Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

4451.

Solve : c:\windows\services.exe?

Answer»

AAARRRGGGHHH!!!


4452.

Solve : Virus affecting my seach engines! please help!!!?

Answer»

Looks good. How is the computer running now?very good!!!!! thank you soooo sooo much for your help Sounds good.

Use the Secunia Software Inspector to check for out of date software.

  • Click Start Now
  • Check the BOX next to Enable thorough system inspection.
  • Click Start
  • Allow the scan to finish and scroll down to see if any updates are needed.
  • Update anything listed.
.
----------

GO to Microsoft Windows Update and get all critical updates.

----------

I suggest using WOT - Web of Trust. WOT is a FREE Internet security addon for your browser. It will keep you SAFE from online scams, identity theft, spyware, spam, viruses and unreliable shopping SITES. WOT warns you before you interact with a risky website. It's easy and it's free.

SpywareBlaster - Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

Also see Slow Computer? It May Not Be Malware for free cleaning/maintenance tools to help keep your computer running smooth.
4453.

Solve : Where did my battery Icon Go?????

Answer»

What do you mean by it disappeared? Is it just auto hiding?OKAY, I've finally redone all the PREVIOUS steps and will post the results. No results were found for both Super antispyware, and Malwarebytes, but I have included what was found in Hijack This.

[attachment deleted by admin]Please see my previous question.

4454.

Solve : Problems with Ad-Aware 2008?

Answer»

Hi, this is my 1st post on this forum. I have a problem with Ad-Aware 2008. BASICALLY I was unable to run a scan yesterday, keep getting messages about not having administrative rights or "fatal error 1920" messages. Have used Ad-Aware in various VERSIONS for a couple years now & this is the 1st time i've had a problem. I was advised to uninstall then re-install Ad-Aware but windows won't let me uninstall it, keep getting the same error messages over again. tried a system restore & that didn't work either. Even tried downloading the latest Ad-Aware Anniversary edition but it couldn't install due to not being able to uninstall the old program. I have found a couple of THREADS on the Lavasoft forum about this & tried their fixes but they do not work. I fear that some kind of virus/worm has got onto my PC somehow as it also runs a lot slower than before.
Any advice would be much appreciated as I really am not having any luck with this one.
Hope someone can help.

4455.

Solve : Virus symbol on shutdown button?

Answer»

Hi.
What does it mean when there is a virus symbol on the shutdown button. It isn't removed by the antivirus software avg free grisoft and spybot search and destroy which I ran earlier.
Whats this virus symbol look like?WINDOWS security orange SHIELD with a black ! in it. davedat...

This icon?


It MEANS: A program that's not part of Windows needs your permission to start. It has a valid digital signature indicating its name and its publisher, which helps to ensure that the program is what it claims to be. Make sure that this is a program that you intended to run.
or that one?? That just means there are updates that need installedthanks I thought the LATEST updates were downloaded because there were updates ALREADY today but there were three more important updates just nowI had one for the Microsoft Malicious Software Tool today also.

4456.

Solve : Please Help with Adware!??

Answer»

Hey,
Here are the two logs that were generated.
Thanks again,

[attachment deleted by admin]Do you have a log from ComboFix? I just ran combofix, here is the log
thanks

[attachment deleted by admin]Did you uninstall Nod 32?

Download Security Check from one of the following links and save it to your Desktop.

Link 1
Link 2

* Unzip SecurityCheck.zip and a folder named Security Check should appear.
* Open the Security Check folder and double-click Security Check.bat
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt
* Post the contents of that document in your next reply.[/list]

Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.No i didn't, i do not know how....


[attachment deleted by admin]Run the NOD32 Removal Tool http://www.nod32.nl/download/tool/nod32removal.exe

Restart the computer when it's complete.

----------

How is the computer running now?hey,
so i ran the NOD32 removal program, and it came up with this warning, ("er zijn geen NOD32 verwijderen onderdelen aangetroffen op de computer.") Which means, "there none NOD32 removes components has been found on the computer." Any IDEA? Im rather annoyed by this program...
Thanks eh?
Anyways it shouldnt matter, what is a little more protection eh?
Thanks Again, i am now done with this computer i will be incontact when i have more difficulty (which i am sure that i will. ) thanks again!I think it's just showing in the Security Center but not actually installed.

  • Click START then RUN
  • Now type Combofix /u in the runbox
  • Make sure there's a space between Combofix and /u
  • Then hit Enter.
.

.
The above PROCEDURE will:
  • Delete:
    • ComboFix and its associated FILES and folders.
    • VundoFix backups, if present
    • The C:\Deckard folder, if present
    • The C:_OtMoveIt folder, if present
    • Reset the clock settings.
    • Hide file extensions, if required.
    • Hide System/Hidden files, if required.
    • Set a new, clean Restore Point.
    .
    ----------

    Use the Secunia Software Inspector to check for out of date software.
    • Click Start Now
    • Check the box next to Enable thorough system inspection.
    • Click Start
    • Allow the scan to finish and scroll down to see if any updates are needed.
    • Update anything listed.
    .
    ----------

    Go to Microsoft Windows Update and get all critical updates.

    ----------

    Here are some great FREE tools to help you keep from getting infected again. These tools use little or no resources so won't slow down your PC.

    I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

    SpywareBlaster - Secure your Internet Explorer to make it HARDER for ActiveX programs to run on your computer. Also STOP certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
    * Using SpywareBlaster to protect your computer from Spyware and Malware
    * If you don't know what ActiveX controls are, see here

    Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

    Also see Slow Computer? It May Not Be Malware for free cleaning/maintenance tools to help keep your computer running smooth.Thanks again, computer works great you guys are awesome!!
    4457.

    Solve : Messenger vanish after opening, incredimail don't open....?

    Answer»

    Every time i try to open my incredimail, i got the message :

    The correct version of flash is not currently INSTALLED. Flash by Macromedia is a popular animation plug-in and is a required Incredimail component. A very SIMPLE Flash installation page will SOON open.

    The installation from that page never be able to be installed, it never worked.
    What i did was:
    #to download the latest version of incredimail
    #Downloaded the lastest " Adobe Flash Player 10 Plugin
    #same for Adobe Shockwave Player 11
    after all that the result is the same, can't open and get the message.

    With my Yahoo! Messenger , after the little windows with all the contacts open, the windows close after a 50 seconds and the icon in the tray too.
    What i did was :
    #downloaded the latest version
    but the results are the same.



    A few days ago , I had a chat on Yahoo! Messenger with my cousin in Belgium and she had a computer back
    from repair and she is not a guru in computing we chated on a windows of Yahoo! Messenger looking very old version . I WANTED her to download the latest version before we keep chating but she could not do it, so we keep going on that old windows. Could someone took the opportunity to download a virus or malware
    on our PC?

    I don't know what to do to put back my pc in good order and i need help.
    Thanks
    My PC is on XP 3 desktop
    I use my Acronis to put my PC to working and ok now

    4458.

    Solve : Can't follow the Malware removal steps :(?

    Answer»

    Hi,

    I have another laptop that seems to have gone all wonky. It is a Toshiba Laptop that was originally for VISTA but the company wanted it to run XP PROFESSIONAL so they rigged it for XP. It has up to Service Pack 3 installed.

    I'm able to follow the removal steps up until SAS and Malware. Both programs can be downloaded but they won't execute from the desktop. I've even tried to rename Malware to just mbam and still didn't work. I can't even seem to install Hijack this either.HijackThis doesn't need installing - it should just run from the route of the main drive.

    Try PUTTING in the C:\ directory then reboot and access safe mode (F8 on boot up). Try running what scans you can there. You most likely won't be able to install anything in safe mode though.Hi thanks for the reply. I put the Hijack This in the c:\ root and then rebooted into safe mode. I tried to run it from there and same thing, nothing happens...i know it may sound stupid , ( if it is don't say so ) , did you try and right click and open them it works for me when they stall , harryThanks for the advice unfortunately I did try that and "run as" also, still no luck Click Start > Control Panel > System > Hardware > Device Manager > View > Show Hidden DEVICES.

    * Scroll down to Non-plug and Play Drivers and click the plus icon to open those drivers.
    * Search for any of the following:

    - Seneka.sys <- Or anything beginning with Seneka
    - clbdriver.sys <- Or anything beginning with clbdriver
    - TDSSserv.sys <- Or anything beginning with TDSS

    * Let me know if you find them or not.
    * If you do find it, right click on it, and select DISABLE. Do not try to uninstall them.
    * Now reboot and see if you can run the scans that would not run.

    4459.

    Solve : Virus wont let me past windows welcome screen?

    Answer»

    I did a VIRUS and spyware scan of my computer (XP) and they both found stuff and removed them and said to restart. After restart I click on my user account and ENTER my password and it goes as NORMAL and then I see my desktop for a split second and it logs me off. I tried to boot from disk and it asks me for administrator password? Anyone have any insight to this problem of mine? Any help would be greatly appreciated!Can you get into Safe Mode?unfortunatly the comp is asking for a password when i try to enter safe mode and i havent made any password. I read in another posting that there is no password but if i dont enter the pw it just restarts the comp.You've tried all available accounts in Safe Mode? None work?

    Do you have the WINDOWS XP CD?yes ive tried all accounts and i do have the XP cd but its that password thing.My virus scanner is AVG Free version if this helps?You're GOING to want to perform a Repair Install.

    http://www.michaelstevenstech.com/XPrepairinstall.htm

    4460.

    Solve : W32/Sdbot.worm.gen.g on Windows XP?

    Answer»

    So I got this nice LITTLE virus this afternoon and Spybot S&D and McAfee managed to supposedly delete the files concerned with it.
    But the original file that contained the virus was still on my system and if tried to delete would just open up the virus all over again, Joy.

    Now I already shut down my system restore before anything else.
    Then I closed all programs incase it was holding onto anything.

    Then the bad MOVE....I shut down my computer, usually a good idea this time not so much.

    Now when I restart my machine for some reason all that will start is WinRAR and it opens up with the folder that contains the file which contains the virus. No windows interface....nothing.

    So I'm now at a loss. Basically at the moment I am running programs by going through WinRAR to the specific folder and getting it to run that way.

    I can get CTRL, ALT, DELETE to work so can view all tasks and can't see anything too out of the blue on my processses list.

    Any advice? Since right now I'm seeing my only option to be to reformat my whole computer but it seems like this should be easier to sort?Can you reboot into safe mode and try ACCESSING the file to delete it?No I couldn't because it was asking me for my password in safe mode but my keyboard was DISABLED somehow.
    EITHER way I decided to just reformat my machine lol I had enough of it lol.

    4461.

    Solve : Friend computer bogged down with virus an malware?

    Answer»

    Ok here it goes
    My friends computer has been really screwed up. He GAVE it to me today to try and fix.
    it is an ACER T180 Running Win xp pro This is a box stock machine...

    I have followed the steps in the forum, and I have the log files. I have spent several hours working on this computer, and have pulled out Hundreds of infected files but I still have more that are showing up. Could someone take a look at the logs and let me know what else to do... Thank you
    Cbarnard

    [attachment deleted by admin]Disable Spybot's TeaTimer

    While TeaTimer is an excellent tool for the prevention of spyware, it can also interfere with HijackThis fixes. Please disable TeaTimer for now until you are clean.

    1. Right click Spybot in the System Tray (looks like a calendar with a padlock symbol). Choose Exit Spybot S&D RESIDENT
    2. Run Spybot S&D
    3. Go to the Mode menu, and make sure Advanced Mode is selected.
    4. On the left hand side, choose Tools > Resident
    uncheck Resident TeaTimer and OK any prompt and Restart your computer.

    Note:
    If TeaTimer gives you a warning afterwards that some changes were made, allow this instead of blocking it.

    If TeaTimer will not turn off then uninstall Spybot until we are done cleaning.

    ----------

    1. Close all open Web browsers.
    2. From the Start menu in Windows select Control Panel.
    3. Select Add or Remove Programs.
    4. In Add or Remove Programs select any of the following: (the names may be slightly different)

    - Ask.com
    - Ask Bar
    - Ask Desktop Search
    - Ask Search
    - Ask Toolbar

    5. Click Change/Remove for each and uninstall all found.

    ----------

    Open HijackThis and select Do a system scan only.

    Place a check mark next to the following entries: (if there)

    - R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = ASK.COM

    Important: Close all open windows except for HijackThis and then click Fix checked.

    Once completed, exit HijackThis.

    ----------

    Download ComboFix© by sUBs from one of the below links. Be sure top save it to the Desktop.

    Link #1
    Link #2

    **Note: It is important that it is saved directly to your Desktop

    Close any open Web browsers. (Firefox, Internet Explorer, etc) before starting ComboFix.

    Temporarily disable your antivirus, and any antispyware real time protection before performing a scan. Click this link to see a list of security programs that should be disabled and how to disable them.

    Double click combofix.exe & follow the prompts.
    When finished ComboFix will produce a log for you.
    Post the ComboFix log in your next reply.

    Important: Do not mouseclick ComboFix's window while it is running. That may cause it to stall.

    Remember to re-enable your antivirus and antispyware protection when ComboFix is complete.

    If you have problems with ComboFix usage, see How to use ComboFixHere is the log file Evilfantasy

    Sorry about the tea timer I forgot about it... I have deleted the entry as you asked. I was going to delete it before but I wanted a second opinion... Thank you

    [attachment deleted by admin]Delete these files/folders, as follows:

    1. Go to Start > Run > type Notepad.exe and click OK to open Notepad.
    It must be Notepad, not Wordpad.
    2. Copy the text in the below code box by highlighting all the text and pressing Ctrl+C

    Code: [Select]KillAll::

    File::
    c:\windows\ixonygiga.lib
    c:\documents and settings\All Users\Application Data\tinuw.vbs
    c:\windows\bemy.sys
    c:\windows\system32\lyjepusali.bin
    c:\program files\Common Files\onozedago.reg
    c:\windows\ilykysexuv.db
    c:\windows\pezeryxef._sy
    c:\program files\Common Files\opykawoni.dll

    3. Go to the Notepad window and click Edit > Paste
    4. Then click File > Save
    5. Name the file CFScript.txt - Save the file to your Desktop
    6. Then drag the CFScript (hold the left mouse button while dragging the file) and drop it (release the left mouse button) into ComboFix.exe as you see in the screenshot below. Important: Perform this instruction carefully!



    ComboFix will begin to execute, just follow the prompts.
    After reboot (in case it asks to reboot), it will produce a log for you.
    Post that log (Combofix.txt) in your next reply.

    Note: Do not mouseclick ComboFix's window while it is running. That may cause your system to freezehere is that logfile:


    [attachment deleted by admin]You have Viewpoint installed.

    Viewpoint Media Player/Manager/Toolbar is considered as Foistware instead of malware since it is installed without users approval but doesn't spy or do anything "bad".

    More INFORMATION:

    .
    It is suggested to remove the program now.
    Go to Start > Settings > Control Panel > Add/Remove Programs and remove the following programs if present.
    • Viewpoint
    • Viewpoint Manager
    • Viewpoint Media Player
    • Viewpoint Toolbar
    • Viewpoint Experience Technology
    .
    ----------

    • Click START then RUN
    • Now type Combofix /u in the runbox
    • Make sure there's a space between Combofix and /u
    • Then hit Enter.
    .
    .
    The above procedure will:
    • Delete:
      • ComboFix and its associated files and folders.
      • VundoFix backups, if present
      • The C:\Deckard folder, if present
      • The C:_OtMoveIt folder, if present
      • Reset the clock settings.
      • Hide file extensions, if required.
      • Hide System/Hidden files, if required.
      • Set a new, clean Restore Point.
      .
      ----------

      Delete temporary files

      Go to:
      • Start
      • Run
      • type: CLEANMGR.EXE
      • Press Enter.
      When prompted select the C: drive and click OK.
      Check the boxes for:
      • Temporary Internet Files
      • Downloaded Program Files
      • Recycle Bin
      • Temporary Files
      .
      Click OK or Enter

      ----------

      How is the computer running now?Thank you Evilfantasy,
      I deleted the viewpoint items. I should have seen that before...
      The computer SEEMS to be much better than it was, All though it is still slow. That is ok because they are going to upgrade it soon. Have a very good day, Thanks again...
      CbarnardI would also recommend that you Defrag the computer. There may be a lot of fragmented sections on the drive after cleaning the malware.

      You can use the built in Windows Defrag or a faster FREE program. Defraggler is very effective and easy to use. Be sure to clean out temp files and restart the computer just before using this.

      ----------

      Use the Secunia Software Inspector to check for out of date software.
      • Click Start Now
      • Check the box next to Enable thorough system inspection.
      • Click Start
      • Allow the scan to finish and scroll down to see if any updates are needed.
      • Update anything listed.
      .
      ----------

      Go to Microsoft Windows Update and get all critical updates.

      ----------

      I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

      SpywareBlaster - Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
      * Using SpywareBlaster to protect your computer from Spyware and Malware
      * If you don't know what ActiveX controls are, see here

      Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

      Also see Slow Computer? It May Not Be Malware for free cleaning/maintenance tools to help keep your computer running smooth.Thank you for your help EvilFantasy
      I have already Defragged the HDD... I used Auslogic Disc Defrag

      I also have already installed WOT and checked for updates for Micro, and Secunia
      and updated as needed.

      Thank you very much
      CbarnardJust writing back to follow up, I called my friend he said his computer is doing 100% better, and that it is running as well as the day he purchased it. I just want to say thank you again EvilFantasy
      4462.

      Solve : sysvxd.exe issue?

      Answer»

      I am receiving a message regarding an illegal action occurring in C:/program files/WINDOWS. I read up on a previous problem regarding this malware, and FOLLOWED your INSTRUCTIONS of "read this before requesting..."

      I have a Gateway tablet M-285e with Windows XP Pro Tablet Edition, 3 gigs of RAM, and an Intel Centrino Duo processor.

      The requested logs are attached. Any information is much appreciated.
      Thanks for your time.

      [ATTACHMENT deleted by admin]

      4463.

      Solve : WARNING!!?

      Answer»

      Hi,this morning i was UPDATING my
      anti spyware programs a squared free
      malware bites,And SPYWAREBLASRTER,
      spywareblaster had 91 updates so i
      downloaded them, NEXT Deep scan with
      Asquared free and found this,
      sdset.up.exe Packed win32.prepatch jiA2 HIGH risk..
      spywareblaster.exe. I sent details to a squared,
      removed infection sucsesfully and used Revo advansed
      uninstall,all seems WELL now if you already KNEW about
      this sorry for repeating it,Sorry for long post.........P..........

      4464.

      Solve : Beginner needs to confirm with expert that I have to Recover Hard Drive?

      Answer»

      Try this.

      1. Download IEFix.zip and run it.
      2. Click the APPLY button.
      3. You'll be prompted for the Operating System CD or the Service Pack Files location.


      If you don't have the Windows installation CD, and if the installation source files are not present in the hard disk, you may click Cancel when you see a dialog box pop up TYPE (or copy/paste) this FILE path:

      Code: [Select]c:\windows\ServicePackFiles\i386

      Or

      Code: [Select]C:\Windows\ServicePackFiles
      IEFix will CONTINUE with DLL registration part.

      Oh yeah!, you're good!, uh huh, uh huh, uh huh!


      Question:

      Do I click "cancel" or type the URL?

      OR Do I click cancel and type the URL?I haven't ran that in a while so I might be a little off. Whenever you get the dialog box then type in the file location then click OK.Thanks, here goes.Well that gave me a message that it wasn't supported by IE7. So I took a break and will get back with you tomorrow to see if you have any more ideas and I will ask around at work to see if I can borrow a CD for Windows XP.

      You have been so helpful. Have a good night.Hello, I was wondering about the IEFix.exe because I haven't been able to ask anyone at work about a CD. If the IEFix doesn't support IE 7 then could I download an older version of Internet Explorer, run the IEFix and have the same effect?You can uninstall IE7 and it will revert to IE6 automatically. It will?? Who'd thought? So if I were to do that... uninstall my IE 7 then I would automatically have IE 6 on my machine and I could run the IEFix.exe again to see what happens?Sounds like a plan. Can't guarantee it will work but it's worth a try.

      4465.

      Solve : pc shuts down after 40 seconds not able to run in safe mode as well?

      Answer»

      pc is infected and does not stay open for long.i also tried to go in safe mode and shuts off as well.i have WIN xp.is there a way that i could get in and run a spyware through the cd rom.pls help.

      thks
      mo The description of your problem is a BIT vague. For example, is it a laptop or desktop? What makes you think it's infected? When you SAY shuts off, you mean the computer completely turns off, yes? Can you give us greater DETAIL on the symptoms of the problems? When did they start? What are some of the things you did around the time the problem started? Etc.

      Assuming you have access to another computer, you could TRY: http://www.ultimatebootcd.com/

      There are a few anti-virus programs on there that can be run before entering Windows.

      4466.

      Solve : pc is sick , went from blue screen to rebooting?

      Answer»

      my friends pc had trouble with a blue screen on SATURDAY , then on sunday got an

      erorr ( no code ) and said PHYSICAL dumping taking place , and to-night the pc will not turn on

      keeps trying to reboot , windows XP , ie7 , harryYou have TOLD other people before not to double post. Then you do it yourself? sorry , but no i told them not to bump , the PROBLEM gets worse as the days go on

      4467.

      Solve : Nasty Infection, Please look over my Logs.?

      Answer»

      Hello all,

      I'm having trouble with a computer that is running Windows XP and having a svchost.exe error.

      Instruction at "0x7564d27e" referenced memory at "0x00000060". the memory could not be "read". Press on OK to terminate the program.

      Now this error never goes away, I've tried investigating it and can't seem to find a solution, I'm hoping someone here can help me.

      I've gone through the steps for Malware Removal and I'm attaching my logs here, please let me know if you need additional information as well!

      Thanks in ADVANCE for all your help!

      [attachment deleted by admin]Before you begin the SDFix instructions you should copy these instructions in a Notepad file and save them to your desktop or print them for easy reference. Much of SDFix will be done in Safe mode and you will be unable to access this web page after booting into Safe mode.

      Download SDFix by AndyManchesta and save it to your desktop.

      When using this tool, you must use the Administrator's account or an account with Administrative rights


      * Now, double-click on the SDFix icon that should now be residing on your desktop. If a Open File - Security Warning box opens, click on the Run button.
      * A window will now open showing SDFix being extracted into the C:\SDFix folder.
      * Once the installation program has finished extracting SDFix, it will open a Notepad with further instructions.
      * DO NOT use it just yet.

      Reboot your computer in Safe Mode using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow KEYS to navigate and select the option to run Windows in "Safe Mode".

      When your computer has started in safe mode, and you see the desktop, close all open Windows.

      * Click on the Start button, click on the Run menu option, and type the following text from the Code Box into the Open: field then click the OK button.

      Code: [Select]C:\SDFix\RunThis.bat
      * SDFix window will open containing some brief info and a disclaimer on the use of the tool.
      * Type Y on your keyboard and then press Enter to begin the cleanup process.
      * It will remove any Trojan Services or Registry Entries found then prompt you to press any key to Reboot.
      * Press any Key and it will restart the PC.
      * When the PC restarts, the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
      * Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt.
      * Copy and paste the contents of the results file Report.txt in your next reply along with a new HijackThis log (from normal boot mode).
      Thanks evilfantasy for taking the time to look at these. I've attached the new log files.

      [attachment deleted by admin]Go to Add/Remove Programs and uninstall:

      • My Web Search Bar Search Scope Monitor
      .
      ----------

      Open HijackThis and select Do a system scan only.

      Place a check mark next to the following entries: (if there)

      • F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe
      .
      Important: Close all windows except for HijackThis and then click Fix checked.

      Exit HijackThis.

      ----------

      Download ComboFix© by sUBs from one of the below links. Be sure top save it to the Desktop.

      Link #1
      Link #2

      **Note: It is important that it is saved directly to your Desktop

      Close any open Web BROWSERS. (Firefox, Internet Explorer, etc) before starting ComboFix.

      Temporarily disable your antivirus, and any antispyware real time protection before performing a scan. Click this link to see a list of security programs that should be disabled and how to disable them.

      Double click combofix.exe & follow the prompts.
      When finished ComboFix will produce a log for you.
      Post the ComboFix log in your next reply.

      Important: Do not MOUSECLICK ComboFix's window while it is running. That may cause it to stall.

      Remember to re-enable your antivirus and antispyware protection when ComboFix is complete.

      If you have problems with ComboFix usage, see How to use ComboFixHi,

      I'm not finding
      * My Web Search Bar Search Scope Monitor

      under add/remove programs. Is there another way to find it?Open HijackThis and select Do a system scan only.

      Place a check mark next to the following entries: (if there)

      • O4 - HKLM\..\Run: [My Web Search Bar Search Scope Monitor] "C:\PROGRA~1\MYWEBS~1\bar\1.bin\m3SrchMn.exe" /m=2 /w
      .
      Important: Close all windows except for HijackThis and then click Fix checked.

      Exit HijackThis.

      ----------

      Go to Start > Run and type notepad.exe then click OK

      Copy and paste the below into Notepad and save as fixme.reg to Your Desktop

      Code: [Select]REGEDIT4

      [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
      "My Web Search Bar Search Scope Monitor"=-

      Locate fixme.reg on your Desktop and double-click it. Answer Yes when prompted to merge with the Registry.

      Make sure that you tell me if you receive a success message about adding the above to the registry. If you do not get a success message, it did not work.

      Delete the fixme.reg from the Desktop.

      Now continue on with ComboFix.Quote from: evilfantasy on March 09, 2009, 06:19:42 PM


      Copy and paste the below into Notepad and save as fixme.reg to Your Desktop

      Code: [Select]REGEDIT4

      [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
      "My Web Search Bar Search Scope Monitor"=-

      Locate fixme.reg on your Desktop and double-click it. Answer Yes when prompted to merge with the Registry.

      Make sure that you tell me if you receive a success message about adding the above to the registry. If you do not get a success message, it did not work.

      Delete the fixme.reg from the Desktop.

      Now continue on with ComboFix.

      Hi again,
      I did receive a success message with the registry edit. Here is the combofix log attached.

      Cheers

      [attachment deleted by admin]Download the OTMoveIt3 by OldTimer

      Note: If you are running on Vista, right-click on OTMoveIt3.exe and choose Run As Administrator.

      * Save it to your Desktop.
      * Double-click OTMoveIt3.exe to run it.
      * Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy)

      Code: [Select]:Processes
      explorer.exe

      :services
      gaopdxserv
      gaopdxl

      :Commands
      [purity]
      [emptytemp]
      [start explorer]
      [Reboot]

      * Return to OTMoveIt3, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
      * Click the red Moveit! button.
      * Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
      Close OTMoveIt3

      Note: If a file or folder cannot be moved immediately you may be asked to reboot your computer in order to finish the move process. If asked to reboot, choose Yes. If not, reboot anyway.

      Also let me know how the computer is running now.Hi,

      Thanks again for all your help! Computer is definitely working better No more svchost errors or anything. Here is the OTMoveit information:

      ========== PROCESSES ==========
      Process explorer.exe killed successfully.
      ========== SERVICES/DRIVERS ==========
      Unable to stop service gaopdxserv .
      Unable to stop service gaopdxl .
      ========== COMMANDS ==========
      File delete failed. C:\DOCUME~1\NATALI~1\LOCALS~1\Temp\etilqs_Z7jKkLQEJX9mSUKEX5Yo scheduled to be deleted on reboot.
      User's Temp folder emptied.
      User's Temporary Internet Files folder emptied.
      User's Internet Explorer cache folder emptied.
      Local Service Temp folder emptied.
      File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
      Local Service Temporary Internet Files folder emptied.
      Windows Temp folder emptied.
      Java cache emptied.
      File delete failed. C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\Cache\_CACHE_001_ scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\Cache\_CACHE_002_ scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\Cache\_CACHE_003_ scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\Cache\_CACHE_MAP_ scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\urlclassifier3.sqlite scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\XUL.mfl scheduled to be deleted on reboot.
      FireFox cache emptied.
      Temp folders emptied.
      Explorer started successfully

      OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 03092009_181439

      Files moved on Reboot...
      File C:\DOCUME~1\NATALI~1\LOCALS~1\Temp\etilqs_Z7jKkLQEJX9mSUKEX5Yo not found!
      File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
      C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\Cache\_CACHE_001_ moved successfully.
      C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\Cache\_CACHE_002_ moved successfully.
      C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\Cache\_CACHE_003_ moved successfully.
      C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\Cache\_CACHE_MAP_ moved successfully.
      C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\urlclassifier3.sqlite moved successfully.
      C:\Documents and Settings\Natalie Garfield\Local Settings\Application Data\Mozilla\Firefox\Profiles\vvxv5i3j.default\XUL.mfl moved successfully.
      OK looks good.

