Windows XP (KB951376-v2)
Security Update for Windows XP (KB951748)
Security Update for Windows XP (KB952004)
Security Update for Windows XP (KB952954)
Security Update for Windows XP (KB955069)
Security Update for Windows XP (KB956572)
Security Update for Windows XP (KB956744)
Security Update for Windows XP (KB956802)
Security Update for Windows XP (KB956803)
Security Update for Windows XP (KB956844)
Security Update for Windows XP (KB958644)
Security Update for Windows XP (KB958869)
Security Update for Windows XP (KB959426)
Security Update for Windows XP (KB960225)
Security Update for Windows XP (KB960803)
Security Update for Windows XP (KB960859)
Security Update for Windows XP (KB961501)
Security Update for Windows XP (KB969059)
Security Update for Windows XP (KB970238)
Security Update for Windows XP (KB970430)
Security Update for Windows XP (KB971468)
Security Update for Windows XP (KB971657)
Security Update for Windows XP (KB971961)
Security Update for Windows XP (KB972270)
Security Update for Windows XP (KB973507)
Security Update for Windows XP (KB973869)
Security Update for Windows XP (KB973904)
Security Update for Windows XP (KB974112)
Security Update for Windows XP (KB974318)
Security Update for Windows XP (KB974392)
Security Update for Windows XP (KB974571)
Security Update for Windows XP (KB975025)
Security Update for Windows XP (KB975467)
Security Update for Windows XP (KB975560)
Security Update for Windows XP (KB975561)
Security Update for Windows XP (KB975562)
Security Update for Windows XP (KB975713)
Security Update for Windows XP (KB977816)
Security Update for Windows XP (KB977914)
Security Update for Windows XP (KB978037)
Security Update for Windows XP (KB978338)
Security Update for Windows XP (KB978542)
Security Update for Windows XP (KB978601)
Security Update for Windows XP (KB978706)
Security Update for Windows XP (KB979309)
Security Update for Windows XP (KB979482)
Security Update for Windows XP (KB979559)
Security Update for Windows XP (KB979683)
Security Update for Windows XP (KB979687)
Security Update for Windows XP (KB980195)
Security Update for Windows XP (KB980218)
Security Update for Windows XP (KB980232)
Security Update for Windows XP (KB980436)
Security Update for Windows XP (KB981322)
Security Update for Windows XP (KB981349)
Security Update for Windows XP (KB981997)
Security Update for Windows XP (KB982132)
Security Update for Windows XP (KB982214)
Security Update for Windows XP (KB982381)
Security Update for Windows XP (KB982665)
SUPERAntiSpyware
Update for Windows Internet Explorer 8 (KB2447568)
Update for Windows Internet Explorer 8 (KB976662)
Update for Windows XP (KB2141007)
Update for Windows XP (KB2345886)
Update for Windows XP (KB2467659)
Update for Windows XP (KB2541763)
Update for Windows XP (KB951978)
Update for Windows XP (KB955759)
Update for Windows XP (KB967715)
Update for Windows XP (KB968389)
Update for Windows XP (KB971029)
Update for Windows XP (KB971737)
Update for Windows XP (KB973687)
Update for Windows XP (KB973815)
VLC media player 1.1.9
WebFldrs XP
Windows Genuine Advantage Notifications (KB905474)
Windows Internet Explorer 8
Windows XP Service Pack 3
WinRAR 4.00 (32-bit)
Xvid 1.2.2 final uninstall
.
==== Event Viewer Messages From Past Week ========
.
8/8/2011 8:27:21 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\Administrator Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 8:27:21 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\Administrator Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 8:27:21 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\Administrator Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 8:27:21 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\Administrator Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 8:27:19 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/8/2011 7:22:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 7:22:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 7:22:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 7:22:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 7:21:48 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/8/2011 7:12:33 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 7:12:33 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 7:12:33 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 7:12:33 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 7:12:28 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/8/2011 6:33:29 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 6:33:29 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 6:33:29 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 6:33:29 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 6:33:09 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/8/2011 6:31:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 6:31:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 6:31:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 6:31:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 6:30:56 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/8/2011 6:23:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 6:23:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 6:23:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 6:23:16 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 6:23:13 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/8/2011 4:47:05 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 4:47:05 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 4:47:05 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 4:47:05 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Install Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070005 Error description: Access is denied.
