Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I beleive I'm infected with wmpscfg.exe virus


  • This topic is locked This topic is locked
31 replies to this topic

#1 ffitch847

ffitch847

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:51 AM

Posted 05 May 2010 - 10:10 PM

Sadly back again but this time a different variant from the last one. I think I have been infected with the wmpscfg.exe virus and possibly others.

My pc is extremely slow and seems to go through a lot of hidden programs and actions before it does the action I have intended.

Also it will give me a redirect to other websites when i attempt to use my browser.


I hope this is enough information along with the following logs.
__________________________________________________________


DDS (Ver_10-03-17.01) - NTFSx86 NETWORK
Run by Owner at 19:14:21.02 on Wed 05/05/2010
Internet Explorer: 7.0.5730.11
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.479.226 [GMT -4:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\AVG\AVG9\avgchsvx.exe
svchost.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\Owner\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.yahoo.com/
uInternet Settings,ProxyOverride = 127.0.0.1;*.local
uURLSearchHooks: UrlSearchHook Class: {00000000-6e41-4fd3-8538-502f5495e5fc} - c:\program files\ask.com\GenericAskToolbar.dll
uURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg9\toolbar\IEToolbar.dll
uURLSearchHooks: H - No File
uURLSearchHooks: H - No File
uURLSearchHooks: H - No File
mURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg9\toolbar\IEToolbar.dll
mWinlogon: Taskman=c:\documents and settings\owner\application data\zdrvj.exe
BHO: Disabled:{02478D38-C3F9-4EFB-9B51-7695ECA05670} - No File
BHO: Disabled:{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - No File
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn3\yt.dll
TB: {0BF43445-2F28-4351-9252-17FE6E806AA0} - No File
TB: AVG Security Toolbar: {ccc7a320-b3ca-4199-b1a6-9f516dd69829} - c:\program files\avg\avg9\toolbar\IEToolbar.dll
TB: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
TB: {D7F30B62-8269-41AF-9539-B2697FA7D77E} - No File
TB: {C7768536-96F8-4001-B1A2-90EE21279187} - No File
TB: {A057A204-BACC-4D26-9990-79A187E2698E} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
EB: {4528BBE0-4E08-11D5-AD55-00010333D0AD} - No File
uRun: [Yahoo! Pager] "c:\program files\yahoo!\messenger\YahooMessenger.exe" -quiet
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
dRun: [Picasa Media Detector] c:\program files\picasa2\PicasaMediaDetector.exe
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Refresh Pa&ge with Full Quality
IE: Refresh Pi&cture with Full Quality
IE: {10F055B8-F443-4adf-948A-EC551E9DBCE4} - c:\documents and settings\owner\start menu\programs\ultimatebet\UltimateBet.lnk
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE}
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} c:\program files\partygaming\partypoker\runapp.exe - c:\program files\partygaming\partypoker\runapp.exe\inprocserver32 does not exist!
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
Trusted Zone: musicmatch.com\online
DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {038E2507-7A48-41E2-94AD-7F23D199AF4E} - hxxp://www.worldwinner.com/games/v54/zengems/zengems.cab
DPF: {0B195D55-0AB4-48C7-828F-34BE10BA4266} - hxxp://www.worldwinner.com/games/v53/dealornodeal/dealornodeal.cab
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {1A1F56AA-3401-46F9-B277-D57F3421F821} - hxxp://www.worldwinner.com/games/v47/shared/FunGamesLoader.cab
DPF: {1D082E71-DF20-4AAF-863B-596428C49874} - hxxp://www.worldwinner.com/games/v50/tpir/tpir.cab
DPF: {315B0BFB-2BD4-481B-80A3-A9B80727C61B} - hxxp://webiq005.webiqonline.com/WebIQ/DataServer/DataServer.dll?Handler=GetEngineDistribution&EDID={896A23A1-5821-4609-A6C6-6D5536C585C9}
DPF: {321FB770-1FBE-4BFE-BDC1-6F622D4FA499} - hxxps://activation.alltel.com/wizlet/ALLTEL/static/controls/WebflowActiveXInstaller_2-0-0.cab
DPF: {3D3DBC64-0D21-4EA4-94EE-86D6D9B31C0C} - hxxp://www.worldwinner.com/games/v45/moneylist/moneylist.cab
DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} - hxxp://photos.walmart.com/WalmartActivia.cab
DPF: {42FDC231-A411-45F8-B8B6-3B5026111DA8} - hxxp://www.worldwinner.com/games/v47/solitairerush/solitairerush.cab
DPF: {4AB16005-E995-4A60-89DE-8B8A3E6EB5B0} - hxxp://www.worldwinner.com/games/v56/trivialpursuit/trivialpursuit.cab
DPF: {4FAE30E1-EE9C-477D-8D06-BF8D3429B60F} - hxxps://www.webiqonline.com/WebIQ/bin/WebIQ.cab
DPF: {58FC4C77-71C2-4972-A8CD-78691AD85158} - hxxp://www.worldwinner.com/games/v63/bjattack/bja.cab
DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} - hxxp://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase5483.cab
DPF: {615F158E-D5CA-422F-A8E7-F6A5EED7063B} - hxxp://www.worldwinner.com/games/v51/bejeweled/bejeweled.cab
DPF: {61900274-3323-4446-BDCD-91548D32AF1B} - hxxp://www.worldwinner.com/games/v56/spidersolitaire/spidersolitaire.cab
DPF: {62969CF2-0F7A-433B-A221-FD8818C06C2F} - hxxp://www.worldwinner.com/games/v49/blockwerx/blockwerx.cab
DPF: {64CD313F-F079-4D93-959F-4D28B5519449} - hxxp://www.worldwinner.com/games/v50/jeopardy/jeopardy.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1135868151763
DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} - hxxps://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
DPF: {745395C8-D0E1-4227-8586-624CA9A10A8D} - hxxp://152.1.131.130/activex/AMC.cab
DPF: {78AEEDE8-7345-4FB5-A8FE-4BFF16EF25FC} - hxxp://us-download.mcafee.com/products/protected/mvt/mvt.cab
DPF: {8A94C905-FF9D-43B6-8708-F0F22D22B1CB} - hxxp://www.worldwinner.com/games/shared/wwlaunch.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {94299420-321F-4FF9-A247-62A23EBB640B} - hxxp://www.worldwinner.com/games/v46/wordmojo/wordmojo.cab
DPF: {95A311CD-EC8E-452A-BCEC-B844EB616D03} - hxxp://www.worldwinner.com/games/v51/bejeweledtwist/bejeweledtwist.cab
DPF: {A17E30C4-A9BA-11D4-8673-60DB54C10000} - hxxp://us.dl1.yimg.com/download.yahoo.com/dl/installs/yse/ymmapi_416.dll
DPF: {A52FBD2B-7AB3-4F6B-90E3-91C772C5D00F} - hxxp://www.worldwinner.com/games/v57/wof/wof.cab
DPF: {A8658086-E6AC-4957-BC8E-7D54A7E8A78E} - hxxp://www.microsoft.com/security/controls/Sasser/20/SassCln.CAB
DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} - hxxp://www.crucial.com/controls/cpcScanner.cab
DPF: {AC2881FD-5760-46DB-83AE-20A5C6432A7E} - hxxp://www.worldwinner.com/games/v67/swapit/swapit.cab
DPF: {B06CE1BC-5D9D-4676-BD28-1752DBF394E0} - hxxp://www.worldwinner.com/games/v41/hangman/hangman.cab
DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} - hxxp://cdn2.zone.msn.com/binFramework/v10/ZIntro.cab56649.cab
DPF: {B9191F79-5613-4C76-AA2A-398534BB8999} - hxxp://us.dl1.yimg.com/download.yahoo.com/dl/installs/suite/autocomplete.cab
DPF: {BA35B9B8-DE9E-47C9-AFA7-3C77E3DDFD39} - hxxp://www.worldwinner.com/games/v45/monopoly/monopoly.cab
DPF: {C82BB209-F528-46F9-96D5-69DEF7260916} - hxxp://www.worldwinner.com/games/v45/mysterypi/mysterypi.cab
DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CF969D51-F764-4FBF-9E90-475248601C8A} - hxxp://www.worldwinner.com/games/v47/familyfeud/familyfeud.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {D719897A-B07A-4C0C-AEA9-9B663A28DFCB} - hxxp://ax.phobos.apple.com.edgesuite.net/detection/ITDetector.cab
DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} - hxxp://zone.msn.com/bingame/popcaploader_v10.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} - hxxp://download.mcafee.com/molbin/iss-loc/mcfscan/2,1,0,4734/mcfscan.cab
DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} - hxxp://chat.msn.com/controls/msnchat45.cab
DPF: {FFB3A759-98B1-446F-BDA9-909C6EB18CC7} - hxxp://utilities.pcpitstop.com/optimize2/pcpitstop2.dll
TCP: {E260A1CC-403A-4BA4-A944-C42E0E864560} = 192.168.2.1
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - c:\program files\hp\hpcoretech\comp\hpuiprot.dll
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg9\avgpp.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: avgrsstarter - avgrsstx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