      • Click START then RUN
      • Now type Combofix /u in the runbox
      • Make sure there's a space between Combofix and /u
      • Then HIT Enter.
      .
      .
      The above procedure will:
      • Delete:
        • ComboFix and its associated files and folders.
        • VundoFix backups, if present
        • The C:\Deckard folder, if present
        • The C:_OtMoveIt folder, if present
        • Reset the clock settings.
        • Hide file extensions, if required.
        • Hide System/Hidden files, if required.
        • Set a new, clean Restore Point.
        .
        ----------

        1. Double click OTMoveIt3.exe to launch it.
        Vista users right click and choose Run As Administrator
        2. Click on the CleanUp! button.
        3. OTMoveIt2 will download a list from the Internet, if your firewall or other defensive programs alerts you, allow it access.
        4. Click YES at the next prompt (list downloaded, Do you want to begin cleanup process?)
        5. Once complete exit out of OTMoveIt3

        ----------

        Use the Secunia Software Inspector to check for out of date software.
        • Click Start Now
        • Check the box next to Enable thorough system inspection.
        • Click Start
        • Allow the scan to finish and scroll down to see if any updates are needed.
        • Update anything listed.
        .
        ----------

        Go to Microsoft Windows Update and get all critical updates.

        ----------

        Here are some great FREE tools to help you keep from getting infected again. These tools use little or no resources so won't slow down your PC.

        I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

        SpywareBlaster - Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
        * Using SpywareBlaster to protect your computer from Spyware and Malware
        * If you don't know what ActiveX controls are, see here

        Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

        Also see Slow Computer? It May Not Be Malware for free cleaning/maintenance tools to help keep your computer running smooth.Hi and thanks again evilfantasy!! Computer is working brilliantly again, really appreciate all your help! Your welcome.

        Safe surfing...
        4468.

        Solve : please check this?

        Answer»

        I don't really know whether my computer has (again) a virus or something or not. But please scan this anyway. btw, MBAM and SAS showed me that I'm clean. But the HJT a particular (no name) that I was curious of..
        ---------------------------------------------------------------------------------------------------
        O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)

        [attachment deleted by admin]That's just an empty BHO from Yahoo. It can be safely fixed.

        Open HijackThis and SELECT Do a system scan only.

        Place a check mark next to the following entries: (if there)

        • R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
        • O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
        • O20 - AppInit_DLLs:
        .
        Important: Close all windows except for HijackThis and then click Fix checked.

        Exit HijackThis.ohh thanks maybe I was PARANOID of having viruses once more
        4469.

        Solve : Laptop infected with W32.Rontokbro@mm?

        Answer»

        Delete these files/folders, as follows:

        1. Go to Start > Run > type Notepad.exe and click OK to open Notepad.
        It must be Notepad, not Wordpad.
        2. Copy the text in the below code box by highlighting all the text and pressing Ctrl+C

        Code: [Select]KillAll::

        Registry::
        [-HKEY_LOCAL_MACHINE\software\microsoft\WINDOWS nt\currentversion\winlogon\notify\psfus]
        3. Go to the Notepad window and click Edit > Paste
        4. Then click File > Save
        5. Name the file CFScript.txt - Save the file to your Desktop
        6. Then drag the CFScript (hold the left mouse button while dragging the file) and drop it (release the left mouse button) into ComboFix.exe as you see in the screenshot below. Important: Perform this instruction carefully!



        ComboFix will begin to execute, just follow the prompts.
        After reboot (in case it asks to reboot), it will produce a log for you.
        Post that log (Combofix.txt) in your next reply.

        Note: Do not mouseclick ComboFix's window while it is running. That may cause your system to freeze
        i did it, here's the latest log:


        ComboFix 09-02-19.01 - Adeeba 2009-02-22 18:02:12.2 - NTFSx86
        Microsoft® Windows Vista™ Home Premium 6.0.6000.0.1252.1.1033.18.3581.2540 [GMT -3:00]
        Running from: c:\users\Adeeba\Desktop\ComboFix.exe
        Command switches used :: c:\users\Adeeba\Desktop\CFScript.txt
        AV: Norton Internet Security *On-access scanning disabled* (Updated)
        FW: Norton Internet Security *disabled*
        * Created a new restore point
        .

        ((((((((((((((((((((((((( Files Created from 2009-01-22 to 2009-02-22 )))))))))))))))))))))))))))))))
        .

        2009-02-22 17:12 . 2009-02-22 17:12d--------c:\users\All Users\Malwarebytes
        2009-02-22 17:12 . 2009-02-22 17:12d--------c:\users\Adeeba\AppData\Roaming\Malwarebytes
        2009-02-22 17:12 . 2009-02-22 17:12d--------c:\programdata\Malwarebytes
        2009-02-22 17:12 . 2009-02-22 17:12d--------c:\program files\Malwarebytes' Anti-MALWARE
        2009-02-22 17:12 . 2009-02-11 10:1938,496--a------c:\windows\System32\drivers\mbamswissarmy.sys
        2009-02-22 17:12 . 2009-02-11 10:1915,504--a------c:\windows\System32\drivers\mbam.sys
        2009-02-18 13:35 . 2009-02-18 13:46d--------c:\users\Adeeba\AppData\Roaming\Dev-Cpp
        2009-02-18 13:34 . 2009-02-18 13:34d--------C:\Dev-Cpp
        2009-02-18 10:05 . 2008-12-05 01:261,244,672--a------c:\windows\System32\mcmde.dll
        2009-02-18 10:05 . 2008-12-05 01:29428,032--a------c:\windows\System32\EncDec.dll
        2009-02-18 10:05 . 2008-12-05 01:28292,352--a------c:\windows\System32\psisdecd.dll
        2009-02-18 10:05 . 2008-12-05 01:28217,088--a------c:\windows\System32\psisrndr.ax
        2009-02-18 10:05 . 2008-12-05 01:29177,152--a------c:\windows\System32\mpg2splt.ax
        2009-02-18 10:05 . 2008-12-05 01:2780,896--a------c:\windows\System32\MSNP.ax
        2009-02-18 10:05 . 2008-12-05 01:2768,608--a------c:\windows\System32\Mpeg2Data.ax
        2009-02-18 10:05 . 2008-12-05 01:2757,856--a------c:\windows\System32\MSDvbNP.ax
        2009-02-11 19:09 . 2009-02-11 19:09118--a------c:\windows\System32\MRT.INI
        2009-02-07 23:08 . 2009-02-08 01:10d--------c:\windows\BDOSCAN8
        2009-01-24 23:09 . 2009-02-12 20:16d--------c:\users\Adeeba\random

        .
        (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
        .
        2009-02-22 20:42---------d-----wc:\programdata\Symantec
        2009-02-22 18:46---------d-----wc:\programdata\Roxio
        2009-02-12 06:00---------d-----wc:\program files\Windows Mail
        2009-02-11 19:15---------d-----wc:\users\Adeeba\AppData\Roaming\LimeWire
        2009-01-21 23:08---------d-----wc:\programdata\CyberLink
        2009-01-15 04:1652,736----a-wc:\windows\AppPatch\iebrshim.dll
        2009-01-08 01:3927,934----a-wc:\users\All Users\nvModes.dat
        2009-01-08 01:3927,934----a-wc:\programdata\nvModes.dat
        2009-01-06 21:35---------d-----wc:\users\Adeeba\AppData\Roaming\DivX
        2009-01-06 21:32---------d-----wc:\program files\DivX
        2009-01-06 21:32---------d-----wc:\program files\Common Files\PX Storage Engine
        2009-01-06 19:23806----a-wc:\windows\system32\drivers\SYMEVENT.INF
        2009-01-06 19:23124,464----a-wc:\windows\system32\drivers\SYMEVENT.SYS
        2009-01-06 19:2310,635----a-wc:\windows\system32\drivers\SYMEVENT.CAT
        2009-01-06 19:23---------d-----wc:\program files\Symantec
        2008-12-29 16:20---------d-----wc:\users\Guest\AppData\Roaming\vlc
        2008-12-10 19:17174--sha-wc:\program files\desktop.ini
        2008-10-05 02:370----a-wc:\users\Adeeba\AppData\Roaming\wklnhst.dat
        2008-09-04 22:0076--sh--rc:\windows\CT4CET.bin
        .

        ((((((((((((((((((((((((((((( [emailprotected]_15.59.16.77 )))))))))))))))))))))))))))))))))))))))))
        .
        - 2009-02-22 18:55:28262,144--sha-wc:\windows\ServiceProfiles\LocalService\NTUSER.DAT
        + 2009-02-22 21:06:22262,144--sha-wc:\windows\ServiceProfiles\LocalService\NTUSER.DAT
        - 2009-02-22 18:55:28262,144--sha-wc:\windows\ServiceProfiles\NetworkService\NTUSER.DAT
        + 2009-02-22 21:06:22262,144--sha-wc:\windows\ServiceProfiles\NetworkService\NTUSER.DAT
        - 2009-02-22 18:55:1216,384--sha-wc:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
        + 2009-02-22 21:06:1216,384--sha-wc:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
        - 2009-02-22 18:55:1232,768--sha-wc:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
        + 2009-02-22 21:06:1232,768--sha-wc:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
        - 2009-02-22 18:55:1216,384--sha-wc:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
        + 2009-02-22 21:06:1216,384--sha-wc:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
        - 2009-02-22 18:56:536,076----a-wc:\windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-1626518161-2929080396-116505275-1000_UserData.bin
        + 2009-02-22 20:48:156,092----a-wc:\windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-1626518161-2929080396-116505275-1000_UserData.bin
        - 2009-02-22 18:56:5372,356----a-wc:\windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin
        + 2009-02-22 20:48:1572,356----a-wc:\windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin
        - 2009-02-22 17:18:3943,140----a-wc:\windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin
        + 2009-02-22 20:48:1443,140----a-wc:\windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin
        .
        ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
        .
        .
        *Note* empty entries & legit default entries are not shown
        REGEDIT4

        [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\UEAFOverlay]
        @="{F2F31467-B1AC-4df0-AE79-FD5FA085E22B}"
        [HKEY_CLASSES_ROOT\CLSID\{F2F31467-B1AC-4df0-AE79-FD5FA085E22B}]
        2007-04-17 01:13721408--a------c:\program files\Fingerprint Reader Suite\farchns.dll

        [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\UEAFOverlayOpen]
        @="{A3E208F7-0E3A-4182-A7A6-B169D5D691AA}"
        [HKEY_CLASSES_ROOT\CLSID\{A3E208F7-0E3A-4182-A7A6-B169D5D691AA}]
        2007-04-17 01:13721408--a------c:\program files\Fingerprint Reader Suite\farchns.dll

        [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
        "Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2008-09-05 1232896]
        "ehTray.exe"="c:\windows\ehome\ehTray.exe" [2006-11-02 125440]
        "PC Suite Tray"="c:\program files\Nokia\Nokia PC Suite 7\PCSuite.exe" [2008-10-02 1124352]
        "DellSupportCenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2008-08-14 206064]
        "FactFinder"="c:\program files\Microsoft FactFinder\ff.exe" [2001-06-22 81920]
        "Nokia.PCSync"="c:\program files\Nokia\Nokia PC Suite 7\PCSync2.exe" [2008-06-17 1249280]
        "WMPNSCFG"="c:\program files\Windows MEDIA Player\WMPNSCFG.exe" [2006-11-02 201728]

        [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
        "Apoint"="c:\program files\DellTPad\Apoint.exe" [2008-01-25 167936]
        "OEM02Mon.exe"="c:\windows\OEM02Mon.exe" [2008-03-04 36864]
        "NvSvc"="c:\windows\system32\nvsvc.dll" [2008-04-09 166432]
        "NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-04-09 13515296]
        "NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-04-09 92704]
        "NVHotkey"="c:\windows\system32\nvHotkey.dll" [2008-04-09 92704]
        "Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2008-05-16 3444736]
        "PSQLLauncher"="c:\program files\Fingerprint Reader Suite\launcher.exe" [2007-04-17 49168]
        "IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" [2007-03-21 174872]
        "dscactivate"="c:\program files\Dell Support Center\gs_agent\custom\dsca.exe" [2008-03-11 16384]
        "PCMService"="c:\program files\Dell\MediaDirect\PCMService.exe" [2007-12-21 184320]
        "ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2008-10-17 51048]
        "TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2008-10-19 185872]
        "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-10-15 39792]
        "DellSupportCenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2008-08-14 206064]
        "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-11-04 413696]
        "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-11-20 290088]
        "MRT"="c:\windows\system32\MRT.exe" [2009-02-03 21244864]

        c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
        QuickSet.lnk - c:\program files\Dell\QuickSet\quickset.exe [2008-02-22 1193240]

        [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
        "DisableCAD"= 1 (0x1)

        [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\GoToAssist]
        2008-09-04 19:12 10536 c:\program files\Citrix\GoToAssist\514\g2awinlogon.dll

        [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
        Notification PackagesREG_MULTI_SZ scecli psqlpwd

        [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
        @="Driver"

        [HKEY_LOCAL_MACHINE\software\microsoft\security center]
        "UacDisableNotify"=dword:00000001
        "InternetSettingsDisableNotify"=dword:00000001
        "AutoUpdateDisableNotify"=dword:00000001

        [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
        "DisableMonitoring"=dword:00000001

        [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
        "DisableMonitoring"=dword:00000001

        [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
        "DisableMonitoring"=dword:00000001

        [HKLM\~\services\sharedaccess\parameters\firewallpolicy\DomainProfile]
        "EnableFirewall"= 0 (0x0)

        [HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
        "{7B3C4EB0-20B3-4B89-B248-E7810C130E59}"= c:\program files\Dell\MediaDirect\MediaDirect.exe:Dell MediaDirect
        "{627A842B-3E8F-4799-8213-1861B640F3D1}"= c:\program files\Dell\MediaDirect\PCMService.exe:CyberLink PowerCinema Resident Program
        "{AC91ED12-8024-4F90-8F4A-C628C30B6DD7}"= c:\program files\Dell\MediaDirect\Kernel\DMP\CLBrowserEngine.exe:Cyberlink Media Server Browser Engine
        "{0DFC109E-7369-4ADC-9E57-33354C1291D6}"= c:\program files\Dell\MediaDirect\Kernel\DMS\CLMSService.exe:CyberLink Media Server
        "{57656B01-03BC-482E-999C-C75AA8FD923B}"= UDP:c:\program files\Bonjour\mDNSResponder.exe:Bonjour
        "{9FFA8897-FF49-48DC-A83A-3C507F856C54}"= TCP:c:\program files\Bonjour\mDNSResponder.exe:Bonjour
        "{3DDA4CA1-59F3-409D-B5A4-A7C6CA5D3558}"= UDP:c:\program files\iTunes\iTunes.exe:iTunes
        "{EF8B4C7D-510D-412C-88FF-0C61E0323733}"= TCP:c:\program files\iTunes\iTunes.exe:iTunes
        "{1020596F-1992-4F0B-BC16-78FF0BC3340F}"= UDP:c:\program files\LimeWire\LimeWire.exe:LimeWire
        "{E5558807-9126-4799-B51D-94498BC8F93D}"= TCP:c:\program files\LimeWire\LimeWire.exe:LimeWire
        "{C2D15551-E4C0-49B7-B83F-8A3ACEF8DA08}"= c:\program files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone)
        "{821A94FD-6723-401C-AAE0-1059373787BC}"= UDP:c:\program files\iTunes\iTunes.exe:iTunes
        "{602E7440-16D9-4512-A78E-980FE6A2406D}"= TCP:c:\program files\iTunes\iTunes.exe:iTunes

        [HKLM\~\services\sharedaccess\parameters\firewallpolicy\PublicProfile]
        "EnableFirewall"= 0 (0x0)

        [HKLM\~\services\sharedaccess\parameters\firewallpolicy\RestrictedServices\Static\System]
        "DFSR-1"= RPort=5722|UDP:%SystemRoot%\system32\svchost.exe|Svc=DFSR:Allow inbound TCP traffic|

        [HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile]
        "EnableFirewall"= 0 (0x0)

        R1 IDSvix86;Symantec Intrusion Prevention Driver;c:\progra~2\Symantec\DEFINI~1\SymcData\ipsdefs\20090212.002\IDSvix86.sys [2009-02-16 270384]
        R2 AESTFilters;Andrea ST Filters Service;c:\windows\System32\AEstSrv.exe [2008-09-04 73728]
        R2 LiveUpdate Notice;LiveUpdate Notice;c:\program files\Common Files\Symantec Shared\CCSVCHST.EXE [2008-10-27 149352]
        R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2008-10-07 99376]
        R3 OEM02Dev;Creative Camera OEM002 Driver;c:\windows\System32\drivers\OEM02Dev.sys [2008-09-05 235648]
        R3 OEM02Vfx;Creative Camera OEM002 Video VFX Driver;c:\windows\System32\drivers\OEM02Vfx.sys [2008-09-05 7424]
        R3 SYMNDISV;SYMNDISV;c:\windows\System32\drivers\symndisv.sys [2008-06-13 41008]
        S3 cmo_bus;Data Modem @ CDMA Composite Device driver (WDM);c:\windows\System32\drivers\cmo_bus.sys [2008-10-05 58352]
        S3 cmo_mdfl;Data Modem @ CDMA Filter;c:\windows\System32\drivers\cmo_mdfl.sys [2008-10-05 8304]
        S3 cmo_mdm;Data Modem @ CDMA Drivers;c:\windows\System32\drivers\cmo_mdm.sys [2008-10-05 93904]
        S3 COH_Mon;COH_Mon;c:\windows\System32\drivers\COH_Mon.sys [2007-05-29 23888]
        S4 iaNvStor;Intel(R) Turbo Memory Controller;c:\windows\System32\drivers\iaNvStor.sys [2008-09-05 209408]

        --- Other Services/Drivers In Memory ---

        *NewlyCreated* - COMHOST

        [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{fc790409-b5e1-11dd-8c0e-002268995227}]
        \shell\AutoRun\command - G:\LaunchU3.exe -a
        .
        Contents of the 'Scheduled Tasks' folder

        2009-01-19 c:\windows\Tasks\Norton Internet Security - Run Full System Scan - Adeeba.job
        - c:\program files\Norton Internet Security\Norton AntiVirus\Navw32.exe [2007-08-26 14:19]

        2009-02-22 c:\windows\Tasks\User_Feed_Synchronization-{A17C346D-D918-4BF3-888D-B1FAD8D6E04B}.job
        - c:\windows\system32\msfeedssync.exe [2006-11-02 06:45]
        .
        .
        ------- Supplementary Scan -------
        .
        uInternet Settings,ProxyOverride = *.local
        IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
        TCP: {8EAB7167-A061-4B3E-95F2-205C02AA3EA6} = 196.3.132.1 196.3.132.4
        .

        **************************************************************************

        catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
        Rootkit scan 2009-02-22 18:06:25
        Windows 6.0.6000 NTFS

        scanning hidden processes ...

        scanning hidden autostart entries ...

        scanning hidden files ...


        **************************************************************************
        .
        --------------------- DLLs Loaded Under Running Processes ---------------------

        - - - - - - - > 'lsass.exe'(652)
        c:\windows\system32\psqlpwd.dll
        c:\program files\Fingerprint Reader Suite\homefus2.dll
        c:\program files\Fingerprint Reader Suite\infra.dll

        - - - - - - - > 'Explorer.exe'(1952)
        c:\program files\Fingerprint Reader Suite\farchns.dll
        c:\program files\Fingerprint Reader Suite\infra.dll
        c:\program files\Microsoft FactFinder\FFMH.DLL
        c:\users\Adeeba\AppData\Local\Temp\catchme.dll
        .
        ------------------------ Other Running Processes ------------------------
        .
        c:\windows\System32\audiodg.exe
        c:\program files\Fingerprint Reader Suite\upeksvr.exe
        c:\windows\System32\WLTRYSVC.EXE
        c:\windows\System32\BCMWLTRY.EXE
        c:\windows\System32\wlanext.exe
        c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
        c:\program files\Bonjour\mDNSResponder.exe
        c:\program files\Intel\Intel Matrix Storage Manager\IAANTmon.exe
        c:\program files\Dell Support Center\bin\sprtsvc.exe
        c:\windows\System32\stacsv.exe
        c:\windows\System32\rundll32.exe
        c:\windows\System32\rundll32.exe
        c:\windows\System32\rundll32.exe
        c:\combofix\hidec.exe
        c:\program files\DellTPad\ApMsgFwd.exe
        c:\program files\Windows Media Player\wmpnetwk.exe
        c:\program files\DellTPad\hidfind.exe
        c:\program files\DellTPad\ApntEx.exe
        c:\windows\ehome\ehmsas.exe
        c:\program files\iPod\bin\iPodService.exe
        c:\program files\Fingerprint Reader Suite\psqltray.exe
        c:\program files\PC Connectivity Solution\ServiceLayer.exe
        c:\program files\PC Connectivity Solution\Transports\NclUSBSrv.exe
        c:\program files\Common Files\Nokia\MPAPI\MPAPI3s.exe
        c:\program files\PC Connectivity Solution\Transports\NclRSSrv.exe
        c:\program files\Dell Support Center\gs_agent\dsc.exe
        c:\program files\Symantec\LiveUpdate\AluSchedulerSvc.exe
        c:\combofix\Catchme.tmp
        c:\windows\System32\dllhost.exe
        .
        **************************************************************************
        .
        Completion time: 2009-02-22 18:11:25 - machine was rebooted
        ComboFix-quarantined-files.txt 2009-02-22 21:10:05
        ComboFix2.txt 2009-02-22 19:01:42

        Pre-Run: 78,872,215,552 bytes free
        Post-Run: 78,635,069,440 bytes free

        242--- E O F ---2009-02-18 17:31:34





        thanks

          • Click START then RUN
          • Now type Combofix /u in the runbox
          • Make sure there's a space between Combofix and /u
          • Then hit Enter.
          • The above procedure will:
          • Delete the following:
          • ComboFix and its associated files and folders.
          • Reset the clock settings.
          • Hide file extensions, if required.
          • Hide System/Hidden files, if required.
          • Set a new, clean Restore Point.
          .
          ----------

          Use the
        Kaspersky Lab Online Scanner

        In Microsoft Windows Vista, you must open the Web browser using the Run as Administrator command. From the Desktop right click the icon to open the browser and choose Run as Administrator.

        • Click on SCAN NOW
        • Click Accept.
        • The program will then begin downloading the latest definition files.
        • Once the files have been downloaded locate the Scan Settings and have it scan My Computer.
        • The scan will take a while, so be patient and let it finish.
        When the scan is done, in the Scan is complete window, any infection is displayed.
        There is no option to clean/disinfect, however, we need to analyze the information on the report.

        To obtain the report:
        Click on: Save Report As
        • Next, in the Save as prompt, Save in area, select: Desktop.
        • In the File name area use KScan, or something similar.
        • In Save as type: click the drop arrow and select: Text file [*.txt]
        • Then, click: Save


        Copy and paste the Kaspersky Online Scanner Report in your next reply.

        Note for Internet Explorer 7 users: If at any time you have trouble viewing the accept button of the license, click on the Zoom tool located at the bottom right of the IE window and set the zoom to 75%. Once the license is accepted, reset to 100%.

        i could kick myself for what i've done. i inserted my flash drive (which was the source of the worm) to run Flash Disinfector, but somehow it didn't work, and now i've re-infected the laptop. i even SCANNED the flash drive with Norton Internet Security and it came up clean, i don't understand.

        i've already uninstalled combofix, but i'll download it again and run it once more. i don't believe it, but i'm back to square one.

        Run Flash Disinfector first, then install and run ComboFix.
        hello again

        sorry for the delay in my response. i ran the Windows Malicious Software Removal Tool, and it seems to have worked. all the symptoms of the worm seem to be gone now. i also ran flash disinfector for my flash drive on another computer that has XP, since i think maybe it doesn't run properly on Vista. but so far so good.

        thank you immensely for all your help!!

        4470.

        Solve : possible virus/trojan?

        Answer»

        I have zonealarm pro installed on my system and the virus check stated i had a possible virus and said that it was unable to remove. I think i may have it safely quarantined at the moment. i have followed the initial instructions and have posted my logs. Any help to see if I am now safe would be appreciated.


        [attachment deleted by admin]Use the Kaspersky Lab Online Scanner

        In Microsoft Windows Vista, you must open the Web browser using the Run as Administrator command. From the Desktop right click the icon to open the browser and choose Run as Administrator.

        • Click on SCAN NOW
        • Click Accept.
        • The program will then begin downloading the latest definition files.
        • Once the files have been downloaded locate the Scan Settings and have it scan My Computer.
        • The scan will take a while, so be patient and let it finish.
        When the scan is done, in the Scan is complete window, any infection is displayed.
        There is no option to clean/disinfect, however, we need to analyze the information on the report.

        To obtain the report:
        Click on: Save Report As
        • Next, in the Save as prompt, Save in area, select: Desktop.
        • In the File name area use KScan, or something similar.
        • In Save as type: click the drop arrow and select: Text file [*.txt]
        • Then, click: Save


        Copy and paste the Kaspersky Online Scanner Report in your next reply.

        Note for Internet Explorer 7 users: If at any time you have trouble viewing the accept button of the license, click on the Zoom tool located at the bottom right of the IE window and set the zoom to 75%. Once the license is accepted, reset to 100%.unable to use the kaspersky online scanner. Keep getting error that it is unable to start. No other virus scanners or malware scanner is running while trying.Download ComboFix© by sUBs from one of the below links. Be sure top save it to the Desktop.

        LINK #1
        Link #2

        **Note: It is important that it is saved directly to your Desktop

        Close any open Web browsers. (Firefox, Internet Explorer, etc) before starting ComboFix.

        Temporarily disable your antivirus, and any antispyware real time protection before performing a scan. Click this link to see a list of security programs that should be DISABLED and how to disable them.

        Double click combofix.exe & follow the prompts.
        When finished ComboFix will produce a log for you.
        Post the ComboFix log in your next reply.

        Important: Do not MOUSECLICK ComboFix's window while it is running. That may cause it to stall.

        Remember to re-enable your antivirus and antispyware protection when ComboFix is complete.

        If you have problems with ComboFix usage, see How to use ComboFixok forgot to turn off zonealarm and its forcefield for the browser and kaspersky is now running and i am waiting on the result. Should i let it finish and submit the log or do you want me to run combofix also?Do the Kaspersky first. ComboFix might not be needed.Here is the kaspersky log.

        [attachment deleted by admin]Did you install mIRC?yes long time agoOK looks good then.

        How is the computer running now? seems to be ok. no problemsDelete ComboFix, we won't need it.

        Final steps.

        Clear your System Restore of infected Restore points.

        • Go to Start, then Programs, then Accessories, then System Tools
        • Choose System Restore
        • When the program starts, make sure that Create a Restore Point is checked, the click Next
        • Give the restore point a name, then click Create, then Close to complete
        .
        ----------

        Use the Secunia Software Inspector to check for out of date software.
        • Click Start Now
        • Check the box next to Enable thorough system inspection.
        • Click Start
        • Allow the scan to finish and scroll down to see if any UPDATES are needed.
        • Update anything listed.
        .
        ----------

        Go to Microsoft Windows Update and get all critical updates.

