Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with AntiVirus Plus, Security Center, Security Tool and more


  • This topic is locked This topic is locked
12 replies to this topic

#1 Kameron

Kameron

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:10:20 PM

Posted 22 November 2009 - 09:51 AM

http://www.bleepingcomputer.com/forums/t/271750/unable-to-produce-logs-or-connect-to-internet-antivirus-pro-security-tool-security-center-and-more/

I started out in the BleepingComputer.com > Security > Am I infected? What do I do? thread firstly because I am unable to successfully run DDS, but I was able to run RootRepeal. It seems the problem has got much worse since it now blocks anything I try to launch. I recommend you take a look at my first thread to get more background information before trying to solve the problem. Thank you!

Attached Files

  • Attached File  ark.txt   18.88KB   2 downloads


BC AdBot (Login to Remove)

 


#2 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:20 PM

Posted 28 November 2009 - 10:34 AM

Hello,
Do you still desire help? Please outline your current problems and inform me of what you have done since your last post.
Kind regards,
~ t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#3 Kameron

Kameron
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:10:20 PM

Posted 29 November 2009 - 06:54 PM

Yes I do still need help please. I have not touched the computer whatsoever since this last post. If you could please check my previous thread for all the information and steps/errors: http://www.bleepingcomputer.com/forums/t/271750/unable-to-produce-logs-or-connect-to-internet-antivirus-pro-security-tool-security-center-and-more/ that would be great! Thanks!

#4 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:20 PM

Posted 29 November 2009 - 10:00 PM

Whew! Ugly. :(

Let's see what we can do.....

RKill by Grinler

Link #1
Link #2
Link #3
Link #4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Download Link #1.
  • Save it to your Desktop.
  • Double click the RKill desktop icon.
    If you are using Vista please right click and run as Admin!
  • A black screen will briefly flash indicating a successful run.
  • If this does not occur please delete that application and download Link #2.
  • Continue process until the tool runs.
  • If the tool does not run from any of the links tell me about it.
==========

Please download exeHelper to your desktop.
Double-click on exeHelper.com to run the fix.
A black window should pop up, press any key to close once the fix is completed.
Post the contents of exehelperlog.txt (Will be created in the directory where you ran exeHelper.com, and should open at the end of the scan)
Note: If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together (they will both be in the one file).

==========

Download and Run ComboFix (by sUBs)

You must rename it before saving it.

Posted Image

Posted Image

Please download ComboFix from one of these locations:

Link 1
Link 2

Save thcbytes.exe to your Desktop <-- Important!!!
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Please refer to this link for instructions.

  • Double click on thcbytes.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply

A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix on your own.
This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper


==========

With your next post please provide:

* Exehelper log
* Combofix.txt

Kind regards,
~t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#5 Kameron

Kameron
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:10:20 PM

Posted 01 December 2009 - 01:00 AM

Everything went smoothly except for installing the Microsoft Windows Recovery Console for some odd reason - I did have an internet connection! Nonetheless, here are the logs:

exeHelper by Raktor
Build 20091122
Run at 00:23:15 on 12/01/09
Now searching...
Checking for numerical processes...
Deleting file C:\Documents and Settings\All Users\Application Data\52464324\52464324.exe
Removing HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\52464324
Deleting file C:\Documents and Settings\All Users\Application Data\80932426\80932426.exe
Removing HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\80932426
Deleting file C:\Documents and Settings\All Users\Application Data\07376932\07376932.exe
Removing HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\07376932
Deleting file C:\Documents and Settings\All Users\Application Data\65863230\65863230.exe
Removing HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\65863230
Deleting file C:\Documents and Settings\All Users\Application Data\81904022\81904022.exe
Removing HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\81904022
Deleting file C:\Documents and Settings\All Users\Application Data\44309626\44309626.exe
Removing HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\44309626
Checking for sysguard processes...
Removing HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmigvwiw
Deleting file C:\Documents and Settings\Administrator\Local Settings\Application Data\qciisr\esiasysguard.exe
Removing HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmigvwiw
Checking for bad processes...
Checking for bad files...
Deleting file C:\WINDOWS\system32\critical_warning.html
Deleting file C:\WINDOWS\system32\calc.dll
Deleting file C:\WINDOWS\system32\winupdate86.exe
Deleting file C:\Documents and Settings\Administrator\Desktop\Security Tool.lnk
Deleting file C:\Documents and Settings\Administrator\ntuser.dll
Deleting file C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\scandisk.dll
Deleting file C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\scandisk.lnk
Deleting file C:\Documents and Settings\Administrator\Start Menu\Programs\Security Tool.lnk
Checking for bad registry entries...
Removing HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\calc
Removing HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdate86.exe
Resetting filetype association for .exe
Resetting filetype association for .com
Resetting userinit and shell values...
Resetting policies...
--Finished--

ComboFix 09-11-29.03 - Administrator 12/01/2009 0:29.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.511.329 [GMT -5:00]
Running from: c:\documents and settings\Administrator\Desktop\thecbytes.exe
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\docume~1\ADMINI~1\LOCALS~1\Temp\csrss.exe
c:\docume~1\ADMINI~1\LOCALS~1\Temp\lsass.exe
c:\docume~1\ADMINI~1\LOCALS~1\Temp\services.exe
c:\docume~1\ADMINI~1\LOCALS~1\Temp\svchost.exe
c:\docume~1\ADMINI~1\LOCALS~1\Temp\taskmgr.exe
c:\docume~1\ADMINI~1\LOCALS~1\Temp\winlogon.exe
c:\documents and settings\Administrator\Application Data\avp.ico
c:\documents and settings\Administrator\Application Data\Microsoft\Internet Explorer\Quick Launch\AntiVirus Plus.lnk
c:\documents and settings\Administrator\Desktop\AntiVirus Plus.lnk
c:\documents and settings\Administrator\Local Settings\Application Data\iuruya\dwhxsysguard.exe
c:\documents and settings\Administrator\Local Settings\Application Data\ttblkt\eeqxsysguard.exe
c:\documents and settings\Administrator\rundll32 .exe
c:\documents and settings\Administrator\Start Menu\Programs\AntiVirus Plus
c:\documents and settings\Administrator\Start Menu\Programs\AntiVirus Plus\AntiVirus Plus.lnk
c:\documents and settings\Administrator\Start Menu\Programs\AntiVirus Plus\EULA.url
c:\documents and settings\Administrator\Start Menu\Programs\Startup\AntiVirus Plus.lnk
c:\documents and settings\All Users\Application Data\35406018
c:\documents and settings\All Users\Application Data\35406018\35406018 .exe
c:\documents and settings\All Users\Application Data\35406018\35406018.exe
c:\documents and settings\All Users\Application Data\69525936
c:\documents and settings\All Users\Application Data\69525936\69525936 .exe
c:\documents and settings\All Users\Application Data\69525936\69525936.exe
c:\documents and settings\All Users\Application Data\98693237
c:\documents and settings\All Users\Application Data\98693237\98693237 .exe
c:\documents and settings\All Users\Application Data\98693237\98693237.exe
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\documents and settings\All Users\Start Menu\Programs\AntiVirus Plus
c:\documents and settings\All Users\Start Menu\Programs\AntiVirus Plus\AntiVirus Plus.lnk
c:\documents and settings\All Users\Start Menu\Programs\AntiVirus Plus\EULA.url
c:\documents and settings\All Users\Start Menu\Programs\Startup\AntiVirus Plus.lnk
c:\documents and settings\LocalService\Application Data\AntiVirus Plus
c:\documents and settings\LocalService\Application Data\AntiVirus Plus\AnTIvirus plus.70367201.dll
c:\documents and settings\LocalService\Application Data\avp.ico
c:\documents and settings\LocalService\ntuser.dll
c:\documents and settings\NetworkService\ntuser.dll
c:\program files\adobe\acrotray.exe
c:\windows\system32\__c0011FBE.dat
c:\windows\system32\__c00129FE.exe
c:\windows\system32\__c0015169.dat
c:\windows\system32\__c0015C79.dat
c:\windows\system32\__c00187CF.dat
c:\windows\system32\__c0023664.dat
c:\windows\system32\__c0024310.dat
c:\windows\system32\__c002BC79.dat
c:\windows\system32\__c0030C0A.dat
c:\windows\system32\__c0034810.dat
c:\windows\system32\__c003926A.dat
c:\windows\system32\__c003BA40.dat
c:\windows\system32\__c0045418.dat
c:\windows\system32\__c004778.dat
c:\windows\system32\__c0048C78.exe
c:\windows\system32\__c004B98A.dat
c:\windows\system32\__c005162C.dat
c:\windows\system32\__c0051690.dat
c:\windows\system32\__c0053435.dat
c:\windows\system32\__c0053A9F.dat
c:\windows\system32\__c00620F1.dat
c:\windows\system32\__c0070496.dat
c:\windows\system32\__c00755F4.dat
c:\windows\system32\__c0077F29.dat
c:\windows\system32\__c00798D7.dat
c:\windows\system32\__c007A64A.dat
c:\windows\system32\__c0085CC4.exe
c:\windows\system32\__c00890C3.dat
c:\windows\system32\__c0095239.dat
c:\windows\system32\__c0096AD2.dat
c:\windows\system32\__c00A8A89.dat
c:\windows\system32\__c00A8C1A.dat
c:\windows\system32\__c00ABC84.dat
c:\windows\system32\__c00B4724.dat
c:\windows\system32\__c00C2B46.dat
c:\windows\system32\__c00CB24A.exe
c:\windows\system32\__c00CB6CD.dat
c:\windows\system32\__c00CBBF1.dat
c:\windows\system32\__c00D8FE2.dat
c:\windows\system32\__c00D93E9.dat
c:\windows\system32\__c00D989E.dat
c:\windows\system32\__c00E1B8.exe
c:\windows\system32\__c00E8EB8.dat
c:\windows\system32\__c00E9AA1.dat
c:\windows\system32\__c00EEE90.dat
c:\windows\system32\__c00FAF01.dat
c:\windows\system32\__c00FAF6.dat
c:\windows\system32\__c00FB053.dat
c:\windows\system32\__c00FEFE1.dat
c:\windows\system32\bedamifu.exe
c:\windows\system32\config\systemprofile\ntuser.dll
c:\windows\system32\config\systemprofile\Start Menu\Programs\Startup\scandisk.dll
c:\windows\system32\config\systemprofile\Start Menu\Programs\Startup\scandisk.lnk
c:\windows\system32\ctfmon .exe
c:\windows\system32\fovisuga.dll
c:\windows\system32\fuwageza.exe
c:\windows\system32\guyugadu.dll
c:\windows\system32\hejitavo.dll
c:\windows\system32\hodisuye.dll
c:\windows\system32\hozekopo.dll
c:\windows\system32\iehelper.dll
c:\windows\system32\jevetedo.dll
c:\windows\system32\kekasika.dll
c:\windows\system32\lehebofi.dll
c:\windows\system32\lemibagi.dll
c:\windows\system32\lewuseze.dll
c:\windows\system32\likebowa.dll
c:\windows\system32\modisemi.dll
c:\windows\system32\najebofi.dll
c:\windows\system32\neletato.dll
c:\windows\system32\nevuzipa.exe
c:\windows\system32\ovwxjntb9.dll
c:\windows\system32\romemazu.dll
c:\windows\system32\rowuwoze.dll
c:\windows\system32\rundll32 .exe
c:\windows\system32\tebusuka.dll
c:\windows\system32\u0DNkxfk.dll
c:\windows\system32\vezurejo.dll
c:\windows\system32\wikufalu.dll
c:\windows\system32\winupdate86 .exe
c:\windows\system32\wofuhipe.dll
c:\windows\system32\wusasize.exe
c:\windows\system32\zerarapo.dll
c:\windows\system32\zugibiru.dll
c:\windows\Tasks\hfmxalks.job
c:\windows\Temp\4246998164.exe
C:\xcrashdump.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat . . . . failed to delete
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat . . . . failed to delete

----- BITS: Possible infected sites -----

hxxp://77.74.48.111
hxxp://82.98.235.29
hxxp://81.222.236.97
.
((((((((((((((((((((((((( Files Created from 2009-11-01 to 2009-12-01 )))))))))))))))))))))))))))))))
.

2009-11-18 20:32 . 2009-11-18 20:32 117760 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2009-11-18 20:32 . 2009-11-18 20:32 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-11-18 20:32 . 2009-11-22 14:47 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-11-18 20:32 . 2009-11-18 20:32 -------- d-----w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
2009-11-18 20:31 . 2009-11-18 20:31 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-11-18 03:06 . 2009-11-18 03:07 -------- d-----w- C:\Autoruns
2009-11-18 02:47 . 2009-11-18 02:47 -------- d-----w- c:\windows\system32\LogFiles
2009-11-18 02:23 . 2009-12-01 05:23 -------- d-----w- c:\documents and settings\All Users\Application Data\44309626
2009-11-18 02:23 . 2009-11-18 02:23 1209915 ----a-w- c:\documents and settings\All Users\Application Data\44309626\44309626 .exe
2009-11-18 02:00 . 2009-11-18 02:00 256570 ----a-w- c:\documents and settings\All Users\Application Data\65863230\65863230 .exe
2009-11-18 02:00 . 2009-11-18 02:00 255646 ----a-w- c:\documents and settings\All Users\Application Data\07376932\07376932 .exe
2009-11-17 02:19 . 2009-11-17 02:19 -------- d-----w- c:\documents and settings\Administrator\Application Data\AVG8
2009-11-17 02:12 . 2009-11-17 02:12 0 ----a-w- c:\windows\nsreg.dat
2009-11-17 02:12 . 2009-11-17 02:12 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla
2009-11-17 01:34 . 2009-11-17 01:34 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2009-11-17 01:34 . 2009-11-18 03:35 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-17 01:34 . 2009-11-17 01:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-11-17 01:16 . 2009-12-01 05:23 -------- d-----w- c:\documents and settings\All Users\Application Data\81904022
2009-11-17 01:16 . 2009-11-17 01:16 1208351 ----a-w- c:\documents and settings\All Users\Application Data\81904022\81904022 .exe
2009-11-16 22:35 . 2009-12-01 05:52 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\iuruya
2009-11-15 21:36 . 2009-12-01 05:23 -------- d-----w- c:\documents and settings\All Users\Application Data\65863230
2009-11-15 17:00 . 2009-11-15 19:22 241134 ----a-w- c:\documents and settings\All Users\Application Data\80932426\80932426 .exe
2009-11-15 02:00 . 2009-11-15 02:00 39428 ----a-w- C:\penmrdya.exe
2009-11-15 02:00 . 2009-11-15 15:03 52736 ----a-w- C:\aywdthl.exe
2009-11-10 00:17 . 2004-08-03 23:56 25600 ----a-w- c:\documents and settings\LocalService\Application Data\Microsoft\UPnP Device Host\upnphost\udhisapi.dll
2009-11-08 23:53 . 2009-11-08 23:53 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Blizzard Entertainment
2009-11-04 03:05 . 2009-11-04 03:05 -------- d-----w- c:\documents and settings\All Users\Application Data\Blizzard
2009-11-04 03:02 . 2009-11-15 02:56 -------- d-----w- c:\program files\Common Files\Blizzard Entertainment

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-01 05:52 . 2009-12-01 05:52 326858 ----a-w- c:\documents and settings\Administrator\rundll32.exe
2009-12-01 05:52 . 2009-12-01 05:52 308494 ----a-w- c:\documents and settings\Administrator\rundll32 .exe
2009-12-01 05:52 . 2008-06-19 20:54 -------- d-----w- c:\program files\iTunes
2009-12-01 05:23 . 2009-11-15 03:56 -------- d-----w- c:\documents and settings\All Users\Application Data\07376932
2009-12-01 05:23 . 2009-11-15 02:06 -------- d-----w- c:\documents and settings\All Users\Application Data\80932426
2009-12-01 05:23 . 2009-11-15 02:02 -------- d-----w- c:\documents and settings\All Users\Application Data\52464324
2009-11-17 01:39 . 2008-08-05 21:41 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2009-11-15 15:03 . 2009-11-15 15:03 23040 ----a-w- C:\hkkyaekg.exe
2009-11-15 15:03 . 2009-11-15 15:03 32768 ----a-w- C:\aruxss.exe
2009-11-15 15:03 . 2009-11-15 02:00 40960 ----a-w- C:\kewwr.exe
2009-11-15 15:03 . 2009-11-15 15:03 7680 ----a-w- C:\excbx.exe
2009-11-15 03:49 . 2009-11-15 03:28 198062 ----a-w- c:\documents and settings\All Users\Application Data\52464324\52464324 .exe
2009-11-15 02:06 . 2009-11-15 02:06 274 ----a-w- c:\documents and settings\All Users\Application Data\80932426\80932426.bat
2009-11-04 08:15 . 2009-01-25 21:39 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-11-04 02:44 . 2008-05-25 04:45 -------- d-----w- c:\documents and settings\Administrator\Application Data\Apple Computer
2009-11-04 02:44 . 2008-06-18 16:37 12792 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-28 01:03 . 2009-10-28 00:49 -------- d-----w- c:\program files\GodsWar Online
2009-10-15 07:28 . 2009-10-15 07:28 -------- d-----w- c:\documents and settings\LocalService\Application Data\McAfee
2009-10-15 01:23 . 2008-11-12 22:38 -------- d-----w- c:\documents and settings\LocalService\Application Data\SACore
2009-09-11 14:03 . 2004-08-03 23:56 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-04 20:45 . 2004-08-03 23:56 58880 ----a-w- c:\windows\system32\msasn1.dll
2009-08-16 22:19 . 2009-08-16 22:19 3 --sha-w- c:\windows\system32\gizisuyo.dll
2009-08-15 02:06 . 2009-08-15 02:06 1209915 --sha-w- c:\windows\system32\mojegawi.exe
2009-08-22 04:03 . 2009-08-22 04:03 41984 --sha-w- c:\windows\system32\welumiva.exe
2009-08-16 22:19 . 2009-08-16 22:19 4096 --sha-w- c:\windows\system32\zawibavu.dll
.
<pre>
c:\program files\Adobe\acrotray .exe
c:\program files\Google\GoogleToolbarNotifier\googletoolbarnotifier .exe
c:\program files\iTunes\ituneshelper .exe
c:\program files\Java\jre1.6.0_06\bin\jusched .exe
c:\program files\Pure Networks\Network Magic\nmapp .exe
c:\program files\SUPERAntiSpyware\superantispyware .exe
</pre>

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-12-01 319350]
"hfftjmet"="c:\documents and settings\Administrator\Local Settings\Application Data\ttblkt\eeqxsysguard.exe" [2009-12-01 302690]
"llkbaejg"="c:\documents and settings\Administrator\Local Settings\Application Data\iuruya\dwhxsysguard.exe" [2009-12-01 297138]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-11-22 288818]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-03 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-12-01 296266]
"nmapp"="c:\program files\Pure Networks\Network Magic\nmapp.exe" [2009-12-01 328330]
"hfftjmet"="c:\documents and settings\Administrator\Local Settings\Application Data\ttblkt\eeqxsysguard.exe" [2009-12-01 302690]
"35406018"="c:\docume~1\ALLUSE~1\APPLIC~1\35406018\35406018.exe" [N/A]
"llkbaejg"="c:\documents and settings\Administrator\Local Settings\Application Data\iuruya\dwhxsysguard.exe" [2009-12-01 297138]
"98693237"="c:\documents and settings\All Users\Application Data\98693237\98693237.exe" [N/A]
"69525936"="c:\docume~1\ALLUSE~1\APPLIC~1\69525936\69525936.exe" [N/A]
"sumahuviv"="c:\windows\system32\hejitavo.dll" [N/A]
"kehevukade"="zugibiru.dll" [N/A]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"ShowDeskFix"="shell32" [X]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Kodak EasyShare software.lnk - c:\program files\Kodak\Kodak EasyShare software\bin\EasyShare.exe [2007-9-19 282624]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 19:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Adobe\\acrotray .exe"=
"c:\\WINDOWS\\system32\\drwtsn32.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"67:UDP"= 67:UDP:DHCP Discovery Service

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [11/11/2009 10:44 AM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [11/11/2009 10:44 AM 74480]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [11/11/2009 10:44 AM 7408]
.
Contents of the 'Scheduled Tasks' folder

2009-11-11 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 18:57]

2009-12-01 c:\windows\Tasks\At1.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At10.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At11.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At12.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At13.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At14.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At15.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At16.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At17.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At18.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At19.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At2.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At20.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At21.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At22.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At23.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At24.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At3.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At4.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At5.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At6.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At7.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At8.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]