8/8/2011 4:46:44 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/8/2011 4:32:29 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 4:32:29 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 4:32:29 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 4:32:29 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: REBUILT-8C81CD7\nelson burke Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/8/2011 4:32:05 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/7/2011 2:09:25 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/7/2011 2:09:25 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/7/2011 2:09:25 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/7/2011 2:09:25 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/7/2011 2:09:24 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/6/2011 11:40:11 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/6/2011 11:40:11 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/6/2011 11:40:11 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/6/2011 11:40:11 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/6/2011 11:39:49 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/5/2011 11:40:10 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/5/2011 11:40:10 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/5/2011 11:40:10 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/5/2011 11:40:10 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/5/2011 11:39:49 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/4/2011 6:40:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/4/2011 6:40:08 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/4/2011 6:40:07 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/4/2011 6:40:07 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Malware Protection Center Update Stage: Search Source Path: http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=1.1.7104.0&avdelta=1.109.666.0&asdelta=1.109.666.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094 Signature Type: AntiSpyware Update Type: Full User: NT AUTHORITY\NETWORK SERVICE Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80072f76 Error description: The requested header was not found
8/4/2011 6:39:43 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/3/2011 5:01:05 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service EventSystem with arguments "" in order to run the server: {1BE1F766-5536-11D1-B726-00C04FB926AF}
8/2/2011 9:50:23 PM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/2/2011 10:55:30 PM, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: Fips MpFilter OADevice oahlpXX Processor SASDIFSV SASKUTIL
8/1/2011 9:55:29 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service netman with arguments "" in order to run the server: {BA126AE5-2166-11D1-B1D0-00805FC1270E}
8/1/2011 6:08:47 AM, error: Microsoft Antimalware [2001] - Microsoft Antimalware has encountered an error trying to update signatures. New Signature Version: Previous Signature Version: 1.109.666.0 Update Source: Microsoft Update Server Update Stage: Search Source Path: Default URL Signature Type: AntiVirus Update Type: Full User: NT AUTHORITY\SYSTEM Current Engine Version: Previous Engine Version: 1.1.7104.0 Error code: 0x80070424 Error description: The specified service does not exist as an installed service.
8/1/2011 11:00:30 PM, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: AFD Fips IPSec MpFilter MRxSmb NetBIOS NetBT OADevice oahlpXX OAmon OAnet Processor RasAcd Rdbss SASDIFSV SASKUTIL Tcpip
8/1/2011 11:00:30 PM, error: Service Control Manager [7001] - The TCP/IP NetBIOS Helper service depends on the AFD service which failed to start because of the following error: A device attached to the system is not functioning.
8/1/2011 11:00:30 PM, error: Service Control Manager [7001] - The IPSEC Services service depends on the IPSEC driver service which failed to start because of the following error: A device attached to the system is not functioning.
8/1/2011 11:00:30 PM, error: Service Control Manager [7001] - The DNS Client service depends on the TCP/IP Protocol Driver service which failed to start because of the following error: A device attached to the system is not functioning.
8/1/2011 11:00:30 PM, error: Service Control Manager [7001] - The DHCP Client service depends on the NetBios over Tcpip service which failed to start because of the following error: A device attached to the system is not functioning.
.
==== End Of File ===========================What happens when you try to boot in Normal Mode?

