Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

PC hijacked by "Antivir Solution", can't do anything


  • This topic is locked This topic is locked

#31
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Please download Malwarebytes' Anti-Malware from Here.

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatley.
=================
* Go here to run an online scannner from ESET.
  • Note: You will need to use Internet explorer for this scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activex control to install
  • Click Start
  • Check next options: Remove found threats and Scan unwanted applications.
  • Click Scan
  • Wait for the scan to finish
  • Use notepad to open the logfile located at C:\Program Files\ESET\ESET Online Scanner\log.txt
  • Copy and paste that log as a reply to this topic

  • 0

Advertisements


#32
Capriboy

Capriboy

    Member

  • Topic Starter
  • Member
  • PipPip
  • 65 posts
Here's the results of Malwarebytes scan and ESET scan


Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4374

Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

7/31/2010 10:20:05 AM
mbam-log-2010-07-31 (10-20-05).txt

Scan type: Quick scan
Objects scanned: 138991
Time elapsed: 7 minute(s), 21 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 8

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{04a38f6b-006f-4247-ba4c-02a139d5531c} (Adware.Minibug) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\hafgkore.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hocyyovo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qfluatni.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\syfrpcdf.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rcclkwmh.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sgidstgn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nddeublp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fcccdcy.dll (Trojan.Vundo) -> Quarantined and deleted successfully.



ESETSmartInstaller@High as CAB hook log:
OnlineScanner.ocx - registred OK
# version=7
# IEXPLORE.EXE=6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
# OnlineScanner.ocx=1.0.0.6211
# api_version=3.0.2
# EOSSerial=ef77daa8b804e64881a8a0316a11309b
# end=finished
# remove_checked=true
# archives_checked=false
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=false
# utc_time=2010-07-31 06:49:23
# local_time=2010-07-31 11:49:23 (-0800, Pacific Daylight Time)
# country="United States"
# lang=9
# osver=5.1.2600 NT Service Pack 2
# compatibility_mode=3586 16764889 100 90 82492442 283814277 0 0
# compatibility_mode=6143 16777215 0 0 0 0 0 0
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=121878
# found=98
# cleaned=98
# scan_time=4414
C:\Maxon\PANTHEON\keygen.exe probably a variant of Win32/Spy.Agent trojan (cleaned by deleting - quarantined) 4340753017776CCDBE20509DA6FD58B3 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\ahgvraob.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 3D90E250F649E4B544BEDD490E93EFE4 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\ajvukqbk.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 189FDD665CCC5D29A3F706DDDE314986 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\bbeeg.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 253B5D50FB0DE5AA13E1C845E0ACAC5A C
C:\Qoobox\Quarantine\C\WINDOWS\system32\bbeeg.ini2.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 253B5D50FB0DE5AA13E1C845E0ACAC5A C
C:\Qoobox\Quarantine\C\WINDOWS\system32\bpsxidhb.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 723F210E3C23F8EB56BCBBC629B9C35A C
C:\Qoobox\Quarantine\C\WINDOWS\system32\bylpxlqu.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 13EC867AC66B9C8FEDED609EEEF6878B C
C:\Qoobox\Quarantine\C\WINDOWS\system32\ckuesngi.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) AE2245B0F337EA2F076FC99CDF731B6A C
C:\Qoobox\Quarantine\C\WINDOWS\system32\dwhcykwq.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) D7BF92881639DA228DCACF33C3684065 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\fboywlwa.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 3F46FC239DDF4EC4A233B61229F7E974 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\ffhkj.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) E30C8A63A108514F0EF1FBEC14784244 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\ffhkj.ini2.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) E30C8A63A108514F0EF1FBEC14784244 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\fjofqbkn.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 77E8C9971F6B2B894B958D5AFD7ACF0C C
C:\Qoobox\Quarantine\C\WINDOWS\system32\fjrngroe.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) DD8819AD7E71497F0D47BA95D374DB78 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\gjkkj.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 4DEF77CAA152745DC5FD99C071E997D1 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\ihhkj.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 288D2361321D7BA43370B38CBC04117A C
C:\Qoobox\Quarantine\C\WINDOWS\system32\ihhkj.ini2.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 288D2361321D7BA43370B38CBC04117A C
C:\Qoobox\Quarantine\C\WINDOWS\system32\iwnxjltg.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 5D7AB553FD554DADCAB33EBA7227361B C
C:\Qoobox\Quarantine\C\WINDOWS\system32\iyptylic.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 24E4D7D90347F1397671A8A20031B74D C
C:\Qoobox\Quarantine\C\WINDOWS\system32\jipjgsxy.dll.vir Win32/Adware.Virtumonde application (cleaned by deleting - quarantined) C5C5B7F0E5B609B833C05BDA5C5E33CA C
C:\Qoobox\Quarantine\C\WINDOWS\system32\jjllm.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) E174C2817BFD6A2A96A954EDAC088969 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\jjllm.ini2.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 2ED1A88F42C61191966EF4DC8A20D841 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\jnntidnj.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 530B48787396C70D65939CA526C52AA5 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\kaolqfvj.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 3953DEF4459F3564D6E77EC4C82C6849 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\masnwbgc.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 6290ADEFE5389849C60F0C6F2C804C18 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\mdmgxqif.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) C8A5C5FEB5141064A23984A5E8536E38 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\mmeirutr.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 5909A7E295DCBE4841253CE39D869D42 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\nfnisqnn.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 98F849E11C1CD41306567D3F241FF6B0 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\nqstv.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 799813DC046DD3FC0BE5624E9DC39CA1 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\nqstv.ini2.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 00C9E4B250C6A6DF5C41C2663AAFED30 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\pgqvtvqu.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 71E048DF0AE8DD3DFC216C6538FB85FF C
C:\Qoobox\Quarantine\C\WINDOWS\system32\udlniklw.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 09284CD4FEB55989D6ECDA83F4E215CF C
C:\Qoobox\Quarantine\C\WINDOWS\system32\vwuaritl.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 1DD29B06ACE6B6496F43BF8F6A634A63 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\xcppvulo.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) C9EEB935A9974E38B018B7C3E2245ADF C
C:\Qoobox\Quarantine\C\WINDOWS\system32\ycsprmsf.dll.vir a variant of Win32/Adware.Virtumonde.NAG application (cleaned by deleting - quarantined) FB5A537A20F8A69DD2B848F5139514AD C
C:\Qoobox\Quarantine\C\WINDOWS\system32\yxsgjpij.ini.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) ED9F53EC4C7B203F1322988F9373B0BE C
C:\Qoobox\Quarantine\C\WINDOWS\system32\yxsgjpij.ini2.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) E8AA540935CA4B482FA68870C4C8F091 C
C:\Qoobox\Quarantine\C\WINDOWS\system32\yxsgjpij.tmp.vir Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) ED9F53EC4C7B203F1322988F9373B0BE C
C:\Qoobox\Quarantine\C\w.exe.vir a variant of Win32/TrojanDownloader.Small.AMB trojan (cleaned by deleting - quarantined) C14753A1764F9E0957CCEAFBA431E44B C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP627\A0081611.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 0C282DB4EA61048D61AD4CC30EFFDEF4 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP628\A0081623.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 0565331BDCBABD3ED4DA744F1511DDBC C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP628\A0081632.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 7DE20F31685430D328346BB290E87FB5 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP628\A0082634.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 1E0BAAA23A4DE56DB243306182A52810 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP629\A0082639.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 20D9B6A7682E36BB02BCBA01CC78BB36 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP629\A0082645.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 868C0D7B4C7D36FF40522D131FA758EB C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP630\A0082648.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 7BB82DB96E7890450E36DEC041BECD6D C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP631\A0082657.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 9ACA28E454FCA8A18E08180EEC3AAAD8 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP631\A0082677.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 379A8F160547FE170CCB841EDEBD3E1E C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP632\A0082679.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) EFEBD7F53173918748336B9901535489 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP632\A0082693.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 2D1FB8A12FD8B7C5CF144E258F91B44F C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP633\A0083701.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 1A21D397F466619FB8E541AE38E9BAF9 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP633\A0083727.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) CEE26575D8AFAC15198F5FF706343E82 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP633\A0083734.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) CEE26575D8AFAC15198F5FF706343E82 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP633\A0084734.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 6F55945D16839CD57BFD3314ED5846D5 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP634\A0084742.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) D7F59C7A0F15F8160E1E434176F63118 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP635\A0084749.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 11D7E50E25CEDAA486B8EEA09C533390 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP636\A0084876.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 85E397A58AC25A9EC034ADAB0B40699E C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085124.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 113EB87571D013C05A7CA5D1BC1EA982 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085140.exe a variant of Win32/TrojanDownloader.Small.AMB trojan (cleaned by deleting - quarantined) C14753A1764F9E0957CCEAFBA431E44B C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085143.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 3D90E250F649E4B544BEDD490E93EFE4 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085144.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 189FDD665CCC5D29A3F706DDDE314986 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085145.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 253B5D50FB0DE5AA13E1C845E0ACAC5A C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085146.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 723F210E3C23F8EB56BCBBC629B9C35A C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085147.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 13EC867AC66B9C8FEDED609EEEF6878B C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085148.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) AE2245B0F337EA2F076FC99CDF731B6A C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085149.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) D7BF92881639DA228DCACF33C3684065 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085150.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 3F46FC239DDF4EC4A233B61229F7E974 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085151.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 77E8C9971F6B2B894B958D5AFD7ACF0C C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085152.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) DD8819AD7E71497F0D47BA95D374DB78 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085153.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 4DEF77CAA152745DC5FD99C071E997D1 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085154.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 288D2361321D7BA43370B38CBC04117A C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085155.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 5D7AB553FD554DADCAB33EBA7227361B C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085156.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 24E4D7D90347F1397671A8A20031B74D C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085157.dll Win32/Adware.Virtumonde application (cleaned by deleting - quarantined) C5C5B7F0E5B609B833C05BDA5C5E33CA C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085158.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) E174C2817BFD6A2A96A954EDAC088969 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085159.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 530B48787396C70D65939CA526C52AA5 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085160.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 3953DEF4459F3564D6E77EC4C82C6849 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085161.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 6290ADEFE5389849C60F0C6F2C804C18 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085162.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) C8A5C5FEB5141064A23984A5E8536E38 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085163.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 5909A7E295DCBE4841253CE39D869D42 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085164.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 98F849E11C1CD41306567D3F241FF6B0 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085165.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 799813DC046DD3FC0BE5624E9DC39CA1 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085166.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 71E048DF0AE8DD3DFC216C6538FB85FF C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085167.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 09284CD4FEB55989D6ECDA83F4E215CF C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085168.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 1DD29B06ACE6B6496F43BF8F6A634A63 C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085169.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) C9EEB935A9974E38B018B7C3E2245ADF C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085170.dll a variant of Win32/Adware.Virtumonde.NAG application (cleaned by deleting - quarantined) FB5A537A20F8A69DD2B848F5139514AD C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085171.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) ED9F53EC4C7B203F1322988F9373B0BE C
C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085311.exe probably a variant of Win32/Spy.Agent trojan (cleaned by deleting - quarantined) 4340753017776CCDBE20509DA6FD58B3 C
C:\WINDOWS\system32\anxsceih.exe Win32/Adware.Ezula application (cleaned by deleting - quarantined) 064243C39197AE834E7AA586442225E1 C
C:\WINDOWS\system32\bbypgmsv.exe Win32/Adware.Ezula application (cleaned by deleting - quarantined) 064243C39197AE834E7AA586442225E1 C
C:\WINDOWS\system32\femcowta.exe Win32/Adware.Ezula application (cleaned by deleting - quarantined) 064243C39197AE834E7AA586442225E1 C
C:\WINDOWS\system32\hknktyaf.exe Win32/Adware.Ezula application (cleaned by deleting - quarantined) 064243C39197AE834E7AA586442225E1 C
C:\WINDOWS\system32\odhpdahg.exe Win32/Adware.Ezula application (cleaned by deleting - quarantined) 064243C39197AE834E7AA586442225E1 C
C:\WINDOWS\system32\oyxjkcdm.exe Win32/Adware.Ezula application (cleaned by deleting - quarantined) 064243C39197AE834E7AA586442225E1 C
C:\WINDOWS\system32\qnhpgplv.exe Win32/Adware.Ezula application (cleaned by deleting - quarantined) 064243C39197AE834E7AA586442225E1 C
C:\WINDOWS\system32\ruawinyb.exe Win32/Adware.Ezula application (cleaned by deleting - quarantined) 064243C39197AE834E7AA586442225E1 C
C:\WINDOWS\system32\xirxwgyh.exe Win32/Adware.Ezula application (cleaned by deleting - quarantined) 064243C39197AE834E7AA586442225E1 C
  • 0

