Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

infected with unknown virus


  • This topic is locked This topic is locked
15 replies to this topic

#1 lilelliott

lilelliott

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:55 AM

Posted 20 October 2009 - 02:29 PM

The internet wont allow us in to some web sites and the ones that it does we cant do much on them and we cant get some of the computer functions to work we've tried alot of different scans but they dont find anything other then cookies. When i ran a rootrepeal scan it wouldn't work it would say error and exit out of it. We also had a friend give us some sites and scans to run and when i tried to run Dr.Web CureIt the full scan would shut our computer down and show a blue screen saying an infection wa found and for safety reasons it is shutting down. On this webpage i don't know why but there isn't and attchment part for me to upload the attachment of the dds scan so i'm just guna put it at the end of the dds scan.

DDS (Ver_09-10-13.01) - NTFSx86
Run by Heidi at 19:42:47.82 on Mon 10/19/2009
Internet Explorer: 7.0.6000.16809

============== Pseudo HJT Report ===============

uSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
uStart Page = hxxp://www.yahoo.com/
uWindow Title = Internet Explorer provided by Dell
uSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
mStart Page = hxxp://www.yahoo.com/
mDefault_Page_URL = hxxp://www.yahoo.com/
mDefault_Search_URL = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
mSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
uURLSearchHooks: N/A: {0579b4b6-0293-4d73-b02d-5ebb0ba0f0a2} - c:\program files\asksbar\srchastt\1.bin\A2SRCHAS.DLL
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
BHO: Ask Search Assistant BHO: {0579b4b1-0293-4d73-b02d-5ebb0ba0f0a2} - c:\program files\asksbar\srchastt\1.bin\A2SRCHAS.DLL
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: McAfee Phishing Filter: {27b4851a-3207-45a2-b947-be8afe6163ab} - c:\progra~1\mcafee\msk\mskapbho.dll
BHO: Yahoo! IE Services Button: {5bab4b5b-68bc-4b02-94d6-2fc0de4a7897} - c:\program files\yahoo!\common\yiesrvc.dll
BHO: NCO 2.0 IE BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\common files\symantec shared\coshared\browser\2.5\coIEPlg.dll
BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\progra~1\common~1\symant~1\ids\IPSBHO.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0\bin\ssv.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\progra~1\mcafee\viruss~1\scriptsn.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar1.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: CBrowserHelperObject Object: {ca6319c0-31b7-401e-a518-a07c3db8f777} - c:\program files\bae\BAE.dll
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: Show Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\common files\symantec shared\coshared\browser\2.5\CoIEPlg.dll
uRun: [DellSupport] "c:\program files\dellsupport\DSAgnt.exe" /startup
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US ee://aol/imApp
uRun: [CTSyncU.exe] "c:\program files\creative\sync manager unicode\CTSyncU.exe"
uRun: [Yahoo! Pager] "c:\progra~1\yahoo!\messen~1\YAHOOM~1.EXE" -quiet
uRun: [AntiMalware_ProMFCT] c:\program files\antimalware_pro\Anti_Malware_Pro.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [NvSvc] RUNDLL32.EXE c:\windows\system32\nvsvc.dll,nvsvcStart
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [Corel Photo Downloader] c:\program files\corel\corel snapfire plus\PhotoDownloader.exe
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [<NO NAME>]
mRun: [ECenter] c:\dell\e-center\EULALauncher.exe
mRun: [Google Desktop Search] "c:\program files\google\google desktop search\GoogleDesktop.exe" /startup
mRun: [WPCUMI] c:\windows\system32\WpcUmi.exe
mRun: [FaxCenterServer] "c:\program files\dell pc fax\fm3032.exe" /s
mRun: [dlcxmon.exe] "c:\program files\dell photo aio printer 926\dlcxmon.exe"
mRun: [MemoryCardManager] "c:\program files\dell photo aio printer 926\memcard.exe"
mRun: [DLCXCATS] rundll32 c:\windows\system32\spool\drivers\w32x86\3\DLCXtime.dll,_RunDLLEntry@16
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [Easy Dock]
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [McENUI] c:\progra~1\mcafee\mhn\McENUI.exe /hide
mRun: [HotSync] "c:\program files\palmsource\desktop\HotSync.exe" -AllUsers
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [ISTray] "c:\program files\spyware doctor\pctsTray.exe"
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
IE: &Search
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0\bin\npjpi160.dll
IE: {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - c:\program files\yahoo!\common\yiesrvc.dll
LSP: c:\windows\system32\wpclsp.dll
Trusted Zone: real.com\rhap-app-4-0
Trusted Zone: real.com\rhapreg
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
AppInit_DLLs: c:\progra~1\google\google~2\GOEC62~1.DLL
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

============= SERVICES / DRIVERS ===============


=============== Created Last 30 ================

2009-10-19 19:30 195,440 -------- c:\windows\system32\MpSigStub.exe
2009-10-19 18:56 2,421,760 a------- c:\windows\system32\wucltux.dll
2009-10-19 18:55 171,608 a------- c:\windows\system32\wuwebv.dll
2009-10-19 18:55 33,792 a------- c:\windows\system32\wuapp.exe
2009-10-16 16:36 144,264,299 a------- c:\windows\MEMORY.DMP
2009-10-16 16:21 <DIR> --d----- c:\users\heidi\DoctorWeb
2009-10-14 19:05 <DIR> --d----- c:\program files\Norton Internet Security
2009-10-14 19:01 124,464 a------- c:\windows\system32\drivers\SYMEVENT.SYS
2009-10-14 19:01 10,635 a------- c:\windows\system32\drivers\SYMEVENT.CAT
2009-10-14 19:01 806 a------- c:\windows\system32\drivers\SYMEVENT.INF
2009-10-14 18:12 <DIR> --d----- c:\windows\E80F62FF5D3C4A1984099721F2928206.TMP
2009-10-08 16:17 159,600 a------- c:\windows\system32\drivers\pctgntdi.sys
2009-10-08 16:17 7,396 a------- c:\windows\system32\drivers\pctcore.cat
2009-10-08 16:17 206,256 a------- c:\windows\system32\drivers\PCTCore.sys
2009-10-08 16:17 86,888 a------- c:\windows\system32\drivers\PCTAppEvent.sys
2009-10-08 16:16 <DIR> --d----- c:\program files\common files\PC Tools
2009-10-08 16:16 64,392 a------- c:\windows\system32\drivers\pctplsg.sys
2009-10-08 16:16 <DIR> --d----- c:\users\heidi\appdata\roaming\PC Tools
2009-10-08 16:16 <DIR> --d----- c:\programdata\PC Tools
2009-10-08 16:16 <DIR> --d----- c:\program files\Spyware Doctor
2009-10-08 16:16 <DIR> --d----- c:\progra~2\PC Tools
2009-10-05 18:18 21,840 a------t c:\windows\system32\SIntfNT.dll
2009-10-05 18:18 17,212 a------t c:\windows\system32\SIntf32.dll
2009-10-05 18:18 12,067 a------t c:\windows\system32\SIntf16.dll
2009-10-05 16:02 <DIR> --d----- c:\users\heidi\appdata\roaming\Symantec
2009-10-05 15:51 <DIR> --d----- c:\program files\Symantec
2009-10-05 15:23 <DIR> --d----- c:\program files\common files\Symantec Shared

==================== Find3M ====================

2009-10-17 20:56 86,016 a------- c:\windows\inf\infstrng.dat
2009-10-17 20:56 86,016 a------- c:\windows\inf\infstor.dat
2009-10-17 20:56 51,200 a------- c:\windows\inf\infpub.dat
2009-09-10 14:54 38,224 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 14:53 19,160 a------- c:\windows\system32\drivers\mbam.sys
2009-06-06 21:36 1,242 a------- c:\users\heidi\appdata\roaming\wklnhst.dat
2008-12-12 17:07 174 a--sh--- c:\program files\desktop.ini
2008-06-11 16:22 665,600 a------- c:\windows\inf\drvindex.dat
2008-01-03 17:22 22,328 a------- c:\users\heidi\appdata\roaming\PnkBstrK.sys
2006-11-02 08:42 287,440 a------- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 08:42 287,440 a------- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 08:42 30,674 a------- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 08:42 30,674 a------- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 05:20 287,440 a------- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 05:20 287,440 a------- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 05:20 30,674 a------- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 05:20 30,674 a------- c:\windows\inf\perflib\0000\perfc.dat
2008-11-28 21:24 16,384 a--sh--- c:\windows\serviceprofiles\localservice\appdata\local\microsoft\windows\history\history.ie5\index.dat
2008-11-28 21:24 32,768 a--sh--- c:\windows\serviceprofiles\localservice\appdata\local\microsoft\windows\temporary internet files\content.ie5\index.dat
2008-11-28 21:24 16,384 a--sh--- c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\windows\cookies\index.dat
2007-08-08 09:58 16,384 a--sh--- c:\windows\temp\cookies\index.dat
2007-08-08 09:58 16,384 a--sh--- c:\windows\temp\history\history.ie5\index.dat
2007-08-08 09:58 32,768 a--sh--- c:\windows\temp\temporary internet files\content.ie5\index.dat
2007-08-02 13:02 8,192 a--sh--- c:\windows\users\default\NTUSER.DAT

============= FINISH: 19:47:16.92 ===============

Attach
DDS (Ver_09-10-13.01) - NTFSx86
Run by Heidi at 19:42:47.82 on Mon 10/19/2009
Internet Explorer: 7.0.6000.16809

============== Pseudo HJT Report ===============

uSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
uStart Page = hxxp://www.yahoo.com/
uWindow Title = Internet Explorer provided by Dell
uSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
mStart Page = hxxp://www.yahoo.com/
mDefault_Page_URL = hxxp://www.yahoo.com/
mDefault_Search_URL = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
mSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
uURLSearchHooks: N/A: {0579b4b6-0293-4d73-b02d-5ebb0ba0f0a2} - c:\program files\asksbar\srchastt\1.bin\A2SRCHAS.DLL
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
BHO: Ask Search Assistant BHO: {0579b4b1-0293-4d73-b02d-5ebb0ba0f0a2} - c:\program files\asksbar\srchastt\1.bin\A2SRCHAS.DLL
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: McAfee Phishing Filter: {27b4851a-3207-45a2-b947-be8afe6163ab} - c:\progra~1\mcafee\msk\mskapbho.dll
BHO: Yahoo! IE Services Button: {5bab4b5b-68bc-4b02-94d6-2fc0de4a7897} - c:\program files\yahoo!\common\yiesrvc.dll
BHO: NCO 2.0 IE BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\common files\symantec shared\coshared\browser\2.5\coIEPlg.dll
BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\progra~1\common~1\symant~1\ids\IPSBHO.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0\bin\ssv.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\progra~1\mcafee\viruss~1\scriptsn.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar1.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: CBrowserHelperObject Object: {ca6319c0-31b7-401e-a518-a07c3db8f777} - c:\program files\bae\BAE.dll
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: Show Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\common files\symantec shared\coshared\browser\2.5\CoIEPlg.dll
uRun: [DellSupport] "c:\program files\dellsupport\DSAgnt.exe" /startup
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US ee://aol/imApp
uRun: [CTSyncU.exe] "c:\program files\creative\sync manager unicode\CTSyncU.exe"
uRun: [Yahoo! Pager] "c:\progra~1\yahoo!\messen~1\YAHOOM~1.EXE" -quiet
uRun: [AntiMalware_ProMFCT] c:\program files\antimalware_pro\Anti_Malware_Pro.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [NvSvc] RUNDLL32.EXE c:\windows\system32\nvsvc.dll,nvsvcStart
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [Corel Photo Downloader] c:\program files\corel\corel snapfire plus\PhotoDownloader.exe
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [<NO NAME>]
mRun: [ECenter] c:\dell\e-center\EULALauncher.exe
mRun: [Google Desktop Search] "c:\program files\google\google desktop search\GoogleDesktop.exe" /startup
mRun: [WPCUMI] c:\windows\system32\WpcUmi.exe
mRun: [FaxCenterServer] "c:\program files\dell pc fax\fm3032.exe" /s
mRun: [dlcxmon.exe] "c:\program files\dell photo aio printer 926\dlcxmon.exe"
mRun: [MemoryCardManager] "c:\program files\dell photo aio printer 926\memcard.exe"
mRun: [DLCXCATS] rundll32 c:\windows\system32\spool\drivers\w32x86\3\DLCXtime.dll,_RunDLLEntry@16
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [Easy Dock]
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [McENUI] c:\progra~1\mcafee\mhn\McENUI.exe /hide
mRun: [HotSync] "c:\program files\palmsource\desktop\HotSync.exe" -AllUsers
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [ISTray] "c:\program files\spyware doctor\pctsTray.exe"
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
IE: &Search
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0\bin\npjpi160.dll
IE: {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - c:\program files\yahoo!\common\yiesrvc.dll
LSP: c:\windows\system32\wpclsp.dll
Trusted Zone: real.com\rhap-app-4-0
Trusted Zone: real.com\rhapreg
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
AppInit_DLLs: c:\progra~1\google\google~2\GOEC62~1.DLL
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

============= SERVICES / DRIVERS ===============


=============== Created Last 30 ================

2009-10-19 19:30 195,440 -------- c:\windows\system32\MpSigStub.exe
2009-10-19 18:56 2,421,760 a------- c:\windows\system32\wucltux.dll
2009-10-19 18:55 171,608 a------- c:\windows\system32\wuwebv.dll
2009-10-19 18:55 33,792 a------- c:\windows\system32\wuapp.exe
2009-10-16 16:36 144,264,299 a------- c:\windows\MEMORY.DMP
2009-10-16 16:21 <DIR> --d----- c:\users\heidi\DoctorWeb
2009-10-14 19:05 <DIR> --d----- c:\program files\Norton Internet Security
2009-10-14 19:01 124,464 a------- c:\windows\system32\drivers\SYMEVENT.SYS
2009-10-14 19:01 10,635 a------- c:\windows\system32\drivers\SYMEVENT.CAT
2009-10-14 19:01 806 a------- c:\windows\system32\drivers\SYMEVENT.INF
2009-10-14 18:12 <DIR> --d----- c:\windows\E80F62FF5D3C4A1984099721F2928206.TMP
2009-10-08 16:17 159,600 a------- c:\windows\system32\drivers\pctgntdi.sys
2009-10-08 16:17 7,396 a------- c:\windows\system32\drivers\pctcore.cat
2009-10-08 16:17 206,256 a------- c:\windows\system32\drivers\PCTCore.sys
2009-10-08 16:17 86,888 a------- c:\windows\system32\drivers\PCTAppEvent.sys
2009-10-08 16:16 <DIR> --d----- c:\program files\common files\PC Tools
2009-10-08 16:16 64,392 a------- c:\windows\system32\drivers\pctplsg.sys
2009-10-08 16:16 <DIR> --d----- c:\users\heidi\appdata\roaming\PC Tools
2009-10-08 16:16 <DIR> --d----- c:\programdata\PC Tools
2009-10-08 16:16 <DIR> --d----- c:\program files\Spyware Doctor
2009-10-08 16:16 <DIR> --d----- c:\progra~2\PC Tools
2009-10-05 18:18 21,840 a------t c:\windows\system32\SIntfNT.dll
2009-10-05 18:18 17,212 a------t c:\windows\system32\SIntf32.dll
2009-10-05 18:18 12,067 a------t c:\windows\system32\SIntf16.dll
2009-10-05 16:02 <DIR> --d----- c:\users\heidi\appdata\roaming\Symantec
2009-10-05 15:51 <DIR> --d----- c:\program files\Symantec
2009-10-05 15:23 <DIR> --d----- c:\program files\common files\Symantec Shared

==================== Find3M ====================

2009-10-17 20:56 86,016 a------- c:\windows\inf\infstrng.dat
2009-10-17 20:56 86,016 a------- c:\windows\inf\infstor.dat
2009-10-17 20:56 51,200 a------- c:\windows\inf\infpub.dat
2009-09-10 14:54 38,224 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 14:53 19,160 a------- c:\windows\system32\drivers\mbam.sys
2009-06-06 21:36 1,242 a------- c:\users\heidi\appdata\roaming\wklnhst.dat
2008-12-12 17:07 174 a--sh--- c:\program files\desktop.ini
2008-06-11 16:22 665,600 a------- c:\windows\inf\drvindex.dat
2008-01-03 17:22 22,328 a------- c:\users\heidi\appdata\roaming\PnkBstrK.sys
2006-11-02 08:42 287,440 a------- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 08:42 287,440 a------- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 08:42 30,674 a------- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 08:42 30,674 a------- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 05:20 287,440 a------- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 05:20 287,440 a------- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 05:20 30,674 a------- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 05:20 30,674 a------- c:\windows\inf\perflib\0000\perfc.dat
2008-11-28 21:24 16,384 a--sh--- c:\windows\serviceprofiles\localservice\appdata\local\microsoft\windows\history\history.ie5\index.dat
2008-11-28 21:24 32,768 a--sh--- c:\windows\serviceprofiles\localservice\appdata\local\microsoft\windows\temporary internet files\content.ie5\index.dat
2008-11-28 21:24 16,384 a--sh--- c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\windows\cookies\index.dat
2007-08-08 09:58 16,384 a--sh--- c:\windows\temp\cookies\index.dat
2007-08-08 09:58 16,384 a--sh--- c:\windows\temp\history\history.ie5\index.dat
2007-08-08 09:58 32,768 a--sh--- c:\windows\temp\temporary internet files\content.ie5\index.dat
2007-08-02 13:02 8,192 a--sh--- c:\windows\users\default\NTUSER.DAT

============= FINISH: 19:47:16.92 ===============

BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:55 AM

Posted 30 October 2009 - 08:17 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


And

We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.

    First Location
    Second Location
    Third Location

  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

Posted Image
m0le is a proud member of UNITE

#3 lilelliott

lilelliott
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:55 AM

Posted 01 November 2009 - 11:40 AM

DDS (Ver_09-10-13.01) - NTFSx86
Run by Heidi at 10:59:25.78 on Sun 11/01/2009
Internet Explorer: 7.0.6001.18000

============== Pseudo HJT Report ===============

uSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
uStart Page = hxxp://www.yahoo.com/
uWindow Title = Internet Explorer provided by Dell
uSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
mStart Page = hxxp://www.yahoo.com/
mDefault_Page_URL = hxxp://www.yahoo.com/
mDefault_Search_URL = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
mSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
uURLSearchHooks: N/A: {0579b4b6-0293-4d73-b02d-5ebb0ba0f0a2} - c:\program files\asksbar\srchastt\1.bin\A2SRCHAS.DLL
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
BHO: Ask Search Assistant BHO: {0579b4b1-0293-4d73-b02d-5ebb0ba0f0a2} - c:\program files\asksbar\srchastt\1.bin\A2SRCHAS.DLL
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: McAfee Phishing Filter: {27b4851a-3207-45a2-b947-be8afe6163ab} - c:\progra~1\mcafee\msk\mskapbho.dll
BHO: Yahoo! IE Services Button: {5bab4b5b-68bc-4b02-94d6-2fc0de4a7897} - c:\program files\yahoo!\common\yiesrvc.dll
BHO: NCO 2.0 IE BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\common files\symantec shared\coshared\browser\2.5\coIEPlg.dll
BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\progra~1\common~1\symant~1\ids\IPSBHO.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0\bin\ssv.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\progra~1\mcafee\viruss~1\scriptsn.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar1.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: CBrowserHelperObject Object: {ca6319c0-31b7-401e-a518-a07c3db8f777} - c:\program files\bae\BAE.dll
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: Show Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\common files\symantec shared\coshared\browser\2.5\CoIEPlg.dll
uRun: [DellSupport] "c:\program files\dellsupport\DSAgnt.exe" /startup
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US ee://aol/imApp
uRun: [CTSyncU.exe] "c:\program files\creative\sync manager unicode\CTSyncU.exe"
uRun: [Yahoo! Pager] "c:\progra~1\yahoo!\messen~1\YAHOOM~1.EXE" -quiet
uRun: [AntiMalware_ProMFCT] c:\program files\antimalware_pro\Anti_Malware_Pro.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [Corel Photo Downloader] c:\program files\corel\corel snapfire plus\PhotoDownloader.exe
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [<NO NAME>]
mRun: [ECenter] c:\dell\e-center\EULALauncher.exe
mRun: [Google Desktop Search] "c:\program files\google\google desktop search\GoogleDesktop.exe" /startup
mRun: [WPCUMI] c:\windows\system32\WpcUmi.exe
mRun: [FaxCenterServer] "c:\program files\dell pc fax\fm3032.exe" /s
mRun: [dlcxmon.exe] "c:\program files\dell photo aio printer 926\dlcxmon.exe"
mRun: [MemoryCardManager] "c:\program files\dell photo aio printer 926\memcard.exe"
mRun: [DLCXCATS] rundll32 c:\windows\system32\spool\drivers\w32x86\3\DLCXtime.dll,_RunDLLEntry@16
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [Easy Dock]
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [McENUI] c:\progra~1\mcafee\mhn\McENUI.exe /hide
mRun: [HotSync] "c:\program files\palmsource\desktop\HotSync.exe" -AllUsers
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [ISTray] "c:\program files\spyware doctor\pctsTray.exe"
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: &Search
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0\bin\npjpi160.dll
IE: {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - c:\program files\yahoo!\common\yiesrvc.dll
LSP: c:\windows\system32\wpclsp.dll
Trusted Zone: real.com\rhap-app-4-0
Trusted Zone: real.com\rhapreg
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
AppInit_DLLs: c:\progra~1\google\google~2\GOEC62~1.DLL
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

============= SERVICES / DRIVERS ===============


=============== Created Last 30 ================

2009-10-27 17:53 310,784 a------- c:\windows\system32\unregmp2.exe
2009-10-27 17:52 8,147,456 a------- c:\windows\system32\wmploc.DLL
2009-10-27 17:36 <DIR> --d----- c:\programdata\WindowsSearch
2009-10-25 21:08 0 a---h--- c:\windows\system32\drivers\Msft_User_WpdFs_01_00_00.Wdf
2009-10-25 11:22 147,456 a------- c:\windows\system32\Faultrep.dll
2009-10-25 11:22 125,952 a------- c:\windows\system32\wersvc.dll
2009-10-25 11:22 72,192 a------- c:\windows\system32\drivers\pacer.sys
2009-10-25 11:22 15,360 a------- c:\windows\system32\pacerprf.dll
2009-10-25 10:50 565,248 a------- c:\windows\system32\emdmgmt.dll
2009-10-25 10:50 625,152 a------- c:\windows\system32\drivers\dxgkrnl.sys
2009-10-25 10:50 148,480 a------- c:\windows\system32\drivers\nwifi.sys
2009-10-25 10:50 45,056 a------- c:\windows\system32\dataclen.dll
2009-10-25 10:50 36,864 a------- c:\windows\system32\cdd.dll
2009-10-25 10:39 430,080 a------- c:\windows\system32\vbscript.dll
2009-10-25 10:39 135,168 a------- c:\windows\system32\wshom.ocx
2009-10-25 10:39 90,112 a------- c:\windows\system32\wshext.dll
2009-10-25 10:39 155,648 a------- c:\windows\system32\wscript.exe
2009-10-25 10:39 135,168 a------- c:\windows\system32\cscript.exe
2009-10-25 10:39 180,224 a------- c:\windows\system32\scrobj.dll
2009-10-25 10:39 172,032 a------- c:\windows\system32\scrrun.dll
2009-10-24 21:32 <DIR> --d----- C:\PerfLogs
2009-10-23 17:08 <DIR> --d----- c:\programdata\NVIDIA
2009-10-23 02:41 97,800 a------- c:\windows\system32\infocardapi.dll
2009-10-23 02:41 105,016 a------- c:\windows\system32\PresentationCFFRasterizerNative_v0300.dll
2009-10-23 02:41 37,384 a------- c:\windows\system32\infocardcpl.cpl
2009-10-23 02:41 622,080 a------- c:\windows\system32\icardagt.exe
2009-10-23 02:41 11,264 a------- c:\windows\system32\icardres.dll
2009-10-23 02:41 43,544 a------- c:\windows\system32\PresentationHostProxy.dll
2009-10-23 02:41 781,344 a------- c:\windows\system32\PresentationNative_v0300.dll
2009-10-23 02:41 326,160 a------- c:\windows\system32\PresentationHost.exe
2009-10-23 02:26 49,152 a------- c:\windows\ocsetup_cbs_install_NetFx3.perf
2009-10-23 02:26 16,384 a------- c:\windows\ocsetup_cbs_install_NetFx3.dpx
2009-10-23 02:26 57,737,216 a------- c:\windows\ocsetup_install_NetFx3.etl
2009-10-23 02:04 96,760 a------- c:\windows\system32\dfshim.dll
2009-10-23 02:04 282,112 a------- c:\windows\system32\mscoree.dll
2009-10-23 02:04 41,984 a------- c:\windows\system32\netfxperf.dll
2009-10-23 02:03 158,720 a------- c:\windows\system32\mscorier.dll
2009-10-23 02:02 83,968 a------- c:\windows\system32\mscories.dll
2009-10-20 14:54 2,048 a------- c:\windows\system32\tzres.dll
2009-10-19 18:30 195,440 -------- c:\windows\system32\MpSigStub.exe
2009-10-19 17:56 2,421,760 a------- c:\windows\system32\wucltux.dll
2009-10-19 17:55 87,552 a------- c:\windows\system32\wudriver.dll
2009-10-19 17:55 171,608 a------- c:\windows\system32\wuwebv.dll
2009-10-19 17:55 33,792 a------- c:\windows\system32\wuapp.exe
2009-10-16 15:36 144,264,299 a------- c:\windows\MEMORY.DMP
2009-10-16 15:21 <DIR> --d----- c:\users\heidi\DoctorWeb
2009-10-14 18:05 <DIR> --d----- c:\program files\Norton Internet Security
2009-10-14 18:01 124,464 a------- c:\windows\system32\drivers\SYMEVENT.SYS
2009-10-14 18:01 10,635 a------- c:\windows\system32\drivers\SYMEVENT.CAT
2009-10-14 18:01 806 a------- c:\windows\system32\drivers\SYMEVENT.INF
2009-10-14 17:53 13,780 a------- c:\windows\system32\wbem\lsasrv.mof
2009-10-14 17:53 1,256,448 a------- c:\windows\system32\lsasrv.dll
2009-10-14 17:53 439,896 a------- c:\windows\system32\drivers\ksecdd.sys
2009-10-14 17:53 213,504 a------- c:\windows\system32\msv1_0.dll
2009-10-14 17:53 175,104 a------- c:\windows\system32\wdigest.dll
2009-10-14 17:53 72,704 a------- c:\windows\system32\secur32.dll
2009-10-14 17:53 9,728 a------- c:\windows\system32\lsass.exe
2009-10-14 17:51 144,896 a------- c:\windows\system32\drivers\srv2.sys
2009-10-14 17:50 428,544 a------- c:\windows\system32\EncDec.dll
2009-10-14 17:50 217,088 a------- c:\windows\system32\psisrndr.ax
2009-10-14 17:50 293,376 a------- c:\windows\system32\psisdecd.dll
2009-10-14 17:50 177,664 a------- c:\windows\system32\mpg2splt.ax
2009-10-14 17:50 80,896 a------- c:\windows\system32\MSNP.ax
2009-10-14 17:49 3,546,184 a------- c:\windows\system32\ntoskrnl.exe
2009-10-14 17:49 3,597,896 a------- c:\windows\system32\ntkrnlpa.exe
2009-10-14 17:49 61,440 a------- c:\windows\system32\msasn1.dll
2009-10-14 17:40 604,672 a------- c:\windows\system32\WMSPDMOD.DLL
2009-10-14 17:12 <DIR> --d----- c:\windows\E80F62FF5D3C4A1984099721F2928206.TMP
2009-10-08 15:17 159,600 a------- c:\windows\system32\drivers\pctgntdi.sys
2009-10-08 15:17 7,396 a------- c:\windows\system32\drivers\pctcore.cat
2009-10-08 15:17 206,256 a------- c:\windows\system32\drivers\PCTCore.sys
2009-10-08 15:17 86,888 a------- c:\windows\system32\drivers\PCTAppEvent.sys
2009-10-08 15:16 <DIR> --d----- c:\program files\common files\PC Tools
2009-10-08 15:16 64,392 a------- c:\windows\system32\drivers\pctplsg.sys
2009-10-08 15:16 <DIR> --d----- c:\users\heidi\appdata\roaming\PC Tools
2009-10-08 15:16 <DIR> --d----- c:\programdata\PC Tools
2009-10-08 15:16 <DIR> --d----- c:\program files\Spyware Doctor
2009-10-08 15:16 <DIR> --d----- c:\progra~2\PC Tools
2009-10-05 17:18 21,840 a------t c:\windows\system32\SIntfNT.dll
2009-10-05 17:18 17,212 a------t c:\windows\system32\SIntf32.dll
2009-10-05 17:18 12,067 a------t c:\windows\system32\SIntf16.dll
2009-10-05 15:02 <DIR> --d----- c:\users\heidi\appdata\roaming\Symantec
2009-10-05 14:51 <DIR> --d----- c:\program files\Symantec
2009-10-05 14:23 <DIR> --d----- c:\program files\common files\Symantec Shared

==================== Find3M ====================

2009-10-26 21:02 1,320 a------- c:\users\heidi\appdata\roaming\wklnhst.dat
2009-10-24 22:12 174 a--sh--- c:\program files\desktop.ini
2009-10-24 22:01 86,016 a------- c:\windows\inf\infstrng.dat
2009-10-24 22:01 86,016 a------- c:\windows\inf\infstor.dat
2009-10-24 22:01 51,200 a------- c:\windows\inf\infpub.dat
2009-10-24 21:32 665,600 a------- c:\windows\inf\drvindex.dat
2009-10-24 19:05 101,888 a------- c:\windows\system32\ifxcardm.dll
2009-10-24 19:05 82,432 a------- c:\windows\system32\axaltocm.dll
2009-09-10 13:54 38,224 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 13:53 19,160 a------- c:\windows\system32\drivers\mbam.sys
2009-08-28 07:39 28,672 a------- c:\windows\system32\Apphlpdm.dll
2009-08-28 07:39 173,056 a------- c:\windows\apppatch\AcXtrnal.dll
2009-08-28 07:38 2,153,984 a------- c:\windows\apppatch\AcGenral.dll
2009-08-28 07:38 541,696 a------- c:\windows\apppatch\AcLayers.dll
2009-08-28 07:38 459,776 a------- c:\windows\apppatch\AcSpecfc.dll
2009-08-28 05:15 4,240,384 a------- c:\windows\system32\GameUXLegacyGDFs.dll
2009-08-14 11:29 104,960 a------- c:\windows\system32\netiohlp.dll
2009-08-14 11:29 17,920 a------- c:\windows\system32\netevent.dll
2009-08-14 09:16 17,920 a------- c:\windows\system32\ROUTE.EXE
2009-08-14 09:16 9,728 a------- c:\windows\system32\TCPSVCS.EXE
2009-08-14 09:16 11,264 a------- c:\windows\system32\MRINFO.EXE
2009-08-14 09:16 27,136 a------- c:\windows\system32\NETSTAT.EXE
2009-08-14 09:16 19,968 a------- c:\windows\system32\ARP.EXE
2009-08-14 09:16 10,240 a------- c:\windows\system32\finger.exe
2009-08-14 09:16 8,704 a------- c:\windows\system32\HOSTNAME.EXE
2008-01-03 16:22 22,328 a------- c:\users\heidi\appdata\roaming\PnkBstrK.sys
2006-11-02 07:42 287,440 a------- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 07:42 287,440 a------- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 07:42 30,674 a------- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 07:42 30,674 a------- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 04:20 287,440 a------- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 04:20 287,440 a------- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 04:20 30,674 a------- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 04:20 30,674 a------- c:\windows\inf\perflib\0000\perfc.dat
2008-11-28 20:24 16,384 a--sh--- c:\windows\serviceprofiles\localservice\appdata\local\microsoft\windows\history\history.ie5\index.dat
2008-11-28 20:24 32,768 a--sh--- c:\windows\serviceprofiles\localservice\appdata\local\microsoft\windows\temporary internet files\content.ie5\index.dat
2008-11-28 20:24 16,384 a--sh--- c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\windows\cookies\index.dat
2007-08-08 08:58 16,384 a--sh--- c:\windows\temp\cookies\index.dat
2007-08-08 08:58 16,384 a--sh--- c:\windows\temp\history\history.ie5\index.dat
2007-08-08 08:58 32,768 a--sh--- c:\windows\temp\temporary internet files\content.ie5\index.dat
2007-08-02 12:02 8,192 a--sh--- c:\windows\users\default\NTUSER.DAT

============= FINISH: 11:08:26.07 ===============
RootRepeal still wont work errors keep coming up during the scans

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:55 AM

Posted 01 November 2009 - 12:05 PM

Can you run Gmer, another rootkit scanner.

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
Posted Image
m0le is a proud member of UNITE

#5 lilelliott

lilelliott
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:55 AM

Posted 01 November 2009 - 05:27 PM

I tried both of the programs you gave me and the fisrt one main mirror sent me to the blue screen and it shut down and the second one zipped mirror ran for about 3 min and then windows sayed there was an error or problem with it and would close out of the program

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:55 AM

Posted 01 November 2009 - 05:33 PM

Almost definitely a rootkit stopping the programs working.

Please save this file to your desktop. Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK.

"%userprofile%\desktop\win32kdiag.exe" -f -r

When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please open it with notepad and post the contents here.

Thanks :(
Posted Image
m0le is a proud member of UNITE

#7 lilelliott

lilelliott
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:55 AM

Posted 01 November 2009 - 08:18 PM

Running from: C:\Users\Heidi\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O0OGDHL2\Win32kDiag[1].exe

Log file at : C:\Users\Heidi\Desktop\Win32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:\Windows'...



Cannot access: C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTDiagLog.etl

[1] 2009-11-01 16:58:43 64 C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTDiagLog.etl ()



Cannot access: C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventLog-Application.etl

[1] 2009-11-01 16:56:45 0 C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventLog-Application.etl ()



Cannot access: C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventlog-Security.etl

[1] 2009-11-01 16:56:50 64 C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventlog-Security.etl ()



Cannot access: C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventLog-System.etl

[1] 2009-11-01 16:56:50 64 C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventLog-System.etl ()



Cannot access: C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTMsMpPsSession.etl

[1] 2009-11-01 16:57:58 0 C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTMsMpPsSession.etl ()





Finished!

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:55 AM

Posted 02 November 2009 - 06:22 AM

Now please run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thanks :(
Posted Image
m0le is a proud member of UNITE

#9 lilelliott

lilelliott
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:55 AM

Posted 02 November 2009 - 01:49 PM

ComboFix 09-11-01.04 - Heidi 11/02/2009 12:38.1.2 - NTFSx86
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.958.172 [GMT -5:00]
Running from: c:\users\Heidi\Desktop\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\$recycle.bin\S-1-5-21-1400113804-1914402855-3429530994-500
c:\$recycle.bin\S-1-5-21-2152478756-3922319563-605102323-500
c:\$recycle.bin\S-1-5-21-2523823763-2941547527-2570348705-1002
c:\$recycle.bin\S-1-5-21-2523823763-2941547527-2570348705-500
c:\programdata\Microsoft\Network\Downloader\qmgr0.dat
c:\programdata\Microsoft\Network\Downloader\qmgr1.dat
c:\users\ian\Favorites\translator.url

----- BITS: Possible infected sites -----

hxxp://photobucket.com
hxxp://th9.photobucket.com
hxxp://th567.photobucket.com
hxxp://bp3.blogger.com
hxxp://bp0.blogger.com
hxxp://bp2.blogger.com
hxxp://bp1.blogger.com
hxxp://th89.photobucket.com
hxxp://th700.photobucket.com
hxxp://th787.photobucket.com
hxxp://th573.photobucket.com
hxxp://th173.photobucket.com
hxxp://th224.photobucket.com
hxxp://th52.photobucket.com
hxxp://pic.photobucket.com
hxxp://i0006.photobucket.com
hxxp://feed.photobucket.com
.
((((((((((((((((((((((((( Files Created from 2009-10-02 to 2009-11-02 )))))))))))))))))))))))))))))))
.

2009-11-02 18:11 . 2009-11-02 18:11 -------- d-----w- c:\users\Default\AppData\Local\temp
2009-11-02 18:11 . 2009-11-02 18:11 -------- d-----w- c:\users\sean.Heidi-PC\AppData\Local\temp
2009-11-02 18:11 . 2009-11-02 18:11 -------- d-----w- c:\users\ian\AppData\Local\temp
2009-11-01 21:10 . 2009-11-01 21:10 87040 ----a-w- C:\pglcipob.sys
2009-10-27 22:53 . 2009-09-10 15:21 310784 ----a-w- c:\windows\system32\unregmp2.exe
2009-10-27 22:52 . 2009-09-10 15:21 8147456 ----a-w- c:\windows\system32\wmploc.DLL
2009-10-27 22:36 . 2009-10-27 22:36 -------- d-----w- c:\programdata\WindowsSearch
2009-10-25 16:22 . 2008-09-18 04:56 125952 ----a-w- c:\windows\system32\wersvc.dll
2009-10-25 16:22 . 2008-09-18 04:56 147456 ----a-w- c:\windows\system32\Faultrep.dll
2009-10-25 16:22 . 2008-04-05 03:34 15360 ----a-w- c:\windows\system32\pacerprf.dll
2009-10-25 16:22 . 2008-04-05 01:21 72192 ----a-w- c:\windows\system32\drivers\pacer.sys
2009-10-25 15:50 . 2008-06-26 03:29 565248 ----a-w- c:\windows\system32\emdmgmt.dll
2009-10-25 15:50 . 2008-08-02 01:01 625152 ----a-w- c:\windows\system32\drivers\dxgkrnl.sys
2009-10-25 15:50 . 2008-06-26 03:29 45056 ----a-w- c:\windows\system32\dataclen.dll
2009-10-25 15:50 . 2008-05-20 02:07 148480 ----a-w- c:\windows\system32\drivers\nwifi.sys
2009-10-25 15:50 . 2008-08-02 03:26 36864 ----a-w- c:\windows\system32\cdd.dll
2009-10-25 15:39 . 2008-05-08 21:59 430080 ----a-w- c:\windows\system32\vbscript.dll
2009-10-25 15:39 . 2008-05-08 21:59 90112 ----a-w- c:\windows\system32\wshext.dll
2009-10-25 15:39 . 2008-05-08 21:59 155648 ----a-w- c:\windows\system32\wscript.exe
2009-10-25 15:39 . 2008-05-08 21:58 135168 ----a-w- c:\windows\system32\cscript.exe
2009-10-25 15:39 . 2008-05-08 21:59 180224 ----a-w- c:\windows\system32\scrobj.dll
2009-10-25 15:39 . 2008-05-08 21:59 172032 ----a-w- c:\windows\system32\scrrun.dll
2009-10-25 02:32 . 2009-10-25 02:32 -------- d-----w- C:\PerfLogs
2009-10-23 22:08 . 2009-10-23 22:09 -------- d-----w- c:\programdata\NVIDIA
2009-10-23 07:41 . 2008-06-20 01:17 97800 ----a-w- c:\windows\system32\infocardapi.dll
2009-10-23 07:41 . 2008-06-20 01:18 105016 ----a-w- c:\windows\system32\PresentationCFFRasterizerNative_v0300.dll
2009-10-23 07:41 . 2008-06-20 01:17 622080 ----a-w- c:\windows\system32\icardagt.exe
2009-10-23 07:41 . 2008-06-20 01:17 11264 ----a-w- c:\windows\system32\icardres.dll
2009-10-23 07:41 . 2008-06-20 01:18 43544 ----a-w- c:\windows\system32\PresentationHostProxy.dll
2009-10-23 07:41 . 2008-06-20 01:18 781344 ----a-w- c:\windows\system32\PresentationNative_v0300.dll
2009-10-23 07:41 . 2008-06-20 01:18 326160 ----a-w- c:\windows\system32\PresentationHost.exe
2009-10-23 07:04 . 2008-07-27 18:00 96760 ----a-w- c:\windows\system32\dfshim.dll
2009-10-23 07:04 . 2008-07-27 18:00 282112 ----a-w- c:\windows\system32\mscoree.dll
2009-10-23 07:04 . 2008-07-27 18:00 41984 ----a-w- c:\windows\system32\netfxperf.dll
2009-10-23 07:03 . 2008-07-27 18:00 158720 ----a-w- c:\windows\system32\mscorier.dll
2009-10-23 07:02 . 2008-07-27 18:00 83968 ----a-w- c:\windows\system32\mscories.dll
2009-10-20 19:54 . 2009-06-22 10:22 2048 ----a-w- c:\windows\system32\tzres.dll
2009-10-19 23:30 . 2009-10-01 14:29 195440 ------w- c:\windows\system32\MpSigStub.exe
2009-10-19 22:56 . 2009-08-07 02:24 44768 ----a-w- c:\windows\system32\wups2.dll
2009-10-19 22:56 . 2009-08-07 02:24 53472 ----a-w- c:\windows\system32\wuauclt.exe
2009-10-19 22:56 . 2009-08-07 02:23 1929952 ----a-w- c:\windows\system32\wuaueng.dll
2009-10-19 22:56 . 2009-08-07 01:45 2421760 ----a-w- c:\windows\system32\wucltux.dll
2009-10-19 22:55 . 2009-08-07 02:24 35552 ----a-w- c:\windows\system32\wups.dll
2009-10-19 22:55 . 2009-08-07 02:23 575704 ----a-w- c:\windows\system32\wuapi.dll
2009-10-19 22:55 . 2009-08-07 01:44 87552 ----a-w- c:\windows\system32\wudriver.dll
2009-10-19 22:55 . 2009-08-06 23:23 171608 ----a-w- c:\windows\system32\wuwebv.dll
2009-10-19 22:55 . 2009-08-06 22:44 33792 ----a-w- c:\windows\system32\wuapp.exe
2009-10-16 20:21 . 2009-10-16 20:21 -------- d-----w- c:\users\Heidi\DoctorWeb
2009-10-14 23:05 . 2009-10-18 01:58 -------- d-----w- c:\program files\Norton Internet Security
2009-10-14 23:01 . 2009-10-18 01:02 124464 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2009-10-14 22:53 . 2009-09-10 17:30 213504 ----a-w- c:\windows\system32\msv1_0.dll
2009-10-14 22:53 . 2009-06-15 18:20 439896 ----a-w- c:\windows\system32\drivers\ksecdd.sys
2009-10-14 22:53 . 2009-06-15 15:23 1256448 ----a-w- c:\windows\system32\lsasrv.dll
2009-10-14 22:53 . 2009-06-15 15:24 175104 ----a-w- c:\windows\system32\wdigest.dll
2009-10-14 22:53 . 2009-06-15 15:24 72704 ----a-w- c:\windows\system32\secur32.dll
2009-10-14 22:53 . 2009-06-15 12:57 9728 ----a-w- c:\windows\system32\lsass.exe
2009-10-14 22:51 . 2009-09-14 09:44 144896 ----a-w- c:\windows\system32\drivers\srv2.sys
2009-10-14 22:50 . 2009-08-31 13:55 428544 ----a-w- c:\windows\system32\EncDec.dll
2009-10-14 22:50 . 2009-08-31 13:55 293376 ----a-w- c:\windows\system32\psisdecd.dll
2009-10-14 22:49 . 2009-08-05 14:22 3546184 ----a-w- c:\windows\system32\ntoskrnl.exe
2009-10-14 22:49 . 2009-08-05 14:22 3597896 ----a-w- c:\windows\system32\ntkrnlpa.exe
2009-10-14 22:49 . 2009-09-04 12:24 61440 ----a-w- c:\windows\system32\msasn1.dll
2009-10-14 22:40 . 2009-04-02 12:37 604672 ----a-w- c:\windows\system32\WMSPDMOD.DLL
2009-10-14 22:12 . 2009-10-14 22:12 -------- d-----w- c:\windows\E80F62FF5D3C4A1984099721F2928206.TMP
2009-10-13 00:03 . 2009-10-13 00:03 -------- d-----w- c:\users\sean.Heidi-PC\AppData\Roaming\SUPERAntiSpyware.com
2009-10-12 22:21 . 2009-10-12 22:44 680 ----a-w- c:\users\ian\AppData\Local\d3d9caps.dat
2009-10-12 22:10 . 2009-10-12 22:10 -------- d-----w- c:\users\ian\AppData\Roaming\SUPERAntiSpyware.com
2009-10-08 20:17 . 2008-12-11 12:38 159600 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2009-10-08 20:17 . 2009-08-24 18:05 206256 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2009-10-08 20:17 . 2009-08-19 15:01 86888 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2009-10-08 20:16 . 2009-10-08 20:24 -------- d-----w- c:\program files\Common Files\PC Tools
2009-10-08 20:16 . 2008-12-10 15:36 64392 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2009-10-08 20:16 . 2009-11-02 17:20 -------- d-----w- c:\program files\Spyware Doctor
2009-10-08 20:16 . 2009-10-08 20:16 -------- d-----w- c:\users\Heidi\AppData\Roaming\PC Tools
2009-10-08 20:16 . 2009-10-08 20:16 -------- d-----w- c:\programdata\PC Tools
2009-10-07 00:02 . 2009-10-07 00:02 -------- d-----w- c:\users\sean.Heidi-PC\AppData\Roaming\Symantec
2009-10-05 22:18 . 2009-10-10 18:37 21840 ----atw- c:\windows\system32\SIntfNT.dll
2009-10-05 22:18 . 2009-10-10 18:37 17212 ----atw- c:\windows\system32\SIntf32.dll
2009-10-05 22:18 . 2009-10-10 18:37 12067 ----atw- c:\windows\system32\SIntf16.dll
2009-10-05 22:10 . 2009-10-05 22:10 -------- d-----w- c:\users\ian\AppData\Roaming\Symantec
2009-10-05 20:02 . 2009-10-05 20:02 -------- d-----w- c:\users\Heidi\AppData\Roaming\Symantec
2009-10-05 19:51 . 2009-10-18 01:03 -------- d-----w- c:\program files\Symantec
2009-10-05 19:23 . 2009-10-18 01:58 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-10-05 13:00 . 2009-10-05 13:01 680 ----a-w- c:\users\Heidi\AppData\Local\d3d9caps.dat

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-10-29 02:42 . 2007-08-08 14:35 2126 ----a-w- c:\users\ian\AppData\Roaming\wklnhst.dat
2009-10-27 02:02 . 2007-11-11 05:01 1320 ----a-w- c:\users\Heidi\AppData\Roaming\wklnhst.dat
2009-10-26 02:08 . 2009-10-26 02:08 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_00_00.Wdf
2009-10-25 02:44 . 2006-11-02 12:37 -------- d-----w- c:\program files\Windows Calendar
2009-10-25 02:44 . 2006-11-02 12:37 -------- d-----w- c:\program files\Windows Sidebar
2009-10-25 02:44 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2009-10-25 02:44 . 2006-11-02 12:37 -------- d-----w- c:\program files\Windows Collaboration
2009-10-25 02:43 . 2006-11-02 12:37 -------- d-----w- c:\program files\Windows Journal
2009-10-25 02:43 . 2006-11-02 12:37 -------- d-----w- c:\program files\Windows Photo Gallery
2009-10-25 02:43 . 2006-11-02 12:37 -------- d-----w- c:\program files\Windows Defender
2009-10-25 00:05 . 2006-11-02 10:32 101888 ----a-w- c:\windows\system32\ifxcardm.dll
2009-10-25 00:05 . 2006-11-02 10:32 82432 ----a-w- c:\windows\system32\axaltocm.dll
2009-10-18 01:02 . 2009-10-14 23:01 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2009-10-18 01:02 . 2009-10-14 23:01 10635 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2009-10-17 21:06 . 2008-02-15 21:45 -------- d-----w- c:\programdata\Symantec
2009-10-15 21:32 . 2009-05-23 19:34 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-10-09 20:22 . 2009-05-26 00:57 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-10-01 01:59 . 2009-10-01 01:39 102 ----a-w- c:\users\sean.Heidi-PC\AppData\Roaming\wklnhst.dat
2009-10-01 01:40 . 2009-10-01 01:40 -------- d-----w- c:\users\sean.Heidi-PC\AppData\Roaming\Template
2009-09-10 18:54 . 2009-05-26 00:57 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 18:53 . 2009-05-26 00:57 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-08-28 12:39 . 2009-09-02 21:57 28672 ----a-w- c:\windows\system32\Apphlpdm.dll
2009-08-28 10:15 . 2009-09-02 21:57 4240384 ----a-w- c:\windows\system32\GameUXLegacyGDFs.dll
2009-08-14 17:07 . 2009-09-08 22:29 897608 ----a-w- c:\windows\system32\drivers\tcpip.sys
2009-08-14 16:29 . 2009-09-08 22:29 104960 ----a-w- c:\windows\system32\netiohlp.dll
2009-08-14 16:29 . 2009-09-08 22:29 17920 ----a-w- c:\windows\system32\netevent.dll
2009-08-14 14:16 . 2009-09-08 22:29 17920 ----a-w- c:\windows\system32\ROUTE.EXE
2009-08-14 14:16 . 2009-09-08 22:29 9728 ----a-w- c:\windows\system32\TCPSVCS.EXE
2009-08-14 14:16 . 2009-09-08 22:29 11264 ----a-w- c:\windows\system32\MRINFO.EXE
2009-08-14 14:16 . 2009-09-08 22:29 27136 ----a-w- c:\windows\system32\NETSTAT.EXE
2009-08-14 14:16 . 2009-09-08 22:29 19968 ----a-w- c:\windows\system32\ARP.EXE
2009-08-14 14:16 . 2009-09-08 22:29 8704 ----a-w- c:\windows\system32\HOSTNAME.EXE
2009-08-14 14:16 . 2009-09-08 22:29 10240 ----a-w- c:\windows\system32\finger.exe
2007-08-02 17:02 . 2007-08-02 17:01 8192 --sha-w- c:\windows\Users\Default\NTUSER.DAT
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DellSupport"="c:\program files\DellSupport\DSAgnt.exe" [2007-03-15 460784]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"Aim6"="c:\program files\AIM6\aim6.exe" [2008-03-25 50528]
"CTSyncU.exe"="c:\program files\Creative\Sync Manager Unicode\CTSyncU.exe" [2006-09-29 700416]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-10-15 2000112]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2006-10-03 81920]
"ECenter"="c:\dell\E-Center\EULALauncher.exe" [2007-03-16 17920]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-08-07 29744]
"WPCUMI"="c:\windows\system32\WpcUmi.exe" [2006-11-02 176128]
"FaxCenterServer"="c:\program files\Dell PC Fax\fm3032.exe" [2006-11-03 312200]
"dlcxmon.exe"="c:\program files\Dell Photo AIO Printer 926\dlcxmon.exe" [2007-01-12 292336]
"MemoryCardManager"="c:\program files\Dell Photo AIO Printer 926\memcard.exe" [2006-11-03 304008]
"DLCXCATS"="c:\windows\system32\spool\DRIVERS\W32X86\3\DLCXtime.dll" [2006-10-16 106496]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-02-01 385024]
"mcagent_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2009-07-10 645328]
"McENUI"="c:\progra~1\McAfee\MHN\McENUI.exe" [2009-07-08 1176808]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"ISTray"="c:\program files\Spyware Doctor\pctsTray.exe" [2009-07-23 1181064]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2008-10-17 51048]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-05-03 13535776]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-05-03 92704]
"RtHDVCpl"="RtHDVCpl.exe" - c:\windows\RtHDVCpl.exe [2007-03-15 4390912]

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2007-8-2 50688]
HotSync Manager.lnk - c:\program files\Palm\Hotsync.exe [2008-1-3 1392640]
Snapfish PictureMover.lnk - c:\program files\Snapfish PictureMover\PictureMover.exe [2007-8-22 475136]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-06 22:22 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\progra~1\Google\GOOGLE~2\GoogleDesktopNetwork3.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdauxservice]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\sdcoreservice]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

R0 PCTCore;PCTools KDS;c:\windows\System32\drivers\PCTCore.sys [10/8/2009 3:17 PM 206256]
R1 IDSvix86;Symantec Intrusion Prevention Driver;c:\progra~2\Symantec\DEFINI~1\SymcData\ipsdefs\20091101.001\IDSvix86.sys [11/1/2009 11:16 AM 272432]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [5/14/2009 1:22 PM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [5/14/2009 1:22 PM 74480]
R2 dlcx_device;dlcx_device;c:\windows\system32\dlcxcoms.exe -service --> c:\windows\system32\dlcxcoms.exe -service [?]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [10/16/2009 8:08 PM 102448]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [5/14/2009 1:22 PM 7408]
R3 SYMNDISV;SYMNDISV;c:\windows\System32\drivers\symndisv.sys [2/19/2009 12:31 PM 41008]
S3 COH_Mon;COH_Mon;c:\windows\System32\drivers\COH_Mon.sys [1/12/2008 9:32 PM 23888]
S3 GoogleDesktopManager-061008-081103;Google Desktop Manager 5.7.806.10245;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [8/2/2007 4:42 AM 29744]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - COMHOST
*NewlyCreated* - MBR
*NewlyCreated* - PROCEXP113
*Deregistered* - mbr
*Deregistered* - mchInjDrv
*Deregistered* - PROCEXP113
.
Contents of the 'Scheduled Tasks' folder

2009-05-15 c:\windows\Tasks\McDefragTask.job
- c:\progra~1\mcafee\mqc\QcConsol.exe [2009-08-22 01:26]

2009-03-01 c:\windows\Tasks\McQcTask.job
- c:\progra~1\mcafee\mqc\QcConsol.exe [2009-08-22 01:26]

2009-10-27 c:\windows\Tasks\Norton Internet Security - Run Full System Scan - Heidi.job
- c:\program files\Norton Internet Security\Norton AntiVirus\Navw32.exe [2008-02-07 14:05]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
mStart Page = hxxp://www.yahoo.com/
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
IE: &Search
LSP: c:\windows\system32\wpclsp.dll
Trusted Zone: real.com\rhap-app-4-0
Trusted Zone: real.com\rhapreg
.
- - - - ORPHANS REMOVED - - - -

URLSearchHooks-{0579B4B6-0293-4d73-B02D-5EBB0BA0F0A2} - c:\program files\AskSBar\SrchAstt\1.bin\A2SRCHAS.DLL
BHO-{0579B4B1-0293-4d73-B02D-5EBB0BA0F0A2} - c:\program files\AskSBar\SrchAstt\1.bin\A2SRCHAS.DLL
HKCU-Run-AntiMalware_ProMFCT - c:\program files\AntiMalware_Pro\Anti_Malware_Pro.exe
HKLM-Run-Corel Photo Downloader - c:\program files\Corel\Corel Snapfire Plus\PhotoDownloader.exe
HKLM-Run-HotSync - c:\program files\PalmSource\Desktop\HotSync.exe
HKLM-Run-Easy Dock - (no file)
SafeBoot-MCODS



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-11-02 13:13
Windows 6.0.6001 Service Pack 1 NTFS

detected NTDLL code modification:
ZwClose

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
DLCXCATS = rundll32 c:\windows\system32\spool\DRIVERS\W32X86\3\DLCXtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ogg\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pcm\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pls\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.spx\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2009-11-02 13:26
ComboFix-quarantined-files.txt 2009-11-02 18:25

Pre-Run: 77,949,603,840 bytes free
Post-Run: 78,857,134,080 bytes free

- - End Of File - - 5723B1AAF8F7A13A52B8D1EB801B19FD

#10 lilelliott

lilelliott
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:55 AM

Posted 02 November 2009 - 02:16 PM

hi our computer seems to be running like it used to after the combofix thank u so much but if there is something else we need to do the help will be greatly appreciated

#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:55 AM

Posted 02 November 2009 - 08:06 PM

Combofix tends to loosen the malware's grip but we aren't done yet, lilelliott.


Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Go to Jotti

When the jotti page has finished loading, click the Browse button and navigate to the following file and click Submit.

C:\pglcipob.sys

Please post back the results of the scan in your next post.

If Jotti is busy, try the same at VirusTotal


In the meantime please run MBAM

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.

The MBAM report should be quite light. We shall see :(
Posted Image
m0le is a proud member of UNITE

#12 lilelliott

lilelliott
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:55 AM

Posted 03 November 2009 - 04:06 PM

2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:55 AM

Posted 03 November 2009 - 05:44 PM

Can you post the entire log please.

Don't forget the MBAM scan :(
Posted Image
m0le is a proud member of UNITE

#14 lilelliott

lilelliott
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:55 AM

Posted 04 November 2009 - 02:53 PM

2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing 2009-11-03 Found nothing
2009-11-03 Found nothing
Malwarebytes' Anti-Malware 1.41
Database version: 3097
Windows 6.0.6001 Service Pack 1

11/3/2009 11:03:13 PM
mbam-log-2009-11-03 (23-03-13).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 302810
Time elapsed: 2 hour(s), 35 minute(s), 57 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:55 AM

Posted 04 November 2009 - 06:06 PM

Nice one :(

Your PC is clean, lilelliott.

You're clean. Good stuff! :(

Let's do some clearing up


Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Comfix /Uninstall in the runbox and click OK. (Notice the space between "Comfix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it lilelliott, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users