Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Help! No Disk Errors


  • Please log in to reply

#16
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
In the future please do not fix entries of delete files without instructions from a malware staff. The tools we use are very powerful and can damage your system.

Now to move on with the fix.

First,

Please download ATF Cleaner by Atribune.
This program is for XP and Windows 2000 onlyDouble-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.
If you use Firefox browserClick Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browserClick Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
For Technical Support, double-click the e-mail address located at the bottom of each menu.

Next,

Please re-open HiJackThis and scan. Check the boxes next to all the entries listed below.

O4 - HKLM\..\Run: [HB Kernel] RUNDLL32.EXE C:\WINDOWS\System32\HBKrnl.dll,DllRegisterServer
O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE

Now close all windows other than HiJackThis, then click Fix Checked.

Finally,


Please download the OTMoveIt2 by OldTimer.
  • Save it to your desktop.
  • Please double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
  • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    H:\NTLDR.EXE
    c:\windows\system32\drivers\hbkernel.sys
    C:\WINDOWS\System32\HBKrnl.dll
    C:\WINDOWS\WSockDrv32.exe
    C:\WINDOWS\WSockDrv32.exe
    C:\WINDOWS\upxdnd.exe
    C:\WINDOWS\Fonts\syn00-0C-6E-BA-1B-E6\system\smss.exe
    C:\WINDOWS\PTSShell.exe
    C:\WINDOWS\msccrt.exe
    C:\WINDOWS\mfchlp32.exe
    C:\WINDOWS\LotusHlp.exe
    C:\WINDOWS\Kvsc3.exE
    C:\WINDOWS\Fonts\syn00-0C-6E-BA-1B-E6\system\1a.exe
    C:\WINDOWS\DbgHlp32.exe
    C:\WINDOWS\cmdbcs.exe
    C:\WINDOWS\AVPSrv.exE
    C:\WINDOWS\System32\ALCXMNTR.EXE
    C:\WINDOWS\System32\DXDLG.exe
    C:\WINDOWS\System32\LYLoadbr.exe
    C:\WINDOWS\System32\LYLeador.exe
    C:\WINDOWS\System32\LYLoador.exe
    C:\WINDOWS\System32\LYLoadar.exe
    C:\WINDOWS\System32\LYLoadmr.exe
    C:\WINDOWS\System32\LYLoadhr.exe
    C:\WINDOWS\System32\LYLoadqr.exe
    C:\WINDOWS\System32\mrjhtjd.dll
    C:\WINDOWS\System32\qrhhb.dll
    C:\WINDOWS\System32\xdfntt.dll
    C:\WINDOWS\System32\hgfhk.dll
    C:\WINDOWS\System32\hjaiq.dll
    C:\WINDOWS\System32\kduy.dll
    C:\WINDOWS\System32\frntrn.dll
    C:\WINDOWS\System32\dnteh.dll
    C:\WINDOWS\System32\chmfcmh.dll
    C:\WINDOWS\System32\jwlah.dll
    C:\WINDOWS\System32\crugd.dll
    C:\WINDOWS\System32\lariytrz.dll
    C:\WINDOWS\System32\thurh.dll
    C:\WINDOWS\System32\mgmgmm.dll
    C:\WINDOWS\System32\oqrthc.dll
    C:\WINDOWS\System32\ydgn.dll
    C:\WINDOWS\System32\dbfb.dll
    C:\WINDOWS\System32\fjnbv.dll
    C:\WINDOWS\System32\wmsat.dll
    C:\WINDOWS\System32\gmnait.dll
    C:\WINDOWS\System32\hfjg.dll
    C:\WINDOWS\System32\xdndn.dll
    C:\WINDOWS\System32\rgfjj.dll
    C:\WINDOWS\System32\dscef.dll
    C:\WINDOWS\System32\xfng.dll
    C:\WINDOWS\System32\njritc.dll
    C:\WINDOWS\System32\setrhes.dll
    C:\WINDOWS\System32\cdxbfxdb.dll
    C:\WINDOWS\System32\xfgnxfn.dll
    C:\WINDOWS\System32\gjkhj.dll
    C:\WINDOWS\System32\fxnfnh.dll
    C:\WINDOWS\System32\bjrvm.dll
    C:\WINDOWS\System32\ektvm.dll
    C:\WINDOWS\System32\fehom.dll
    C:\WINDOWS\System32\jyjlt.dll
    C:\WINDOWS\System32\ijatnaw.dll
    C:\WINDOWS\System32\sehhter.dll
    C:\WINDOWS\System32\fhjfg.dll
    C:\WINDOWS\System32\zdbdb.dll
    C:\WINDOWS\System32\rhs.dll
    C:\WINDOWS\System32\atehhz.dll
    C:\WINDOWS\System32\gjjte.dll
    C:\WINDOWS\System32\xgnfn.dll
    C:\WINDOWS\System32\xfgnhcgfm.dll
    C:\WINDOWS\System32\serger.dll
    C:\WINDOWS\System32\bnxnb.dll
    C:\WINDOWS\System32\fxgnfx.dll
    C:\WINDOWS\System32\jzijj.dll
    C:\WINDOWS\System32\xfgnfx.dll
    C:\WINDOWS\System32\serghjm.dll
    C:\WINDOWS\System32\thsddh.dll
    C:\WINDOWS\System32\xbcvxb.dll
    C:\WINDOWS\System32\zfdzb.dll
    C:\WINDOWS\System32\hkfgh.dll
    C:\WINDOWS\System32\drghszd.dll
    C:\WINDOWS\System32\fngn.dll
    C:\WINDOWS\System32\xdhdg.dll
    C:\WINDOWS\System32\zdbfbd.dll
    C:\WINDOWS\System32\fjyjy.dll
    C:\WINDOWS\System32\awef.dll
    C:\WINDOWS\System32\msepbe.dll
    
    HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HB Kernel
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ÐÞ¸´¹¤¾ß.exe
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\PSEXESVC
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360Safe.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ACKWIN32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTI-TROJAN.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\APVXDWIN.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AUTODOWN.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVCONSOL.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVE32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVGCTRL.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVKSERV.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVNT.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPCC.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPDOS32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPM.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPTC32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPUPD.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVSCHED32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVWIN95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVWUPD32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\BLACKD.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\BLACKICE.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFIADMIN.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFIAUDIT.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFINET.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFINET32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLAW95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLAW95CF.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLEANER.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLEANER3.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\DVP95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\DVP95_0.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ECENGINE.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\EGHOST.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ESAFE.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\EXPWATCH.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-AGNT95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-PROT.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-PROT95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-STOPW.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FESCUE.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FINDVIRU.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FP-WIN.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FPROT.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FRW.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IAMAPP.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IAMSERV.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IBMASN.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IBMAVSP.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICLOAD95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICLOADNT.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICMON.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICSUPP95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICSUPPNT.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IFACE.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IOMON98.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\JEDI.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAV32.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVsvc.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVSvcUI.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVFW.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonXP.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonXP.kxp
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVwsc.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KvXP.kxp
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KWatchUI.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\LOCKDOWN2000.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Logo1_.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Logo_1.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\LOOKOUT.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\LUALL.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\MAILMON.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\MOOLIVE.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\MPFTRAY.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\N32SCANW.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapw32.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NAVLU32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NAVNT.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\navw32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NAVWNT.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NISUM.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NMain.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NORMIST.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NUPGRADE.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NVC95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PAVCL.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PAVSCHED.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PAVW.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PCCWIN98.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PCFWALLICON.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PERSFW.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rav.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV7.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV7WIN.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVmon.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVmonD.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVtimer.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rising.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SAFEWEB.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCAN32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCAN95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCANPM.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCRSCAN.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SERV95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SMC.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SPHINX.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SWEEP95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TBSCAN.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TCA.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TDS2-98.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TDS2-NT.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\THGUARD.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanHunter.exe
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VET95.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VETTRAY.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSCAN40.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSECOMR.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSHWIN32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSSTAT.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WEBSCANX.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WFINDV32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ZONEALARM.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\_AVP32.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\_AVPCC.EXE
    HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\_AVPM.EXE
  • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to Move" window (under the light Yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • A log of files and folders moved will be created in the c:\_OTMoveIt\MovedFiles folder in the form of Date and Time (mmddyyyy_hhmmss.log). Please open this log in Notepad and post its contents in your next reply.
  • Close OTMoveIt2
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

Please post back with
- OTmoveit log
- New DSS main log
  • 0

Advertisements


#17
zenapex

zenapex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Here is the OTmoveit log. Posting the DSS main.txt as another reply because it seems to not fit.