2009-12-01 c:\windows\Tasks\At9.job
- c:\program files\Adobe\acrotray.exe [2009-12-01 05:52]
.
.
------- Supplementary Scan -------
.
TCP: {1C0C7D5D-D59D-49F2-8C11-8B7665BD0A6F} = 77.74.48.113
TCP: {256FF631-7A51-4FFF-AE9B-0D493CCBF8C2} = 77.74.48.113
DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} - hxxp://lads.myspace.com/upload/MySpaceUploader2.cab
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
.
- - - - ORPHANS REMOVED - - - -

SharedTaskScheduler-{c1205def-ef37-4b1f-80ad-e126aa07ba54} - c:\windows\system32\hejitavo.dll
SharedTaskScheduler-{099b96ed-e4e5-48e9-9cb3-4999e8a598e6} - c:\windows\system32\hejitavo.dll
SharedTaskScheduler-{8c82de5a-ca3a-4f73-bd9a-1650fa8ca056} - c:\windows\system32\hejitavo.dll
SharedTaskScheduler-{e3ad560c-56a1-4113-8776-3c34d47a09d6} - c:\windows\system32\guyugadu.dll
SharedTaskScheduler-{f0676e18-18a7-41a5-9824-ffa72eb94367} - c:\windows\system32\guyugadu.dll
SharedTaskScheduler-{928ea750-7076-4524-bfb9-7351bce6ee55} - c:\windows\system32\guyugadu.dll
SharedTaskScheduler-{dd888190-a498-4feb-b414-8964105cc206} - c:\windows\system32\hejitavo.dll
SharedTaskScheduler-{2c79805c-d050-48b5-95a9-58a3e5aaff5d} - c:\windows\system32\rowuwoze.dll
SSODL-vijetihus-{c1205def-ef37-4b1f-80ad-e126aa07ba54} - c:\windows\system32\hejitavo.dll
SSODL-givofimum-{8c82de5a-ca3a-4f73-bd9a-1650fa8ca056} - c:\windows\system32\hejitavo.dll
SSODL-guvekitav-{e3ad560c-56a1-4113-8776-3c34d47a09d6} - c:\windows\system32\guyugadu.dll
SSODL-ruvalobuv-{f0676e18-18a7-41a5-9824-ffa72eb94367} - c:\windows\system32\guyugadu.dll
SSODL-dizapubih-{928ea750-7076-4524-bfb9-7351bce6ee55} - c:\windows\system32\guyugadu.dll
SSODL-gapabaged-{dd888190-a498-4feb-b414-8964105cc206} - c:\windows\system32\hejitavo.dll
SSODL-najamapas-{2c79805c-d050-48b5-95a9-58a3e5aaff5d} - c:\windows\system32\rowuwoze.dll



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-01 00:52
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(420)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(2972)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\wpdshserviceobj.dll
c:\windows\system32\portabledevicetypes.dll
c:\windows\system32\portabledeviceapi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Pure Networks\Network Magic\nmsrvc.exe
c:\windows\system32\wscntfy.exe
c:\program files\SUPERAntiSpyware\superantispyware .exe
c:\program files\Adobe\acrotray .exe
c:\program files\Adobe\acrotray .exe
c:\program files\Google\GoogleToolbarNotifier\googletoolbarnotifier .exe
c:\program files\Internet Explorer\iexplore.exe
.
**************************************************************************
.
Completion time: 2009-12-01 00:58 - machine was rebooted
ComboFix-quarantined-files.txt 2009-12-01 05:58

Pre-Run: 9,040,936,960 bytes free
Post-Run: 9,443,753,984 bytes free

- - End Of File - - A9AE8B9F13DC1A9105F7F5AE0982BE7B

#6 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:20 PM

Posted 01 December 2009 - 05:16 PM

You have a very seriously infected computer. :) You might be infected beyond repair. Please make sure you have an internet connection when you run Combofix.

==========

:( P2P Warning :(

Your log indicates that you have Limewire installed.

Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs.

- They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites.

- Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users.

- The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications. Read P2P Software User Advisories and Risks of File-Sharing Technology.

Note: It is pretty much certain that if you continue to use P2P programs, then you will get infected again.
I would recommend that you uninstall Limewire, however that choice is up to you. If you choose to remove these programs, you can do so via Control Panel>> Add / Remove Programs.

If you wish to keep it, please do not use it until your computer is cleaned.


==========

Re-run RKill & Exehelper

==========

:) Warning: This script was specifically written and designed for this user only. Unsupervised use of this tool could render your computer unbootable permanently!! :)

With malware infections being as they are today, it's strongly recommended to have the Windows Recovery Console pre-installed on your machine before doing any more malware removal.

The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.


Go to Microsoft's website => http://support.microsoft.com/kb/310994

Scroll down to Step 1, and select the download that's appropriate for your Operating System. Download the file & save it as it's originally named.

Note: If you have SP3, use the SP2 package.

--------------------------------------------------------------------
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Please refer to this link for instructions.

    Posted Image

  • Drag the setup package onto "thcbytes.exe" and drop it.

  • Follow the prompts to start ComboFix and when prompted, agree to the End-User License Agreement to install the Microsoft Recovery Console.


    Posted Image

  • At the next prompt, click 'No' to run the full ComboFix scan.

    ==========


    1. Close any open browsers.

    2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    3. Open notepad and copy/paste the text in the quotebox below into it:

    RenV::
    c:\program files\Adobe\acrotray .exe
    c:\program files\Google\GoogleToolbarNotifier\googletoolbarnotifier .exe
    c:\program files\iTunes\ituneshelper .exe
    c:\program files\Java\jre1.6.0_06\bin\jusched .exe
    c:\program files\Pure Networks\Network Magic\nmapp .exe
    c:\program files\SUPERAntiSpyware\superantispyware .exe

    File::
    C:\penmrdya.exe
    C:\aywdthl.exe
    c:\documents and settings\LocalService\Application Data\Microsoft\UPnP Device Host\upnphost\udhisapi.dll
    C:\hkkyaekg.exe
    C:\aruxss.exe
    C:\kewwr.exe
    C:\excbx.exe
    c:\windows\system32\gizisuyo.dll
    c:\windows\system32\mojegawi.exe
    c:\windows\system32\welumiva.exe
    c:\windows\system32\zawibavu.dll

    Folder::
    c:\documents and settings\All Users\Application Data\44309626
    c:\documents and settings\All Users\Application Data\65863230
    c:\documents and settings\All Users\Application Data\07376932
    c:\documents and settings\All Users\Application Data\81904022
    c:\documents and settings\Administrator\Local Settings\Application Data\iuruya
    c:\documents and settings\All Users\Application Data\80932426
    c:\documents and settings\All Users\Application Data\07376932
    c:\documents and settings\All Users\Application Data\52464324

    Registry::
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "hfftjmet"=-
    "llkbaejg"=-
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "hfftjmet"=-
    "35406018"=-
    "llkbaejg"=-
    "98693237"=-
    "69525936"=-
    "sumahuviv"=-
    "kehevukade"=-
    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
    "ShowDeskFix"=-
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "67:UDP"=-

    AtJob::

    DDS::
    TCP: {1C0C7D5D-D59D-49F2-8C11-8B7665BD0A6F} = 77.74.48.113
    TCP: {256FF631-7A51-4FFF-AE9B-0D493CCBF8C2} = 77.74.48.113


    Save this as CFScript.txt, in the same location as ComboFix.exe


    Posted Image

    Refering to the picture above, drag CFScript into ComboFix.exe

    When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

    ==========

    Perform an online scan with Kaspersky WebScanner. This can take a long time so please be patient.

    If you have troubles getting it to run.... - STOP - and tell me about it!

    (Requires free Java Runtime Environment (JRE) be installed before scanning for malware as ActiveX is no longer being used.)
    • Click on the Posted Image ...button.
    • The program will launch and fill in the Information section ... on the left.
    • Read the "Requirements and Limitations" then press... the Posted Image ...button.
    • The program will begin downloading the latest program and definition files.
      It takes a while... please be patient and let it finish.
    • Once the files have been downloaded, click on the Posted Image ...button.
      In the scan settings make sure the following are selected:[list]
    • Detect malicious programs of the following categories:
      Viruses, Worms, Trojan Horses, Rootkits
      Spyware, Adware, Dialers and other potentially dangerous programs
    • Scan compound files (doesn't apply to the File scan area):
      Archives
      Mail databases
      By default the above items should already be checked.
    • Click the Posted Image ...button, if you made any changes.
  • Now under the Scan section on the left:Select My Computer
  • The program will start and scan your system. This will run for a while, be patient... let it run.
    Once the scan is complete, it will display if your system has been infected.
  • Save the scan results as a Text file ... save it to your desktop.
  • Copy and paste the saved scan results file in your next reply.
Posted Image

==========

We need to create an OTL Report
  • Please download OTL from one of the following mirrors:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Under "Extra Registry" please check "Use Safelist" and also check "LOP Check" and "Purity Check" as pictured.Posted Image
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTListIt.txt <-- Will be opened
    • Extra.txt <-- Will be minimized
==========

With your next post please provide:

* Combofix.txt
* Kaspersky log
* OTL.txt
* Extra.txt
* How is your computer running?

Kind regards,
~t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#7 Kameron

Kameron
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:10:20 PM

Posted 02 December 2009 - 02:39 AM

I was wondering if you could help me remove McAfee completely please? As for the computer I've noticed a big difference so far, I can't wait to get it back to normal! I appreciate all your help so far!

ComboFix 09-11-29.03 - Administrator 12/01/2009 22:22.2.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.511.294 [GMT -5:00]
Running from: c:\documents and settings\Administrator\Desktop\thecbytes.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\CFScript.txt
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

FILE ::
"C:\aruxss.exe"
"C:\aywdthl.exe"
"c:\documents and settings\LocalService\Application Data\Microsoft\UPnP Device Host\upnphost\udhisapi.dll"
"C:\excbx.exe"
"C:\hkkyaekg.exe"
"C:\kewwr.exe"
"C:\penmrdya.exe"
"c:\windows\system32\gizisuyo.dll"
"c:\windows\system32\mojegawi.exe"
"c:\windows\system32\welumiva.exe"
"c:\windows\system32\zawibavu.dll"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\aruxss.exe
C:\aywdthl.exe
c:\documents and settings\Administrator\Local Settings\Application Data\iuruya
c:\documents and settings\Administrator\Local Settings\Application Data\iuruya\dwhxsysguard .exe
c:\documents and settings\Administrator\rundll32 .exe
c:\documents and settings\All Users\Application Data\07376932
c:\documents and settings\All Users\Application Data\07376932\07376932 .exe
c:\documents and settings\All Users\Application Data\44309626
c:\documents and settings\All Users\Application Data\44309626\44309626 .exe
c:\documents and settings\All Users\Application Data\52464324
c:\documents and settings\All Users\Application Data\52464324\52464324 .exe
c:\documents and settings\All Users\Application Data\65863230
c:\documents and settings\All Users\Application Data\65863230\65863230 .exe
c:\documents and settings\All Users\Application Data\80932426
c:\documents and settings\All Users\Application Data\80932426\80932426 .exe
c:\documents and settings\All Users\Application Data\80932426\80932426.bat
c:\documents and settings\All Users\Application Data\81904022
c:\documents and settings\All Users\Application Data\81904022\81904022 .exe
c:\documents and settings\LocalService\Application Data\Microsoft\UPnP Device Host\upnphost\udhisapi.dll
C:\excbx.exe
C:\hkkyaekg.exe
C:\kewwr.exe
C:\penmrdya.exe
c:\program files\adobe\acrotray.exe
c:\windows\system32\ctfmon .exe
c:\windows\system32\gizisuyo.dll
c:\windows\system32\mojegawi.exe
c:\windows\system32\rundll32 .exe
c:\windows\system32\welumiva.exe
c:\windows\system32\zawibavu.dll
c:\windows\Tasks\At1.job
c:\windows\Tasks\At10.job
c:\windows\Tasks\At11.job
c:\windows\Tasks\At12.job
c:\windows\Tasks\At13.job
c:\windows\Tasks\At14.job
c:\windows\Tasks\At15.job
c:\windows\Tasks\At16.job
c:\windows\Tasks\At17.job
c:\windows\Tasks\At18.job
c:\windows\Tasks\At19.job
c:\windows\Tasks\At2.job
c:\windows\Tasks\At20.job
c:\windows\Tasks\At21.job
c:\windows\Tasks\At22.job
c:\windows\Tasks\At23.job
c:\windows\Tasks\At24.job
c:\windows\Tasks\At3.job
c:\windows\Tasks\At4.job
c:\windows\Tasks\At5.job
c:\windows\Tasks\At6.job
c:\windows\Tasks\At7.job
c:\windows\Tasks\At8.job
c:\windows\Tasks\At9.job

.
((((((((((((((((((((((((( Files Created from 2009-11-02 to 2009-12-02 )))))))))))))))))))))))))))))))
.

2009-12-02 03:17 . 2009-12-02 03:20 -------- d-----w- C:\thecbytes12115t
2009-12-01 05:25 . 2009-12-01 05:59 -------- d-----w- C:\thecbytes
2009-11-18 20:32 . 2009-11-18 20:32 117760 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2009-11-18 20:32 . 2009-11-18 20:32 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-11-18 20:32 . 2009-12-02 03:18 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-11-18 20:32 . 2009-11-18 20:32 -------- d-----w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
2009-11-18 20:31 . 2009-11-18 20:31 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-11-18 03:06 . 2009-11-18 03:07 -------- d-----w- C:\Autoruns
2009-11-18 02:47 . 2009-11-18 02:47 -------- d-----w- c:\windows\system32\LogFiles
2009-11-17 02:19 . 2009-11-17 02:19 -------- d-----w- c:\documents and settings\Administrator\Application Data\AVG8
2009-11-17 02:12 . 2009-11-17 02:12 0 ----a-w- c:\windows\nsreg.dat
2009-11-17 02:12 . 2009-11-17 02:12 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla
2009-11-17 01:34 . 2009-11-17 01:34 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2009-11-17 01:34 . 2009-11-18 03:35 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-17 01:34 . 2009-11-17 01:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-11-15 02:58 . 2008-06-12 10:09 33088 ----a-w- c:\documents and settings\Administrator\Application Data\Macromedia\Flash Player\www.macromedia.com\bin\airappinstaller\airappinstaller.exe
2009-11-15 02:03 . 2009-12-01 05:23 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\qciisr
2009-11-15 02:03 . 2009-12-02 03:18 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\ttblkt
2009-11-08 23:53 . 2009-11-08 23:53 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Blizzard Entertainment
2009-11-04 03:05 . 2009-11-04 03:05 -------- d-----w- c:\documents and settings\All Users\Application Data\Blizzard
2009-11-04 03:02 . 2009-11-15 02:56 -------- d-----w- c:\program files\Common Files\Blizzard Entertainment

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-02 03:18 . 2008-06-19 20:54 -------- d-----w- c:\program files\iTunes
2009-12-02 03:18 . 2004-08-03 23:56 346550 ----a-w- c:\windows\system32\ctfmon.exe
2009-11-17 01:39 . 2008-08-05 21:41 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2009-11-04 08:15 . 2009-01-25 21:39 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-11-04 02:44 . 2008-05-25 04:45 -------- d-----w- c:\documents and settings\Administrator\Application Data\Apple Computer
2009-11-04 02:44 . 2008-06-18 16:37 12792 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-28 01:03 . 2009-10-28 00:49 -------- d-----w- c:\program files\GodsWar Online
2009-10-15 07:28 . 2009-10-15 07:28 -------- d-----w- c:\documents and settings\LocalService\Application Data\McAfee
2009-10-15 01:23 . 2008-11-12 22:38 -------- d-----w- c:\documents and settings\LocalService\Application Data\SACore
2009-09-11 14:03 . 2004-08-03 23:56 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-04 20:45 . 2004-08-03 23:56 58880 ----a-w- c:\windows\system32\msasn1.dll
.
<pre>
c:\program files\Adobe\acrotray .exe
c:\program files\Google\GoogleToolbarNotifier\googletoolbarnotifier .exe
c:\program files\iTunes\ituneshelper .exe
c:\program files\Java\jre1.6.0_06\bin\jusched .exe
c:\program files\Pure Networks\Network Magic\nmapp .exe
c:\program files\SUPERAntiSpyware\superantispyware .exe
</pre>

------- Sigcheck -------

[-] 2009-12-02 03:18 . E1FD9E4E529F9419A82DEA0B96CF5F36 . 346550 . . [------] . . c:\windows\system32\ctfmon.exe
[-] 2008-04-14 . 5F1D5F88303D4A4DBC8E5F97BA967CC3 . 15360 . . [5.1.2600.5512] . . c:\windows\SoftwareDistribution\Download\cf8ec753e88561d2ddb53e183dc05c3e\ctfmon.exe
[7] 2004-08-03 . 24232996A38C0B0CF151C2140AE29FC8 . 15360 . . [5.1.2600.2180] . . c:\windows\ERDNT\cache\ctfmon.exe
[7] 2004-08-03 . 24232996A38C0B0CF151C2140AE29FC8 . 15360 . . [5.1.2600.2180] . . c:\windows\system32\dllcache\ctfmon.exe
.
((((((((((((((((((((((((((((( SnapShot@2009-12-01_05.52.15 )))))))))))))))))))))))))))))))))))))))))
.
+ 2008-03-28 14:06 . 2009-12-02 03:00 49152 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2008-03-28 14:06 . 2009-12-01 05:02 49152 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2008-03-28 14:06 . 2009-12-02 03:00 49152 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2008-03-28 14:06 . 2009-12-01 05:02 49152 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2009-12-02 03:00 . 2009-12-02 03:00 16384 c:\windows\system32\config\systemprofile\Cookies\index.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-12-02 341470]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-12-02 335570]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-12-02 353214]
"nmapp"="c:\program files\Pure Networks\Network Magic\nmapp.exe" [N/A]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Kodak EasyShare software.lnk - c:\program files\Kodak\Kodak EasyShare software\bin\EasyShare.exe [2007-9-19 282624]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 19:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Adobe\\acrotray .exe"=
"c:\\WINDOWS\\system32\\drwtsn32.exe"=

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [11/11/2009 10:44 AM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [11/11/2009 10:44 AM 74480]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [11/11/2009 10:44 AM 7408]
.
Contents of the 'Scheduled Tasks' folder

2009-11-11 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 18:57]
.
.
------- Supplementary Scan -------
.
DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} - hxxp://lads.myspace.com/upload/MySpaceUploader2.cab
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-01 22:29
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(572)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll
.
Completion time: 2009-12-01 22:32
ComboFix-quarantined-files.txt 2009-12-02 03:32
ComboFix2.txt 2009-12-01 05:58

Pre-Run: 9,465,028,608 bytes free
Post-Run: 9,420,902,400 bytes free

- - End Of File - - 4944AA546D02C5DE951DB3789CD81764

--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0: scan report
Wednesday, December 2, 2009
Operating system: Microsoft Windows XP Professional Service Pack 2 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Last database update: Wednesday, December 02, 2009 03:48:14
Records in database: 3321011
--------------------------------------------------------------------------------

Scan settings:
scan using the following database: extended
Scan archives: yes
Scan e-mail databases: yes

Scan area - My Computer:
A:\
C:\
D:\
E:\

Scan statistics:
Objects scanned: 32003
Threats found: 16
Infected objects found: 131
Suspicious objects found: 0
Scan duration: 01:54:20