#33
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
You had a lot of spyware on there.
I would like for you to run one more scanner to ensure it is clean.
Please do a scan with Kaspersky Online Scanner

Note: If you are using Windows Vista, open your browser by right-clicking on its icon and select 'Run as administrator' to perform this scan.

Click on the Accept button and install any components it needs.
  • The program will install and then begin downloading the latest definition files.
  • After the files have been downloaded on the left side of the page in the Scan section select My Computer
  • This will start the program and scan your system.
  • The scan will take a while, so be patient and let it run.
  • Once the scan is complete, click on View scan report
  • Now, click on the Save Report as button.
  • Save the file to your desktop.
  • Copy and paste that information in your next post.

  • 0

#34
Capriboy

Capriboy

    Member

  • Topic Starter
  • Member
  • PipPip
  • 65 posts
Unfortunately, the Kapersky scan won't open. The page comes up with a warning that it may not be able to run if there is any other antivirus running, so I uninstalled Norton (don't like it anyway) and disabled Windows Defender but it still won't run. After the initial opening of the page it goes away after about 30 seconds and a blank web page with the error message "404 Not Found" comes up. There is also some small text that says "nginx/0.8.15".
  • 0

#35
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Try this one instead.

Please click here to download Kaspersky Virus Removal Tool.

  • Double click on the file you just downloaded and let it install.
  • It will install to your desktop.
  • After that leave what is selected and put a check next to My Computer.
  • Click on the option that says Threat Detection and change it to Disinfect,delete if disinfection fails.
  • Then click on Start Scan.
  • Before it is done it may prompt for action regardless of the setting so choose delete if prompted.
  • When the scan is done no log will be produced.
  • Click on the bottom where it says Report to open the report.
  • Then highlight of of the items found by using ctrl + a on your keyboard to select all or use your mouse to select all then right click and choose copy.
  • This will copy the items that it found to the clipboard you can then open notepad (go to start then run then type in notepad) and choose paste to paste the contents into Notepad.
  • You can save this on the desktop.
  • Post the contents of the document in your next reply.

Note: This tool will self uninstall when you close it so please save the log before closing it.


  • 0

#36
Capriboy

Capriboy

    Member

  • Topic Starter
  • Member
  • PipPip
  • 65 posts
Here's the results of the Kapersky scan


Autoscan: completed 31 minutes ago (events: 30, objects: 324815, time: 01:30:59)
8/1/2010 1:04:30 PM Task started
8/1/2010 2:07:12 PM Detected: Trojan.Win32.Monder.gen C:\Qoobox\Quarantine\C\WINDOWS\system32\_jkhff_.dll.zip/jkhff.dll
8/1/2010 2:07:13 PM Detected: Packed.Win32.Krap.hc C:\Qoobox\Quarantine\C\WINDOWS\system32\jkhff.dll.vir
8/1/2010 2:07:15 PM Deleted: Trojan.Win32.Monder.gen C:\Qoobox\Quarantine\C\WINDOWS\system32\_jkhff_.dll.zip/jkhff.dll
8/1/2010 2:08:10 PM Detected: HEUR:Trojan.Win32.KillFiles C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP635\A0084824.exe/WISE0011.BIN
8/1/2010 2:08:28 PM Deleted: Packed.Win32.Krap.hc C:\Qoobox\Quarantine\C\WINDOWS\system32\jkhff.dll.vir
8/1/2010 2:08:54 PM Detected: HEUR:Trojan.Win32.KillFiles C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP636\A0084964.exe/WISE0011.BIN
8/1/2010 2:09:29 PM Detected: Packed.Win32.Krap.hc C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085178.dll
8/1/2010 2:09:41 PM Detected: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085313.exe
8/1/2010 2:09:42 PM Detected: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085314.exe
8/1/2010 2:09:49 PM Deleted: Packed.Win32.Krap.hc C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP637\A0085178.dll
8/1/2010 2:09:49 PM Detected: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085315.exe
8/1/2010 2:09:49 PM Deleted: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085313.exe
8/1/2010 2:09:49 PM Detected: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085316.exe
8/1/2010 2:09:49 PM Deleted: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085314.exe
8/1/2010 2:09:50 PM Detected: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085317.exe
8/1/2010 2:09:50 PM Deleted: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085315.exe
8/1/2010 2:09:50 PM Deleted: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085316.exe
8/1/2010 2:09:50 PM Detected: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085318.exe
8/1/2010 2:09:50 PM Detected: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085319.exe
8/1/2010 2:09:50 PM Deleted: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085317.exe
8/1/2010 2:09:50 PM Detected: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085320.exe
8/1/2010 2:09:50 PM Deleted: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085318.exe
8/1/2010 2:09:50 PM Detected: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085321.exe
8/1/2010 2:09:50 PM Deleted: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085319.exe
8/1/2010 2:09:51 PM Deleted: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085320.exe
8/1/2010 2:09:51 PM Deleted: Trojan-Downloader.Win32.Agent.gwe C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP638\A0085321.exe
8/1/2010 2:11:29 PM Detected: Worm.VBS.Autorun.fz C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP642\A0087070.vbs/CryptFF
8/1/2010 2:12:00 PM Deleted: Worm.VBS.Autorun.fz C:\System Volume Information\_restore{C71C9309-87D6-422E-9706-6CC859717BE9}\RP642\A0087070.vbs
8/1/2010 2:35:29 PM Task completed
  • 0

