Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

infected wit IAPro


  • Please log in to reply
5 replies to this topic

#1 bamafaithful

bamafaithful

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Location:Birmingport,Alabama
  • Local time:07:29 AM

Posted 19 August 2009 - 11:35 AM

DDS (Ver_09-07-30.01) - NTFSx86
Run by Jimmy at 13:39:39.65 on Sun 01/05/2003
Internet Explorer: 6.0.2800.1106
Microsoft Windows XP Home Edition 5.1.2600.1.1252.1.1033.18.511.308 [GMT -6:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
SVCHOST.EXE
SVCHOST.EXE
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
C:\PROGRA~1\COMMON~1\AOL\ACS\acsd.exe
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\ntyp.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\WINDOWS\System32\DSentry.exe
C:\Program Files\Dell\Media Experience\PCMService.exe
C:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\Program Files\Lexmark X6100 Series\lxbfbmgr.exe
C:\Program Files\Lexmark X6100 Series\lxbfbmon.exe
C:\WINDOWS\addbb.exe
C:\Program Files\AT&T\Internet Security Wizard\ISW.exe
C:\WINDOWS\System32\hookdump.exe
C:\Documents and Settings\Jimmy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
C:\DOCUME~1\Jimmy\LOCALS~1\TempImages\sl1000.exe
C:\Program Files\Digital Line Detect\DLG.exe
c:\program files\Internet Antivirus Pro\IAPro.exe
C:\WINDOWS\System32\dwwin.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\Jimmy\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank
uSearch Page = res://c:\windows\system32\fsvzx.dll/sp.html#28129
uDefault_Page_URL = hxxp://www.dell.com
uSearch Bar = res://c:\windows\system32\fsvzx.dll/sp.html#28129
mDefault_Page_URL = about:blank
mDefault_Search_URL = res://c:\windows\system32\fsvzx.dll/sp.html#28129
mSearch Page = res://c:\windows\system32\fsvzx.dll/sp.html#28129
mStart Page = about:blank
mSearch Bar = res://c:\windows\system32\fsvzx.dll/sp.html#28129
uSearchAssistant = res://c:\windows\system32\fsvzx.dll/sp.html#28129
uSearchURL,(Default) = hxxp://www.forumswatcher.com/search.htm
mSearchAssistant = res://c:\windows\system32\fsvzx.dll/sp.html#28129
mURLSearchHooks: Class: {ced2c3d0-595a-c462-632c-4fbb27b89ab0} - c:\windows\sysup32.dll
BHO: Class: {ced2c3d0-595a-c462-632c-4fbb27b89ab0} - c:\windows\sysup32.dll
EB: Real.com: {fe54fa40-d68c-11d2-98fa-00c0f0318afe} - c:\windows\system32\Shdocvw.dll
EB: Media Band: {32683183-48a0-441b-a342-7c2a440a9478} - %SystemRoot%\System32\browseui.dll
uRun: [Intel system tool] c:\windows\system32\hookdump.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [swg] c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe
uRun: [Google Update] "c:\documents and settings\jimmy\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [MoneyAgent] "c:\program files\microsoft money\system\mnyexpr.exe"
uRun: [Microsoft Windows logon process] c:\documents and settings\jimmy\application data\microsoft\windows\winlogon.exe
uRun: [Internet Antivirus Pro] "c:\program files\internet antivirus pro\IAPro.exe" /s
uRun: [Wind Optimizer] "c:\program files\wind optimizer\WindOptimizer.exe" /s
uRun: [sl1000] c:\docume~1\jimmy\locals~1\tempimages\sl1000.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
mRun: [StorageGuard] "c:\program files\common files\sonic\update manager\sgtray.exe" /r
mRun: [DVDSentry] c:\windows\system32\DSentry.exe
mRun: [PCMService] "c:\program files\dell\media experience\PCMService.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [MCAgentExe] c:\progra~1\mcafee.com\agent\mcagent.exe
mRun: [MCUpdateExe] c:\progra~1\mcafee.com\agent\McUpdate.exe
mRun: [Lexmark X6100 Series] "c:\program files\lexmark x6100 series\lxbfbmgr.exe"
mRun: [DwlClient] c:\program files\common files\dell\eusw\Support.exe
mRun: [addbb.exe] c:\windows\addbb.exe
mRun: [ISW.exe] "c:\program files\at&t\internet security wizard\ISW.exe" /AUTORUN
mRunOnce: [ntyp.exe] c:\windows\ntyp.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\quicke~1.lnk - c:\program files\quicken\bagent.exe
IE: {c95fe080-8f5d-11d2-a20b-00aa003c157a} - %SystemRoot%\web\related.htm
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\MSMSGS.EXE
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {08B0E5C0-4FCB-11CF-AAA5-00401C608501}
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
DPF: {10000000-1000-0000-1000-000000000000} - file://c:\program files\internet explorer\mguubque.exe
DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} - c:\program files\yahoo!\common\Yinsthelper.dll
DPF: {33564D57-0000-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/F/6/E/F6E491A6-77E1-4E20-9F5F-94901338C922/wmv9VCM.CAB
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab

============= SERVICES / DRIVERS ===============

R2 ITGrdEngine;Guard Service;c:\documents and settings\jimmy\local settings\application data\microsoft\windows\services.exe [2003-9-25 194560]
S2 11F#`I;Workstation NetLogon Service;c:\windows\netyq32.exe /s --> c:\windows\netyq32.exe [?]
S2 mrtRate;mrtRate; [x]
S3 mcupdmgr.exe;McAfee SecurityCenter Update Manager;c:\progra~1\mcafee.com\agent\mcupdmgr.exe [2003-11-13 245760]

=============== Created Last 30 ================

2003-01-04 21:26 <DIR> --d----- c:\program files\Enigma Software Group
2003-01-02 08:24 787,512 a------- c:\windows\DELL.BMP
2002-12-25 12:55 11,407 a------- c:\windows\sysne.exe
2002-12-23 23:03 0 a------- c:\windows\system32\fsvzx.dll
2002-12-23 12:57 707 ac------ c:\windows\_DEFAULT.PIF
2002-12-21 17:02 11,407 a------- c:\windows\ntyp.exe
2002-12-17 17:43 10,752 a------- c:\windows\hh.exe
2002-12-16 09:56 1,510,655 ac------ c:\windows\system32\LXBFLPA.HLP
2002-12-10 13:35 495,089 ac------ c:\windows\system32\LXBFDRV.HLP

==================== Find3M ====================

2003-09-25 15:04 2,183,666 a------- c:\program files\common files\InternetAntivirusPro.exe
2003-09-25 15:02 30,208 a------- c:\program files\common files\file.exe
2002-12-29 04:00 24,064 ac------ c:\windows\system32\IntelNic.dll
2002-11-14 12:58 200,192 -c------ c:\windows\system32\ir50_qc.dll
2002-11-14 12:58 183,808 -c------ c:\windows\system32\ir50_qcx.dll
2002-11-14 12:58 338,432 -c------ c:\windows\system32\ir41_qcx.dll
2002-11-14 12:58 120,320 -c------ c:\windows\system32\ir41_qc.dll
2002-11-14 12:58 755,200 -------- c:\windows\system32\ir50_32.dll
2002-11-13 13:40 40,960 ac------ c:\windows\system32\lxbfvs.dll
2002-11-08 13:45 53,248 ac------ c:\windows\system32\DellSys.dll
2002-11-08 13:45 17,217 a------- c:\windows\system32\drivers\omci.sys
2002-10-29 17:33 27,786 ac------ c:\windows\system32\HSFCI005.dll
2002-10-09 23:26 147,456 ac------ c:\windows\system32\PRONtObj.dll

============= FINISH: 13:39:46.54 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:07:29 AM

Posted 21 August 2009 - 11:36 AM

Hello! :thumbup2:
My name is Sam and I will be helping you.

In order to see what's going on with your computer I will ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.


Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.




We need to create an OTL Report
  • Please download OTL from here
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the "Run Scan" button.
  • The scan should take just a few minutes.
  • Copy the log that opens up and paste it back here in your next reply.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 bamafaithful

bamafaithful
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Location:Birmingport,Alabama
  • Local time:07:29 AM

Posted 24 August 2009 - 11:16 AM

Malwarebytes' Anti-Malware 1.40
Database version: 2688
Windows 5.1.2600 Service Pack 1

1/10/2003 1:28:12 PM
mbam-log-2003-01-10 (13-28-12).txt

Scan type: Quick Scan
Objects scanned: 159365
Time elapsed: 16 minute(s), 32 second(s)

Memory Processes Infected: 4
Memory Modules Infected: 0
Registry Keys Infected: 14
Registry Values Infected: 5
Registry Data Items Infected: 0
Folders Infected: 7
Files Infected: 27

Memory Processes Infected:
C:\Documents and Settings\Jimmy\Local Settings\Application Data\Microsoft\Windows\services.exe (Trojan.FakeAlert) -> Unloaded process successfully.
c:\program files\Internet Antivirus Pro\IAPro.exe (Rogue.InternetAntiVirus) -> Unloaded process successfully.
C:\Documents and Settings\Jimmy\Application Data\Microsoft\Windows\winlogon.exe (Trojan.Dropper) -> Unloaded process successfully.
C:\Documents and Settings\Jimmy\Local Settings\TempImages\sl1000.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\itgrdengine (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\itgrdengine (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\itgrdengine (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{24fa19b2-738c-4320-0fd3-4e436fb09655} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2624e088-2428-1219-3e4b-3bbf81bb1ca2} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{5ab9366f-c6a7-c20a-7dd8-57e2b35c0934} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{5c19da3a-627a-8f16-ba65-30d8566cb9e4} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ab9e092a-bf8d-71dd-9aa4-6e0b78bfa0ce} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e118c993-3e95-588b-3737-defdc8eac743} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\antivirusgold (Rogue.AntiVirus.Gold) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet AntiVirus Pro_is1 (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ 11F#`I (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a512fb1c-927a-cc1e-86a8-0057b192600a} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a512fb1c-927a-cc1e-86a8-0057b192600a} (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\internet antivirus pro (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsoft windows logon process (Trojan.Dropper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\prs (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\uniname (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wind Optimizer (Rogue.WindOptimizer) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Documents and Settings\Barbara\Application Data\Internet Antivirus Pro (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Barbara\Application Data\Internet Antivirus Pro\db (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Application Data\Internet Antivirus Pro (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Application Data\Internet Antivirus Pro\db (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Application Data\Wind Optimizer (Rogue.WindOptimizer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Application Data\Wind Optimizer\db (Rogue.WindOptimizer) -> Quarantined and deleted successfully.
C:\Program Files\Internet Antivirus Pro (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\Jimmy\Local Settings\Application Data\Microsoft\Windows\services.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\program files\Internet Antivirus Pro\IAPro.exe (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Application Data\Microsoft\Windows\winlogon.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Local Settings\TempImages\sl1000.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\Common Files\file.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Program Files\Common Files\InternetAntivirusPro.exe (Rogue.InternetAntiVirusPro) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Application Data\Internet Antivirus Pro\db\config.cfg (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Application Data\Internet Antivirus Pro\db\Timeout.inf (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Application Data\Internet Antivirus Pro\db\Urls.inf (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Application Data\Wind Optimizer\db\Settings.ini (Rogue.WindOptimizer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Application Data\Wind Optimizer\db\Urls.inf (Rogue.WindOptimizer) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\d3if.dll (Adware.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\iphy.dll (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\ipol.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\msjy32.dll (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\msxl32.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\nethv32.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\netia32.dll (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\sstwq.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\systb.dll (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\syswm.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\winnb32.dll (Adware.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\winnt32.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Jimmy\Local Settings\Application Data\Microsoft\Windows\pguard.ini (Rogue.InternetAntiVirus) -> Quarantined and deleted successfully.
C:\WINDOWS\msfw.dll (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\javaee32.dll (Trojan.Tracur) -> Quarantined and deleted successfully.
C:\WINDOWS\msfu.dll (Trojan.BHO) -> Delete on reboot.

#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:07:29 AM

Posted 24 August 2009 - 01:25 PM

You forgot to post the OTL log.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 bamafaithful

bamafaithful
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Location:Birmingport,Alabama
  • Local time:07:29 AM

Posted 24 August 2009 - 07:38 PM

Sorry,I had to leave before the OTL finished scanning. And thanks for the help!



OTL logfile created on: 1/10/2003 1:41:33 PM - Run 1
OTL by OldTimer - Version 3.0.10.7 Folder = C:\Documents and Settings\Jimmy\Desktop
Windows XP Home Edition Service Pack 1 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 6.0.2800.1106)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

511.00 Mb Total Physical Memory | 251.25 Mb Available Physical Memory | 49.17% Memory free
1.22 Gb Paging File | 1.01 Gb Available in Paging File | 82.70% Paging File free
Paging file location(s): C:\pagefile.sys 768 1536 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 111.73 Gb Total Space | 101.60 Gb Free Space | 90.94% Space Free | Partition Type: NTFS
Drive D: | 420.24 Mb Total Space | 0.00 Mb Free Space | 0.00% Space Free | Partition Type: CDFS
Drive E: | 575.85 Mb Total Space | 0.00 Mb Free Space | 0.00% Space Free | Partition Type: CDFS
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: DJYYSS31
Current User Name: Jimmy
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: All users
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Standard

========== Processes (SafeList) ==========

#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:07:29 AM

Posted 25 August 2009 - 10:12 AM

That's only a very small portion of the log. Please post the entire log.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users