============= SERVICES / DRIVERS ===============

R0 ALiAGP;ALi AGP Bus Filter Driver;c:\windows\system32\drivers\ALiAGP.SYS [2003-5-6 26880]
R0 GRFILTER;CS NDIS Driver;c:\windows\system32\drivers\GRFilter.sys [2005-7-11 15548]
R1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2010-2-23 242896]
S1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2010-2-23 216200]
S1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2010-2-23 29512]
S1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
S1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-4-27 61440]
S2 avg9wd;AVG Free WatchDog;c:\program files\avg\avg9\avgwdsvc.exe [2010-3-14 308064]
S2 GRTdiMon;GR TDI Mon;c:\windows\system32\drivers\GRTdiMon.sys [2005-7-11 20480]
S2 mrtRate;mrtRate; [x]
S2 solewxte;solewxte Service; [x]
S3 ADSFilter;ADSFilter - (Aluria Filter Driver);c:\windows\system32\drivers\ADSFilter.sys [2005-12-1 56432]
S3 ALiIRDA;ALi Infrared Device Driver;c:\windows\system32\drivers\aliirda.sys [2003-5-6 26112]
S3 BW2NDIS5;BW2NDIS5;c:\windows\system32\drivers\bw2ndis5.sys --> c:\windows\system32\drivers\BW2NDIS5.sys [?]
S3 MailScan;MailScan;\??\c:\progra~1\avanqu~1\fix-it\mailscan.sys --> c:\progra~1\avanqu~1\fix-it\MailScan.sys [?]
S3 RGService;RGService;c:\program files\radioget\RGService.exe [2010-1-8 335872]
S3 STSService;STSService;c:\program files\soundtaxi media suite\STSService.exe [2009-9-29 335872]
S3 tridxp;tridxp;c:\windows\system32\drivers\tridxpm.sys [2003-4-24 248448]
S3 wlags48b;Wireless LAN PCCard Driver;c:\windows\system32\drivers\wlags48b.sys [2003-5-6 156672]
S3 WsAudioDevice_383;WsAudioDevice_383;c:\windows\system32\drivers\WsAudioDevice_383.sys [2009-9-19 16640]

=============== Created Last 30 ================

2010-05-05 03:39:46 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2010-05-05 03:38:38 0 d-----w- c:\program files\SUPERAntiSpyware
2010-05-05 03:38:37 0 d-----w- c:\docume~1\owner\applic~1\SUPERAntiSpyware.com
2010-05-05 03:35:35 0 d-----w- c:\program files\common files\Wise Installation Wizard
2010-05-05 00:46:37 155648 --sh--r- c:\docume~1\owner\applic~1\zdrvj.exe
2010-04-16 18:38:19 0 d-----w- c:\program files\Ask.com
2010-04-08 18:20:33 0 d-----w- c:\docume~1\alluse~1\applic~1\PopCap Games
2010-04-08 18:14:45 24 ----a-w- c:\windows\popcinfot.dat
2010-04-08 18:14:45 0 ----a-w- c:\windows\popcreg.dat

==================== Find3M ====================

2010-04-29 19:39:38 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 19:39:26 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-21 16:38:32 242896 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-03-14 14:02:19 12464 ----a-w- c:\windows\system32\avgrsstx.dll
2010-03-14 13:59:11 216200 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-03-11 12:38:54 832512 ----a-w- c:\windows\system32\wininet.dll
2010-03-11 12:38:52 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-03-11 12:38:51 17408 ----a-w- c:\windows\system32\corpol.dll
2010-03-09 11:09:18 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-02-23 04:41:33 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-02-17 13:10:28 2189952 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25:04 2066816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-12 04:33:11 100864 ----a-w- c:\windows\system32\6to4svc.dll
2004-08-10 03:30:22 40960 ----a-w- c:\program files\Uninstall_CDS.exe
2008-08-16 12:42:24 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008081620080817\index.dat

============= FINISH: 19:16:39.33 ===============
____________________________________________________________________


Attached Files

  • Attached File  ark.txt   22.46KB   10 downloads


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:51 AM

Posted 08 May 2010 - 06:22 AM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 ffitch847

ffitch847
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:51 AM

Posted 10 May 2010 - 07:28 AM

Hi and thanks for taking the time to review my pc issues.

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:51 AM

Posted 10 May 2010 - 03:02 PM

There's a rootkit in your system. It's called TDL3 and we shoud be able to remove it.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#5 ffitch847

ffitch847
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:51 AM

Posted 10 May 2010 - 09:25 PM

ComboFix 10-05-10.02 - Owner 05/10/2010 21:55:01.2.1 - x86 MINIMAL
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.479.276 [GMT -4:00]
Running from: E:\ComboFix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\DOCUME~1\Owner\LOCALS~1\Temp\tmp2.tmp
C:\Documents and Settings\Owner\Local Settings\Application Data\Windows Server
C:\Documents and Settings\Owner\Local Settings\Application Data\Windows Server\flags.ini
C:\Documents and Settings\Owner\Local Settings\Application Data\Windows Server\uses32.dat
C:\feed.txt
C:\WINDOWS\YAHELITE.INI

C:\WINDOWS\system32\grpconv.exe was missing
Restored copy from - C:\WINDOWS\ServicePackFiles\i386\grpconv.exe

.
((((((((((((((((((((((((( Files Created from 2010-04-11 to 2010-05-11 )))))))))))))))))))))))))))))))
.