File/Folder H:\NTLDR.EXE not found.
c:\windows\system32\drivers\hbkernel.sys moved successfully.
LoadLibrary failed for C:\WINDOWS\System32\HBKrnl.dll
C:\WINDOWS\System32\HBKrnl.dll NOT unregistered.
C:\WINDOWS\System32\HBKrnl.dll moved successfully.
File/Folder C:\WINDOWS\WSockDrv32.exe not found.
File/Folder C:\WINDOWS\WSockDrv32.exe not found.
File/Folder C:\WINDOWS\upxdnd.exe not found.
File/Folder C:\WINDOWS\Fonts\syn00-0C-6E-BA-1B-E6\system\smss.exe not found.
File/Folder C:\WINDOWS\PTSShell.exe not found.
File/Folder C:\WINDOWS\msccrt.exe not found.
File/Folder C:\WINDOWS\mfchlp32.exe not found.
File/Folder C:\WINDOWS\LotusHlp.exe not found.
File/Folder C:\WINDOWS\Kvsc3.exE not found.
File/Folder C:\WINDOWS\Fonts\syn00-0C-6E-BA-1B-E6\system\1a.exe not found.
File/Folder C:\WINDOWS\DbgHlp32.exe not found.
File/Folder C:\WINDOWS\cmdbcs.exe not found.
File/Folder C:\WINDOWS\AVPSrv.exE not found.
File/Folder C:\WINDOWS\System32\ALCXMNTR.EXE not found.
File/Folder C:\WINDOWS\System32\DXDLG.exe not found.
File/Folder C:\WINDOWS\System32\LYLoadbr.exe not found.
File/Folder C:\WINDOWS\System32\LYLeador.exe not found.
File/Folder C:\WINDOWS\System32\LYLoador.exe not found.
File/Folder C:\WINDOWS\System32\LYLoadar.exe not found.
File/Folder C:\WINDOWS\System32\LYLoadmr.exe not found.
File/Folder C:\WINDOWS\System32\LYLoadhr.exe not found.
File/Folder C:\WINDOWS\System32\LYLoadqr.exe not found.
File/Folder C:\WINDOWS\System32\mrjhtjd.dll not found.
File/Folder C:\WINDOWS\System32\qrhhb.dll not found.
File/Folder C:\WINDOWS\System32\xdfntt.dll not found.
File/Folder C:\WINDOWS\System32\hgfhk.dll not found.
File/Folder C:\WINDOWS\System32\hjaiq.dll not found.
File/Folder C:\WINDOWS\System32\kduy.dll not found.
File/Folder C:\WINDOWS\System32\frntrn.dll not found.
File/Folder C:\WINDOWS\System32\dnteh.dll not found.
File/Folder C:\WINDOWS\System32\chmfcmh.dll not found.
File/Folder C:\WINDOWS\System32\jwlah.dll not found.
File/Folder C:\WINDOWS\System32\crugd.dll not found.
File/Folder C:\WINDOWS\System32\lariytrz.dll not found.
File/Folder C:\WINDOWS\System32\thurh.dll not found.
File/Folder C:\WINDOWS\System32\mgmgmm.dll not found.
File/Folder C:\WINDOWS\System32\oqrthc.dll not found.
File/Folder C:\WINDOWS\System32\ydgn.dll not found.
File/Folder C:\WINDOWS\System32\dbfb.dll not found.
File/Folder C:\WINDOWS\System32\fjnbv.dll not found.
File/Folder C:\WINDOWS\System32\wmsat.dll not found.
File/Folder C:\WINDOWS\System32\gmnait.dll not found.
File/Folder C:\WINDOWS\System32\hfjg.dll not found.
File/Folder C:\WINDOWS\System32\xdndn.dll not found.
File/Folder C:\WINDOWS\System32\rgfjj.dll not found.
File/Folder C:\WINDOWS\System32\dscef.dll not found.
File/Folder C:\WINDOWS\System32\xfng.dll not found.
File/Folder C:\WINDOWS\System32\njritc.dll not found.
File/Folder C:\WINDOWS\System32\setrhes.dll not found.
File/Folder C:\WINDOWS\System32\cdxbfxdb.dll not found.
File/Folder C:\WINDOWS\System32\xfgnxfn.dll not found.
File/Folder C:\WINDOWS\System32\gjkhj.dll not found.
File/Folder C:\WINDOWS\System32\fxnfnh.dll not found.
File/Folder C:\WINDOWS\System32\bjrvm.dll not found.
File/Folder C:\WINDOWS\System32\ektvm.dll not found.
File/Folder C:\WINDOWS\System32\fehom.dll not found.
File/Folder C:\WINDOWS\System32\jyjlt.dll not found.
File/Folder C:\WINDOWS\System32\ijatnaw.dll not found.
File/Folder C:\WINDOWS\System32\sehhter.dll not found.
File/Folder C:\WINDOWS\System32\fhjfg.dll not found.
File/Folder C:\WINDOWS\System32\zdbdb.dll not found.
File/Folder C:\WINDOWS\System32\rhs.dll not found.
File/Folder C:\WINDOWS\System32\atehhz.dll not found.
File/Folder C:\WINDOWS\System32\gjjte.dll not found.
File/Folder C:\WINDOWS\System32\xgnfn.dll not found.
File/Folder C:\WINDOWS\System32\xfgnhcgfm.dll not found.
File/Folder C:\WINDOWS\System32\serger.dll not found.
File/Folder C:\WINDOWS\System32\bnxnb.dll not found.
File/Folder C:\WINDOWS\System32\fxgnfx.dll not found.
File/Folder C:\WINDOWS\System32\jzijj.dll not found.
File/Folder C:\WINDOWS\System32\xfgnfx.dll not found.
File/Folder C:\WINDOWS\System32\serghjm.dll not found.
File/Folder C:\WINDOWS\System32\thsddh.dll not found.
File/Folder C:\WINDOWS\System32\xbcvxb.dll not found.
File/Folder C:\WINDOWS\System32\zfdzb.dll not found.
File/Folder C:\WINDOWS\System32\hkfgh.dll not found.
File/Folder C:\WINDOWS\System32\drghszd.dll not found.
File/Folder C:\WINDOWS\System32\fngn.dll not found.
File/Folder C:\WINDOWS\System32\xdhdg.dll not found.
File/Folder C:\WINDOWS\System32\zdbfbd.dll not found.
File/Folder C:\WINDOWS\System32\fjyjy.dll not found.
File/Folder C:\WINDOWS\System32\awef.dll not found.
File/Folder C:\WINDOWS\System32\msepbe.dll not found.
File/Folder not found.
< HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HB Kernel >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HB Kernel\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ÐÞ¸´¹¤¾ß.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ÐÞ¸´¹¤¾ß.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\PSEXESVC >
Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\PSEXESVC\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360rpt.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360Safe.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360Safe.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\360tray.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ACKWIN32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ACKWIN32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTI-TROJAN.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ANTI-TROJAN.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\APVXDWIN.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\APVXDWIN.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AUTODOWN.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AUTODOWN.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVCONSOL.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVCONSOL.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVE32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVE32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVGCTRL.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVGCTRL.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVKSERV.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVKSERV.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVNT.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVNT.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVP32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPCC.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPCC.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPDOS32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPDOS32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPM.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPM.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPTC32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPTC32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPUPD.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVPUPD.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVSCHED32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVSCHED32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVWIN95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVWIN95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVWUPD32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\AVWUPD32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\BLACKD.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\BLACKD.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\BLACKICE.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\BLACKICE.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFIADMIN.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFIADMIN.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFIAUDIT.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFIAUDIT.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFINET.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFINET.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFINET32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CFINET32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLAW95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLAW95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLAW95CF.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLAW95CF.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLEANER.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLEANER.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLEANER3.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\CLEANER3.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\DVP95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\DVP95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\DVP95_0.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\DVP95_0.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ECENGINE.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ECENGINE.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\EGHOST.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\EGHOST.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ESAFE.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ESAFE.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\EXPWATCH.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\EXPWATCH.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-AGNT95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-AGNT95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-PROT.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-PROT.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-PROT95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-PROT95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-STOPW.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\F-STOPW.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FESCUE.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FESCUE.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FINDVIRU.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FINDVIRU.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FP-WIN.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FP-WIN.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FPROT.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FPROT.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FRW.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\FRW.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IAMAPP.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IAMAPP.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IAMSERV.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IAMSERV.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IBMASN.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IBMASN.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IBMAVSP.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IBMAVSP.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICLOAD95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICLOAD95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICLOADNT.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICLOADNT.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICMON.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICMON.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICSUPP95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICSUPP95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICSUPPNT.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ICSUPPNT.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IFACE.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IFACE.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IOMON98.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\IOMON98.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Iparmor.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\JEDI.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\JEDI.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAV32.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAV32.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVPFW.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVsvc.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVsvc.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVSvcUI.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KAVSvcUI.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVFW.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVFW.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonXP.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonXP.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonXP.kxp >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVMonXP.kxp\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVSrvXP.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVwsc.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KVwsc.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KvXP.kxp >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KvXP.kxp\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KWatchUI.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\KWatchUI.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\LOCKDOWN2000.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\LOCKDOWN2000.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Logo1_.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Logo1_.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Logo_1.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Logo_1.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\LOOKOUT.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\LOOKOUT.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\LUALL.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\LUALL.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\MAILMON.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\MAILMON.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\MOOLIVE.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\MOOLIVE.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\MPFTRAY.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\MPFTRAY.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\N32SCANW.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\N32SCANW.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapsvc.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapw32.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Navapw32.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NAVLU32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NAVLU32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NAVNT.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NAVNT.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\navw32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\navw32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NAVWNT.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NAVWNT.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NISUM.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NISUM.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NMain.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NMain.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NORMIST.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NORMIST.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NUPGRADE.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NUPGRADE.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NVC95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\NVC95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PAVCL.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PAVCL.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PAVSCHED.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PAVSCHED.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PAVW.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PAVW.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PCCWIN98.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PCCWIN98.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PCFWALLICON.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PCFWALLICON.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PERSFW.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PERSFW.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\PFW.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rav.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rav.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV7.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV7.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV7WIN.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAV7WIN.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVmon.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVmon.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVmonD.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVmonD.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVtimer.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\RAVtimer.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rising.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\Rising.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SAFEWEB.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SAFEWEB.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCAN32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCAN32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCAN95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCAN95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCANPM.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCANPM.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCRSCAN.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SCRSCAN.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SERV95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SERV95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SMC.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SMC.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SPHINX.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SPHINX.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SWEEP95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\SWEEP95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TBSCAN.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TBSCAN.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TCA.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TCA.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TDS2-98.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TDS2-98.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TDS2-NT.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TDS2-NT.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\THGUARD.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\THGUARD.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanHunter.exe >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\TrojanHunter.exe\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VET95.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VET95.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VETTRAY.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VETTRAY.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSCAN40.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSCAN40.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSECOMR.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSECOMR.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSHWIN32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSHWIN32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSSTAT.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\VSSTAT.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WEBSCANX.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WEBSCANX.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WFINDV32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\WFINDV32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ZONEALARM.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\ZONEALARM.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\_AVP32.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\_AVP32.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\_AVPCC.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\_AVPCC.EXE\\ deleted successfully.
< HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\_AVPM.EXE >
Registry key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\image file execution options\_AVPM.EXE\\ deleted successfully.