#37
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Looks good how are things running?
  • Double click on OTL to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • Under the Standard Registry box change it to All.
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
  • When the scan completes, it will open one notepad window. OTL.Txt a This is saved in the same location as OTL.
  • Please copy (Edit->Select All, Edit->Copy) the contents of this file and post it with your next reply.

  • 0

#38
Capriboy

Capriboy

    Member

  • Topic Starter
  • Member
  • PipPip
  • 65 posts
Good morning Kahdah,

The computer is running real well, much improved. It got pretty badly infected 2 or 3 years ago so I haven't had it hooked to the internet since then. I've used it for some specific programs which worked okay most of the time, but it would have a tendency to hang up from time to time. Hopefully this restores it to maximum efficiency.

Here's the OTL

OTL logfile created on: 8/2/2010 7:03:48 AM - Run 3
OTL by OldTimer - Version 3.2.9.1 Folder = C:\Documents and Settings\Luis Ramentas\Desktop
Windows XP Professional Edition Service Pack 2 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

1,023.00 Mb Total Physical Memory | 612.00 Mb Available Physical Memory | 60.00% Memory free
2.00 Gb Paging File | 1.00 Gb Available in Paging File | 82.00% Paging File free
Paging file location(s): C:\pagefile.sys 768 1536 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 70.61 Gb Total Space | 16.45 Gb Free Space | 23.29% Space Free | Partition Type: NTFS
Drive D: | 465.75 Gb Total Space | 35.91 Gb Free Space | 7.71% Space Free | Partition Type: NTFS
Drive E: | 223.58 Gb Total Space | 19.53 Gb Free Space | 8.73% Space Free | Partition Type: NTFS
Drive F: | 7.45 Gb Total Space | 2.27 Gb Free Space | 30.43% Space Free | Partition Type: FAT32
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: LUISAVID
Current User Name: Luis Ramentas
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: Current user
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Minimal

========== Processes (SafeList) ==========

PRC - C:\Documents and Settings\Luis Ramentas\Desktop\OTL.exe (OldTimer Tools)
PRC - C:\WINDOWS\explorer.exe (Microsoft Corporation)
PRC - C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe (Google Inc.)
PRC - C:\WINDOWS\system32\AvidSDMService.exe (Avid Technology, Inc.)
PRC - C:\Program Files\Windows Defender\MSASCui.exe (Microsoft Corporation)
PRC - C:\Program Files\Windows Defender\MsMpEng.exe (Microsoft Corporation)
PRC - C:\Program Files\Digidesign\Drivers\MMERefresh.exe (Digidesign, A Division of Avid Technology, Inc.)
PRC - C:\Program Files\Common Files\Real\Update_OB\realsched.exe (RealNetworks, Inc.)
PRC - C:\Program Files\ewido\security suite\ewidoctrl.exe (ewido networks)
PRC - C:\Program Files\Belkin\Belkin Wireless Network Utility\WLanCfgG.exe ()
PRC - C:\Program Files\Alias\Maya7.0\docs\wrapper.exe ()
PRC - C:\Program Files\Alias\Maya7.0\docs\jre\bin\java.exe ()
PRC - C:\Program Files\Belkin\Belkin Wireless Network Utility\WLService.exe ()
PRC - C:\Program Files\CDBurnerXP Pro 3\Tools\NMSAccess.exe ()
PRC - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe (Analog Devices, Inc.)
PRC - C:\Program Files\Analog Devices\SoundMAX\SMTray.exe (Analog Devices, Inc.)
PRC - C:\Program Files\ACK-270U\MMKEYBD.EXE (Dritek System Inc.)
PRC - C:\Program Files\Adobe\Acrobat 4.0\Distillr\AcroTray.exe ()


========== Modules (SafeList) ==========

MOD - C:\Documents and Settings\Luis Ramentas\Desktop\OTL.exe (OldTimer Tools)
MOD - C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll (Microsoft Corporation)
MOD - C:\WINDOWS\system32\msscript.ocx (Microsoft Corporation)


========== Win32 Services (SafeList) ==========

SRV - (AvidStartup) -- C:\WINDOWS\System32\AvidStartup.exe File not found
SRV - (AvidSDMService) -- C:\WINDOWS\system32\AvidSDMService.exe (Avid Technology, Inc.)
SRV - (WinDefend) -- C:\Program Files\Windows Defender\MsMpEng.exe (Microsoft Corporation)
SRV - (Pml Driver HPZ12) -- C:\WINDOWS\system32\HPZipm12.exe (HP)
SRV - (DigiRefresh) -- C:\Program Files\Digidesign\Drivers\MMERefresh.exe (Digidesign, A Division of Avid Technology, Inc.)
SRV - (ewido security suite guard) -- C:\Program Files\ewido\security suite\ewidoguard.exe (ewido networks)
SRV - (ewido security suite control) -- C:\Program Files\ewido\security suite\ewidoctrl.exe (ewido networks)
SRV - (maya70docserver) -- C:\Program Files\Alias\Maya7.0\docs\wrapper.exe ()
SRV - (Belkin 54g Wireless USB Network Adapter Service) -- C:\Program Files\Belkin\Belkin Wireless Network Utility\WLService.exe ()
SRV - (NMSAccess) -- C:\Program Files\CDBurnerXP Pro 3\Tools\NMSAccess.exe ()
SRV - (SoundMAX Agent Service (default)) -- C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe (Analog Devices, Inc.)


========== Driver Services (SafeList) ==========

DRV - (DS1410D) -- C:\WINDOWS\System32\drivers\DS1410D.SYS File not found
DRV - (catchme) -- C:\DOCUME~1\LUISRA~1\LOCALS~1\Temp\catchme.sys File not found
DRV - (Serial) -- C:\WINDOWS\system32\drivers\AvidXPSerial.sys ()
DRV - (Aspi32) -- C:\WINDOWS\System32\drivers\aspi32.sys (Adaptec)
DRV - (Flamethrower) -- C:\WINDOWS\system32\drivers\Flamethrower.sys (Avid Technology, Inc.)
DRV - (nv) -- C:\WINDOWS\system32\drivers\nv4_mini.sys (NVIDIA Corporation)
DRV - (Sentinel) -- C:\WINDOWS\System32\Drivers\SENTINEL.SYS (SafeNet, Inc.)
DRV - (SNTNLUSB) -- C:\WINDOWS\system32\drivers\SNTNLUSB.SYS (SafeNet, Inc.)
DRV - (TPkd) -- C:\WINDOWS\System32\drivers\TPkd.sys (PACE Anti-Piracy, Inc.)
DRV - (hardlock) -- C:\WINDOWS\system32\drivers\hardlock.sys (Aladdin Knowledge Systems)
DRV - (Haspnt) -- C:\WINDOWS\system32\drivers\Haspnt.sys (Aladdin Knowledge Systems)
DRV - (ewido security suite driver) -- C:\Program Files\ewido\security suite\guard.sys ()
DRV - (61883) -- C:\WINDOWS\system32\drivers\61883.sys (Microsoft Corporation)
DRV - (Avc) -- C:\WINDOWS\system32\drivers\avc.sys (Microsoft Corporation)
DRV - (MSDV) -- C:\WINDOWS\system32\drivers\msdv.sys (Microsoft Corporation)
DRV - (gameenum) -- C:\WINDOWS\system32\drivers\gameenum.sys (Microsoft Corporation)
DRV - (bkn50USB) -- C:\WINDOWS\system32\drivers\rt2500usb.sys (Ralink Technology Inc.)
DRV - (MDC8021X) AEGIS Protocol (IEEE 802.1x) -- C:\WINDOWS\system32\drivers\mdc8021x.sys (Meetinghouse Data Communications)
DRV - (GTNDIS5) -- C:\WINDOWS\system32\GTNDIS5.sys (Printing Communications Assoc., Inc. (PCAUSA))
DRV - (pfc) -- C:\WINDOWS\system32\drivers\pfc.sys (Padus, Inc.)
DRV - (ultra) -- C:\WINDOWS\System32\DRIVERS\ultra.sys (Promise Technology, Inc.)
DRV - (bcm4sbxp) -- C:\WINDOWS\system32\drivers\bcm4sbxp.sys (Broadcom Corporation)
DRV - (IdeChnDr) Intel® -- C:\WINDOWS\System32\DRIVERS\IdeChnDr.sys (Intel Corporation)
DRV - (IdeBusDr) -- C:\WINDOWS\System32\DRIVERS\IdeBusDr.sys (Intel Corporation)
DRV - (UdfReadr) -- C:\WINDOWS\System32\drivers\udfreadr.sys (Adaptec)


========== Standard Registry (All) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Secondary_Page_URL = [binary data]
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Extensions Off Page = about:NoAdd-ons
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\system32\blank.htm
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Security Risk Page = about:SecurityRisk
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft....k/?LinkId=69157
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,CustomizeSearch = http://ie.search.msn...st/srchcust.htm
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,Default_Search_URL = http://www.google.com/ie
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,SearchAssistant = http://ie.search.msn...st/srchasst.htm

IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\system32\blank.htm
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = http://www.google.com
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.google.com/ie
IE - HKCU\..\URLSearchHook: {CFBFAE00-17A6-11D0-99CB-00C04FD64497} - C:\WINDOWS\system32\ieframe.dll (Microsoft Corporation)
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

FF - HKLM\software\mozilla\Firefox\Extensions\\{20a82645-c095-46ed-80e3-08825760534b}: C:\WINDOWS\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ [2010/07/31 23:35:41 | 000,000,000 | ---D | M]


O1 HOSTS File: ([2010/07/31 00:03:39 | 000,000,027 | ---- | M]) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (Google Toolbar Helper) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
O2 - BHO: (Google Toolbar Notifier BHO) - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.5126.1836\swg.dll (Google Inc.)
O3 - HKLM\..\Toolbar: (Google Toolbar) - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
O3 - HKCU\..\Toolbar\ShellBrowser: (&Address) - {01E04581-4EEE-11D0-BFE9-00AA005B4383} - C:\WINDOWS\system32\browseui.dll (Microsoft Corporation)
O3 - HKCU\..\Toolbar\ShellBrowser: (Google Toolbar) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
O3 - HKCU\..\Toolbar\WebBrowser: (&Address) - {01E04581-4EEE-11D0-BFE9-00AA005B4383} - C:\WINDOWS\system32\browseui.dll (Microsoft Corporation)
O3 - HKCU\..\Toolbar\WebBrowser: (&Links) - {0E5CBF21-D15F-11D0-8301-00AA005B4383} - C:\WINDOWS\system32\shell32.dll (Microsoft Corporation)
O3 - HKCU\..\Toolbar\WebBrowser: (Google Toolbar) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
O4 - HKLM..\Run: [DigidesignMMERefresh] C:\Program Files\Digidesign\Drivers\MMERefresh.exe (Digidesign, A Division of Avid Technology, Inc.)
O4 - HKLM..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\hpwuSchd2.exe (Hewlett-Packard Development Company, L.P.)
O4 - HKLM..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe (Apple Inc.)
O4 - HKLM..\Run: [Multimedia Keyboard] C:\Program Files\ACK-270U\MMKEYBD.EXE (Dritek System Inc.)
O4 - HKLM..\Run: [NvCplDaemon] C:\WINDOWS\System32\NvCpl.DLL (NVIDIA Corporation)
O4 - HKLM..\Run: [NvMediaCenter] C:\WINDOWS\System32\nvmctray.dll (NVIDIA Corporation)
O4 - HKLM..\Run: [QuickTime Task] C:\Program Files\QuickTime\QTTask.exe (Apple Inc.)
O4 - HKLM..\Run: [Smapp] C:\Program Files\Analog Devices\SoundMAX\SMTray.exe (Analog Devices, Inc.)
O4 - HKLM..\Run: [TkBellExe] C:\Program Files\Common Files\Real\Update_OB\realsched.exe (RealNetworks, Inc.)
O4 - HKLM..\Run: [Windows Defender] C:\Program Files\Windows Defender\MSASCui.exe (Microsoft Corporation)
O4 - HKCU..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (Microsoft Corporation)
O4 - HKCU..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe (Google Inc.)
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 4.0\Distillr\AcroTray.exe ()
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe (Adobe Systems, Inc.)
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe (Hewlett-Packard Development Company, L.P.)
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE (Microsoft Corporation)
O4 - Startup: C:\Documents and Settings\Luis Ramentas\Start Menu\Programs\Startup\Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe (Adobe Systems, Inc.)
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\control panel present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\restrictions present
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoCDBurning = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: dontdisplaylastusername = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: legalnoticecaption =
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: legalnoticetext =
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: shutdownwithoutlogon = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: undockwithoutlogon = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: DisableRegistryTools = 0
O7 - HKCU\Software\Policies\Microsoft\Internet Explorer\control panel present
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O8 - Extra context menu item: E&xport to Microsoft Excel - C:\Program Files\Microsoft Office\Office10\EXCEL.EXE (Microsoft Corporation)
O8 - Extra context menu item: Google Sidewiki... - C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_89D8574934B26AC4.dll (Google Inc.)
O9 - Extra Button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (Microsoft Corporation)
O10 - NameSpace_Catalog5\Catalog_Entries\000000000001 [] - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - NameSpace_Catalog5\Catalog_Entries\000000000002 [] - C:\WINDOWS\system32\winrnr.dll (Microsoft Corporation)
O10 - NameSpace_Catalog5\Catalog_Entries\000000000003 [] - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000001 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000002 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000003 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000004 - C:\WINDOWS\system32\rsvpsp.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000005 - C:\WINDOWS\system32\rsvpsp.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000006 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000007 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000008 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000009 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000010 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000011 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000012 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000013 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000014 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000015 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000016 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000017 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000018 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000019 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} http://go.microsoft....k/?linkid=39204 (Windows Genuine Advantage Validation Tool)
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} C:\Program Files\Yahoo!\common\yinsthelper.dll (YInstStarter Class)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} http://v5.windowsupd...b?1096476092123 (WUWebControl Class)
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} http://update.micros...b?1140900989750 (MUWebControl Class)
O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} http://download.eset...lineScanner.cab (OnlineScanner Control)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/...-130_02-win.cab (Java Plug-in 1.3.0_02)
O16 - DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} http://fpdownload.ma...t/ultrashim.cab (Reg Error: Key error.)
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload.ma...ash/swflash.cab (Shockwave Flash Object)
O16 - DPF: {E19F9331-3110-11d4-991C-005004D3B3DB} http://java.sun.com/...-130_02-win.cab (Java Plug-in 1.3.0_02)
O16 - DPF: Microsoft XML Parser for Java file://C:\WINDOWS\Java\classes\xmldso.cab (Reg Error: Key error.)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.254
O18 - Protocol\Handler\about {3050F406-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\cdl {3dd53d40-7b8b-11D0-b013-00aa0059ce02} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\dvd {12D51199-0DB5-46FE-A120-47A3D7D937CC} - C:\WINDOWS\system32\msvidctl.dll (Microsoft Corporation)
O18 - Protocol\Handler\file {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\ftp {79eac9e3-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\gopher {79eac9e4-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\http {79eac9e2-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\http\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\http\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\https {79eac9e5-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\https\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\https\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\ipp - No CLSID value found
O18 - Protocol\Handler\ipp\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\its {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\system32\itss.dll (Microsoft Corporation)
O18 - Protocol\Handler\javascript {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\lid {5C135180-9973-46D9-ABF4-148267CBB8BF} - C:\WINDOWS\system32\msvidctl.dll (Microsoft Corporation)
O18 - Protocol\Handler\local {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\mailto {3050f3DA-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\mhtml {05300401-BCBC-11d0-85E3-00C04FD85AB4} - C:\WINDOWS\system32\inetcomm.dll (Microsoft Corporation)
O18 - Protocol\Handler\mk {79eac9e6-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\msdaipp - No CLSID value found
O18 - Protocol\Handler\msdaipp\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\msdaipp\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\ms-its {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\system32\itss.dll (Microsoft Corporation)
O18 - Protocol\Handler\mso-offdap {3D9F03FA-7A94-11D3-BE81-0050048385D1} - C:\Program Files\Common Files\Microsoft Shared\Web Components\10\OWC10.DLL (Microsoft Corporation)
O18 - Protocol\Handler\res {3050F3BC-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\sysimage {76E67A63-06E9-11D2-A840-006008059382} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\tv {CBD30858-AF45-11D2-B6D6-00C04FBBDE6E} - C:\WINDOWS\system32\msvidctl.dll (Microsoft Corporation)
O18 - Protocol\Handler\vbscript {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\wia {13F3EA8B-91D7-4F0A-AD76-D2853AC8BECE} - C:\WINDOWS\system32\wiascr.dll (Microsoft Corporation)
O18 - Protocol\Filter\application/octet-stream {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - C:\WINDOWS\System32\mscoree.dll (Microsoft Corporation)
O18 - Protocol\Filter\application/x-complus {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - C:\WINDOWS\System32\mscoree.dll (Microsoft Corporation)
O18 - Protocol\Filter\application/x-msdownload {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - C:\WINDOWS\System32\mscoree.dll (Microsoft Corporation)
O18 - Protocol\Filter\Class Install Handler {32B533BB-EDAE-11d0-BD5A-00AA00B92AF1} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Filter\deflate {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Filter\gzip {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Filter\lzdhtml {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Filter\text/webviewhtml {733AC4CB-F1A4-11d0-B951-00A0C90312E1} - C:\WINDOWS\system32\shell32.dll (Microsoft Corporation)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\WINDOWS\system32\userinit.exe) - C:\WINDOWS\system32\userinit.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UIHost - (logonui.exe) - C:\WINDOWS\System32\logonui.exe (Microsoft Corporation)
O20 - HKLM Winlogon: VMApplet - (rundll32 shell32) - C:\WINDOWS\System32\shell32.dll (Microsoft Corporation)
O20 - HKLM Winlogon: VMApplet - (Control_RunDLL "sysdm.cpl") - C:\WINDOWS\System32\sysdm.cpl (Microsoft Corporation)
O20 - Winlogon\Notify\crypt32chain: DllName - crypt32.dll - C:\WINDOWS\System32\crypt32.dll (Microsoft Corporation)
O20 - Winlogon\Notify\cryptnet: DllName - cryptnet.dll - C:\WINDOWS\System32\cryptnet.dll (Microsoft Corporation)
O20 - Winlogon\Notify\cscdll: DllName - cscdll.dll - C:\WINDOWS\System32\cscdll.dll (Microsoft Corporation)
O20 - Winlogon\Notify\ScCertProp: DllName - wlnotify.dll - C:\WINDOWS\System32\wlnotify.dll (Microsoft Corporation)
O20 - Winlogon\Notify\Schedule: DllName - wlnotify.dll - C:\WINDOWS\System32\wlnotify.dll (Microsoft Corporation)
O20 - Winlogon\Notify\sclgntfy: DllName - sclgntfy.dll - C:\WINDOWS\System32\sclgntfy.dll (Microsoft Corporation)
O20 - Winlogon\Notify\SensLogn: DllName - WlNotify.dll - C:\WINDOWS\System32\wlnotify.dll (Microsoft Corporation)
O20 - Winlogon\Notify\termsrv: DllName - wlnotify.dll - C:\WINDOWS\System32\wlnotify.dll (Microsoft Corporation)
O20 - Winlogon\Notify\WgaLogon: DllName - WgaLogon.dll - C:\WINDOWS\System32\WgaLogon.dll (Microsoft Corporation)
O20 - Winlogon\Notify\wlballoon: DllName - wlnotify.dll - C:\WINDOWS\System32\wlnotify.dll (Microsoft Corporation)
O21 - SSODL: CDBurn - {fbeb8a05-beee-4442-804e-409d6c4515e9} - C:\WINDOWS\system32\shell32.dll (Microsoft Corporation)
O21 - SSODL: PostBootReminder - {7849596a-48ea-486e-8937-a2a3009f31a9} - C:\WINDOWS\system32\shell32.dll (Microsoft Corporation)
O21 - SSODL: SysTray - {35CEC8A3-2BE6-11D2-8773-92E220524153} - C:\WINDOWS\system32\stobject.dll (Microsoft Corporation)
O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - C:\WINDOWS\system32\webcheck.dll (Microsoft Corporation)
O22 - SharedTaskScheduler: {438755C2-A8BA-11D1-B96B-00A0C90312E1} - Browseui preloader - C:\WINDOWS\system32\browseui.dll (Microsoft Corporation)
O22 - SharedTaskScheduler: {8C7461EF-2B13-11d2-BE35-3078302C2030} - Component Categories cache daemon - C:\WINDOWS\system32\browseui.dll (Microsoft Corporation)
O24 - Desktop Components:0 (My Current Home Page) - About:Home
O28 - HKLM ShellExecuteHooks: {091EB208-39DD-417D-A5DD-7E2C2D8FB9CB} - C:\Program Files\Windows Defender\MpShHook.dll (Microsoft Corporation)
O28 - HKLM ShellExecuteHooks: {54D9498B-CF93-414F-8984-8CE7FDE0D391} - C:\Program Files\ewido\security suite\shellhook.dll ()
O28 - HKLM ShellExecuteHooks: {AEB6717E-7E19-11d0-97EE-00C04FD91972} - C:\WINDOWS\System32\shell32.dll (Microsoft Corporation)
O29 - HKLM SecurityProviders - (msapsspc.dll) - C:\WINDOWS\System32\msapsspc.dll (Microsoft Corporation)
O29 - HKLM SecurityProviders - (schannel.dll) - C:\WINDOWS\System32\schannel.dll (Microsoft Corporation)
O29 - HKLM SecurityProviders - (digest.dll) - C:\WINDOWS\System32\digest.dll (Microsoft Corporation)
O29 - HKLM SecurityProviders - (msnsspc.dll) - C:\WINDOWS\System32\msnsspc.dll (Microsoft Corporation)
O30 - LSA: Authentication Packages - (msv1_0) - C:\WINDOWS\System32\msv1_0.dll (Microsoft Corporation)
O30 - LSA: Security Packages - (kerberos) - C:\WINDOWS\System32\kerberos.dll (Microsoft Corporation)
O30 - LSA: Security Packages - (msv1_0) - C:\WINDOWS\System32\msv1_0.dll (Microsoft Corporation)
O30 - LSA: Security Packages - (schannel) - C:\WINDOWS\System32\schannel.dll (Microsoft Corporation)
O30 - LSA: Security Packages - (wdigest) - C:\WINDOWS\System32\wdigest.dll (Microsoft Corporation)
O31 - SafeBoot: AlternateShell - cmd.exe
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2004/09/24 14:11:36 | 000,000,000 | -H-- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O32 - AutoRun File - [2010/06/05 08:13:08 | 000,000,103 | RHS- | M] () - F:\Autorun.inf -- [ FAT32 ]
O34 - HKLM BootExecute: (autocheck autochk *) - File not found
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = ComFile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2010/08/01 18:43:55 | 000,000,000 | -HSD | C] -- C:\Documents and Settings\Luis Ramentas\PrivacIE
[2010/08/01 18:42:04 | 000,000,000 | -HSD | C] -- C:\Documents and Settings\Luis Ramentas\IETldCache
[2010/08/01 18:03:26 | 000,000,000 | ---D | C] -- C:\WINDOWS\ie8updates
[2010/08/01 18:02:01 | 000,000,000 | ---D | C] -- C:\WINDOWS\WBEM
[2010/08/01 18:01:30 | 000,000,000 | -H-D | C] -- C:\WINDOWS\ie8
[2010/08/01 15:58:28 | 000,599,040 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\msfeeds.dll
[2010/08/01 15:58:28 | 000,055,296 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\msfeedsbs.dll
[2010/08/01 15:58:26 | 001,985,536 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\iertutil.dll
[2010/08/01 15:58:26 | 000,743,424 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\iedvtool.dll
[2010/08/01 15:58:24 | 011,076,096 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\ieframe.dll
[2010/08/01 15:50:31 | 016,883,056 | ---- | C] (Microsoft Corporation) -- C:\Program Files\IE8-WindowsXP-x86-ENU.exe
[2010/08/01 12:59:19 | 073,860,568 | ---- | C] ( ) -- C:\Documents and Settings\Luis Ramentas\Desktop\setup_9.0.0.722_01.08.2010_23-20.exe
[2010/07/31 17:32:04 | 000,000,000 | ---D | C] -- C:\WINDOWS\System32\XPSViewer
[2010/07/31 17:31:44 | 000,000,000 | ---D | C] -- C:\Program Files\MSBuild
[2010/07/31 17:31:36 | 000,000,000 | ---D | C] -- C:\WINDOWS\System32\en-US
[2010/07/31 17:31:07 | 000,000,000 | ---D | C] -- C:\Program Files\Reference Assemblies
[2010/07/31 17:29:40 | 001,676,288 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\xpssvcs.dll
[2010/07/31 17:29:40 | 001,676,288 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\xpssvcs.dll
[2010/07/31 17:29:40 | 000,597,504 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\printfilterpipelinesvc.exe
[2010/07/31 17:29:40 | 000,575,488 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\xpsshhdr.dll
[2010/07/31 17:29:40 | 000,117,760 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\prntvpt.dll
[2010/07/31 17:29:40 | 000,089,088 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\filterpipelineprintproc.dll
[2010/07/31 17:23:13 | 000,000,000 | ---D | C] -- C:\Program Files\MSXML 6.0
[2010/07/31 17:13:41 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Luis Ramentas\.java
[2010/07/31 14:14:01 | 000,000,000 | ---D | C] -- C:\Program Files\MSXML 4.0
[2010/07/31 14:12:34 | 000,000,000 | ---D | C] -- C:\WINDOWS\System32\CatRoot_bak
[2010/07/31 13:55:34 | 000,743,936 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\helpsvc.exe
[2010/07/31 13:55:05 | 000,060,416 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\colbact.dll
[2010/07/31 13:39:56 | 000,331,776 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\msadce.dll
[2010/07/31 13:38:24 | 000,655,872 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\mstscax.dll
[2010/07/31 10:30:20 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Luis Ramentas\Local Settings\Application Data\Temp
[2010/07/31 10:29:59 | 000,000,000 | ---D | C] -- C:\Program Files\ESET
[2010/07/31 10:10:37 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Luis Ramentas\Application Data\Malwarebytes
[2010/07/31 10:10:18 | 000,038,224 | ---- | C] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbamswissarmy.sys
[2010/07/31 10:10:17 | 000,020,952 | ---- | C] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbam.sys
[2010/07/31 10:10:17 | 000,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[2010/07/31 10:10:17 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Malwarebytes
[2010/07/31 10:08:40 | 006,153,352 | ---- | C] (Malwarebytes Corporation ) -- C:\Documents and Settings\Luis Ramentas\Desktop\mbam-setup-1.46.exe
[2010/07/31 10:01:56 | 000,000,000 | ---D | C] -- C:\Documents and Settings\NetworkService\Local Settings\Application Data\Google
[2010/07/31 10:01:43 | 000,000,000 | ---D | C] -- C:\Documents and Settings\LocalService\Local Settings\Application Data\Google
[2010/07/30 23:58:01 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Luis Ramentas\Local Settings\Application Data\Help
[2010/07/30 23:58:01 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Luis Ramentas\Application Data\Help
[2010/07/30 23:49:51 | 000,000,000 | RHSD | C] -- C:\cmdcons
[2010/07/30 23:48:46 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Real
[2010/07/30 23:47:11 | 000,221,568 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\MpSigStub.exe
[2010/07/30 23:13:39 | 000,212,480 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWXCACLS.exe
[2010/07/30 23:13:39 | 000,161,792 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWREG.exe
[2010/07/30 23:13:39 | 000,136,704 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWSC.exe
[2010/07/30 23:13:39 | 000,031,232 | ---- | C] (NirSoft) -- C:\WINDOWS\NIRCMD.exe
[2010/07/30 23:13:31 | 000,000,000 | ---D | C] -- C:\WINDOWS\ERDNT
[2010/07/30 23:11:40 | 000,000,000 | ---D | C] -- C:\Qoobox
[2010/07/29 23:08:39 | 000,574,976 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\Luis Ramentas\Desktop\OTL.exe
[1 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]

========== Files - Modified Within 30 Days ==========

[2010/08/02 06:47:42 | 000,000,330 | -H-- | M] () -- C:\WINDOWS\tasks\MP Scheduled Scan.job
[2010/08/02 06:44:48 | 000,054,156 | -H-- | M] () -- C:\WINDOWS\QTFont.qfn
[2010/08/02 06:44:33 | 000,063,558 | ---- | M] () -- C:\WINDOWS\System32\nvwsapps.xml
[2010/08/02 06:44:21 | 004,980,736 | ---- | M] () -- C:\Documents and Settings\Luis Ramentas\NTUSER.DAT
[2010/08/02 06:44:19 | 000,013,646 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2010/08/02 06:44:12 | 000,000,882 | ---- | M] () -- C:\WINDOWS\tasks\GoogleUpdateTaskMachineCore.job
[2010/08/02 06:44:05 | 000,000,006 | -H-- | M] () -- C:\WINDOWS\tasks\SA.DAT
[2010/08/02 06:44:00 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2010/08/01 19:01:17 | 000,000,178 | -HS- | M] () -- C:\Documents and Settings\Luis Ramentas\ntuser.ini
[2010/08/01 18:42:08 | 000,000,821 | ---- | M] () -- C:\Documents and Settings\Luis Ramentas\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
[2010/08/01 18:30:14 | 000,000,886 | ---- | M] () -- C:\WINDOWS\tasks\GoogleUpdateTaskMachineUA.job
[2010/08/01 18:03:29 | 000,001,355 | ---- | M] () -- C:\WINDOWS\imsins.BAK
[2010/08/01 17:56:35 | 016,883,056 | ---- | M] (Microsoft Corporation) -- C:\Program Files\IE8-WindowsXP-x86-ENU.exe
[2010/08/01 17:49:42 | 000,000,168 | ---- | M] () -- C:\Documents and Settings\Luis Ramentas\Adobe Encore DVD_VUI.pref
[2010/08/01 17:49:12 | 000,000,000 | ---- | M] () -- C:\Documents and Settings\Luis Ramentas\Desktop\lma03008
[2010/08/01 14:11:30 | 000,000,536 | -HS- | M] () -- C:\WINDOWS\setup_9.0.0.722_01.08.2010_23-20drv.spi
[2010/08/01 13:00:02 | 073,860,568 | ---- | M] ( ) -- C:\Documents and Settings\Luis Ramentas\Desktop\setup_9.0.0.722_01.08.2010_23-20.exe
[2010/08/01 12:46:03 | 000,440,684 | ---- | M] () -- C:\WINDOWS\System32\perfh009.dat
[2010/08/01 12:46:03 | 000,071,002 | ---- | M] () -- C:\WINDOWS\System32\perfc009.dat
[2010/08/01 12:46:02 | 000,521,444 | ---- | M] () -- C:\WINDOWS\System32\PerfStringBackup.INI
[2010/07/31 23:14:04 | 000,001,465 | ---- | M] () -- C:\Documents and Settings\Luis Ramentas\plugin130_02.trace
[2010/07/31 22:49:33 | 000,086,720 | ---- | M] () -- C:\Documents and Settings\Luis Ramentas\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
[2010/07/31 22:47:59 | 000,356,952 | ---- | M] () -- C:\WINDOWS\System32\FNTCACHE.DAT
[2010/07/31 14:13:20 | 000,000,654 | ---- | M] () -- C:\WINDOWS\win.ini
[2010/07/31 10:10:21 | 000,000,702 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes' Anti-Malware.lnk
[2010/07/31 10:09:31 | 006,153,352 | ---- | M] (Malwarebytes Corporation ) -- C:\Documents and Settings\Luis Ramentas\Desktop\mbam-setup-1.46.exe
[2010/07/31 00:04:10 | 000,000,227 | ---- | M] () -- C:\WINDOWS\system.ini
[2010/07/31 00:03:39 | 000,000,027 | ---- | M] () -- C:\WINDOWS\System32\drivers\etc\hosts
[2010/07/30 23:50:02 | 000,000,281 | RHS- | M] () -- C:\boot.ini
[2010/07/30 22:39:04 | 003,747,542 | R--- | M] () -- C:\Documents and Settings\Luis Ramentas\Desktop\ComboFix.exe
[2010/07/29 22:30:36 | 000,293,376 | ---- | M] () -- C:\Documents and Settings\Luis Ramentas\Desktop\n3s5drmc.exe
[2010/07/29 22:27:46 | 000,574,976 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Luis Ramentas\Desktop\OTL.exe
[2010/07/22 01:15:12 | 000,002,429 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\PTPublisher.lnk
[2010/07/21 21:56:15 | 000,000,664 | ---- | M] () -- C:\WINDOWS\System32\d3d9caps.dat
[1 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]

========== Files Created - No Company Name ==========

[2010/08/01 17:49:12 | 000,000,000 | ---- | C] () -- C:\Documents and Settings\Luis Ramentas\Desktop\lma03008
[2010/08/01 14:07:19 | 000,000,536 | -HS- | C] () -- C:\WINDOWS\setup_9.0.0.722_01.08.2010_23-20drv.spi
[2010/07/31 17:13:44 | 000,001,465 | ---- | C] () -- C:\Documents and Settings\Luis Ramentas\plugin130_02.trace
[2010/07/31 10:10:21 | 000,000,702 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes' Anti-Malware.lnk
[2010/07/31 00:25:19 | 000,000,886 | ---- | C] () -- C:\WINDOWS\tasks\GoogleUpdateTaskMachineUA.job
[2010/07/31 00:25:19 | 000,000,882 | ---- | C] () -- C:\WINDOWS\tasks\GoogleUpdateTaskMachineCore.job
[2010/07/30 23:50:02 | 000,000,211 | ---- | C] () -- C:\Boot.bak
[2010/07/30 23:49:56 | 000,260,272 | ---- | C] () -- C:\cmldr
[2010/07/30 23:13:39 | 000,256,512 | ---- | C] () -- C:\WINDOWS\PEV.exe
[2010/07/30 23:13:39 | 000,098,816 | ---- | C] () -- C:\WINDOWS\sed.exe
[2010/07/30 23:13:39 | 000,080,412 | ---- | C] () -- C:\WINDOWS\grep.exe
[2010/07/30 23:13:39 | 000,077,312 | ---- | C] () -- C:\WINDOWS\MBR.exe
[2010/07/30 23:13:39 | 000,068,096 | ---- | C] () -- C:\WINDOWS\zip.exe
[2010/07/30 23:10:36 | 003,747,542 | R--- | C] () -- C:\Documents and Settings\Luis Ramentas\Desktop\ComboFix.exe
[2010/07/29 23:08:46 | 000,293,376 | ---- | C] () -- C:\Documents and Settings\Luis Ramentas\Desktop\n3s5drmc.exe
[2007/12/04 21:34:12 | 000,000,197 | ---- | C] () -- C:\WINDOWS\System32\MRT.INI
[2007/10/03 20:06:34 | 000,000,059 | ---- | C] () -- C:\WINDOWS\WININIT.INI
[2007/10/03 20:05:12 | 000,032,768 | ---- | C] () -- C:\WINDOWS\System32\IPPCPUID.DLL
[2007/07/05 13:46:10 | 000,122,880 | ---- | C] () -- C:\WINDOWS\System32\PtSSE2.dll
[2007/07/05 13:46:02 | 000,054,272 | ---- | C] () -- C:\WINDOWS\System32\drivers\AvidXPSerial.sys
[2007/07/05 13:46:02 | 000,019,968 | ---- | C] () -- C:\WINDOWS\System32\Cpuinf32.dll
[2007/05/30 17:57:17 | 000,016,264 | -HS- | C] () -- C:\WINDOWS\System32\KGyGaAvL.sys
[2007/02/10 17:29:51 | 000,217,088 | ---- | C] () -- C:\WINDOWS\System32\qtmlClient.dll
[2007/02/08 14:54:54 | 001,728,606 | ---- | C] () -- C:\WINDOWS\System32\libmmdd.dll
[2007/02/08 14:40:15 | 001,658,973 | ---- | C] () -- C:\WINDOWS\System32\libmmd.dll
[2006/12/03 13:41:16 | 000,000,221 | ---- | C] () -- C:\WINDOWS\NCLogConfig.ini
[2006/05/27 18:27:31 | 000,524,288 | ---- | C] () -- C:\WINDOWS\System32\xvidcore.dll
[2006/05/27 18:27:31 | 000,139,264 | ---- | C] () -- C:\WINDOWS\System32\xvidvfw.dll
[2006/03/17 22:07:57 | 000,000,006 | ---- | C] () -- C:\WINDOWS\dcstds3.dll
[2006/03/17 14:16:00 | 001,019,904 | ---- | C] () -- C:\WINDOWS\System32\nvwimg.dll
[2006/03/17 14:16:00 | 000,573,440 | ---- | C] () -- C:\WINDOWS\System32\nvhwvid.dll
[2006/03/17 14:16:00 | 000,098,304 | ---- | C] () -- C:\WINDOWS\System32\nvapi.dll
[2006/03/15 22:39:10 | 000,000,376 | ---- | C] () -- C:\WINDOWS\ODBC.INI
[2006/01/04 02:12:04 | 000,077,824 | ---- | C] () -- C:\WINDOWS\System32\HPZIDS01.dll
[2005/11/24 22:28:13 | 000,004,803 | ---- | C] () -- C:\WINDOWS\cdplayer.ini
[2005/09/17 19:52:04 | 000,000,754 | ---- | C] () -- C:\WINDOWS\WORDPAD.INI
[2005/09/17 19:32:35 | 000,000,383 | ---- | C] () -- C:\WINDOWS\System32\haspdos.sys
[2005/07/14 19:49:44 | 000,071,749 | ---- | C] () -- C:\WINDOWS\hcextoutput.dll
[2005/07/14 19:49:44 | 000,000,823 | ---- | C] () -- C:\WINDOWS\tsc.ini
[2005/07/14 19:48:31 | 000,000,170 | ---- | C] () -- C:\WINDOWS\GetServer.ini
[2005/07/12 20:28:33 | 000,040,960 | ---- | C] () -- C:\WINDOWS\System32\B11gUSB.dll
[2005/07/12 20:28:32 | 000,094,208 | ---- | C] () -- C:\WINDOWS\System32\GTW32N50.dll
[2005/04/21 21:49:42 | 000,000,074 | -H-- | C] () -- C:\WINDOWS\YNNHOJED.DLL
[2005/02/06 17:50:55 | 000,210,944 | ---- | C] () -- C:\WINDOWS\System32\Msvcrt10.dll
[2005/01/02 21:15:50 | 000,000,000 | ---- | C] () -- C:\WINDOWS\pcfriend.INI
[2004/11/30 23:16:03 | 000,005,123 | ---- | C] () -- C:\WINDOWS\BorisRED2.5.ini
[2004/11/30 22:50:45 | 000,700,416 | R--- | C] () -- C:\WINDOWS\System32\omfToolkit.dll
[2004/11/19 23:33:16 | 000,001,915 | ---- | C] () -- C:\WINDOWS\BorisFXLtd6.1.ini
[2004/10/26 15:39:05 | 003,375,104 | ---- | C] () -- C:\WINDOWS\System32\qt-mt331.dll
[2004/09/28 08:52:47 | 001,466,368 | ---- | C] () -- C:\WINDOWS\System32\nview.dll
[2004/09/28 08:52:47 | 000,466,944 | ---- | C] () -- C:\WINDOWS\System32\nvshell.dll
[2004/09/24 14:28:40 | 000,000,044 | ---- | C] () -- C:\WINDOWS\System32\msssc.dll
[2004/09/24 14:23:15 | 000,005,824 | ---- | C] () -- C:\WINDOWS\System32\drivers\ASUSHWIO.SYS
[2004/09/24 14:23:15 | 000,003,275 | ---- | C] () -- C:\WINDOWS\Ascd_tmp.ini
[2004/04/23 17:46:19 | 000,299,008 | ---- | C] () -- C:\WINDOWS\System32\Look Suite.win.dll
[2003/11/17 10:33:00 | 001,662,976 | ---- | C] () -- C:\WINDOWS\System32\nvwdmcpl.dll
[2003/11/17 10:33:00 | 000,286,720 | ---- | C] () -- C:\WINDOWS\System32\nvnt4cpl.dll
[2001/12/27 16:07:14 | 000,006,925 | ---- | C] () -- C:\WINDOWS\System32\LANGMONI.DLL
[2001/08/18 05:00:00 | 000,027,440 | ---- | C] () -- C:\WINDOWS\System32\drivers\secdrv.sys
[2001/07/07 04:00:00 | 000,003,399 | ---- | C] () -- C:\WINDOWS\System32\hptcpmon.ini
[1999/07/23 13:46:48 | 000,000,116 | ---- | C] () -- C:\WINDOWS\AuHCcup1.ini
[1999/07/23 10:53:20 | 000,129,536 | ---- | C] () -- C:\WINDOWS\AuHCcup1.dll
[1998/10/11 01:07:38 | 000,088,576 | ---- | C] () -- C:\WINDOWS\System32\Iticheck.dll

========== Files - Unicode (All) ==========
[2007/12/05 14:50:17 | 000,000,000 | ---D | M](C:\Documents and Settings\Luis Ramentas\Application Data\F?nts) -- C:\Documents and Settings\Luis Ramentas\Application Data\Fοnts
(C:\Documents and Settings\Luis Ramentas\Application Data\F?nts) -- C:\Documents and Settings\Luis Ramentas\Application Data\Fοnts

========== Alternate Data Streams ==========

@Alternate Data Stream - 88 bytes -> C:\Install:SummaryInformation
@Alternate Data Stream - 88 bytes -> C:\Documents and Settings\Luis Ramentas\Desktop\awkeygen.exe:SummaryInformation
@Alternate Data Stream - 88 bytes -> C:\Documents and Settings\Luis Ramentas\Desktop\AVSDVDPlayer.exe:SummaryInformation
< End of report >
  • 0

#39
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Just a few leftover 's to take care of.

Run OTL
  • Under the Custom Scans/Fixes box at the bottom, paste in the following
    :OTL
    O32 - AutoRun File - [2010/06/05 08:13:08 | 000,000,103 | RHS- | M] () - F:\Autorun.inf -- [ FAT32 ]
    
    :Commands
    [purity]
  • Then click the Run Fix button at the top
  • Let the program run unhindered,when it is done it will say "Fix Complete press ok to open log"
  • Please post that log in your next reply.

================================Follow up scan=================================
  • Double click on OTL to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • Under the Standard Registry box change it to All.
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
  • When the scan completes, it will open one notepad window. OTL.Txt a This is saved in the same location as OTL.
  • Please copy (Edit->Select All, Edit->Copy) the contents of this file and post it with your next reply.

  • 0

#40
Capriboy

Capriboy

    Member

  • Topic Starter
  • Member
  • PipPip
  • 65 posts
Wow, this scan took the length of time of my finger releasing the mouse button. Here's the results


========== OTL ==========
F:\Autorun.inf moved successfully.
========== COMMANDS ==========
C:\Documents and Settings\Luis Ramentas\Application Data\Fοnts\Fοnts folder moved successfully.
C:\Documents and Settings\Luis Ramentas\Application Data\Fοnts folder moved successfully.

OTL by OldTimer - Version 3.2.9.1 log created on 08032010_082052
  • 0

Advertisements


#41
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
=======Cleanup=======
  • Click START then RUN
  • Now type Combofix /uninstall in the runbox and click OK. Note the space between the X and the Uninstall, it needs to be there.
======Next======
  • Double click on OTL to run it.
  • Click on the Cleanup button at the top.
  • You will be asked to reboot the machine to finish the Cleanup process. Choose Yes.
  • This will remove itself and other tools we may have used.
===============Update Java

Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java SE Runtime Environment (JRE) and save it to your desktop.
  • Scroll down to where it says "(JRE) then click on it
  • Click the "Download" button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u21-windows-i586.exe to install the newest version.
======================Clear out infected System Restore points======================


Then we need to reset your System Restore points.
The link below shows how to do this.
How to Turn On and Turn Off System Restore in Windows XP
http://support.micro...kb/310405/en-us

If you are using Vista then see this link: http://www.bleepingc...143.html#manual

Delete\uninstall anything else that we have used that is leftover.


After that your all set.


========The following are some articles and a Windows Update link that I like to suggest to people to prevent malware and general PC maintenance=========

Windows Updates - It is very important to make sure that both Internet Explorer and Windows are kept current with the latest critical security patches from Microsoft. To do this just start Internet Explorer and select Tools > Windows Update, and follow the online instructions from there.

Prevention article Some great guidelines to follow to prevent future infections please read the Prevention artice by Miekiemoes.

"How did I get infected in the first place?" Also this one by Tony Klein.

If your computer is slow Is a tutorial on what you can do if your computer is slow.

File sharing program dangers Reasons to stay away from File sharing programs for ex: BitTorrent,Limewire,Kazaa,emule,Utorrent etc...



========Free antimalware tools used for on demand scanning and cleaning no real time unless purchased========

Malwarebytes Antimalware
superantispyware

==================Free antivirus links==================
This is antivirus and antispyware.
Microsoft Security Essentials

This is free antispyware protection and Antivirus protection.
AVG free 9.0

This is just antivirus protection.
Antivir

This is antivirus and antispyware protection.
Avast
  • 0

#42
Capriboy

Capriboy

    Member

  • Topic Starter
  • Member
  • PipPip
  • 65 posts
I've done everything now. The computer is working great. I don't know if you're allowed to make recommendations on antivirus software or spybot protection, but are the programs that are free as good as the one's you have to pay for? I know I've paid for Norton and it ate up so much RAM I had to turn it off. Like shopping for anything else, it's good to get the advice of people in the know.

I may still have something quirky with the first computer we cleaned up. It's running great, but occasionally on booting up it'll restart itself, sometimes a couple of times. Once it even did it after I had signed onto Windows. It's only done it a couple of times, but I'm wondering what could cause that. Other than that, it is also working great.

Thanks again
  • 0

#43
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts

I've done everything now. The computer is working great. I don't know if you're allowed to make recommendations on antivirus software or spybot protection, but are the programs that are free as good as the one's you have to pay for? I know I've paid for Norton and it ate up so much RAM I had to turn it off. Like shopping for anything else, it's good to get the advice of people in the know.

Yeah I think they are not as good however with ones like Avast,Avira, and AVG the paid version have the same detection rate as the free.
I personally use Kaspersky Internet Security suite it is great but my only complaint is that it too is a resource hog.
I would get the paid for antivirus of that though over any free av anytime.
The antivirus alone will not use as much as a security suite.

I may still have something quirky with the first computer we cleaned up. It's running great, but occasionally on booting up it'll restart itself, sometimes a couple of times. Once it even did it after I had signed onto Windows. It's only done it a couple of times, but I'm wondering what could cause that. Other than that, it is also working great.

Sounds like it may be blue screening.
Please do the following so I can have a look at what the cause may be.

GO to start then my computer then navigate to this folder C:\Windows\Minidump.
Open tht folder and grab the last four files they will have dates on them.
Once you find them zip all four up into a zip file then click Here to upload the zipped files please.
  • 0

#44
kahdah

kahdah

    GeekU Teacher

  • Retired Staff
  • 15,822 posts
Hi was that the latest blue screen files (minidumps) that were present?
Those are from Jan 09.
They actually say that the file system is possibly corrupted.

Thanks for your donation too :)
  • 0

#45
Capriboy

Capriboy

    Member

  • Topic Starter
  • Member
  • PipPip
  • 65 posts
Yes, those were the most recent dates. In the folder the earliest date is 2/11/2008 and the last date 1/26/2009.

So, what does this mean? Is there any other place these types of files could go?
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP