Jump to content

Welcome to Geeks to Go - Register now for FREE
Geeks To Go is a helpful hub, where thousands of friendly volunteers serve up answers and support. Get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more. This message and all ads will be removed once you have signed in.
Create an Account Login to Account

Computer running extremely slow [Solved]


  • This topic is locked This topic is locked

#1
Supergroomer

Supergroomer

    Member

  • Member
  • PipPip
  • 11 posts
Hello and thanks for being here. My desktop computer runs extremely slow. I found you because I was having trouble with my laptop and I thought you could help me with this computer also. I went through the malware removal guide and quite a number of things were picked up by Anti-Malware.

Here is the log:

Malwarebytes' Anti-Malware 1.36
Database version: 2168
Windows 5.1.2600 Service Pack 3

5/22/2009 9:04:56 PM
mbam-log-2009-05-22 (21-04-56).txt

Scan type: Quick Scan
Objects scanned: 92823
Time elapsed: 11 minute(s), 3 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 6
Registry Keys Infected: 13
Registry Values Infected: 3
Registry Data Items Infected: 1
Folders Infected: 1
Files Infected: 133

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\109.tmp (Worm.P2P) -> Delete on reboot.
C:\WINDOWS\system32\123.tmp (Worm.P2P) -> Delete on reboot.
C:\WINDOWS\system32\143.tmp (Worm.P2P) -> Delete on reboot.
C:\WINDOWS\system32\14F.tmp (Worm.P2P) -> Delete on reboot.
C:\WINDOWS\system32\15B.tmp (Worm.P2P) -> Delete on reboot.
C:\WINDOWS\system32\__c00F4EB0.dat (Trojan.Agent) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{85e0b171-04fa-11d1-b7da-00a0c90348a7} (Adware.SmartShopper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{5ed7d3de-6dbe-4516-8712-01b1b64b7057} (Adware.SmartShopper) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{bb05bd70-4605-4829-93fc-ad80d8cc5b66} (Rogue.PerformanceCenter) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{497dddb6-6eee-4561-9621-b77dc82c1f84} (Adware.Ascentive) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{4e980492-027b-47f1-a7ab-ab086dacbb9e} (Adware.Ascentive) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{5ead8321-fcbb-4c3f-888c-ac373d366c3f} (Adware.Ascentive) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{31f3cf6e-a71a-4daa-852b-39ac230940b4} (Adware.Ascentive) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{331cf7ad-4ff8-47f8-bbfb-04eed85c4652} (Adware.Ascentive) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{51c0946f-938e-4909-a128-8a2f688df31a} (Adware.Ascentive) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{f32d7d45-1750-48da-9cac-c6216972bb33} (Adware.Ascentive) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c00547ee (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c00f4eb0 (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\UpMedia (Adware.SmartShopper) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\WINDOWS\system32\SysRestore.dll (Adware.Ascentive) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\WINDOWS\system32\ConTest.dll (Adware.Ascentive) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kfedayapeva (Trojan.Agent) -> Delete on reboot.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: orylsvc.dll -> Delete on reboot.

Folders Infected:
C:\WINDOWS\system32\SystemService32 (Worm.Archive) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\orylsvc.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\109.tmp (Worm.P2P) -> Delete on reboot.
C:\WINDOWS\system32\123.tmp (Worm.P2P) -> Delete on reboot.
C:\WINDOWS\system32\143.tmp (Worm.P2P) -> Delete on reboot.
C:\WINDOWS\system32\14F.tmp (Worm.P2P) -> Delete on reboot.
C:\WINDOWS\system32\15B.tmp (Worm.P2P) -> Delete on reboot.
C:\Documents and Settings\Erica Huber\Local Settings\Temp\_A00F2A0CE0F5.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\1-fe5e180d56ed9c233080898276c260cc.exe (Adware.SmartShopper) -> Quarantined and deleted successfully.
C:\WINDOWS\MBDownloader_876932.exe (Adware.Mirar) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\116.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\117.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\120.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\124.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\12B.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\159.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\161.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\16C.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\17B.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\17D.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\65.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\96.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\C0.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\C1.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\C2.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\C3.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\C4.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\D3.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\D4.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\D5.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\D6.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\DA.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\F0.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\F7.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\FA.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SysRestore.dll (Adware.Ascentive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\B4.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\BA.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ConTest.dll (Adware.Ascentive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\E4.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\E8.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\E9.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\EB.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\EC.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ED.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\68.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\69.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\6A.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\6B.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\6C.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\6D.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\6E.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\71.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\72.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\73.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\7A.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\7B.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\7C.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\83.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\84.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\85.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\86.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\87.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\88.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\89.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\8A.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\8C.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\95.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\197.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\19E.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\19F.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\1A4.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\1CC.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\3F.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\4.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\43.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\44.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\45.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\46.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\47.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\48.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\49.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\4A.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\4F.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\50.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\56.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\57.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\58.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\59.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\5A.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\5B.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\5C.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\5F.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\61.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\62.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\63.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\64.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\DB.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\97.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\98.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\99.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\9A.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\A0.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\A2.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\A6.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\A9.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\AA.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\CE.tmp (Worm.P2P) -> Quarantined and deleted successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temp\_A00F1D845C0A.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temp\_A00F7530A7F.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temp\167.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temp\66.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temp\6E.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temp\72.tmp (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\149.crack.zip (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\149.crack.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\150.keygen.zip (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\150.keygen.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\151.serial.zip (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\151.serial.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\152.setup.zip (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\152.setup.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\153.music.au (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\153.music.au.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\154.music.mp3 (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\154.music.mp3.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\155.music.wma (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\155.music.wma.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\156.music.snd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SystemService32\156.music.snd.kwd (Worm.Archive) -> Quarantined and deleted successfully.
C:\WINDOWS\ikepesiq.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\__c00F4EB0.dat (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\__c004103.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Desktop\Spyware Striker Update.url (Rogue.Multiple) -> Quarantined and deleted successfully.

I have also installed a new version of Norton 360.

Any help would be appreciated.

Thanks

Supergroomer
  • 0

Advertisement


#2
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
hi

Download ComboFix from one of these locations:

Link 1
Link 2


* IMPORTANT !!! Save ComboFix.exe to your Desktop


  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you don't know how to disable them then just continue on.

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt log in your next reply.
  • 0

#3
Supergroomer

Supergroomer

    Member

  • Member
  • PipPip
  • 11 posts
Sorry to take so long. We were away for the weekend. Here is the combofix log:

ComboFix 09-05-22.07 - Erica Huber 05/25/2009 20:14.2 - NTFSx86
Running from: c:\documents and settings\Erica Huber\Desktop\ComboFix.exe
AV: Norton 360 *On-access scanning enabled* (Updated) {E10A9785-9598-4754-B552-92431C1C35F8}
FW: Norton 360 *enabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}
.

((((((((((((((((((((((((( Files Created from 2009-04-26 to 2009-05-26 )))))))))))))))))))))))))))))))
.

2009-05-25 15:11 . 2009-05-23 02:31 89104 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20090525.002\NAVENG.SYS
2009-05-25 15:11 . 2009-05-23 02:31 876144 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20090525.002\NAVEX15.SYS
2009-05-25 15:11 . 2009-05-23 02:31 371248 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20090525.002\EECTRL.SYS
2009-05-25 15:11 . 2009-05-23 02:31 101936 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20090525.002\ERASER.SYS
2009-05-25 15:11 . 2009-05-23 02:30 177520 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20090525.002\NAVENG32.DLL
2009-05-25 15:11 . 2009-05-23 02:30 1181040 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20090525.002\NAVEX32A.DLL
2009-05-25 15:11 . 2009-05-23 02:30 259368 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20090525.002\ECMSVR32.DLL
2009-05-25 15:11 . 2009-05-23 02:30 2414128 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20090525.002\CCERASER.DLL
2009-05-23 02:53 . 2009-03-16 20:03 533880 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20090513.001\Scxpx86.dll
2009-05-23 02:53 . 2009-05-23 02:31 276344 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20090513.001\IDSXpx86.sys
2009-05-23 02:53 . 2009-05-23 02:30 447864 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20090513.001\IDSxpx86.dll
2009-05-23 02:53 . 2009-05-23 02:31 292912 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20090513.001\IDSvix86.sys
2009-05-23 02:53 . 2009-05-23 02:31 396848 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20090513.001\IDSviA64.sys
2009-05-23 02:35 . 2009-01-15 16:19 23848 ----a-w c:\windows\system32\drivers\GEARAspiWDM.sys
2009-05-23 02:35 . 2008-04-17 16:12 107368 ----a-w c:\windows\system32\GEARAspi.dll
2009-05-23 02:34 . 2009-05-23 02:34 -------- d-----w c:\documents and settings\All Users\Application Data\{7B6BA59A-FB0E-4499-8536-A7420338BF3B}
2009-05-23 02:33 . 2009-05-23 02:33 -------- d-----w c:\documents and settings\Erica Huber\Local Settings\Application Data\Downloaded Installations
2009-05-23 02:32 . 2009-05-23 02:31 36400 ----a-r c:\windows\system32\drivers\SymIM.sys
2009-05-23 02:32 . 2009-05-23 02:32 60808 ----a-w c:\windows\system32\S32EVNT1.DLL
2009-05-23 02:32 . 2009-05-23 02:32 124464 ----a-w c:\windows\system32\drivers\SYMEVENT.SYS
2009-05-23 02:32 . 2009-05-23 02:42 -------- d-----w c:\program files\Common Files\Symantec Shared
2009-05-23 02:32 . 2009-05-23 02:32 -------- d-----w c:\program files\Symantec
2009-05-23 02:31 . 2009-05-23 02:31 276344 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\IDSxpx86.sys
2009-05-23 02:31 . 2009-05-23 02:31 292912 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\IDSvix86.sys
2009-05-23 02:31 . 2009-05-23 02:31 396848 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\IDSvia64.sys
2009-05-23 02:31 . 2009-05-23 02:31 1290592 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\SyKnAppS\SyKnAppS.dll
2009-05-23 02:30 . 2009-05-23 02:30 136840 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\SyKnAppS\patch25.dll
2009-05-23 02:30 . 2009-05-23 02:30 447864 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\idsxpx86.dll
2009-05-23 02:30 . 2009-05-23 02:30 796016 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\CLT\cltLMSx.dll
2009-05-23 02:30 . 2009-05-23 02:30 -------- d-----w c:\windows\system32\drivers\N360
2009-05-23 02:30 . 2009-05-23 12:45 -------- d-----w c:\documents and settings\All Users\Application Data\Symantec
2009-05-23 02:30 . 2009-05-23 02:30 -------- d-----w c:\program files\Norton 360
2009-05-23 02:30 . 2009-05-23 02:30 -------- d-----w c:\program files\Windows Sidebar
2009-05-23 02:29 . 2009-05-23 02:37 -------- d-----w c:\documents and settings\All Users\Application Data\Norton
2009-05-23 02:28 . 2009-05-23 02:29 -------- d-----w c:\documents and settings\All Users\Application Data\NortonInstaller
2009-05-23 02:28 . 2009-05-23 02:28 -------- d-----w c:\program files\NortonInstaller
2009-05-23 00:45 . 2009-05-23 00:45 -------- d-----w c:\documents and settings\Erica Huber\Application Data\Malwarebytes
2009-05-23 00:44 . 2009-04-06 19:32 15504 ----a-w c:\windows\system32\drivers\mbam.sys
2009-05-23 00:44 . 2009-04-06 19:32 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys
2009-05-23 00:44 . 2009-05-23 00:44 -------- d-----w c:\documents and settings\All Users\Application Data\Malwarebytes
2009-05-23 00:44 . 2009-05-23 00:45 -------- d-----w c:\program files\Malwarebytes' Anti-Malware
2009-05-13 07:03 . 2009-05-13 07:03 -------- d-----w c:\windows\system32\MpEngineStore
2009-05-10 03:43 . 2009-05-10 03:45 -------- d-----w c:\program files\Virtual Earth 3D

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-23 02:32 . 2009-05-23 02:32 805 ----a-w c:\windows\system32\drivers\SYMEVENT.INF
2009-05-23 02:32 . 2009-05-23 02:32 7386 ----a-w c:\windows\system32\drivers\SYMEVENT.CAT
2009-05-18 22:12 . 2007-06-24 19:52 -------- d-----w c:\documents and settings\Erica Huber\Application Data\LimeWire
2009-05-18 01:01 . 2007-06-24 19:50 -------- d-----w c:\program files\LimeWire
2009-04-16 18:46 . 2009-02-17 12:46 -------- d-----w c:\program files\Ascentive
2009-04-09 23:53 . 2008-05-15 01:17 -------- d-----w c:\program files\AOL 9.1
2009-03-16 20:03 . 2009-03-16 20:03 533880 ----a-w c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\BinHub\Scxpx86.dll
2009-03-06 14:22 . 2002-09-03 19:51 284160 ----a-w c:\windows\system32\pdh.dll
2009-03-03 00:18 . 2006-06-23 16:33 826368 ----a-w c:\windows\system32\wininet.dll
1998-12-09 02:53 . 1998-12-09 02:53 99840 -c--a-w c:\program files\Common Files\IRAABOUT.DLL
1998-12-09 02:53 . 1998-12-09 02:53 70144 -c--a-w c:\program files\Common Files\IRAMDMTR.DLL
1998-12-09 02:53 . 1998-12-09 02:53 48640 -c--a-w c:\program files\Common Files\IRALPTTR.DLL
1998-12-09 02:53 . 1998-12-09 02:53 31744 -c--a-w c:\program files\Common Files\IRAWEBTR.DLL
1998-12-09 02:53 . 1998-12-09 02:53 186368 -c--a-w c:\program files\Common Files\IRAREG.DLL
1998-12-09 02:53 . 1998-12-09 02:53 17920 -c--a-w c:\program files\Common Files\IRASRIAL.DLL
.

((((((((((((((((((((((((((((( SnapShot@2009-05-25_21.21.45 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-05-25 23:21 . 2009-05-25 23:21 16384 c:\windows\Temp\Perflib_Perfdata_16c.dat
+ 2009-05-25 23:21 . 2009-05-25 23:21 16384 c:\windows\Temp\Perflib_Perfdata_154.dat
- 2002-09-03 19:51 . 2009-04-17 18:50 71002 c:\windows\system32\perfc009.dat
+ 2002-09-03 19:51 . 2009-05-25 23:56 71002 c:\windows\system32\perfc009.dat
+ 2002-09-03 19:51 . 2009-05-25 23:56 440684 c:\windows\system32\perfh009.dat
- 2002-09-03 19:51 . 2009-04-17 18:50 440684 c:\windows\system32\perfh009.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\MSMSGS.EXE" [2008-04-14 1695232]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"Yahoo! Pager"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2007-07-16 4670704]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]
"H/PC Connection Agent"="c:\program files\Microsoft ActiveSync\wcescomm.exe" [2006-11-13 1289000]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-04-02 68856]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-01-26 2144088]
"Performance Center"="c:\program files\Ascentive\Performance Center\ApcMain.exe" [2008-08-13 3244032]
"PC SpeedScan Pro"="c:\program files\Ascentive\PC SpeedScan Pro\PCSpeedScan.exe" [2008-08-21 2093056]
"AOL Fast Start"="c:\program files\AOL 9.1\AOL.EXE" [2007-10-27 50528]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HostManager"="c:\program files\Common Files\AOL\1166985805\ee\AOLSoftware.exe" [2008-06-24 41824]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-12-23 136600]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2004-02-12 49152]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2004-05-12 241664]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-10-15 39792]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-11-04 413696]
"TraySantaCruz"="c:\windows\system32\tbctray.exe" [2002-04-03 290816]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2004-5-28 241664]
HP Image Zone Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2004-5-28 53248]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [1999-2-17 65588]
Symantec Fax Starter Edition Port.lnk - c:\program files\Microsoft Office\Office\1033\OLFSNT40.EXE [1998-12-23 45568]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\SymEFA.sys]
@="FSFilter Activity Monitor"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLacsd.exe"=
"c:\\Program Files\\AOL 9.0\\waol.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\Common Files\\AOL\\System Information\\sinf.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\3.0\\aoltpsd3.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Common Files\\AOL\\1166985805\\ee\\aolsoftware.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"c:\program files\Microsoft ActiveSync\rapimgr.exe"= c:\program files\Microsoft ActiveSync\rapimgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync RAPI Manager
"c:\program files\Microsoft ActiveSync\wcescomm.exe"= c:\program files\Microsoft ActiveSync\wcescomm.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Connection Manager
"c:\program files\Microsoft ActiveSync\WCESMgr.exe"= c:\program files\Microsoft ActiveSync\WCESMgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Application
"c:\\Program Files\\AOL 9.1\\waol.exe"=
"c:\\Program Files\\Microsoft Office\\Office\\1033\\WFXMSRVR.EXE"=
"c:\\Program Files\\Cyberlink\\PowerDirector\\PDR.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Documents and Settings\\Erica Huber\\Application Data\\Macromedia\\Flash Player\\www.macromedia.com\\bin\\octoshape\\octoshape.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"26675:TCP"= 26675:TCP:169.254.2.0/255.255.255.0:Enabled:ActiveSync Service
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\N360\0300000.087\SymEFA.sys [5/22/2009 10:31 PM 310320]
R1 BHDrvx86;Symantec Heuristics Driver;c:\windows\system32\drivers\N360\0300000.087\BHDrvx86.sys [5/22/2009 10:31 PM 258608]
R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\N360\0300000.087\cchpx86.sys [5/22/2009 10:31 PM 482352]
R1 IDSxpx86;IDSxpx86;c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\IPSDefs\20090513.001\IDSXpx86.sys [5/22/2009 10:53 PM 276344]
R2 N360;Norton 360;c:\program files\Norton 360\Engine\3.0.0.135\ccSvcHst.exe [5/22/2009 10:31 PM 115560]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [5/22/2009 10:55 PM 101936]
R3 tbcspud;Santa Cruz Driver;c:\windows\system32\drivers\tbcspud.sys [1/13/2007 10:06 PM 144768]
R3 tbcwdm;Santa Cruz WDM Driver;c:\windows\system32\drivers\tbcwdm.sys [1/13/2007 10:06 PM 545088]
.
Contents of the 'Scheduled Tasks' folder

2009-05-22 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 17:34]

2009-05-25 c:\windows\Tasks\RegCure Program Check.job
- c:\program files\RegCure\RegCure.exe [2008-04-21 21:21]

2009-05-21 c:\windows\Tasks\RegCure.job
- c:\program files\RegCure\RegCure.exe [2008-04-21 21:21]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.aol.com/?src=toolbar
mStart Page = hxxp://www.yahoo.com/
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
IE: &AOL Toolbar Search - c:\documents and settings\All Users\Application Data\AOL\ieToolbar\resources\en-US\local\search.html
Trusted Zone: turbotax.com
DPF: Armored Attack by pogo - hxxp://game1.pogo.com/applet-8.0.5.48/cctank/cctank-en_US.cab
DPF: Blooop by pogo - hxxp://game1.pogo.com/applet-8.0.5.48/cascade/cascade-en_US.cab
DPF: Command and Conquer Attack Copter by pogo - hxxp://game1.pogo.com/applet-8.0.5.48/ccstrike/ccstrike-en_US.cab
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Hog Heaven Slots by pogo - hxxp://game1.pogo.com/applet-8.0.5.48/fancy/fancy-en_US.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
DPF: Tank Hunter by pogo - hxxp://www.pogo.com/applet-8.0.5.48/tank/tank-en_US.cab
DPF: The Sims Pinball by pogo - hxxp://game1.pogo.com/applet-8.0.5.48/simball/simball-en_US.cab
DPF: Turbo 21 v2 by pogo - hxxp://game1.pogo.com/applet-8.0.5.48/turbo22/turbo22-en_US.cab
DPF: Word Whomp by pogo - hxxp://game1.pogo.com/applet-8.0.6.49/wordwhomp2/whomp2-en_US.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-25 20:22
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\N360]
"ImagePath"="\"c:\program files\Norton 360\Engine\3.0.0.135\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files\Norton 360\Engine\3.0.0.135\diMaster.dll\" /prefetch:1"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(3484)
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2009-05-26 20:30
ComboFix-quarantined-files.txt 2009-05-26 00:30
ComboFix2.txt 2009-05-25 21:30

Pre-Run: 155,338,498,048 bytes free
Post-Run: 155,317,760,000 bytes free

198 --- E O F --- 2009-05-13 07:04


Thanks

Supergroomer
  • 0

#4
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
hi

Please download OTMoveIt3 by OldTimer
  • Save it to your desktop.
  • Please double-click OTMoveIt3.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    :Processes
    explorer.exe
    
    :Services
    
    :Reg
    
    :Files
    c:\program files\Ascentive
    :Commands
    [purity]
    [emptytemp]
    [start explorer]
    [Reboot]
  • Return to OTMoveIt3, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTMoveIt3
Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.



Please download ATF Cleaner by Atribune.
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.
If you use Firefox browserClick Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browserClick Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.




Please download Malwarebytes' Anti-Malware from Here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.






Go to Kaspersky website and perform an online antivirus scan.

  • Read through the requirements and privacy statement and click on Accept button.
  • It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
  • When the downloads have finished, click on Settings.
  • Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
    • Spyware, Adware, Dialers, and other potentially dangerous programs
      Archives
      Mail databases
  • Click on My Computer under Scan.
  • Once the scan is complete, it will display the results. Click on View Scan Report.
  • You will see a list of infected items there. Click on Save Report As....
  • Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.

  • 0

#5
Supergroomer

Supergroomer

    Member

  • Member
  • PipPip
  • 11 posts
Here are the logs:


========== PROCESSES ==========
Process explorer.exe killed successfully.
========== SERVICES/DRIVERS ==========
========== REGISTRY ==========
========== FILES ==========
c:\program files\Ascentive\Performance Center moved successfully.
c:\program files\Ascentive\PC SpeedScan Pro moved successfully.
c:\program files\Ascentive moved successfully.
========== COMMANDS ==========
File delete failed. C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\Google Toolbar\gtbB3.tmp.exe scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\hpodvd09.log scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\WCESLog.log scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\~DF6255.tmp scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\~DFA0E4.tmp scheduled to be deleted on reboot.
User's Temp folder emptied.
User's Internet Explorer cache folder emptied.
File delete failed. C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\WV6ESRO9\Computer-running-extremely-slow-t239964[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\RU5T0UAW\data[1].xml scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\GU9AL3BK\iframe[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat scheduled to be deleted on reboot.
User's Temporary Internet Files folder emptied.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
Network Service Temp folder emptied.
File delete failed. C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Network Service Temporary Internet Files folder emptied.
File delete failed. C:\WINDOWS\temp\Google Toolbar\gtmB4.tmp scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\GoogleToolbarInstaller2.log scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\JETC69B.tmp scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_154.dat scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_16c.dat scheduled to be deleted on reboot.
Windows Temp folder emptied.
Java cache emptied.
Temp folders emptied.
Explorer started successfully

OTMoveIt3 by OldTimer - Version 1.0.11.0 log created on 05262009_071230

Files moved on Reboot...
File C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\Google Toolbar\gtbB3.tmp.exe not found!
C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\hpodvd09.log moved successfully.
C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\WCESLog.log moved successfully.
C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\~DF6255.tmp moved successfully.
C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\~DFA0E4.tmp moved successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\WV6ESRO9\Computer-running-extremely-slow-t239964[1].htm moved successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\RU5T0UAW\data[1].xml moved successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\GU9AL3BK\iframe[1].htm moved successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat moved successfully.
C:\WINDOWS\temp\Google Toolbar\gtmB4.tmp moved successfully.
C:\WINDOWS\temp\GoogleToolbarInstaller2.log moved successfully.
File C:\WINDOWS\temp\JETC69B.tmp not found!
File C:\WINDOWS\temp\Perflib_Perfdata_154.dat not found!
C:\WINDOWS\temp\Perflib_Perfdata_16c.dat moved successfully.



Malwarebytes' Anti-Malware 1.36
Database version: 2168
Windows 5.1.2600 Service Pack 3

5/27/2009 8:22:47 AM
mbam-log-2009-05-27 (08-22-47).txt

Scan type: Quick Scan
Objects scanned: 84582
Time elapsed: 15 minute(s), 51 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0 REPORT
Wednesday, May 27, 2009
Operating System: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Program database last update: Wednesday, May 27, 2009 21:26:51
Records in database: 2260575
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - Critical Areas:
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
C:\Documents and Settings\Erica Huber\Start Menu\Programs\Startup
C:\Program Files
C:\WINDOWS

Scan statistics:
Files scanned: 53330
Threat name: 2
Infected objects: 2
Suspicious objects: 0
Duration of the scan: 02:13:59


File name / Threat name / Threats count
C:\WINDOWS\$NtUninstallKB941644$\tcpip.sys Infected: Trojan.Win32.Patched.ad 1
C:\WINDOWS\distro_SelectRebatesSetup_um1001.exe Infected: Trojan-Spy.Win32.Agent.aan 1

The selected area was scanned.



Thanks again,

Supergroomer
  • 0

#6
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
hi

Please download OTMoveIt3 by OldTimer
  • Save it to your desktop.
  • Please double-click OTMoveIt3.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

    :Processes
    explorer.exe
    
    :Services
    
    :Reg
    
    :Files
    C:\WINDOWS\$NtUninstallKB941644$\tcpip.sys
    C:\WINDOWS\distro_SelectRebatesSetup_um1001.exe
    :Commands
    [purity]
    [emptytemp]
    [start explorer]
    [Reboot]
  • Return to OTMoveIt3, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTMoveIt3
Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.



CLICK HERE to download the HijackThis Installer:
  • Save HJTInstall.exe to your desktop.
  • Double-click on HJTInstall.exe to run the program.
  • By default it will install to C:\Program Files\Trend Micro\HijackThis.
  • Accept the license agreement by clicking the "I Accept" button.
  • Click on the "Do a system scan and save a log file" button. It will scan and then ask you to save the log.
  • Click "Save log" to save the log file and then the log will open in Notepad.
  • Click on "Edit -> Select All" then click on "Edit -> Copy" to copy the entire contents of the log.
  • Come back here to this thread and paste the log in your next reply.
  • Do NOT have HijackThis fix anything yet! Most of what it finds will be harmless or even required.

  • 0

#7
Supergroomer

Supergroomer

    Member

  • Member
  • PipPip
  • 11 posts
Here are the logs.

========== PROCESSES ==========
Process explorer.exe killed successfully.
========== SERVICES/DRIVERS ==========
========== REGISTRY ==========
========== FILES ==========
C:\WINDOWS\$NtUninstallKB941644$\tcpip.sys moved successfully.
C:\WINDOWS\distro_SelectRebatesSetup_um1001.exe moved successfully.
========== COMMANDS ==========
File delete failed. C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\hsperfdata_Erica Huber\3516 scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\hpodvd09.log scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\WCESLog.log scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\~DF82F.tmp scheduled to be deleted on reboot.
User's Temp folder emptied.
User's Internet Explorer cache folder emptied.
File delete failed. C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\ZDXS5HCV\tcode3[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\ZDXS5HCV\tcodewads_at[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\V9TAK1EX\iframe[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\HQVH4LXS\Computer-running-extremely-slow-t239964[1].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\HQVH4LXS\load_v6[4].htm scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
User's Temporary Internet Files folder emptied.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
Network Service Temp folder emptied.
File delete failed. C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Network Service Temporary Internet Files folder emptied.
File delete failed. C:\WINDOWS\temp\JETF02C.tmp scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_740.dat scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_758.dat scheduled to be deleted on reboot.
Windows Temp folder emptied.
Java cache emptied.
Temp folders emptied.
Explorer started successfully

OTMoveIt3 by OldTimer - Version 1.0.11.0 log created on 05282009_070539

Files moved on Reboot...
File C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\hsperfdata_Erica Huber\3516 not found!
File C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\hpodvd09.log not found!
File C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\WCESLog.log not found!
File C:\DOCUME~1\ERICAH~1\LOCALS~1\Temp\~DF82F.tmp not found!
C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\ZDXS5HCV\tcode3[1].htm moved successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\ZDXS5HCV\tcodewads_at[1].htm moved successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\V9TAK1EX\iframe[1].htm moved successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\HQVH4LXS\Computer-running-extremely-slow-t239964[1].htm moved successfully.
C:\Documents and Settings\Erica Huber\Local Settings\Temporary Internet Files\Content.IE5\HQVH4LXS\load_v6[4].htm moved successfully.
File C:\WINDOWS\temp\JETF02C.tmp not found!
File C:\WINDOWS\temp\Perflib_Perfdata_740.dat not found!
File C:\WINDOWS\temp\Perflib_Perfdata_758.dat not found!



Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:38:22 AM, on 5/28/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16827)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Documents and Settings\All Users\Application Data\EPSON\EPW!3 SSRP\E_S30RP1.EXE
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Norton 360\Engine\3.0.0.135\ccSvcHst.exe
C:\Program Files\Cyberlink\Shared files\RichVideo.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Norton 360\Engine\3.0.0.135\ccSvcHst.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\notepad.exe
C:\Program Files\Common Files\AOL\1166985805\ee\AOLSoftware.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
C:\WINDOWS\system32\tbctray.exe
C:\Program Files\Messenger\MSMSGS.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft ActiveSync\wcescomm.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\PROGRA~1\MICROS~4\rapimgr.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\AOL 9.1\waol.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Microsoft Office\Office\1033\OLFSNT40.EXE
C:\WINDOWS\System32\svchost.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgalry.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\MSN\Toolbar\3.0.0988.2\msntask.exe
c:\program files\aol toolbar\AolTbServer.exe
C:\Program Files\AOL 9.1\shellmon.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.c...rch/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.c...//www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
N3 - Netscape 7: # Mozilla User Preferences

/* Do not edit this file.
*
* If you make changes to this file while the browser is running,
* the changes will be overwritten when the browser exits.
*
* To make a manual change to preferences, you can visit the URL about:config
* For more information, see http://www.mozilla.o...zing.html#prefs
*/

user_pref("aim.session.finishedwizard", true);
user_pref("aim.session.firsttime", false);
user_pref("aim.session.latestaimscreenname", "supergroomer");
user_pref("aim.session.screenname", "supergroomer");
user_pref("browser.activation.checkedNNFlag", true);
user_pref("browser.bookmarks.added_static_root", true);
user_pref("browser.search.defaultengine", "engine://C%3A%5CProgram%20Files%5CNetscape%5CNetscape%5Csearchplugins%5CSBWeb_01.src");
user_pref("browser.startup.homepage_override.mstone", "rv:1.7.2");
user_pref("dom.disable_open_during_load", true);
user_pref("intl.charsetmenu.browser.cache", "UTF-8, ISO-8859-1");
user_pref("intl.charsetmenu.mail
O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\3.0.0.135\coIEPlg.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\3.0.0.135\IPSBHO.DLL
O2 - BHO: Java™ Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: AOL Toolbar Loader - {7C554162-8CB7-45A4-B8F4-8EA1C75885F9} - C:\Program Files\AOL Toolbar\aoltb.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.1.1309.3572\swg.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll
O2 - BHO: MSN Toolbar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: MSN Toolbar - {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - C:\Program Files\MSN\Toolbar\3.0.0988.2\msneshellx.dll
O3 - Toolbar: AOL Toolbar - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL Toolbar\aoltb.dll
O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\3.0.0.135\coIEPlg.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [HostManager] C:\Program Files\Common Files\AOL\1166985805\ee\AOLSoftware.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [YSearchProtection] "C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe"
O4 - HKLM\..\Run: [HP Software Update] "c:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [HP Component Manager] "C:\Program Files\HP\hpcoretech\hpcmpmgr.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TraySantaCruz] C:\WINDOWS\system32\tbctray.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\MSMSGS.EXE" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [YSearchProtection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
O4 - HKCU\..\Run: [H/PC Connection Agent] "C:\Program Files\Microsoft ActiveSync\wcescomm.exe"
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [Performance Center] C:\Program Files\Ascentive\Performance Center\ApcMain.exe -m
O4 - HKCU\..\Run: [PC SpeedScan Pro] C:\Program Files\Ascentive\PC SpeedScan Pro\PCSpeedScan.exe -m
O4 - HKCU\..\Run: [AOL Fast Start] "C:\Program Files\AOL 9.1\AOL.EXE" -b
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: HP Image Zone Fast Start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: Symantec Fax Starter Edition Port.lnk = C:\Program Files\Microsoft Office\Office\1033\OLFSNT40.EXE
O8 - Extra context menu item: &AOL Toolbar Search - C:\Documents and Settings\All Users\Application Data\AOL\ieToolbar\resources\en-US\local\search.html
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~4\INetRepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~4\INetRepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~4\INetRepl.dll
O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: Armored Attack by pogo - http://game1.pogo.co...ctank-en_US.cab
O16 - DPF: Blooop by pogo - http://game1.pogo.co...scade-en_US.cab
O16 - DPF: Command and Conquer Attack Copter by pogo - http://game1.pogo.co...trike-en_US.cab
O16 - DPF: Hog Heaven Slots by pogo - http://game1.pogo.co...fancy-en_US.cab
O16 - DPF: Tank Hunter by pogo - http://www.pogo.com/.../tank-en_US.cab
O16 - DPF: The Sims Pinball by pogo - http://game1.pogo.co...mball-en_US.cab
O16 - DPF: Turbo 21 v2 by pogo - http://game1.pogo.co...rbo22-en_US.cab
O16 - DPF: Word Whomp by pogo - http://game1.pogo.co...homp2-en_US.cab
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://appldnld.appl...ex/qtplugin.cab
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebo...toUploader5.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.micros...b?1166986460304
O16 - DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} (HP Download Manager) - https://h20436.www2....re/HPDEXAXO.cab
O18 - Protocol: symres - {AA1061FE-6C41-421F-9344-69640C9732AB} - C:\Program Files\Norton 360\Engine\3.0.0.135\coIEPlg.dll
O18 - Filter: x-sdch - {B1759355-3EEC-4C1E-B0F1-B719FE26E377} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_A8904FB862BD9564.dll
O23 - Service: AOL Connectivity Service (AOL ACS) - AOL LLC - C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: EPSON V3 Service4(01) (EPSON_PM_RPCV4_01) - SEIKO EPSON CORPORATION - C:\Documents and Settings\All Users\Application Data\EPSON\EPW!3 SSRP\E_S30RP1.EXE
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\3.0.0.135\ccSvcHst.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\Cyberlink\Shared files\RichVideo.exe

--
End of file - 12995 bytes


Thanks

Supergroomer
  • 0

#8
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
Your logs are clean


Follow these steps to uninstall Combofix and tools used in the removal of malware
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK. Note the space between the X and the U, it needs to be there.
    Posted Image



  • Download OTC to your desktop and run it
  • Click Yes to beginning the Cleanup process and remove these components, including this application.
  • You will be asked to reboot the machine to finish the Cleanup process. Choose Yes.




Your using an old version of Adobe Acrobat Reader, this can leave your pc open to vulnerabilities, you can update it here :
http://www.adobe.com.../readstep2.html



Below I have included a number of recommendations for how to protect your computer against malware infections.
  • Keep Windows updated by regularly checking their website at :
    http://windowsupdate.microsoft.com/
    This will ensure your computer has always the latest security updates available installed on your computer.

  • SpywareBlaster protects against bad ActiveX, it immunizes your PC against them.

  • SpywareGuard offers realtime protection from spyware installation attempts. Make sure you are only running one real-time anti-spyware protection program ( eg : TeaTimer, Windows Defender ) or there will be a conflict.

  • Make Internet Explorer more secure
    • Click Start > Run
    • Type Inetcpl.cpl & click OK
    • Click on the Security tab
    • Click Reset all zones to default level
    • Make sure the Internet Zone is selected & Click Custom level
    • In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
    • Next Click OK, then Apply button and then OK to exit the Internet Properties page.
  • ATF Cleaner - Cleans temporary files from IE and Windows, empties the recycle bin and more. Great tool to help speed up your computer and knock out those nasties that like to reside in the temp folders.

  • MVPS Hosts file replaces your current HOSTS file with one containing well known ad sites and other bad sites. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer, meaning it will be difficult to infect yourself in the future.

  • Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more
    secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in pop up
    blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from
    Here


    If you choose to use Firefox, I highly recommend these add-ons to keep your PC even more secure.
    • NoScript - for blocking ads and other potential website attacks
    • McAfee SiteAdvisor - this tells you whether the sites you are about to visit are safe or not. A must if you do a lot of Googling

  • Keep a backup of your important files - Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.

  • ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.

  • FileHippo Update Checker is an extremely helpful program that will tell you which of your programs need to be updated. Its important to keep programs up to date so that malware doesn't exploit any old security flaws.

  • Recovery Console - Recent trends appear to indicate that future infections will include attacks to the boot sector of the computer. The installation of the Recovery Console in the computer will be our only defense against this threat. For more information and steps to install the Recovery Console see This Article. Should you need assistance in installing the Recovery Console, please do not hesitate to ask.

  • Please read my guide on how to prevent malware and about safe computing here
Thank you for your patience, and performing all of the procedures requested.
  • 0

#9
Rorschach112

Rorschach112

    Ralphie

  • Retired Staff
  • 47,710 posts
Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. :)

If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else please begin a New Topic.
  • 0

Advertisement




Similar Topics: Computer running extremely slow [Solved]     x


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

featured