OTMoveIt2 by OldTimer - Version 1.0.4.1 log created on 04172008_125918

Edited by zenapex, 17 April 2008 - 01:11 PM.

  • 0

#18
zenapex

zenapex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Deckard's System Scanner v20071014.68
Run by Bong on 2008-04-17 13:04:35
Computer is in Normal Mode.
--------------------------------------------------------------------------------

System Drive C: has 2.23 GiB (less than 15%) free.


-- HijackThis (run as Bong.exe) ------------------------------------------------

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 13:04, on 2008-04-17
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Multimedia Card Reader\shwicon2k.exe
C:\Program Files\AGEIA Technologies\TrayIcon.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpohmr08.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpoevm08.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\Bin\hpoSTS08.exe
C:\WINDOWS\System32\WgaTray.exe
C:\WINDOWS\System32\wuauclt.exe
C:\PROGRA~1\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Bong\Desktop\dss.exe
C:\PROGRA~1\TRENDM~1\HIJACK~1\Bong.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://google.com/
O2 - BHO: BitComet ClickCapture - {39F7E362-828A-4B5A-BCAF-5B79BFDFEA60} - C:\Program Files\BitComet\tools\BitCometBHO_1.1.3.28.dll
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
O4 - HKLM\..\Run: [Sunkist2k] C:\Program Files\Multimedia Card Reader\shwicon2k.exe
O4 - HKLM\..\Run: [RoxWatchTray] "C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe"
O4 - HKLM\..\Run: [AGEIA PhysX SysTray] C:\Program Files\AGEIA Technologies\TrayIcon.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKCU\..\Run: [Steam] "c:\progra~1\valve\steam\steam.exe" -silent
O4 - HKCU\..\Run: [Veoh] "C:\Program Files\Veoh Networks\Veoh\VeohClient.exe" /VeohHide
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe
O4 - Global Startup: Adobe Reader Synchronizer.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe
O4 - Global Startup: hp psc 1000 series.lnk = ?
O4 - Global Startup: hpoddt01.exe.lnk = ?
O8 - Extra context menu item: &D&ownload &with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddLink.htm
O8 - Extra context menu item: &D&ownload all video with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddVideo.htm
O8 - Extra context menu item: &D&ownload all with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddAllLink.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1....loadManager.ocx
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Adobe Active File Monitor V5 (AdobeActiveFileMonitor5.0) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: mental ray 3.5 Satellite (32-bit) (mi-raysat_3dsmax9_32) - Unknown owner - C:\Program Files\Autodesk\3ds Max 9\mentalray\satellite\raysat_3dsmax9_32server.exe (file missing)
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\System32\HPZipm12.exe
O23 - Service: PsExec (PSEXESVC) - Sysinternals - C:\WINDOWS\PSEXESVC.EXE
O23 - Service: Roxio UPnP Renderer 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUPnPRenderer9.exe
O23 - Service: Roxio Upnp Server 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUpnpService9.exe
O23 - Service: LiveShare P2P Server 9 (RoxLiveShare9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxLiveShare9.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: Roxio Hard Drive Watcher 9 (RoxWatch9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe

--
End of file - 6297 bytes

-- Files created between 2008-03-17 and 2008-04-17 -----------------------------

2008-04-15 21:39:35 0 dr-h----- C:\$VAULT$.AVG
2008-04-15 18:56:10 0 d-------- C:\Documents and Settings\Bong\Application Data\AVG7
2008-04-15 18:54:00 0 d-------- C:\Documents and Settings\LocalService\Application Data\AVG7
2008-04-15 18:53:46 0 d-------- C:\Documents and Settings\All Users\Application Data\Grisoft
2008-04-15 15:40:45 0 d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2008-04-15 15:38:04 0 d-------- C:\Program Files\SUPERAntiSpyware
2008-04-15 15:38:04 0 d-------- C:\Documents and Settings\Bong\Application Data\SUPERAntiSpyware.com
2008-04-15 14:57:15 0 d-------- C:\Documents and Settings\All Users\Application Data\Avg7
2008-04-14 23:29:49 0 d-------- C:\Program Files\Veoh Networks
2008-04-14 16:37:00 0 d-------- C:\VundoFix Backups
2008-04-13 13:29:26 0 d-------- C:\WINDOWS\ERUNT
2008-04-13 00:29:55 53248 --a------ C:\WINDOWS\PSEXESVC.EXE <Not Verified; Sysinternals; Sysinternals PsExec>
2008-04-13 00:29:22 68096 --a------ C:\WINDOWS\zip.exe
2008-04-13 00:29:22 49152 --a------ C:\WINDOWS\VFind.exe
2008-04-13 00:29:22 212480 --a------ C:\WINDOWS\swxcacls.exe <Not Verified; SteelWerX; SteelWerX Extended Configurator ACLists>
2008-04-13 00:29:22 136704 --a------ C:\WINDOWS\swsc.exe <Not Verified; SteelWerX; SteelWerX Service Controller>
2008-04-13 00:29:22 161792 --a------ C:\WINDOWS\swreg.exe <Not Verified; SteelWerX; SteelWerX Registry Editor>
2008-04-13 00:29:22 98816 --a------ C:\WINDOWS\sed.exe
2008-04-13 00:29:22 80412 --a------ C:\WINDOWS\grep.exe
2008-04-13 00:29:22 73728 --a------ C:\WINDOWS\fdsv.exe <Not Verified; Smallfrogs Studio; >
2008-04-10 08:10:04 0 d-------- C:\Documents and Settings\Bong\Application Data\Malwarebytes
2008-04-10 08:09:35 0 d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-04-05 00:40:00 0 d-------- C:\Program Files\Common Files\xing shared
2008-04-04 15:35:44 0 d-------- C:\Documents and Settings\All Users\Application Data\PC Tools
2008-04-04 12:08:42 0 d-------- C:\Program Files\Microsoft Windows OneCare Live
2008-04-03 21:18:45 0 d-------- C:\Program Files\Trend Micro
2008-04-01 17:35:22 0 d-------- C:\WINDOWS\System32\Adobe
2008-04-01 01:01:36 128 --a------ C:\WINDOWS\System32\msosping.dat