File name / Threat / Threats count
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{00BF223B-D8E4-47E1-A8A2-70514A07374B} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{20E1B506-5ED1-4AF0-860D-DE1C68D09897} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{44895EE1-F5AC-402F-9AE3-2472D799B657} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{675B5ED0-1601-4B6E-A286-B499E18E6D17} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{B6D8007E-BC79-4AC7-8C2F-0CA9E2154574} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{BC01F251-5EB2-4363-8ABF-58EB8D67CFFC} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{BC0B88D2-2EB9-4F25-BC8D-A0634D8D76AA} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{001ED11F-9B9C-49B4-8687-4756D188F02B} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{08938BEB-945A-47B3-A9B4-490009F90AB5} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{14C7C4DD-653D-493D-8E7A-5D4990AFE9B7} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{1BBA6FC3-2230-4B7D-8B79-9EF2F45193EC} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{343CAEDD-F405-4A0B-8571-334BF973222A} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3AC664A6-E9DF-494C-A256-8D38DF998D38} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{44658F8E-1A61-42F0-8EC1-D74316951BDE} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{44ECF4C7-F4BB-4EB3-BACE-874804C31F95} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4C7345F1-4295-47D0-90C9-DCAFFF1935A0} Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{66219DE8-1D37-4679-8ACC-82901BC86890} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{66C598DA-FA20-4BC1-93A9-D523377910AA} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7A5DE5BD-A2E1-4E89-8A04-524AAE97FB7C} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{86AC04F9-E3B7-4257-A405-4458563C9116} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{8C97D630-9E60-4A0D-8049-F5AAB20CE497} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{A40A6561-5E63-4E22-BF2B-90AB1D4834DD} Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{AA2F060C-F29D-474A-A56F-79304FC51363} Infected: Trojan-Clicker.Win32.Cycler.akf 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{ABA4E77B-F33B-46F2-B02D-58B3AC5DDB21} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B09E01D9-9242-44FE-A162-C6034588E0EE} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{DE32DFF7-288F-4050-96CD-D78F7BA36456} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{E43FEDFB-ACCE-4FE0-A7AE-B135BCD50716} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{ED3DD630-D186-4511-81DA-098B63CAA296} Infected: Packed.Win32.TDSS.aa 1
C:\Documents and Settings\Administrator\Local Settings\Application Data\qciisr\esiasysguard .exe Infected: Trojan.Win32.FraudPack.aafs 1
C:\Documents and Settings\Administrator\Local Settings\Application Data\ttblkt\eeqxsysguard .exe Infected: Trojan.Win32.FraudPack.aafs 1
C:\Qoobox\Quarantine\C\aruxss.exe.vir Infected: Packed.Win32.Krap.ah 1
C:\Qoobox\Quarantine\C\aywdthl.exe.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Local Settings\Application Data\iuruya\dwhxsysguard .exe.vir Infected: Trojan.Win32.FraudPack.aafs 1
C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\44309626\44309626 .exe.vir Infected: Packed.Win32.Krap.ai 1
C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\69525936\69525936 .exe.vir Infected: Packed.Win32.Krap.ai 1
C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\81904022\81904022 .exe.vir Infected: Packed.Win32.Krap.ai 1
C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\98693237\98693237 .exe.vir Infected: Packed.Win32.Krap.ai 1
C:\Qoobox\Quarantine\C\Documents and Settings\LocalService\Application Data\AntiVirus Plus\AntiVirus Plus.70367201.dll.vir Infected: not-a-virus:FraudTool.Win32.AVPlus.g 1
C:\Qoobox\Quarantine\C\Documents and Settings\LocalService\ntuser.dll.vir Infected: Packed.Win32.Krap.ah 1
C:\Qoobox\Quarantine\C\Documents and Settings\NetworkService\ntuser.dll.vir Infected: Packed.Win32.Krap.ah 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\bedamifu.exe.vir Infected: Packed.Win32.Krap.ai 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\config\systemprofile\ntuser.dll.vir Infected: Packed.Win32.Krap.ah 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\config\systemprofile\Start Menu\Programs\Startup\scandisk.dll.vir Infected: Packed.Win32.Krap.ah 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\fovisuga.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\guyugadu.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\hejitavo.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\hodisuye.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\hozekopo.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\iehelper.dll.vir Infected: Trojan.Win32.BHO.whc 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\jevetedo.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\kekasika.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\lehebofi.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\lemibagi.dll.vir Infected: not-a-virus:FraudTool.Win32.Agent.aju 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\lewuseze.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\likebowa.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\modisemi.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\neletato.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\nevuzipa.exe.vir Infected: Trojan-Downloader.Win32.Genome.xod 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\ovwxjntb9.dll.vir Infected: Packed.Win32.Krap.ah 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\rowuwoze.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\tebusuka.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\u0dnkxfk.dll.vir Infected: Packed.Win32.Krap.ah 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\vezurejo.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\welumiva.exe.vir Infected: Rootkit.Win32.Agent.pri 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\wikufalu.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\winupdate86 .exe.vir Infected: Packed.Win32.Krap.ah 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\wofuhipe.dll.vir Infected: not-a-virus:FraudTool.Win32.Agent.aju 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\zerarapo.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\zugibiru.dll.vir Infected: Packed.Win32.TDSS.aa 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0011FBE.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00129FE.exe.vir Infected: Trojan-Downloader.Win32.NSIS.ac 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0015169.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0015C79.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00187CF.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0023664.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0024310.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c002BC79.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0030C0A.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0034810.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c003926A.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c003BA40.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0045418.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c004778.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0048C78.exe.vir Infected: Trojan.Win32.FraudPack.aamu 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c004B98A.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c005162C.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0051690.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0053435.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0053A9F.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00620F1.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0070496.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00755F4.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00798D7.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c007A64A.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0085CC4.exe.vir Infected: Packed.Win32.Krap.ai 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00890C3.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0095239.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c0096AD2.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00A8A89.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00A8C1A.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00ABC84.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00B4724.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00C2B46.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00CB6CD.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00CBBF1.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00D8FE2.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00D93E9.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00D989E.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00E1B8.exe.vir Infected: Trojan-Downloader.Win32.NSIS.ac 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00E1B8.exe.vir Infected: not-a-virus:FraudTool.Win32.Agent.ajy 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00E8EB8.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00E9AA1.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00EEE90.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00FAF01.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00FAF6.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00FB053.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\__c00FEFE1.dat.vir Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\C\WINDOWS\system32\___c0077F29_.dat.zip Infected: Trojan-Downloader.Win32.Clopack.il 1
C:\Qoobox\Quarantine\[4]-Submit_2009-12-01_22.22.31.zip Infected: Packed.Win32.Krap.ah 2
C:\Qoobox\Quarantine\[4]-Submit_2009-12-01_22.22.31.zip Infected: Trojan-Clicker.Win32.Cycler.anb 1
C:\Qoobox\Quarantine\[4]-Submit_2009-12-01_22.22.31.zip Infected: Packed.Win32.Krap.ai 1
C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000098.exe Infected: Packed.Win32.Krap.ah 1
C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000099.exe Infected: Packed.Win32.TDSS.aa 1
C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000100.exe Infected: Trojan.Win32.FraudPack.aafs 1
C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000103.exe Infected: Packed.Win32.Krap.ai 1
C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000108.exe Infected: Packed.Win32.Krap.ai 1
C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000113.exe Infected: Trojan-Clicker.Win32.Cycler.anb 1
C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000117.exe Infected: Packed.Win32.Krap.ai 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\YJDRPCAT\KB959435[1].exe Infected: Packed.Win32.Krap.ai 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\YJDRPCAT\logo[1].htm Infected: Trojan.Win32.Monder.cvau 1

Selected area has been scanned.

OTL logfile created on: 12/2/2009 1:53:51 AM - Run 1
OTL by OldTimer - Version 3.1.11.4 Folder = C:\Documents and Settings\Administrator\Desktop
Windows XP Professional Edition Service Pack 2 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 7.0.5730.11)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

511.01 Mb Total Physical Memory | 398.91 Mb Available Physical Memory | 78.06% Memory free
1.22 Gb Paging File | 0.87 Gb Available in Paging File | 71.15% Paging File free
Paging file location(s): C:\pagefile.sys 768 1536 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 18.61 Gb Total Space | 8.68 Gb Free Space | 46.66% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
Drive E: | 123.72 Mb Total Space | 109.17 Mb Free Space | 88.24% Space Free | Partition Type: FAT
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: USER-849142A3DF
Current User Name: Administrator
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: All users
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Standard

========== Processes (SafeList) ==========

PRC - [2009/12/01 22:18:32 | 00,346,550 | ---- | M] () -- C:\WINDOWS\system32\ctfmon.exe
PRC - [2009/12/01 20:18:52 | 00,535,552 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Administrator\Desktop\OTL.exe
PRC - [2009/11/11 10:44:44 | 02,001,648 | ---- | M] (SUPERAntiSpyware.com) -- C:\Program Files\SUPERAntiSpyware\superantispyware .exe
PRC - [2009/08/27 00:18:42 | 00,634,648 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Internet Explorer\iexplore.exe
PRC - [2008/06/23 15:19:19 | 00,068,856 | ---- | M] (Google Inc.) -- C:\Program Files\Google\GoogleToolbarNotifier\googletoolbarnotifier .exe
PRC - [2008/06/02 10:13:26 | 00,267,048 | ---- | M] (Apple Inc.) -- C:\Program Files\iTunes\ituneshelper .exe
PRC - [2008/06/02 10:13:16 | 00,504,104 | ---- | M] (Apple Inc.) -- C:\Program Files\iPod\bin\iPodService.exe
PRC - [2008/02/18 10:16:30 | 00,110,592 | ---- | M] (Apple, Inc.) -- C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
PRC - [2007/09/19 23:48:51 | 01,033,216 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2007/09/19 03:33:46 | 00,282,624 | ---- | M] (Eastman Kodak Company) -- C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
PRC - [2007/03/14 14:42:48 | 00,321,088 | ---- | M] (Pure Networks, Inc.) -- C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe
PRC - [2007/03/14 14:42:48 | 00,321,088 | ---- | M] (Pure Networks, Inc.) -- C:\Program Files\Pure Networks\Network Magic\nmapp .exe
PRC - [2004/08/03 18:56:58 | 00,013,824 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\system32\wscntfy.exe


========== Modules (SafeList) ==========

MOD - [2009/12/01 20:18:52 | 00,535,552 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Administrator\Desktop\OTL.exe
MOD - [2007/09/19 23:35:28 | 01,054,208 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll


========== Win32 Services (SafeList) ==========

SRV - [2009/04/26 21:51:27 | 00,182,768 | ---- | M] (Google) -- C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe -- (gusvc)
SRV - [2008/06/02 10:13:16 | 00,504,104 | ---- | M] (Apple Inc.) -- C:\Program Files\iPod\bin\iPodService.exe -- (iPod Service)
SRV - [2008/02/18 10:16:30 | 00,110,592 | ---- | M] (Apple, Inc.) -- C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe -- (Apple Mobile Device)
SRV - [2007/03/14 14:42:48 | 00,321,088 | ---- | M] (Pure Networks, Inc.) -- C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe -- (nmservice)
SRV - [2007/03/14 14:42:22 | 00,012,800 | ---- | M] (Pure Networks, Inc.) -- C:\Program Files\Pure Networks\Network Magic\WebServer\bin\nmraapache.exe -- (nmraapache)
SRV - [2006/10/26 14:03:08 | 00,145,184 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE -- (ose)


========== Driver Services (SafeList) ==========

DRV - File not found -- -- (catchme)
DRV - [2009/11/11 10:44:50 | 00,007,408 | R--- | M] ( SUPERAdBlocker.com and SUPERAntiSpyware.com) -- C:\Program Files\SUPERAntiSpyware\SASENUM.SYS -- (SASENUM)
DRV - [2009/11/11 10:44:48 | 00,009,968 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) -- C:\Program Files\SUPERAntiSpyware\sasdifsv.sys -- (SASDIFSV)
DRV - [2009/11/11 10:44:46 | 00,074,480 | ---- | M] (SUPERAdBlocker.com and SUPERAntiSpyware.com) -- C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS -- (SASKUTIL)
DRV - [2008/01/29 11:01:28 | 00,016,168 | ---- | M] (GEAR Software Inc.) -- C:\WINDOWS\system32\drivers\GEARAspiWDM.sys -- (GEARAspiWDM)
DRV - [2007/11/13 05:25:53 | 00,020,480 | ---- | M] (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K.) -- C:\WINDOWS\system32\drivers\secdrv.sys -- (Secdrv)
DRV - [2007/03/29 02:00:00 | 00,043,528 | ---- | M] (Sonic Solutions) -- C:\WINDOWS\System32\Drivers\PxHelp20.sys -- (PxHelp20)
DRV - [2007/03/23 10:01:46 | 00,026,944 | ---- | M] (Pure Networks, Inc.) -- C:\WINDOWS\system32\drivers\purendis.sys -- (purendis)
DRV - [2007/03/23 10:01:12 | 00,025,792 | ---- | M] (Pure Networks, Inc.) -- C:\WINDOWS\system32\drivers\pnarp.sys -- (pnarp)
DRV - [2004/08/03 21:31:34 | 00,020,992 | ---- | M] (Realtek Semiconductor Corporation) -- C:\WINDOWS\system32\drivers\RTL8139.sys -- (rtl8139) Realtek RTL8139(A/B/C)
DRV - [2004/08/03 17:29:28 | 00,327,040 | ---- | M] (ATI Technologies Inc.) -- C:\WINDOWS\system32\drivers\ati2mtaa.sys -- (ati2mtaa)
DRV - [2001/08/23 07:00:00 | 00,017,792 | ---- | M] (Parallel Technologies, Inc.) -- C:\WINDOWS\system32\drivers\ptilink.sys -- (Ptilink)
DRV - [2001/08/17 07:20:04 | 00,096,256 | ---- | M] (Intel Corporation) -- C:\WINDOWS\system32\drivers\ac97intc.sys -- (ac97intc) Intel® 82801 Audio Driver Install Service (WDM)
DRV - [2001/08/17 07:11:06 | 00,066,591 | ---- | M] (3Com Corporation) -- C:\WINDOWS\system32\drivers\el90xbc5.sys -- (EL90XBC)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = %SystemRoot%\system32\blank.htm


IE - HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main,AlwaysUseDefaultPrinter = yes
IE - HKU\.DEFAULT\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\.DEFAULT\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = cdn
IE - HKU\.DEFAULT\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = actsvr.comcastonline.com:8100

IE - HKU\S-1-5-18\SOFTWARE\Microsoft\Internet Explorer\Main,AlwaysUseDefaultPrinter = yes
IE - HKU\S-1-5-18\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-18\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = cdn
IE - HKU\S-1-5-18\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = actsvr.comcastonline.com:8100

IE - HKU\S-1-5-19\SOFTWARE\Microsoft\Internet Explorer\Main,AlwaysUseDefaultPrinter = yes

IE - HKU\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\Main,AlwaysUseDefaultPrinter = yes

IE - HKU\S-1-5-21-790525478-220523388-725345543-500\SOFTWARE\Microsoft\Internet Explorer\Main,AlwaysUseDefaultPrinter = yes
IE - HKU\S-1-5-21-790525478-220523388-725345543-500\S-1-5-21-790525478-220523388-725345543-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

========== FireFox ==========


FF - HKLM\software\mozilla\Mozilla Firefox 3.5.5\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2009/11/16 21:12:35 | 00,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.5.5\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins [2009/11/16 21:12:18 | 00,000,000 | ---D | M]

[2009/10/13 16:27:55 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Administrator\Application Data\Mozilla\Extensions
[2009/04/06 17:25:00 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Administrator\Application Data\Mozilla\Extensions\mozswing@mozswing.org
[2009/12/01 22:45:49 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\extensions
[2009/11/16 21:12:18 | 00,000,000 | ---D | M] -- C:\Program Files\Mozilla Firefox\extensions

O1 HOSTS File: (27 bytes) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O3 - HKLM\..\Toolbar: (Google Toolbar) - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
O3 - HKU\S-1-5-21-790525478-220523388-725345543-500\..\Toolbar\WebBrowser: (Google Toolbar) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
O4 - HKLM..\Run: [iTunesHelper] C:\Program Files\iTunes\iTunesHelper.exe File not found
O4 - HKLM..\Run: [nmapp] C:\Program Files\Pure Networks\Network Magic\nmapp.exe File not found
O4 - HKU\S-1-5-21-790525478-220523388-725345543-500..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe File not found
O4 - HKU\S-1-5-21-790525478-220523388-725345543-500..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe File not found
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe (Eastman Kodak Company)
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Main present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\PhishingFilter present
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O7 - HKU\.DEFAULT\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKU\S-1-5-18\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKU\S-1-5-19\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-19_Classes\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-20\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-20_Classes\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-21-790525478-220523388-725345543-500\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-21-790525478-220523388-725345543-500\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKU\S-1-5-21-790525478-220523388-725345543-500\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKU\S-1-5-21-790525478-220523388-725345543-500\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O7 - HKU\S-1-5-21-790525478-220523388-725345543-500_Classes\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O9 - Extra 'Tools' menuitem : Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\npjpi160_06.dll (Sun Microsystems, Inc.)
O16 - DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} http://upload.facebook.com/controls/2009.0...oUploader55.cab (Facebook Photo Uploader 5 Control)
O16 - DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} http://lads.myspace.com/upload/MySpaceUploader2.cab (MySpace Uploader Control)
O16 - DPF: {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_06)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_06)
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.1
O18 - Protocol\Handler\pure-go {4746C79A-2042-4332-8650-48966E44ABA8} - C:\Program Files\Common Files\Pure Networks Shared\puresp3.dll (Pure Networks, Inc.)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - Winlogon\Notify\!SASWinLogon: DllName - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll (SUPERAntiSpyware.com)
O28 - HKLM ShellExecuteHooks: {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - C:\Program Files\SUPERAntiSpyware\SASSEH.DLL (SuperAdBlocker.com)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2008/03/28 09:00:17 | 00,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O32 - AutoRun File - [2009/11/17 22:07:01 | 00,000,000 | ---D | M] - C:\Autoruns -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck) - File not found
O34 - HKLM BootExecute: (*) - File not found
O35 - comfile [open] -- "%1" %*
O35 - exefile [open] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2009/12/02 01:53:05 | 00,535,552 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\Administrator\Desktop\OTL.exe
[2009/12/01 22:33:02 | 00,000,000 | ---D | C] -- C:\WINDOWS\temp
[2009/12/01 22:21:24 | 00,031,232 | ---- | C] (NirSoft) -- C:\WINDOWS\NIRCMD.exe
[2009/12/01 22:21:15 | 00,000,000 | ---D | C] -- C:\thecbytes21494t
[2009/12/01 22:18:41 | 00,000,000 | RHSD | C] -- C:\cmdcons
[2009/12/01 22:17:38 | 00,000,000 | ---D | C] -- C:\thecbytes12115t
[2009/12/01 22:17:06 | 04,608,744 | ---- | C] (Microsoft Corporation) -- C:\Documents and Settings\Administrator\Desktop\WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[2009/12/01 00:25:38 | 00,212,480 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWXCACLS.exe
[2009/12/01 00:25:38 | 00,161,792 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWREG.exe
[2009/12/01 00:25:38 | 00,136,704 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWSC.exe
[2009/12/01 00:25:18 | 00,000,000 | ---D | C] -- C:\WINDOWS\ERDNT
[2009/12/01 00:25:13 | 00,000,000 | ---D | C] -- C:\thecbytes
[2009/12/01 00:24:57 | 00,000,000 | ---D | C] -- C:\Qoobox
[2009/11/18 15:32:25 | 00,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
[2009/11/18 15:32:12 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com
[2009/11/18 15:32:12 | 00,000,000 | ---D | C] -- C:\Program Files\SUPERAntiSpyware
[2009/11/18 15:31:55 | 00,000,000 | ---D | C] -- C:\Program Files\Common Files\Wise Installation Wizard
[2009/11/17 22:06:23 | 00,000,000 | ---D | C] -- C:\Autoruns
[2009/11/17 21:47:35 | 00,000,000 | ---D | C] -- C:\WINDOWS\System32\LogFiles
[2009/11/16 21:19:27 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\Application Data\AVG8
[2009/11/16 21:19:14 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\My Documents\Downloads
[2009/11/16 21:12:33 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\Local Settings\Application Data\Mozilla
[2009/11/16 21:12:14 | 00,000,000 | ---D | C] -- C:\Program Files\Mozilla Firefox
[2009/11/16 20:34:16 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\Application Data\Malwarebytes
[2009/11/16 20:34:06 | 00,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[2009/11/16 20:34:06 | 00,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Malwarebytes
[2009/11/15 20:34:34 | 00,472,064 | ---- | C] ( ) -- C:\Documents and Settings\Administrator\My Documents\RootRepeal.exe
[2009/11/15 19:13:50 | 04,045,544 | ---- | C] (Malwarebytes Corporation ) -- C:\Documents and Settings\Administrator\My Documents\oreo.exe
[2009/11/14 21:03:38 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\Local Settings\Application Data\qciisr
[2009/11/14 21:03:01 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\Local Settings\Application Data\ttblkt
[2009/11/08 18:53:11 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\Local Settings\Application Data\Blizzard Entertainment
[2009/11/03 22:05:39 | 00,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Blizzard
[2009/11/03 22:02:33 | 00,000,000 | ---D | C] -- C:\Program Files\Common Files\Blizzard Entertainment
[3 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]

========== Files - Modified Within 30 Days ==========

[2009/12/02 01:00:01 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At2.job
[2009/12/02 00:02:05 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At1.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At9.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At8.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At7.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At6.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At5.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At4.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At3.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At24.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At23.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At22.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At21.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At20.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At19.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At18.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At17.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At16.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At15.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At14.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At13.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At12.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At11.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\tasks\At10.job
[2009/12/01 22:32:59 | 00,000,006 | -H-- | M] () -- C:\WINDOWS\tasks\SA.DAT
[2009/12/01 22:30:02 | 00,000,227 | ---- | M] () -- C:\WINDOWS\system.ini
[2009/12/01 22:18:57 | 00,000,281 | RHS- | M] () -- C:\boot.ini
[2009/12/01 22:18:32 | 00,346,550 | ---- | M] () -- C:\WINDOWS\System32\ctfmon.exe
[2009/12/01 22:15:52 | 04,608,744 | ---- | M] (Microsoft Corporation) -- C:\Documents and Settings\Administrator\Desktop\WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[2009/12/01 22:07:18 | 00,141,982 | ---- | M] () -- C:\logfile
[2009/12/01 21:08:09 | 00,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2009/12/01 21:08:08 | 53,590,4256 | -HS- | M] () -- C:\hiberfil.sys
[2009/12/01 20:18:52 | 00,535,552 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Administrator\Desktop\OTL.exe
[2009/12/01 00:59:45 | 02,097,152 | -H-- | M] () -- C:\Documents and Settings\Administrator\NTUSER.DAT
[2009/12/01 00:59:45 | 00,000,178 | -HS- | M] () -- C:\Documents and Settings\Administrator\ntuser.ini
[2009/12/01 00:51:55 | 00,000,027 | ---- | M] () -- C:\WINDOWS\System32\drivers\etc\hosts
[2009/12/01 00:50:37 | 00,006,456 | -H-- | M] () -- C:\WINDOWS\System32\tuwizalo
[2009/11/30 23:47:47 | 00,002,206 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2009/11/29 22:13:50 | 03,571,933 | R--- | M] () -- C:\Documents and Settings\Administrator\Desktop\thecbytes.exe
[2009/11/29 22:12:40 | 00,291,840 | ---- | M] () -- C:\Documents and Settings\Administrator\Desktop\exeHelper.com
[2009/11/29 22:12:10 | 00,262,656 | ---- | M] () -- C:\Documents and Settings\Administrator\Desktop\rkill.pif
[2009/11/18 15:32:17 | 00,000,780 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\SUPERAntiSpyware Free Edition.lnk
[2009/11/18 15:02:28 | 07,375,392 | ---- | M] () -- C:\Documents and Settings\Administrator\Desktop\SUPERAntiSpyware.exe
[2009/11/16 21:38:31 | 04,834,050 | -H-- | M] () -- C:\Documents and Settings\Administrator\Local Settings\Application Data\IconCache.db
[2009/11/16 21:24:12 | 00,001,807 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Network Magic.lnk
[2009/11/16 21:12:39 | 00,000,000 | ---- | M] () -- C:\WINDOWS\nsreg.dat
[2009/11/16 21:12:20 | 00,001,602 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Mozilla Firefox.lnk
[2009/11/16 17:28:43 | 00,250,994 | ---- | M] () -- C:\Documents and Settings\Administrator\rundll32.exe.delme869
[2009/11/15 20:26:17 | 00,243,586 | ---- | M] () -- C:\Documents and Settings\Administrator\rundll32.exe.delme254
[2009/11/15 20:11:30 | 00,472,064 | ---- | M] ( ) -- C:\Documents and Settings\Administrator\My Documents\RootRepeal.exe
[2009/11/15 17:57:02 | 04,045,544 | ---- | M] (Malwarebytes Corporation ) -- C:\Documents and Settings\Administrator\My Documents\oreo.exe
[2009/11/15 17:42:53 | 00,272,562 | ---- | M] () -- C:\Documents and Settings\Administrator\rundll32.exe.delme1157
[2009/11/14 01:47:57 | 00,260,608 | ---- | M] () -- C:\WINDOWS\PEV.exe
[2009/11/11 18:08:42 | 00,000,284 | ---- | M] () -- C:\WINDOWS\tasks\AppleSoftwareUpdate.job
[2009/11/11 03:18:30 | 00,094,272 | ---- | M] () -- C:\WINDOWS\System32\FNTCACHE.DAT
[2009/11/11 03:01:56 | 00,001,393 | ---- | M] () -- C:\WINDOWS\imsins.BAK
[2009/11/04 03:15:02 | 00,000,582 | ---- | M] () -- C:\WINDOWS\win.ini
[2009/11/03 21:58:37 | 00,432,356 | ---- | M] () -- C:\WINDOWS\System32\perfh009.dat
[2009/11/03 21:58:37 | 00,067,312 | ---- | M] () -- C:\WINDOWS\System32\perfc009.dat
[2009/11/03 21:58:36 | 00,508,956 | ---- | M] () -- C:\WINDOWS\System32\PerfStringBackup.INI
[2009/11/03 21:44:33 | 00,012,792 | ---- | M] () -- C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
[3 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]

========== Files Created - No Company Name ==========

[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At9.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At8.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At24.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At23.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At22.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At21.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At20.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At19.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At18.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At17.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At16.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At15.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At14.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At13.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At12.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At11.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At10.job
[2009/12/01 23:23:12 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At7.job
[2009/12/01 23:23:12 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At6.job
[2009/12/01 23:23:12 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At5.job
[2009/12/01 23:23:12 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At4.job
[2009/12/01 23:23:12 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At3.job
[2009/12/01 23:23:12 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At2.job
[2009/12/01 23:23:11 | 00,000,356 | ---- | C] () -- C:\WINDOWS\tasks\At1.job
[2009/12/01 22:18:56 | 00,000,211 | ---- | C] () -- C:\Boot.bak
[2009/12/01 22:18:52 | 00,260,272 | ---- | C] () -- C:\cmldr
[2009/12/01 00:25:38 | 00,260,608 | ---- | C] () -- C:\WINDOWS\PEV.exe
[2009/12/01 00:25:38 | 00,098,816 | ---- | C] () -- C:\WINDOWS\sed.exe
[2009/12/01 00:25:38 | 00,080,412 | ---- | C] () -- C:\WINDOWS\grep.exe
[2009/12/01 00:25:38 | 00,077,312 | ---- | C] () -- C:\WINDOWS\MBR.exe
[2009/12/01 00:25:38 | 00,068,096 | ---- | C] () -- C:\WINDOWS\zip.exe
[2009/12/01 00:24:13 | 03,571,933 | R--- | C] () -- C:\Documents and Settings\Administrator\Desktop\thecbytes.exe
[2009/12/01 00:23:13 | 00,291,840 | ---- | C] () -- C:\Documents and Settings\Administrator\Desktop\exeHelper.com
[2009/12/01 00:03:21 | 00,262,656 | ---- | C] () -- C:\Documents and Settings\Administrator\Desktop\rkill.pif
[2009/11/18 15:32:17 | 00,000,780 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\SUPERAntiSpyware Free Edition.lnk
[2009/11/18 15:31:45 | 07,375,392 | ---- | C] () -- C:\Documents and Settings\Administrator\Desktop\SUPERAntiSpyware.exe
[2009/11/16 21:12:39 | 00,000,000 | ---- | C] () -- C:\WINDOWS\nsreg.dat
[2009/11/16 21:12:20 | 00,001,602 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Mozilla Firefox.lnk
[2009/11/15 20:31:47 | 00,250,994 | ---- | C] () -- C:\Documents and Settings\Administrator\rundll32.exe.delme869
[2009/11/15 18:09:23 | 00,243,586 | ---- | C] () -- C:\Documents and Settings\Administrator\rundll32.exe.delme254
[2009/11/15 00:04:36 | 00,272,562 | ---- | C] () -- C:\Documents and Settings\Administrator\rundll32.exe.delme1157

========== LOP Check ==========

[2009/01/25 16:42:40 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Administrator\Application Data\GetRightToGo
[2009/08/12 23:09:49 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Administrator\Application Data\LimeWire
[2009/10/14 20:23:28 | 00,000,000 | ---D | M] -- C:\Documents and Settings\LocalService\Application Data\SACore
[2009/12/02 00:02:05 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At1.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At10.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At11.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At12.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At13.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At14.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At15.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At16.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At17.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At18.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At19.job
[2009/12/02 01:00:01 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At2.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At20.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At21.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At22.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At23.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At24.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At3.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At4.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At5.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At6.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At7.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At8.job
[2009/12/01 23:23:13 | 00,000,356 | ---- | M] () -- C:\WINDOWS\Tasks\At9.job

========== Purity Check ==========


< End of report >

OTL Extras logfile created on: 12/2/2009 1:53:51 AM - Run 1
OTL by OldTimer - Version 3.1.11.4 Folder = C:\Documents and Settings\Administrator\Desktop
Windows XP Professional Edition Service Pack 2 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 7.0.5730.11)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

511.01 Mb Total Physical Memory | 398.91 Mb Available Physical Memory | 78.06% Memory free
1.22 Gb Paging File | 0.87 Gb Available in Paging File | 71.15% Paging File free
Paging file location(s): C:\pagefile.sys 768 1536 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 18.61 Gb Total Space | 8.68 Gb Free Space | 46.66% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
Drive E: | 123.72 Mb Total Space | 109.17 Mb Free Space | 88.24% Space Free | Partition Type: FAT
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: USER-849142A3DF
Current User Name: Administrator
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: All users
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Standard

========== Extra Registry (SafeList) ==========


========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.chm [@ = chm.file] -- "%SYSTEMROOT%\hh.exe" %1
.html [@ = htmlfile] -- C:\Program Files\Internet Explorer\IEXPLORE.EXE (Microsoft Corporation)

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
chm.file [open] -- "%SYSTEMROOT%\hh.exe" %1
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
exefile [open] -- "%1" %*
htmlfile [edit] -- Reg Error: Key error.
htmlfile [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome (Microsoft Corporation)
htmlfile [opennew] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" %1 (Microsoft Corporation)
http [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome (Microsoft Corporation)
https [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome (Microsoft Corporation)
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l (Microsoft Corporation)
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [open] -- %SystemRoot%\Explorer.exe /idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Applications\iexplore.exe [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" %1 (Microsoft Corporation)
CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} [OpenHomePage] -- "%programfiles%\internet explorer\iexplore.exe"

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"FirstRunDisabled" = 1
"AntiVirusDisableNotify" = 0
"FirewallDisableNotify" = 0
"UpdatesDisableNotify" = 0
"AntiVirusOverride" = 0
"FirewallOverride" = 0

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = 1

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]
"1900:UDP" = 1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007
"2869:TCP" = 2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008

========== Authorized Applications List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe" = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe:*:Enabled:EasyShare -- (Eastman Kodak Company)
"C:\Program Files\LimeWire\LimeWire.exe" = C:\Program Files\LimeWire\LimeWire.exe:*:Enabled:LimeWire -- (Lime Wire, LLC)
"C:\Program Files\iTunes\iTunes.exe" = C:\Program Files\iTunes\iTunes.exe:*:Enabled:iTunes -- (Apple Inc.)
"C:\Program Files\Adobe\acrotray .exe" = C:\Program Files\Adobe\acrotray .exe:*:Enabled:acrotray -- ()
"C:\WINDOWS\system32\drwtsn32.exe" = C:\WINDOWS\system32\drwtsn32.exe:*:Enabled:drwtsn32 -- (Microsoft Corporation)


========== HKEY_LOCAL_MACHINE Uninstall List ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{00203668-8170-44A0-BE44-B632FA4D780F}" = Adobe AIR
"{03EDED24-8375-407D-A721-4643D9768BE1}" = kgchlwn
"{073F22CE-9A5B-4A40-A604-C7270AC6BF34}" = ESSSONIC
"{0D499481-22C6-4B25-8AC2-6D3F6C885FB9}" = OpenOffice.org Installer 1.0
"{11F3F858-4131-4FFA-A560-3FE282933B6E}" = kgchday
"{14D4ED84-6A9A-45A0-96F6-1753768C3CB5}" = ESSPCD
"{18455581-E099-4BA8-BC6B-F34B2F06600C}" = Google Toolbar for Internet Explorer
"{2318C2B1-4965-11d4-9B18-009027A5CD4F}" = Google Toolbar for Internet Explorer
"{2D03B6F8-DF36-4980-B7B6-5B93D5BA3A8F}" = essvatgt
"{3248F0A8-6813-11D6-A77B-00B0D0160060}" = Java™ 6 Update 6
"{42938595-0D83-404D-9F73-F8177FDD531A}" = ESScore
"{44734179-8A79-4DEE-BB08-73037F065543}" = Apple Mobile Device Support
"{4537EA4B-F603-4181-89FB-2953FC695AB1}" = netbrdg
"{5316DFC9-CE99-4458-9AB3-E8726EDE0210}" = skin0001
"{605A4E39-613C-4A12-B56F-DEFBE6757237}" = SHASTA
"{608D2A3C-6889-4C11-9B54-A42F45ACBFDB}" = fflink
"{643EAE81-920C-4931-9F0B-4B343B225CA6}" = ESSBrwr
"{693C08A7-9E76-43FF-B11E-9A58175474C4}" = kgckids
"{7CCEBC24-62DB-4280-A8EC-BFA49F167920}" = Software Update for Web Folders
"{8943CE61-53BD-475E-90E1-A580869E98A2}" = staticcr
"{8A502E38-29C9-49FA-BCFA-D727CA062589}" = ESSTOOLS
"{8A8664E1-84C8-4936-891C-BC1F07797549}" = kgcvday
"{8E92D746-CD9F-4B90-9668-42B74C14F765}" = ESSini
"{90120000-0016-0409-0000-0000000FF1CE}" = Microsoft Office Excel MUI (English) 2007
"{90120000-001A-0409-0000-0000000FF1CE}" = Microsoft Office Outlook MUI (English) 2007
"{90120000-006E-0409-0000-0000000FF1CE}" = Microsoft Office Shared MUI (English) 2007
"{90120000-0115-0409-0000-0000000FF1CE}" = Microsoft Office Shared Setup Metadata MUI (English) 2007
"{91517631-A9F3-4B7C-B482-43E0068FD55A}" = ESSgui
"{999D43F4-9709-4887-9B1A-83EBB15A8370}" = VPRINTOL
"{9BD54685-1496-46A5-AB62-357CD140ED8B}" = kgcinvt
"{9F70BF98-003C-491D-81FC-FF9792206AF0}" = iTunes
"{A1588373-1D86-4D44-86C9-78ABD190F9CC}" = kgcmove
"{A3051CD0-2F64-3813-A88D-B8DCCDE8F8C7}" = Microsoft .NET Framework 3.0 Service Pack 2
"{AE1FA02D-E6A4-4EA0-8E58-6483CAC016DD}" = ESSCDBK
"{B162D0A6-9A1D-4B7C-91A5-88FB48113C45}" = OfotoXMI
"{B4B44FE7-41FF-4DAD-8C0A-E406DDA72992}" = CCScore
"{B74F042E-E1B9-4A5B-8D46-387BB172F0A4}" = Apple Software Update
"{C09FB3CD-3D0C-3F2D-899A-6A1D67F2073F}" = Microsoft .NET Framework 2.0 Service Pack 2
"{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}" = SUPERAntiSpyware Free Edition
"{CE2CDD62-0124-36CA-84D3-9F4DCF5C5BD9}" = Microsoft .NET Framework 3.5 SP1
"{D32470A1-B10C-4059-BA53-CF0486F68EBC}" = Kodak EasyShare software
"{D5773BFA-5967-4A1C-AD0F-FFFD0D13FC36}" = Network Magic
"{DB02F716-6275-42E9-B8D2-83BA2BF5100B}" = SFR
"{E18B549C-5D15-45DA-8D8F-8FD2BD946344}" = kgcbaby
"{E79987F0-0E34-42CC-B8FF-6C860AEEB26A}" = tooltips
"{ECA1A3B6-898F-4DCE-9F04-714CF3BA126B}" = Adobe Flash Player 10 Plugin
"{F22C222C-3CE2-4A4B-A83F-AF4681371ABE}" = kgcbase
"{F4A2E7CC-60CA-4AFA-B67F-AD5E58173C3F}" = SKINXSDK
"{F9593CFB-D836-49BC-BFF1-0E669A411D9F}" = WIRELESS
"{FCDB1C92-03C6-4C76-8625-371224256091}" = ESSPDock
"63EE44B183E6F9261BBEDC6E0DD479A3ED939932" = Windows Driver Package - Pure Networks, Inc. Network Magic Device Discovery Driver (03/23/2007 4.1.7082.0)
"Adobe AIR" = Adobe AIR
"Adobe Flash Player ActiveX" = Adobe Flash Player 10 ActiveX
"BEFD16F14D4EBCB5CDB94F8C748ECA76860D7D88" = Windows Driver Package - Pure Networks, Inc. Network Magic Wireless Driver (03/23/2007 4.1.7082.0)
"ComcastHSI" = Comcast High-Speed Internet Install Wizard
"Microsoft .NET Framework 3.5 SP1" = Microsoft .NET Framework 3.5 SP1
"Mozilla Firefox (3.5.5)" = Mozilla Firefox (3.5.5)
"WIC" = Windows Imaging Component

========== Last 10 Event Log Errors ==========

[ Application Events ]
Error - 7/26/2009 5:51:27 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This operation returned because the timeout period expired.

Error - 7/26/2009 5:51:27 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: The specified server cannot perform the requested operation.

Error - 7/26/2009 5:51:28 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 7/26/2009 5:51:28 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 7/26/2009 7:51:26 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This operation returned because the timeout period expired.

Error - 7/26/2009 7:51:26 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: The specified server cannot perform the requested operation.

Error - 7/26/2009 7:51:27 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 7/26/2009 7:51:27 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 7/30/2009 1:38:18 AM | Computer Name = USER-849142A3DF | Source = McLogEvent | ID = 5051
Description =

Error - 7/30/2009 3:12:10 AM | Computer Name = USER-849142A3DF | Source = McLogEvent | ID = 5051
Description =

[ System Events ]
Error - 12/1/2009 10:23:55 PM | Computer Name = USER-849142A3DF | Source = W32Time | ID = 39452689
Description = Time Provider NtpClient: An error occurred during DNS lookup of the
manually configured peer 'time.windows.com,0x1'. NtpClient will try the DNS lookup
again in 30 minutes. The error was: A socket operation was attempted to an unreachable
host. (0x80072751)

Error - 12/1/2009 10:23:55 PM | Computer Name = USER-849142A3DF | Source = W32Time | ID = 39452701
Description = The time provider NtpClient is configured to acquire time from one
or more time sources, however none of the sources are currently accessible. No attempt
to contact a source will be made for 29 minutes. NtpClient has no source of accurate
time.

Error - 12/1/2009 10:53:55 PM | Computer Name = USER-849142A3DF | Source = W32Time | ID = 39452689
Description = Time Provider NtpClient: An error occurred during DNS lookup of the
manually configured peer 'time.windows.com,0x1'. NtpClient will try the DNS lookup
again in 60 minutes. The error was: A socket operation was attempted to an unreachable
host. (0x80072751)

Error - 12/1/2009 10:53:55 PM | Computer Name = USER-849142A3DF | Source = W32Time | ID = 39452701
Description = The time provider NtpClient is configured to acquire time from one
or more time sources, however none of the sources are currently accessible. No attempt
to contact a source will be made for 59 minutes. NtpClient has no source of accurate
time.

Error - 12/1/2009 11:13:11 PM | Computer Name = USER-849142A3DF | Source = DCOM | ID = 10001
Description = Unable to start a DCOM Server: {FBA44040-BD27-4A09-ACC8-C08B7C723DCD}
as /. The error: "%2" Happened while starting this command: "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
-Embedding

Error - 12/1/2009 11:13:12 PM | Computer Name = USER-849142A3DF | Source = DCOM | ID = 10001
Description = Unable to start a DCOM Server: {FBA44040-BD27-4A09-ACC8-C08B7C723DCD}
as /. The error: "%2" Happened while starting this command: "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
-Embedding

Error - 12/1/2009 11:13:58 PM | Computer Name = USER-849142A3DF | Source = DCOM | ID = 10001
Description = Unable to start a DCOM Server: {FBA44040-BD27-4A09-ACC8-C08B7C723DCD}
as /. The error: "%2" Happened while starting this command: "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
-Embedding

Error - 12/2/2009 12:41:07 AM | Computer Name = USER-849142A3DF | Source = Disk | ID = 262151
Description = The device, \Device\Harddisk1\D, has a bad block.

Error - 12/2/2009 1:02:06 AM | Computer Name = USER-849142A3DF | Source = Schedule | ID = 7901
Description = The At1.job command failed to start due to the following error: %%2147942402

Error - 12/2/2009 2:00:02 AM | Computer Name = USER-849142A3DF | Source = Schedule | ID = 7901
Description = The At2.job command failed to start due to the following error: %%2147942402


< End of report >

#8 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:20 PM

Posted 02 December 2009 - 02:11 PM

Hello,

Some more progress.

These programs are beyond repair....

c:\program files\Adobe\acrotray .exe
c:\program files\Google\GoogleToolbarNotifier\googletoolbarnotifier .exe
c:\program files\iTunes\ituneshelper .exe
c:\program files\Java\jre1.6.0_06\bin\jusched .exe
c:\program files\Pure Networks\Network Magic\nmapp .exe
c:\program files\SUPERAntiSpyware\superantispyware .exe

Click "start" on the taskbar and then click on the "Control Panel" icon.
Please doubleclick the "Add or Remove Programs" icon
A list of programs installed will be "populated" this may take a bit of time.
If they exist, uninstall the following by clicking on the following entries and selecting "remove":

Adobe
iTunes
Java
SUPERAntiSpyware


You may reinstall when were done!

Additional instructions can be found here if needed.

==========

:( Warning: This script was specifically written and designed for this user only. Unsupervised use of this tool could render your computer unbootable permanently!! :(

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

SecCenter::
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

FCopy::
c:\windows\system32\dllcache\ctfmon.exe | c:\windows\system32\ctfmon.exe

File::
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\YJDRPCAT\KB959435[1].exe
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\YJDRPCAT\logo[1].htm

Folder::
c:\program files\McAfee
c:\documents and settings\All Users\Application Data\McAfee
c:\documents and settings\LocalService\Application Data\McAfee
C:\Documents and Settings\Administrator\Local Settings\Application Data\qciisr
C:\Documents and Settings\Administrator\Local Settings\Application Data\ttblkt


Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

==========

Please download Malwarebytes Anti-Malware and save it to your desktop.

alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

==========

Install AVG free antivirus
  • Visit http://free.avg.com/download?prd=afe to download AVG Free setup file to your desktop.
  • Double click the downloaded setup file to Install AVG Free then update it.
  • On the left side click Computer scanner and select Scan whole computer.
  • When the scan finished under Result Overview tap at the end of scan result click Export overview to file
  • Select File Type: All files Name:scan.txt and save it on your desktop.
  • Under Warnings tap press Remove all unhealed infections. Then close the application.
  • Copy/paste the content of scan.txt located on your desktop to your reply.
==========

Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Java Runtime Environment (JRE)" JRE 6 Update 17.
  • Click the Download button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u17-windows-i586.exe to install the newest version.
-- If using Windows Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
-- If you choose to update via the Java applet in Control Panel, uncheck the option to install the Toolbar unless you want it.
-- The uninstaller incorporated in this release removes previous Updates 10 and above, but does not remove older versions, so they still need to be removed manually.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click Ok and reboot your computer.


==========

Re-run OTL and post a log.

==========

With your next post please provide:

* Combofix.txt
* MBAM log
* AVG log
* OTL log
* How is your computer running?

Kind regards,
~t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#9 Kameron

Kameron
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:10:20 PM

Posted 02 December 2009 - 10:49 PM

Computer is running great. Not so sure if I completely got rid of SUPERAntiSpyware because I uninstalled it, rebooted and for some reason it still popped up. I was able to do some Windows Updates and recently installed it to Windows XP Professional Service Pack 3.

ComboFix 09-12-02.05 - Administrator 12/02/2009 16:27.3.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.511.326 [GMT -5:00]
Running from: c:\documents and settings\Administrator\Desktop\thecbytes.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\CFScript.txt

FILE ::
"c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\YJDRPCAT\KB959435[1].exe"
"c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\YJDRPCAT\logo[1].htm"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Administrator\Local Settings\Application Data\qciisr
c:\documents and settings\Administrator\Local Settings\Application Data\qciisr\esiasysguard .exe
c:\documents and settings\Administrator\Local Settings\Application Data\ttblkt
c:\documents and settings\Administrator\Local Settings\Application Data\ttblkt\eeqxsysguard .exe
c:\documents and settings\All Users\Application Data\McAfee
c:\documents and settings\All Users\Application Data\McAfee\dspwrp\SmartMessaging.db
c:\documents and settings\All Users\Application Data\McAfee\MSADP\Cache\SaSubDB.Bak
c:\documents and settings\All Users\Application Data\McAfee\MSADP\SaSubDB.Dat
c:\documents and settings\All Users\Application Data\McAfee\MSC\Cache\McSubDB.Bak
c:\documents and settings\All Users\Application Data\McAfee\MSC\mcini.ini
c:\documents and settings\All Users\Application Data\McAfee\MSC\McSubDB.Dat
c:\documents and settings\LocalService\Application Data\McAfee
c:\documents and settings\LocalService\Application Data\McAfee\sacore\sacore.db
c:\program files\adobe\acrotray.exe
c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\YJDRPCAT\KB959435[1].exe
c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\YJDRPCAT\logo[1].htm

.
--------------- FCopy ---------------

c:\windows\system32\dllcache\ctfmon.exe --> c:\windows\system32\ctfmon.exe
.
((((((((((((((((((((((((( Files Created from 2009-11-02 to 2009-12-02 )))))))))))))))))))))))))))))))
.

2009-12-02 03:21 . 2009-12-02 03:33 -------- d-----w- C:\thecbytes21494t
2009-12-02 03:17 . 2009-12-02 03:20 -------- d-----w- C:\thecbytes12115t
2009-12-01 05:25 . 2009-12-01 05:59 -------- d-----w- C:\thecbytes
2009-11-18 20:32 . 2009-11-18 20:32 117760 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2009-11-18 20:32 . 2009-11-18 20:32 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-11-18 20:32 . 2009-12-02 21:26 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-11-18 20:32 . 2009-11-18 20:32 -------- d-----w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
2009-11-18 03:06 . 2009-11-18 03:07 -------- d-----w- C:\Autoruns
2009-11-18 02:47 . 2009-11-18 02:47 -------- d-----w- c:\windows\system32\LogFiles
2009-11-17 02:19 . 2009-11-17 02:19 -------- d-----w- c:\documents and settings\Administrator\Application Data\AVG8
2009-11-17 02:12 . 2009-11-17 02:12 0 ----a-w- c:\windows\nsreg.dat
2009-11-17 02:12 . 2009-11-17 02:12 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla
2009-11-17 01:34 . 2009-11-17 01:34 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2009-11-17 01:34 . 2009-11-18 03:35 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-17 01:34 . 2009-11-17 01:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-11-08 23:53 . 2009-11-08 23:53 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Blizzard Entertainment
2009-11-04 03:05 . 2009-11-04 03:05 -------- d-----w- c:\documents and settings\All Users\Application Data\Blizzard
2009-11-04 03:02 . 2009-11-15 02:56 -------- d-----w- c:\program files\Common Files\Blizzard Entertainment

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-02 21:15 . 2008-06-19 17:54 -------- d-----w- c:\program files\Google
2009-12-02 21:10 . 2008-06-19 20:54 -------- d-----w- c:\program files\iTunes
2009-12-02 21:09 . 2008-05-25 04:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2009-11-04 08:15 . 2009-01-25 21:39 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-11-04 02:44 . 2008-05-25 04:45 -------- d-----w- c:\documents and settings\Administrator\Application Data\Apple Computer
2009-11-04 02:44 . 2008-06-18 16:37 12792 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-28 01:03 . 2009-10-28 00:49 -------- d-----w- c:\program files\GodsWar Online
2009-10-15 01:23 . 2008-11-12 22:38 -------- d-----w- c:\documents and settings\LocalService\Application Data\SACore
2009-09-11 14:03 . 2004-08-03 23:56 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-04 20:45 . 2004-08-03 23:56 58880 ----a-w- c:\windows\system32\msasn1.dll
.
<pre>
c:\program files\Adobe\acrotray .exe
c:\program files\Google\GoogleToolbarNotifier\googletoolbarnotifier .exe
c:\program files\iTunes\ituneshelper .exe
c:\program files\Pure Networks\Network Magic\nmapp .exe
c:\program files\SUPERAntiSpyware\superantispyware .exe
</pre>

((((((((((((((((((((((((((((( SnapShot@2009-12-01_05.52.15 )))))))))))))))))))))))))))))))))))))))))
.
- 2008-08-11 16:20 . 2009-07-14 11:03 46080 c:\windows\system32\tzchange.exe
+ 2008-08-11 16:20 . 2009-10-28 15:07 46080 c:\windows\system32\tzchange.exe
- 2008-08-12 07:01 . 2008-07-08 13:02 17272 c:\windows\system32\spmsg.dll
+ 2008-08-12 07:01 . 2009-05-26 11:40 17272 c:\windows\system32\spmsg.dll
- 2008-03-28 14:06 . 2009-12-01 05:02 49152 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2008-03-28 14:06 . 2009-12-02 03:00 49152 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2008-03-28 14:06 . 2009-12-02 03:00 49152 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2008-03-28 14:06 . 2009-12-01 05:02 49152 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2009-12-02 07:36 . 2009-12-02 07:36 32768 c:\windows\Installer\{F662A8E6-F4DC-41A2-901E-8C11F044BDEC}\icon.exe
+ 2009-12-02 07:38 . 2009-12-02 07:38 969728 c:\windows\Installer\12d5e51.msi
+ 2009-12-02 07:36 . 2009-12-02 07:36 429568 c:\windows\Installer\12d5e4b.msi
+ 2009-07-21 05:03 . 2009-07-21 05:03 1348432 c:\windows\WinSxS\x86_Microsoft.MSXML2_6bd6b9abf345378f_4.20.9876.0_x-ww_a621d1d5\msxml4.dll
+ 2009-08-19 22:07 . 2009-08-19 22:07 1415000 c:\windows\system32\msxml6.dll
+ 2009-07-21 05:05 . 2009-07-21 05:05 1348432 c:\windows\system32\msxml4.dll
+ 2007-09-20 04:49 . 2009-07-31 04:36 1172480 c:\windows\system32\msxml3.dll
+ 2007-09-20 04:49 . 2009-07-31 04:36 1172480 c:\windows\system32\dllcache\msxml3.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-12-02 377994]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Adobe_Reader"="c:\program files\Adobe\acrotray.exe" [N/A]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Kodak EasyShare software.lnk - c:\program files\Kodak\Kodak EasyShare software\bin\EasyShare.exe [2007-9-19 282624]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Adobe\\acrotray .exe"=
"c:\\WINDOWS\\system32\\drwtsn32.exe"=

S1 SASDIFSV;SASDIFSV;\??\c:\program files\SUPERAntiSpyware\SASDIFSV.SYS --> c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [?]
S1 SASKUTIL;SASKUTIL;\??\c:\program files\SUPERAntiSpyware\SASKUTIL.sys --> c:\program files\SUPERAntiSpyware\SASKUTIL.sys [?]
S3 SASENUM;SASENUM;\??\c:\program files\SUPERAntiSpyware\SASENUM.SYS --> c:\program files\SUPERAntiSpyware\SASENUM.SYS [?]
.
Contents of the 'Scheduled Tasks' folder
.
.
------- Supplementary Scan -------
.
DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} - hxxp://lads.myspace.com/upload/MySpaceUploader2.cab
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-02 16:34
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2009-12-02 16:37
ComboFix-quarantined-files.txt 2009-12-02 21:36
ComboFix2.txt 2009-12-02 03:32
ComboFix3.txt 2009-12-01 05:58

Pre-Run: 9,272,840,192 bytes free
Post-Run: 9,362,583,552 bytes free

- - End Of File - - C3B2DBD7B210DCD13796C673661DAE1D

Malwarebytes' Anti-Malware 1.41
Database version: 3281
Windows 5.1.2600 Service Pack 2

12/2/2009 4:52:05 PM
mbam-log-2009-12-02 (16-52-05).txt

Scan type: Quick Scan
Objects scanned: 96315
Time elapsed: 4 minute(s), 10 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 1
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{04a38f6b-006f-4247-ba4c-02a139d5531c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{b6d223f6-c185-49a2-ba7e-a03e84744702} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b6d223f6-c185-49a2-ba7e-a03e84744702} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\superantispyware (Trojan.Downloader) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{1c0c7d5d-d59d-49f2-8c11-8b7665bd0a6f}\NameServer (Trojan.DNSChanger) -> Data: 77.74.48.113 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{256ff631-7a51-4fff-ae9b-0d493ccbf8c2}\NameServer (Trojan.DNSChanger) -> Data: 77.74.48.113 -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\rundll32.exe.delme1157 (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\rundll32.exe.delme254 (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\rundll32.exe.delme869 (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Program Files\Adobe\acrotray .exe (Trojan.Agent) -> Quarantined and deleted successfully.

"Scan ""Scan whole computer"" was finished."
"Infections";"389";"389";"0"
"Warnings";"46";"46";"0"
"Folders selected for scanning:";"Scan whole computer"
"Scan started:";"Wednesday, December 02, 2009, 7:03:22 PM"
"Scan finished:";"Wednesday, December 02, 2009, 8:30:24 PM (1 hour(s) 27 minute(s) 2 second(s))"
"Total object scanned:";"202107"
"User who launched the scan:";"Administrator"