        ----------

        I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

        SpywareBlaster - Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
        * Using SpywareBlaster to protect your computer from Spyware and Malware
        * If you don't know what ActiveX controls are, see here

        Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

        Also see Slow Computer? It May Not Be Malware for free cleaning/maintenance tools to help keep your computer running smooth.Thank you for all your help. Really appreciate it Your welcome.

        Safe surfing...
        4471.

        Solve : Rootkit Safety Question?

        Answer»

        So I very stupidly and accidentally downloaded a rootkit and my comps a mess. I tried this removal kit thing that some university put ONLINE to help get rid of it, but it didn't really work. I don't even want my comp anymore, but my music and photos and personal files are on there. My question is is it safe to transfer my files to an external hard drive with the rootkit still on my comp or will it infect the external hardrive as well? Are the files infected? Do I need to get rid of the rootkit first? PLEASE HELP ME!!!How do you know it's a rootkit?

        Rootkits very seldom come alone. There is USUALLY some other form of malware along with them so it's best to either wipe the drive or clean it. We can help with the cleaning and you won't loose anything.

        Just need to work with me and we will get it taken care of. First we need to find it.

        Download Rooter.exe to your desktop

        * Double click Rooter.exe to start the tool.
        * A DOS window will appear and show the scan progress.
        * Once complete a notepad file containing the report will open.
        * COPY & paste the results in your next reply.
        * Close notepad and Rooter will close.

        A log will also save at %systemdrive%\Rooter.txt (Where %systemdrive% is usually C: or the drive that you have Windows installed).

        ----------

        Download TrendMicro HijackThis.exe (HJT) to the Desktop.

        • Double-click on HJTInstall.
        • Click on the Install button.
        • It will automatically place HJT in C:\Program Files\TrendMicro\HijackThis\HijackThis.exe.
        • Upon install, HijackThis should open for you.
        • Click on the Do a system scan and save a log file button
        • HijackThis will scan and then a log will open in notepad.
        • Copy and then paste the entire contents of the log in your post.
        • Do not have HijackThis fix anything yet. Most of what it finds will be harmless or even required.
        Thanks for your help, let me know what to do!


        From Rooter.exe Notpad:

        Microsoft Windows XP Home Edition (5.1.2600) Service Pack 2

        C:\ [Fixed] - NTFS - (Total:38115 Mo/Free:2690 Mo)
        D:\ [CD-Rom] (Total:0 Mo/Free:0 Mo)

        MON 03/09/2009|12:18

        ----------------------\\ Processes..

        --Locked-- [System Process]
        ---------- System
        ---------- \SystemRoot\System32\smss.exe
        ---------- \??\C:\WINDOWS\system32\csrss.exe
        ---------- \??\C:\WINDOWS\system32\winlogon.exe
        ---------- C:\WINDOWS\system32\services.exe
        ---------- C:\WINDOWS\system32\lsass.exe
        ---------- C:\WINDOWS\system32\svchost.exe
        ---------- C:\WINDOWS\system32\svchost.exe
        ---------- C:\WINDOWS\System32\svchost.exe
        ---------- C:\WINDOWS\system32\svchost.exe
        ---------- C:\WINDOWS\system32\svchost.exe
        ---------- C:\WINDOWS\system32\spoolsv.exe
        ---------- C:\Program Files\CA\SharedComponents\HIPSEngine\UmxCfg.exe
        ---------- C:\Program Files\CA\SharedComponents\HIPSEngine\UmxFwHlp.exe
        ---------- C:\Program Files\CA\SharedComponents\HIPSEngine\UmxPol.exe
        ---------- C:\Program Files\CA\SharedComponents\HIPSEngine\UmxAgent.exe
        ---------- C:\WINDOWS\System32\SCardSvr.exe
        ---------- C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
        ---------- C:\WINDOWS\System32\Ati2evxx.exe
        ---------- C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\ISafe.exe
        ---------- C:\Program Files\CA\SharedComponents\PPRT\bin\ITMRTSVC.exe
        ---------- C:\WINDOWS\system32\svchost.exe
        ---------- C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\VetMsg.exe
        ---------- C:\Program Files\Canon\CAL\CALMAIN.exe
        ---------- C:\WINDOWS\Explorer.EXE
        ---------- C:\WINDOWS\System32\alg.exe
        ---------- C:\Program Files\CA\CA Internet Security Suite\CA Personal Firewall\capfsem.exe
        ---------- C:\WINDOWS\system32\pctspk.exe
        ---------- C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
        ---------- C:\Program Files\iTunes\iTunesHelper.exe
        ---------- C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
        ---------- C:\Program Files\CA\CA Internet Security Suite\cctray\cctray.exe
        ---------- C:\Program Files\CA\CA Internet Security Suite\CA Anti-Spam\QSP-5.1.18.0\QOELoader.exe
        ---------- C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\CAVRID.exe
        ---------- C:\Program Files\CA\CA Internet Security Suite\CA Personal Firewall\capfasem.exe
        ---------- C:\Program Files\UnHackMe\hackmon.exe
        ---------- C:\Program Files\Sprint music manager\MEMonitor.exe
        ---------- C:\Program Files\CA\CA Internet Security Suite\ccprovsp.exe
        ---------- C:\Program Files\CA\CA Internet Security Suite\CA Anti-Spyware\CAPPActiveProtection.exe
        ---------- C:\Program Files\CA\CA Internet Security Suite\CA Anti-Spyware\PPCtlPriv.exe
        ---------- C:\Program Files\iPod\bin\iPodService.exe
        ---------- C:\Program Files\Mozilla Firefox\firefox.exe
        ---------- C:\WINDOWS\system32\cmd.exe
        ---------- C:\Rooter$\RK.exe

        ----------------------\\ Search..

        ----------------------\\ ROOTKIT !!



        1 - "C:\Rooter$\Rooter_1.txt" - Mon 03/09/2009|12:20

        ----------------------\\ Scan completed at 12:20
        From HijackThis Notpad:
        Logfile of Trend Micro HijackThis v2.0.2
        Scan saved at 12:24:09 PM, on 3/9/2009
        Platform: Windows XP SP2 (WinNT 5.01.2600)
        MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
        Boot mode: Normal

        Running processes:
        C:\WINDOWS\System32\smss.exe
        C:\WINDOWS\system32\winlogon.exe
        C:\WINDOWS\system32\services.exe
        C:\WINDOWS\system32\lsass.exe
        C:\WINDOWS\system32\svchost.exe
        C:\WINDOWS\System32\svchost.exe
        C:\WINDOWS\system32\spoolsv.exe
        C:\Program Files\CA\SharedComponents\HIPSEngine\UmxCfg.exe
        C:\Program Files\CA\SharedComponents\HIPSEngine\UmxFwHlp.exe
        C:\Program Files\CA\SharedComponents\HIPSEngine\UmxPol.exe
        C:\Program Files\CA\SharedComponents\HIPSEngine\UmxAgent.exe
        C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
        C:\WINDOWS\System32\Ati2evxx.exe
        C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\ISafe.exe
        C:\Program Files\CA\SharedComponents\PPRT\bin\ITMRTSVC.exe
        C:\WINDOWS\system32\svchost.exe
        C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\VetMsg.exe
        C:\Program Files\Canon\CAL\CALMAIN.exe
        C:\WINDOWS\Explorer.EXE
        C:\Program Files\CA\CA Internet Security Suite\CA Personal Firewall\capfsem.exe
        C:\WINDOWS\system32\pctspk.exe
        C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
        C:\Program Files\iTunes\iTunesHelper.exe
        C:\Program Files\CA\CA Internet Security Suite\cctray\cctray.exe
        C:\Program Files\CA\CA Internet Security Suite\CA Anti-Spam\QSP-5.1.18.0\QOELoader.exe
        C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\CAVRID.exe
        C:\Program Files\CA\CA Internet Security Suite\CA Personal Firewall\capfasem.exe
        C:\Program Files\UnHackMe\hackmon.exe
        C:\Program Files\Sprint music manager\MEMonitor.exe
        C:\Program Files\CA\CA Internet Security Suite\ccprovsp.exe
        C:\Program Files\CA\CA Internet Security Suite\CA Anti-Spyware\CAPPActiveProtection.exe
        C:\Program Files\CA\CA Internet Security Suite\CA Anti-Spyware\PPCtlPriv.exe
        C:\Program Files\iPod\bin\iPodService.exe
        C:\Program Files\Mozilla Firefox\firefox.exe
        C:\Program Files\Java\jre1.6.0_07\bin\jucheck.exe
        C:\Program Files\CA\CA Internet Security Suite\ccupdate\CCUpdate.exe
        C:\Program Files\Microsoft Office\Office12\WINWORD.EXE
        C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
        C:\Program Files\UnHackMe\UnHackMe.exe
        C:\DOCUME~1\KATLIN~1\LOCALS~1\Temp\0xECE55B20\a4f3d0ef-63ec-4389-8418-2c13538478d9\usetup.exe

        R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.newfirstpage.com/?cm=612470&lt=1&it=2008-10-17%2020%3A26%3A25&dt=2008-11-02%2014%3A44%3A46&q=http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
        O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
        O4 - HKLM\..\Run: [PCTVOICE] pctspk.exe
        O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
        O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
        O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
        O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
        O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
        O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdwsb.exe] C:\WINDOWS\system32\kdwsb.exe
        O4 - HKLM\..\Run: [cctray] "C:\Program Files\CA\CA Internet Security Suite\cctray\cctray.exe"
        O4 - HKLM\..\Run: [QOELOADER] "C:\Program Files\CA\CA Internet Security Suite\CA Anti-Spam\QSP-5.1.18.0\QOELoader.exe"
        O4 - HKLM\..\Run: [CAVRID] "C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\CAVRID.exe"
        O4 - HKLM\..\Run: [cafwc] C:\Program Files\CA\CA Internet Security Suite\CA Personal Firewall\cafw.exe -cl
        O4 - HKLM\..\Run: [capfasem] C:\Program Files\CA\CA Internet Security Suite\CA Personal Firewall\capfasem.exe
        O4 - HKLM\..\Run: [capfupgrade] C:\Program Files\CA\CA Internet Security Suite\CA Personal Firewall\capfupgrade.exe
        O4 - HKCU\..\Run: [UnHackMe Monitor] C:\Program Files\UnHackMe\hackmon.exe
        O4 - Startup: MEMonitor.lnk.lnk = C:\Program Files\Sprint music manager\MEMonitor.exe
        O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
        O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
        O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
        O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
        O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
        O20 - AppInit_DLLs: kcjxib.dll mxzdbw.dll
        O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
        O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
        O23 - Service: CaCCProvSP - CA, Inc. - C:\Program Files\CA\CA Internet Security Suite\ccprovsp.exe
        O23 - Service: CAISafe - Computer Associates International, Inc. - C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\ISafe.exe
        O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
        O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
        O23 - Service: CA Pest Patrol Realtime Protection Service (ITMRTSVC) - CA, Inc. - C:\Program Files\CA\SharedComponents\PPRT\bin\ITMRTSVC.exe
        O23 - Service: PPCtlPriv - CA, Inc. - C:\Program Files\CA\CA Internet Security Suite\CA Anti-Spyware\PPCtlPriv.exe
        O23 - Service: HIPS Event Manager (UmxAgent) - CA - C:\Program Files\CA\SharedComponents\HIPSEngine\UmxAgent.exe
        O23 - Service: HIPS Configuration Interpreter (UmxCfg) - CA - C:\Program Files\CA\SharedComponents\HIPSEngine\UmxCfg.exe
        O23 - Service: HIPS Firewall Helper (UmxFwHlp) - CA - C:\Program Files\CA\SharedComponents\HIPSEngine\UmxFwHlp.exe
        O23 - Service: HIPS Policy Manager (UmxPol) - CA - C:\Program Files\CA\SharedComponents\HIPSEngine\UmxPol.exe
        O23 - Service: VET Message Service (VETMSGNT) - CA, Inc. - C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus\VetMsg.exe

        --
        End of file - 6426 bytes
        Open HijackThis and select Do a system scan only.

        Place a check mark next to the following entries: (if there)

        • R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.newfirstpage.com/?cm=612470<=1&it=2008-10-17%2020%3A26%3A25&dt=2008-11-02%2014%3A44%3A46&q=http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
        • O4 - HKLM\..\Run: [C:\WINDOWS\system32\kdwsb.exe] C:\WINDOWS\system32\kdwsb.exe
        • O20 - AppInit_DLLs: kcjxib.dll mxzdbw.dll
        .
        Important: Close all open windows except for HijackThis and then click Fix checked.

        Once completed, exit HijackThis.

        ----------

        Go to Start > Run and type notepad.exe then click OK

        Copy and paste the below into Notepad and save as fixme.reg to Your Desktop

        Code: [Select]REGEDIT4

        [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
        "C:\WINDOWS\system32\kdwsb.exe"=-

        Locate fixme.reg on your Desktop and double-click it. Answer Yes when prompted to merge with the Registry.

        Make sure that you tell me if you receive a success message about adding the above to the registry. If you do not get a success message, it did not work.

        Delete the fixme.reg from the Desktop.

        ----------

        Download ComboFix© by sUBs from one of the below links. Be sure top save it to the Desktop.

        Link #1
        Link #2

        **Note: It is important that it is saved directly to your Desktop

        Close any open Web browsers. (Firefox, Internet Explorer, etc) before starting ComboFix.

        Temporarily disable your antivirus, and any antispyware real time protection before performing a scan. Click this link to see a list of security programs that should be disabled and how to disable them.

        Double click combofix.exe & follow the prompts.
        When finished ComboFix will produce a log for you.
        Post the ComboFix log in your next reply.

        Important: Do not mouseclick ComboFix's window while it is running. That may cause it to stall.

        Remember to re-enable your antivirus and antispyware protection when ComboFix is complete.

        If you have problems with ComboFix usage, see How to use ComboFixComboFix 09-03-06.02 - Katlin The Amazing 2009-03-09 13:31:19.1 - NTFSx86
        Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.255.74 [GMT -8:00]
        Running from: c:\documents and settings\Katlin The Amazing\Desktop\ComboFix.exe
        AV: CA Anti-Virus *On-access scanning enabled* (Updated)
        FW: CA Personal Firewall *disabled*
        * Created a new restore point
        .

        ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
        .

        c:\docume~1\KATLIN~1\LOCALS~1\Temp\tmp2.tmp
        c:\windows\system32\llpjtdro.ini

        .
        ((((((((((((((((((((((((( Files Created from 2009-02-09 to 2009-03-09 )))))))))))))))))))))))))))))))
        .

        2009-03-09 12:22 . 2009-03-09 12:22d--------c:\program files\Trend Micro
        2009-03-09 12:18 . 2009-03-09 12:20d--------C:\Rooter$

        .
        (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
        .
        2009-03-09 21:1465,786----a-wc:\windows\system32\drivers\kmxcfg.u2k0
        2009-03-09 21:1464----a-wc:\windows\system32\drivers\kmxcfg.u2k7
        2009-03-09 21:1464----a-wc:\windows\system32\drivers\kmxcfg.u2k6
        2009-03-09 21:1464----a-wc:\windows\system32\drivers\kmxcfg.u2k5
        2009-03-09 21:1464----a-wc:\windows\system32\drivers\kmxcfg.u2k4
        2009-03-09 21:1464----a-wc:\windows\system32\drivers\kmxcfg.u2k3
        2009-03-09 21:1464----a-wc:\windows\system32\drivers\kmxcfg.u2k2
        2009-03-09 21:1464----a-wc:\windows\system32\drivers\kmxcfg.u2k1
        2009-03-09 21:13---------d-----wc:\program files\UnHackMe
        2008-09-27 19:3667,696----a-wc:\program files\mozilla firefox\components\jar50.dll
        2008-09-27 19:3654,376----a-wc:\program files\mozilla firefox\components\jsd3250.dll
        2008-09-27 19:3634,952----a-wc:\program files\mozilla firefox\components\myspell.dll
        2008-09-27 19:3646,720----a-wc:\program files\mozilla firefox\components\spellchk.dll
        2008-09-27 19:36172,144----a-wc:\program files\mozilla firefox\components\xpinstal.dll
        .

        ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
        .
        .
        *Note* empty entries & legit default entries are not shown
        REGEDIT4

        [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
        "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2007-06-29 286720]
        "SunJavaUpdateSched"="c:\program files\Java\jre1.6.0_07\bin\jusched.exe" [2008-06-10 144784]
        "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2007-09-26 267064]
        "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-10-10 39792]
        "cctray"="c:\program files\CA\CA Internet Security Suite\cctray\cctray.exe" [2009-03-09 177392]
        "QOELOADER"="c:\program files\CA\CA Internet Security Suite\CA Anti-Spam\QSP-5.1.18.0\QOELoader.exe" [2009-01-04 14088]
        "CAVRID"="c:\program files\CA\CA Internet Security Suite\CA Anti-Virus\CAVRID.exe" [2007-08-20 230664]
        "cafwc"="c:\program files\CA\CA Internet Security Suite\CA Personal Firewall\cafw.exe" [2009-01-04 1193200]
        "capfasem"="c:\program files\CA\CA Internet Security Suite\CA Personal Firewall\capfasem.exe" [2009-01-04 173296]
        "capfupgrade"="c:\program files\CA\CA Internet Security Suite\CA Personal Firewall\capfupgrade.exe" [2009-01-04 259312]
        "PCTVOICE"="pctspk.exe" [2002-07-18 c:\windows\system32\pctspk.exe]
        "ATIModeChange"="Ati2mdxx.exe" [2001-09-04 c:\windows\system32\Ati2mdxx.exe]

        c:\documents and settings\Katlin The Amazing\Start Menu\Programs\Startup\
        MEMonitor.lnk.lnk - c:\program files\Sprint music manager\MEMonitor.exe [2007-10-31 929792]

        [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\PFW]
        2007-05-18 13:30 79368 c:\windows\system32\UmxWNP.dll

        [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
        "vidc.ffds"= ffdshow.ax
        "msacm.ac3filter"= ac3filter.acm

        [HKEY_LOCAL_MACHINE\software\microsoft\security center]
        "AntiVirusDisableNotify"=dword:00000001
        "UpdatesDisableNotify"=dword:00000001

        [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\CA Personal Firewall]
        "DisableMonitoring"=dword:00000001

        [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ComputerAssociatesAntiVirus]
        "DisableMonitoring"=dword:00000001

        [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
        "EnableFirewall"= 0 (0x0)

        [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
        "%windir%\\system32\\sessmgr.exe"=
        "c:\\Program Files\\iTunes\\iTunes.exe"=
        "c:\\Program Files\\Azureus\\Azureus.exe"=

        S0 KmxStart;KmxStart;c:\windows\System32\DRIVERS\kmxstart.sys [2008-06-24 93712]
        S1 KmxAgent;KmxAgent;c:\windows\system32\DRIVERS\kmxagent.sys [2008-06-24 63504]
        S1 KmxFile;KmxFile;c:\windows\system32\DRIVERS\KmxFile.sys [2008-06-24 45584]
        S1 KmxFw;KmxFw;c:\windows\system32\DRIVERS\kmxfw.sys [2008-06-24 115216]
        S2 KmxCF;KmxCF;c:\windows\system32\DRIVERS\KmxCF.sys [2008-06-24 134648]
        S2 KmxSbx;KmxSbx;c:\windows\system32\DRIVERS\KmxSbx.sys [2008-06-24 66576]
        S2 UmxAgent;HIPS Event Manager;c:\program files\CA\SharedComponents\HIPSEngine\UmxAgent.exe [2007-10-18 1010192]
        S2 UmxCfg;HIPS Configuration Interpreter;c:\program files\CA\SharedComponents\HIPSEngine\UmxCfg.exe [2007-10-18 801296]
        S2 UmxPol;HIPS Policy Manager;c:\program files\CA\SharedComponents\HIPSEngine\UmxPol.exe [2008-06-24 281104]
        S3 KmxCfg;KmxCfg;c:\windows\system32\DRIVERS\kmxcfg.sys [2008-06-24 88816]
        S3 PPCtlPriv;PPCtlPriv;c:\program files\CA\CA Internet Security Suite\CA Anti-Spyware\PPCtlPriv.exe [2007-08-16 189704]


        --- Other Services/Drivers In Memory ---

        *Deregistered* - ALG
        *Deregistered* - Apple Mobile Device
        *Deregistered* - Ati HotKey Poller
        *Deregistered* - AudioSrv
        *Deregistered* - BITS
        *Deregistered* - Browser
        *Deregistered* - CaCCProvSP
        *Deregistered* - CAISafe
        *Deregistered* - CCALib8
        *Deregistered* - CryptSvc
        *Deregistered* - DcomLaunch
        *Deregistered* - Dhcp
        *Deregistered* - Dnscache
        *Deregistered* - ERSvc
        *Deregistered* - EventSystem
        *Deregistered* - FastUserSwitchingCompatibility
        *Deregistered* - helpsvc
        *Deregistered* - ImapiService
        *Deregistered* - iPod Service
        *Deregistered* - ITMRTSVC
        *Deregistered* - lanmanserver
        *Deregistered* - lanmanworkstation
        *Deregistered* - LmHosts
        *Deregistered* - Netman
        *Deregistered* - Nla
        *Deregistered* - Null
        *Deregistered* - PartMgr
        *Deregistered* - ParVdm
        *Deregistered* - PCIIde
        *Deregistered* - PolicyAgent
        *Deregistered* - PPCtlPriv
        *Deregistered* - PptpMiniport
        *Deregistered* - ProtectedStorage
        *Deregistered* - PSched
        *Deregistered* - RasAcd
        *Deregistered* - Rasl2tp
        *Deregistered* - RasPppoe
        *Deregistered* - Raspti
        *Deregistered* - Rdbss
        *Deregistered* - RDPCDD
        *Deregistered* - RpcSs
        *Deregistered* - SamSs
        *Deregistered* - SCardSvr
        *Deregistered* - Schedule
        *Deregistered* - seclogon
        *Deregistered* - SENS
        *Deregistered* - SharedAccess
        *Deregistered* - ShellHWDetection
        *Deregistered* - Spooler
        *Deregistered* - sr
        *Deregistered* - srservice
        *Deregistered* - Srv
        *Deregistered* - SSDPSRV
        *Deregistered* - stisvc
        *Deregistered* - swenum
        *Deregistered* - Tcpip
        *Deregistered* - TermDD
        *Deregistered* - TermService
        *Deregistered* - Themes
        *Deregistered* - TrkWks
        *Deregistered* - UmxAgent
        *Deregistered* - UmxCfg
        *Deregistered* - UmxFwHlp
        *Deregistered* - UmxPol
        *Deregistered* - Update
        *Deregistered* - VET-FILT
        *Deregistered* - VET-REC
        *Deregistered* - VETEBOOT
        *Deregistered* - VETEFILE
        *Deregistered* - VETMONNT
        *Deregistered* - VETMSGNT
        *Deregistered* - VgaSave
        *Deregistered* - Vmodem
        *Deregistered* - VolSnap
        *Deregistered* - Vpctcom
        *Deregistered* - Vvoice
        *Deregistered* - W32Time
        *Deregistered* - Wanarp
        *Deregistered* - WebClient
        *Deregistered* - winmgmt
        *Deregistered* - wscsvc
        *Deregistered* - WZCSVC

        [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{69ce0190-6656-11dc-a475-0004234b49b8}]
        \Shell\AutoRun\command - E:\LaunchU3.exe -a
        .
        Contents of the 'Scheduled Tasks' folder

        2008-10-05 c:\windows\Tasks\AppleSoftwareUpdate.job
        - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 11:34]

        2009-01-05 c:\windows\Tasks\CAAntiSpywareScan_Daily as Katlin The Amazing at 9 16 PM.job
        - c:\program files\CA\CA Internet Security Suite\CA Anti-Spyware\CAAntiSpyware.exe [2007-08-16 21:10]
        .
        .
        ------- Supplementary Scan -------
        .
        uDefault_Search_URL = hxxp://www.google.com/
        uSearchMigratedDefaultURL = hxxp://www.google.com/
        mSearch Bar = hxxp://www.google.com/
        mSearchMigratedDefaultURL = hxxp://www.google.com/
        mSearchURL = hxxp://www.google.com/
        IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
        LSP: c:\windows\system32\VetRedir.dll
        FF - ProfilePath - c:\documents and settings\Katlin The Amazing\Application Data\Mozilla\Firefox\Profiles\3i9zxumj.default\
        FF - prefs.js: browser.search.selectedEngine - Search
        FF - prefs.js: browser.startup.homepage - hxxp://www.google.com
        FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
        .

        **************************************************************************

        catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
        Rootkit scan 2009-03-09 13:47:47
        Windows 5.1.2600 Service Pack 2 NTFS

        scanning hidden processes ...

        scanning hidden autostart entries ...

        scanning hidden files ...

        scan completed successfully
        hidden files: 0

        **************************************************************************
        .
        --------------------- DLLs Loaded Under Running Processes ---------------------

        - - - - - - - > 'winlogon.exe'(1864)
        c:\windows\system32\UmxWnp.Dll
        c:\program files\CA\SharedComponents\PPRT\bin\CACheck.dll
        c:\program files\CA\SharedComponents\PPRT\bin\CAHook.dll
        c:\program files\CA\SharedComponents\PPRT\bin\CAServer.dll

        - - - - - - - > 'lsass.exe'(152)
        c:\windows\system32\VetRedir.dll
        c:\windows\system32\ISafeIf.dll
        .
        Completion time: 2009-03-09 13:55:49
        ComboFix-quarantined-files.txt 2009-03-09 21:55:21

        Pre-Run: 27,381,727,232 bytes free
        Post-Run: 27,479,879,680 bytes free

        WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
        [boot loader]
        timeout=2
        default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
        [operating systems]
        c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
        multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

        222
        Looks good to me.

        How is the computer running now?A lot faster, does that mean it's clean? Can I delete those programs I downloaded for this?Delete this folder > C:\Rooter$

        • Click START then RUN
        • Now type Combofix /u in the runbox
        • Make sure there's a space between Combofix and /u
        • Then hit Enter.
        .
        .
        The above procedure will:
        • Delete:
          • ComboFix and its associated files and folders.
          • VundoFix backups, if present
          • The C:\Deckard folder, if present
          • The C:_OtMoveIt folder, if present
          • Reset the clock settings.
          • Hide file extensions, if required.
          • Hide System/Hidden files, if required.
          • Set a new, clean Restore Point.
          .
          ----------

          Use the Secunia Software Inspector to check for out of date software.
          • Click Start Now
          • Check the box next to Enable thorough system inspection.
          • Click Start
          • Allow the scan to finish and scroll down to see if any updates are needed.
          • Update anything listed.
          .
          ----------

          Go to Microsoft Windows Update and get all critical updates.

          ----------

          I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

          SpywareBlaster - Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
          * Using SpywareBlaster to protect your computer from Spyware and Malware
          * If you don't know what ActiveX controls are, see here

          Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

          Also see Slow Computer? It May Not Be Malware for free cleaning/maintenance tools to help keep your computer running smooth.I just tried to delete Combofix the way you told me and it's telling me to DIABLE my antispyware again so it can perform a scan.....Never mind, it worked! Thank you so much!Your welcome.

          Safe surfing...
          4472.

          Solve : blue screen help needed !!?

          Answer»

          this is not my PC , my FRIEND has a blue screen with a message in some SORT of

          code and text saying , physical dump TAKING place , she uses xp ie7 , any way to help , harry

          4473.

          Solve : Win32.Backdoor-DNM Help?