Download OTL to your desktop.

* Open OTL
* Copy and Paste the following text in the codebox into the Custom Scans/Fixes window.

Code: [Select]:OTL

BHO: {c3721e85-f0ac-4b7e-ae4c-3e738011dc9d} - No File
TB: {c3721e85-f0ac-4b7e-ae4c-3e738011dc9d} - No File

:COMMANDS
[resethosts]
[purity]
[emptytemp]
[start explorer]

* Click Run Fix
* OTLI2 may ask to reboot the machine. Please do so if asked.
* Click OK
* A report will open. Copy and Paste that report in your next reply.
*****************************************************************

Please download ComboFix from BleepingComputer.com

Alternate link: GeeksToGo.com

and save it to your Desktop.
It would be easiest to download using Internet Explorer.
If you insist on using Firefox, make sure that your download settings are as follows:

* Tools->Options->Main tab
* Set to "Always ask me where to Save the files".

Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools A guide to do this can be found here
Double click ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console

Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:


Click on Yes, to continue scanning for malware.
When finished, it shall PRODUCE a log for you. Please include the contents of C:\ComboFix.txt in your next reply.

If you have problems with ComboFix usage, see How to use ComboFixAll processes killed
Error: Unable to interpret in the current context!
Error: Unable to interpret in the current context!
========== COMMANDS ==========
C:\WINDOWS\System32\drivers\etc\Hosts moved successfully.
HOSTS file reset successfully

[EMPTYTEMP]

User: Administrator
->Temp folder emptied: 1167840 bytes
->Temporary Internet Files folder emptied: 116929 bytes

User: Administrator.REBUILT-8C81CD7
->Temp folder emptied: 903874 bytes
->Temporary Internet Files folder emptied: 25268254 bytes
->Flash cache emptied: 56958 bytes

User: All Users

User: All Users.WINDOWS

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes

User: Default User.WINDOWS
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes
->Flash cache emptied: 56502 bytes

User: Guest
->Temp folder emptied: 513062 bytes
->Temporary Internet Files folder emptied: 28352944 bytes
->Flash cache emptied: 434 bytes

User: LocalService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 16001632 bytes
->Flash cache emptied: 24843 bytes

User: LocalService.NT AUTHORITY
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33664 bytes

User: nelson burke
->Temp folder emptied: 28738620 bytes
->Temporary Internet Files folder emptied: 2098148 bytes
->Java cache emptied: 331395 bytes
->FireFox cache emptied: 46943515 bytes
->Flash cache emptied: 622 bytes

User: NetworkService
->Temp folder emptied: 23540886 bytes
->Temporary Internet Files folder emptied: 365879419 bytes
->Flash cache emptied: 53771 bytes

User: NetworkService.NT AUTHORITY
->Temp folder emptied: 585062 bytes
->Temporary Internet Files folder emptied: 33170 bytes

User: new
->Temp folder emptied: 484 bytes
->Temporary Internet Files folder emptied: 46054554 bytes
->Flash cache emptied: 434 bytes

User: Owner
->Temp folder emptied: 49423059 bytes
->Temporary Internet Files folder emptied: 1370736 bytes
->Java cache emptied: 35673306 bytes
->Flash cache emptied: 66514 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 4360845 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32\dllcache .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 91711 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 33170 bytes
RecycleBin emptied: 0 bytes

Total Files Cleaned = 646.00 mb
ComboFix 11-08-09.02 - Administrator 08/09/2011 22:21:57.1.1 - x86 NETWORK
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1023.750 [GMT -4:00]
Running from: c:\documents and settings\Administrator.REBUILT-8C81CD7\Desktop\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
FW: Online Armor Firewall *Enabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\ystem3~1
.
.
((((((((((((((((((((((((( Files Created from 2011-07-10 to 2011-08-10 )))))))))))))))))))))))))))))))
.
.
2011-08-10 01:59 . 2011-07-20 13:446881616----a-w-c:\documents and settings\All Users.WINDOWS\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2011-08-10 01:59 . 2011-07-20 13:446881616----a-w-c:\documents and settings\All Users.WINDOWS\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F8A0CFBE-7BB8-4C64-9E1A-AC53421E6F88}\mpengine.dll
2011-08-09 23:38 . 2011-08-09 23:38--------d-----w-C:\_OTL
2011-08-09 03:57 . 2011-08-09 03:57--------d-----w-c:\documents and settings\All Users.WINDOWS\Application Data\WinZip
2011-08-03 21:31 . 2011-08-03 21:319830----a-w-c:\program files\exefix.reg
2011-08-03 20:45 . 2008-04-14 00:12146432----a-w-c:\windows\regedit.com
2011-07-31 03:07 . 2011-07-31 03:07--------d-----w-c:\documents and settings\nelson burke\Application Data\SUPERAntiSpyware.com
2011-07-31 03:07 . 2011-07-31 03:07--------d-----w-c:\documents and settings\All Users.WINDOWS\Application Data\SUPERAntiSpyware.com
2011-07-31 03:06 . 2011-08-09 03:34--------d-----w-c:\program files\SUPERAntiSpyware
2011-07-30 22:35 . 2011-07-30 22:35--------d-----w-c:\program files\CCleaner
2011-07-30 18:34 . 2011-07-30 19:00--------d-----w-c:\documents and settings\All Users.WINDOWS\Application Data\OnlineArmor
2011-07-30 18:34 . 2011-07-30 18:35--------d-----w-c:\documents and settings\nelson burke\Application Data\OnlineArmor
2011-07-30 18:32 . 2011-04-06 17:0239048----a-w-c:\windows\system32\drivers\oahlp32.sys
2011-07-30 18:32 . 2011-04-06 17:0129464----a-w-c:\windows\system32\drivers\OAnet.sys
2011-07-30 18:32 . 2011-04-06 17:0125192----a-w-c:\windows\system32\drivers\OAmon.sys
2011-07-30 18:32 . 2011-04-06 17:01205864----a-w-c:\windows\system32\drivers\OADriver.sys
2011-07-30 18:31 . 2011-08-09 04:56--------d-----w-c:\program files\Online Armor
2011-07-30 11:51 . 2011-08-08 23:12--------d-----w-c:\program files\Microsoft Security Client
2011-07-29 23:16 . 2011-07-30 03:13--------d-----w-c:\windows\SxsCaPendDel
2011-07-29 23:03 . 2011-07-29 23:03--------d--h--w-c:\windows\PIF
2011-07-29 03:13 . 2011-07-31 14:00--------d-----w-c:\documents and settings\All Users.WINDOWS\Application Data\STOPzilla!
2011-07-29 03:01 . 2011-07-29 03:01--------d-sh--w-c:\documents and settings\LocalService.NT AUTHORITY\IETldCache
2011-07-29 02:54 . 2011-07-31 13:12--------d-----w-c:\program files\PC Tools Security
2011-07-29 02:51 . 2011-07-29 02:51--------d--h--w-c:\windows\system32\GroupPolicy
2011-07-29 02:51 . 2011-07-30 19:22--------d---a-w-c:\documents and settings\All Users.WINDOWS\Application Data\TEMP
2011-07-27 20:49 . 2011-07-27 20:49--------d-----w-c:\documents and settings\nelson burke\Application Data\Malwarebytes
2011-07-27 20:47 . 2011-07-27 20:47--------d-----w-c:\documents and settings\nelson burke\Local Settings\Application Data\Thinstall
2011-07-27 20:47 . 2011-07-27 20:47--------d-----w-c:\documents and settings\nelson burke\Application Data\Thinstall
2011-07-27 03:48 . 2011-07-27 03:49--------d-----w-c:\program files\File Scanner Library (Spybot - Search & Destroy)
2011-07-27 03:46 . 2011-07-30 22:43--------d-----w-c:\documents and settings\All Users.WINDOWS\Application Data\Spybot - Search & Destroy
2011-07-27 03:42 . 2011-07-27 03:43--------d-----w-c:\documents and settings\Administrator.REBUILT-8C81CD7
2011-07-18 04:26 . 2011-08-08 23:18--------d-----w-c:\program files\JDownloader
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-07-30 18:29 . 2011-06-18 10:26404640----a-w-c:\windows\system32\FlashPlayerCPLApp.cpl
2011-06-02 14:02 . 2007-07-27 12:001858944----a-w-c:\windows\system32\win32k.sys
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-06-08 37296]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-10-29 249064]
"@OnlineArmor GUI"="c:\program files\Online Armor\OAui.exe" [2011-04-06 2477032]
.
c:\documents and settings\All Users.WINDOWS\Start Menu\Programs\Startup\
WinZip Quick Pick.lnk - e:\program files\WinZip\WZQKPICK.EXE [2009-1-14 525664]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\ONLINE~2\oaevent.dll" [2011-04-06 354720]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21548352----a-w-c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
.
R1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [7/30/2011 2:32 PM 25192]
R1 OAnet;OAnet;c:\windows\system32\drivers\OAnet.sys [7/30/2011 2:32 PM 29464]
S1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [7/30/2011 2:32 PM 205864]
S1 oahlpXX;Online Armor helper driver;c:\windows\system32\drivers\oahlp32.sys [7/30/2011 2:32 PM 39048]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/12/2011 5:55 PM 12880]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 5:55 PM 67664]
S2 OAcat;Online Armor Helper Service;c:\program files\Online Armor\oacat.exe [7/30/2011 2:31 PM 381512]
S2 SvcOnlineArmor;Online Armor;c:\program files\Online Armor\oasrv.exe [7/30/2011 2:31 PM 4326472]
.
Contents of the 'Scheduled Tasks' folder
.
2011-08-10 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Microsoft Security Client\Antimalware\MpCmdRun.exe [2010-11-11 16:26]
.
.
------- Supplementary Scan -------
.
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath -
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
HKLM-Run-MSC - c:\program files\Microsoft Security Client\msseces.exe
Notify-TPSvc - TPSvc.dll
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-08-09 22:28
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-842925246-1425521274-725345543-500\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (Administrator)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5 977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,a0,e4,c9,e9,40,c9,78,40,93,3e,2c,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839 E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,a0,e4,c9,e9,40,c9,78,40,93,3e,2c,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(384)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\windows\system32\WININET.dll
c:\windows\system32\l3codeca.acm
.
- - - - - - - > 'explorer.exe'(1212)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
.
Completion time: 2011-08-09 22:31:20
ComboFix-quarantined-files.txt 2011-08-10 02:31
.
Pre-Run: 24,017,367,040 bytes free
Post-Run: 23,975,112,704 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /noexecute=optin
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect
[spybotsd]
timeout.old=30
.
- - End Of File - - 16DB893E0679898BE3BFC50328BE0710


OTL by OldTimer - Version 3.2.26.1 log created on 08092011_193854

Files\Folders moved on Reboot...
File\Folder C:\Documents and Settings\Administrator.REBUILT-8C81CD7\Local Settings\Temp\~DFB35B.tmp not found!
File\Folder C:\Documents and Settings\Administrator.REBUILT-8C81CD7\Local Settings\Temp\~DFB378.tmp not found!
File\Folder C:\Documents and Settings\Administrator.REBUILT-8C81CD7\Local Settings\Temp\~DFB63D.tmp not found!
File\Folder C:\Documents and Settings\Administrator.REBUILT-8C81CD7\Local Settings\Temp\~DFB6DE.tmp not found!
C:\Documents and Settings\Administrator.REBUILT-8C81CD7\Local Settings\Temporary Internet Files\Content.IE5\R1OYDZ9H\topic,121989.15[1].html moved successfully.

Registry entries deleted on Reboot...
hi SuperDave, it looks like my system is fixedI still cannot run some programs by double clicking I think I may have renamed them so as I load them I will undo rename them Is there any way you can tell if it is cleaned? Thank you for all your help I will let others know about this site N.B.Quote
it looks like my system is fixedI still cannot run some programs by double clicking I think I may have renamed them so as I load them I will undo rename them Is there any way you can tell if it is cleaned? Thank you for all your help I will let others know about this site N.B.
I'm not finished cleaning the computer. Please stick with me for a few more scans.

Please download Rooter and Save it to your desktop.
  • Double click it to start the tool.Vista and Windows7 run as administrator.
  • Click Scan.
  • Eventually, a Notepad file containing the report will open, also found at C:\Rooter.txt. Post that log in your next reply.
Rooter.exe (v1.0.2) by Eric_71
.
SeDebugPrivilege granted successfully ...
.
Windows XP . (5.1.2600) Service Pack 3
[32_bits] - x86 Family 15 Model 1 Stepping 2, GenuineIntel
.
[wscsvc] (Security Center) RUNNING (state:4)
[SharedAccess] RUNNING (state:4)
Windows Firewall -> Disabled !
.
Internet Explorer 8.0.6001.18702
Mozilla Firefox 3.6.18 (en-US)
.
A:\ [Removable]
C:\ [Fixed-NTFS] .. ( Total:38 Go - Free:20 Go )
D:\ [CD_Rom]
E:\ [Fixed-NTFS] .. ( Total:93 Go - Free:74 Go )
.
Scan : 16:34.27
Path : C:\Documents and Settings\nelson burke\Desktop\Rooter.exe
User : nelson burke ( Administrator -> YES )
.
----------------------\\ Processes
.
Locked [System Process] (0)
______ System (4)
______ \SystemRoot\System32\smss.exe (360)
______ \??\C:\WINDOWS\system32\csrss.exe (408)
______ \??\C:\WINDOWS\system32\winlogon.exe (432)
______ C:\WINDOWS\system32\services.exe (476)
______ C:\WINDOWS\system32\lsass.exe (488)
______ C:\WINDOWS\system32\svchost.exe (640)
______ C:\WINDOWS\system32\svchost.exe (696)
______ C:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe (736)
______ C:\WINDOWS\System32\svchost.exe (772)
______ C:\WINDOWS\system32\svchost.exe (864)
______ C:\WINDOWS\system32\svchost.exe (1028)
______ C:\Program Files\Online Armor\OAcat.exe (1216)
______ C:\WINDOWS\Explorer.EXE (1224)
______ C:\Program Files\Online Armor\oasrv.exe (1296)
______ C:\WINDOWS\system32\spoolsv.exe (1652)
______ C:\WINDOWS\system32\svchost.exe (1968)
______ C:\Program Files\Java\jre6\bin\jqs.exe (212)
______ C:\WINDOWS\System32\alg.exe (2224)
______ C:\WINDOWS\system32\devldr32.exe (2704)
______ C:\Program Files\Common Files\Java\Java Update\jusched.exe (3160)
______ C:\Program Files\Online Armor\OAui.exe (3192)
______ C:\WINDOWS\system32\ctfmon.exe (3228)
______ E:\Program Files\WinZip\WZQKPICK.EXE (3308)
______ C:\Program Files\Online Armor\OAhlp.exe (3420)
______ C:\Program Files\internet explorer\iexplore.exe (3796)
______ C:\Program Files\internet explorer\iexplore.exe (2908)
______ C:\WINDOWS\system32\wuauclt.exe (400)
______ C:\Program Files\internet explorer\iexplore.exe (2680)
______ C:\Documents and Settings\nelson burke\Desktop\Rooter.exe (388)
.
----------------------\\ Device\Harddisk0\
.
\Device\Harddisk0 [Sectors : 63 x 512 Bytes]
.
\Device\Harddisk0\Partition1 --[ MBR ]-- (Start_Offset:32256 | Length:41101691904)
.
----------------------\\ Scheduled Tasks
.
C:\WINDOWS\Tasks\desktop.ini
C:\WINDOWS\Tasks\MP Scheduled Scan.job
C:\WINDOWS\Tasks\SA.DAT
.
----------------------\\ Registry
.
.
----------------------\\ Files & Folders
.
----------------------\\ Scan completed at 16:34.29
.
C:\Rooter$\Rooter_1.txt - (13/08/2011 | 16:34.29)
Here is the ROOTER Log,I'd like to scan your machine with ESET OnlineScan

•Hold down Control and click on the following link to open ESET OnlineScan in a new window.
ESET OnlineScan
•Click the button.
•For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the icon on your desktop.
•Check
•Click the button.
•Accept any security warnings from your browser.
•Check
•Push the Start button.
•ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
•When the scan completes, push
•Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
•Push the button.
•Push
A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt
Here is ESETS LOGC :\Documents and Settings\nelson burke\My Documents\Downloads\Xvid-Setup-dm-6.exeWin32/Toolbar.Zugo applicationdeleted - quarantined
C:\System Volume Information\_restore{25A6172B-8545-494B-A5E8-CA595D0FB942}\RP178\A0010372.exeWin32/RegistryBooster applicationdeleted - quarantined
C:\System Volume Information\_restore{25A6172B-8545-494B-A5E8-CA595D0FB942}\RP178\A0010377.exeWin32/RegistryBooster applicationdeleted - quarantined
That looks good. If there are no other issues, we can do some cleanup.

To uninstall ComboFix

  • Click the Start button. Click Run. For Vista: type in Run in the Start search, and click on Run in the results pane.
  • In the field, type in ComboFix /uninstall


(Note: Make sure there's a space between the word ComboFix and the forward-slash.)

  • Then, press Enter, or click OK.
  • This will uninstall ComboFix, delete its folders and files, hides System files and folders, and resets System Restore.
*************************************************
To remove all of the tools we used and the files and folders they created do the following:
Double click OTL.exe.
  • Click the CleanUp button.
  • Select Yes when the "Begin cleanup Process?" PROMPT appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes.
Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
****************************************************
Clean out your temporary internet files and temp files.

Download TFC by OldTimer to your desktop.

Double-click TFC.exe to run it.

Note: If you are running on Vista, right-click on the file and choose Run As Administrator

TFC will close all programs when run, so make sure you have saved all your work before you begin.

* Click the Start button to begin the cleaning process.
* Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
* Please let TFC run uninterrupted until it is finished.

Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
******************************************************
Use the Secunia Software Inspector to check for out of date software.

•Click Start Now

•Check the box next to Enable thorough system inspection.

•Click Start

•Allow the scan to finish and scroll down to see if any updates are needed.
•Update anything listed.
.
----------

Go to Microsoft Windows Update and get all critical updates.

----------

I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
Safe Surfing!
1750.

Solve : Virus from a website??

Answer»

A while back my friend told me that you could get a virus, just by going to a certain site. You didn't NEED to download anything, just by visiting the site, you get a virus. Is this even possible?you can get a lot from sex or porn sites and other bad ones Quote from: harry 48 on May 10, 2009, 11:48:18 AM

you can get a lot from sex or porn sites and other bad ones
Like just by going to the site, not clicking on any links, not downloading anything...just by going to the site?If you have no (or a very bad) antivirus software installed, you can get infected just by clicking websites.

Some basic information here:
http://askabouttech.com/can-you-get-a-virus-from-visiting-a-website/Quote from: Carbon Dudeoxide on May 10, 2009, 11:55:59 AM
If you have no (or a very bad) antivirus software installed, you can get infected just by clicking websites.

Some basic information here:
http://askabouttech.com/can-you-get-a-virus-from-visiting-a-website/
If I have IE6 and McAfee (which get's updated maybe once a year) and Windows Firewall is disabled (I'm not sure if McAfee has a firewall), do you think if I went to an infected site I would get infected too?Yes.

First, McAfee has a very low detection rate. ALSO, updating it once a year? Might as well not have an antivirus.
Remove McAfee with its tool here: http://service.mcafee.com/FAQDocument.aspx?id=TS100507&lc=1033
Now get a REAL antivirus software. A few free antivirus software include Avira, Avast and AVG Free.
http://www.free-av.com/
http://www.avast.com/eng/download-avast-home.html
http://free.avg.com/

Any reason why your Firiewall is turned off?Quote from: Helpmeh on May 10, 2009, 12:01:13 PM
do you think if I went to an infected site I would get infected too?

Yes ... of course ... I can send you to a nice site.....you'll understand fully as soon as the page opens. I use it to practice .....you may be in for a shock when you run a decent AV program.Try downloading this:
http://www.eicar.org/download/eicar_com.zip

What does your antivirus do?


(Note: It is a completely harmless Antivirus Test File by Eicar: http://www.eicar.org/anti_virus_test_file.htm)There are many 'experts' who think that if you are very carefully you will not ever be infected by any kind of bad virus, worm or Trojan or something like that.
The truth is that all AV software is based on the premise that we already know what the virus will look like or what it can do. That is a false assumption. Nobody has calculated how many different ways there are to compromise a PC or any other kind of electronic information transport system.
But this is not said here to discourage you from being careful. No, always be careful. The more effort you take to protect your PC puts the odds in your favor.In beginners terms... Back yourself up with a really good anti-virus software. Dont open any emails unless you regonise the author. Use a anti-virus software that recognises dodgy websites.Quote
In beginners terms... Back yourself up with a really good anti-virus software. Dont open any emails unless you regonise the author. Use a anti-virus software that recognises dodgy websites.
Exactly. The only THING I would add to that is put your valuable documents, photos and music ONTO CDs or DVDS for safekeeping. I may not be a "specialist" but I talked with a guy that had alot of experince and you guys are seeming flakey. You can go to myspace and get infected, its not a matter of if I go to pornusall.com I'm going to get trojans. Not a real site only example.Quote from: Carbon Dudeoxide on May 10, 2009, 07:59:17 PM
Yes.

First, McAfee has a very low detection rate. Also, updating it once a year? Might as well not have an antivirus.
Remove McAfee with its tool here: http://service.mcafee.com/FAQDocument.aspx?id=TS100507&lc=1033
Now get a REAL antivirus software. A few free antivirus software include Avira, Avast and AVG Free.
http://www.free-av.com/
http://www.avast.com/eng/download-avast-home.html
http://free.avg.com/

Any reason why your Firiewall is turned off?
Because if anything bad does happen, deepfreeze just resets...so "It's all good girls"...I love that quote.