-- Find3M Report ---------------------------------------------------------------

2008-04-15 23:05:12 0 d-------- C:\Program Files\SpeedFan
2008-04-15 18:43:06 0 d-------- C:\Program Files\Common Files
2008-04-15 15:31:28 0 d-------- C:\Documents and Settings\Bong\Application Data\Adobe
2008-04-06 10:22:16 0 d-------- C:\Program Files\BitComet
2008-04-06 10:20:27 2560 --a------ C:\WINDOWS\System32\BitCometRes.dll <Not Verified; BitComet; BitComet BCTP Helper>
2008-04-05 00:46:42 0 d-------- C:\Documents and Settings\Bong\Application Data\Real
2008-04-05 00:41:44 2521 --a------ C:\WINDOWS\mozver.dat
2008-04-05 00:39:56 0 d-------- C:\Program Files\Common Files\Real
2008-03-30 18:08:25 0 d-------- C:\Program Files\Macromedia
2008-03-30 18:06:06 0 d-------- C:\Program Files\Yahoo!
2008-03-30 18:05:39 0 d-------- C:\Documents and Settings\Bong\Application Data\Yahoo!
2008-03-30 18:03:41 0 d-------- C:\Program Files\Common Files\Adobe
2008-03-21 05:04:04 256 --a------ C:\WINDOWS\System32\pool.bin
2008-03-17 18:11:14 0 d-------- C:\Documents and Settings\Bong\Application Data\dvdcss
2008-03-14 15:15:56 0 d-------- C:\Program Files\Red Kawa
2008-03-14 15:13:24 0 d-------- C:\Program Files\Seabyrd Technologies
2008-03-09 15:19:33 0 d--h----- C:\Program Files\InstallShield Installation Information
2008-03-09 15:19:33 0 d-------- C:\Program Files\Common Files\Macromedia
2008-02-23 16:04:14 0 d-------- C:\Program Files\Game Cam v1.4
2008-02-23 16:02:45 0 d-------- C:\Program Files\EA GAMES


-- Registry Dump ---------------------------------------------------------------

*Note* empty entries & legit default entries are not shown


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sunkist2k"="C:\Program Files\Multimedia Card Reader\shwicon2k.exe" [2004-02-27 10:05]
"RoxWatchTray"="C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe" [2007-03-26 07:07]
"AGEIA PhysX SysTray"="C:\Program Files\AGEIA Technologies\TrayIcon.exe" [2006-03-20 13:43]
"TkBellExe"="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2008-04-05 00:39]
"NvCplDaemon"="C:\WINDOWS\System32\NvCpl.dll" [2007-06-29 00:43]
"AVG7_CC"="C:\PROGRA~1\Grisoft\AVG7\avgcc.exe" [2008-04-15 18:59]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Steam"="c:\progra~1\valve\steam\steam.exe" [2008-03-30 11:41]
"Veoh"="C:\Program Files\Veoh Networks\Veoh\VeohClient.exe" [2008-04-01 18:35]
"@"="" []

C:\Documents and Settings\Bong\Start Menu\Programs\Startup\
Adobe Gamma.lnk - C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2007-04-28 09:37:56]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Adobe Gamma Loader.lnk - C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2007-04-28 09:37:56]
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe [2006-10-23 01:48:20]
Adobe Reader Synchronizer.lnk - C:\Program Files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe [2006-10-23 00:01:50]
hp psc 1000 series.lnk - C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpohmr08.exe [2003-04-06 01:17:18]
hpoddt01.exe.lnk - C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe [2003-04-06 01:06:58]


[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\nwiz]
nwiz.exe /install

*Newly Created Service* - PXARK



-- End of Deckard's System Scanner: finished at 2008-04-17 13:04:56 ------------
  • 0

#19
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Looks good. :)

Next,

Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  • Please, never rename Combofix unless instructed.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    -----------------------------------------------------------

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      -----------------------------------------------------------

    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

    -----------------------------------------------------------

  • Double click on combofix.exe & follow the prompts.
  • When finished, it will produce a report for you.
  • Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**
  • 0

#20
zenapex

zenapex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Here is the new Combofix.txr and the new HiJackThis log.


ComboFix 08-04-16.5 - Bong 2008-04-17 19:43:44.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.1058 [GMT -6:00]
Running from: C:\Documents and Settings\Bong\Desktop\ComboFix.exe
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Program Files\Internet Explorer\PLUGINS\Nv_Win3s.Jmp
C:\Program Files\Internet Explorer\PLUGINS\SysWin7s.Jmp
C:\WINDOWS\Fonts\gjcuaxw.fon
C:\WINDOWS\Fonts\syn00-0C-6E-BA-1B-E6\system
C:\WINDOWS\Fonts\syn00-0C-6E-BA-1B-E6\system\SYSTEM128.vxd
.
---- Previous Run -------
.
C:\Autorun.inf
C:\privilege.dat
C:\WINDOWS\dxtmechk
C:\WINDOWS\system32\ayQACQAC1030.dll
C:\WINDOWS\system32\D3D9_64.DLL
C:\WINDOWS\system32\mfchlp32.dll
C:\WINDOWS\system32\mseion.sys
C:\WINDOWS\system32\msosmnsf.dat
C:\WINDOWS\system32\msosmnsf00.dll
C:\WINDOWS\system32\REGKEY.hiv
H:\Autorun.inf

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_FPIDS32
-------\Legacy_MNSF
-------\Legacy_PING
-------\Service_fpids32
-------\Service_mnsf
-------\Service_ping


((((((((((((((((((((((((( Files Created from 2008-03-18 to 2008-04-18 )))))))))))))))))))))))))))))))
.

2008-04-17 14:33 . 2008-04-17 14:33 <DIR> d-------- C:\WINDOWS\system32\QuickTime
2008-04-17 00:09 . 2008-04-17 00:09 <DIR> d-------- C:\Deckard
2008-04-15 18:56 . 2008-04-16 08:01 <DIR> d-------- C:\Documents and Settings\Bong\Application Data\AVG7
2008-04-15 18:54 . 2008-04-15 18:54 <DIR> d-------- C:\Documents and Settings\LocalService\Application Data\AVG7
2008-04-15 18:53 . 2008-04-15 18:53 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Grisoft
2008-04-15 15:40 . 2008-04-15 15:40 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2008-04-15 15:38 . 2008-04-17 07:37 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
2008-04-15 15:38 . 2008-04-15 18:53 <DIR> d-------- C:\Documents and Settings\Bong\Application Data\SUPERAntiSpyware.com
2008-04-15 14:57 . 2008-04-15 18:59 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avg7
2008-04-14 23:29 . 2008-04-14 23:29 <DIR> d-------- C:\Program Files\Veoh Networks
2008-04-14 16:37 . 2008-04-14 17:54 <DIR> d-------- C:\VundoFix Backups
2008-04-13 13:29 . 2008-04-13 13:29 <DIR> d-------- C:\WINDOWS\ERUNT
2008-04-13 13:23 . 2008-04-13 13:23 <DIR> d-------- C:\SDfix
2008-04-10 08:10 . 2008-04-10 08:10 <DIR> d-------- C:\Documents and Settings\Bong\Application Data\Malwarebytes
2008-04-10 08:09 . 2008-04-10 08:09 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-04-06 10:55 . 2008-04-06 10:55 10,240 --ahs---- C:\WINDOWS\Thumbs.db
2008-04-05 00:40 . 2008-04-05 00:40 <DIR> d-------- C:\Program Files\Common Files\xing shared
2008-04-04 15:35 . 2008-04-04 15:35 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\PC Tools
2008-04-04 12:08 . 2008-04-04 12:08 <DIR> d-------- C:\Program Files\Microsoft Windows OneCare Live
2008-04-04 00:15 . 2008-04-04 00:16 151 --a------ C:\WINDOWS\PhotoSnapViewer.INI
2008-04-03 23:31 . 2008-04-15 13:14 522 --a------ C:\hpfr3420.xml
2008-04-03 21:18 . 2008-04-03 21:18 <DIR> d-------- C:\Program Files\Trend Micro
2008-04-01 17:35 . 2008-04-01 17:35 <DIR> d-------- C:\WINDOWS\system32\Adobe
2008-04-01 01:01 . 2008-04-01 01:01 128 --a------ C:\WINDOWS\system32\msosping.dat