          Answer»

          Hey, I was recently infected by win32.backdoor-dnm. I have followed the steps in your "Read this before requesting malware help" thread. I use IE and it keeps redirecting me to a site selling "anti-virus" and after a few minutes it shuts down. I also keep getting "windows" security warnings that also will send me to the antivirus site. Since I followed the steps in the "read this before ..." thread it hasn't happened, so maybe it's fixed? But I'm not sure how to tell.

          Here are my logs.

          SUPERAntiSpyware Scan Log
          http://www.superantispyware.com

          Generated 03/05/2009 at 01:23 AM

          Application Version : 4.25.1014

          Core Rules Database Version : 3785
          Trace Rules Database Version: 1742

          Scan type : Complete Scan
          Total Scan Time : 02:28:59

          Memory items scanned : 499
          Memory threats detected : 0
          Registry items scanned : 5469
          Registry threats detected : 0
          File items scanned : 74588
          File threats detected : 2

          Adware.Tracking Cookie
          C:\Documents and Settings\ROGER\Cookies\[emailprotected][2].txt

          Trojan.Unclassified
          C:\WINDOWS\SYSTEM32\MPFSERVICEFAILURECOUNT.TXT



          Malwarebytes' Anti-Malware 1.34
          Database version: 1825
          Windows 5.1.2600 Service Pack 3

          3/6/2009 4:28:54 PM
          mbam-log-2009-03-06 (16-28-54).txt

          Scan type: Quick Scan
          Objects scanned: 61397
          Time elapsed: 6 minute(s), 0 second(s)

          Memory Processes Infected: 0
          Memory Modules Infected: 0
          Registry Keys Infected: 2
          Registry Values Infected: 2
          Registry Data Items Infected: 1
          Folders Infected: 3
          Files Infected: 8

          Memory Processes Infected:
          (No malicious items detected)

          Memory Modules Infected:
          (No malicious items detected)

          Registry Keys Infected:
          HKEY_CURRENT_USER\SOFTWARE\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
          HKEY_CURRENT_USER\SOFTWARE\WakeNet (Trojan.Adware) -> Quarantined and deleted successfully.

          Registry Values Infected:
          HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
          HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\realtecks (Trojan.FakeAlert) -> Quarantined and deleted successfully.

          Registry Data Items Infected:
          HKEY_CLASSES_ROOT\regfile\shell\open\command\ (Broken.OpenCommand) -> Bad: ("regedit.exe" "%1") Good: (regedit.exe "%1") -> Quarantined and deleted successfully.

          Folders Infected:
          C:\Documents and Settings\ROGER\Application Data\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
          C:\Documents and Settings\ROGER\Application Data\AdwareAlert\Log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
          C:\Documents and Settings\ROGER\Application Data\AdwareAlert\Settings (Rogue.AdwareAlert) -> Quarantined and deleted successfully.

          Files Infected:
          C:\Documents and Settings\ROGER\Application Data\AdwareAlert\rs.dat (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
          C:\Documents and Settings\ROGER\Application Data\AdwareAlert\Log\2009 Mar 04 - 01_18_46 PM_296.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
          C:\Documents and Settings\ROGER\Application Data\AdwareAlert\Log\2009 Mar 04 - 04_41_20 PM_473.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
          C:\Documents and Settings\ROGER\Application Data\AdwareAlert\Log\2009 Mar 04 - 04_56_30 PM_261.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
          C:\Documents and Settings\ROGER\Application Data\AdwareAlert\Log\2009 Mar 04 - 05_38_25 PM_642.log (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
          C:\Documents and Settings\ROGER\Application Data\AdwareAlert\Settings\ScanResults.pie (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
          C:\WINDOWS\Tasks\AdwareAlert Scheduled Scan.job (Trojan.Downloader) -> Quarantined and deleted successfully.
          C:\END (Trojan.FakeAlert) -> Quarantined and deleted successfully.


          Logfile of Trend Micro HijackThis v2.0.2
          Scan saved at 16:54:04, on 3/6/2009
          Platform: Windows XP SP3 (WinNT 5.01.2600)
          MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
          Boot mode: Normal

          Running processes:
          C:\WINDOWS\System32\smss.exe
          C:\WINDOWS\system32\winlogon.exe
          C:\WINDOWS\system32\services.exe
          C:\WINDOWS\system32\lsass.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\System32\svchost.exe
          C:\WINDOWS\Explorer.EXE
          C:\WINDOWS\system32\spoolsv.exe
          C:\Program Files\Creative\ShareDLL\CtNotify.exe
          C:\PROGRA~1\AVGANT~1\avgcc.exe
          C:\Program Files\Common Files\Real\Update_OB\realsched.exe
          C:\WINDOWS\system32\atiptaxx.exe
          C:\Program Files\Creative\ShareDLL\MediaDet.Exe
          C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
          C:\PROGRA~1\AVGANT~1\avgamsvr.exe
          C:\PROGRA~1\AVGANT~1\avgupsvc.exe
          C:\PROGRA~1\AVGANT~1\avgemc.exe
          C:\WINDOWS\runservice.exe
          I:\Program Files\Alcohol\Alcohol 120\StarWind\StarWindService.exe
          C:\WINDOWS\System32\MsPMSPSv.exe
          C:\PROGRA~1\AVGANT~1\avgfwsrv.exe
          C:\WINDOWS\system32\WgaTray.exe
          C:\WINDOWS\system32\msiexec.exe
          C:\Program Files\Real\RealPlayer\RealPlay.exe
          C:\Program Files\Java\jre6\bin\jusched.exe
          C:\Program Files\Java\jre6\bin\jqs.exe
          C:\Program Files\Internet Explorer\iexplore.exe
          I:\Program Files\Hijack This\sniper.exe

          R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.yahoo.com
          R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dodgers.com/
          R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.dodgers.com/
          R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dodgers.com/
          O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
          O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
          O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
          O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
          O3 - Toolbar: (no name) - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - (no file)
          O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn0\yt.dll
          O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
          O4 - HKLM\..\Run: [DISC DETECTOR] C:\Program Files\Creative\ShareDLL\CtNotify.exe
          O4 - HKLM\..\Run: [D-Link AirPlus G] "C:\Program Files\D-Link\AirPlus G\AirGCFG.exe"
          O4 - HKLM\..\Run: [AVG7_CC] "C:\PROGRA~1\AVGANT~1\avgcc.exe" /STARTUP
          O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
          O4 - HKLM\..\Run: [AtiPTA] atiptaxx.exe
          O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
          O4 - HKLM\..\Run: [D-Link AirPlus XtremeG] "C:\Program Files\D-Link\AirPlus XtremeG\AirPlusCFG.exe"
          O4 - HKLM\..\Run: [KernelFaultCheck] "C:\WINDOWS\system32\dumprep.exe" 0 -k
          O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
          O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\AVGANT~1\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
          O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\AVGANT~1\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
          O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\AVGANT~1\avgw.exe /RUNONCE (User 'SYSTEM')
          O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\AVGANT~1\avgw.exe /RUNONCE (User 'Default user')
          O4 - S-1-5-18 Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe (User 'SYSTEM')
          O4 - .DEFAULT Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe (User 'Default user')
          O4 - Startup: Stardock ObjectDock.lnk = C:\Program Files\Stardock\ObjectDock\ObjectDock.exe
          O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
          O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
          O9 - Extra button: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.Net\PartyPokerNet\RunPF.exe (file missing)
          O9 - Extra 'Tools' menuitem: PartyPoker.net - {F4430FE8-2638-42e5-B849-800749B94EED} - C:\Program Files\PartyGaming.Net\PartyPokerNet\RunPF.exe (file missing)
          O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
          O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
          O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
          O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
          O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - http://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,101/mcinsctl.cab
          O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1167269231652
          O16 - DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} (Crucial cpcScan) - http://www.crucial.com/controls/cpcScanner.cab
          O20 - Winlogon Notify: !SASWinLogon - I:\Program Files\SuperAntiSpyware\SASWINLO.dll
          O23 - Service: ANIWZCSd Service (ANIWZCSdService) - Alpha Networks Inc. - C:\Program Files\ANI\ANIWZCS2 Service\ANIWZCSdS.exe
          O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
          O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\AVGANT~1\avgamsvr.exe
          O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\AVGANT~1\avgupsvc.exe
          O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\AVGANT~1\avgemc.exe
          O23 - Service: AVG Firewall (AVGFwSrv) - GRISOFT, s.r.o. - C:\PROGRA~1\AVGANT~1\avgfwsrv.exe
          O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
          O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
          O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
          O23 - Service: LicCtrl Service (LicCtrlService) - Unknown owner - C:\WINDOWS\runservice.exe
          O23 - Service: MSSQL$SONY_MEDIAMGR - Unknown owner - H:\Acid Pro\Shared Plug-ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe (file missing)
          O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
          O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - I:\Program Files\Spyware Doctor\pctsAuxs.exe
          O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - I:\Program Files\Spyware Doctor\pctsSvc.exe
          O23 - Service: SQLAgent$SONY_MEDIAMGR - Unknown owner - H:\Acid Pro\Shared Plug-ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlagent.EXE (file missing)
          O23 - Service: StarWind iSCSI Service (StarWindService) - Rocket Division Software - I:\Program Files\Alcohol\Alcohol 120\StarWind\StarWindService.exe

          --
          End of file - 7466 bytes


          As far as I can tell, it has worked but I would love to get a second opinion. Any info will be greatly appreciated.
          ThanksHey, can anyone help me? All I'm wondering is if this virus is gone.hey just read the "don't bump your thread" post. i didn't intentionally mena to bump my thread. sorry about that. i'll be patient.Open HijackThis and select Do a system scan only.

          Place a CHECK mark next to the following entries: (if there)

          O3 - Toolbar: (no name) - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - (no file)

          Important: Close all windows except for HijackThis and then click Fix checked.

          Exit HijackThis.

          Why didn't you update AVG antivirus?

          How is the computer running now?Hey, thanks for your help. I ran hijackthis and fixed the file you told me to. As far as AVG goes, it still updates itself and the liscence says it won't expire for another couple of years. I'm not really sure how that works, a friend of mine set it up for me. So far my computer hasn't been acting up. No popups about the virus and I'm able to open IE without any problems. Also, do you recommend I use Firefox instead of IE? Thanks.You should update AVG to the new 8.0 version.

          Set a New Restore Point to PREVENT possible reinfection from an old one
          Setting a new restore point AFTER cleaning your system will enable your computer to roll-back to a clean working state if needed.

          • Go to Start > Programs > Accessories > System Tools and click System Restore
          • Choose the radio button marked Create a Restore Point on the first screen then click Next Give the Restore Point a name then click Create.
          • The new restore point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
          • Next go to Start > Run and type Cleanmgr
          • Click OK
          • Click the More Options Tab.
          • Click Clean Up in the System Restore section to remove all previous restore points except the newly created clean one.
          You can find instructions on how to enable and re-enable system restore here:

          Windows XP System Restore Guide or Windows Vista System Restore Guide
          .
          ----------

          Use the Secunia Software Inspector to check for out of date software.
          • Click Start Now
          • Check the box next to Enable thorough system inspection.
          • Click Start
          • Allow the scan to finish and scroll down to see if any updates are needed.
          • Update anything listed.
          .
          ----------

          Go to Microsoft Windows Update and get all critical updates.

          ----------

          Here are some great FREE tools to help you keep from getting infected again. These tools use little or no resources so won't slow down your PC.

          Concerned about Browser Security? Consider using Mozilla Firefox. With more than 15,000 improvements, Firefox 3 is faster, safer and smarter than ever before.

          For Internet Explorer 7 users there is IE7Pro. IE7Pro is a must have add-on for Internet Explorer, which includes a lot of features and tweaks to make your IE friendlier, more useful, more secure and customizable.

          I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

          SpywareBlaster - Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
          * Using SpywareBlaster to protect your computer from Spyware and Malware
          * If you don't know what ActiveX controls are, see here

          Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

          Also see Slow Computer? It May Not Be Malware for free cleaning/maintenance tools to help keep your computer running smooth.
          4474.

          Solve : I'm infected....my logs?

          Answer»

          You don't NECESSARILY have to USE the Intellipoint software. Try uninstalling it then restart the computer. WINDOWS should install any drivers necessary for the mouse to WORK.

          4475.

          Solve : Need help on antivirus software?

          Answer»

          Hi!!
          I am new to this forum and ALSO a newbie to software stuff. I don’t have much knowledge about computers. I use my computer just to send or receive emails. While checking my mails I get lots of pop ups which are advertisements. EARLIER the number of these pop ups was less but off late it has become very difficult to check my emails because when I try to close them it freezes my system and only OPTION left is to restart the pc. I don’t have any antivirus software installed on my PC and now I am bound to look for one.
          Also while doing my bit of research on the net I came across two software : Internet security software http://www.ecostsoftware.com/symantec/norton-internet-security-2009_p3974 and antivirus software http://www.ecostsoftware.com/symantec/norton-antivirus-2009-1-user-3-pcs_p3987 . Is there any difference between the two? Which one should I opt for? Sorry for an amateurish post!One of them is Norton Internet Security 2009 and the other one is Norton Antivirus 2009.

          You can compare the two products here:
          http://www.symantec.com/norton/antivirus
          (when you get to that page, click on Compare Related Products)

          Note: DO NOT get Norton 360.
          Note2: There are other Free Antivirus programs out there that do just as well as paid ones if you're INTERESTED.

          4476.

          Solve : Malware Pop-Up Problem (3 Required Logs Inside!!!)?

          Answer»

          .
          -- Snapshot reset to current date --
          .
          ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
          .
          .
          *Note* empty entries & legit default entries are not shown
          REGEDIT4

          [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
          "ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2006-02-28 15360]

          [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
          "LEXMARK X5100 Series"="c:\program files\Lexmark X5100 Series\lxbabmgr.exe" [2003-03-04 86100]
          "NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
          "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-03-30 267048]
          "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 39792]
          "SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-01-03 136600]
          "GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2006-10-27 31016]
          "AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-01-05 1601304]
          "QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-03-28 413696]
          "SiSPower"="SiSPower.dll" [2006-03-09 c:\windows\system32\SiSPower.dll]

          [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
          "tscuninstall"="c:\windows\system32\tscupgrd.exe" [2004-08-04 44544]
          "nltide_3"="advpack.dll" [2008-12-20 c:\windows\system32\advpack.dll]

          c:\documents and settings\All Users\Start Menu\Programs\Startup\
          Utility Tray.lnk - c:\windows\system32\sistray.exe [2008-05-26 262144]

          [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
          "ForceClassicControlPanel"= 1 (0x1)
          "NoSMConfigurePrograms"= 1 (0x1)

          [HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
          "ForceClassicControlPanel"= 1 (0x1)
          "NoSMConfigurePrograms"= 1 (0x1)

          [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
          "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

          [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
          2008-12-22 11:05 356352 c:\program files\SUPERAntiSpyware\SASWINLO.dll

          [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
          2009-01-05 21:49 10520 c:\windows\system32\avgrsstx.dll

          [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
          path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
          backup=c:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

          [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Synchronizer.lnk]
          path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Synchronizer.lnk
          backup=c:\windows\pss\Adobe Reader Synchronizer.lnkCommon Startup

          [HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Utility Tray.lnk]
          path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Utility Tray.lnk
          backup=c:\windows\pss\Utility Tray.lnkCommon Startup

          [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
          --a------ 2008-03-30 09:36 267048 c:\program files\iTunes\iTunesHelper.exe

          [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
          --a------ 2001-07-09 10:50 155648 c:\windows\system32\NeroCheck.exe

          [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
          --a------ 2008-03-28 22:37 413696 c:\program files\QuickTime\QTTask.exe

          [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RemoteControl]
          --a------ 2005-01-12 03:01 32768 c:\program files\CyberLink\PowerDVD\PDVDServ.exe

          [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
          "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" -atboottime

          [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
          "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
          "%windir%\\system32\\sessmgr.exe"=
          "c:\\WINDOWS\\system32\\LEXPPS.EXE"=
          "c:\\Program Files\\Messenger\\msmsgs.exe"=
          "c:\\Program Files\\uTorrent\\uTorrent.exe"=
          "c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
          "c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
          "c:\\Program Files\\iTunes\\iTunes.exe"=
          "c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
          "c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
          "c:\\Program Files\\AVG\\AVG8\\avgemc.exe"=
          "c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
          "c:\\Program Files\\AVG\\AVG8\\avgnsx.exe"=

          R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2008-12-01 325128]
          R1 AvgTdiX;AVG8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2008-12-01 107272]
          R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2008-12-22 8944]
          R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2008-12-22 55024]
          R2 avg8emc;AVG8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [2008-12-01 903960]
          R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [2008-12-01 298264]
          S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2008-12-22 7408]
          .
          Contents of the 'Scheduled Tasks' folder

          2009-02-20 c:\windows\Tasks\1-Click Maintenance.job
          - c:\program files\TuneUp Utilities 2008\OneClickStarter.exe [2008-06-20 08:09]

          2009-02-18 c:\windows\Tasks\AppleSoftwareUpdate.job
          - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-04-11 16:57]
          .
          .
          ------- Supplementary Scan -------
          .
          uStart Page = hxxp://www.google.com/
          mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
          uInternet CONNECTION Wizard,ShellNext = iexplore
          uInternet Settings,ProxyOverride = *.local
          uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
          IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
          DPF: {77538FC7-CE52-4704-9865-494FE92BC320} - hxxp://www.ultimatebaseballonline.com/myubo/launchubo.OCX
          FF - ProfilePath - c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\01mfm28n.default\
          FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
          FF - prefs.js: browser.search.selectedEngine - Ask
          FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
          FF - prefs.js: keyword.URL - about:neterror?e=query&u=
          FF - component: c:\program files\AVG\AVG8\Firefox\components\avgssff.dll
          FF - component: c:\program files\AVG\AVG8\ToolbarFF\components\vmAVGConnector.dll
          FF - plugin: c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\01mfm28n.default\extensions\[emailprotected]\platform\WINNT_x86-msvc\plugins\npmnqmp07061050.dll
          FF - plugin: c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\01mfm28n.default\extensions\[emailprotected]\platform\WINNT_x86-msvc\plugins\npOberonGameHost.dll
          FF - plugin: c:\program files\Mozilla Firefox\plugins\NPTURNMED.dll
          FF - plugin: c:\program files\Veetle\plugins\npVeetle.dll
          FF - plugin: c:\program files\Veetle\VLC\npvlc.dll

          ---- FIREFOX POLICIES ----
          FF - user.js: yahoo.homepage.dontask - true.

          **************************************************************************

          catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
          Rootkit scan 2009-02-19 20:15:01
          Windows 5.1.2600 Service Pack 2 NTFS

          scanning hidden processes ...

          scanning hidden autostart entries ...

          scanning hidden files ...

          scan completed successfully
          hidden files: 0

          **************************************************************************
          .
          --------------------- DLLs Loaded Under Running Processes ---------------------

          - - - - - - - > 'winlogon.exe'(488)
          c:\program files\SUPERAntiSpyware\SASWINLO.dll
          .
          ------------------------ Other Running Processes ------------------------
          .
          c:\windows\system32\LEXBCES.EXE
          c:\windows\system32\LEXPPS.EXE
          c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
          c:\program files\Bonjour\mDNSResponder.exe
          c:\program files\Java\jre6\bin\jqs.exe
          c:\program files\Lexmark X5100 Series\lxbabmon.exe
          c:\program files\AVG\AVG8\avgtray.exe
          c:\program files\AVG\AVG8\avgrsx.exe
          c:\program files\AVG\AVG8\avgcsrvx.exe
          c:\windows\system32\wscntfy.exe
          c:\program files\iPod\bin\iPodService.exe
          .
          **************************************************************************
          .
          Completion TIME: 2009-02-19 20:17:54 - machine was rebooted
          ComboFix-quarantined-files.txt 2009-02-20 01:17:36
          ComboFix2.txt 2009-01-06 04:04:20
          ComboFix3.txt 2008-12-05 21:42:08

          Pre-Run: 25,664,077,824 bytes free
          Post-Run: 25,654,018,048 bytes free

          399--- E O F ---2009-02-19 08:05:08




          and i tried the eset scanner AMD it said my browser was not supported!!!
          hello?A month and a half?

          You need to start over with the 3 original logs.igght

          4477.

          Solve : how to get rid of antivirus360??

          Answer» HI,
          I hope someone will help me get rid of this antivirus360. I'm not sure how I got it, but I cannot stand the constant popups.. I found site that I COULD PAY to get it off, but some how that makes me feel robbed!!!at gun point. How will I know if its not the site sending this s_ _ _ out!!
          Any help would be appreciated.
          >>Click Here&LT;<
          4478.

          Solve : About Blank Virus?

          Answer» CONTENT REMOVED.
          4479.

          Solve : Help needed for security.hijack removal?

          Answer»

          I would say your computer is clean. If there are no other issues we can do some cleanup.

          To uninstall ComboFix

          • Click the Start button. Click Run. For Vista: type in Run in the Start search, and click on Run in the results pane.
          • In the FIELD, type in ComboFix /uninstall


          (Note: Make sure there's a space between the word ComboFix and the forward-slash.)

          • Then, press Enter, or click OK.
          • This will uninstall ComboFix, delete its folders and files, hides System files and folders, and resets System Restore.
          ************************************************
          To remove all of the tools we used and the files and folders they created do the following:
          Double click OTL.exe.
          • Click the CleanUp button.
          • Select Yes when the "Begin cleanup Process?" prompt appears.
          • If you are prompted to Reboot during the cleanup, select Yes.
          • The tool will delete itself once it finishes.
          Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
          **********************************************
          Clean out your temporary internet files and temp files.

          Download TFC by OldTimer to your desktop.

          Double-click TFC.exe to run it.

          Note: If you are running on Vista, right-click on the file and choose Run As Administrator

          TFC will close all programs when run, so make sure you have saved all your work before you begin.

          * Click the Start button to begin the cleaning process.
          * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
          * Please let TFC run uninterrupted until it is finished.

          Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
          ***********************************************
          Looking over your log it seems you don't have any evidence of a third party firewall.

          Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors.

          Remember only install ONE firewall

          1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one)
          2) Online Armor
          3) Agnitum Outpost
          4) PC Tools Firewall Plus

          If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This MEANS that any malware on your computer is free to "PHONE home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
          ************************************************
          Go to Microsoft Windows Update and get all critical updates.
          ----------
          I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

          SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also STOP certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
          * Using SpywareBlaster to protect your computer from Spyware and Malware
          * If you don't know what ActiveX controls are, see here

          Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

          Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

          Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
          Safe Surfing!
          Ok, I have run the cleanup as per your last post and everything completed fine. My only problem is that SAS still continues to pick up the two registry exploits that were there when we started all of this. Is it a false positive? I have done my own parallel research and have found that ehshell.exe is CONNECTED to Windows Media Center and after examining the files both manually and with a "sfc /scannow" they seem fine. This has me so perplexed as to why SAS keeps reporting this as an exploit. Should I report a "false positive" to SAS? Not quite sure how I should proceed with this ongoing issue and any advice will be greatly appreciated. The computer is running fine but it was running fine when I began this process.Quote
          Should I report a "false positive" to SAS?
          Yes please. Here's what I found about that.Yep, I came across that article plus several others. Spent a while at Microsoft looking up the files themselves and came to the conclusion it has to be a false positive. I have submitted a report to SAS and according to them they have been researching this since March of this year. Anyway, thank you kindly for your time and keep up the good work!!You're welcome. I will lock this thread. If you need it re-opened, please send me a pm.
          4480.

          Solve : Had a virus and computer takesd awhile to shutdown.?

          Answer»

          Ok. We can do some cleanup.

          To uninstall ComboFix

          • Click the Start button. Click Run. For Vista: type in Run in the Start search, and click on Run in the results pane.
          • In the FIELD, type in ComboFix /uninstall


          (Note: MAKE sure there's a space between the word ComboFix and the forward-slash.)

          • Then, press Enter, or click OK.
          • This will uninstall ComboFix, delete its folders and files, hides System files and folders, and resets System Restore.
          *************************************************
          Clean out your temporary internet files and temp files.

          Download TFC by OldTimer to your desktop.

          Double-click TFC.exe to run it.

          Note: If you are running on Vista, right-click on the file and choose Run As Administrator

          TFC will close all programs when run, so make sure you have saved all your work before you begin.

          * Click the Start button to begin the cleaning process.
          * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
          * Please let TFC run uninterrupted until it is finished.

          Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
          ********************************************************
          Go to Microsoft Windows Update and get all critical updates.
          ----------
          I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

          SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
          * Using SpywareBlaster to protect your computer from Spyware and Malware
          * If you don't know what ActiveX controls are, see here

          Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

          Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

          Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
          Safe Surfing!
          I uninstaled combofix and then ran TFC. I then restarted my computer, but a problem occurred. After the restart my sound wouldn't work. My speakers worked fine but the volume icon was gone from my taskbar and ANYTHING I played on youtube no sound WOULD come out. I did a system restore to the day before which fixed the problem. Also i'm still having the issue with windows not automatically logging me in. Quote
          Also i'm still having the issue with windows not automatically logging me in.
          You should start a thread in another one of our forums to get help with that.
          I will LOCK this thread. If you need it re-opened, please send me a pm.
          4481.

          Solve : Trojan horse, and other things?

          Answer»

          Quote from: SuperDave on June 30, 2011, 04:30:28 PM

          Sometimes, an important and legit file gets quarantined by mistake. If that happens, we can always recover the file. I usually empty the quarantine folder every few weeks.Yes, it will identify where the files are residing.

          Finished!

          27 Detected 27 neutralized 1077942 files checked 9 infected 11 malicious 7 suspicious time 19 hrs 37 min 03 sec 1000 unable to scan

          It would be nice if i could find/post a log

          now to take the disk out and see if it starts. If it does, then what?Quote from: SuperDave on June 30, 2011, 04:30:28 PM
          Sometimes, an important and legit file gets quarantined by mistake. If that happens, we can always recover the file. I usually empty the quarantine folder every few weeks.Yes, it will identify where the files are residing.

          No luck. Back to the black safe mode window. None of the options work
          We are going to be using a Windows Recovery Environment to help disinfect the system so it MAY BOOT again.

          Download the OTLPE Standard REATOGO Windows Recovery Environment.
          • Place a blank CD-R disc in to your CD burning drive.
          • Download OTLPEStd.exe and double-click on it to burn to a CD using an ISO Burner. One can be found here.
          • Reboot your system using the boot CD you just created.
          • Note : If you do not know how to set your computer to boot from CD follow the steps here
          • Your system should now display a REATOGO-X-PE desktop.
          • Double-click on the OTLPE icon.
          • When asked "Do you wish to load the remote registry", select Yes
          • When asked "Do you wish to load remote user profile(s) for scanning", select Yes
          • Ensure the box "Automatically Load All Remaining Users" is checked and press OK
          • OTL should now start. Change the following settings
          • Change Drivers to Non-Microsoft
          • Press Run Scan to start the scan.
          • When finished, the file will be saved in drive C:\_OTL\MovedFiles
          • Copy this file to your USB drive if you do not have internet connection on this system
          • Please post the contents of the OTL.txt file in your reply.
          Quote from: SuperDave on June 30, 2011, 05:30:38 PM
          We are going to be using a Windows Recovery Environment to help disinfect the system so it may boot again.

          Download the OTLPE Standard REATOGO Windows Recovery Environment.
          • Place a blank CD-R disc in to your CD burning drive.
          • Download OTLPEStd.exe and double-click on it to burn to a CD using an ISO Burner. One can be found here.
          • Reboot your system using the boot CD you just created.
          • Note : If you do not know how to set your computer to boot from CD follow the steps here
          • Your system should now display a REATOGO-X-PE desktop.
          • Double-click on the OTLPE icon.
          • When asked "Do you wish to load the remote registry", select Yes
          • When asked "Do you wish to load remote user profile(s) for scanning", select Yes
          • Ensure the box "Automatically Load All Remaining Users" is checked and press OK
          • OTL should now start. Change the following settings
          • Change Drivers to Non-Microsoft
          • Press Run Scan to start the scan.
          • When finished, the file will be saved in drive C:\_OTL\MovedFiles
          • Copy this file to your USB drive if you do not have internet connection on this system
          • Please post the contents of the OTL.txt file in your reply.

          Dave,

          I need to go away of family matters but must continue to attempt to recover data on this sick computer.

          Letters that I wrote and calls that I made back in April, May, and June are on that computer. They are to a health club who of course has no record of anything and is now asking me to present dates, times and copies all for a $44.00 termination fee. I am fit to be tied that I have a computer virus and crash at this time after never having one before in my life.

          I am forwarding this link to one of the club managers Mostly to show that I have been locked into getting this resolved for well over a month now. This of course leads back to taking the hard drive out just to ACCESS that data if nothing else.

          I have asked the club to forgive the $44.00 since I already paid an extra three months already waiting for the termination of the membership to take place.
          Sorry to go on about a non computer issue but as you can see it is directly related. I expect to be back in a week or so. I hope that you don't mind.

          BTW I got a brand new copy of XP with service pack 2 and three on it. Maybe that can be used to repair the issues which I have been able to see them named with the programs you had me use. It just will not save them to a place where i can copy them and send them to you for examination.

          Thanks and Sorry again.

          KrypQuote
          . This of course leads back to taking the hard drive out just to access that data if nothing else.

          You can remove the harddrive, slave it to another and get your data. Make sure you scan the data before PUTTING it on another computer.

          Quote
          BTW I got a brand new copy of XP with service pack 2 and three on it.
          If it's the same as what you have on your computer, you could try a Recovery. It won't affect your data.Quote from: SuperDave on July 04, 2011, 04:19:04 PM
          You can remove the harddrive, slave it to another and get your data. Make sure you scan the data before putting it on another computer.
          If it's the same as what you have on your computer, you could try a Recovery. It won't affect your data.

          Dave,

          I've been away on an extended trip.

          Didn't realize how much info is on that affected computer.

          Which method would you suggest I use to get it back running again?

          I'm going to re-read all of your suggestions. The XP CD I got the day before I left on my trip.

          ThanksQuote
          Which method would you suggest I use to get it back running again?
          You can start by booting with the OTLPE rescue disk. You may have to change the BIOS in order to boot from the disk.

          If you do not know how to set your computer to boot from CD follow the steps hereQuote from: SuperDave on August 13, 2011, 05:24:53 PM
          You can start by booting with the OTLPE rescue disk. You may have to change the BIOS in order to boot from the disk.

          If you do not know how to set your computer to boot from CD follow the steps here

          Made CD yesterday. Will be interesting to see if it's downloaded to the CD properly. Sick computer was unplugged so long it needs full charge before I try it. Will post later today.Quote from: SuperDave on August 13, 2011, 05:24:53 PM
          You can start by booting with the OTLPE rescue disk. You may have to change the BIOS in order to boot from the disk.

          If you do not know how to set your computer to boot from CD follow the steps here

          I'm going to go back and check the bios post. Maybe i misunderstood. The CD made with the OTLPE file on it does not start my computer at all. Other CD's that were suggested along the way always booted from the CD without changing the bios. Maybe it's different for this one.

          Once it get's into this mad loop of trying to restart then there is virtually no way to stop it except hold the on/off button down for a long time. Can't imagine that this helps but what else is there.

          Will be back after seeing if the bios change can even be done with it LIKE it is.Quote from: SuperDave on August 13, 2011, 05:24:53 PM
          You can start by booting with the OTLPE rescue disk. You may have to change the BIOS in order to boot from the disk.

          If you do not know how to set your computer to boot from CD follow the steps here

          I got to the setup screen by pressing F2. Somehow pressing DEL lead me to the recovery section which had me in a panic. There did not seem to be any warnings like: are you sure you want to do this. It just started doing it. It kept asking for a CD and there is no CD with this Gateway. Just a D drive. Holding down the start button got me out of there.

          My Boot Screen says this:
          1: USB FDC:
          2: IDE CDROM:HL-DT-ST DVD-RW GWA-4082N
          3: HDD: FUJITSU MHV2100AT PL-(PM)
          4: NETWORK B2 DO YUKON PXE
          5:USB HDD:
          6 USB CDROM:

          NOTHING ELSE EXCEPT INSTRUCTIONS TO RIGHT AND ON BOTTOM The instructiomns to the right say: enables or disables a device.

          What next?Quote
          I'm going to go back and check the bios post. Maybe i misunderstood. The CD made with the OTLPE file on it does not start my computer at all. Other CD's that were suggested along the way always booted from the CD without changing the bios. Maybe it's different for this one.
          Please go back and read the instructions on how to create the CD. It's an ISO file that you're downloading. You need to use an ISO burner to burn it to the CD. There is one included in the instructions. You should not have to change the BIOS to boot from the disk. Most computers are set to first boot from the CD rom drive. I put that there just in case you had to change it. You BIOS is set up to boot from the USB first, then the CD rom drive and then the harddrive. If you're going to make a rescue CD, you will need to change the BIOS to boot from the CD first. Since I don't own a Gateway computer I really can't advise you how to get into the BIOS. Why not concentrate on creating the CD first and then try starting your computer with the rescue CD in the drive.SuperDave,

          I had a similar problem, i.e. restarting after Malwarebytes found 2 Trojan horses with the result of the restart blue screening, then restarting ad infinitum. The Dr. Web CD procedure did not help. I then tried the OTLP CD solution, but I could not get to the "Remote registry" screen. Double clicking the OTLP icon after loading from the OTLP CD gave a prompt for which drive to scan, and then "No Windows Components" indicated after C drive is indicated. I am using Windows Vista OS, Toshiba Satellite notebook. The problem now is that after exiting from and removing the OTLP disc, the booting-up after the Windows screen gives a black screen with message "A disk read error occurred Press Ctrl+Alt+Del to restart". I re-attempted Dr. Web Default, scan finished, but this still results in the same black screen with message as just indicated.
          4482.

          Solve : Persistent Trojans, problem with tcpmoni.dll??

          Answer»

          Hi Dave,

          Just back from holiday and tried to open Skype again (after reinstalling it before I went away) and this time I finally got an Antivir message:

          Virus or unwanted program 'TR/Crypt.ZPACK.Gen2 [trojan]'
          detected in file 'C:\Program Files\Skype\Phone\Skype.exe.
          Action performed: Deny access

          My computer has been off all week and I even unplugged the modem (irrational I know!)

          IE seems to be working properly now after following your instructions! Thanks.

          Did you uninstall Skype before installing a new version? I don't know why your AV is given you that message. We may as well do some cleanup.

          To uninstall ComboFix

          • Click the Start button. Click Run. For Vista: type in Run in the Start search, and click on Run in the results pane.
          • In the field, type in ComboFix /uninstall


          (Note: Make sure there's a space between the word ComboFix and the forward-slash.)

          • Then, press Enter, or click OK.
          • This will uninstall ComboFix, delete its folders and files, hides System files and folders, and resets System Restore.
          ****************************************************
          To remove the tools we used and the files and folders they created do the following:
          Double click OTL.exe.
          • Click the CleanUp button.
          • SELECT Yes when the "Begin cleanup Process?" prompt appears.
          • If you are prompted to Reboot during the cleanup, select Yes.
          • The tool will delete itself once it finishes.
          Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
          ****************************************************
          Clean out your temporary internet files and temp files.

          Download TFC by OldTimer to your desktop.

          Double-click TFC.exe to run it.

          Note: If you are running on Vista, right-click on the file and choose Run As Administrator

          TFC will close all programs when run, so make sure you have saved all your work before you begin.

          * Click the Start button to begin the cleaning process.
          * Depending on how often you clean temp files, EXECUTION time should be anywhere from a few seconds to a MINUTE or two.
          * Please let TFC run uninterrupted until it is finished.

          Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
          *********************************************************
          Looking over your log it seems you don't have any evidence of a third party firewall.

          Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors.

          Remember only install ONE firewall

          1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one)
          2) Online Armor
          3) Agnitum Outpost
          4) PC Tools Firewall Plus

          If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
          ******************************************************
          Use the Secunia Software Inspector to check for out of date software.

          •Click Start Now

          •Check the box next to Enable THOROUGH system inspection.

          •Click Start

          •Allow the scan to finish and scroll down to see if any updates are needed.
          •Update anything listed.
          .
          ----------

          Go to Microsoft Windows Update and get all critical updates.

          ----------

          I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

          SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. ALSO stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
          * Using SpywareBlaster to protect your computer from Spyware and Malware
          * If you don't know what ActiveX controls are, see here

          Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

          Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

          Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
          Safe Surfing!
          Thanks again Dave. I've followed all the instructions and haven't had any problems for the last few days. I've even got Skype up and running again.

          RE: Looking over your log it seems you don't have any evidence of a third party firewall.
          Online Armor has been installed the whole time?You're welcome Sarah. I missed that Online Armor. I will lock this thread. If you need it re-opened, please send me a pm.
          4483.

          Solve : Virus or Malware makes its own USER account ! Never saw anything like this befor?

          Answer»

          That sounds good. If there are no other issues, let's do some cleanup.

          To uninstall ComboFix

          • Click the Start button. Click Run. For Vista: type in Run in the Start search, and click on Run in the results pane.
          • In the field, type in ComboFix /uninstall


          (Note: Make sure there's a space between the word ComboFix and the forward-slash.)

          • Then, press Enter, or click OK.
          • This will uninstall ComboFix, delete its folders and files, hides System files and folders, and resets System Restore.
          ************************************************
          To remove all of the TOOLS we used and the files and folders they created do the FOLLOWING:
          Double click OTL.exe.
          • Click the CleanUp button.
          • Select Yes when the "BEGIN cleanup Process?" prompt appears.
          • If you are prompted to Reboot during the cleanup, select Yes.
          • The tool will delete itself once it finishes.
          Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
          *************************************************
          Clean out your temporary internet files and temp files.

          Download TFC by OldTimer to your desktop.

          Double-click TFC.exe to run it.

          Note: If you are running on Vista, right-click on the file and choose Run As Administrator

          TFC will close all programs when run, so make sure you have saved all your work before you begin.

          * Click the Start button to begin the cleaning process.
          * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
          * Please let TFC run uninterrupted until it is FINISHED.

          Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
          **************************************************
          Looking over your log it seems you don't have any evidence of a third party firewall.

          Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors.

          Remember only install ONE firewall

          1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one)
          2) Online Armor
          3) Agnitum Outpost
          4) PC Tools Firewall Plus

          If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
          **************************************************
          Use the Secunia Software Inspector to check for out of date software.

          •Click Start Now

          •Check the box next to Enable thorough system inspection.

          •Click Start

          •Allow the scan to finish and scroll down to see if any updates are needed.
          •Update anything listed.
          .
          ----------

          Go to Microsoft Windows Update and get all critical updates.

          ----------

          I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

          SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
          * Using SpywareBlaster to protect your computer from Spyware and Malware
          * If you don't know what ActiveX controls are, see here

          Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

          Check out Keeping Yourself Safe On The Web for tips and free tools to HELP keep you safe in the future.

          Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
          Safe Surfing!Everything seems to be fine now....When I put something in Goggle Toolbar ...it goes directly to it without being redirected....

          MANY THANKS DAVE ! ! You're welcome. I will lock this thread. If you need it re-opened, please send me a pm.
          4484.

          Solve : Viruz not allowing regular PC start up?

          Answer»

          SUPERAntiSpyware Scan Log
          http://www.superantispyware.com

          Generated 05/06/2011 at 09:06 PM

          Application Version : 4.52.1000

          Core RULES Database Version : 7008
          Trace Rules Database Version: 4820

          Scan type : Complete Scan
          Total Scan Time : 03:05:24

          Memory items scanned : 835
          Memory threats detected : 21
          Registry items scanned : 8163
          Registry threats detected : 142
          File items scanned : 176054
          File threats detected : 474

          Trojan.Agent/Gen-Falprod
          C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPENH.EXE
          C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPENH.EXE
          C:\PROGRAM FILES\MICROSOFT WINDOWS ONECARE LIVE\WINSSNOTIFY.EXE
          C:\PROGRAM FILES\MICROSOFT WINDOWS ONECARE LIVE\WINSSNOTIFY.EXE
          C:\PROGRAM FILES\LAUNCH MANAGER\LMANAGER.EXE
          C:\PROGRAM FILES\LAUNCH MANAGER\LMANAGER.EXE
          C:\PROGRAM FILES\ACER REGISTRATION\ACE1.EXE
          C:\PROGRAM FILES\ACER REGISTRATION\ACE1.EXE
          C:\PROGRAM FILES\ACER ASSIST\LAUNCHER.EXE
          C:\PROGRAM FILES\ACER ASSIST\LAUNCHER.EXE
          C:\ACER\EMPOWERING TECHNOLOGY\EDSMSNFIX.EXE
          C:\ACER\EMPOWERING TECHNOLOGY\EDSMSNFIX.EXE
          C:\ACER\ACERTOUR\REMINDER.EXE
          C:\ACER\ACERTOUR\REMINDER.EXE
          C:\ACER\EMPOWERING TECHNOLOGY\EDATASECURITY\EDSLOADER.EXE
          C:\ACER\EMPOWERING TECHNOLOGY\EDATASECURITY\EDSLOADER.EXE
          C:\PROGRAM FILES\JAVA\JRE6\BIN\JUSCHED.EXE
          C:\PROGRAM FILES\JAVA\JRE6\BIN\JUSCHED.EXE
          C:\PROGRAM FILES\MALWAREBYTES' ANTI-MALWARE\MBAM.EXE
          C:\PROGRAM FILES\MALWAREBYTES' ANTI-MALWARE\MBAM.EXE
          C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE
          C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE
          C:\PROGRAM FILES\COMMON FILES\INSTALLSHIELD\UPDATESERVICE\ISUSPM.EXE
          C:\PROGRAM FILES\COMMON FILES\INSTALLSHIELD\UPDATESERVICE\ISUSPM.EXE
          C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
          C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
          C:\USERS\KYLE\APPDATA\ROAMING\MJUSBSP\CDLOADER2.EXE
          C:\USERS\KYLE\APPDATA\ROAMING\MJUSBSP\CDLOADER2.EXE
          C:\PROGRAM FILES\COMMON FILES\INSTALLSHIELD\UPDATESERVICE\ISUSPM .EXE
          C:\PROGRAM FILES\COMMON FILES\INSTALLSHIELD\UPDATESERVICE\ISUSPM .EXE
          C:\PROGRAM FILES\COMMON FILES\INSTALLSHIELD\UPDATESERVICE\ISSCH.EXE
          C:\PROGRAM FILES\COMMON FILES\INSTALLSHIELD\UPDATESERVICE\ISSCH.EXE
          C:\PROGRAM FILES\STEAM\STEAM.EXE
          C:\PROGRAM FILES\STEAM\STEAM.EXE
          C:\PROGRAM FILES\ITUNES\ITUNESHELPER.EXE
          C:\PROGRAM FILES\ITUNES\ITUNESHELPER.EXE
          C:\PROGRAM FILES\WINDOWS LIVE\MESSENGER\MSNMSGR.EXE
          C:\PROGRAM FILES\WINDOWS LIVE\MESSENGER\MSNMSGR.EXE
          C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBARNOTIFIER\GOOGLETOOLBARNOTIFIER.EXE
          C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBARNOTIFIER\GOOGLETOOLBARNOTIFIER.EXE
          C:\PROGRAM FILES\YAHOO!\MESSENGER\YAHOOMESSENGER.EXE
          C:\PROGRAM FILES\YAHOO!\MESSENGER\YAHOOMESSENGER.EXE
          [SynTPEnh] C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPENH.EXE
          [eDataSecurity Loader] C:\ACER\EMPOWERING TECHNOLOGY\EDATASECURITY\EDSLOADER.EXE
          [LManager] C:\PROGRA~1\LAUNCH~1\LMANAGER.EXE
          C:\PROGRA~1\LAUNCH~1\LMANAGER.EXE
          [eDSMSNfix] C:\ACER\EMPOWERING TECHNOLOGY\EDSMSNFIX.EXE
          [Acer Product Registration] C:\PROGRAM FILES\ACER REGISTRATION\ACE1.EXE
          [Acer Assist Launcher] C:\PROGRAM FILES\ACER ASSIST\LAUNCHER.EXE
          [Acer Tour Reminder] C:\ACER\ACERTOUR\REMINDER.EXE
          [OneCareUI] C:\PROGRAM FILES\MICROSOFT WINDOWS ONECARE LIVE\WINSSNOTIFY.EXE
          [SunJavaUpdateSched] C:\PROGRAM FILES\JAVA\JRE6\BIN\JUSCHED.EXE
          [QuickTime Task] C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE
          [iTunesHelper] C:\PROGRAM FILES\ITUNES\ITUNESHELPER.EXE
          [Malwarebytes' Anti-Malware (reboot)] C:\PROGRAM FILES\MALWAREBYTES' ANTI-MALWARE\MBAM.EXE
          [ISUSPM Startup] C:\PROGRAM FILES\COMMON FILES\INSTALLSHIELD\UPDATESERVICE\ISUSPM .EXE
          [ISUSScheduler] C:\PROGRAM FILES\COMMON FILES\INSTALLSHIELD\UPDATESERVICE\ISSCH.EXE
          [ISUSPM Startup] C:\PROGRAM FILES\COMMON FILES\INSTALLSHIELD\UPDATESERVICE\ISUSPM.EXE
          [cdloader] C:\USERS\KYLE\APPDATA\ROAMING\MJUSBSP\CDLOADER2.EXE
          [swg] C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBARNOTIFIER\GOOGLETOOLBARNOTIFIER.EXE
          [Steam] C:\PROGRAM FILES\STEAM\STEAM.EXE
          [Messenger (Yahoo!)] C:\PROGRA~1\YAHOO!\MESSEN~1\YAHOOMESSENGER.EXE
          C:\PROGRA~1\YAHOO!\MESSEN~1\YAHOOMESSENGER.EXE
          [Google Update] C:\USERS\KYLE\APPDATA\LOCAL\GOOGLE\UPDATE\GOOGLEUPDATE.EXE
          C:\USERS\KYLE\APPDATA\LOCAL\GOOGLE\UPDATE\GOOGLEUPDATE.EXE
          HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\LManager.EXE
          HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\LManager.EXE#Path
          HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
          HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe#Path
          HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\MSNMSGR.EXE
          HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\MSNMSGR.EXE#Path
          C:\WINDOWS\FONTS\EBX8M4.COM
          C:\WINDOWS\TEMP\LLXF\SETUP.EXE
          C:\Windows\Prefetch\GOOGLEUPDATE.EXE-8F5FE660.pf
          C:\Windows\Prefetch\ISSCH.EXE-67938A78.pf
          C:\Windows\Prefetch\ISUSPM .EXE-8C161833.pf
          C:\Windows\Prefetch\ITUNESHELPER.EXE-FCF4252E.pf
          C:\Windows\Prefetch\MSNMSGR.EXE-9974F251.pf
          C:\Windows\Prefetch\STEAM.EXE-8B1DBB8A.pf
          C:\Windows\Prefetch\WINSSNOTIFY.EXE-E648C4D5.pf
          C:\Windows\Prefetch\YAHOOMESSENGER.EXE-FB86A911.pf

          Adware.Tracking Cookie
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          .doubleclick.net [ C:\Users\Kyle\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
          C:\Users\Kyle\AppData\Local\Temp\Cookies\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Local\Temp\Cookies\[emailprotected][2].txt
          2mdn.net [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          a.ads2.msads.net [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          ads1.msn.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          bannerfarm.ace.advertising.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          beta.naked.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          cdn4.specificclick.net [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          content.oddcast.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          content.yieldmanager.edgesuite.net [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          convoad.technoratimedia.net [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          files.adbrite.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          files.youporn.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          freeporn.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          gallery.teenpinkvideos.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          googleads.g.doubleclick.net [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          hs.interpolls.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          i.*adult URL* [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          ia.media-imdb.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          interclick.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          m1.2mdn.net [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          media.ign.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          media.jambocast.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          media.mtvnservices.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          media.onsugar.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          media.scanscout.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          media.socialvibe.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          media.tattomedia.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          media.wfaa.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          media01.kyte.tv [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          media1.break.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          msnbcmedia.msn.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          naiadsystems.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          objects.tremormedia.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          oddcast.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          papprd.vantage-media.net [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          porn.gonzo-movies.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          *censored*.dreammovies.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          richmedia247.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          s0.2mdn.net [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          SECURE-us.imrworldwide.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          static.discoverymedia.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          static.sexsearch.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          static.youporn.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          templates.mediaforge.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          uclick.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          udn.specificclick.net [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          video-transcripts.findlaw.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          www.crackle.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          www.dump.porntele.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          www.freeporn.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          www.kinxxx.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          www.maxporn.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          www.media2cn.info [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          www.naiadsystems.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          www.pornhub.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          www.ziporn.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          wwwstatic.megaporn.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          yieldmanager.edgesuite.net [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          youporn.videobox.com [ C:\Users\Kyle\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\QZA5463N ]
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][4].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][5].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][7].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][5].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected]media[2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][4].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][5].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][6].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][7].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][8].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][4].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][5].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][5].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][6].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][4].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][4].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][4].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected]rget.db.advertising[2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][10].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][11].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][4].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][5].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][6].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][7].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][8].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][9].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][3].txt
          C:\Users\Kyle\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][4].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][4].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][4].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][4].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt

          Adware.MyWebSearch/FunWebProducts
          HKU\S-1-5-21-560816815-3849694210-249611362-1000\SOFTWARE\FunWebProducts
          HKCR\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA}
          HKCR\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA}\ProxyStubClsid
          HKCR\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA}\ProxyStubClsid32
          HKCR\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA}\TypeLib
          HKCR\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA}\TypeLib#Version
          HKCR\Interface\{120927BF-1700-43BC-810F-FAB92549B390}
          HKCR\Interface\{120927BF-1700-43BC-810F-FAB92549B390}\ProxyStubClsid
          HKCR\Interface\{120927BF-1700-43BC-810F-FAB92549B390}\ProxyStubClsid32
          HKCR\Interface\{120927BF-1700-43BC-810F-FAB92549B390}\TypeLib
          HKCR\Interface\{120927BF-1700-43BC-810F-FAB92549B390}\TypeLib#Version
          HKCR\Interface\{1F52A5FA-A705-4415-B975-88503B291728}
          HKCR\Interface\{1F52A5FA-A705-4415-B975-88503B291728}\ProxyStubClsid
          HKCR\Interface\{1F52A5FA-A705-4415-B975-88503B291728}\ProxyStubClsid32
          HKCR\Interface\{1F52A5FA-A705-4415-B975-88503B291728}\TypeLib
          HKCR\Interface\{1F52A5FA-A705-4415-B975-88503B291728}\TypeLib#Version
          HKCR\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A}
          HKCR\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A}\ProxyStubClsid
          HKCR\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A}\ProxyStubClsid32
          HKCR\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A}\TypeLib
          HKCR\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A}\TypeLib#Version
          HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}
          HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid
          HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid32
          HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib
          HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib#Version
          HKCR\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82}
          HKCR\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82}\ProxyStubClsid
          HKCR\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82}\ProxyStubClsid32
          HKCR\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82}\TypeLib
          HKCR\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82}\TypeLib#Version
          HKCR\Interface\{3E720453-B472-4954-B7AA-33069EB53906}
          HKCR\Interface\{3E720453-B472-4954-B7AA-33069EB53906}\ProxyStubClsid
          HKCR\Interface\{3E720453-B472-4954-B7AA-33069EB53906}\ProxyStubClsid32
          HKCR\Interface\{3E720453-B472-4954-B7AA-33069EB53906}\TypeLib
          HKCR\Interface\{3E720453-B472-4954-B7AA-33069EB53906}\TypeLib#Version
          HKCR\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C}
          HKCR\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C}\ProxyStubClsid
          HKCR\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C}\ProxyStubClsid32
          HKCR\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C}\TypeLib
          HKCR\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C}\TypeLib#Version
          HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}
          HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid
          HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid32
          HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib
          HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib#Version
          HKCR\Interface\{7473D293-B7BB-4F24-AE82-7E2CE94BB6A9}
          HKCR\Interface\{7473D293-B7BB-4F24-AE82-7E2CE94BB6A9}\ProxyStubClsid
          HKCR\Interface\{7473D293-B7BB-4F24-AE82-7E2CE94BB6A9}\ProxyStubClsid32
          HKCR\Interface\{7473D293-B7BB-4F24-AE82-7E2CE94BB6A9}\TypeLib
          HKCR\Interface\{7473D293-B7BB-4F24-AE82-7E2CE94BB6A9}\TypeLib#Version
          HKCR\Interface\{7473D295-B7BB-4F24-AE82-7E2CE94BB6A9}
          HKCR\Interface\{7473D295-B7BB-4F24-AE82-7E2CE94BB6A9}\ProxyStubClsid
          HKCR\Interface\{7473D295-B7BB-4F24-AE82-7E2CE94BB6A9}\ProxyStubClsid32
          HKCR\Interface\{7473D295-B7BB-4F24-AE82-7E2CE94BB6A9}\TypeLib
          HKCR\Interface\{7473D295-B7BB-4F24-AE82-7E2CE94BB6A9}\TypeLib#Version
          HKCR\Interface\{7473D297-B7BB-4F24-AE82-7E2CE94BB6A9}
          HKCR\Interface\{7473D297-B7BB-4F24-AE82-7E2CE94BB6A9}\ProxyStubClsid
          HKCR\Interface\{7473D297-B7BB-4F24-AE82-7E2CE94BB6A9}\ProxyStubClsid32
          HKCR\Interface\{7473D297-B7BB-4F24-AE82-7E2CE94BB6A9}\TypeLib
          HKCR\Interface\{7473D297-B7BB-4F24-AE82-7E2CE94BB6A9}\TypeLib#Version
          HKCR\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8}
          HKCR\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8}\ProxyStubClsid
          HKCR\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8}\ProxyStubClsid32
          HKCR\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8}\TypeLib
          HKCR\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8}\TypeLib#Version
          HKCR\Interface\{991AAC62-B100-47CE-8B75-253965244F69}
          HKCR\Interface\{991AAC62-B100-47CE-8B75-253965244F69}\ProxyStubClsid
          HKCR\Interface\{991AAC62-B100-47CE-8B75-253965244F69}\ProxyStubClsid32
          HKCR\Interface\{991AAC62-B100-47CE-8B75-253965244F69}\TypeLib
          HKCR\Interface\{991AAC62-B100-47CE-8B75-253965244F69}\TypeLib#Version
          HKCR\Interface\{A626CDBD-3D13-4F78-B819-440A28D7E8FC}
          HKCR\Interface\{A626CDBD-3D13-4F78-B819-440A28D7E8FC}\ProxyStubClsid
          HKCR\Interface\{A626CDBD-3D13-4F78-B819-440A28D7E8FC}\ProxyStubClsid32
          HKCR\Interface\{A626CDBD-3D13-4F78-B819-440A28D7E8FC}\TypeLib
          HKCR\Interface\{A626CDBD-3D13-4F78-B819-440A28D7E8FC}\TypeLib#Version
          HKCR\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D}
          HKCR\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D}\ProxyStubClsid
          HKCR\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D}\ProxyStubClsid32
          HKCR\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D}\TypeLib
          HKCR\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D}\TypeLib#Version
          HKCR\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1}
          HKCR\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1}\ProxyStubClsid
          HKCR\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1}\ProxyStubClsid32
          HKCR\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1}\TypeLib
          HKCR\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1}\TypeLib#Version
          HKCR\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477}
          HKCR\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477}\ProxyStubClsid
          HKCR\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477}\ProxyStubClsid32
          HKCR\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477}\TypeLib
          HKCR\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477}\TypeLib#Version
          HKCR\Interface\{E342AF55-B78A-4CD0-A2BB-DA7F52D9D25F}
          HKCR\Interface\{E342AF55-B78A-4CD0-A2BB-DA7F52D9D25F}\ProxyStubClsid
          HKCR\Interface\{E342AF55-B78A-4CD0-A2BB-DA7F52D9D25F}\ProxyStubClsid32
          HKCR\Interface\{E342AF55-B78A-4CD0-A2BB-DA7F52D9D25F}\TypeLib
          HKCR\Interface\{E342AF55-B78A-4CD0-A2BB-DA7F52D9D25F}\TypeLib#Version
          HKCR\Interface\{E79DFBC9-5697-4FBD-94E5-5B2A9C7C1612}
          HKCR\Interface\{E79DFBC9-5697-4FBD-94E5-5B2A9C7C1612}\ProxyStubClsid
          HKCR\Interface\{E79DFBC9-5697-4FBD-94E5-5B2A9C7C1612}\ProxyStubClsid32
          HKCR\Interface\{E79DFBC9-5697-4FBD-94E5-5B2A9C7C1612}\TypeLib
          HKCR\Interface\{E79DFBC9-5697-4FBD-94E5-5B2A9C7C1612}\TypeLib#Version
          HKCR\Interface\{E79DFBCB-5697-4FBD-94E5-5B2A9C7C1612}
          HKCR\Interface\{E79DFBCB-5697-4FBD-94E5-5B2A9C7C1612}\ProxyStubClsid
          HKCR\Interface\{E79DFBCB-5697-4FBD-94E5-5B2A9C7C1612}\ProxyStubClsid32
          HKCR\Interface\{E79DFBCB-5697-4FBD-94E5-5B2A9C7C1612}\TypeLib
          HKCR\Interface\{E79DFBCB-5697-4FBD-94E5-5B2A9C7C1612}\TypeLib#Version
          HKCR\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8}
          HKCR\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8}\ProxyStubClsid
          HKCR\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8}\ProxyStubClsid32
          HKCR\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8}\TypeLib
          HKCR\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8}\TypeLib#Version
          HKCR\Interface\{F87D7FB5-9DC5-4C8C-B998-D8DFE02E2978}
          HKCR\Interface\{F87D7FB5-9DC5-4C8C-B998-D8DFE02E2978}\ProxyStubClsid
          HKCR\Interface\{F87D7FB5-9DC5-4C8C-B998-D8DFE02E2978}\ProxyStubClsid32
          HKCR\Interface\{F87D7FB5-9DC5-4C8C-B998-D8DFE02E2978}\TypeLib
          HKCR\Interface\{F87D7FB5-9DC5-4C8C-B998-D8DFE02E2978}\TypeLib#Version
          All processes killed
          ========== OTL ==========
          ========== FILES ==========
          C:\Users\Kyle\AppData\Local\Temp\RtkBtMnt.exe moved successfully.
          ========== COMMANDS ==========
          HOSTS file reset successfully

          [EMPTYTEMP]

          User: All Users

          User: Default
          ->Temp folder emptied: 0 bytes
          ->Temporary Internet Files folder emptied: 33170 bytes

          User: Default User
          ->Temp folder emptied: 0 bytes
          ->Temporary Internet Files folder emptied: 0 bytes

          User: Kyle
          ->Temp folder emptied: 633665586 bytes
          ->Temporary Internet Files folder emptied: 42445332 bytes
          ->Java cache emptied: 15492878 bytes
          ->FireFox cache emptied: 44935939 bytes
          ->Google Chrome cache emptied: 9498871 bytes
          ->Opera cache emptied: 40331458 bytes
          ->Flash cache emptied: 214581 bytes

          User: Public

          %systemdrive% .tmp files removed: 0 bytes
          %systemroot% .tmp files removed: 0 bytes
          %systemroot%\System32 .tmp files removed: 0 bytes
          %systemroot%\System32\drivers .tmp files removed: 0 bytes
          Windows Temp folder emptied: 59846284 bytes
          RecycleBin emptied: 0 bytes

          Total Files Cleaned = 807.00 mb


          OTL by OldTimer - Version 3.2.22.3 log created on 05062011_212804

          Files\Folders moved on Reboot...
          File\Folder C:\Users\Kyle\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\
          Content.IE5\N2F9O6QB(54)\00;ord=1302024385839;u=i_8244773960578074628%7Cm_175506;
          dcopt=ist;tile=1;um=0;us=13;eb_trk=175506;pr=20;xp=20;np=20;uz=;cg=
          4464f21312e0a0aa14b10751ff38dfeb[1].htm not found!
          File\Folder C:\Users\Kyle\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\G48RJ7S6(95)\W5lBHNsawNlbnRpdHlob3Zlcl9jbwR1cmwDaHR0cDovL3VzLm1nNi5tYWlsLnlhaG9vLmNvbS9kYy9sYXVuY2g_
          Lmd4PTEmLnJhbmQ9YzNpaXFtdjBoNmd0MgR2aXN pYmxlAzAEd2lraUlkAwR3dAMwLjQyNjgy[1] not found!
          File\Folder C:\Users\Kyle\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\261IQPX2(52)\
          00;ord=1302024385839;u=i_8244744755065835024%7Cm_175506;dcopt=ist;tile=1;um=0;us=13;eb_trk=175506;pr=20;xp=20;np=20;uz=;cg=4464f21312e0a0aa14b10751ff38dfeb[1].htm not found!
          File\Folder C:\Users\Kyle\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BH4XQVI8(91)\40134;origin=msn;pmt=;freeplay=y;userfreeplay=n;login=n;country=;locale=en_US;firstrun=n;firstsession=n;sz=358x336;
          ord=587976912;NonPmt=n;subtier=;trialdaysleft=0;[1] not found!
          File\Folder C:\Users\Kyle\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BH4XQVI8(91)\=40134;origin=msn;pmt=;freeplay=y;userfreeplay=n;login=n;country=;locale=en_US;firstrun=n;firstsession=n;sz=735x80;ord=
          666080939;NonPmt=n;subtier=;trialdaysleft=0;[1] not found!

          Registry entries deleted on Reboot...
          Logfile of The Avenger Version 2.0, (c) by Swandog46
          http://swandog46.geekstogo.com

          Platform: Windows Vista

          *******************

          Script file opened successfully.
          Script file read successfully.

          Backups directory opened successfully at C:\Avenger

          *******************

          Beginning to process script file:

          Rootkit scan active.
          No rootkits found!


          Completed script processing.

          *******************

          Finished! Terminate.
          Ok that's all the replies for the 3 programs that you had me download.Just let me know if there is anything else that needs to be done Please let me know what's happening with your computer now?

          I'd like to scan your machine with ESET OnlineScan

          •Hold down Control and click on the following link to open ESET OnlineScan in a new window.
          ESET OnlineScan
          •Click the button.
          •For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

          • Click on to download the ESET Smart Installer. Save it to your desktop.
          • Double click on the icon on your desktop.
          •Check
          •Click the button.
          •Accept any security warnings from your browser.
          •Check
          •Push the Start button.
          •ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
          •When the scan completes, push
          •Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
          •Push the button.
          •Push
          A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt
          [emailprotected] as downloader log:
          all ok
          # version=7
          # OnlineScannerApp.exe=1.0.0.1
          # OnlineScanner.ocx=1.0.0.6427
          # api_version=3.0.2
          # EOSSerial=91310ff4a8c38f43adb3c87106b6486d
          # end=finished
          # remove_checked=true
          # archives_checked=true
          # unwanted_checked=true
          # unsafe_checked=false
          # antistealth_checked=true
          # utc_time=2011-05-08 07:32:09
          # local_time=2011-05-08 12:32:09 (-0800, Pacific Daylight Time)
          # country="United States"
          # lang=1033
          # osver=6.0.6002 NT Service Pack 2
          # compatibility_mode=5892 16776574 100 100 0 141482523 0 0
          # compatibility_mode=8192 67108863 100 0 0 0 0 0
          # scanned=145911
          # found=0
          # cleaned=0
          # scan_time=8133
          Everything is running fine just to let you know.It starts up normally and performs normally like it used to.It seems to me like everything is fixed.I don't know if the last reply tells you or not but the ESET found absolutely nothing wrong.If there is anything else to do let me know.If not I want to say thank you very much for helping me.I really could not have fixed this without your help.You have my utmost gratitude and thanks.That sounds great. Let's do some cleanup.You can keep SAS and MBAM, if you wish. Update them and run them on a regular basis. All the other tools can be uninstalled/ removed.

          To set a new Restore Point.

          Click Start button , click Control Panel, click System and Maintenance, and then clicking System. In the left pane, click System Protection. If you are prompted for an administrator password or confirmation, type the password or provide confirmation. To turn off System Protection for a hard disk, clear the check box next to the disk, and then click OK. Reboot to NORMAL Mode.
          Click the Start button , click Control Panel, click System and Maintenance, and then click System.
          In the left pane, click System Protection. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
          To turn on System Protection for a hard disk, select the check box next to the disk, and then click OK.
          This will give you a new, clean Restore Point.
          *************************************************
          Clean out your temporary internet files and temp files.

          Download TFC by OldTimer to your desktop.

          Double-click TFC.exe to run it.

          Note: If you are running on Vista, right-click on the file and choose Run As Administrator

          TFC will close all programs when run, so make sure you have saved all your work before you begin.

          * Click the Start button to begin the cleaning process.
          * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
          * Please let TFC run uninterrupted until it is finished.

          Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
          ************************************************
          To remove all of the tools we used and the files and folders they created do the following:
          Double click OTL.exe.
          • Click the CleanUp button.
          • Select Yes when the "Begin cleanup Process?" prompt appears.
          • If you are prompted to Reboot during the cleanup, select Yes.
          • The tool will delete itself once it finishes.
          Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
          *****************************************************
          Looking over your log it seems you don't have any evidence of a third party firewall.

          Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors.

          Remember only install ONE firewall

          1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one)
          2) Online Armor
          3) Agnitum Outpost
          4) PC Tools Firewall Plus

          If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
          *********************************************************
          Update Your Java (JRE)

          Old versions of Java have vulnerabilities that malware can use to infect your system.

          First Verify your Java Version

          If there are any other version(s) installed then update now.

          Get the new version (if needed)

          If your version is out of date install the newest version of the Sun Java Runtime Environment.

          Note: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

          Be sure to close ALL open web browsers before starting the installation.

          Remove any old versions

          1. Download JavaRa and unzip the file to your Desktop.
          2. Open JavaRA.exe and choose Remove Older Versions
          3. Once complete exit JavaRA.

          Additional Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and reboot your computer.
          *****************************************************
          Use the Secunia Software Inspector to check for out of date software.

          •Click Start Now

          •Check the box next to Enable thorough system inspection.

          •Click Start

          •Allow the scan to finish and scroll down to see if any updates are needed.
          •Update anything listed.
          .
          ----------

          Go to Microsoft Windows Update and get all critical updates.

          ----------

          I suggest using WOT - Web of TRUST. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

          SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
          * Using SpywareBlaster to protect your computer from Spyware and Malware
          * If you don't know what ActiveX controls are, see here

          Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

          Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

          Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
          Safe Surfing!Your post has been deleted. If you need help, please start your own thread and post the logs. Do Not hijack someone else's thread.
          4485.

          Solve : Windows running slow; won't update?

          Answer»

          I'll try to find someone that has the CD, but apparently it's becoming pretty common to not receive a Windows CD with a new computer. Do I have other routes to getting a CD, or other options entirely?Quote from: shag on September 02, 2011, 08:11:01 PM

          I'll try to find someone that has the CD, but apparently it's becoming pretty common to not receive a Windows CD with a new computer.
          Right, but manufacturers put a recovery partition on the hard drive as a substitute for a Windows CD. Open Computer, where you see your DRIVES listed. What is D on your computer? If you have a partition lettered D, how large is that partition and how much space is USED on it? Or, is D a partition you use for other purposes or is D assigned to an optical drive? This info provides a fairly clear indication of whether your computer has a recovery partition.

          Also, what is the make and model of your computer?

          Edit: SuperDave: I hope my comments here are not out of line. I'll avoid posting on the actual virus of malware issues. Thanks Soybean. I went back and checked and the C drive is partitioned with, what I assume is, the Recovery CONSOLE. Please try this.

          1. Eject and remove any discs or memory cards from your computer.

          2. Click the "Start" button on the desktop to open the Start menu, click the small arrow icon to the right of the lock icon and select "Restart".

          3. Hold the "F8" key on your computer's keyboard as Windows Vista reboots.

          4. Highlight and select "Repair your computer" choose your keyboard type and click "NEXT".

          5. Choose your user name, type your password if prompted and click "OK" to access the System Recovery Options menu.Yep, the hard drive is partitioned with a D: Recovery. I was able to re-load windows from the Recovery Console.

          Windows Update FOUND 103 updates for my reloaded Vista, but Update still doesn't seem to work right. I ran it once and after ~15 minutes it still said 0% downloaded. I restarted and tried to run it again and this time the program froze before ever starting up.Quote
          I was able to re-load windows from the Recovery Console.
          Did you do a Recovery or just a repair?
          Did you try going to the MS site and getting your updates?I did a recovery.

          All of those updates that wouldn't install a couple days ago--Windows Update now reports them as installed. I can't even venture a guess as to what went down there.

          I guess it is not necessary to try the manual downloading of updates now.

          There's still times when I wonder why this machine runs so slowly. Might there be a way to check processor speed/other hardware and make sure it is performing as it should?Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
          4486.

          Solve : CANNOT remove or delete programs! HELP!?

          Answer»

          Hello!

          Well I am having serious computer trouble, its just started up from out of the blue.

          I was running out out disk space so I decided to go remove or delete a few programs. When I went to the Add/Remove Programs list I deleted a few things but some other programs when I clicked on it, it didnt have any button at all. No remove or delete one. Win Zip in particular.

          What should I do? I really need to get rid of these old programs.

          Please Help! Thanks in advance.jalapino started another thread:
          Quote

          Yet another problem, I have a few folders hidden from plain view but now all of a sudden I'm unable to show them. I click show hidden files and folders and when I click okay nothing happends. I go back to the list and see that it has switched back to 'do not show hidden files and folders' once again.

          This is really getting annoying, please help!!
          quaxo responded:
          Quote
          From reading this and your other post, it sounds like you might have a virus or your Windows installation has gone bad.

          I'll let Broni or one of the other malware guys pick this up though.
          Print these instructions out.

          1. Download SUPERAntiSpyware Free for Home Users:
          http://www.superantispyware.com/

          * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
          * An icon will be created on your desktop. Double-click that icon to launch the program.
          * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
          * Close SUPERAntiSpyware.

          Restart computer in Safe Mode.
          To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

          * Open SUPERAntiSpyware.
          * Under "Configuration and Preferences", click the Preferences button.
          * Click the Scanning Control tab.
          * Under Scanner Options make sure the following are checked (leave all others unchecked):
          o Close browsers before scanning.
          o Scan for tracking cookies.
          o Terminate memory threats before quarantining.
          * Click the "Close" button to leave the control center screen.
          * Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
          * On the left, make sure you check C:\Fixed Drive.
          * On the right, under "Complete Scan", choose Perform Complete Scan.
          * Click "Next" to start the scan. Please be patient while it scans your computer.
          * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
          * Make sure EVERYTHING has a checkmark next to it and click "Next".
          * A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
          * If asked if you want to reboot, click "Yes".
          * To retrieve the removal information after reboot, launch SUPERAntispyware again.
          o Click Preferences, then click the Statistics/Logs tab.
          o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
          o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
          o Please copy and PASTE the Scan Log results in your next reply.
          * Click Close to exit the program.
          Post SUPERAntiSpyware log.

          RESTART COMPUTER!

          2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

          * Double-click mbam-setup.exe and follow the prompts to install the program.
          * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
          * If an update is found, it will download and install the latest version.
          * Once the program has loaded, select Perform full scan, then click Scan.
          * When the scan is complete, click OK, then Show Results to view the results.
          * Be sure that everything is checked, and click Remove Selected.
          * When completed, a log will open in Notepad.
          * Post the log back here.

          The log can also be found here:
          C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
          Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

          RESTART COMPUTER!

          3. Download HijackThis:
          http://www.snapfiles.com/get/hijackthis.html
          Post HijackThis log.OK I ran the program and here is my log as requested.







          SUPERAntiSpyware Scan Log
          http://www.superantispyware.com

          Generated 04/26/2008 at 05:02 PM

          Application Version : 4.0.1154

          Core Rules Database Version : 3448
          Trace Rules Database Version: 1440

          Scan type : Complete Scan
          Total Scan Time : 00:55:50

          Memory items scanned : 179
          Memory threats detected : 0
          Registry items scanned : 4274
          Registry threats detected : 5
          File items scanned : 44965
          File threats detected : 64

          Adware.Tracking Cookie
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][6].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][4].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][3].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][7].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][8].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][5].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][9].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][2].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt
          C:\Documents and Settings\Owner\Cookies\[emailprotected][1].txt

          Browser Hijacker.Deskbar
          HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}
          HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid
          HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid32
          HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib
          HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib#Version
          Quote from: Broni on April 26, 2008, 09:08:18 AM
          Print these instructions out.

          1. Download SUPERAntiSpyware Free for Home Users:
          http://www.superantispyware.com/

          * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
          * An icon will be created on your desktop. Double-click that icon to launch the program.
          * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
          * Close SUPERAntiSpyware.

          Restart computer in Safe Mode.
          To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

          * Open SUPERAntiSpyware.
          * Under "Configuration and Preferences", click the Preferences button.
          * Click the Scanning Control tab.
          * Under Scanner Options make sure the following are checked (leave all others unchecked):
          o Close browsers before scanning.
          o Scan for tracking cookies.
          o Terminate memory threats before quarantining.
          * Click the "Close" button to leave the control center screen.
          * Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
          * On the left, make sure you check C:\Fixed Drive.
          * On the right, under "Complete Scan", choose Perform Complete Scan.
          * Click "Next" to start the scan. Please be patient while it scans your computer.
          * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
          * Make sure everything has a checkmark next to it and click "Next".
          * A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
          * If asked if you want to reboot, click "Yes".
          * To retrieve the removal information after reboot, launch SUPERAntispyware again.
          o Click Preferences, then click the Statistics/Logs tab.
          o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
          o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
          o Please copy and paste the Scan Log results in your next reply.
          * Click Close to exit the program.
          Post SUPERAntiSpyware log.

          RESTART COMPUTER!

          2. Download Malwarebytes' Anti-Malware: http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html to your desktop.

          * Double-click mbam-setup.exe and follow the prompts to install the program.
          * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
          * If an update is found, it will download and install the latest version.
          * Once the program has loaded, select Perform full scan, then click Scan.
          * When the scan is complete, click OK, then Show Results to view the results.
          * Be sure that everything is checked, and click Remove Selected.
          * When completed, a log will open in Notepad.
          * Post the log back here.

          The log can also be found here:
          C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
          Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

          RESTART COMPUTER!

          3. Download HijackThis:
          http://www.snapfiles.com/get/hijackthis.html
          Post HijackThis log.

          Thank you Broni for your quick response.

          I'm still having problems though, I restarted the computer planning to follow your instructions and enter safe mode. I clicked Safe Mode when the option came up and then the screen flipped and this is something that showed and it froze on this:

          Multi(0)disk(0)rdisk(0)partition(1)\Windows

          and it continued \System32

          and \drivers
          \partmgr
          \ compbatt.sys

          It was a long list and it went on and on and I wated but it froze there so I shut my pc down and enter normal mode to tell you.

          Another thing that started up yesterday is everything is showing up corrupt.

          Palstart:palstart.exe - Corrupt File
          Iexploer corrupt file
          msnmsgr corrupt and ect.

          PLEASE HELP! Okay, the last post of mine can be ignored. I finally got my computer to enter Safe Mode and I downloaded SUPERAntiSpyware and I would post the log but everytime I try to get it, it freezes. But what I do know is that 260 threats were found and deleted.

          A new problem:

          Tried to download the Malwarebytes Anti Malware but this is the error that comes up in the middle of instalation:

          Unable to register the DLL\OCX;CREATEPROCESS Failed; Code 2
          The system cannot find the file specified.

          and it asks me if I want to abort or ignore.

          If I put ignore it keeps coming up untill none of the program can be downloaded.

          I know I must be getting annoying but my computer is a mess and not acting right at all, any help would be greatly appreciated.

          Thank you.
          Post HijackThis log, please.
          You may have some serious corruption of Windows files, though...Okay, Here it is:

          Logfile of Trend Micro HijackThis v2.0.2
          Scan saved at 1:27:46 PM, on 5/1/2008
          Platform: Windows XP SP2 (WinNT 5.01.2600)
          MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
          Boot mode: Normal

          Running processes:
          C:\WINDOWS\System32\smss.exe
          C:\WINDOWS\system32\winlogon.exe
          C:\WINDOWS\system32\services.exe
          C:\WINDOWS\system32\lsass.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\System32\svchost.exe
          C:\WINDOWS\system32\spoolsv.exe
          C:\PROGRA~1\GRISOFT\AVGFRE~1\avgamsvr.exe
          C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
          C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
          C:\Program Files\Bonjour\mDNSResponder.exe
          C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
          C:\WINDOWS\system32\nvsvc32.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\Explorer.EXE
          C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
          C:\Program Files\iTunes\iTunesHelper.exe
          C:\WINDOWS\system32\AWUSGSTA.EXE
          C:\WINDOWS\system32\DrvMon.exe
          C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
          C:\Program Files\Paltalk Messenger\palstart.exe
          C:\Program Files\iPod\bin\iPodService.exe
          C:\Program Files\Internet Explorer\IEXPLORE.EXE
          C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
          C:\WINDOWS\system32\msiexec.exe
          C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
          C:\WINDOWS\system32\NOTEPAD.EXE

          R1 - HKCU\Software\Microsoft\Internet Explorer\Main,SearchAssistant = http://search.bearshare.com/sidebar.html?src=ssb
          R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.fatwaislam.com/
          R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
          R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Favorites
          R3 - URLSearchHook: (no name) - {D3DEE18F-DB64-4BEB-9FF1-E1F0A5033E4A} - (no file)
          O2 - BHO: (no name) - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - (no file)
          O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
          O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
          O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
          O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FLASHGET\jccatch.dll
          O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
          O2 - BHO: XBTP02634 - {F97DA966-F09D-4cab-BF29-75A0026986EA} - (no file)
          O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\fgiebar.dll
          O3 - Toolbar: (no name) - {D3DEE18F-DB64-4BEB-9FF1-E1F0A5033E4A} - (no file)
          O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
          O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
          O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
          O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
          O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
          O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
          O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\K-Lite Codec Pack\QuickTime\qttask.exe" -atboottime
          O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
          O4 - HKLM\..\Run: [AWUSGSTA.EXE] AWUSGSTA.EXE START
          O4 - HKCU\..\Run: [DrvMon.exe] C:\WINDOWS\system32\DrvMon.exe
          O4 - HKCU\..\Run: [amva] C:\WINDOWS\system32\amvo.exe
          O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
          O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
          O4 - HKUS\S-1-5-19\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'LOCAL SERVICE')
          O4 - HKUS\S-1-5-19\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User 'LOCAL SERVICE')
          O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
          O4 - HKUS\S-1-5-20\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'NETWORK SERVICE')
          O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
          O4 - HKUS\S-1-5-18\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'SYSTEM')
          O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
          O4 - HKUS\.DEFAULT\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'Default user')
          O4 - Global Startup: PalStart.lnk = C:\Program Files\Paltalk Messenger\palstart.exe
          O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
          O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm
          O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm
          O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~1\OFFICE11\EXCEL.EXE/3000
          O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
          O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
          O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
          O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
          O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
          O9 - Extra button: PalTalk - {4EAFEF58-EEFA-4116-983D-03B49BCBFFFE} - C:\Program Files\Paltalk Messenger\Paltalk.exe
          O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL
          O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
          O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
          O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - C:\Documents and Settings\XPPRESP3\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)
          O14 - IERESET.INF: START_PAGE_URL=http://www.google.com
          O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
          O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/EN-US/a-UNO1/GAME_UNO1.cab
          O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1208390558276
          O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
          O17 - HKLM\System\CCS\Services\Tcpip\..\{C97B725F-8AED-434C-A737-BC4598B5F638}: NameServer = 4.2.2.2,4.2.2.3
          O20 - AppInit_DLLs: c:\progra~1\bandoo\bndhook.dll
          O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
          O22 - SharedTaskScheduler: admissibility - {da3b49f6-8c54-4429-a275-21a86dcca413} - (no file)
          O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
          O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
          O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
          O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
          O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
          O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
          O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
          O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
          O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
          O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe

          --
          End of file - 8556 bytes
          You DO have some serious infections...

          Download SDFix (http://downloads.andymanchesta.com/removaltools/sdfix.exe) and save it to your Desktop.

          * Run the SDFix.exe by double clicking on it.
          * Allow it to install into the default location which is c:\SDFix
          * Now please reboot your computer into Safe Mode:
          # After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
          # Instead of Windows loading as normal, the Advanced Options Menu should appear;
          # Select the first option, to run Windows in Safe Mode, then press Enter.
          * When you have booted into safe mode, open the C:\SDFix folder and double click RunThis.bat to start the script.
          * Type Y to begin the cleanup process.
          * It will remove any Trojan Services or Registry entries found and then prompt you to press any key to Reboot.
          * Press any Key and it will restart the PC.
          * When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
          * Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt.
          * Attach the Report.txt file to your next message.

          Post new HJT logOkay here is the Log.

          And one question, do you have a link to a good free virus protection? If so I would really appreciate it because right now I'm working with nothing.


          SDFix: Version 1.177
          Run by XPPRESP3 on Sat 05/03/2008 at 03:54 PM

          Microsoft Windows XP [Version 5.1.2600]
          Running From: C:\SDFix

          Checking Services :


          Restoring Windows Registry Values
          Restoring Windows Default Hosts File
          Restoring Missing Security Center Service

          Rebooting


          Checking Files :

          Trojan Files Found:

          C:\autorun.inf - Deleted





          Removing Temp Files

          ADS Check :



          Final Check :

          catchme 0.3.1353.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
          Rootkit scan 2008-05-03 16:02:14
          Windows 5.1.2600 Service Pack 2 FAT NTAPI

          scanning hidden processes ...

          scanning hidden services ...

          scanning hidden autostart entries ...

          scanning hidden files ...

          scan completed successfully
          hidden processes: 0
          hidden services: 0
          hidden files: 0


          Remaining Services :




          Authorized Application Key Export:

          [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
          "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
          "C:\\Program Files\\MSN Messenger\\MSNMSGR.EXE"="C:\\Program Files\\MSN Messenger\\MSNMSGR.EXE:*:Enabled:Messenger"
          "C:\\Program Files\\iMesh Applications\\iMesh\\iMesh.exe"="C:\\Program Files\\iMesh Applications\\iMesh\\iMesh.exe:*:Enabled:iMesh"
          "C:\\Program Files\\MSN Messenger\\livecall.exe"="C:\\Program Files\\MSN Messenger\\livecall.exe:*:Enabled:Windows Live Call"

          [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
          "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"

          Remaining Files :


          File Backups: - C:\SDFix\backups\backups.zip

          Files with Hidden Attributes :

          Wed 4 Aug 2004 1,042,903 A..HR --- "C:\WINDOWS\SET3.tmp"
          Wed 4 Aug 2004 1,086,058 A..HR --- "C:\WINDOWS\SET4.tmp"
          Wed 4 Aug 2004 13,753 A..HR --- "C:\WINDOWS\SET8.tmp"
          Mon 21 Mar 2005 29,491 A..HR --- "C:\WINDOWS\SET31.tmp"
          Sat 19 Mar 2005 13,574 A..HR --- "C:\WINDOWS\SET32.tmp"
          Sat 19 Mar 2005 10,786 A..HR --- "C:\WINDOWS\SET33.tmp"
          Sat 19 Mar 2005 16,497 A..HR --- "C:\WINDOWS\SET34.tmp"
          Sun 20 Mar 2005 18,199 A..HR --- "C:\WINDOWS\SET35.tmp"
          Sat 3 May 2008 70,656 ..SHR --- "C:\WINDOWS\system32\amvo0.dll"
          Thu 23 Aug 2001 5,632 A..HR --- "C:\WINDOWS\system32\kbda1.dll"
          Thu 23 Aug 2001 5,632 A..HR --- "C:\WINDOWS\system32\kbda2.dll"
          Thu 23 Aug 2001 5,632 A..HR --- "C:\WINDOWS\system32\kbda3.dll"
          Thu 23 Aug 2001 5,632 A..HR --- "C:\WINDOWS\system32\kbdurdu.dll"
          Thu 23 Aug 2001 5,632 A..HR --- "C:\WINDOWS\system32\kbddiv1.dll"
          Thu 23 Aug 2001 5,632 A..HR --- "C:\WINDOWS\system32\kbddiv2.dll"
          Thu 23 Aug 2001 5,632 A..HR --- "C:\WINDOWS\system32\kbdsyr1.dll"
          Thu 23 Aug 2001 5,632 A..HR --- "C:\WINDOWS\system32\kbdsyr2.dll"
          Thu 18 Nov 2004 347,136 A..HR --- "C:\WINDOWS\system32\hypertrm.dll"
          Mon 28 Apr 2008 70,656 ..SHR --- "C:\WINDOWS\system32\amvo1.dll"
          Mon 28 Apr 2008 104,269 ..SHR --- "C:\WINDOWS\system32\amvo.exe"
          Tue 22 Apr 2008 54,784 A.SH. --- "C:\System Volume Information\_restore{18A18FFB-FF38-47D8-BA85-6731707266CB}\RP27\A0079691.dll"
          Tue 22 Apr 2008 54,784 A.SH. --- "C:\System Volume Information\_restore{18A18FFB-FF38-47D8-BA85-6731707266CB}\RP28\A0079725.dll"

          Finished!

          I need new HJT log.HJT LOG:

          Logfile of Trend Micro HijackThis v2.0.2
          Scan saved at 1:37:50 AM, on 5/5/2008
          Platform: Windows XP SP2 (WinNT 5.01.2600)
          MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
          Boot mode: Normal

          Running processes:
          C:\WINDOWS\System32\smss.exe
          C:\WINDOWS\system32\winlogon.exe
          C:\WINDOWS\system32\services.exe
          C:\WINDOWS\system32\lsass.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\System32\svchost.exe
          C:\WINDOWS\system32\spoolsv.exe
          C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
          C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
          C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
          C:\Program Files\Bonjour\mDNSResponder.exe
          C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
          C:\WINDOWS\system32\nvsvc32.exe
          C:\WINDOWS\system32\svchost.exe
          C:\WINDOWS\Explorer.EXE
          C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe
          C:\Program Files\iTunes\iTunesHelper.exe
          C:\WINDOWS\system32\AWUSGSTA.EXE
          C:\WINDOWS\system32\DrvMon.exe
          C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
          C:\Program Files\Paltalk Messenger\palstart.exe
          C:\Program Files\iPod\bin\iPodService.exe
          C:\Program Files\MSN Messenger\msnmsgr.exe
          C:\WINDOWS\system32\msiexec.exe
          C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
          C:\Program Files\Internet Explorer\IEXPLORE.EXE
          C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLLoginProxy.exe
          C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

          R1 - HKCU\Software\Microsoft\Internet Explorer\Main,SearchAssistant = http://search.bearshare.com/sidebar.html?src=ssb
          R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.fatwaislam.com/
          R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
          R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Favorites
          R3 - URLSearchHook: (no name) - {D3DEE18F-DB64-4BEB-9FF1-E1F0A5033E4A} - (no file)
          O2 - BHO: (no name) - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - (no file)
          O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
          O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
          O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
          O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FLASHGET\jccatch.dll
          O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
          O2 - BHO: XBTP02634 - {F97DA966-F09D-4cab-BF29-75A0026986EA} - (no file)
          O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\fgiebar.dll
          O3 - Toolbar: (no name) - {D3DEE18F-DB64-4BEB-9FF1-E1F0A5033E4A} - (no file)
          O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
          O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
          O4 - HKLM\..\Run: [Mouse Suite 98 Daemon] ICO.EXE
          O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
          O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
          O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\K-Lite Codec Pack\QuickTime\qttask.exe" -atboottime
          O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
          O4 - HKLM\..\Run: [AWUSGSTA.EXE] AWUSGSTA.EXE START
          O4 - HKCU\..\Run: [DrvMon.exe] C:\WINDOWS\system32\DrvMon.exe
          O4 - HKCU\..\Run: [amva] C:\WINDOWS\system32\amvo.exe
          O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
          O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
          O4 - HKUS\S-1-5-19\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'LOCAL SERVICE')
          O4 - HKUS\S-1-5-19\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User 'LOCAL SERVICE')
          O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
          O4 - HKUS\S-1-5-20\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'NETWORK SERVICE')
          O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
          O4 - HKUS\S-1-5-18\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'SYSTEM')
          O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
          O4 - HKUS\.DEFAULT\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'Default user')
          O4 - Global Startup: PalStart.lnk = C:\Program Files\Paltalk Messenger\palstart.exe
          O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
          O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm
          O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm
          O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~1\OFFICE11\EXCEL.EXE/3000
          O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
          O8 - Extra context menu item: Yahoo! &Maps - file:///C:\Program Files\Yahoo!\Common/ycmap.htm
          O8 - Extra context menu item: Yahoo! &SMS - file:///C:\Program Files\Yahoo!\Common/ycsms.htm
          O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
          O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
          O9 - Extra button: PalTalk - {4EAFEF58-EEFA-4116-983D-03B49BCBFFFE} - C:\Program Files\Paltalk Messenger\Paltalk.exe
          O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL
          O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
          O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
          O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - C:\Documents and Settings\XPPRESP3\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)
          O14 - IERESET.INF: START_PAGE_URL=http://www.google.com
          O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
          O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - http://messenger.zone.msn.com/EN-US/a-UNO1/GAME_UNO1.cab
          O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1208390558276
          O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
          O17 - HKLM\System\CCS\Services\Tcpip\..\{C97B725F-8AED-434C-A737-BC4598B5F638}: NameServer = 4.2.2.2,4.2.2.3
          O20 - AppInit_DLLs: c:\progra~1\bandoo\bndhook.dll
          O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
          O22 - SharedTaskScheduler: admissibility - {da3b49f6-8c54-4429-a275-21a86dcca413} - (no file)
          O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
          O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
          O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
          O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVGFRE~1\avgemc.exe
          O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
          O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
          O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
          O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
          O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
          O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe

          --
          End of file - 8564 bytes
          *** You need to update your Java:
          http://java.sun.com/javase/downloads/index.jsp
          Java Runtime Environment (JRE) 6 Update 6
          Uninstall all previous versions of Java through Add\Remove.

          *** Go Start>Control Panel>Add\Remove, and uninstall BearShare (if present)

          1. Print this post out, since you won't have an access to it, at some point.

          2. Close all windows, except for HijackThis.

          3. Put a checkmark next to the following HijackThis entries (some entries will be checkmarked to disable unnecessary startups; in those cases (marked with *), no actual program will be removed):

          - R1 - HKCU\Software\Microsoft\Internet Explorer\Main,SearchAssistant = http://search.bearshare.com/sidebar.html?src=ssb
          - R3 - URLSearchHook: (no name) - {D3DEE18F-DB64-4BEB-9FF1-E1F0A5033E4A} - (no file)
          - O2 - BHO: (no name) - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - (no file)
          - O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
          - O2 - BHO: XBTP02634 - {F97DA966-F09D-4cab-BF29-75A0026986EA} - (no file)
          - O3 - Toolbar: (no name) - {D3DEE18F-DB64-4BEB-9FF1-E1F0A5033E4A} - (no file)
          - *O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\K-Lite Codec Pack\QuickTime\qttask.exe" -atboottime
          - *O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
          - O4 - HKCU\..\Run: [amva] C:\WINDOWS\system32\amvo.exe
          - O4 - HKUS\S-1-5-19\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'LOCAL SERVICE')
          - O4 - HKUS\S-1-5-20\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'NETWORK SERVICE')
          - O4 - HKUS\S-1-5-18\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'SYSTEM')
          - O4 - HKUS\.DEFAULT\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'Default user')
          - O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - C:\Documents and Settings\XPPRESP3\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)
          - if Level 3 Communications, Inc. is NOT your ISP, checkmark: O17 - HKLM\System\CCS\Services\Tcpip\..\{C97B725F-8AED-434C-A737-BC4598B5F638}: NameServer = 4.2.2.2,4.2.2.3
          - if you don't use Bandoo anymore, checkmark: O20 - AppInit_DLLs: c:\progra~1\bandoo\bndhook.dll
          - *O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
          - O22 - SharedTaskScheduler: admissibility - {da3b49f6-8c54-4429-a275-21a86dcca413} - (no file)

          4. Click on Fix checked button.

          5. Restart your computer in Safe Mode (keep tapping F8 key, when your computer starts, until menu appears)

          6. Open Windows Explorer. Go Tools>Folder Options>View tab, put a checkmark next to Show hidden files, and folders.

          7. Delete following files/folders (if present):

          - amvo.exe, syssetub.dll files from C:\WINDOWS\system32
          NOTE: Don't mistake syssetub.dll for syssetup.dll! The latter is legit Windows file.

          8. Restart in Normal Mode.

          9. Post new HijackThis log.Hi Everyone:

          I could not remove IMESH. I followed a post to download HiJackThis. I started the program and when the file list came up, I looked at the end of each file for /MESHA or something like that. It turned out to be about 3 or 4 files. Scoll to the bottom looking at the end of each file. Then, click FIX HiJackThis deletes them. Then, I went to my computer and clicked REMOVE and finally it let me get all the way and starting deleting it from my computer. THANK YOU HIJACKTHIS!!!!
          4487.

          Solve : system32 opens on start up?

          Answer»

          help please,im using windows XP,my avast detected a VIRUS on my pc and after moving it to chest and i reboot,the PROBLEM suddenly occurred , every time windows login system32 OPENS up Download and run Mike Lin's Startup Control PANEL (http://www.mlin.net/StartupCPL.shtml). LOOK for an entry that loads from your \system32 folder and uncheck it and then reboot. Let us know if that fixes it.

          4488.

          Solve : Stolen email account??

          Answer»

          Hey,

          Apparantly someone logged into my hotmail last night at 3am, a friend told me and pasted the conversation; nothing interesting the person posing as me SAID one word. I was just WONDERING what I should do now? Everything is in my email account, every ONLINE service I use. The worst thing is my address.

          I've ran a virus scan using Avast - no infected files. I use Windows XP SP3, Windows firewall and Avast free edition - I keep all my software up-to-date.

          I also have a laptop that runs Ubuntu 10.10 - I'm pretty sure linux is safe by design HOWEVER I do also have a firewall and am currently running a virus scan on that as well.

          The only thing is when my friend pasted the conversation - the screen name also had my surname and I use only my first name for any TYPE of chat client. The person was using profile picture though.

          Any advice would be great.
          Thanks.Change your password.I've just changed it. Would it really make a difference though - if someone's already had free access to my email (could have already saved them etc)?

          4489.

          Solve : acting on it's own?

          Answer»

          hi dave .things didn't run like you said but here is the findings from the scan.again in safe mode only
          3/4 of the screen is SHOWING on the left.had to drag the screen around to see what was needed.
          Status: Deleted (events: 1)
          9/6/2011 7:16:41 PMDeletedTrojan program Exploit.Java.CVE-2010-4452.aC:\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\cache\6.0\12\3cc664c-3f5d5e56High

          dave also when on reboot the dell splash screen then the windows splash screen only show 3/4 of the screen the rest is black. this was never like that before i started having a problem.Can you try another monitor on that computer?ok tried another monitor and everything worked right.so some setting must be wrong with this one.
          after it boots to windows the screen is fine only the dell and windows splash screens are not
          centered. and in safe mode the screen is off to the side?also did you see anything thta was wrong
          as far as malware or virus? thanks dave for helping me out . not sure why combofix won't run. but at startup avast give me a warning that i should not open c:\combofit\pev.3xe Quote

          did you see anything thta was wrong as far as malware or virus?
          No. Nothing REALLY showed up in the scans that we've run so far.
          Quote
          not sure why combofix won't run. but at startup avast give me a warning that i should not open c:\combofit\pev.3xe
          That's why your AV should be disabled before running the scan.dave i did disabled my av and it still would'nt finish combofix.not sure why. but if you think
          everything looks good i'll let it be.still not sure why the 3/4 splash screens and safemode? Quote
          but if you think
          everything looks good i'll let it be.still not sure why the 3/4 splash screens and safemode?
          You said that you tried another monitor and it worked well so the problem must be with your monitor.
          Were you able to run the AVP scan?yes i was able to run the avp scan . the results are in message reply #15 do i need to run that again?Quote
          yes i was able to run the avp scan . the results are in message reply #15 do i need to run that again?
          Sorry.

          I'd like to scan your machine with ESET OnlineScan

          •Hold down Control and click on the following link to open ESET OnlineScan in a new window.
          ESET OnlineScan
          •Click the button.
          •For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
          • Click on to download the ESET Smart Installer. Save it to your desktop.
          • Double click on the icon on your desktop.
          •Check
          •Click the button.
          •Accept any security warnings from your browser.
          •Check
          •Push the Start button.
          •ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
          •When the scan completes, push
          •Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
          •Push the button.
          •Push
          A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt
          dave i ran eset online scanner .it didn't fine any problems.here is the log from the scan.
          [emailprotected] as downloader log:
          all ok
          # version=7
          # OnlineScannerApp.exe=1.0.0.1
          # OnlineScanner.ocx=1.0.0.6211
          # api_version=3.0.2
          # EOSSerial=d59579b9155b9b4bb82b80f5c9af77ea
          # end=finished
          # remove_checked=true
          # archives_checked=true
          # unwanted_checked=true
          # unsafe_checked=false
          # antistealth_checked=true
          # utc_time=2010-11-23 12:50:23
          # local_time=2010-11-22 07:50:23 (-0500, Eastern Standard Time)
          # country="United States"
          # lang=1033
          # osver=5.1.2600 NT Service Pack 3
          # compatibility_mode=512 16777215 100 0 74131436 74131436 0 0
          # compatibility_mode=768 16777215 100 0 24803328 24803328 0 0
          # compatibility_mode=1026 16777214 0 2 47462100 47462100 0 0
          # compatibility_mode=4864 16777215 100 0 0 0 0 0
          # compatibility_mode=8192 67108863 100 0 0 0 0 0
          # scanned=79833
          # found=0
          # cleaned=0
          # scan_time=3320
          [emailprotected] as downloader log:
          all ok
          esets_scanner_update returned -1 esets_gle=53251
          # version=7
          # OnlineScannerApp.exe=1.0.0.1
          # OnlineScanner.ocx=1.0.0.6211
          # api_version=3.0.2
          # EOSSerial=d59579b9155b9b4bb82b80f5c9af77ea
          # end=finished
          # remove_checked=true
          # archives_checked=false
          # unwanted_checked=true
          # unsafe_checked=false
          # antistealth_checked=true
          # utc_time=2010-11-23 03:14:11
          # local_time=2010-11-22 10:14:11 (-0500, Eastern Standard Time)
          # country="United States"
          # lang=1033
          # osver=5.1.2600 NT Service Pack 3
          # compatibility_mode=512 16777215 100 0 74141165 74141165 0 0
          # compatibility_mode=768 16777215 100 0 24813057 24813057 0 0
          # compatibility_mode=1026 16777214 0 2 47471829 47471829 0 0
          # compatibility_mode=4864 16777215 100 0 0 0 0 0
          # compatibility_mode=8192 67108863 100 0 0 0 0 0
          # scanned=79775
          # found=0
          # cleaned=0
          # scan_time=2218
          [emailprotected] as downloader log:
          all ok
          # version=7
          # OnlineScannerApp.exe=1.0.0.1
          # OnlineScanner.ocx=1.0.0.6528
          # api_version=3.0.2
          # EOSSerial=d59579b9155b9b4bb82b80f5c9af77ea
          # end=finished
          # remove_checked=true
          # archives_checked=true
          # unwanted_checked=true
          # unsafe_checked=false
          # antistealth_checked=true
          # utc_time=2011-09-11 11:16:58
          # local_time=2011-09-11 07:16:58 (-0500, Eastern Daylight Time)
          # country="United States"
          # lang=1033
          # osver=5.1.2600 NT Service Pack 3
          # compatibility_mode=512 16777215 100 0 98601223 98601223 0 0
          # compatibility_mode=768 16777215 100 0 50111915 50111915 0 0
          # compatibility_mode=1026 16777214 0 2 72767087 72767087 0 0
          # compatibility_mode=4864 16777215 100 0 0 0 0 0
          # compatibility_mode=6912 16777215 100 0 0 0 0 0
          # compatibility_mode=8192 67108863 100 0 25226085 25226085 0 0
          # scanned=88350
          # found=0
          # cleaned=0
          # scan_time=4330
          That looks good. If there are no other issues, we can do some cleanup.

          To remove all of the tools we used and the files and folders they created do the following:
          Double click OTL.exe.
          • Click the CleanUp button.
          • Select Yes when the "Begin cleanup Process?" prompt appears.
          • If you are prompted to Reboot during the cleanup, select Yes.
          • The tool will delete itself once it finishes.
          Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
          ********************************************************
          To turn off Windows XP System Restore:

          NOTE: These instructions assume that you are using the default Windows XP Start Menu and have not changed to the Classic Start menu. To re-enable the default menu, right-click Start, click Properties, click Start menu (not Classic) and then click OK.

          1. Click Start.
          2. Right-click the My Computer icon, and then click Properties.
          3. Click the System Restore tab.
          4. Check "Turn off System Restore" or "Turn off System Restore on all drives"
          5. Click Apply.
          6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
          7. Click OK.
          8. Restart the computer and follow the instructions in the next section to turn on System Restore.

          To turn on Windows XP System Restore:

          1. Click Start.
          2. Right-click My Computer, and then click Properties.
          3. Click the System Restore tab.
          4. Uncheck "Turn off System Restore" or "Turn off System Restore on all drives."
          5. Click Apply, and then click OK.
          ******************************************************
          Clean out your temporary internet files and temp files.

          Download TFC by OldTimer to your desktop.

          Double-click TFC.exe to run it.

          Note: If you are running on Vista, right-click on the file and choose Run As Administrator

          TFC will close all programs when run, so make sure you have saved all your WORK before you begin.

          * Click the Start button to begin the cleaning process.
          * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
          * Please let TFC run uninterrupted until it is finished.

          Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
          *************************************************
          Looking over your log it seems you don't have any evidence of a third party firewall.

          Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors.

          Remember only install ONE firewall

          1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my HOMEPAGE" and uncheck any HopSurf and/or Ask.com options if you choose this one)
          2) Online Armor
          3) Agnitum Outpost
          4) PC Tools Firewall Plus

          If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
          ************************************************
          Use the Secunia Software Inspector to check for out of date software.

          •Click Start Now

          •Check the box next to Enable thorough system inspection.

          •Click Start

          •Allow the scan to finish and scroll down to see if any updates are needed.
          •Update anything listed.
          .
          ----------

          Go to Microsoft Windows Update and get all critical updates.

          ----------

          I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

          SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
          * Using SpywareBlaster to protect your computer from Spyware and Malware
          * If you don't know what ActiveX controls are, see here

          Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

          Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

          Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
          Safe Surfing!
          dave i can't thank you enough .this is running much much better than it was.i'm glad there are people like you out there to help us out.i did install most of the programs you said. will do more
          later. thakns again.Quote from: mkkandb53 on September 12, 2011, 06:15:05 PM
          dave i can't thank you enough .this is running much much better than it was.i'm glad there are people like you out there to help us out.i did install most of the programs you said. will do more
          later. thakns again.
          You're welcome. I will lock this thread. If you need it re-opened, please send me a pm.
          4490.

          Solve : Stutter.X virus and hard drive hassels?

          Answer»

          I can't seem to run the ESET scan,

          I tick yes to accept terms and conditionds, and press start, nothing happens for a few minutes then it askes me to install an add-on

          OnlineScanner.cab from 'ESET, spol.s r.o.'.

          I press install every time, and an Internet Explorer message pops up saying

          To display the webpage again, the web browser needs to resend the information you've previously submitted.
          If you were making a purchase, you should click Cancel to avoid a duplicate transaction. Otherwise, click Retry to display the webpage again

          So I press Retry and it takes me back to the Term's and Conditions page??

          Any ideas??
          sorry bout that

          i just pushed cancel to resend the info and it seemeed to work

          scaning nowI'm not sure if the scan finshed completely i wasn't there wathchin, but it took over 4 hours to do 50%, then within the next hour it was done, i don't think it was connected to the net the whole time

          should i start again??


          This was the log found in the program file

          [emailprotected] as CAB hook log:
          OnlineScanner.ocx - registred OK



          This was the found threats

          C:\Users\Jake\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10\7c88068a-2bd1c06dJava/Agent.BV trojandeleted - quarantined
          C:\Users\Jake\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\2b29fca3-15523528a variant of Java/Agent.BR trojandeleted - quarantined
          C:\Users\Jake\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44\38e63bec-429dc16bJava/Agent.BV trojandeleted - quarantined
          C:\Users\Jake\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\5ad4b738-1a7b0624Java/Agent.BV trojandeleted - quarantined
          Quote

          should i start again??
          No. The log looks ok. How's your computer running now?My computer is running pretty close to normal, the only things is internet exporer still with the same msg when it opens

          A program on your computer has corrupted your default search provider setting for internet explorer.
          Internet Explorer has reset this setting to your original search provider, Google (www.google.com).
          Internet Explorer will now open Search Settings, where you can change this setting or install more search providers.

          I press OK and a MANAGE Add Ons window opens where google is already enabled as default so i press close, but it happens every time??

          and most of the auto complete's dont show up or my my most popular sites when i open a new tab??

          any ideas??

          aslo do you have any suggestions about my external hard drive that wont load??Quote
          A program on your computer has corrupted your default search provider setting for internet explorer.
          Internet Explorer has reset this setting to your original search provider, Google (www.google.com).
          Internet Explorer will now open Search Settings, where you can change this setting or install more search providers.

          I press OK and a Manage Add Ons window opens where google is already enabled as default so i press close, but it happens every time??

          and most of the auto complete's dont show up or my my most popular sites when i open a new tab??

          any ideas??

          I can't help very much with that problem except to give you this link which contains a bunch of sites with similiar problems. Perhaps you should start a new thread concerning this problem in the Internet Browsers section of this CH.

          Quote
          aslo do you have any suggestions about my external hard drive that wont load??
          Not really except that perhaps the drive is defective or the USB port is defective. Again, a new thread in the Computer Hardware section would help.
          Let's do some cleanup.

          To uninstall ComboFix

          • Click the Start button. Click Run. For Vista: type in Run in the Start search, and click on Run in the results pane.
          • In the field, type in ComboFix /uninstall


          (Note: MAKE sure there's a space between the WORD ComboFix and the forward-slash.)

          • Then, press Enter, or click OK.
          • This will uninstall ComboFix, delete its folders and files, hides System files and folders, and resets System Restore.
          *********************************************
          To remove all of the tools we used and the files and folders they created do the following:
          Double click OTL.exe.
          • Click the CleanUp button.
          • Select Yes when the "Begin cleanup Process?" prompt appears.
          • If you are prompted to Reboot during the cleanup, select Yes.
          • The tool will delete itself once it finishes.
          Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
          *************************************************
          Clean out your TEMPORARY internet files and temp files.

          Download TFC by OldTimer to your desktop.

          Double-click TFC.exe to run it.

          Note: If you are running on Vista, right-click on the file and choose Run As Administrator

          TFC will close all programs when run, so make sure you have saved all your work before you begin.

          * Click the Start button to begin the cleaning process.
          * Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
          * Please let TFC run uninterrupted until it is FINISHED.

          Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
          *************************************************
          Looking over your log it seems you don't have any evidence of a third party firewall.

          Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors.

          Remember only install ONE firewall

          1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one)
          2) Online Armor
          3) Agnitum Outpost
          4) PC Tools Firewall Plus

          If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
          ***************************************************
          Go to Microsoft Windows Update and get all critical updates.

          ----------

          I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

          SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
          * Using SpywareBlaster to protect your computer from Spyware and Malware
          * If you don't know what ActiveX controls are, see here

          Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

          Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

          Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
          Safe Surfing!
          I posted on the other forums hopefully they can help with the remaining problems

          Thanks again super dave!!You're welcome. I will lock this thread. If you need it re-opened, please send me a pm.
          4491.

          Solve : Need to uninstall F-Secure anti-virus supposedly installed in my PC?

          Answer»

          When trying to INSTALL the Eset ESS-5 program I got the strong recommendation to uninstall an F-Secure anti-virus before continue with the Eset.

          The procedure given by Eset to uninstall F-Secure anti-virus was not solution at all because in my CONTROL Panel > Add or remove programs there's no F-Secure.

          I used F-Secure Blacklight months ago, but even though I understand that this self-executable program leaves nothing in the PC, I still suspect that what Eset finds is some Blacklight leftover.

          According to F-Secure home page:

          «BlackLight is not installed in the normal sense. It is a simple executable FILE that is downloaded into your computer and it can be run by double-clicking on the file. There are no items in the "start"-menu or keys in the registry. "Uninstallation" of BlackLight simply means deleting the file. Location of the file is dependant on how you downloaded the file and which browser you used. If you downloaded the file with IE and chose "run", blbeta.exe is USUALLY stored in "C:\DOCUMENTS and Settings\<username>\Local Settings\Temporary Internet Files».

          but it has been impossible for me to find any blbeta in my PC.

          Does anybody know how to find that "thing" that Eset detects?
          You can try running the F-Secure removal tool.

          F-Secure products - F-Secure Uninstallation toolThanks, but I already said that F-Secure uninstallation tools procedure is looking for F-Secure in Control Panel > Add or remove programs, and I have no F-Secure there.

          4492.

          Solve : Help computer infected!?

          Answer»

          Hi first of all THANKS for reading this and please help me, and I am so sincerely thankful that there's EVEN a forum like this here. Let me get to the chase thoguh.

          Yesterday morning my other(good) computer started acting funky. When I tried to open links on the internet, it would just read it as download, and after downloading it would just link to a strange version of the website. Not just one link, any link. But I had to go to school so I just turned it off and hoped it would work in the morning.

          But I got back and its reliving this computer game I play called Starcraft. It's pressing and typing things I would while I play the game, even redoing chat's I had on facebook/word document. It's so odd. The mouse has a mind of its own and I can't stay over something for too long or it automatically selects it.

          I spent all of yesterday removing viruses which I found via avast, search and destroy, and malebyte antivirus. I think I did it right, although you can certainly comment with helpful TIPS. But its still being funky.

          I can just RUN all the anti VIRUS at the same time, right? Why isn't it doing anything? I'm so hopeless. I dont know what to do. I just need help so much thanks for listening. Any words would be helpful.

          As a side note even as of now while I'm rerunning the anti virus stuff, the computer just opens random files. Does that slow it down? I think it went through my checking at some point too.Double post. Locked

          4493.

          Solve : PC Pitstop?

          Answer»

          I was wondering if ANYONE has ever USED the PC Pitstop PC MATIC free test drive?? I wanted to give it a try but scared to DOWNLOAD anything to my PC, in fear of malicious software

          4494.

          Solve : Would replacing a hard drive remove the virus??

          Answer»

          I received a 2002 HP desktop with XP as the OS. It was free, so the price was right. LOL However, it seems to have a virus that I can't get rid of. Would replacing the hard drive get rid of the problem, or is the virus stored in the RAM some how? I've replaced hard drives in desk tops before so this wouldn't be difficult for me, and spending $80 for a desktop that works and does what I need it to do would be great! Thanks for your input!Nothing is stored in RAM when the power is off. You could just format the drive USING a Windows CD and re-INSTALL.

          Actually you should delete the existing partition, then format, then reinstall. This will take care of any virus in the boot sector / mbr.Quote from: Allan on September 14, 2011, 12:32:21 PM

          Actually you should delete the existing partition, then format, then reinstall. This will take care of any virus in the boot sector / mbr.

          Good catch, Allan!

          That like having brain SURGERY for a routine HEADACHE... The first notion should be a virus scan from a bookable CD
          Google "rescue CD and FIND:
          Kaspersky Rescue CD
          BitDefender Rescue CD
          F-Secure Rescue CD
          Avira Antivir Rescue Disk
          Trinity Rescue Kit CD
          Shardana Antivirus Rescue Disc Utility
          Dr Web Live Bootable Antivirus CD
          ..and maybe others

          I like the Alvira. But all are good. After it is done thou should be able to scan your drive with more conventional scanners to beat out the last vestige.

          You can download the ISO and burn the disc and do the scan in about the same times it takes to install Windows. Worth a try!
          4495.

          Solve : Malware Issues - PE_Perfect pecompact TR/SPy.Keylogger.qme?

          Answer» SORRY I missed this do you still WANT log?Quote from: stonemanjr on SEPTEMBER 23, 2011, 04:01:10 PM
          sorry I missed this do you still want log?
          Yes, please.
          4496.

          Solve : Black screen, fake Windows security alert, no icons or files, say HDD full but?

          Answer»

          Ok. Let's try this:

          WINDOWS XP

          IF folder C:\DOCUMENTS and Settings\user_name\Local Settings\Temp\smtmp EXIST...

          COPY all content of this folder:
          C:\Documents and Settings\user_name\Local Settings\Temp\smtmp\1
          and paste it to this folder:
          C:\Documents and Settings\All Users\Start Menu

          Copy all content of this folder:
          C:\Documents and Settings\user_name\Local Settings\Temp\smtmp\2
          and paste it to this folder:
          C:\Documents and Settings\user_name\Application Data\Microsoft\Internet Explorer\Quick Launch

          Copy all content of this folder:
          C:\Documents and Settings\user_name\Local Settings\Temp\smtmp\3
          and paste it to this folder:
          C:\Documents and Settings\user_name\Application Data\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar

          Copy all content of this folder:
          C:\Documents and Settings\user_name\Local Settings\Temp\smtmp\4
          and paste it to this folder:
          C:\Documents and Settings\All Users\Desktop

          Edited.Edited.

          4497.

          Solve : SUPERAntiSpyware Portable Scanner?

          Answer»
          The scanner does not need to be installed or uninstalled and contains our full scanning and removal engine. You DO NOT need to have an Internet connection to run the scan. The scanner is updated often with our LATEST definition sets.

          The scanner can be placed on a USB drive or other removable media. You should download new VERSIONS often to make sure you have the latest definitions set.

          The PORTABLE scanner is 100% FREE for PERSONAL use. TECHNICIAN and CORPORATE LICENSES are available.

          Follow the instructions at the SUPERAntiSpyware Portable Scanner Website to download the SUPERAntiSpyware Portable Scanner. The scanner features our complete scanning and removal engine and will detect AND remove over 1,000,000 spyware/malware infections. The scanner does NOT install anything on your Start Menu or Program Files and does NOT need to be uninstalled.

          The scanner contains the latest definitions so you DO NOT need Internet Access on the infected system to scan.
          4498.

          Solve : NOT the real VirusTotal.com?

          Answer»

          This is a good BLOG post from Tom Kelchner over at Sunbelt. Looks LIKE the bad guys are starting to use the online scanners as BAIT. NOT the real VirusTotal.com

          Sophos ALSO reported on this only with different information. FREE FakeAV at Virus-Total (That’s not VirusTotal)

          4499.

          Solve : Help! Computer infected, unable to run files due to infection!?

          Answer»

          Well,
          I am currently on my laptop and my anti-virus has been shut off, because I just stopped paying for it. ( kinda lame that you need to REPAY to keep it ) but now, not even 1 week later, i keep getting Windows Security Alerts, saying applications cannot be executed because it is infected. I can't run very much it without getting the same warning over and over. I was wondering if there is hope on getting this solved, or if there is any way to FIX this. My windows security is enabled so..
          I do not understand, my computer JUST became unprotected. and bam
          any help would be great!
          very much appreciated..
          Hello. Welcome to CH.

          It seems you might have a little rogue infection. The message about files being infected, is a trojan popping the message up, and then shutting down the programs you try to start up.

          Let's do a quick run and see what rogue is running:

          Please download Cheetah-Anti-Rogue, and save to your Desktop.

          • Double-click on Cheetah-Anti-Rogue.zip, and extract the file to your Desktop.
          • Double-click on Cheetah-Anti-Rogue.cmd to start.
          • It will finish quickly and launch a log.
          • Post the contents of it in your next reply.
          It runs the program, but i cannot even copy the log, it closes.. like instantly, or says access denied..Ouch...

          We'll see about that...

          Please download ComboFix from BleepingComputer.com

          Alternate link: GeeksToGo.com

          Alternate link: Forospyware.com


          Rename ComboFix.exe to commy.bat before you save it to your Desktop
          • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools A guide to do this can be found here
          • Click Start then copy paste the following command into the search box & hit enter: "%userprofile%\desktop\commy.bat" /stepdel
          • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. This will not install in Vista. Just continue scanning, and skip the console install.
          • When finished, it shall produce a log for you. Please include the contents of C:\ComboFix.txt in your next reply.
          How do i know when i enter the link into the search bar if its actually working? It just tries to open a browser on my firefox and firefox says Unable to connect...You tried to click on it and it went to a new Firefox windows saying it cannot connect.

          If you must, go ahead and download it from a clean computer and transfer it to the infected one via flash drive or burnt cd.SORRY! for the late response, had some relatives in town. Sittin' on the computer isn't very savvy. So I kept the laptop off and turned it on today, and actually it was letting me run things, so i can that commy.bat, and here ya go.


          ComboFix 10-02-04.06 - Kaleb 02/04/2010 19:31:28.1.2 - x86
          Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.893.312 [GMT -8:00]
          Running from: c:\users\Kaleb\Desktop\commy.bat.exe
          SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
          .

          ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
          .

          c:\$recycle.bin\S-1-5-21-2714304592-1191437367-953324204-500
          c:\users\Kaleb\AppData\Local\djxbtv
          c:\users\Kaleb\AppData\Local\djxbtv\joyvsysguard.exe
          c:\windows\system32\stacsv.exe
          D:\Autorun.inf

          .
          ((((((((((((((((((((((((( Files Created from 2010-01-05 to 2010-02-05 )))))))))))))))))))))))))))))))
          .

          2010-02-05 03:40 . 2010-02-05 03:43--------d-----w-c:\users\Kaleb\AppData\Local\temp
          2010-02-05 03:40 . 2010-02-05 03:40--------d-----w-c:\users\Default\AppData\Local\temp
          2010-01-30 22:06 . 2010-01-30 22:06--------d-----w-c:\users\Kaleb\AppData\Roaming\Malwarebytes
          2010-01-30 22:06 . 2010-01-08 00:0738224----a-w-c:\windows\system32\drivers\mbamswissarmy.sys
          2010-01-30 22:06 . 2010-01-30 22:06--------d-----w-c:\program files\Malwarebytes' Anti-Malware
          2010-01-30 22:06 . 2010-01-30 22:06--------d-----w-c:\programdata\Malwarebytes
          2010-01-30 22:06 . 2010-01-08 00:0719160----a-w-c:\windows\system32\drivers\mbam.sys
          2010-01-30 13:08 . 2010-01-30 13:08--------d-----w-c:\program files\a-squared Free
          2010-01-30 12:45 . 2010-01-30 12:45--------d-----w-c:\users\Kaleb\AppData\Roaming\AVG8
          2010-01-22 08:05 . 2010-01-22 08:05--------d-----w-c:\program files\Common Files\Tencent
          2010-01-22 08:05 . 2010-01-22 08:05--------d-----w-c:\program files\Tencent
          2010-01-22 08:05 . 2010-01-22 08:10--------d-----w-c:\users\Kaleb\AppData\Roaming\Tencent
          2010-01-22 08:05 . 2010-01-22 08:0518760----a-w-c:\windows\system32\QQVistaHelper.dll
          2010-01-13 03:59 . 2009-10-19 14:27156672----a-w-c:\windows\system32\t2embed.dll
          2010-01-13 03:59 . 2009-10-19 14:2472704----a-w-c:\windows\system32\fontsub.dll
          2010-01-13 02:36 . 2010-01-13 02:36--------d-----w-c:\program files\Common Files\Software Update Utility
          2010-01-13 02:35 . 2010-01-13 02:35--------d-----w-c:\program files\AIM

          .
          (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
          .
          2010-01-26 07:55 . 2008-05-06 15:4394----a-w-c:\users\Kaleb\AppData\Roaming\wklnhst.dat
          2010-01-14 19:12 . 2009-10-09 07:16181120------w-c:\windows\system32\MpSigStub.exe
          2010-01-13 11:03 . 2006-11-02 11:18--------d-----w-c:\program files\Windows Mail
          2009-12-28 11:07 . 2007-02-26 13:47--------d-----w-c:\programdata\Microsoft Help
          2009-12-18 13:05 . 2010-01-21 20:25833024----a-w-c:\windows\system32\wininet.dll
          2009-12-18 13:01 . 2010-01-21 20:2578336----a-w-c:\windows\system32\ieencode.dll
          2009-12-18 10:14 . 2010-01-21 20:2526624----a-w-c:\windows\system32\ieUnatt.exe
          2009-11-09 13:22 . 2009-12-28 11:0824064----a-w-c:\windows\system32\nshhttp.dll
          2009-11-09 13:20 . 2009-12-28 11:0831232----a-w-c:\windows\system32\httpapi.dll
          2009-11-09 11:04 . 2009-12-28 11:08411136----a-w-c:\windows\system32\drivers\http.sys
          .

          ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
          .
          .
          *Note* empty entries & legit default entries are not shown
          REGEDIT4

          [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
          "Aim"="c:\program files\AIM\aim.exe" [2009-12-01 3951976]
          "QQIntl"="c:\program files\Tencent\QQIntl\Bin\QQ.exe" [2010-01-22 144712]

          [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
          "Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
          "SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-11-17 815104]
          "SMSERIAL"="c:\program files\Motorola\SMSERIAL\sm56hlpr.exe" [2007-01-17 634880]
          "HostManager"="c:\program files\Common Files\AOL\1183363162\ee\AOLSoftware.exe" [2006-09-26 50736]
          "IntelliPoint"="c:\program files\Microsoft IntelliPoint\ipoint.exe" [2007-02-05 849280]
          "ArcSoft Connection Service"="c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe" [2009-10-10 203264]
          "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2007-06-29 286720]

          c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
          Kodak EasyShare software.lnk.disabled [2009-6-21 2001]

          [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
          "EnableUIADesktopToggle"= 0 (0x0)

          [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
          "AppInit_DLLs"=c:\progra~1\Google\GOOGLE~1\GoogleDesktopNetwork3.dll

          [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\CONTROL\SafeBoot\Minimal\WinDefend]
          @="Service"

          [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
          "MySpaceIM"=c:\program files\MySpace\IM\MySpaceIM.exe
          "AOL Fast Start"="c:\program files\AOL 9.0b\AOL.EXE" -b
          "Aim6"="c:\program files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
          "SpybotSD TeaTimer"=c:\program files\Spybot - Search & Destroy\TeaTimer.exe
          ""=

          [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
          "Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" /startup

          [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
          "DisableMonitoring"=dword:00000001

          [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-2714304592-1191437367-953324204-1000]
          "EnableNotificationsRef"=dword:00000002

          [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-2714304592-1191437367-953324204-500]
          "EnableNotificationsRef"=dword:00000002

          R2 a2free;a-squared Free Service;c:\program files\a-squared Free\a2service.exe [1/30/2010 5:08 AM 1858144]
          R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [5/20/2009 7:03 PM 24652]
          R3 RTL8187;Realtek RTL8187 Wireless 802.11g 54Mbps USB 2.0 Network Adapter;c:\windows\System32\drivers\RTL8187.sys [2/26/2007 5:39 AM 205312]
          S3 GoogleDesktopManager-061008-081103;Google Desktop Manager 5.7.806.10245;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2/26/2007 5:51 AM 29744]
          .
          Contents of the 'Scheduled Tasks' folder
          .
          .
          ------- Supplementary Scan -------
          .
          uStart Page = hxxp://www.google.nl/
          mStart Page = hxxp://www.gateway.com/g/startpage.html?Ch=Retail&Br=GTW&Loc=ENG_US&Sys=PTB&M=MT6452
          uSearchURL,(Default) = hxxp://www.google.com/keyword/%s
          IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
          IE: QQ - c:\program files\Tencent\QQIntl\Bin\AddEmotion.htm
          FF - ProfilePath - c:\users\Kaleb\AppData\Roaming\Mozilla\Firefox\Profiles\zhpm7tfa.default\
          FF - prefs.js: browser.search.defaulturl - hxxp://slirsredirect.search.aol.com/slirs_http/sredir?sredir=2706&invocationType=tb50fftrie7&query=
          FF - prefs.js: browser.search.selectedEngine - AIM Search
          FF - prefs.js: browser.startup.homepage - www.google.com
          FF - prefs.js: keyword.URL - hxxp://slirsredirect.search.aol.com/slirs_http/sredir?invocationType=bu10aiminstabie7&sredir=2706&query=
          FF - plugin: c:\program files\Java\jre1.6.0\bin\npjava11.dll
          FF - plugin: c:\program files\Java\jre1.6.0\bin\npjava12.dll
          FF - plugin: c:\program files\Java\jre1.6.0\bin\npjava13.dll
          FF - plugin: c:\program files\Java\jre1.6.0\bin\npjava14.dll
          FF - plugin: c:\program files\Java\jre1.6.0\bin\npjava32.dll
          FF - plugin: c:\program files\Java\jre1.6.0\bin\npjpi160.dll
          FF - plugin: c:\program files\Java\jre1.6.0\bin\npoji610.dll
          FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
          FF - plugin: c:\program files\Mozilla Firefox\plugins\npdnupdater2.dll
          FF - plugin: c:\program files\Mozilla Firefox\plugins\npViewpoint.dll
          FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
          FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

          ---- FIREFOX POLICIES ----
          FF - user.js: network.protocol-handler.warn-external.dnupdate - false);user_pref(network.protocol-handler.warn-external.dnupdate, false
          FF - user.js: browser.sessionstore.resume_from_crash - false
          FF - user.js: network.protocol-handler.warn-external.dnupdate - false);user_pref(network.protocol-handler.warn-external.dnupdate, false.
          - - - - ORPHANS REMOVED - - - -

          HKCU-Run-ainnhyvx - c:\users\Kaleb\AppData\Local\djxbtv\joyvsysguard.exe
          ActiveSetup-ccc-core-static - msiexec



          **************************************************************************

          catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
          Rootkit scan 2010-02-04 19:44
          Windows 6.0.6001 Service Pack 1 NTFS

          scanning hidden processes ...

          scanning hidden autostart entries ...

          scanning hidden files ...

          scan completed successfully
          hidden files: 0

          **************************************************************************
          .
          --------------------- LOCKED REGISTRY KEYS ---------------------

          [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
          @Denied: (A) (Users)
          @Denied: (A) (Everyone)
          @Allowed: (B 1 2 3 4 5) (S-1-5-20)
          "BlindDial"=dword:00000000
          "MSCurrentCountry"=dword:000000b5
          .
          Completion time: 2010-02-04 19:58:18
          ComboFix-quarantined-files.txt 2010-02-05 03:58

          Pre-Run: 82,248,601,600 bytes free
          Post-Run: 82,173,390,848 bytes free

          - - End Of File - - 2C2C94E0AAD66610F4EC6FE5E7B3A91B
          Hi again. Please do these steps in order.

          1. Please download TFC by OldTimer to your desktop
          • Please double-click TFC.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
          • It will close all programs when run, so make sure you have saved all your work before you begin.
          • Click the Start
            button to begin the process. Depending on how often you clean temp
            files, execution time should be anywhere from a few seconds to a minute
            or two. Let it run uninterrupted to completion.
          • Once it's finished it should reboot your machine. If it does not, please manually reboot the machine yourself to ensure a complete clean.
          2. Please download Malwarebytes Anti-Malware from Malwarebytes.org.
          Alternate link: BleepingComputer.com.
          (Note: if you already have the program installed, just follow the directions. No need to re-download or re-install!)

          Double Click mbam-setup.exe to install the application.

          (Note: if you already have the program installed, open Malwarebytes from the Start Menu or Desktop shortcut, click the Update tab, and click Check for Updates, before doing the scan as instructed below!)
          • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
          • If an update is found, it will download and install the latest version.
          • Once the program has loaded, select "Perform Full Scan", then click Scan.
          • The scan may take some time to finish,so please be patient.
          • When the scan is complete, click OK, then Show Results to view the results.
          • Make sure that everything is checked, and click Remove Selected.
          • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
          • Please save the log to a location you will remember.
          • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
          • Copy and paste the entire report in your next reply.
          Extra Note:

          If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.

          3. Please visit this webpage for instructions for downloading and running SUPERAntiSpyware (SAS) to scan and remove malware from your computer:

          http://www.bleepingcomputer.com/virus-removal/how-to-use-superantispyware-tutorial

          Post the log from SUPERAntiSpyware when you've accomplished that.

          4. Please run a free online scan with the ESET Online Scanner
          • Tick the box next to YES, I accept the Terms of Use
          • Click Start
          • When asked, allow the ActiveX control to install
          • Click Start
          • Make sure that the options Remove found threats and the option Scan unwanted applications is checked
          • Click Scan (This scan can take several hours, so please be patient)
          • Once the scan is completed, you may close the window
          • Use Notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt
          • Copy and paste that log as a reply to this topic

          5. Post the following in your next reply:
          • MBAM log
          • SAS log
          • ESET log
          And, please tell me how your computer is doing.My laptop is doing great! No warnings no nothing now =D
          here is the logs.

          MBAM
          Malwarebytes' Anti-Malware 1.44
          Database version: 3694
          Windows 6.0.6001 Service Pack 1
          Internet Explorer 7.0.6001.18000

          2/5/2010 12:19:50 PM
          mbam-log-2010-02-05 (12-19-50).txt

          Scan type: Full Scan (C:\|D:\|)
          Objects scanned: 246171
          Time elapsed: 1 hour(s), 47 minute(s), 1 second(s)

          Memory Processes Infected: 0
          Memory Modules Infected: 0
          Registry Keys Infected: 1
          Registry Values Infected: 0
          Registry Data Items Infected: 0
          Folders Infected: 0
          Files Infected: 1

          Memory Processes Infected:
          (No malicious items detected)

          Memory Modules Infected:
          (No malicious items detected)

          Registry Keys Infected:
          HKEY_CURRENT_USER\Software\avsoft (Trojan.FakeAV) -> Quarantined and deleted successfully.

          Registry Values Infected:
          (No malicious items detected)

          Registry Data Items Infected:
          (No malicious items detected)

          Folders Infected:
          (No malicious items detected)

          Files Infected:
          C:\Qoobox\Quarantine\C\Users\Kaleb\AppData\Local\djxbtv\joyvsysguard.exe.vir (Trojan.Downloader) -> Quarantined and deleted successfully.
          --------------------------------------------------------------------------
          SUPERANTI spyware Log
          http://www.superantispyware.com

          Generated 02/05/2010 at 02:13 PM

          Application Version : 4.33.1000

          Core Rules Database Version : 4560
          Trace Rules Database Version: 2372

          Scan type : Complete Scan
          Total Scan Time : 01:36:34

          Memory items scanned : 319
          Memory threats detected : 0
          Registry items scanned : 6082
          Registry threats detected : 0
          File items scanned : 56890
          File threats detected : 318

          Adware.Tracking Cookie
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected]orn[1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][4].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][3].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][11].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected]3.clickhype[1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][2].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt
          C:\Users\Kaleb\AppData\Roaming\Microsoft\Windows\Cookies\Low\[emailprotected][1].txt

          Trojan.Dropper/Sys-NV
          C:\PROGRAM FILES\TENCENT\QQINTL\BIN\SELFUPDATE.EXE

          -------------------------------------------------------------------
          [emailprotected] as downloader log:
          all ok
          # version=7
          # OnlineScannerApp.exe=1.0.0.1
          # OnlineScanner.ocx=1.0.0.6211
          # api_version=3.0.2
          # EOSSerial=64319a3b88c44540bfa4541fceec7e9d
          # end=finished
          # remove_checked=true
          # archives_checked=true
          # unwanted_checked=true
          # unsafe_checked=true
          # antistealth_checked=true
          # utc_time=2010-02-06 01:13:10
          # local_time=2010-02-05 05:13:10 (-0800, Pacific Standard Time)
          # country="United States"
          # lang=1033
          # osver=6.0.6001 NT Service Pack 1
          # compatibility_mode=1029 16777213 100 100 0 0 0 0
          # compatibility_mode=5892 16776574 100 100 0 102019924 0 0
          # compatibility_mode=8192 67108863 100 0 0 0 0 0
          # scanned=136705
          # found=0
          # cleaned=0
          # scan_time=6393
          To manually create a new Restore Point
          • Go to Control Panel and select System and Maintenance
          • Select System
          • On the left select Advance System Settings and accept the warning if you get one
          • Select System Protection Tab
          • Select Create at the bottom
          • Type in a name i.e. Clean
          • Select Create
          Now we can purge the infected ones
          • Go back to the System and Maintenance page
          • Select Performance Information and Tools
          • On the left select Open Disk Cleanup
          • Select Files from all users and accept the warning if you get one
          • In the drop down box select your main drive i.e. C
          • For a few moments the system will make some calculations
          • Select the More Options tab
          • In the System Restore and Shadow Backups select Clean up
          • Select DELETE on the pop up
          • Select OK
          • Select Delete
          You are now done

          To remove all of the tools we used and the files and folders they created, please do the following:
          Please download OTC.exe by OldTimer:
          • Save it to your Desktop.
          • Double click OTC.exe.
          • Click the CleanUp! button.
          • If you are prompted to Reboot during the cleanup, select Yes.
          • The tool will delete itself once it finishes.
          Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.

          ==

          Please download TFC by OldTimer to your desktop
          • Please double-click TFC.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
          • It will close all programs when run, so make sure you have saved all your work before you begin.
          • Click the Start
            button to begin the process. Depending on how often you clean temp
            files, execution time should be anywhere from a few seconds to a minute
            or two. Let it run uninterrupted to completion.
          • Once it's finished it should reboot your machine. If it does not, please manually reboot the machine yourself to ensure a complete clean.
          ==

          Download Security Check by screen317 from SpywareInfoforum.org or Changelog.fr.
          • Save it to your Desktop.
          • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
          • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
          Sorry for the delay !


          Results of screen317's Security Check version 0.99.1
          Windows Vista Service Pack 1 (UAC is enabled)
          Out of date service pack!!
          ``````````````````````````````
          Antivirus/Firewall Check:

          Windows Firewall Disabled!
          AVG 9.0
          ESET Online Scanner v3
          a-squared Free 4.5
          WMIC entry does not exist for antivirus; attempting automatic update.
          ``````````````````````````````
          Anti-malware/Other Utilities Check:

          Spybot - Search & Destroy
          SUPERAntiSpyware Free Edition
          Java(TM) SE Runtime Environment 6
          Adobe Flash Player 10
          Adobe Reader 8
          Out of date Adobe Reader installed!
          ``````````````````````````````
          Process Check:
          objlist.exe by Laurent

          AVG avgwdsvc.exe
          AVG avgtray.exe
          AVG avgrsx.exe
          AVG avgnsx.exe
          AVG avgemc.exe
          AVG avgemc.exe
          ``````````````````````````````
          DNS Vulnerability Check:

          GREAT! (Not vulnerable to DNS cache poisoning)

          `````````End of Log```````````
          Please consider updating to Windows Vista Service Pack 2 (SP2).
          Windows Vista Service Pack 2 (SP2) contains all the updates released since SP1 plus support for new types of hardware and emerging hardware standards.
          It is now available via Windows Update or as a standalone installation here.

          ==

          Please download the newest version of Adobe Acrobat Reader from Adobe.com

          Before installing: it is important to remove older versions of Acrobat Reader since it does not do so automatically and old versions still leave you vulnerable.
          Go to the Control Panel and enter Add or Remove Programs.
          Search in the list for all previous installed versions of Adobe Acrobat Reader. Uninstall/Remove each of them.

          Once old versions are gone, please install the newest version.

          ==

          Please read the following information that I have provided, which will help you prevent malicious software in the future. Please keep in mind, malware is a continuous danger on the Internet. It is highly important to stay safe while browsing, to prevent re-infection.

          Software recommendations

          Firewall
          • Tallemu Online Armor: the free version is just as good as the premium. I have linked you to the free version.
          • Comodo Firewall: the free version is just as good as the premium. I have linked you to the free version. The optional security suite enhances the firewall by 40% increase. If you would like to install the suite that includes antivirus, then remove your old antivirus first.
          • PC Tools Firewall Plus: free and excellent firewall.
          AntiSpyware
          • SpywareBlaster
            SpywareBlaster is a program that prevents spyware from installing on your computer. A tutorial on using SpywareBlaster may be found here.
          • Spybot - Search & Destroy.
            Spybot - Search & Destroy is a spyware and adware removal program. It also has realtime protection, TeaTimer to help safeguard your computer against spyware. (The link for Spybot - Search & Destroy contains a tutorial that will help you download, install, and begin using Spybot).
          NOTE: Please keep ALL of these programs up-to-date and run them whenever you suspect a problem to prevent malware problems.

          Resident Protection help
          A number of programs have resident protection and it is a good idea to run the resident protection of one of each type of program to maintain protection. However, it is important to run only one resident program of each type since they can conflict and become less effective. That means only one antivirus, firewall, and scanning anti-spyware program at a time. Passive protectors such as SpywareBlaster can be run with any of them.

          Rogue programs help
          There are a lot of rogue programs out there that want to scare you into giving them your money and some malware actually claims to be security programs. If you get a popup for a security program that you did not install yourself, do NOT click on it and ask for help immediately. It is very important to run an antivirus and firewall, but you can't always rely on REVIEWS and ads for information. Ask in a security forum that you trust if you are not sure. If you are unsure and looking for anti-spyware programs, you can find out if it is a rogue here:
          http://www.spywarewarrior.com/rogue_anti-spyware.htm

          Securing your computer
          • Windows Updates - It is very important to make sure that both Internet Explorer and Windows are kept current with the latest critical security patches from Microsoft. To do this just start Internet Explorer and select Tools > Windows Update, and follow the online instructions from there.
          • hpHosts file replaces your current HOSTS file with one containing well known ad sites and other bad sites. This prevents your computer from connecting to those sites by redirecting them to 127.0.0.1, which is your local computer's loopback address, meaning it will be difficult to infect your computer in the future.
          Please consider using an alternate browser
          Mozilla's Firefox browser is a very good alternative. In addition to being generally more secure than Internet Explorer, it has a very good built-in popup blocker and add-ons, like NoScript, can make it even more secure. Opera is another good option.

          If you are interested:
          See this page for more info about malware and prevention.
          4500.

          Solve : Not Sure...?

          Answer» WELL, thank you.

          So, I'm clear?Yes, as far as infections are CONCERNED, you are good to go.Great! Thank you very much for all of your HELP You're very welcome. Feel free to come BACK any TIME you have problems in the future.