2010-05-11 02:06:09 . 2008-04-14 00:12:21 39424 ----a-w- C:\WINDOWS\system32\grpconv.exe
2010-05-05 03:39:46 . 2010-05-05 03:39:46 -------- d-----w- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2010-05-05 03:38:38 . 2010-05-05 03:38:56 -------- d-----w- C:\Program Files\SUPERAntiSpyware
2010-05-05 03:38:37 . 2010-05-05 03:38:37 -------- d-----w- C:\Documents and Settings\Owner\Application Data\SUPERAntiSpyware.com
2010-05-05 03:35:35 . 2010-05-05 03:35:35 -------- d-----w- C:\Program Files\Common Files\Wise Installation Wizard
2010-05-05 00:46:10 . 2010-05-06 16:39:36 -------- d-----w- C:\Documents and Settings\Owner\Local Settings\Application Data\ouwqxpbka
2010-05-05 00:45:03 . 2010-05-06 16:39:43 -------- d-----w- C:\Documents and Settings\Owner\Local Settings\Application Data\spvlriqug
2010-04-16 18:45:11 . 2010-04-17 05:16:11 -------- d-----w- C:\Documents and Settings\Owner\Local Settings\Application Data\AskToolbar
2010-04-16 18:38:19 . 2010-04-17 01:41:44 -------- d-----w- C:\Program Files\Ask.com

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-10 15:09:18 . 2008-09-18 12:26:45 -------- d-----w- C:\Program Files\Lx_cats
2010-05-07 14:53:18 . 2003-04-17 22:56:24 1033728 ----a-w- C:\WINDOWS\explorer.exe
2010-05-07 13:37:56 . 2010-05-05 03:41:14 63488 ----a-w- C:\Documents and Settings\Owner\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
2010-05-07 13:37:39 . 2010-05-05 03:40:43 117760 ----a-w- C:\Documents and Settings\Owner\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-05-06 20:30:54 . 2010-02-23 05:55:38 -------- d-----w- C:\Documents and Settings\All Users\Application Data\avg9
2010-05-05 03:40:57 . 2010-05-05 03:40:57 52224 ----a-w- C:\Documents and Settings\Owner\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-05-05 01:31:08 . 2009-12-20 04:38:46 -------- d-----w- C:\Program Files\Malwarebytes' Anti-Malware
2010-04-29 19:39:38 . 2009-12-20 04:39:05 38224 ----a-w- C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2010-04-29 19:39:26 . 2009-12-20 04:38:47 20952 ----a-w- C:\WINDOWS\system32\drivers\mbam.sys
2010-04-29 06:59:24 . 2010-02-23 05:57:20 -------- d-----w- C:\Documents and Settings\All Users\Application Data\AVG Security Toolbar
2010-04-21 16:39:58 . 2010-04-21 16:39:58 242696 ----a-w- C:\Documents and Settings\All Users\Application Data\avg9\update\backup\avgtdix.sys
2010-04-21 16:38:32 . 2010-02-23 05:58:39 242896 ----a-w- C:\WINDOWS\system32\drivers\avgtdix.sys
2010-04-21 16:32:33 . 2010-04-21 16:32:33 1689952 ----a-w- C:\Documents and Settings\All Users\Application Data\avg9\update\backup\avgupd.dll
2010-04-14 20:07:06 . 2009-06-20 18:12:16 -------- d-----w- C:\Program Files\YahELite
2010-04-08 19:17:05 . 2010-04-08 18:14:45 24 ----a-w- C:\WINDOWS\popcinfot.dat
2010-04-08 18:20:33 . 2010-04-08 18:20:33 -------- d-----w- C:\Documents and Settings\All Users\Application Data\PopCap Games
2010-04-08 18:14:45 . 2010-04-08 18:14:45 0 ----a-w- C:\WINDOWS\popcreg.dat
2010-03-14 14:02:19 . 2010-03-14 14:02:19 12464 ----a-w- C:\WINDOWS\system32\avgrsstx.dll
2010-03-14 14:02:17 . 2010-02-23 05:58:21 29512 ----a-w- C:\WINDOWS\system32\drivers\avgmfx86.sys
2010-03-14 13:59:11 . 2010-02-23 05:58:26 216200 ----a-w- C:\WINDOWS\system32\drivers\avgldx86.sys
2010-03-11 12:38:54 . 2004-02-07 01:05:06 832512 ----a-w- C:\WINDOWS\system32\wininet.dll
2010-03-11 12:38:52 . 2004-08-04 07:56:42 78336 ----a-w- C:\WINDOWS\system32\ieencode.dll
2010-03-11 12:38:51 . 2003-04-17 22:56:01 17408 ----a-w- C:\WINDOWS\system32\corpol.dll
2010-03-09 11:09:18 . 2003-04-17 22:57:52 430080 ----a-w- C:\WINDOWS\system32\vbscript.dll
2010-02-24 13:11:07 . 2003-04-17 22:56:50 455680 ----a-w- C:\WINDOWS\system32\drivers\mrxsmb.sys
2010-02-23 04:42:46 . 2010-02-23 04:42:46 503808 ----a-w- C:\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6a3819ae-n\msvcp71.dll
2010-02-23 04:42:46 . 2010-02-23 04:42:46 499712 ----a-w- C:\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6a3819ae-n\jmc.dll
2010-02-23 04:42:46 . 2010-02-23 04:42:46 348160 ----a-w- C:\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6a3819ae-n\msvcr71.dll
2010-02-23 04:42:39 . 2010-02-23 04:42:39 61440 ----a-w- C:\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-2e25fcfa-n\decora-sse.dll
2010-02-23 04:42:39 . 2010-02-23 04:42:39 12800 ----a-w- C:\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-2e25fcfa-n\decora-d3d.dll
2010-02-23 04:41:33 . 2009-08-26 19:48:43 411368 ----a-w- C:\WINDOWS\system32\deploytk.dll
2010-02-17 13:10:28 . 2003-04-17 22:57:02 2189952 ----a-w- C:\WINDOWS\system32\ntoskrnl.exe
2010-02-16 13:25:04 . 2002-08-29 01:04:56 2066816 ----a-w- C:\WINDOWS\system32\ntkrnlpa.exe
2010-02-12 04:33:11 . 2003-04-17 22:55:47 100864 ----a-w- C:\WINDOWS\system32\6to4svc.dll
2010-02-11 12:02:15 . 2003-04-17 22:57:45 226880 ----a-w- C:\WINDOWS\system32\drivers\tcpip6.sys
2004-08-10 03:30:22 . 2006-09-29 01:53:18 40960 ----a-w- C:\Program Files\Uninstall_CDS.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{00000000-6E41-4FD3-8538-502F5495E5FC}"= "C:\Program Files\Ask.com\GenericAskToolbar.dll" [2010-02-04 20:50:26 1197448]

[HKEY_CLASSES_ROOT\clsid\{00000000-6e41-4fd3-8538-502f5495e5fc}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}]
2010-02-04 20:50:26 1197448 ----a-w- C:\Program Files\Ask.com\GenericAskToolbar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll" [2010-02-23 18:04:10 1664256]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "C:\Program Files\Ask.com\GenericAskToolbar.dll" [2010-02-04 20:50:26 1197448]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll" [2010-02-23 18:04:10 1664256]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "C:\Program Files\Ask.com\GenericAskToolbar.dll" [2010-02-04 20:50:26 1197448]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\Carbonite.Green]
@="{95A27763-F62A-4114-9072-E81D87DE3B68}"
[HKEY_CLASSES_ROOT\CLSID\{95A27763-F62A-4114-9072-E81D87DE3B68}]
2009-12-03 21:52:34 574096 ----a-r- C:\Program Files\Carbonite\Carbonite Backup\CarboniteNSE.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\Carbonite.Partial]
@="{E300CD91-100F-4E67-9AF3-1384A6124015}"
[HKEY_CLASSES_ROOT\CLSID\{E300CD91-100F-4E67-9AF3-1384A6124015}]
2009-12-03 21:52:34 574096 ----a-r- C:\Program Files\Carbonite\Carbonite Backup\CarboniteNSE.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\Carbonite.Yellow]
@="{5E529433-B50E-4bef-A63B-16A6B71B071A}"
[HKEY_CLASSES_ROOT\CLSID\{5E529433-B50E-4bef-A63B-16A6B71B071A}]
2009-12-03 21:52:34 574096 ----a-r- C:\Program Files\Carbonite\Carbonite Backup\CarboniteNSE.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Yahoo! Pager"="C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" [2007-01-19 17:49:28 4670968]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2009-01-05 20:18:48 413696]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "C:\Program Files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 14:13:36 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=C:\WINDOWS\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
041001211C368101C600.Xsernum 404X73Q10SQ0001
041001211C368101C600.Xaddr BRILL.LEXINGTON.KY

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
backup=C:\WINDOWS\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^ALLTEL DSL Check-up Center.lnk]
backup=C:\WINDOWS\pss\ALLTEL DSL Check-up Center.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
backup=C:\WINDOWS\pss\Microsoft Office.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^palstart.exe]
backup=C:\WINDOWS\pss\palstart.exeCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^RAMASST.lnk]
backup=C:\WINDOWS\pss\RAMASST.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Service Manager.lnk]
backup=C:\WINDOWS\pss\Service Manager.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^Owner^Start Menu^Programs^Startup^rncsys32.exe]
backup=C:\WINDOWS\pss\rncsys32.exeStartup

[HKLM\~\startupfolder\C:^Documents and Settings^Owner^Start Menu^Programs^Startup^Shortcut to OUTLOOK.lnk]
backup=C:\WINDOWS\pss\Shortcut to OUTLOOK.lnkStartup
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\24015
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AVG8_TRAY

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CFSServ.exe]
CFSServ.exe -NoClient [X]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\000StTHK]
2001-06-24 03:28:06 24576 ----a-w- C:\WINDOWS\system32\000StTHK.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\00THotkey]
2003-01-17 17:41:36 253952 ----a-w- C:\WINDOWS\system32\00THotkey.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2010-03-24 18:17:47 952768 ----a-w- C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Photo Downloader]
2007-03-09 15:09:58 63712 ----a-w- C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2010-04-04 05:42:51 36272 ----a-w- C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Apoint]
2002-12-25 21:38:28 159744 ----a-w- C:\Program Files\Apoint2K\Apoint.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AppleSyncNotifier]
2008-11-07 19:16:58 111936 ----a-w- C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AVG9_TRAY]
2010-04-21 16:38:47 2064736 ----a-w- C:\PROGRA~1\AVG\AVG9\avgtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2008-04-14 00:12:16 15360 ----a-w- C:\WINDOWS\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Drag'n Drop CD+DVD]
2003-01-09 23:54:56 991232 ----a-w- C:\Program Files\Drag'n Drop CD+DVD\BinFiles\DragDrop.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EzPrint]
2006-04-19 13:57:58 94208 ----a-w- C:\Program Files\Lexmark 8300 Series\ezprint.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ezShieldProtector for Px]
2002-08-20 17:29:26 40960 ----a-w- C:\WINDOWS\system32\EZSP_PX.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Component Manager]
2004-05-12 20:18:56 241664 ----a-w- C:\Program Files\HP\hpcoretech\hpcmpmgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
2003-12-05 19:41:44 49152 ----a-w- C:\Program Files\Hewlett-Packard\HP Software Update\hpwuSchd2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPDJ Taskbar Utility]
2004-05-04 07:21:22 176128 ----a-w- C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb09.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPHmon05]
2004-05-04 22:17:06 491520 ----a-w- C:\WINDOWS\system32\hphmon05.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPHUPD05]
2004-04-01 04:34:44 49152 ----a-w- C:\Program Files\Hewlett-Packard\{5372B9A6-6E51-4f90-9B40-E0A3B8475C4E}\hphupd05.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2009-04-02 20:11:02 342312 ----a-w- C:\Program Files\iTunes\iTunesHelper.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LtMoh]
2003-01-22 21:54:38 184320 ----a-w- C:\Program Files\ltmoh\ltmoh.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\lxcjmon.exe]
2005-09-30 14:49:22 200704 ----a-w- C:\Program Files\Lexmark 8300 Series\lxcjmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MimBoot]
2006-01-19 15:06:16 11776 ----a-w- C:\PROGRA~1\MUSICM~1\MUSICM~1\mimboot.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MMTray]
2006-01-19 15:06:18 110592 ----a-w- C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Motive SmartBridge]
2004-11-09 14:32:44 393216 ----a-w- C:\PROGRA~1\ALLTEL~1\SMARTB~1\MotiveSB.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2008-04-14 00:12:28 1695232 ------w- C:\Program Files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Pinger]
2002-10-17 20:21:38 159744 ----a-w- c:\TOSHIBA\Ivp\ism\pinger.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PmProxy]
2003-03-01 02:54:58 40960 ----a-w- C:\Program Files\Analog Devices\SoundMAX\PmProxy.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-01-05 20:18:48 413696 ----a-w- C:\Program Files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\radarDesk]
2006-01-21 16:24:28 675840 ----a-w- C:\WINDOWS\system32\radarDesk.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RemoteControl]
2004-06-29 01:29:42 32768 ----a-w- C:\Program Files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Software Informer]
2009-08-13 23:44:14 1970245 ----a-w- C:\Program Files\Software Informer\softinfo.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]
2009-03-05 20:07:20 2260480 --sha-r- C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2010-01-11 20:21:52 246504 ----a-w- C:\Program Files\Common Files\Java\Java Update\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TFNF5]
2001-08-04 00:08:28 73728 ----a-w- C:\WINDOWS\system32\TFNF5.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TouchED]
2003-01-22 01:00:06 126976 ----a-w- C:\Program Files\Toshiba\TouchED\TouchED.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Tpwrtray]
2002-12-10 17:49:14 237568 ----a-w- C:\WINDOWS\system32\TPWRTRAY.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TSysSMon]
2003-02-26 00:03:20 49152 ----a-w- c:\TOSHIBA\SysStability\TSysSMon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WinUtilities Quick Launcher]
2009-06-16 18:34:22 2359296 ----a-w- C:\Program Files\WinUtilities\WO.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager]
2007-01-19 17:49:28 4670968 ----a-w- C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"C:\\Program Files\\Messenger\\msmsgs.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"C:\\Program Files\\iTunes\\iTunes.exe"=
"C:\\Program Files\\AVG\\AVG9\\avgupd.exe"=
"C:\\Program Files\\AVG\\AVG9\\avgnsx.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"8097:TCP"= 8097:TCP:EarthLink UHP Modem Support
"5100:TCP"= 5100:TCP:127.0.0.1/255.255.255.255:Enabled:127.0.0.1

R0 ALiAGP;ALi AGP Bus Filter Driver;C:\WINDOWS\system32\drivers\ALiAGP.SYS [5/6/2003 8:09:48 PM 26880]
R0 GRFILTER;CS NDIS Driver;C:\WINDOWS\system32\drivers\GRFilter.sys [7/11/2005 10:36:50 AM 15548]
S1 AvgLdx86;AVG Free AVI Loader Driver x86;C:\WINDOWS\system32\drivers\avgldx86.sys [2/23/2010 1:58:26 AM 216200]
S1 AvgTdiX;AVG Free Network Redirector;C:\WINDOWS\system32\drivers\avgtdix.sys [2/23/2010 1:58:39 AM 242896]
S1 SASDIFSV;SASDIFSV;C:\Program Files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 11:25:50 AM 12872]
S1 SASKUTIL;SASKUTIL;C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS [4/27/2010 5:30:10 PM 61440]
S2 avg9wd;AVG Free WatchDog;C:\Program Files\AVG\AVG9\avgwdsvc.exe [3/14/2010 10:01:34 AM 308064]
S2 GRTdiMon;GR TDI Mon;C:\WINDOWS\system32\drivers\GRTdiMon.sys [7/11/2005 10:38:16 AM 20480]
S2 mrtRate;mrtRate; [x]
S2 solewxte;solewxte Service; [x]
S3 ADSFilter;ADSFilter - (Aluria Filter Driver);C:\WINDOWS\system32\drivers\ADSFilter.sys [12/1/2005 8:41:41 AM 56432]
S3 ALiIRDA;ALi Infrared Device Driver;C:\WINDOWS\system32\drivers\aliirda.sys [5/6/2003 8:22:37 PM 26112]
S3 BW2NDIS5;BW2NDIS5;C:\WINDOWS\system32\Drivers\BW2NDIS5.sys --> C:\WINDOWS\system32\Drivers\BW2NDIS5.sys [?]
S3 MailScan;MailScan;\??\C:\PROGRA~1\AVANQU~1\Fix-It\MailScan.sys --> C:\PROGRA~1\AVANQU~1\Fix-It\MailScan.sys [?]
S3 RGService;RGService;C:\Program Files\RadioGet\RGService.exe [1/8/2010 11:28:34 AM 335872]
S3 STSService;STSService;C:\Program Files\SoundTaxi Media Suite\STSService.exe [9/29/2009 6:41:04 AM 335872]
S3 tridxp;tridxp;C:\WINDOWS\system32\drivers\tridxpm.sys [4/24/2003 7:39:38 PM 248448]
S3 wlags48b;Wireless LAN PCCard Driver;C:\WINDOWS\system32\drivers\wlags48b.sys [5/6/2003 8:21:56 PM 156672]
S3 WsAudioDevice_383;WsAudioDevice_383;C:\WINDOWS\system32\drivers\WsAudioDevice_383.sys [9/19/2009 4:47:38 PM 16640]
.
Contents of the 'Scheduled Tasks' folder

2009-07-27 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34:12 . 2008-07-30 17:34:12]

2010-05-10 C:\WINDOWS\Tasks\Scheduled Update for Ask Toolbar.job
- C:\Program Files\Ask.com\UpdateTask.exe [2010-02-04 20:50:28 . 2010-02-04 20:50:28]

2010-05-09 C:\WINDOWS\Tasks\User_Feed_Synchronization-{6363146F-ADC3-4C3A-98C9-151F95DCE1B0}.job
- C:\WINDOWS\system32\msfeedssync.exe [2006-10-17 17:58:32 . 2006-10-17 17:58:32]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uInternet Settings,ProxyOverride = 127.0.0.1;*.local
IE: Refresh Pa&ge with Full Quality
IE: Refresh Pi&cture with Full Quality
IE: {{10F055B8-F443-4adf-948A-EC551E9DBCE4} - C:\Documents and Settings\Owner\Start Menu\Programs\UltimateBet\UltimateBet.lnk
Trusted Zone: musicmatch.com\online
TCP: {E260A1CC-403A-4BA4-A944-C42E0E864560} = 192.168.2.1
DPF: DirectAnimation Java Classes - file://C:\WINDOWS\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://C:\WINDOWS\Java\classes\xmldso.cab
.
- - - - ORPHANS REMOVED - - - -

MSConfigStartUp-userini - C:\WINDOWS\system32\userini.exe




#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:51 AM

Posted 11 May 2010 - 01:58 PM

Combofix can't deal with this. We will need to do some manual removal so first we need a replacement from the backups on your system.

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2
  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    CODE
    :filefind
    ws2ifsl.sys

  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
Posted Image
m0le is a proud member of UNITE

#7 ffitch847

ffitch847
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:51 AM

Posted 11 May 2010 - 07:58 PM

SystemLook v1.0 by jpshortstuff (11.01.10)
Log created at 20:39 on 11/05/2010 by Owner (Administrator - Elevation successful)

========== filefind ==========

Searching for "ws2ifsl.sys"
C:\WINDOWS\system32\drivers\ws2ifsl.sys --a--- 12032 bytes [22:58 17/04/2003] [12:00 29/08/2002] 00E3691AC7AB691480E5E37BBF047E2E

-=End Of File=-

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:51 AM

Posted 12 May 2010 - 01:36 PM

Please do this:
  • Click on the Start button, then click on Run...

  • In the empty "Open:" box provided, type cmd and press Enter This will launch a Command Prompt window (looks like DOS).

  • Copy the entire blue text below to the clipboard by highlighting all of it and pressing Ctrl+C (or after highlighting, right-click and select Copy).

    copy C:\WINDOWS\system32\drivers\ws2ifsl.sys c:\ws2ifsl.sys

  • In the Command Prompt window, paste the copied text by right-clicking and selecting Paste.

  • Press Enter. When successfully, you should get this message within the Command Prompt: "1 file(s) copied"
  • Exit the Command Prompt window.


Now we need to boot into the Recovery Environment:

Reboot your computer. Combofix should have installed the recovery console so this should already be available.

Follow the instructions here to start it

Next

Type cd system32\drivers and press Enter.
Type ren ws2ifsl.sys ws2ifsl.sys and press Enter.
Then type copy C:\ws2ifsl.sys ws2ifsl.sysand press Enter.
Now type exit and press Enter to reboot your computer into normal mode.


Please run Gmer and post the log.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#9 ffitch847

ffitch847
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:51 AM

Posted 13 May 2010 - 09:46 AM

I have to admit im kind of at a loss as to why elvis costeelo would show up in a scan, but hhopefully this is what you were looking for.




GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-05-13 07:22:41
Windows 5.1.2600 Service Pack 3
Running: gmer.exe; Driver: C:\DOCUME~1\Owner\LOCALS~1\Temp\uxtdypob.sys


---- Registry - GMER 1.0.15 ----

Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL@Installed 1
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL@
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI@NoChange 1
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI@Installed 1
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI@
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS@Installed 1
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS@
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@DeviceNotSelectedTimeout 15
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@GDIProcessHandleQuota 10000
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@Spooler yes
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@swapdisk
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@TransmissionRetryTimeout 90
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@USERProcessHandleQuota 10000
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@AppInit_DLLs C:\WINDOWS\system32\avgrsstx.dll

---- Files - GMER 1.0.15 ----

File C:\Documents and Settings\Owner\My Documents\My Music\Elvis Costello -- The Attractions\The Best Of ..\Elvis Costello -- The Attractions - (What's So Funny About) Peace, Love and Understanding.mp3 3385344 bytes
File C:\Documents and Settings\Owner\My Documents\My Music\Elvis Costello -- The Attractions\The Best Of ..\Elvis Costello -- The Attractions - Accidents Will Happen.mp3 2893824 bytes
File C:\Documents and Settings\Owner\My Documents\My Music\Elvis Costello -- The Attractions\The Best Of ..\Elvis Costello -- The Attractions - Alison.mp3 3235840 bytes
File C:\Documents and Settings\Owner\My Documents\My Music\Elvis Costello -- The Attractions\The Best Of ..\Elvis Costello -- The Attractions - Everyday I Write The Book.mp3 3641344 bytes
File C:\Documents and Settings\Owner\My Documents\My Music\Elvis Costello -- The Attractions\The Best Of ..\Elvis Costello -- The Attractions - Oliver's Army.mp3 2861056 bytes
File C:\Documents and Settings\Owner\My Documents\My Music\Elvis Costello -- The Attractions\The Best Of ..\Elvis Costello -- The Attractions - Pump It Up.mp3 3155968 bytes
File C:\Documents and Settings\Owner\My Documents\My Music\Elvis Costello -- The Attractions\The Best Of ..\Elvis Costello -- The Attractions - Radio, Radio.mp3 2979840 bytes
File C:\Documents and Settings\Owner\My Documents\My Music\Elvis Costello -- The Attractions\The Best Of ..\Elvis Costello -- The Attractions - Watching The Detectives.mp3 3540992 bytes

---- EOF - GMER 1.0.15 ----


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:51 AM

Posted 13 May 2010 - 05:48 PM

The Elvis Costello files would appear if they were hidden files. If these files are not yours then please delete them but if they are yours then do not worry.


We need to run an ESET scan now the rootkit has been killed.

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#11 ffitch847

ffitch847
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:51 AM

Posted 14 May 2010 - 07:26 AM

Looks like a little more than just a few items.



C:\ws2ifsl.sys Win32/Olmarik.ZC trojan cleaned - quarantined
C:\Documents and Settings\Owner\My Documents\BurnAwareHomeEdition\Setup.exe probably a variant of Win32/Spy.Banker trojan deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\akefatok.ini.vir Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\erafenuj.ini.vir Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\etilihoy.ini.vir Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\tmp0_833977498658.bk.vir a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\pss\rncsys32.exeStartup Win32/TrojanDownloader.Bredolab.AA trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_141603564036.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_149939117032.bk.old Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_170646728339.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_177666830655.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_208015160751.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_23379560180.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_295864424020.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_317694769979.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_326284674792.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_34769011126.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_355356270719.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_362408324211.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_362421128655.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_431911298819.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_464792493230.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_493591845185.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_521072282242.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_521322831378.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_522651359982.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_536754557348.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_575838583258.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_58523836957.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_653115209248.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_702033418637.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_72652738584.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_732044217198.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_775537611047.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_79040466648.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_831169159271.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_843690598311.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_85785296743.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_86695717374.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_881440231482.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmp0_88414436231.bk.old a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_102242103929.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_107936233221.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_108424790842.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_109040215480.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_109894400906.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_111237243307.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_117989555031.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_12420893294.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_131225355858.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_133288423020.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_141790274709.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_14500826495.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_14649444121.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_148937539134.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_168393170766.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_16913796741.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_173249582879.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_1834943135.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_18416366261.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_186426188695.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_196033737414.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_199332350339.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_202299387162.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_210698776705.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_21198714944.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_215634124492.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_21963439462.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_2205816682.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_221109482786.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_223434156773.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_231219445862.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_231320636325.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_23464489512.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_237447168024.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_24115123459.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_2469687622.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_246983776868.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_247778496549.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_2507592196.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_2511684737.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_251867728891.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_258479319659.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_258600150894.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_281596870253.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_28269396127.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_285977827924.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_288296620567.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_290625254649.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_291747226629.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_29522397165.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_303044840193.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_303358353020.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_305693165540.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_308015302197.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_313122351409.bk probably a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_319129270860.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_320660672244.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_33095572790.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_341549698432.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_344222754675.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_346262585323.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_346464742709.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_349243793681.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_349555629206.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_353430352485.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_357053335336.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_358069791113.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_358460102060.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_362901269844.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_366049895542.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_3731241311.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_374469832542.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_376053884942.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_379530270045.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_380732747671.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_381740827076.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_38211177389.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_384485612173.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_384750550035.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_384992394935.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_412250501374.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_413310179676.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_416447103863.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_419432885859.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_433033314491.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_445398706687.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_44930830039.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_450889549661.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_452888737865.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_453521558488.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_471802446913.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_477566124654.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_480423342719.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_485521721531.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_489730119687.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_498173833595.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_506232556003.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_507748749589.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_511363652516.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_517286760342.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_524844297216.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_530254449039.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_530885678540.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_533309688806.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_534884780201.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_53501161964.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_539256736052.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_540875210352.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_543689735147.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_544142319366.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_550782868739.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_559701786554.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_563910219037.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_569683771701.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_575968859539.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_579120633451.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_588195499978.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_603401414549.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_604374601985.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_606000883957.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_613955354602.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_61575202501.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_618677771079.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_61934960523.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_62344325220.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_630734876385.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_6334268804.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_635530152781.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_639561688936.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_641637854944.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_643418372795.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_645326258634.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_648723842837.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_654030672682.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_659429645804.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_66227394715.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_66558767270.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_667827721107.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_668945280070.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_66929854485.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_676481699418.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_68100884258.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_68572472245.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_68576193146.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_688272290499.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_690859832210.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_69134425203.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_695999712200.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_703714803276.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_70563121608.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_706804376825.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_707755367238.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_730430207988.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_743026334390.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_747310846680.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_754619585429.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_759401421189.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_76032538757.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_76163210242.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_761881327708.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_764037801855.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_765675173206.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_769332722363.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_77317308297.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_775364112645.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_777354569226.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_780308327926.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_781640229.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_781958211980.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_781980405742.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_786009516090.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_78932431898.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_791347548005.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_7961805493.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_797164532815.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_797916302301.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_80013152038.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_801812635354.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_81421747792.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_816774369436.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_837152616503.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_840246238911.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_84325438388.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_843618522795.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_84371055385.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_852700110933.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_860495167908.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_866497667657.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_870271817058.bk Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_873457706455.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_874272749858.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_880207845849.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_882835853120.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_889414488729.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_895421664754.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_896785123614.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_897296130180.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_93780170722.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_94617366428.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined
C:\WINDOWS\system32\tmpxr_94951543468.bk a variant of Win32/Adware.Coolezweb application cleaned by deleting - quarantined


#12 ffitch847

ffitch847
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:51 AM

Posted 14 May 2010 - 08:30 AM

Another note......I have tried to restart pc by not using safe mode and opening a couple of different programs(IExplorer and pegasus email client. Explorer took about 14 minutes to load and pegasus took about 4 minutes to load.

Not sure if that information helps or not.

#13 ffitch847

ffitch847
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:51 AM

Posted 14 May 2010 - 08:56 AM

Windows is also appearing to try to load updates and the icon keeps appearing and disappearing in the lower right tray.

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:51 AM

Posted 14 May 2010 - 03:33 PM

Restarting the PC may have been a problem.

Please run Combofix as you did the first time and post the log.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#15 ffitch847

ffitch847
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:01:51 AM

Posted 14 May 2010 - 09:38 PM

Sorry about that, didn't realize that I shoudl be keeping the pc on the whole time through all of these steps.

Here is the combo fix log details and thanks again.

ComboFix 10-05-14.06 - Owner 05/14/2010 22:05:02.3.1 - x86 MINIMAL
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.479.275 [GMT -4:00]
Running from: E:\ComboFix.exe
AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
---- Previous Run -------
.
c:\docume~1\Owner\LOCALS~1\Temp\tmp2.tmp
c:\documents and settings\Owner\Local Settings\Application Data\Windows Server
c:\documents and settings\Owner\Local Settings\Application Data\Windows Server\flags.ini
c:\documents and settings\Owner\Local Settings\Application Data\Windows Server\uses32.dat
C:\feed.txt
c:\windows\YAHELITE.INI

-- Previous Run --

c:\windows\system32\grpconv.exe was missing
Restored copy from - c:\windows\ServicePackFiles\i386\grpconv.exe

--------

.
((((((((((((((((((((((((( Files Created from 2010-04-15 to 2010-05-15 )))))))))))))))))))))))))))))))
.

2010-05-14 13:22 . 2010-05-14 13:22 -------- d-----w- c:\windows\LastGood
2010-05-14 03:48 . 2010-05-14 03:48 -------- d-----w- c:\program files\ESET
2010-05-12 20:33 . 2002-08-29 12:00 12032 ----a-w- C:\ws2ifsl.sys
2010-05-12 20:33 . 2002-08-29 12:00 12032 ----a-w- c:\windows\system32\drivers\ws2ifsl.sys
2010-05-11 02:06 . 2008-04-14 00:12 39424 ----a-w- c:\windows\system32\grpconv.exe
2010-05-05 03:39 . 2010-05-05 03:39 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2010-05-05 03:38 . 2010-05-05 03:38 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-05-05 03:38 . 2010-05-05 03:38 -------- d-----w- c:\documents and settings\Owner\Application Data\SUPERAntiSpyware.com
2010-05-05 03:35 . 2010-05-05 03:35 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2010-05-05 00:46 . 2010-05-06 16:39 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\ouwqxpbka
2010-05-05 00:45 . 2010-05-06 16:39 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\spvlriqug
2010-04-16 18:45 . 2010-04-17 05:16 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\AskToolbar
2010-04-16 18:38 . 2010-04-17 01:41 -------- d-----w- c:\program files\Ask.com

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-15 01:47 . 2010-02-23 05:55 -------- d-----w- c:\documents and settings\All Users\Application Data\avg9
2010-05-14 15:46 . 2010-02-23 05:57 -------- d-----w- c:\documents and settings\All Users\Application Data\AVG Security Toolbar
2010-05-12 17:34 . 2008-09-18 12:26 -------- d-----w- c:\program files\Lx_cats
2010-05-07 14:53 . 2003-04-17 22:56 1033728 ----a-w- c:\windows\explorer.exe
2010-05-07 13:37 . 2010-05-05 03:41 63488 ----a-w- c:\documents and settings\Owner\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
2010-05-07 13:37 . 2010-05-05 03:40 117760 ----a-w- c:\documents and settings\Owner\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-05-05 03:40 . 2010-05-05 03:40 52224 ----a-w- c:\documents and settings\Owner\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-05-05 01:31 . 2009-12-20 04:38 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-29 19:39 . 2009-12-20 04:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 19:39 . 2009-12-20 04:38 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-21 16:39 . 2010-04-21 16:39 242696 ----a-w- c:\documents and settings\All Users\Application Data\avg9\update\backup\avgtdix.sys
2010-04-21 16:38 . 2010-02-23 05:58 242896 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-04-21 16:32 . 2010-04-21 16:32 1689952 ----a-w- c:\documents and settings\All Users\Application Data\avg9\update\backup\avgupd.dll
2010-04-14 20:07 . 2009-06-20 18:12 -------- d-----w- c:\program files\YahELite
2010-04-08 19:17 . 2010-04-08 18:14 24 ----a-w- c:\windows\popcinfot.dat
2010-04-08 18:20 . 2010-04-08 18:20 -------- d-----w- c:\documents and settings\All Users\Application Data\PopCap Games
2010-04-08 18:14 . 2010-04-08 18:14 0 ----a-w- c:\windows\popcreg.dat
2010-03-14 14:02 . 2010-03-14 14:02 12464 ----a-w- c:\windows\system32\avgrsstx.dll
2010-03-14 14:02 . 2010-02-23 05:58 29512 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
2010-03-14 13:59 . 2010-02-23 05:58 216200 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-03-11 12:38 . 2004-02-07 01:05 832512 ----a-w- c:\windows\system32\wininet.dll
2010-03-11 12:38 . 2004-08-04 07:56 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-03-11 12:38 . 2003-04-17 22:56 17408 ----a-w- c:\windows\system32\corpol.dll
2010-03-09 11:09 . 2003-04-17 22:57 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-02-24 13:11 . 2003-04-17 22:56 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-23 04:42 . 2010-02-23 04:42 503808 ----a-w- c:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6a3819ae-n\msvcp71.dll
2010-02-23 04:42 . 2010-02-23 04:42 499712 ----a-w- c:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6a3819ae-n\jmc.dll
2010-02-23 04:42 . 2010-02-23 04:42 348160 ----a-w- c:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6a3819ae-n\msvcr71.dll
2010-02-23 04:42 . 2010-02-23 04:42 61440 ----a-w- c:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-2e25fcfa-n\decora-sse.dll
2010-02-23 04:42 . 2010-02-23 04:42 12800 ----a-w- c:\documents and settings\Owner\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-2e25fcfa-n\decora-d3d.dll
2010-02-23 04:41 . 2009-08-26 19:48 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-02-17 13:10 . 2003-04-17 22:57 2189952 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25 . 2002-08-29 01:04 2066816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2004-08-10 03:30 . 2006-09-29 01:53 40960 ----a-w- c:\program files\Uninstall_CDS.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{00000000-6E41-4FD3-8538-502F5495E5FC}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-02-04 1197448]

[HKEY_CLASSES_ROOT\clsid\{00000000-6e41-4fd3-8538-502f5495e5fc}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}]
2010-02-04 20:50 1197448 ----a-w- c:\program files\Ask.com\GenericAskToolbar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-02-04 1197448]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-02-04 1197448]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\Carbonite.Green]
@="{95A27763-F62A-4114-9072-E81D87DE3B68}"
[HKEY_CLASSES_ROOT\CLSID\{95A27763-F62A-4114-9072-E81D87DE3B68}]
2009-12-03 21:52 574096 ----a-r- c:\program files\Carbonite\Carbonite Backup\CarboniteNSE.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\Carbonite.Partial]
@="{E300CD91-100F-4E67-9AF3-1384A6124015}"
[HKEY_CLASSES_ROOT\CLSID\{E300CD91-100F-4E67-9AF3-1384A6124015}]
2009-12-03 21:52 574096 ----a-r- c:\program files\Carbonite\Carbonite Backup\CarboniteNSE.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\Carbonite.Yellow]
@="{5E529433-B50E-4bef-A63B-16A6B71B071A}"
[HKEY_CLASSES_ROOT\CLSID\{5E529433-B50E-4bef-A63B-16A6B71B071A}]
2009-12-03 21:52 574096 ----a-r- c:\program files\Carbonite\Carbonite Backup\CarboniteNSE.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Yahoo! Pager"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2007-01-19 4670968]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-01-05 413696]
"WinUtilities Quick Launcher"="c:\program files\WinUtilities\WO.exe" [2009-06-16 2359296]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
041001211C368101C600.Xsernum 404X73Q10SQ0001
041001211C368101C600.Xaddr BRILL.LEXINGTON.KY

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
backup=c:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^ALLTEL DSL Check-up Center.lnk]
backup=c:\windows\pss\ALLTEL DSL Check-up Center.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^palstart.exe]
backup=c:\windows\pss\palstart.exeCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^RAMASST.lnk]
backup=c:\windows\pss\RAMASST.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Service Manager.lnk]
backup=c:\windows\pss\Service Manager.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^Owner^Start Menu^Programs^Startup^rncsys32.exe]
backup=c:\windows\pss\rncsys32.exeStartup

[HKLM\~\startupfolder\C:^Documents and Settings^Owner^Start Menu^Programs^Startup^Shortcut to OUTLOOK.lnk]
backup=c:\windows\pss\Shortcut to OUTLOOK.lnkStartup
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\24015
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AVG8_TRAY

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CFSServ.exe]
CFSServ.exe -NoClient [X]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\000StTHK]
2001-06-24 03:28 24576 ----a-w- c:\windows\system32\000StTHK.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\00THotkey]
2003-01-17 17:41 253952 ----a-w- c:\windows\system32\00THotkey.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2010-03-24 18:17 952768 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Photo Downloader]
2007-03-09 15:09 63712 ----a-w- c:\program files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2010-04-04 05:42 36272 ----a-w- c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Apoint]
2002-12-25 21:38 159744 ----a-w- c:\program files\Apoint2K\Apoint.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AppleSyncNotifier]
2008-11-07 19:16 111936 ----a-w- c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2008-04-14 00:12 15360 ----a-w- c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Drag'n Drop CD+DVD]
2003-01-09 23:54 991232 ----a-w- c:\program files\Drag'n Drop CD+DVD\BinFiles\DragDrop.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EzPrint]
2006-04-19 13:57 94208 ----a-w- c:\program files\Lexmark 8300 Series\ezprint.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ezShieldProtector for Px]
2002-08-20 17:29 40960 ----a-w- c:\windows\system32\EZSP_PX.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Component Manager]
2004-05-12 20:18 241664 ----a-w- c:\program files\HP\hpcoretech\hpcmpmgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
2003-12-05 19:41 49152 ----a-w- c:\program files\Hewlett-Packard\HP Software Update\hpwuSchd2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPDJ Taskbar Utility]
2004-05-04 07:21 176128 ----a-w- c:\windows\system32\spool\drivers\w32x86\3\hpztsb09.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPHmon05]
2004-05-04 22:17 491520 ----a-w- c:\windows\system32\hphmon05.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HPHUPD05]
2004-04-01 04:34 49152 ----a-w- c:\program files\Hewlett-Packard\{5372B9A6-6E51-4f90-9B40-E0A3B8475C4E}\hphupd05.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2009-04-02 20:11 342312 ----a-w- c:\program files\iTunes\iTunesHelper.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LtMoh]
2003-01-22 21:54 184320 ----a-w- c:\program files\ltmoh\ltmoh.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\lxcjmon.exe]
2005-09-30 14:49 200704 ----a-w- c:\program files\Lexmark 8300 Series\lxcjmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MimBoot]
2006-01-19 15:06 11776 ----a-w- c:\progra~1\MUSICM~1\MUSICM~1\mimboot.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MMTray]
2006-01-19 15:06 110592 ----a-w- c:\program files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Motive SmartBridge]
2004-11-09 14:32 393216 ----a-w- c:\progra~1\ALLTEL~1\SMARTB~1\MotiveSB.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2008-04-14 00:12 1695232 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Pinger]
2002-10-17 20:21 159744 ----a-w- c:\toshiba\Ivp\ism\pinger.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PmProxy]
2003-03-01 02:54 40960 ----a-w- c:\program files\Analog Devices\SoundMAX\PmProxy.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-01-05 20:18 413696 ----a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\radarDesk]
2006-01-21 16:24 675840 ----a-w- c:\windows\system32\radarDesk.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RemoteControl]
2004-06-29 01:29 32768 ----a-w- c:\program files\CyberLink DVD Solution\PowerDVD\PDVDServ.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Software Informer]
2009-08-13 23:44 1970245 ----a-w- c:\program files\Software Informer\softinfo.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]
2009-03-05 20:07 2260480 --sha-r- c:\program files\Spybot - Search & Destroy\TeaTimer.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2010-01-11 20:21 246504 ----a-w- c:\program files\Common Files\Java\Java Update\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TFNF5]
2001-08-04 00:08 73728 ----a-w- c:\windows\system32\TFNF5.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TouchED]
2003-01-22 01:00 126976 ----a-w- c:\program files\Toshiba\TouchED\TouchED.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Tpwrtray]
2002-12-10 17:49 237568 ----a-w- c:\windows\system32\TPWRTRAY.EXE

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TSysSMon]
2003-02-26 00:03 49152 ----a-w- c:\toshiba\SysStability\TSysSMon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\userini]
c:\windows\system32\userini.exe [BU]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WinUtilities Quick Launcher]
2009-06-16 18:34 2359296 ----a-w- c:\program files\WinUtilities\WO.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager]
2007-01-19 17:49 4670968 ----a-w- c:\program files\Yahoo!\Messenger\YahooMessenger.exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"8097:TCP"= 8097:TCP:EarthLink UHP Modem Support
"5100:TCP"= 5100:TCP:127.0.0.1/255.255.255.255:Enabled:127.0.0.1

R0 ALiAGP;ALi AGP Bus Filter Driver;c:\windows\system32\drivers\ALiAGP.SYS [5/6/2003 8:09 PM 26880]
R0 GRFILTER;CS NDIS Driver;c:\windows\system32\drivers\GRFilter.sys [7/11/2005 10:36 AM 15548]
S1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2/23/2010 1:58 AM 216200]
S1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2/23/2010 1:58 AM 242896]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 11:25 AM 12872]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [4/27/2010 5:30 PM 61440]
S2 avg9wd;AVG Free WatchDog;"c:\program files\AVG\AVG9\avgwdsvc.exe" --> c:\program files\AVG\AVG9\avgwdsvc.exe [?]
S2 GRTdiMon;GR TDI Mon;c:\windows\system32\drivers\GRTdiMon.sys [7/11/2005 10:38 AM 20480]
S2 mrtRate;mrtRate; [x]
S2 solewxte;solewxte Service; [x]
S3 ADSFilter;ADSFilter - (Aluria Filter Driver);c:\windows\system32\drivers\ADSFilter.sys [12/1/2005 8:41 AM 56432]
S3 ALiIRDA;ALi Infrared Device Driver;c:\windows\system32\drivers\aliirda.sys [5/6/2003 8:22 PM 26112]
S3 BW2NDIS5;BW2NDIS5;c:\windows\system32\Drivers\BW2NDIS5.sys --> c:\windows\system32\Drivers\BW2NDIS5.sys [?]
S3 MailScan;MailScan;\??\c:\progra~1\AVANQU~1\Fix-It\MailScan.sys --> c:\progra~1\AVANQU~1\Fix-It\MailScan.sys [?]
S3 RGService;RGService;c:\program files\RadioGet\RGService.exe [1/8/2010 11:28 AM 335872]
S3 STSService;STSService;c:\program files\SoundTaxi Media Suite\STSService.exe [9/29/2009 6:41 AM 335872]
S3 tridxp;tridxp;c:\windows\system32\drivers\tridxpm.sys [4/24/2003 7:39 PM 248448]
S3 wlags48b;Wireless LAN PCCard Driver;c:\windows\system32\drivers\wlags48b.sys [5/6/2003 8:21 PM 156672]
S3 WsAudioDevice_383;WsAudioDevice_383;c:\windows\system32\drivers\WsAudioDevice_383.sys [9/19/2009 4:47 PM 16640]
.
Contents of the 'Scheduled Tasks' folder

2009-07-27 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]

2010-05-14 c:\windows\Tasks\Scheduled Update for Ask Toolbar.job
- c:\program files\Ask.com\UpdateTask.exe [2010-02-04 20:50]

2010-05-14 c:\windows\Tasks\User_Feed_Synchronization-{6363146F-ADC3-4C3A-98C9-151F95DCE1B0}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 17:58]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uInternet Settings,ProxyOverride = 127.0.0.1;*.local
IE: Refresh Pa&ge with Full Quality
IE: Refresh Pi&cture with Full Quality
IE: {{10F055B8-F443-4adf-948A-EC551E9DBCE4} - c:\documents and settings\Owner\Start Menu\Programs\UltimateBet\UltimateBet.lnk
Trusted Zone: musicmatch.com\online
TCP: {E260A1CC-403A-4BA4-A944-C42E0E864560} = 192.168.2.1
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
.
- - - - ORPHANS REMOVED - - - -

Toolbar-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll
WebBrowser-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll
MSConfigStartUp-AVG9_TRAY - c:\progra~1\AVG\AVG9\avgtray.exe
AddRemove-AVG9Uninstall - c:\program files\AVG\AVG9\setup.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-14 22:20
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL]
@DACL=(02 0000)
"Installed"="1"
@=""

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI]
@DACL=(02 0000)
"NoChange"="1"
"Installed"="1"
@=""

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS]
@DACL=(02 0000)
"Installed"="1"
@=""
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(1332)
c:\windows\system32\WININET.dll
c:\program files\Carbonite\Carbonite Backup\CarboniteNSE.dll
c:\windows\system32\ieframe.dll
c:\program files\Common Files\Adobe\Acrobat\ActiveX\PDFShell.dll
c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
c:\program files\Bonjour\mdnsNSP.dll
.
Completion time: 2010-05-14 22:32:21
ComboFix-quarantined-files.txt 2010-05-15 02:32
ComboFix2.txt 2010-02-22 21:14

Pre-Run: 10,292,178,944 bytes free
Post-Run: 10,347,630,592 bytes free

- - End Of File - - 772861A883E58A9D56E8E7F9679F4E01





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users