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-04-17 20:34 --------- d-----w C:\Program Files\Common Files\Macromedia
2008-04-17 20:33 --------- d-----w C:\Program Files\Macromedia
2008-04-16 05:05 --------- d-----w C:\Program Files\SpeedFan
2008-04-15 18:09 --------- d---a-w C:\Documents and Settings\All Users\Application Data\TEMP
2008-04-06 16:22 --------- d-----w C:\Program Files\BitComet
2008-04-05 06:39 --------- d-----w C:\Program Files\Common Files\Real
2008-03-31 00:06 --------- d-----w C:\Program Files\Yahoo!
2008-03-31 00:05 --------- d-----w C:\Documents and Settings\Bong\Application Data\Yahoo!
2008-03-31 00:05 --------- d-----w C:\Documents and Settings\All Users\Application Data\Yahoo!
2008-03-31 00:03 --------- d-----w C:\Program Files\Common Files\Adobe
2008-03-31 00:02 --------- d-----w C:\Documents and Settings\All Users\Application Data\Apple Computer
2008-03-18 00:11 --------- d-----w C:\Documents and Settings\Bong\Application Data\dvdcss
2008-03-14 21:15 --------- d-----w C:\Program Files\Red Kawa
2008-03-14 21:13 --------- d-----w C:\Program Files\Seabyrd Technologies
2008-03-09 21:19 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-02-23 22:04 --------- d-----w C:\Program Files\Game Cam v1.4
2008-02-23 22:02 --------- d-----w C:\Program Files\EA GAMES
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Steam"="c:\progra~1\valve\steam\steam.exe" [2008-03-30 11:41 1271032]
"Veoh"="C:\Program Files\Veoh Networks\Veoh\VeohClient.exe" [2008-04-01 18:35 3587120]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sunkist2k"="C:\Program Files\Multimedia Card Reader\shwicon2k.exe" [2004-02-27 10:05 135168]
"RoxWatchTray"="C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe" [2007-03-26 07:07 228088]
"AGEIA PhysX SysTray"="C:\Program Files\AGEIA Technologies\TrayIcon.exe" [2006-03-20 13:43 331776]
"TkBellExe"="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2008-04-05 00:39 185632]
"NvCplDaemon"="C:\WINDOWS\System32\NvCpl.dll" [2007-06-29 00:43 8466432]
"AVG7_CC"="C:\PROGRA~1\Grisoft\AVG7\avgcc.exe" [2008-04-15 18:59 579584]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"AVG7_Run"="C:\PROGRA~1\Grisoft\AVG7\avgw.exe" [2008-04-15 18:53 219136]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Adobe Gamma Loader.lnk - C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2007-04-28 09:37:56 110592]
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe [2006-10-23 01:48:20 40048]
Adobe Reader Synchronizer.lnk - C:\Program Files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe [2006-10-23 00:01:50 734872]
hp psc 1000 series.lnk - C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpohmr08.exe [2003-04-06 01:17:18 147456]
hpoddt01.exe.lnk - C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe [2003-04-06 01:06:58 28672]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
--a------ 2007-06-29 00:43 8466432 C:\WINDOWS\System32\NvCpl.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\nwiz]
--a------ 2007-06-29 00:43 1626112 C:\WINDOWS\system32\nwiz.exe

S1 vcdrom;Virtual CD-ROM Device Driver;C:\WINDOWS\system32\VCdRom.sys []
S2 msert;msert;C:\WINDOWS\System32\drivers\mselk.sys []
S3 HBKernel;HBKernel Driver;C:\WINDOWS\System32\drivers\HBKernel.sys []
S3 PsSdk30;PsSdk30;C:\WINDOWS\System32\Drivers\PsSdk30.drv []
S3 sys_flt;sys_flt;C:\DOCUME~1\Bong\LOCALS~1\Temp\~90.tmp []
S3 XDva020;XDva020;C:\WINDOWS\System32\XDva020.sys []

.
**************************************************************************

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-04-17 19:50:02
Windows 5.1.2600 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet002\Services\PsSdk30]
"ImagePath"="\??\C:\WINDOWS\System32\Drivers\PsSdk30.drv"

[HKEY_LOCAL_MACHINE\System\ControlSet002\Services\sys_flt]
"ImagePath"="\??\C:\DOCUME~1\Bong\LOCALS~1\Temp\~90.tmp"
.
------------------------ Other Running Processes ------------------------
.
C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpoevm08.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hposts08.exe
.
**************************************************************************
.
Completion time: 2008-04-17 20:00:01 - machine was rebooted [Bong]
ComboFix-quarantined-files.txt 2008-04-18 01:59:58

Pre-Run: 955,711,488 bytes free
Post-Run: 862,961,664 bytes free





Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:45:07 PM, on 4/17/2008
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Multimedia Card Reader\shwicon2k.exe
C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
C:\Program Files\AGEIA Technologies\TrayIcon.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpohmr08.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpoevm08.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\Bin\hpoSTS08.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://google.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
O2 - BHO: BitComet ClickCapture - {39F7E362-828A-4B5A-BCAF-5B79BFDFEA60} - C:\Program Files\BitComet\tools\BitCometBHO_1.1.3.28.dll
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
O4 - HKLM\..\Run: [Sunkist2k] C:\Program Files\Multimedia Card Reader\shwicon2k.exe
O4 - HKLM\..\Run: [RoxWatchTray] "C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe"
O4 - HKLM\..\Run: [AGEIA PhysX SysTray] C:\Program Files\AGEIA Technologies\TrayIcon.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKCU\..\Run: [Steam] "c:\progra~1\valve\steam\steam.exe" -silent
O4 - HKCU\..\Run: [Veoh] "C:\Program Files\Veoh Networks\Veoh\VeohClient.exe" /VeohHide
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe
O4 - Global Startup: Adobe Reader Synchronizer.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe
O4 - Global Startup: hp psc 1000 series.lnk = ?
O4 - Global Startup: hpoddt01.exe.lnk = ?
O8 - Extra context menu item: &D&ownload &with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddLink.htm
O8 - Extra context menu item: &D&ownload all video with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddVideo.htm
O8 - Extra context menu item: &D&ownload all with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddAllLink.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1....loadManager.ocx
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Adobe Active File Monitor V5 (AdobeActiveFileMonitor5.0) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: mental ray 3.5 Satellite (32-bit) (mi-raysat_3dsmax9_32) - Unknown owner - C:\Program Files\Autodesk\3ds Max 9\mentalray\satellite\raysat_3dsmax9_32server.exe (file missing)
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\System32\HPZipm12.exe
O23 - Service: Roxio UPnP Renderer 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUPnPRenderer9.exe
O23 - Service: Roxio Upnp Server 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUpnpService9.exe
O23 - Service: LiveShare P2P Server 9 (RoxLiveShare9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxLiveShare9.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: Roxio Hard Drive Watcher 9 (RoxWatch9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe

--
End of file - 6547 bytes
  • 0

#21
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Much better. :)
Combofix was able to run and remove some malware.
Lets remove some more.

Next,

1. Please open Notepad
  • Click Start , then Run
  • Type notepad .exe in the Run Box.

2. Now copy/paste the entire content of the codebox below into the Notepad window:

File::
C:\WINDOWS\system32\msosping.dat

Registry::
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\XDva020]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PsSdk30]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sys_flt]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vcdrom]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HBKernel]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\msert]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\Legacy_FPIDS32]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\Legacy_MNSF]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\Legacy_PING]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Service_fpids32]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Service_mnsf]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Service_ping]



3. Save the above as CFScript.txt

4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

Posted Image


5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
  • Combofix.txt
  • A new HijackThis log.

  • 0

#22
zenapex

zenapex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Here is the Combofix.txt following your instructions along with a new HiJackThis log.


ComboFix 08-04-16.5 - Bong 2008-04-18 13:32:48.3 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.1145 [GMT -6:00]
Running from: C:\Documents and Settings\Bong\Desktop\ComboFix.exe
Command switches used :: C:\Documents and Settings\Bong\Desktop\CFScript.txt
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!

FILE ::
C:\WINDOWS\system32\msosping.dat
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\WINDOWS\system32\msosping.dat

.
((((((((((((((((((((((((( Files Created from 2008-03-18 to 2008-04-18 )))))))))))))))))))))))))))))))
.