"Infections"
"File";"Infection";"Result"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP9\A0000906.exe";"Trojan horse Agent2.AAGU";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP9\A0000905.exe";"Trojan horse Agent2.AAGU";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP9\A0000898.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP9\A0000894.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP9\A0000891.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP9\A0000804.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP6\A0000656.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000120.dll";"Trojan horse Vundo.IO";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000117.exe";"Trojan horse Generic15.BAHH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000114.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000113.exe";"Trojan horse Downloader.Generic9.OSR";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000112.exe";"Trojan horse SHeur2.BRBM";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000110.exe";"Trojan horse Small.BQO";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000108.exe";"Trojan horse FakeAlert.NJ";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000106.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000105.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000104.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000103.exe";"Trojan horse Generic15.BAHH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000102.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000101.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000100.exe";"Trojan horse Agent2.AAGU";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000099.exe";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000098.exe";"Trojan horse Generic15.AOWX";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000020.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000019.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\System Volume Information\_restore{A7114424-6327-4718-B6C2-958BEE2FD4DF}\RP1\A0000004.exe";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Qoobox\Quarantine\C\WINDOWS\system32\___c0077F29_.dat.zip:\__c0077F29.dat";"Trojan horse Downloader.Generic9.NXA";"Moved to Virus Vault"
"C:\Qoobox\Quarantine\C\WINDOWS\system32\___c0077F29_.dat.zip";"Trojan horse Downloader.Generic9.NXA";"Moved to Virus Vault"
"C:\Qoobox\Quarantine\[4]-Submit_2009-12-01_22.22.31.zip:\zawibavu.dll";"Trojan horse Vundo.IO";"Moved to Virus Vault"
"C:\Qoobox\Quarantine\[4]-Submit_2009-12-01_22.22.31.zip:\penmrdya.exe";"Trojan horse Downloader.Generic9.OSR";"Moved to Virus Vault"
"C:\Qoobox\Quarantine\[4]-Submit_2009-12-01_22.22.31.zip:\mojegawi.exe";"Trojan horse Generic15.BAHH";"Moved to Virus Vault"
"C:\Qoobox\Quarantine\[4]-Submit_2009-12-01_22.22.31.zip:\kewwr.exe";"Trojan horse SHeur2.BRBM";"Moved to Virus Vault"
"C:\Qoobox\Quarantine\[4]-Submit_2009-12-01_22.22.31.zip:\hkkyaekg.exe";"Trojan horse SHeur2.BRHK";"Moved to Virus Vault"
"C:\Qoobox\Quarantine\[4]-Submit_2009-12-01_22.22.31.zip:\excbx.exe";"Trojan horse Small.BQO";"Moved to Virus Vault"
"C:\Qoobox\Quarantine\[4]-Submit_2009-12-01_22.22.31.zip";"Trojan horse Small.BQO";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{FE69A82B-A1CC-400E-BB60-A9874101246F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{FDFEB563-007C-4249-8611-F5BEDEA6C120}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{FCADCB26-E331-4038-99E9-5F802AC2F857}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{FB1FB935-1910-43BC-B953-F4B41FE845FF}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{FADD4E9A-E744-418B-B690-2CA3597C2D87}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{FA4B8F27-9516-42E6-AF23-C1A800503481}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{FA10C35E-EF01-431E-AA77-5F1A2CD51A1D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F9DF776B-5FC2-4012-B36C-430F5D5EB1DC}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F7F8753B-B3A5-4775-8716-68BF18AA0D46}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F7147C56-F6CA-4448-B2F3-8A0DF7913B45}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F6396E87-39F4-4171-8014-9B948D67BF6F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F5826A3B-ACED-4634-A629-DB4268D8CCAE}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F404DE9C-BB8D-4BA3-AB7D-AA35FF24E379}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F35A1944-FA3E-4759-B55C-BF653941A469}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F2BF1020-2250-4303-8CD3-5CCAA527FBF6}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F2BE1BC1-DD8E-4310-9906-810B9A249E63}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F18D2DEB-C912-4ECC-8A83-CA940D8627DB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F1883C87-F39E-4FE3-BB43-3E0725892C98}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{F05E1176-9C82-48E4-A5BD-650FB23609E1}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{EE6F280F-D22E-4068-8171-898F57A99334}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{ED3DD630-D186-4511-81DA-098B63CAA296}";"Trojan horse FakeAlert.NN";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{EC379F59-6189-441B-ABD8-1252E137E572}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{EB8789CD-790F-451B-AAFD-AA8E6097F5A4}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{EA84C7B1-6214-4D23-9255-1790F0C20B98}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{EA46E5EE-33B3-48E3-985E-4FE827E2DBBB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{E9E5CAA4-D02A-4A09-91DB-18BF059C2319}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{E9A79B36-B3CD-44D1-9880-181A31E0A581}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{E8A008E9-372C-4247-BC1C-51A0774F2F9F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{E7CBD865-254C-48D9-B7CB-5B8DA85E6079}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{E43FEDFB-ACCE-4FE0-A7AE-B135BCD50716}";"Trojan horse FakeAlert.NN";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{E3B2548E-4ECD-4A96-90C8-B548C1A7C307}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{E3A42008-C532-42C7-A890-4BEB57451BD1}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{E37D9C67-916D-41FB-B5A6-6D8753444A82}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{E2E0EAB6-D4AE-47F0-A7BE-CE1BA58FCF96}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{E0A3A997-E5BC-4519-BF24-F044F4F51DCB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{DF99E593-125D-44A0-A291-028E23C6D73D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{DF6E4AC8-931F-4358-AB5D-C7B9540296AA}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{DF543C3A-851C-49E6-856E-73D5688AFF56}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{DE32DFF7-288F-4050-96CD-D78F7BA36456}";"Trojan horse FakeAlert.NL";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{DD32A5DE-2108-4A73-909C-1372BD15FF99}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{DC49B22E-3FAB-4798-8A83-D3218E01F396}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{DB3A33E3-C24D-4C7C-AD97-8D929D5AF025}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{DA052C78-73D9-4163-B2F9-65BDA032D83C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D910C3BA-9A86-4F61-A0F0-1E2C05B9DF1C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D854050B-ADB9-4102-AE20-0320A2D3ED47}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D77DC210-7BD8-4F7A-8C8D-C3008F2AA5C9}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D725C3CB-DB7A-45BE-9686-082A3D003F1A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D6E2FD45-8FDF-47BD-9463-BDA0815DD8BB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D69B3A5B-5A21-4D43-B56A-FAAC89BB31BA}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D6691948-DB4D-4234-89DE-EB8E918C1BF1}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D5ECEF49-B7D8-4E57-B729-0BC4B14092EA}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D5D68541-EDC9-45FD-8B25-3D453D79E940}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D56D1739-F6BE-43F3-BAD4-707F571F9827}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D30219A8-C3FF-483D-9E6F-561BEA66F7A3}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D2A594F9-FE07-4F71-841E-7FCF8E3A2ED9}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D29394AE-8C02-4B5F-9F28-D03D325C6612}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D284960D-E9E0-4063-BC69-7440FB1E297F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D26386C8-6EC4-4541-853F-0544E28E955E}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D189E519-BB68-47CC-A837-705827C0BA1C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D17961F7-31E9-4F8E-AD99-B13C4AB37AD6}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{D14CF7E4-A49A-4651-AC41-E67A45031695}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{CFA79373-A916-4710-9973-B1FE6F47D21A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{CF4D1254-3008-4575-A97B-D2527C72AB33}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{CF1835C3-C8BF-411B-B6E9-D34EFF12D93B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{CD60C3C0-0272-479F-9DCD-C11A66AF6FB8}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{CA4CA15F-AD37-4148-B3C6-AD8892002466}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{C9A44CB8-277F-45D9-B2B7-F80CBECB7D08}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{C9796D2C-5C1A-4BAB-8471-92B44C2BCD56}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{C7E7B0A4-A586-4689-AF50-F21185E44235}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{C6CB3A8F-4CDF-4E27-A7E4-0DA3741CEB0B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{C5D5170E-BFE2-4278-803D-F9B3C21399A1}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{C55510DB-D63A-4EA5-908E-2DF12BFBA9A1}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{C41BBB26-8994-48EA-8528-87EC8964EB5E}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{C3FFFFD9-291C-43CC-87E5-1A08D58B60D9}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{C0D24F0D-59F2-452A-8590-09DCDF0B0F6A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{BFCCD209-7C85-4F03-93CA-EB7483AADFE3}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{BF8C98A2-FDDE-4499-AA15-A94075578ED3}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{BF624194-A5CB-4497-8BDC-39979EE33248}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{BF29AAF3-D2AC-4ECA-BBB1-EF115FCBAB93}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{BE816353-124B-4BC9-93D6-76E753A3E1B4}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{BE418F60-23CA-44E7-9264-F73553D6C7D6}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{BD201DD0-57E6-47B1-9BA3-05573383C1BE}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{BC453073-1CEE-43A6-8058-D131DCAE30AB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{BC0E349A-162F-40A6-8310-21941DE9CD7D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{BBFB3C3F-3B24-451A-A830-FEFDAEA3E87E}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{BBAB9D13-BD62-4137-88C1-CE7DFE0A1080}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B9CF81D0-D067-40D2-8B07-0E609D30E406}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B9C29AB2-201B-404C-833E-7F6BC2B19DD1}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B98D45B8-7562-4301-AA1B-E3566D222DA5}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B829C830-22A1-4A87-B591-E71EB83BEA8D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B6FE6BC0-4273-4244-A0DD-42C873326E8A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B5CEC772-E7D5-46FF-8773-EEBA7E1467EA}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B5A986CE-28ED-423A-A892-DFD5ABFEFBDA}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B5819C7B-BB07-45F3-BA25-599355C9C21C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B4931F8F-0C08-4A42-A857-2B253C8303AD}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B4299E1C-C0BE-4231-981B-FD51DC0E58C0}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B38B99EB-DE23-4A26-910C-AA08CB137962}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B21A3A15-FECB-4AB7-BA7A-6EBDCC7900C6}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B173BF6D-FF01-439E-9FF2-7F1E5F406383}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B14DEEA4-2A71-4E45-95AD-E2545B2E53FD}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B144995A-3AA7-4D6B-98C2-BEC2F2BE4242}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B128F408-72F3-4E1B-A0DE-77B2E4F42436}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B11B13FB-B8E4-45D4-AAE0-99DBA1E059E0}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B0DFE053-2728-4A81-96BC-BEE84B0B5967}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B09E01D9-9242-44FE-A162-C6034588E0EE}";"Trojan horse FakeAlert.NL";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B0866FE9-81CF-4773-BECF-FF21D9D18F9E}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B042D964-C71B-483D-B57D-06DDCCB5EE1F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{B02A186B-4B94-41C5-A2F8-3302135F4B8D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{AF716339-BBED-4255-81D6-10AA434FE754}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{AEB2A554-B31F-4861-A9D2-02643AE96782}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{AC6E003A-D147-48C7-ADF0-861B86BEE6B5}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{AC6607C7-7C3D-4E7E-B53E-7185466C506D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{ABA4E77B-F33B-46F2-B02D-58B3AC5DDB21}";"Trojan horse FakeAlert.NL";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{AB01419A-29FA-477D-82DE-459D4D37A1D4}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{AA2F060C-F29D-474A-A56F-79304FC51363}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{A925DCD5-975C-4DAF-8A02-A8AC90E86DA4}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{A8B090CC-EC31-4A3B-B20A-ABF3E7C505EB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{A6A2BF62-5679-410A-852F-64E841EB670C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{A638947B-9C6A-4FBD-AEC0-14FDDAFED467}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{A40A6561-5E63-4E22-BF2B-90AB1D4834DD}";"Trojan horse Downloader.Generic9.NXA";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{A3705097-9E45-480C-AD91-AA34F0246661}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{A3556C8D-507B-4DAD-A196-61EE932A1C0F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{A104F0D8-5191-4C1A-97C8-CFBA934E09C2}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{A0A51D69-A948-4310-9E84-ACBB9F46B704}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9FF97017-6500-4022-B60D-17D22425927D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9E89AC1F-C078-4466-A40A-02EA0B957189}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9E7D733C-4029-4B10-9E5B-CDDABDD6D95E}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9E1EE8E4-0492-4B45-8039-20FC2B468A64}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9D86FE0F-DBA7-4251-BCC7-230F27BFC6E2}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9CE7A686-C6FC-410D-96F1-B032A15BF73D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9C84E604-7EBF-4E5B-972B-8C71481CC9E4}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9BEECD66-347B-43A8-A88F-239459878A48}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9BC17F7F-306F-40C9-8BE5-B1A8CC314AC5}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{99FCAA31-9544-4F5D-9AEF-6C73818A929B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{99886F80-CA5D-4DE5-BE22-9CB4E2E3440F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{98BCE96C-4F25-492E-86E4-8360459E0F3F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{98B0E4D5-B3D8-4A6D-B045-B2D8CA1078B8}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{97CC2C34-1570-4FDD-939F-44292FD729D4}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{976E8E24-156C-49A4-B3BD-6C014191584A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{975045FD-A593-463B-873A-FB2C98CDE4EB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{96F9EE78-2AD4-4428-83E0-B6F24307575F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{94D52570-9736-4C96-AF65-17863433B79C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9492BC23-4C32-4CF1-9325-46A77FF009A8}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{940F86B2-46E3-4C42-862A-0A044E7E271C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{92BF7E40-0C9E-46E1-80AB-6FAE496DDC0A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{927B0973-2711-4B06-95C4-AC12476737F0}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9169D5E3-D752-498A-8226-055BF9B80383}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9132BB92-2DA1-45D6-9852-B2B0719BB33A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{910DC8EC-00F5-41C1-BC93-AD2B402F049D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{9063CD69-0353-4E0B-A9C8-86A4EF13C1AA}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{90350612-82BA-429B-BBDB-7D921521B158}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{90172408-97BE-458C-B9DF-830D5638A52A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{8F9FCB67-7DE5-45A1-BFB6-D102C6F0F319}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{8F9247DF-3220-4D68-8DA5-08A50778BB82}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{8EA882CA-B622-41D9-9B43-B077A85B0A18}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{8CD888C9-ABC5-4382-9B1A-A2D3741DC5C6}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{8C97D630-9E60-4A0D-8049-F5AAB20CE497}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{8BA46BA9-5B14-41C6-A09F-E680AA36C050}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{894D0EDC-0491-48FA-9316-5D3E766A2EFB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{88542E48-4920-4A09-8257-76F67D8D5E67}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{87F55B80-B3CE-4663-955E-98A46C33A799}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{87F46E5C-F81F-4946-A5A9-237945267310}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{878BFB1A-F95E-4187-B1A6-6FAE92185053}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{87597439-95D5-4DB3-9C32-32FE413AA71F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{86AC04F9-E3B7-4257-A405-4458563C9116}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{86A0291F-C3F8-4CDB-91A1-29F29B26B646}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{85480886-D7CB-4595-8B9E-67CFDB72DCFD}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{84CE709A-3F48-4499-AC1F-79A31FB2C1C2}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{83D52810-4F13-44C1-9628-7CE61C47A515}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{823AE20B-6C61-4972-97D5-8A3DB1BE93CC}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{819F0FF0-03B4-404C-B3E9-9728A4F50BBD}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{81685421-A6B8-4AB8-BD53-80A701FF301C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{8060A4D7-BEC1-43FF-BC1B-71FEF38CE8A3}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7F99B9F0-41F7-418A-AD04-B96269190537}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7E543922-8AF3-4440-A0F2-35FBD48ED208}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7E32053D-1943-4D60-8CF5-7887062BC5E9}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7D73C0C2-9291-4FD4-9F67-4D2927F5F804}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7D4F842C-E201-40E9-BA10-5150F80891F3}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7CF9F0A3-4D4F-4356-B1F6-B36EF558FE49}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7C4D9067-F4E2-46F3-B2CB-306FA28DA0D0}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7C380181-0FB6-4436-BBC9-B3BA0D2C5AEC}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7B860C5C-31F8-4536-975B-21EB300A1775}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7B3AC0D9-EB37-4667-818E-EB9E9363F372}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7AE6AF5D-09DB-481C-BBCE-DAD969F6D159}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7A969C85-6FF3-47B6-9EFD-3C28F43F45C5}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7A5DE5BD-A2E1-4E89-8A04-524AAE97FB7C}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7A0FB9A1-E215-44EF-A578-1FAF61066FF9}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{7972C35D-9CA2-4B09-ABE5-EFF15F5B4124}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{78D75F32-F071-4BD4-8715-6764F2901A65}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{77901E73-3BB0-4EB1-BFEF-65F5AC73B834}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{76B4434F-BC53-440C-B51F-1E1E7B2A952D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{756301EA-81DF-4E9B-965B-9819F87716AF}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{753884B0-8875-4AE9-B511-B82A16ABD51B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{73E27748-D8BA-4789-981B-CB03A58CE65A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{715E3BC2-31A2-4E15-9D04-D3D7C370334F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{70A5877E-ABB4-4C85-9701-963025A58018}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{70A4820B-48AE-4A43-8A70-7A545713EC10}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{704E5D60-1C0A-46B2-913C-C2C0C07E9D3F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{6F4A120D-925B-400F-9D27-B182404D47D6}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{6A622D20-E173-462C-8B4A-F473935E7496}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{6A1D108F-5614-4DAE-93BE-5844F5FED27B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{68BF56D8-072D-42BC-9751-730B3C8176DC}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{67A031FB-CEED-4EA4-8396-BB2989B3B682}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{67344A5F-14E8-4A35-95F3-691AB0C926ED}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{66C598DA-FA20-4BC1-93A9-D523377910AA}";"Trojan horse FakeAlert.NL";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{665B5AFE-4FE6-4132-9DD9-1F94D209C1A4}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{66219DE8-1D37-4679-8ACC-82901BC86890}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{655566AD-AD5E-4F53-8C79-41857C8A6661}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{653BEF60-0CAF-4031-B599-65FEE15A70CB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{65342B43-9225-49E6-8025-3F38B938B972}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{6528645A-A188-467E-AD10-5A8621584557}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{64E05CA6-F6F1-4BF5-9631-81AFFA8F67EA}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{6373385D-7113-4A1D-AE1A-BCB0C83AD671}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{62215D12-88C5-4988-ACF3-F6985CE245BD}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{6162638B-A4D4-4BBF-B9B8-6062F000CC7C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{608CFDA0-8B34-4063-B5CE-B55085CEC504}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{6074D381-E86C-4B24-A97C-06500A4A5657}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{601D7DA3-157D-42AB-A4D2-74AAE06345E6}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{5FAE2FD6-FFFD-47CE-80F6-392AAAE8A505}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{5E8ECCDC-9F90-4916-A9ED-01C9B74D362C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{5E5BF1BA-4852-47A3-B999-C9CDAA004541}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{5D0EC83C-E4C2-4588-8983-D5FE15E011BC}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{5C634E9D-9453-4E57-ABC7-EFEFC620FB15}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{5A7F88EA-EC2B-4B71-8D1A-3783D616E955}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{59F7D49B-2598-454D-A351-66DF19245C10}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{592C086D-E3CD-45DB-A1FA-644086E0BBC9}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{5690C5B2-CC6B-449B-8820-EA4FFBEA94A0}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{562F53C4-CC0B-4E84-BCE3-26232747C4ED}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{55B36EE3-93F3-4847-8110-A12CA7830D6A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{5567052D-D27D-4F04-AC4C-7F1D5FD9A8C5}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{5558FA7C-BD85-40B4-AC59-51DF089EA089}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{554952A0-ED78-4DFA-B1C0-1375978FD910}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{54226686-E396-4C4F-B288-644B1181ABB8}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{541B42C7-7143-4AE3-BADA-01C19421D21E}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{5377D898-804C-4850-94E2-9AE09414F648}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{51A39D28-AE77-43D3-8BAA-6CFDE7EF5FA9}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{5107741C-758A-4C42-B81A-963BE3BEF1D6}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4FAFF60A-C33E-42F5-AA43-1D8544355C99}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4EF8A1EF-4E18-4329-9752-33A7AEA149FE}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4E4D5459-F3BC-44F4-AD17-045DDF9F24CD}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4DA174D8-1788-4EB3-9440-8A801DBEB96C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4C950D51-968C-400D-8004-D14DDE8509F6}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4C7345F1-4295-47D0-90C9-DCAFFF1935A0}";"Trojan horse Downloader.Generic9.NXA";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4BAB3F05-2AA3-4E80-A12D-53EEB125B118}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4B998DA7-A242-474B-995E-D9968E613D5A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4AD6EC78-B8B5-41DD-896D-EFDFC5319C3B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4A11C9A6-2F34-4652-B382-E073FADB7FBC}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{48AC6E89-9212-4733-8205-7CD9ABE47593}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4798DB5E-E745-40DD-BB0B-35CA7085DFD0}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4793A491-FD11-49B9-9222-B8E42779B68C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{47487749-B6D2-4876-9AF2-3FD6ADDA303E}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{46DC02F1-D3A5-49F6-BB39-A92DF6FDD74F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{467EEDA6-A613-45B9-8362-C6E51119326A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4665B9DD-CD81-42E3-83C0-7042720A18ED}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{45587C6B-4673-4640-A919-E789C151828D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{44ECF4C7-F4BB-4EB3-BACE-874804C31F95}";"Trojan horse FakeAlert.NN";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{44658F8E-1A61-42F0-8EC1-D74316951BDE}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{43EAEFBC-C149-4716-A257-5E7C5C9C8B36}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{41CE7090-F0AE-4F0B-83D2-EEE2231921E4}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{4030C601-DF08-49A2-A815-C9D55CE7A496}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3FFC2F8A-6141-4AF0-A87F-CF4CBEF3C068}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3FDFD7FF-C196-42FE-B2AF-1E0AF8A6D9DB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3D75850A-90E0-4A2B-89F2-BC700722B44C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3BCCB3B9-5361-4629-AA1D-9531FC9F465B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3AC664A6-E9DF-494C-A256-8D38DF998D38}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3A261D75-68DF-43A7-8F55-0A9A6C33E0C0}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3A213745-18A2-459C-9C04-1F5EEC223285}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{39E62CE1-6AA1-4B54-8AF5-918232C779CC}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{399D29DE-1DEC-486B-A198-9871742677BE}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{393A8E05-E30C-44AA-BEF2-14CC68947094}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3890391F-49DE-4AFA-B194-9F600652800D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3826FAB1-6147-4C2F-85EB-C3E27C924FE5}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{37D43632-5885-4A54-9B58-6341F22BA802}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3660C3F5-E60A-4A5C-AA58-40CA83B73B8B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{362AA690-F938-4A18-8B46-4AB63675BA10}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{353FB219-9C37-4153-AAEC-4593304D5A42}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{35258981-9056-4E0E-9DD9-3B7FC917083B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3512FB3E-2F64-4F07-8BA6-382C8124B52C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{34C21378-0920-4958-8CDA-42F7F1F5B002}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{343CAEDD-F405-4A0B-8571-334BF973222A}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{31990611-0BFE-4399-8CA3-FC1A0D083277}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{3175CBB3-19FC-4E97-99C0-02B4205BF03C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{30DFB6F3-9612-4B22-89C5-B171263C977C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{30A14AE4-F3E8-4F49-92E4-B6347C344259}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{306E4713-16E6-4F64-A667-CFCBD1D0966B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{2EBD0508-4DC0-4780-98B9-64F8B2D40969}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{2D6DE380-9A2B-4727-B983-5CC6DB5F158C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{2C9ABA39-FBF4-4D47-BA4A-08223CDC980A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{2C823EA2-D3B9-4FCA-99F5-C6AB882FBA3F}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{2B789EF5-8ED6-4B9C-9C53-C953911EEF09}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{2AC705C2-33D2-4216-8DD1-7ABA27C6A050}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{2A5962CE-CFA6-4CD3-B03E-84E802B0A617}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{29D57411-1806-4BF1-BC72-4DB3B0519717}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{298170B3-D037-43DC-AC1C-117415301DEB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{26885B84-0177-49D9-BD43-42DC18FF3B7A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{25BC7503-BEE0-483B-9A1A-74F23F6CABD5}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{2593A16E-F3EE-4EBB-8767-F1104B2E3C7E}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{258CD25B-89CE-4DB2-B43D-34424CC436F6}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{2540CA94-0628-4C35-8000-F604FF0C4E43}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{24173D6E-2554-4F1F-B583-304CA85A5CCE}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{232FADD2-E494-4185-8B9F-C4B1C46CDAD7}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{21AA2CCA-E0D6-4E43-BF63-5D8B609FCEB3}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{206CE14E-0B83-46BF-B2E3-6D7644E2F410}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{2039DDC9-4EC3-4A8A-8696-656ADDD46472}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{1F0A9004-6424-4EEA-B077-D0DF27F1B6C1}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{1EBCEA97-B9DC-4C46-9DD5-D090CD81E9E7}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{1E10CB99-7B92-4064-9B95-848F35518B69}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{1DBE661D-856D-4A0E-91CA-6C324B490D1D}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{1D61B99F-DCE9-4302-AEC9-44E721C0734B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{1CD7B243-EFA0-4A95-9369-09A62C6EAC67}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{1C37DD15-1529-48E1-9F84-8FCF22481ABA}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{1BBA6FC3-2230-4B7D-8B79-9EF2F45193EC}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{1BA3DB54-6A4C-47C7-97B2-FD0E2DFF87F3}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{1A1EE679-EFD8-4E07-967E-B3C12D9DC71B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{19D55D61-AFD6-4A89-890E-F6EA131B47A7}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{19A4B6C8-2A16-430F-B5AC-CF3E5FDB7599}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{18D2D582-3546-43F9-8ECA-088156070D2B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{17CBA323-C595-4579-827E-836B56C91D06}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{17A4AA9A-FC4E-48D2-848A-659EA1E666AB}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{177126F3-E0D7-4E42-B21B-AA1DD270B1A2}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{162C6BF9-D54F-40E5-A952-B1C6BE3EEBEA}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{152BDA2A-2425-4871-B21D-388473AC09D1}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{14C7C4DD-653D-493D-8E7A-5D4990AFE9B7}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{14AB4749-2715-4CB9-9DDF-352855DFAE5A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{13E0EB83-32AE-4DDD-BE6A-05A8EE77D7EA}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{12B56353-BB64-495A-9F62-AC251388F430}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{101F60A2-AE89-4A68-87E4-EB00C3BB1D1B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0F029681-A37A-4827-A3DC-9A1039E798E5}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0E89D6CE-9DD3-46FD-AC50-9CD6719B488A}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0D4992EE-124D-45FF-A1C0-663D79CB06B6}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0CEC9C79-F8D5-427E-AA1C-BC178ED4B89C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0CB39714-98B4-4721-898D-26E381B85A77}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0C95B395-3BBB-407B-A95D-66EF7326821C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0C63FDFC-4FC9-4617-8798-F524253D4954}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0C075012-0D08-490F-90E9-2C3A63AE9818}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0BFC3B9F-5474-45C5-A1C9-94CC39A67A0B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0A7930DD-9224-4295-BB85-C977CE0FADC9}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0A3ADDAA-522E-498B-96D9-68FF07FC2A90}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{09F18213-F630-4BC1-8027-FCA7B67F3259}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{08938BEB-945A-47B3-A9B4-490009F90AB5}";"Trojan horse FakeAlert.NK";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{07F5A74F-0C55-4C8A-8D00-CF79D736B675}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{07B10418-DB85-4499-8B58-11A58339F8EE}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{06049659-E274-445E-A563-E510A475F576}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{0254091E-AFB8-4FF1-BB45-45E98663D85B}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{020B26BB-795B-4F27-9B4F-4F18140A37D8}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{01B76F4C-0EAF-43D8-B8F8-B54A3A19505C}";"Trojan horse Downloader.Generic9.NWH";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 17-44-05\{001ED11F-9B9C-49B4-8687-4756D188F02B}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{BC0B88D2-2EB9-4F25-BC8D-A0634D8D76AA}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{BC01F251-5EB2-4363-8ABF-58EB8D67CFFC}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{B6D8007E-BC79-4AC7-8C2F-0CA9E2154574}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{675B5ED0-1601-4B6E-A286-B499E18E6D17}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{44895EE1-F5AC-402F-9AE3-2472D799B657}";"Trojan horse FakeAlert.NN";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{20E1B506-5ED1-4AF0-860D-DE1C68D09897}";"Virus found Win32/Cryptor";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 11-18-2009 - 16-34-58\{00BF223B-D8E4-47E1-A8A2-70514A07374B}";"Virus found Win32/Cryptor";"Moved to Virus Vault"

"Warnings"
"File";"Infection";"Result"
"C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt:\zedo.com.f1d14556";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt:\zedo.com.dd15d628";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt:\zedo.com.cef1c7af";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt:\zedo.com.ce59db3e";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt:\zedo.com.c1dd09f2";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt:\zedo.com.a5b6a132";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt:\zedo.com.6a4b36ab";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt:\zedo.com.27f1639b";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt:\zedo.com.14a38114";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt";"Found Tracking cookie.Zedo";"Healed"
"C:\Documents and Settings\Administrator\Cookies\administrator@mediaplex[2].txt:\mediaplex.com.f652b123";"Found Tracking cookie.Mediaplex";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@mediaplex[2].txt:\mediaplex.com.dc30fb3c";"Found Tracking cookie.Mediaplex";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@mediaplex[2].txt";"Found Tracking cookie.Mediaplex";"Healed"
"C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt:\atdmt.com.f4b86dca";"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt:\atdmt.com.b3e33b5f";"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt:\atdmt.com.7247c262";"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt";"Found Tracking cookie.Atdmt";"Healed"
"C:\Documents and Settings\Administrator\Cookies\administrator@adtech[1].txt:\adtech.de.a9245469";"Found Tracking cookie.Adtech";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@adtech[1].txt";"Found Tracking cookie.Adtech";"Healed"
"C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.ff92306";"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.eec26c3e";"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.e626e6be";"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.b68f2b7b";"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.8a47878";"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.557bf2b0";"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt:\ad.yieldmanager.com.539b0606";"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt";"Found Tracking cookie.Yieldmanager";"Healed"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\zedo.com.c1dd09f2";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\zedo.com.a5b6a132";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\zedo.com.27f1639b";"Found Tracking cookie.Zedo";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\tribalfusion.com.dcc03271";"Found Tracking cookie.Tribalfusion";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\revsci.net.e9dbeb91";"Found Tracking cookie.Revsci";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\revsci.net.55564293";"Found Tracking cookie.Revsci";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\revsci.net.44927ec";"Found Tracking cookie.Revsci";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\revsci.net.2df99d79";"Found Tracking cookie.Revsci";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\mediaplex.com.f652b123";"Found Tracking cookie.Mediaplex";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\mediaplex.com.dc30fb3c";"Found Tracking cookie.Mediaplex";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\m.webtrends.com.b4ca7df0";"Found Tracking cookie.Webtrends";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\doubleclick.net.bf396750";"Found Tracking cookie.Doubleclick";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\atdmt.com.b3e33b5f";"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\atdmt.com.7247c262";"Found Tracking cookie.Atdmt";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\ad.yieldmanager.com.b68f2b7b";"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\ad.yieldmanager.com.830b6f08";"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\ad.yieldmanager.com.557bf2b0";"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite:\ad.yieldmanager.com.539b0606";"Found Tracking cookie.Yieldmanager";"Moved to Virus Vault"
"C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\cookies.sqlite";"Found Tracking cookie.Doubleclick";"Healed"

OTL logfile created on: 12/2/2009 10:25:10 PM - Run 2
OTL by OldTimer - Version 3.1.11.4 Folder = C:\Documents and Settings\Administrator\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

511.01 Mb Total Physical Memory | 185.34 Mb Available Physical Memory | 36.27% Memory free
1.22 Gb Paging File | 0.93 Gb Available in Paging File | 75.96% Paging File free
Paging file location(s): C:\pagefile.sys 768 1536 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 18.61 Gb Total Space | 6.47 Gb Free Space | 34.76% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
Drive E: | 123.72 Mb Total Space | 89.07 Mb Free Space | 71.99% Space Free | Partition Type: FAT
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: USER-849142A3DF
Current User Name: Administrator
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: Current user
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Standard

========== Processes (SafeList) ==========

PRC - [2009/12/02 22:22:10 | 00,153,376 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Java\jre6\bin\jqs.exe
PRC - [2009/12/02 17:05:25 | 01,055,000 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgchsvx.exe
PRC - [2009/12/02 17:05:23 | 00,600,344 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgnsx.exe
PRC - [2009/12/02 17:05:22 | 00,502,040 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgrsx.exe
PRC - [2009/12/02 17:05:21 | 00,702,744 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgcsrvx.exe
PRC - [2009/12/02 17:05:15 | 02,020,120 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgtray.exe
PRC - [2009/12/02 17:05:07 | 00,906,520 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgemc.exe
PRC - [2009/12/02 17:05:04 | 00,285,392 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgwdsvc.exe
PRC - [2009/12/01 20:18:52 | 00,535,552 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Administrator\Desktop\OTL.exe
PRC - [2008/04/13 19:12:19 | 01,033,728 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2007/09/19 03:33:46 | 00,282,624 | ---- | M] (Eastman Kodak Company) -- C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe


========== Modules (SafeList) ==========

MOD - [2009/12/01 20:18:52 | 00,535,552 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Administrator\Desktop\OTL.exe


========== Win32 Services (SafeList) ==========

SRV - [2009/12/02 22:22:10 | 00,153,376 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Java\jre6\bin\jqs.exe -- (JavaQuickStarterService)
SRV - [2009/12/02 17:05:07 | 00,906,520 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgemc.exe -- (avg9emc)
SRV - [2009/12/02 17:05:04 | 00,285,392 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\Program Files\AVG\AVG9\avgwdsvc.exe -- (avg9wd)
SRV - [2006/10/26 14:03:08 | 00,145,184 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE -- (ose)


========== Driver Services (SafeList) ==========

DRV - [2009/12/02 17:06:09 | 00,360,584 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\Drivers\avgtdix.sys -- (AvgTdiX)
DRV - [2009/12/02 17:05:57 | 00,333,192 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\Drivers\avgldx86.sys -- (AvgLdx86)
DRV - [2009/12/02 17:05:52 | 00,028,424 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\Drivers\avgmfx86.sys -- (AvgMfx86)
DRV - [2007/11/13 05:25:53 | 00,020,480 | ---- | M] (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K.) -- C:\WINDOWS\system32\drivers\secdrv.sys -- (Secdrv)
DRV - [2007/03/29 02:00:00 | 00,043,528 | ---- | M] (Sonic Solutions) -- C:\WINDOWS\System32\Drivers\PxHelp20.sys -- (PxHelp20)
DRV - [2004/08/03 21:31:34 | 00,020,992 | ---- | M] (Realtek Semiconductor Corporation) -- C:\WINDOWS\system32\drivers\RTL8139.sys -- (rtl8139) Realtek RTL8139(A/B/C)
DRV - [2004/08/03 17:29:28 | 00,327,040 | ---- | M] (ATI Technologies Inc.) -- C:\WINDOWS\system32\drivers\ati2mtaa.sys -- (ati2mtaa)
DRV - [2001/08/23 07:00:00 | 00,017,792 | ---- | M] (Parallel Technologies, Inc.) -- C:\WINDOWS\system32\drivers\ptilink.sys -- (Ptilink)
DRV - [2001/08/17 07:20:04 | 00,096,256 | ---- | M] (Intel Corporation) -- C:\WINDOWS\system32\drivers\ac97intc.sys -- (ac97intc) Intel® 82801 Audio Driver Install Service (WDM)
DRV - [2001/08/17 07:11:06 | 00,066,591 | ---- | M] (3Com Corporation) -- C:\WINDOWS\system32\drivers\el90xbc5.sys -- (EL90XBC)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========


IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,AlwaysUseDefaultPrinter = yes
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

========== FireFox ==========


FF - HKLM\software\mozilla\Firefox\Extensions\\{3f963a5b-e555-4543-90e2-c3908898db71}: C:\Program Files\AVG\AVG9\Firefox [2009/12/02 17:05:03 | 00,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.5.5\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2009/11/16 21:12:35 | 00,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.5.5\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins [2009/12/02 22:22:54 | 00,000,000 | ---D | M]

[2009/10/13 16:27:55 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Administrator\Application Data\Mozilla\Extensions
[2009/04/06 17:25:00 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Administrator\Application Data\Mozilla\Extensions\mozswing@mozswing.org
[2009/12/01 22:45:49 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\0n42um67.default\extensions
[2009/12/02 22:23:01 | 00,000,000 | ---D | M] -- C:\Program Files\Mozilla Firefox\extensions

O1 HOSTS File: (27 bytes) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (AVG Safe Search) - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll (AVG Technologies CZ, s.r.o.)
O2 - BHO: (Java™ Plug-In 2 SSV Helper) - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll (Sun Microsystems, Inc.)
O2 - BHO: (JQSIEStartDetectorImpl Class) - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll (Sun Microsystems, Inc.)
O4 - HKLM..\Run: [Adobe_Reader] C:\Program Files\Adobe\acrotray.exe File not found
O4 - HKLM..\Run: [AVG9_TRAY] C:\Program Files\AVG\AVG9\avgtray.exe (AVG Technologies CZ, s.r.o.)
O4 - HKLM..\Run: [Malwarebytes Anti-Malware (reboot)] C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe (Malwarebytes Corporation)
O4 - HKLM..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre6\bin\jusched.exe (Sun Microsystems, Inc.)
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe (Eastman Kodak Company)
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Main present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\PhishingFilter present
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O7 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O16 - DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} http://upload.facebook.com/controls/2009.0...oUploader55.cab (Facebook Photo Uploader 5 Control)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_17)
O16 - DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} http://lads.myspace.com/upload/MySpaceUploader2.cab (MySpace Uploader Control)
O16 - DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_17)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_17)
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.1
O18 - Protocol\Handler\linkscanner {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG9\avgpp.dll (AVG Technologies CZ, s.r.o.)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - Winlogon\Notify\avgrsstarter: DllName - avgrsstx.dll - C:\WINDOWS\System32\avgrsstx.dll (AVG Technologies CZ, s.r.o.)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2008/03/28 09:00:17 | 00,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O32 - AutoRun File - [2009/11/17 22:07:01 | 00,000,000 | ---D | M] - C:\Autoruns -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck) - File not found
O34 - HKLM BootExecute: (*) - File not found
O35 - comfile [open] -- "%1" %*
O35 - exefile [open] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2009/12/02 22:22:54 | 00,411,368 | ---- | C] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\deploytk.dll
[2009/12/02 22:22:54 | 00,149,280 | ---- | C] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javaws.exe
[2009/12/02 22:22:54 | 00,145,184 | ---- | C] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javaw.exe
[2009/12/02 22:22:54 | 00,073,728 | ---- | C] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javacpl.cpl
[2009/12/02 22:22:53 | 00,145,184 | ---- | C] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\java.exe
[2009/12/02 22:22:18 | 00,000,000 | ---D | C] -- C:\WINDOWS\LastGood
[2009/12/02 22:21:53 | 00,000,000 | ---D | C] -- C:\Program Files\Java
[2009/12/02 19:08:51 | 00,354,304 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\winhttp.dll
[2009/12/02 19:08:42 | 00,204,800 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\mswebdvd.dll
[2009/12/02 19:07:07 | 00,286,720 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\gdi32.dll
[2009/12/02 19:07:00 | 00,136,192 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\msv1_0.dll
[2009/12/02 19:06:24 | 01,850,624 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\win32k.sys
[2009/12/02 19:05:26 | 00,337,408 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\netapi32.dll
[2009/12/02 18:59:38 | 00,000,000 | ---D | C] -- C:\WINDOWS\Prefetch
[2009/12/02 18:44:18 | 00,000,000 | ---D | C] -- C:\WINDOWS\LastGood.Tmp
[2009/12/02 18:36:18 | 00,000,000 | ---D | C] -- C:\WINDOWS\System32\scripting
[2009/12/02 18:36:15 | 00,000,000 | ---D | C] -- C:\WINDOWS\System32\en
[2009/12/02 18:36:14 | 00,000,000 | ---D | C] -- C:\WINDOWS\System32\bits
[2009/12/02 18:17:47 | 00,000,000 | ---D | C] -- C:\WINDOWS\System32\ReinstallBackups
[2009/12/02 18:10:58 | 00,000,000 | -H-D | C] -- C:\WINDOWS\$NtServicePackUninstall$
[2009/12/02 17:50:57 | 00,000,000 | -HSD | C] -- C:\Documents and Settings\Administrator\IETldCache
[2009/12/02 17:26:30 | 00,000,000 | ---D | C] -- C:\WINDOWS\ie8updates
[2009/12/02 17:20:32 | 00,000,000 | -H-D | C] -- C:\WINDOWS\ie8
[2009/12/02 17:06:27 | 00,000,000 | -H-D | C] -- C:\$AVG
[2009/12/02 17:06:10 | 00,012,464 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\avgrsstx.dll
[2009/12/02 17:06:08 | 00,360,584 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgtdix.sys
[2009/12/02 17:05:56 | 00,333,192 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgldx86.sys
[2009/12/02 17:05:52 | 00,028,424 | ---- | C] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgmfx86.sys
[2009/12/02 17:05:35 | 00,000,000 | ---D | C] -- C:\WINDOWS\System32\drivers\Avg
[2009/12/02 17:05:03 | 00,000,000 | ---D | C] -- C:\Program Files\AVG
[2009/12/02 17:05:00 | 00,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\avg9
[2009/12/02 16:38:15 | 00,038,224 | ---- | C] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbamswissarmy.sys
[2009/12/02 16:38:13 | 00,019,160 | ---- | C] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbam.sys
[2009/12/02 16:37:23 | 00,000,000 | ---D | C] -- C:\WINDOWS\temp
[2009/12/02 16:25:40 | 00,000,000 | ---D | C] -- C:\thecbytes13328t
[2009/12/02 01:53:05 | 00,535,552 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\Administrator\Desktop\OTL.exe
[2009/12/01 22:21:24 | 00,031,232 | ---- | C] (NirSoft) -- C:\WINDOWS\NIRCMD.exe
[2009/12/01 22:21:15 | 00,000,000 | ---D | C] -- C:\thecbytes21494t
[2009/12/01 22:18:41 | 00,000,000 | RHSD | C] -- C:\cmdcons
[2009/12/01 22:17:38 | 00,000,000 | ---D | C] -- C:\thecbytes12115t
[2009/12/01 00:25:38 | 00,212,480 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWXCACLS.exe
[2009/12/01 00:25:38 | 00,161,792 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWREG.exe
[2009/12/01 00:25:38 | 00,136,704 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWSC.exe
[2009/12/01 00:25:18 | 00,000,000 | ---D | C] -- C:\WINDOWS\ERDNT
[2009/12/01 00:25:13 | 00,000,000 | ---D | C] -- C:\thecbytes
[2009/12/01 00:24:57 | 00,000,000 | ---D | C] -- C:\Qoobox
[2009/11/18 15:32:25 | 00,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
[2009/11/18 15:32:12 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com
[2009/11/18 15:32:12 | 00,000,000 | ---D | C] -- C:\Program Files\SUPERAntiSpyware
[2009/11/17 22:06:23 | 00,000,000 | ---D | C] -- C:\Autoruns
[2009/11/17 21:47:35 | 00,000,000 | ---D | C] -- C:\WINDOWS\System32\LogFiles
[2009/11/16 21:19:14 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\My Documents\Downloads
[2009/11/16 21:12:33 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\Local Settings\Application Data\Mozilla
[2009/11/16 21:12:14 | 00,000,000 | ---D | C] -- C:\Program Files\Mozilla Firefox
[2009/11/16 20:34:16 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\Application Data\Malwarebytes
[2009/11/16 20:34:06 | 00,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[2009/11/16 20:34:06 | 00,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Malwarebytes
[2009/11/15 20:34:34 | 00,472,064 | ---- | C] ( ) -- C:\Documents and Settings\Administrator\My Documents\RootRepeal.exe
[2009/11/15 19:13:50 | 04,045,544 | ---- | C] (Malwarebytes Corporation ) -- C:\Documents and Settings\Administrator\My Documents\oreo.exe
[2009/11/08 18:53:11 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Administrator\Local Settings\Application Data\Blizzard Entertainment
[2009/11/03 22:05:39 | 00,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Blizzard
[2009/11/03 22:02:33 | 00,000,000 | ---D | C] -- C:\Program Files\Common Files\Blizzard Entertainment
[8 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[5 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]

========== Files - Modified Within 30 Days ==========

[2009/12/02 22:36:47 | 00,000,150 | ---- | M] () -- C:\WINDOWS\System32\spupdsvc.inf
[2009/12/02 22:22:09 | 00,411,368 | ---- | M] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\deploytk.dll
[2009/12/02 22:22:09 | 00,149,280 | ---- | M] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javaws.exe
[2009/12/02 22:22:09 | 00,145,184 | ---- | M] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javaw.exe
[2009/12/02 22:22:09 | 00,145,184 | ---- | M] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\java.exe
[2009/12/02 22:22:09 | 00,073,728 | ---- | M] (Sun Microsystems, Inc.) -- C:\WINDOWS\System32\javacpl.cpl
[2009/12/02 19:03:09 | 00,142,742 | ---- | M] () -- C:\logfile
[2009/12/02 19:02:20 | 00,432,356 | ---- | M] () -- C:\WINDOWS\System32\perfh009.dat
[2009/12/02 19:02:20 | 00,067,312 | ---- | M] () -- C:\WINDOWS\System32\perfc009.dat
[2009/12/02 19:02:19 | 00,508,956 | ---- | M] () -- C:\WINDOWS\System32\PerfStringBackup.INI
[2009/12/02 19:00:08 | 00,002,206 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2009/12/02 18:59:38 | 00,000,006 | -H-- | M] () -- C:\WINDOWS\tasks\SA.DAT
[2009/12/02 18:59:18 | 00,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2009/12/02 18:59:06 | 00,095,864 | ---- | M] () -- C:\WINDOWS\System32\FNTCACHE.DAT
[2009/12/02 18:59:05 | 53,590,4256 | -HS- | M] () -- C:\hiberfil.sys
[2009/12/02 18:57:41 | 02,097,152 | -H-- | M] () -- C:\Documents and Settings\Administrator\NTUSER.DAT
[2009/12/02 18:57:41 | 00,000,178 | -HS- | M] () -- C:\Documents and Settings\Administrator\ntuser.ini
[2009/12/02 18:57:35 | 04,824,902 | -H-- | M] () -- C:\Documents and Settings\Administrator\Local Settings\Application Data\IconCache.db
[2009/12/02 18:44:53 | 00,002,675 | ---- | M] () -- C:\WINDOWS\imsins.BAK
[2009/12/02 18:21:01 | 00,250,048 | RHS- | M] () -- C:\ntldr
[2009/12/02 17:06:11 | 00,001,507 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\AVG Free 9.0.lnk
[2009/12/02 17:06:10 | 00,012,464 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\avgrsstx.dll
[2009/12/02 17:06:09 | 00,360,584 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgtdix.sys
[2009/12/02 17:05:57 | 00,333,192 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgldx86.sys
[2009/12/02 17:05:52 | 00,113,461 | ---- | M] () -- C:\WINDOWS\System32\drivers\Avg\iavichjw.avm
[2009/12/02 17:05:52 | 00,028,424 | ---- | M] (AVG Technologies CZ, s.r.o.) -- C:\WINDOWS\System32\drivers\avgmfx86.sys
[2009/12/02 17:05:51 | 46,070,418 | ---- | M] () -- C:\WINDOWS\System32\drivers\Avg\incavi.avm
[2009/12/02 17:05:35 | 06,061,540 | ---- | M] () -- C:\WINDOWS\System32\drivers\Avg\avi7.avg
[2009/12/02 17:05:35 | 00,492,629 | ---- | M] () -- C:\WINDOWS\System32\drivers\Avg\miniavi.avg
[2009/12/02 17:05:35 | 00,111,793 | ---- | M] () -- C:\WINDOWS\System32\drivers\Avg\microavi.avg
[2009/12/02 16:38:18 | 00,000,696 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes' Anti-Malware.lnk
[2009/12/02 16:34:34 | 00,000,227 | ---- | M] () -- C:\WINDOWS\system.ini
[2009/12/02 16:24:22 | 03,574,879 | R--- | M] () -- C:\Documents and Settings\Administrator\Desktop\thecbytes.exe
[2009/12/01 22:18:57 | 00,000,281 | RHS- | M] () -- C:\boot.ini
[2009/12/01 20:18:52 | 00,535,552 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Administrator\Desktop\OTL.exe
[2009/12/01 00:51:55 | 00,000,027 | ---- | M] () -- C:\WINDOWS\System32\drivers\etc\hosts
[2009/12/01 00:50:37 | 00,006,456 | -H-- | M] () -- C:\WINDOWS\System32\tuwizalo
[2009/11/29 22:12:40 | 00,291,840 | ---- | M] () -- C:\Documents and Settings\Administrator\Desktop\exeHelper.com
[2009/11/29 22:12:10 | 00,262,656 | ---- | M] () -- C:\Documents and Settings\Administrator\Desktop\rkill.pif
[2009/11/16 21:12:39 | 00,000,000 | ---- | M] () -- C:\WINDOWS\nsreg.dat
[2009/11/16 21:12:20 | 00,001,602 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Mozilla Firefox.lnk
[2009/11/15 20:11:30 | 00,472,064 | ---- | M] ( ) -- C:\Documents and Settings\Administrator\My Documents\RootRepeal.exe
[2009/11/15 17:57:02 | 04,045,544 | ---- | M] (Malwarebytes Corporation ) -- C:\Documents and Settings\Administrator\My Documents\oreo.exe
[2009/11/14 01:47:57 | 00,260,608 | ---- | M] () -- C:\WINDOWS\PEV.exe
[2009/11/04 03:15:02 | 00,000,582 | ---- | M] () -- C:\WINDOWS\win.ini
[2009/11/03 21:44:33 | 00,012,792 | ---- | M] () -- C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
[5 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[15 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]

========== Files Created - No Company Name ==========

[2009/12/02 17:06:11 | 00,001,507 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\AVG Free 9.0.lnk
[2009/12/02 17:05:51 | 00,113,461 | ---- | C] () -- C:\WINDOWS\System32\drivers\Avg\iavichjw.avm
[2009/12/02 17:05:35 | 46,070,418 | ---- | C] () -- C:\WINDOWS\System32\drivers\Avg\incavi.avm
[2009/12/02 17:05:35 | 06,061,540 | ---- | C] () -- C:\WINDOWS\System32\drivers\Avg\avi7.avg
[2009/12/02 17:05:35 | 00,492,629 | ---- | C] () -- C:\WINDOWS\System32\drivers\Avg\miniavi.avg
[2009/12/02 17:05:35 | 00,111,793 | ---- | C] () -- C:\WINDOWS\System32\drivers\Avg\microavi.avg
[2009/12/02 16:38:18 | 00,000,696 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes' Anti-Malware.lnk
[2009/12/02 16:24:19 | 03,574,879 | R--- | C] () -- C:\Documents and Settings\Administrator\Desktop\thecbytes.exe
[2009/12/01 22:18:56 | 00,000,211 | ---- | C] () -- C:\Boot.bak
[2009/12/01 22:18:52 | 00,260,272 | ---- | C] () -- C:\cmldr
[2009/12/01 00:25:38 | 00,260,608 | ---- | C] () -- C:\WINDOWS\PEV.exe
[2009/12/01 00:25:38 | 00,098,816 | ---- | C] () -- C:\WINDOWS\sed.exe
[2009/12/01 00:25:38 | 00,080,412 | ---- | C] () -- C:\WINDOWS\grep.exe
[2009/12/01 00:25:38 | 00,077,312 | ---- | C] () -- C:\WINDOWS\MBR.exe
[2009/12/01 00:25:38 | 00,068,096 | ---- | C] () -- C:\WINDOWS\zip.exe
[2009/12/01 00:23:13 | 00,291,840 | ---- | C] () -- C:\Documents and Settings\Administrator\Desktop\exeHelper.com
[2009/12/01 00:03:21 | 00,262,656 | ---- | C] () -- C:\Documents and Settings\Administrator\Desktop\rkill.pif
[2009/11/16 21:12:39 | 00,000,000 | ---- | C] () -- C:\WINDOWS\nsreg.dat
[2009/11/16 21:12:20 | 00,001,602 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\Mozilla Firefox.lnk

========== LOP Check ==========

[2009/01/25 16:42:40 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Administrator\Application Data\GetRightToGo
[2009/08/12 23:09:49 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Administrator\Application Data\LimeWire
[2009/12/02 17:05:03 | 00,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\avg9

========== Purity Check ==========


< End of report >

OTL Extras logfile created on: 12/2/2009 10:25:10 PM - Run 2
OTL by OldTimer - Version 3.1.11.4 Folder = C:\Documents and Settings\Administrator\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

511.01 Mb Total Physical Memory | 185.34 Mb Available Physical Memory | 36.27% Memory free
1.22 Gb Paging File | 0.93 Gb Available in Paging File | 75.96% Paging File free
Paging file location(s): C:\pagefile.sys 768 1536 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 18.61 Gb Total Space | 6.47 Gb Free Space | 34.76% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
Drive E: | 123.72 Mb Total Space | 89.07 Mb Free Space | 71.99% Space Free | Partition Type: FAT
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: USER-849142A3DF
Current User Name: Administrator
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: Current user
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Standard

========== Extra Registry (SafeList) ==========


========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.chm [@ = chm.file] -- "%SYSTEMROOT%\hh.exe" %1
.html [@ = htmlfile] -- C:\Program Files\Internet Explorer\IEXPLORE.EXE (Microsoft Corporation)

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
chm.file [open] -- "%SYSTEMROOT%\hh.exe" %1
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
exefile [open] -- "%1" %*
htmlfile [edit] -- Reg Error: Key error.
htmlfile [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome (Microsoft Corporation)
htmlfile [opennew] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" %1 (Microsoft Corporation)
http [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome (Microsoft Corporation)
https [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome (Microsoft Corporation)
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l (Microsoft Corporation)
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [open] -- %SystemRoot%\Explorer.exe /idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Applications\iexplore.exe [open] -- "C:\Program Files\Internet Explorer\IEXPLORE.EXE" %1 (Microsoft Corporation)
CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} [OpenHomePage] -- "C:\Program Files\Internet Explorer\iexplore.exe" (Microsoft Corporation)

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"FirstRunDisabled" = 1
"AntiVirusDisableNotify" = 0
"FirewallDisableNotify" = 0
"UpdatesDisableNotify" = 0
"AntiVirusOverride" = 0
"FirewallOverride" = 0

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = 1

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]
"1900:UDP" = 1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007
"2869:TCP" = 2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008

========== Authorized Applications List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe" = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe:*:Enabled:EasyShare -- (Eastman Kodak Company)
"C:\Program Files\LimeWire\LimeWire.exe" = C:\Program Files\LimeWire\LimeWire.exe:*:Enabled:LimeWire -- (Lime Wire, LLC)
"C:\Program Files\Adobe\acrotray .exe" = C:\Program Files\Adobe\acrotray .exe:*:Enabled:acrotray -- File not found
"C:\WINDOWS\system32\drwtsn32.exe" = C:\WINDOWS\system32\drwtsn32.exe:*:Enabled:drwtsn32 -- (Microsoft Corporation)
"C:\Program Files\AVG\AVG9\avgemc.exe" = C:\Program Files\AVG\AVG9\avgemc.exe:*:Enabled:avgemc.exe -- (AVG Technologies CZ, s.r.o.)
"C:\Program Files\AVG\AVG9\avgupd.exe" = C:\Program Files\AVG\AVG9\avgupd.exe:*:Enabled:avgupd.exe -- (AVG Technologies CZ, s.r.o.)
"C:\Program Files\AVG\AVG9\avgnsx.exe" = C:\Program Files\AVG\AVG9\avgnsx.exe:*:Enabled:avgnsx.exe -- (AVG Technologies CZ, s.r.o.)


========== HKEY_LOCAL_MACHINE Uninstall List ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{03EDED24-8375-407D-A721-4643D9768BE1}" = kgchlwn
"{073F22CE-9A5B-4A40-A604-C7270AC6BF34}" = ESSSONIC
"{0D499481-22C6-4B25-8AC2-6D3F6C885FB9}" = OpenOffice.org Installer 1.0
"{11F3F858-4131-4FFA-A560-3FE282933B6E}" = kgchday
"{14D4ED84-6A9A-45A0-96F6-1753768C3CB5}" = ESSPCD
"{26A24AE4-039D-4CA4-87B4-2F83216017FF}" = Java™ 6 Update 17
"{2D03B6F8-DF36-4980-B7B6-5B93D5BA3A8F}" = essvatgt
"{42938595-0D83-404D-9F73-F8177FDD531A}" = ESScore
"{4537EA4B-F603-4181-89FB-2953FC695AB1}" = netbrdg
"{5316DFC9-CE99-4458-9AB3-E8726EDE0210}" = skin0001
"{605A4E39-613C-4A12-B56F-DEFBE6757237}" = SHASTA
"{608D2A3C-6889-4C11-9B54-A42F45ACBFDB}" = fflink
"{643EAE81-920C-4931-9F0B-4B343B225CA6}" = ESSBrwr
"{693C08A7-9E76-43FF-B11E-9A58175474C4}" = kgckids
"{7CCEBC24-62DB-4280-A8EC-BFA49F167920}" = Software Update for Web Folders
"{837b34e3-7c30-493c-8f6a-2b0f04e2912c}" = Microsoft Visual C++ 2005 Redistributable
"{8943CE61-53BD-475E-90E1-A580869E98A2}" = staticcr
"{8A502E38-29C9-49FA-BCFA-D727CA062589}" = ESSTOOLS
"{8A8664E1-84C8-4936-891C-BC1F07797549}" = kgcvday
"{8E92D746-CD9F-4B90-9668-42B74C14F765}" = ESSini
"{90120000-0016-0409-0000-0000000FF1CE}" = Microsoft Office Excel MUI (English) 2007
"{90120000-001A-0409-0000-0000000FF1CE}" = Microsoft Office Outlook MUI (English) 2007
"{90120000-006E-0409-0000-0000000FF1CE}" = Microsoft Office Shared MUI (English) 2007
"{90120000-0115-0409-0000-0000000FF1CE}" = Microsoft Office Shared Setup Metadata MUI (English) 2007
"{91517631-A9F3-4B7C-B482-43E0068FD55A}" = ESSgui
"{999D43F4-9709-4887-9B1A-83EBB15A8370}" = VPRINTOL
"{9BD54685-1496-46A5-AB62-357CD140ED8B}" = kgcinvt
"{A1588373-1D86-4D44-86C9-78ABD190F9CC}" = kgcmove
"{A3051CD0-2F64-3813-A88D-B8DCCDE8F8C7}" = Microsoft .NET Framework 3.0 Service Pack 2
"{AE1FA02D-E6A4-4EA0-8E58-6483CAC016DD}" = ESSCDBK
"{B162D0A6-9A1D-4B7C-91A5-88FB48113C45}" = OfotoXMI
"{B4B44FE7-41FF-4DAD-8C0A-E406DDA72992}" = CCScore
"{C09FB3CD-3D0C-3F2D-899A-6A1D67F2073F}" = Microsoft .NET Framework 2.0 Service Pack 2
"{CE2CDD62-0124-36CA-84D3-9F4DCF5C5BD9}" = Microsoft .NET Framework 3.5 SP1
"{D32470A1-B10C-4059-BA53-CF0486F68EBC}" = Kodak EasyShare software
"{DB02F716-6275-42E9-B8D2-83BA2BF5100B}" = SFR
"{E18B549C-5D15-45DA-8D8F-8FD2BD946344}" = kgcbaby
"{E79987F0-0E34-42CC-B8FF-6C860AEEB26A}" = tooltips
"{F22C222C-3CE2-4A4B-A83F-AF4681371ABE}" = kgcbase
"{F4A2E7CC-60CA-4AFA-B67F-AD5E58173C3F}" = SKINXSDK
"{F9593CFB-D836-49BC-BFF1-0E669A411D9F}" = WIRELESS
"{FCDB1C92-03C6-4C76-8625-371224256091}" = ESSPDock
"AVG9Uninstall" = AVG Free 9.0
"ComcastHSI" = Comcast High-Speed Internet Install Wizard
"ie8" = Windows Internet Explorer 8
"Malwarebytes' Anti-Malware_is1" = Malwarebytes' Anti-Malware
"Microsoft .NET Framework 3.5 SP1" = Microsoft .NET Framework 3.5 SP1
"Mozilla Firefox (3.5.5)" = Mozilla Firefox (3.5.5)
"WIC" = Windows Imaging Component
"Windows XP Service Pack" = Windows XP Service Pack 3

========== Last 10 Event Log Errors ==========

[ Application Events ]
Error - 7/26/2009 5:51:27 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This operation returned because the timeout period expired.

Error - 7/26/2009 5:51:27 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: The specified server cannot perform the requested operation.

Error - 7/26/2009 5:51:28 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 7/26/2009 5:51:28 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 7/26/2009 7:51:26 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This operation returned because the timeout period expired.

Error - 7/26/2009 7:51:26 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: The specified server cannot perform the requested operation.

Error - 7/26/2009 7:51:27 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 7/26/2009 7:51:27 PM | Computer Name = USER-849142A3DF | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 7/30/2009 1:38:18 AM | Computer Name = USER-849142A3DF | Source = McLogEvent | ID = 5051
Description =

Error - 7/30/2009 3:12:10 AM | Computer Name = USER-849142A3DF | Source = McLogEvent | ID = 5051
Description =

[ System Events ]
Error - 12/2/2009 5:14:41 PM | Computer Name = USER-849142A3DF | Source = DCOM | ID = 10001
Description = Unable to start a DCOM Server: {FBA44040-BD27-4A09-ACC8-C08B7C723DCD}
as /. The error: "%2" Happened while starting this command: "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
-Embedding

Error - 12/2/2009 5:14:41 PM | Computer Name = USER-849142A3DF | Source = DCOM | ID = 10001
Description = Unable to start a DCOM Server: {FBA44040-BD27-4A09-ACC8-C08B7C723DCD}
as /. The error: "%2" Happened while starting this command: "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
-Embedding

Error - 12/2/2009 5:14:41 PM | Computer Name = USER-849142A3DF | Source = DCOM | ID = 10001
Description = Unable to start a DCOM Server: {FBA44040-BD27-4A09-ACC8-C08B7C723DCD}
as /. The error: "%2" Happened while starting this command: "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
-Embedding

Error - 12/2/2009 5:21:29 PM | Computer Name = USER-849142A3DF | Source = Service Control Manager | ID = 7026
Description = The following boot-start or system-start driver(s) failed to load:
SASKUTIL

Error - 12/2/2009 5:21:29 PM | Computer Name = USER-849142A3DF | Source = Service Control Manager | ID = 7000
Description = The SASKUTIL service failed to start due to the following error: %%2

Error - 12/2/2009 5:21:32 PM | Computer Name = USER-849142A3DF | Source = Service Control Manager | ID = 7000
Description = The SASDIFSV service failed to start due to the following error: %%2

Error - 12/2/2009 5:21:52 PM | Computer Name = USER-849142A3DF | Source = Service Control Manager | ID = 7000
Description = The SASENUM service failed to start due to the following error: %%2

Error - 12/2/2009 5:53:48 PM | Computer Name = USER-849142A3DF | Source = Service Control Manager | ID = 7026
Description = The following boot-start or system-start driver(s) failed to load:
SASKUTIL

Error - 12/2/2009 6:51:02 PM | Computer Name = USER-849142A3DF | Source = Service Control Manager | ID = 7026
Description = The following boot-start or system-start driver(s) failed to load:
SASKUTIL

Error - 12/2/2009 8:00:34 PM | Computer Name = USER-849142A3DF | Source = Service Control Manager | ID = 7026
Description = The following boot-start or system-start driver(s) failed to load:
SASKUTIL


< End of report >

Edited by Kameron, 02 December 2009 - 10:52 PM.


#10 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:20 PM

Posted 02 December 2009 - 11:09 PM

Great work! :(
We have come a very long way.

:( Warning: This script was specifically written and designed for this user only. Unsupervised use of this tool could render your computer unbootable permanently!! :)

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

File::
c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
c:\program files\Adobe\acrotray .exe
c:\program files\Google\GoogleToolbarNotifier\googletoolbarnotifier .exe
c:\program files\iTunes\ituneshelper .exe
c:\program files\Pure Networks\Network Magic\nmapp .exe
c:\program files\SUPERAntiSpyware\superantispyware .exe

Folder::
c:\program files\SUPERAntiSpyware
c:\documents and settings\Administrator\Application Data\AVG8

Registry::
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Adobe_Reader"=-

Driver::
SASDIFSV
SASKUTIL
SASENUM

Hosts::


Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

Thanks,
~ t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#11 Kameron

Kameron
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:10:20 PM

Posted 02 December 2009 - 11:59 PM

Log was too long to post so I tried to attached it but the file was too large. So I uploaded it to MediaFire.com, I hope that's alright!

http://www.mediafire.com/?xigznummuhg

#12 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:20 PM

Posted 03 December 2009 - 12:41 AM

Unbelievable! :(


Congratulations! You now appear clean!

**********

Please pay particularly close attention to the instructions that follow. To neglect these steps risk needless reinfection!!

**********

Are things running okay? Do you have any more questions?

**********

Uninstall Combofix
  • Press the Windows Key + R on your keyboard.
  • Now copy & paste the green bolded text in the run-box and click OK.

    ComboFix /Uninstall

    <Notice the space between the "x" and "/".>

    Posted Image

  • The following will implement some very important cleanup procedures as well as reset System Restore points.
**********

Run OTL again

We will now remove the tools we used during this fix using OTL.
  • Double click the OTL icon to start the program.
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
**********

Recommendations


Below are some recommendations to lower your chances of (re)infection.

  • Install an Anti-Spyware program, and update it regularly
    Malwarebytes' Anti-Malware is an excellent Anti-Spyware scanner. It's scan times are usually under ten minutes, and has excellent detection and removal rates.

    SUPERAntiSpyware is another good scanner with high detection and removal rates.
    Both programs are free for non commercial home use but provide a resident and do not nag if you purchase the paid versions.

  • Prevention article : To find out more information about how you got infected in the first place and some great guidelines to follow to prevent future infections please read the Prevention artice by Miekiemoes.

  • Keep Windows (and your other Microsoft software) up to date!
    I cannot stress how important this is enough. Often holes are found in Internet Explorer or Windows itself that require patching. Sometimes these holes will allow an attacker unrestricted access to your computer.


    Windows XP


    Visit the Microsoft Update Website and follow the on screen instructions to setup Microsoft Update. Also follow the instructions to update your system. Please REBOOT and repeat this process until there are no more updates to install!!

  • Keep your other software up to date as well. Software does not need to be made by Microsoft to be insecure. Download Secunia Software Inspector to keep all your software up to date.

  • Consider Firefox as your primary browser. Its safer, fast and secure!

  • Install WOT. Never inadvertently surf to a dangerous website again.

  • Consider running your browser Sandboxed with Sandboxie. You decide what actually get's into your OS!!

  • Install NoScript. Pre-emptively blocks malicious scripts and allows JavaScript, Java and other potentially dangerous content only from sites you trust.

  • Stay up to date!
    The MOST IMPORTANT part of any security setup is keeping the software up to date. Malware writers release new variants every single day. If your software updates don't keep up, then the malware will always be one step ahead. Not a good thing :(.
**********

System Slow?
You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve performance.

If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

**********

Good luck & safe surfing,
Kind Regards,
~ t
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#13 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:20 PM

Posted 04 December 2009 - 08:49 AM

Since this topic appears to be resolved, I will now close it.
If you need this topic re-opened please send me a PM.

Everyone else, please start a new topic.
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users