2008-04-17 14:33 . 2008-04-17 14:33 <DIR> d-------- C:\WINDOWS\system32\QuickTime
2008-04-17 00:09 . 2008-04-17 00:09 <DIR> d-------- C:\Deckard
2008-04-15 18:56 . 2008-04-18 08:00 <DIR> d-------- C:\Documents and Settings\Bong\Application Data\AVG7
2008-04-15 18:54 . 2008-04-15 18:54 <DIR> d-------- C:\Documents and Settings\LocalService\Application Data\AVG7
2008-04-15 18:53 . 2008-04-15 18:53 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Grisoft
2008-04-15 15:40 . 2008-04-15 15:40 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2008-04-15 15:38 . 2008-04-17 07:37 <DIR> d-------- C:\Program Files\SUPERAntiSpyware
2008-04-15 15:38 . 2008-04-15 18:53 <DIR> d-------- C:\Documents and Settings\Bong\Application Data\SUPERAntiSpyware.com
2008-04-15 14:57 . 2008-04-15 18:59 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avg7
2008-04-14 23:29 . 2008-04-14 23:29 <DIR> d-------- C:\Program Files\Veoh Networks
2008-04-14 16:37 . 2008-04-14 17:54 <DIR> d-------- C:\VundoFix Backups
2008-04-13 13:29 . 2008-04-13 13:29 <DIR> d-------- C:\WINDOWS\ERUNT
2008-04-13 13:23 . 2008-04-13 13:23 <DIR> d-------- C:\SDfix
2008-04-10 08:10 . 2008-04-10 08:10 <DIR> d-------- C:\Documents and Settings\Bong\Application Data\Malwarebytes
2008-04-10 08:09 . 2008-04-10 08:09 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-04-06 10:55 . 2008-04-06 10:55 10,240 --ahs---- C:\WINDOWS\Thumbs.db
2008-04-05 00:40 . 2008-04-05 00:40 <DIR> d-------- C:\Program Files\Common Files\xing shared
2008-04-04 15:35 . 2008-04-04 15:35 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\PC Tools
2008-04-04 12:08 . 2008-04-04 12:08 <DIR> d-------- C:\Program Files\Microsoft Windows OneCare Live
2008-04-04 00:15 . 2008-04-04 00:16 151 --a------ C:\WINDOWS\PhotoSnapViewer.INI
2008-04-03 23:31 . 2008-04-15 13:14 522 --a------ C:\hpfr3420.xml
2008-04-03 21:18 . 2008-04-03 21:18 <DIR> d-------- C:\Program Files\Trend Micro
2008-04-01 17:35 . 2008-04-01 17:35 <DIR> d-------- C:\WINDOWS\system32\Adobe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-04-18 04:10 --------- d-----w C:\Program Files\SpeedFan
2008-04-17 20:34 --------- d-----w C:\Program Files\Common Files\Macromedia
2008-04-17 20:33 --------- d-----w C:\Program Files\Macromedia
2008-04-15 18:09 --------- d---a-w C:\Documents and Settings\All Users\Application Data\TEMP
2008-04-06 16:22 --------- d-----w C:\Program Files\BitComet
2008-04-06 16:20 2,560 ----a-w C:\WINDOWS\system32\BitCometRes.dll
2008-04-05 06:39 --------- d-----w C:\Program Files\Common Files\Real
2008-03-31 00:06 --------- d-----w C:\Program Files\Yahoo!
2008-03-31 00:05 --------- d-----w C:\Documents and Settings\Bong\Application Data\Yahoo!
2008-03-31 00:05 --------- d-----w C:\Documents and Settings\All Users\Application Data\Yahoo!
2008-03-31 00:03 --------- d-----w C:\Program Files\Common Files\Adobe
2008-03-31 00:02 --------- d-----w C:\Documents and Settings\All Users\Application Data\Apple Computer
2008-03-18 00:11 --------- d-----w C:\Documents and Settings\Bong\Application Data\dvdcss
2008-03-14 21:15 --------- d-----w C:\Program Files\Red Kawa
2008-03-14 21:13 --------- d-----w C:\Program Files\Seabyrd Technologies
2008-03-09 21:19 --------- d--h--w C:\Program Files\InstallShield Installation Information
2008-02-23 22:04 --------- d-----w C:\Program Files\Game Cam v1.4
2008-02-23 22:02 --------- d-----w C:\Program Files\EA GAMES
.

((((((((((((((((((((((((((((( snapshot@2008-04-17_19.59.48.07 )))))))))))))))))))))))))))))))))))))))))
.
- 2008-04-18 01:49:07 2,048 --s-a-w C:\WINDOWS\bootstat.dat
+ 2008-04-18 13:19:34 2,048 --s-a-w C:\WINDOWS\bootstat.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Steam"="c:\progra~1\valve\steam\steam.exe" [2008-03-30 11:41 1271032]
"Veoh"="C:\Program Files\Veoh Networks\Veoh\VeohClient.exe" [2008-04-01 18:35 3587120]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sunkist2k"="C:\Program Files\Multimedia Card Reader\shwicon2k.exe" [2004-02-27 10:05 135168]
"RoxWatchTray"="C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe" [2007-03-26 07:07 228088]
"AGEIA PhysX SysTray"="C:\Program Files\AGEIA Technologies\TrayIcon.exe" [2006-03-20 13:43 331776]
"TkBellExe"="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2008-04-05 00:39 185632]
"NvCplDaemon"="C:\WINDOWS\System32\NvCpl.dll" [2007-06-29 00:43 8466432]
"AVG7_CC"="C:\PROGRA~1\Grisoft\AVG7\avgcc.exe" [2008-04-15 18:59 579584]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"AVG7_Run"="C:\PROGRA~1\Grisoft\AVG7\avgw.exe" [2008-04-15 18:53 219136]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Adobe Gamma Loader.lnk - C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2007-04-28 09:37:56 110592]
Adobe Reader Speed Launch.lnk - C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe [2006-10-23 01:48:20 40048]
Adobe Reader Synchronizer.lnk - C:\Program Files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe [2006-10-23 00:01:50 734872]
hp psc 1000 series.lnk - C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpohmr08.exe [2003-04-06 01:17:18 147456]
hpoddt01.exe.lnk - C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe [2003-04-06 01:06:58 28672]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
--a------ 2007-06-29 00:43 8466432 C:\WINDOWS\System32\NvCpl.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\nwiz]
--a------ 2007-06-29 00:43 1626112 C:\WINDOWS\system32\nwiz.exe


*Newly Created Service* - CATCHME
.
**************************************************************************

catchme 0.3.1353 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-04-18 13:35:54
Windows 5.1.2600 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\HBKernel]
"ImagePath"="\??\C:\WINDOWS\System32\drivers\HBKernel.sys"
--

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\msert]
"ImagePath"="system32\drivers\mselk.sys"
--

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\PsSdk30]
"ImagePath"="\??\C:\WINDOWS\System32\Drivers\PsSdk30.drv"
--

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\sys_flt]
"ImagePath"="\??\C:\DOCUME~1\Bong\LOCALS~1\Temp\~90.tmp"
--

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\vcdrom]
"ImagePath"="\??\C:\WINDOWS\system32\VCdRom.sys"
--

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\XDva020]
"ImagePath"="\??\C:\WINDOWS\System32\XDva020.sys"

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\PsSdk30]
"ImagePath"="\??\C:\WINDOWS\System32\Drivers\PsSdk30.drv"

[HKEY_LOCAL_MACHINE\system\ControlSet002\Services\sys_flt]
"ImagePath"="\??\C:\DOCUME~1\Bong\LOCALS~1\Temp\~90.tmp"
.
Completion time: 2008-04-18 13:42:02
ComboFix-quarantined-files.txt 2008-04-18 19:41:59
ComboFix2.txt 2008-04-18 02:00:02

Pre-Run: 631,877,632 bytes free
Post-Run: 618,184,704 bytes free



Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:51:01 PM, on 4/18/2008
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Multimedia Card Reader\shwicon2k.exe
C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpohmr08.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpoevm08.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\Bin\hpoSTS08.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\System32\WgaTray.exe
C:\WINDOWS\system32\notepad.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://google.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
O2 - BHO: BitComet ClickCapture - {39F7E362-828A-4B5A-BCAF-5B79BFDFEA60} - C:\Program Files\BitComet\tools\BitCometBHO_1.1.3.28.dll
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
O4 - HKLM\..\Run: [Sunkist2k] C:\Program Files\Multimedia Card Reader\shwicon2k.exe
O4 - HKLM\..\Run: [RoxWatchTray] "C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe"
O4 - HKLM\..\Run: [AGEIA PhysX SysTray] C:\Program Files\AGEIA Technologies\TrayIcon.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKCU\..\Run: [Steam] "c:\progra~1\valve\steam\steam.exe" -silent
O4 - HKCU\..\Run: [Veoh] "C:\Program Files\Veoh Networks\Veoh\VeohClient.exe" /VeohHide
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe
O4 - Global Startup: Adobe Reader Synchronizer.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe
O4 - Global Startup: hp psc 1000 series.lnk = ?
O4 - Global Startup: hpoddt01.exe.lnk = ?
O8 - Extra context menu item: &D&ownload &with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddLink.htm
O8 - Extra context menu item: &D&ownload all video with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddVideo.htm
O8 - Extra context menu item: &D&ownload all with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddAllLink.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1....loadManager.ocx
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: Adobe Active File Monitor V5 (AdobeActiveFileMonitor5.0) - Unknown owner - C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: mental ray 3.5 Satellite (32-bit) (mi-raysat_3dsmax9_32) - Unknown owner - C:\Program Files\Autodesk\3ds Max 9\mentalray\satellite\raysat_3dsmax9_32server.exe (file missing)
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\System32\HPZipm12.exe
O23 - Service: Roxio UPnP Renderer 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUPnPRenderer9.exe
O23 - Service: Roxio Upnp Server 9 - Sonic Solutions - C:\Program Files\Roxio\Digital Home 9\RoxioUpnpService9.exe
O23 - Service: LiveShare P2P Server 9 (RoxLiveShare9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxLiveShare9.exe
O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
O23 - Service: Roxio Hard Drive Watcher 9 (RoxWatch9) - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe

--
End of file - 6484 bytes
  • 0

#23
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Looking good. :)

Next,

Please download the OTMoveIt2 by OldTimer.
  • Save it to your desktop.
  • Please double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
  • Copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    HKEY_LOCAL_MACHINE\system\ControlSet002\Services\HBKernel
    HKEY_LOCAL_MACHINE\system\ControlSet002\Services\msert
    HKEY_LOCAL_MACHINE\system\ControlSet002\Services\PsSdk30
    HKEY_LOCAL_MACHINE\system\ControlSet002\Services\sys_flt
    HKEY_LOCAL_MACHINE\system\ControlSet002\Services\vcdrom
    HKEY_LOCAL_MACHINE\system\ControlSet002\Services\XDva020
    HKEY_LOCAL_MACHINE\system\ControlSet002\Services\PsSdk30
    HKEY_LOCAL_MACHINE\system\ControlSet002\Services\sys_flt
  • Return to OTMoveIt2, right click in the "Paste List of Files/Folders to Move" window (under the light Yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • A log of files and folders moved will be created in the c:\_OTMoveIt\MovedFiles folder in the form of Date and Time (mmddyyyy_hhmmss.log). Please open this log in Notepad and post its contents in your next reply.
  • Close OTMoveIt2
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

Then,

Please download Malwarebytes' Anti-Malware from Here or Here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Finally,

First download AVG Anti-Spyware from HERE and save that file to your desktop.
This is a 30 day trial of the program
  • Once you have downloaded AVG Anti-Spyware, locate the icon on the desktop and double-click it to launch the set up program.
  • Once the setup is complete you will need run AVG Anti-Spyware and update the definition files.
  • On the main screen select the icon "Update" then select the "Update now" link.
    • Next select the "Start Update" button, the update will start and a progress bar will show the updates being installed.
  • Once the update has completed select the "Scanner" icon at the top of the screen, then select the "Settings" tab.
  • Once in the Settings screen click on "Recommended actions" and then select "Quarantine".
  • Under "Reports"
    • Select ""Do no automatically generate report""
    • Un-Select "Only if threats were found"
Close AVG Anti-Spyware, Do Not run a scan just yet, we will shortly.
  • Reboot your computer into SafeMode. You can do this by restarting your computer and continually tapping the F8 key until a menu appears. Use your up arrow key to highlight SafeMode then hit enter.
    IMPORTANT: Do not open any other windows or programs while AVG Anti-Spyware is scanning, it may interfere with the scanning proccess:
  • Lauch AVG Anti-Spyware by double-clicking the icon on your desktop.
  • Select the "Scanner" icon at the top and then the "Scan" tab then click on "Complete System Scan".
  • AVG Anti-Spyware will now begin the scanning process, be patient this may take a little time.
    Once the scan is complete do the following:
  • If you have any infections you will prompted, then select "Apply all actions"
  • Next select the "Reports" icon at the top.
  • Select the "Save report as" button in the lower left hand of the screen and save it to a text file on your system (make sure to remember where you saved that file, this is important).
  • Close AVG Anti-Spyware and reboot your system back into Normal Mode and post the results of the AVG Anti-Spyware report scan.

Please post back with.

- Otmoveit log
- Malwarebytes log
- AVG antispyware log
  • 0

#24
zenapex

zenapex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
Here is the the OTMoveIt log, Malwarebytes log and the AVG log, in that order.


< HKEY_LOCAL_MACHINE\system\ControlSet002\Services\HBKernel >
Registry key HKEY_LOCAL_MACHINE\system\ControlSet002\Services\HBKernel\\ not found.
< HKEY_LOCAL_MACHINE\system\ControlSet002\Services\msert >
Registry key HKEY_LOCAL_MACHINE\system\ControlSet002\Services\msert\\ not found.
< HKEY_LOCAL_MACHINE\system\ControlSet002\Services\PsSdk30 >
Registry key HKEY_LOCAL_MACHINE\system\ControlSet002\Services\PsSdk30\\ not found.
< HKEY_LOCAL_MACHINE\system\ControlSet002\Services\sys_flt >
Registry key HKEY_LOCAL_MACHINE\system\ControlSet002\Services\sys_flt\\ not found.
< HKEY_LOCAL_MACHINE\system\ControlSet002\Services\vcdrom >
Registry key HKEY_LOCAL_MACHINE\system\ControlSet002\Services\vcdrom\\ not found.
< HKEY_LOCAL_MACHINE\system\ControlSet002\Services\XDva020 >
Registry key HKEY_LOCAL_MACHINE\system\ControlSet002\Services\XDva020\\ not found.
< HKEY_LOCAL_MACHINE\system\ControlSet002\Services\PsSdk30 >
Registry key HKEY_LOCAL_MACHINE\system\ControlSet002\Services\PsSdk30\\ not found.
< HKEY_LOCAL_MACHINE\system\ControlSet002\Services\sys_flt >
Registry key HKEY_LOCAL_MACHINE\system\ControlSet002\Services\sys_flt\\ not found.

OTMoveIt2 by OldTimer - Version 1.0.4.1 log created on 04192008_104614



Malwarebytes' Anti-Malware 1.11
Database version: 662

Scan type: Quick Scan
Objects scanned: 29657
Time elapsed: 4 minute(s), 19 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



---------------------------------------------------------
AVG Anti-Spyware - Scan Report
---------------------------------------------------------

+ Created at: 3:33:20 PM 4/19/2008

+ Scan result:



HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions\{c95fe080-8f5d-11d2-a20b-00aa003c157a} -> Adware.Generic : Cleaned with backup (quarantined).
HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{c95fe080-8f5d-11d2-a20b-00aa003c157a} -> Adware.Generic : Cleaned with backup (quarantined).
HKU\S-1-5-18\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{c95fe080-8f5d-11d2-a20b-00aa003c157a} -> Adware.Generic : Error during cleaning.
HKU\S-1-5-21-1960408961-606747145-725345543-1003\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\\{c95fe080-8f5d-11d2-a20b-00aa003c157a} -> Adware.Generic : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0001009.DLL -> Downloader.Agent.loa : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002485.DLL -> Downloader.Agent.loa : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002620.DLL -> Downloader.Agent.loa : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002572.dll -> Trojan.Lmir.bue : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0007708.dll -> Trojan.OnLineGames.luy : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032081.exe -> Trojan.OnLineGames.ryp : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032017.exe -> Trojan.OnLineGames.spx : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032020.exe -> Trojan.OnLineGames.spx : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032021.exe -> Trojan.OnLineGames.spx : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032038.dll -> Trojan.OnLineGames.tzj : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032039.exe -> Trojan.OnLineGames.tzm : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032088.dll -> Trojan.OnLineGames.uff : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032095.dll -> Trojan.OnLineGames.uff : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032132.dll -> Trojan.OnLineGames.uff : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032189.dll -> Trojan.OnLineGames.uff : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032198.dll -> Trojan.OnLineGames.uff : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032045.exe -> Trojan.OnLineGames.urz : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032041.dll -> Trojan.OnLineGames.uut : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032042.exe -> Trojan.OnLineGames.uut : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032043.exe -> Trojan.OnLineGames.uut : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002584.exe -> Trojan.OnLineGames.vlp : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP13\A0023830.DLL -> Trojan.OnLineGames.vpi : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0001010.DLL -> Trojan.OnLineGames.vpi : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002486.DLL -> Trojan.OnLineGames.vpi : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002621.DLL -> Trojan.OnLineGames.vpi : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032050.dll -> Trojan.OnLineGames.wff : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032051.exe -> Trojan.OnLineGames.wff : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032049.exe -> Trojan.OnLineGames.wgg : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032032.dll -> Trojan.OnLineGames.wkm : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032033.exe -> Trojan.OnLineGames.wkm : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032175.dll -> Trojan.OnLineGames.wkm : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002577.exe -> Trojan.OnLineGames.wpa : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032040.exe -> Trojan.OnLineGames.wpf : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002581.exe -> Trojan.OnLineGames.wpf : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP13\A0023833.dll -> Trojan.OnLineGames.xjn : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032026.dll -> Trojan.OnLineGames.xjn : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032124.dll -> Trojan.OnLineGames.xjn : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032172.dll -> Trojan.OnLineGames.xjn : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032202.dll -> Trojan.OnLineGames.xjn : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0001021.dll -> Trojan.OnLineGames.xjn : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002491.dll -> Trojan.OnLineGames.xjn : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002592.exe -> Trojan.OnLineGames.xjn : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002632.dll -> Trojan.OnLineGames.xjn : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032037.exe -> Trojan.OnLineGames.yjm : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032027.dll -> Trojan.OnLineGames.ylf : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032028.exe -> Trojan.OnLineGames.ylf : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032069.dll -> Trojan.OnLineGames.ymy : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032071.dll -> Trojan.OnLineGames.ymy : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032113.dll -> Trojan.OnLineGames.ymy : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032131.dll -> Trojan.OnLineGames.ymy : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032176.dll -> Trojan.OnLineGames.ymy : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032192.dll -> Trojan.OnLineGames.ymy : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032208.dll -> Trojan.OnLineGames.ymy : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0001024.dlL -> Trojan.OnLineGames.ymy : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002495.dlL -> Trojan.OnLineGames.ymy : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002635.dlL -> Trojan.OnLineGames.ymy : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002582.dll -> Trojan.OnLineGames.ynj : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032146.dll -> Trojan.OnLineGames.ypc : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032024.dll -> Trojan.OnLineGames.ype : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032126.dll -> Trojan.OnLineGames.yqu : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032138.dll -> Trojan.OnLineGames.yqu : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032193.dll -> Trojan.OnLineGames.yqu : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032194.dll -> Trojan.OnLineGames.yqu : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0001025.dll -> Trojan.OnLineGames.yqu : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002500.dll -> Trojan.OnLineGames.yqu : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002636.dll -> Trojan.OnLineGames.yqu : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032188.dll -> Trojan.OnLineGames.yrc : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032214.dll -> Trojan.OnLineGames.yrc : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0001023.dll -> Trojan.OnLineGames.yrc : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002493.dll -> Trojan.OnLineGames.yrc : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002634.dll -> Trojan.OnLineGames.yrc : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032074.dll -> Trojan.OnLineGames.yse : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032084.dll -> Trojan.OnLineGames.yse : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032137.dll -> Trojan.OnLineGames.yse : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032217.dll -> Trojan.OnLineGames.yse : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032218.dll -> Trojan.OnLineGames.yse : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0001020.dll -> Trojan.OnLineGames.yse : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002490.dll -> Trojan.OnLineGames.yse : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002576.exe -> Trojan.OnLineGames.yse : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002627.dll -> Trojan.OnLineGames.yse : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP13\A0023834.dll -> Trojan.OnLineGames.ysk : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002595.dll -> Trojan.OnLineGames.ysk : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002596.dll -> Trojan.OnLineGames.ysk : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002597.dll -> Trojan.OnLineGames.ysk : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032052.dll -> Trojan.OnLineGames.yte : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032053.exe -> Trojan.OnLineGames.yte : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002642.sys -> Trojan.OnLineGames.zcf : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032060.dll -> Trojan.OnLineGames.zdl : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032186.dll -> Trojan.OnLineGames.zdl : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0001026.dll -> Trojan.OnLineGames.zdl : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002501.dll -> Trojan.OnLineGames.zdl : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002637.dll -> Trojan.OnLineGames.zdl : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032025.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032057.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032064.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032067.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032072.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032080.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032085.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032086.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032089.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032090.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032092.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032096.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032097.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032101.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032106.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032107.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032110.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032112.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032116.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032117.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032119.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032129.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032133.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032134.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032135.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032140.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032145.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032153.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032156.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032157.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032160.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032161.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032162.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032163.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032165.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032168.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032177.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032179.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032181.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032182.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032185.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032187.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032195.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032197.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032201.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032203.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032207.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032209.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032212.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032216.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032221.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0001019.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002489.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002626.dll -> Trojan.OnLineGames.zdr : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032091.dll -> Trojan.OnLineGames.zdt : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0001013.dll -> Trojan.OnLineGames.zdt : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002488.dll -> Trojan.OnLineGames.zdt : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002624.dll -> Trojan.OnLineGames.zdt : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032019.exe -> Trojan.OnLineGames.zlj : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP22\A0032022.exe -> Trojan.QQPass.bmw : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002583.exe -> Trojan.QQPass.bmw : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0001014.exe -> Worm.Anilogo.f : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002497.exe -> Worm.Anilogo.f : Cleaned with backup (quarantined).
C:\System Volume Information\_restore{FD86AF43-0D67-440B-86DC-15E17E7491FC}\RP5\A0002629.exe -> Worm.Anilogo.f : Cleaned with backup (quarantined).


::Report end
  • 0

#25
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Much much better... :)

Now time for an online scan to be sure we didn't miss any.

First,

Please download ATF Cleaner by Atribune.
This program is for XP and Windows 2000 onlyDouble-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.
If you use Firefox browserClick Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browserClick Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
For Technical Support, double-click the e-mail address located at the bottom of each menu.

Next,

  • Make sure you have an Internet Connection.
  • Double-click OTMoveIt2.exe to run it. (Vista users, please right click on OTMoveit2.exe and select "Run as an Administrator")
  • Click on the CleanUp! button
  • A list of tool components used in the Cleanup of malware will be downloaded.
  • If your Firewall or Real Time protection attempts to block OtMoveit2 to reach the Internet, please allow the application to do so.
  • Click Yes to begin the Cleanup process and remove these components, including this application.
  • You will be asked to reboot the machine to finish the Cleanup process. If you are asked to reboot the machine choose Yes.

Finally,

Please go HERE to run Panda's ActiveScan
  • Once you are on the Panda site click the Scan your PC button
  • A new window will open...click the Check Now button
  • Enter your Country
  • Enter your State/Province
  • Enter your e-mail address and click send
  • Select either Home User or Company
  • Click the big Scan Now button
  • If it wants to install an ActiveX component allow it
  • It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
  • When download is complete, click on My Computer to start the scan
  • When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location. Post the contents of the ActiveScan report along with New HijackThis log

Edited by koko_crunch, 22 April 2008 - 04:25 AM.

  • 0

Advertisements


#26
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
****PLEASE REFER TO PREVIOUS POST****

Edited by koko_crunch, 22 April 2008 - 04:26 AM.
Double posted

  • 0

#27
zenapex

zenapex

    Member

  • Topic Starter
  • Member
  • PipPip
  • 14 posts
When I click on the link to Panda's ActiveScan it brings me to a site with an error. The error states "Server Error in '/CMSPANDA' Application."
  • 0

#28
koko_crunch

koko_crunch

    Trusted Helper

  • Retired Staff
  • 1,751 posts
Sorry for the delay. Been having network connection problems lately.

Let's try a different scanner instead.

Please do an online scan with Kaspersky WebScanner

Click on Accept

You will be promted to install an ActiveX component from Kaspersky, Click Yes.
  • The program will launch and then begin downloading the latest definition files:
  • Once the files have been downloaded click on NEXT
  • Now click on Scan Settings
  • In the scan settings make that the following are selected:
    • Scan using the following Anti-Virus database:
    Extended (if available otherwise Standard)
    • Scan Options:
    Scan Archives
    Scan Mail Bases
  • Click OK
  • Now under select a target to scan:Select My Computer
  • This will program will start and scan your system.
  • The scan will take a while so be patient and let it run.
  • Once the scan is complete it will display if your system has been infected.
    • Now click on the Save as Text button:
  • Save the file to your desktop.
  • Copy and paste that information in your next post.

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP