Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Possible rootkit/google redirect


  • This topic is locked This topic is locked
23 replies to this topic

#1 mgmtsys

mgmtsys

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 23 June 2010 - 06:35 PM

I've been having problems with this computer for some time. It had multiple infections, some of which have been removed, but still is not functioning properly. The persisting problems are that it redirects after clicking on links, rather than going to the intended site, and has ads pop up periodically. I've run a variety of scans over the past month, including SUPERAntiSpyware, Malwarebytes' Anti-Malware, Spybot, Kaspersky's online scan, eset.com's online scan and Combofix (before I read not to do so) both in safe mode and logged in as different users. Some infections are detected over and over, even though the software indicates they have been removed. Thanks in advance for any help you might provide.

The DDS log:


DDS (Ver_10-03-17.01) - NTFSx86
Run by Administrator at 16:03:33.03 on Wed 06/23/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.446.203 [GMT -5:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\Administrator\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.toshibadirect.com/dpdstart
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\DLASHX_W.DLL
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0004-ABCDEFFEDCBC} - c:\program files\java\jre1.5.0_04\bin\npjpi150_04.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} - hxxp://office.microsoft.com/officeupdate/content/opuc3.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/products/plugin/autodl/jinstall-150-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0014-0002-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0006-ABCDEFFEDCBA} - hxxp://javadl-esd.sun.com/update/1.4.2/jinstall-1_4_2-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0004-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_04-windows-i586.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

============= SERVICES / DRIVERS ===============

R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-5-10 67656]

=============== Created Last 30 ================

2010-06-23 21:01:17 0 ----a-w- c:\documents and settings\administrator\defogger_reenable
2010-06-23 16:16:56 0 d-----w- c:\program files\CCleaner
2010-06-23 16:15:31 0 d-----w- c:\docume~1\admini~1\applic~1\GlarySoft
2010-06-23 16:13:45 0 d-----w- c:\program files\Glary Utilities
2010-06-23 15:07:56 0 d-----w- c:\docume~1\admini~1\applic~1\Malwarebytes
2010-06-23 14:38:51 0 d-sh--w- c:\documents and settings\administrator\PrivacIE
2010-06-19 02:29:53 0 ----a-w- c:\windows\Hrizocupuwowo.bin
2010-06-19 02:29:52 120 ----a-w- c:\windows\Tveriracevenupe.dat
2010-06-11 18:36:43 552 ----a-w- c:\windows\system32\d3d8caps.dat
2010-06-11 13:03:31 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-06-11 13:03:31 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2010-06-10 14:22:26 0 d-sha-r- C:\cmdcons
2010-06-09 21:48:02 0 d-----w- c:\docume~1\admini~1\applic~1\SUPERAntiSpyware.com
2010-06-09 21:46:41 0 d-sh--w- c:\documents and settings\administrator\IETldCache
2010-06-09 21:40:01 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2010-06-09 21:39:53 0 d-----w- c:\program files\SUPERAntiSpyware
2010-06-09 16:32:11 98816 ----a-w- c:\windows\sed.exe
2010-06-09 16:32:11 77312 ----a-w- c:\windows\MBR.exe
2010-06-09 16:32:11 256512 ----a-w- c:\windows\PEV.exe
2010-06-09 16:32:11 161792 ----a-w- c:\windows\SWREG.exe
2010-06-09 12:23:49 0 d-----w- c:\docume~1\alluse~1\applic~1\Kaspersky Lab

==================== Find3M ====================

2010-04-29 20:39:38 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 20:39:26 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-08-21 15:02:08 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009082120090822\index.dat

============= FINISH: 16:04:56.25 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:23 PM

Posted 28 June 2010 - 06:46 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 mgmtsys

mgmtsys
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 29 June 2010 - 08:29 AM

Hi m0le, thank you for your reply. I am subscribed to this thread and awaiting further instruction.

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:23 PM

Posted 29 June 2010 - 02:26 PM

There's still malware traces so please run OTL and we'll see what else might still be with us.
  • Download OTL to your desktop.
  • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • Under the Standard Registry box change it to All.
  • Check the boxes beside LOP Check and Purity Check.
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post it with your next reply.

Posted Image
m0le is a proud member of UNITE

#5 mgmtsys

mgmtsys
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 29 June 2010 - 04:42 PM

Thank you for your reply. Here are the logs:

OTL logfile created on: 6/29/2010 4:19:25 PM - Run 1
OTL by OldTimer - Version 3.2.7.0 Folder = C:\Documents and Settings\TomSr\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

446.00 Mb Total Physical Memory | 189.00 Mb Available Physical Memory | 42.00% Memory free
1.00 Gb Paging File | 1.00 Gb Available in Paging File | 57.00% Paging File free
Paging file location(s): c:\pagefile.sys 672 1344 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 74.29 Gb Total Space | 57.75 Gb Free Space | 77.73% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
E: Drive not present or media not loaded
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded
Drive Z: | 149.04 Gb Total Space | 86.63 Gb Free Space | 58.13% Space Free | Partition Type: NTFS

Computer Name: TOMSRLAPTOP
Current User Name: tomsr
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: Current user
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Minimal

========== Processes (SafeList) ==========

PRC - C:\Documents and Settings\TomSr\Desktop\OTL.exe (OldTimer Tools)
PRC - C:\WINDOWS\explorer.exe (Microsoft Corporation)
PRC - C:\WINDOWS\system32\WISPTIS.EXE (Microsoft Corporation)


========== Modules (SafeList) ==========

MOD - C:\Documents and Settings\TomSr\Desktop\OTL.exe (OldTimer Tools)
MOD - C:\WINDOWS\iwunejiqaluh.dll ()
MOD - C:\WINDOWS\system32\msscript.ocx (Microsoft Corporation)


========== Win32 Services (SafeList) ==========

SRV - (TAPPSRV) -- C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe (TOSHIBA Corp.)
SRV - (Swupdtmr) -- c:\TOSHIBA\IVP\swupdate\swupdtmr.exe ()
SRV - (ACS) -- C:\WINDOWS\system32\acs.exe ()
SRV - (MSSQL$MICROSOFTSMLBIZ) -- C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTSMLBIZ\Binn\sqlservr.exe (Microsoft Corporation)
SRV - (SQLAgent$MICROSOFTSMLBIZ) -- C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTSMLBIZ\Binn\sqlagent.EXE (Microsoft Corporation)
SRV - (CFSvcs) -- C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe (TOSHIBA CORPORATION)
SRV - (DVD-RAM_Service) -- C:\WINDOWS\system32\DVDRAMSV.exe (Matsubleepa Electric Industrial Co., Ltd.)


========== Driver Services (SafeList) ==========

DRV - (SASKUTIL) -- C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS (SUPERAdBlocker.com and SUPERAntiSpyware.com)
DRV - (SASDIFSV) -- C:\Program Files\SUPERAntiSpyware\sasdifsv.sys (SUPERAdBlocker.com and SUPERAntiSpyware.com)
DRV - (HDAudBus) -- C:\WINDOWS\system32\drivers\hdaudbus.sys (Windows ® Server 2003 DDK provider)
DRV - (Tvs) -- C:\WINDOWS\system32\drivers\Tvs.sys (TOSHIBA Corporation)
DRV - (AgereSoftModem) -- C:\WINDOWS\system32\drivers\AGRSM.sys (Agere Systems)
DRV - (IntcAzAudAddService) Service for Realtek HD Audio (WDM) -- C:\WINDOWS\system32\drivers\RtkHDAud.Sys (Realtek Semiconductor Corp.)
DRV - (ASCTRM) -- C:\WINDOWS\system32\drivers\asctrm.sys (Windows ® 2000 DDK provider)
DRV - (TVALD) -- C:\WINDOWS\system32\drivers\NBSMI.sys (Toshiba Corporation)
DRV - (AR5211) -- C:\WINDOWS\system32\drivers\ar5211.sys (Atheros Communications, Inc.)
DRV - (tbiosdrv) -- C:\WINDOWS\system32\drivers\tbiosdrv.sys ()
DRV - (ati2mtag) -- C:\WINDOWS\system32\drivers\ati2mtag.sys (ATI Technologies Inc.)
DRV - (DLAUDFAM) -- C:\WINDOWS\system32\DLA\DLAUDFAM.SYS (Sonic Solutions)
DRV - (DLAUDF_M) -- C:\WINDOWS\system32\DLA\DLAUDF_M.SYS (Sonic Solutions)
DRV - (DLAIFS_M) -- C:\WINDOWS\system32\DLA\DLAIFS_M.SYS (Sonic Solutions)
DRV - (DLABOIOM) -- C:\WINDOWS\system32\DLA\DLABOIOM.SYS (Sonic Solutions)
DRV - (DLAOPIOM) -- C:\WINDOWS\system32\DLA\DLAOPIOM.SYS (Sonic Solutions)
DRV - (DLAPoolM) -- C:\WINDOWS\system32\DLA\DLAPoolM.SYS (Sonic Solutions)
DRV - (DLADResN) -- C:\WINDOWS\system32\DLA\DLADResN.SYS (Sonic Solutions)
DRV - (DRVMCDB) -- C:\WINDOWS\System32\Drivers\DRVMCDB.SYS (Sonic Solutions)
DRV - (DLACDBHM) -- C:\WINDOWS\system32\drivers\DLACDBHM.SYS (Sonic Solutions)
DRV - (DLARTL_N) -- C:\WINDOWS\system32\drivers\DLARTL_N.SYS (Sonic Solutions)
DRV - (DRVNDDM) -- C:\WINDOWS\system32\drivers\DRVNDDM.SYS (Sonic Solutions)
DRV - (meiudf) -- C:\WINDOWS\system32\drivers\meiudf.sys (Matsubleepa Electric Industrial Co.,Ltd.)
DRV - (RTL8023xp) -- C:\WINDOWS\system32\drivers\Rtlnicxp.sys (Realtek Semiconductor Corporation )
DRV - (KR10N) -- C:\WINDOWS\system32\drivers\KR10N.sys (TOSHIBA CORPORATION)
DRV - (SynTP) -- C:\WINDOWS\system32\drivers\SynTP.sys (Synaptics, Inc.)
DRV - (pfc) -- C:\WINDOWS\system32\drivers\pfc.sys (Padus, Inc.)
DRV - (Netdevio) -- C:\WINDOWS\system32\drivers\Netdevio.sys (TOSHIBA Corporation.)
DRV - (wanatw) WAN Miniport (ATW) -- C:\WINDOWS\system32\drivers\wanatw4.sys (America Online, Inc.)


========== Standard Registry (All) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Secondary_Page_URL = [binary data]
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Extensions Off Page = about:NoAdd-ons
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\system32\blank.htm
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Security Risk Page = about:SecurityRisk
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,CustomizeSearch = http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,SearchAssistant = http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchasst.htm

IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\system32\blank.htm
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Page_Transitions = 1
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?p...amp;ar=iesearch
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://partnerpage.google.com/msiservices.net?refresh=1
IE - HKCU\..\URLSearchHook: {CFBFAE00-17A6-11D0-99CB-00C04FD64497} - C:\WINDOWS\system32\ieframe.dll (Microsoft Corporation)
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = <local>
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = http=127.0.0.1:1049

FF - HKLM\software\mozilla\Firefox\Extensions\\{20a82645-c095-46ed-80e3-08825760534b}: c:\WINDOWS\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ [2009/09/02 03:01:15 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Firefox\Extensions\\{BE2FC565-DFBA-4141-A24F-290BCFDACF08}: C:\Documents and Settings\TomSr\Local Settings\Application Data\{BE2FC565-DFBA-4141-A24F-290BCFDACF08} [2010/06/25 08:35:11 | 000,000,000 | ---D | M]


O1 HOSTS File: ([2010/06/23 11:56:11 | 000,000,027 | ---- | M]) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (Adobe PDF Reader Link Helper) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll (Adobe Systems Incorporated)
O2 - BHO: (DriveLetterAccess) - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\DLA\DLASHX_W.DLL (Sonic Solutions)
O3 - HKCU\..\Toolbar\ShellBrowser: (&Address) - {01E04581-4EEE-11D0-BFE9-00AA005B4383} - C:\WINDOWS\system32\browseui.dll (Microsoft Corporation)
O3 - HKCU\..\Toolbar\WebBrowser: (&Address) - {01E04581-4EEE-11D0-BFE9-00AA005B4383} - C:\WINDOWS\system32\browseui.dll (Microsoft Corporation)
O3 - HKCU\..\Toolbar\WebBrowser: (&Links) - {0E5CBF21-D15F-11D0-8301-00AA005B4383} - C:\WINDOWS\system32\shell32.dll (Microsoft Corporation)
O4 - HKLM..\Run: [Hqefudivosogike] C:\WINDOWS\iwunejiqaluh.DLL ()
O4 - HKLM..\Run: [QuickTime Task] C:\Program Files\QuickTime\qttask.exe (Apple Computer, Inc.)
O4 - HKCU..\Run: [Bvaduyokuyepe] C:\WINDOWS\srashle.DLL (Wondershare)
O4 - HKCU..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (Microsoft Corporation)
O4 - HKCU..\Run: [MSMSGS] C:\Program Files\Messenger\msmsgs.exe (Microsoft Corporation)
O4 - HKCU..\Run: [s9201] C:\Documents and Settings\All Users\Application Data\SoftLand Ltd\Antivirus 2008 XP\av2008xp.exe File not found
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: dontdisplaylastusername = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: legalnoticecaption =
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: legalnoticetext =
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: shutdownwithoutlogon = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: undockwithoutlogon = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: DisableRegistryTools = 0
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O8 - Extra context menu item: E&xport to Microsoft Excel - C:\Program Files\Microsoft Office\OFFICE11\EXCEL.EXE (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\NPJPI150_04.dll (Sun Microsystems, Inc.)
O9 - Extra Button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\Program Files\Microsoft Office\OFFICE11\REFIEBAR.DLL (Microsoft Corporation)
O9 - Extra Button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\shdocvw.dll (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\network diagnostic\xpnetdiag.exe (Microsoft Corporation)
O9 - Extra Button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (Microsoft Corporation)
O10 - NameSpace_Catalog5\Catalog_Entries\000000000001 [] - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - NameSpace_Catalog5\Catalog_Entries\000000000002 [] - C:\WINDOWS\system32\winrnr.dll (Microsoft Corporation)
O10 - NameSpace_Catalog5\Catalog_Entries\000000000003 [] - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000001 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000002 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000003 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000004 - C:\WINDOWS\system32\rsvpsp.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000005 - C:\WINDOWS\system32\rsvpsp.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000006 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000007 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000008 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000009 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000010 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000011 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000012 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000013 - C:\WINDOWS\system32\mswsock.dll (Microsoft Corporation)
O16 - DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} http://office.microsoft.com/officeupdate/content/opuc3.cab (Office Update Installation Engine)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/products/plugin/autodl...indows-i586.cab (Java Plug-in 1.5.0_04)
O16 - DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} http://fpdownload.macromedia.com/get/flash...t/ultrashim.cab (Reg Error: Key error.)
O16 - DPF: {CAFEEFAC-0014-0002-0000-ABCDEFFEDCBA} http://java.sun.com/products/plugin/autodl...indows-i586.cab (Java Plug-in 1.4.2)
O16 - DPF: {CAFEEFAC-0014-0002-0006-ABCDEFFEDCBA} http://javadl-esd.sun.com/update/1.4.2/jin...indows-i586.cab (Reg Error: Key error.)
O16 - DPF: {CAFEEFAC-0015-0000-0004-ABCDEFFEDCBA} http://java.sun.com/update/1.5.0/jinstall-...indows-i586.cab (Java Plug-in 1.5.0_04)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 68.94.156.1 68.94.157.1
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = msi.summersong.com
O18 - Protocol\Handler\about {3050F406-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\cdl {3dd53d40-7b8b-11D0-b013-00aa0059ce02} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\dvd {12D51199-0DB5-46FE-A120-47A3D7D937CC} - C:\WINDOWS\system32\msvidctl.dll (Microsoft Corporation)
O18 - Protocol\Handler\file {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\ftp {79eac9e3-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\gopher {79eac9e4-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\http {79eac9e2-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\http\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\http\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\https {79eac9e5-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\https\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\https\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\ipp - No CLSID value found
O18 - Protocol\Handler\ipp\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\its {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\system32\itss.dll (Microsoft Corporation)
O18 - Protocol\Handler\javascript {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\local {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\mailto {3050f3DA-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\mhtml {05300401-BCBC-11d0-85E3-00C04FD85AB4} - C:\WINDOWS\system32\inetcomm.dll (Microsoft Corporation)
O18 - Protocol\Handler\mk {79eac9e6-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Handler\msdaipp - No CLSID value found
O18 - Protocol\Handler\msdaipp\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\msdaipp\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL (Microsoft Corporation)
O18 - Protocol\Handler\ms-its {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\system32\itss.dll (Microsoft Corporation)
O18 - Protocol\Handler\ms-itss {0A9007C0-4076-11D3-8789-0000F8105754} - C:\Program Files\Common Files\Microsoft Shared\Information Retrieval\msitss.dll (Microsoft Corporation)
O18 - Protocol\Handler\mso-offdap {3D9F03FA-7A94-11D3-BE81-0050048385D1} - C:\Program Files\Common Files\Microsoft Shared\Web Components\10\OWC10.DLL (Microsoft Corporation)
O18 - Protocol\Handler\mso-offdap11 {32505114-5902-49B2-880A-1F7738E5A384} - C:\Program Files\Common Files\Microsoft Shared\Web Components\11\OWC11.DLL (Microsoft Corporation)
O18 - Protocol\Handler\res {3050F3BC-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\sysimage {76E67A63-06E9-11D2-A840-006008059382} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\tv {CBD30858-AF45-11D2-B6D6-00C04FBBDE6E} - C:\WINDOWS\system32\msvidctl.dll (Microsoft Corporation)
O18 - Protocol\Handler\vbscript {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll (Microsoft Corporation)
O18 - Protocol\Handler\wia {13F3EA8B-91D7-4F0A-AD76-D2853AC8BECE} - C:\WINDOWS\system32\wiascr.dll (Microsoft Corporation)
O18 - Protocol\Filter\application/octet-stream {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - C:\WINDOWS\System32\mscoree.dll (Microsoft Corporation)
O18 - Protocol\Filter\application/x-complus {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - C:\WINDOWS\System32\mscoree.dll (Microsoft Corporation)
O18 - Protocol\Filter\application/x-msdownload {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - C:\WINDOWS\System32\mscoree.dll (Microsoft Corporation)
O18 - Protocol\Filter\Class Install Handler {32B533BB-EDAE-11d0-BD5A-00AA00B92AF1} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Filter\deflate {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Filter\gzip {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Filter\lzdhtml {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\WINDOWS\system32\urlmon.dll (Microsoft Corporation)
O18 - Protocol\Filter\text/webviewhtml {733AC4CB-F1A4-11d0-B951-00A0C90312E1} - C:\WINDOWS\system32\shell32.dll (Microsoft Corporation)
O18 - Protocol\Filter\text/xml {807553E5-5146-11D5-A672-00B0D022E945} - C:\Program Files\Common Files\Microsoft Shared\OFFICE11\MSOXMLMF.DLL (Microsoft Corporation)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\WINDOWS\system32\userinit.exe) - C:\WINDOWS\system32\userinit.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UIHost - (logonui.exe) - C:\WINDOWS\System32\logonui.exe (Microsoft Corporation)
O20 - HKLM Winlogon: VMApplet - (rundll32 shell32) - C:\WINDOWS\System32\shell32.dll (Microsoft Corporation)
O20 - HKLM Winlogon: VMApplet - (Control_RunDLL "sysdm.cpl") - C:\WINDOWS\System32\sysdm.cpl (Microsoft Corporation)
O20 - Winlogon\Notify\!SASWinLogon: DllName - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL (SUPERAntiSpyware.com)
O20 - Winlogon\Notify\AtiExtEvent: DllName - Ati2evxx.dll - C:\WINDOWS\System32\ati2evxx.dll (ATI Technologies Inc.)
O20 - Winlogon\Notify\crypt32chain: DllName - crypt32.dll - C:\WINDOWS\System32\crypt32.dll (Microsoft Corporation)
O20 - Winlogon\Notify\cryptnet: DllName - cryptnet.dll - C:\WINDOWS\System32\cryptnet.dll (Microsoft Corporation)
O20 - Winlogon\Notify\cscdll: DllName - cscdll.dll - C:\WINDOWS\System32\cscdll.dll (Microsoft Corporation)
O20 - Winlogon\Notify\dimsntfy: DllName - %SystemRoot%\System32\dimsntfy.dll - C:\WINDOWS\system32\dimsntfy.dll (Microsoft Corporation)
O20 - Winlogon\Notify\ScCertProp: DllName - wlnotify.dll - C:\WINDOWS\System32\wlnotify.dll (Microsoft Corporation)
O20 - Winlogon\Notify\Schedule: DllName - wlnotify.dll - C:\WINDOWS\System32\wlnotify.dll (Microsoft Corporation)
O20 - Winlogon\Notify\sclgntfy: DllName - sclgntfy.dll - C:\WINDOWS\System32\sclgntfy.dll (Microsoft Corporation)
O20 - Winlogon\Notify\SensLogn: DllName - WlNotify.dll - C:\WINDOWS\System32\wlnotify.dll (Microsoft Corporation)
O20 - Winlogon\Notify\termsrv: DllName - wlnotify.dll - C:\WINDOWS\System32\wlnotify.dll (Microsoft Corporation)
O20 - Winlogon\Notify\WgaLogon: DllName - WgaLogon.dll - C:\WINDOWS\System32\WgaLogon.dll (Microsoft Corporation)
O20 - Winlogon\Notify\wlballoon: DllName - wlnotify.dll - C:\WINDOWS\System32\wlnotify.dll (Microsoft Corporation)
O21 - SSODL: CDBurn - {fbeb8a05-beee-4442-804e-409d6c4515e9} - C:\WINDOWS\system32\shell32.dll (Microsoft Corporation)
O21 - SSODL: PostBootReminder - {7849596a-48ea-486e-8937-a2a3009f31a9} - C:\WINDOWS\system32\shell32.dll (Microsoft Corporation)
O21 - SSODL: SysTray - {35CEC8A3-2BE6-11D2-8773-92E220524153} - C:\WINDOWS\system32\stobject.dll (Microsoft Corporation)
O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - C:\WINDOWS\system32\webcheck.dll (Microsoft Corporation)
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll (Microsoft Corporation)
O22 - SharedTaskScheduler: {438755C2-A8BA-11D1-B96B-00A0C90312E1} - Browseui preloader - C:\WINDOWS\system32\browseui.dll (Microsoft Corporation)
O22 - SharedTaskScheduler: {8C7461EF-2B13-11d2-BE35-3078302C2030} - Component Categories cache daemon - C:\WINDOWS\system32\browseui.dll (Microsoft Corporation)
O24 - Desktop Components:0 (My Current Home Page) - About:Home
O24 - Desktop WallPaper: C:\Documents and Settings\TomSr\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
O24 - Desktop BackupWallPaper: C:\Documents and Settings\TomSr\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
O28 - HKLM ShellExecuteHooks: {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - C:\Program Files\SUPERAntiSpyware\SASSEH.DLL (SuperAdBlocker.com)
O28 - HKLM ShellExecuteHooks: {AEB6717E-7E19-11d0-97EE-00C04FD91972} - C:\WINDOWS\System32\shell32.dll (Microsoft Corporation)
O29 - HKLM SecurityProviders - (msapsspc.dll) - C:\WINDOWS\System32\msapsspc.dll (Microsoft Corporation)
O29 - HKLM SecurityProviders - (schannel.dll) - C:\WINDOWS\System32\schannel.dll (Microsoft Corporation)
O29 - HKLM SecurityProviders - (digest.dll) - C:\WINDOWS\System32\digest.dll (Microsoft Corporation)
O29 - HKLM SecurityProviders - (msnsspc.dll) - C:\WINDOWS\System32\msnsspc.dll (Microsoft Corporation)
O30 - LSA: Authentication Packages - (msv1_0) - C:\WINDOWS\System32\msv1_0.dll (Microsoft Corporation)
O30 - LSA: Security Packages - (kerberos) - C:\WINDOWS\System32\kerberos.dll (Microsoft Corporation)
O30 - LSA: Security Packages - (msv1_0) - C:\WINDOWS\System32\msv1_0.dll (Microsoft Corporation)
O30 - LSA: Security Packages - (schannel) - C:\WINDOWS\System32\schannel.dll (Microsoft Corporation)
O30 - LSA: Security Packages - (wdigest) - C:\WINDOWS\System32\wdigest.dll (Microsoft Corporation)
O31 - SafeBoot: AlternateShell - cmd.exe
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2005/11/04 21:30:02 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck autochk *) - File not found
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = ComFile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2010/06/29 16:16:56 | 000,574,464 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\TomSr\Desktop\OTL.exe
[2010/06/25 08:35:11 | 000,000,000 | ---D | C] -- C:\Documents and Settings\TomSr\Local Settings\Application Data\{BE2FC565-DFBA-4141-A24F-290BCFDACF08}
[2010/06/23 12:00:20 | 000,000,000 | ---D | C] -- C:\WINDOWS\temp
[2010/06/23 11:29:18 | 000,000,000 | ---D | C] -- C:\Config.Msi
[2010/06/23 11:16:56 | 000,000,000 | ---D | C] -- C:\Program Files\CCleaner
[2010/06/23 11:13:45 | 000,000,000 | ---D | C] -- C:\Program Files\Glary Utilities
[2010/06/21 08:52:43 | 000,000,000 | ---D | C] -- C:\Documents and Settings\LocalService\Application Data\Macromedia
[2010/06/21 08:52:39 | 000,000,000 | ---D | C] -- C:\Documents and Settings\LocalService\Application Data\Adobe
[2010/06/17 12:22:31 | 000,000,000 | ---D | C] -- C:\Documents and Settings\TomSr\My Documents\ExpressPCB
[2010/06/17 11:43:13 | 000,000,000 | ---D | C] -- C:\Documents and Settings\TomSr\Local Settings\Application Data\Downloaded Installations
[2010/06/11 08:03:31 | 000,000,000 | ---D | C] -- C:\Program Files\Spybot - Search & Destroy
[2010/06/11 08:03:31 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
[2010/06/10 09:22:26 | 000,000,000 | RHSD | C] -- C:\cmdcons
[2010/06/09 16:40:01 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
[2010/06/09 16:39:53 | 000,000,000 | ---D | C] -- C:\Program Files\SUPERAntiSpyware
[2010/06/09 11:32:11 | 000,212,480 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWXCACLS.exe
[2010/06/09 11:32:11 | 000,161,792 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWREG.exe
[2010/06/09 11:32:11 | 000,136,704 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWSC.exe
[2010/06/09 11:32:11 | 000,031,232 | ---- | C] (NirSoft) -- C:\WINDOWS\NIRCMD.exe
[2010/06/09 11:31:58 | 000,000,000 | ---D | C] -- C:\WINDOWS\ERDNT
[2010/06/09 11:31:17 | 000,000,000 | ---D | C] -- C:\Qoobox
[2010/06/09 07:23:49 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
[2010/06/08 15:17:15 | 000,000,000 | ---D | C] -- C:\Documents and Settings\NetworkService\Application Data\Macromedia
[2010/06/08 15:17:14 | 000,000,000 | ---D | C] -- C:\Documents and Settings\NetworkService\Application Data\Adobe
[2010/06/08 14:25:07 | 000,000,000 | ---D | C] -- C:\Documents and Settings\TomSr\Local Settings\Application Data\cywdme
[2005/11/04 21:59:49 | 000,053,248 | ---- | C] ( ) -- C:\WINDOWS\System32\DLLVGA.dll
[4 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]

========== Files - Modified Within 30 Days ==========

[2010/06/29 16:16:57 | 000,574,464 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\TomSr\Desktop\OTL.exe
[2010/06/29 14:39:07 | 000,000,120 | ---- | M] () -- C:\WINDOWS\Tveriracevenupe.dat
[2010/06/29 14:14:00 | 000,000,422 | -H-- | M] () -- C:\WINDOWS\tasks\User_Feed_Synchronization-{4AAEFB61-EB8F-4C85-BEDD-90E936016B85}.job
[2010/06/29 08:07:32 | 000,000,000 | ---- | M] () -- C:\WINDOWS\Hrizocupuwowo.bin
[2010/06/29 08:07:08 | 000,012,620 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2010/06/29 08:07:07 | 000,000,444 | ---- | M] () -- C:\WINDOWS\tasks\SDMsgUpdate (TE).job
[2010/06/29 08:07:05 | 000,000,328 | ---- | M] () -- C:\WINDOWS\tasks\GlaryInitialize.job
[2010/06/29 07:49:38 | 000,000,006 | -H-- | M] () -- C:\WINDOWS\tasks\SA.DAT
[2010/06/29 07:49:35 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2010/06/29 07:49:32 | 467,914,752 | -HS- | M] () -- C:\hiberfil.sys
[2010/06/28 15:38:58 | 004,194,304 | -H-- | M] () -- C:\Documents and Settings\TomSr\NTUSER.DAT
[2010/06/28 15:38:58 | 000,000,278 | -HS- | M] () -- C:\Documents and Settings\TomSr\ntuser.ini
[2010/06/23 15:39:45 | 004,316,062 | -H-- | M] () -- C:\Documents and Settings\TomSr\Local Settings\Application Data\IconCache.db
[2010/06/23 11:56:39 | 000,000,227 | ---- | M] () -- C:\WINDOWS\system.ini
[2010/06/23 11:56:11 | 000,000,027 | ---- | M] () -- C:\WINDOWS\System32\drivers\etc\hosts
[2010/06/23 09:30:08 | 000,000,281 | RHS- | M] () -- C:\boot.ini
[2010/06/23 09:30:07 | 000,000,603 | ---- | M] () -- C:\WINDOWS\win.ini
[2010/06/17 11:44:32 | 000,001,669 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\ExpressSCH.lnk
[2010/06/17 11:44:32 | 000,001,669 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\ExpressPCB.lnk
[2010/06/17 11:12:50 | 000,012,037 | ---- | M] () -- C:\Documents and Settings\TomSr\Desktop\MUSIC BOX BOARD.pcb
[2010/06/14 13:11:47 | 000,000,059 | ---- | M] () -- C:\WINDOWS\brmx2001.ini
[2010/06/11 13:36:43 | 000,000,552 | ---- | M] () -- C:\WINDOWS\System32\d3d8caps.dat
[2010/06/11 13:28:07 | 000,363,520 | ---- | M] () -- C:\Documents and Settings\TomSr\Desktop\rkill.com
[2010/06/10 09:06:30 | 000,000,211 | ---- | M] () -- C:\Boot.bak
[2010/06/04 13:02:40 | 000,000,500 | ---- | M] () -- C:\Documents and Settings\TomSr\Desktop\Copy of CVI Truck Facility.lnk
[4 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]

========== Files Created - No Company Name ==========

[2010/06/23 11:13:58 | 000,000,328 | ---- | C] () -- C:\WINDOWS\tasks\GlaryInitialize.job
[2010/06/23 10:55:32 | 467,914,752 | -HS- | C] () -- C:\hiberfil.sys
[2010/06/18 21:29:53 | 000,000,000 | ---- | C] () -- C:\WINDOWS\Hrizocupuwowo.bin
[2010/06/18 21:29:52 | 000,000,120 | ---- | C] () -- C:\WINDOWS\Tveriracevenupe.dat
[2010/06/18 21:27:46 | 000,000,012 | ---- | C] () -- C:\Documents and Settings\NetworkService\Application Data\cakzob.dat
[2010/06/17 11:44:32 | 000,001,669 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\ExpressSCH.lnk
[2010/06/17 11:44:32 | 000,001,669 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\ExpressPCB.lnk
[2010/06/17 11:12:57 | 000,012,037 | ---- | C] () -- C:\Documents and Settings\TomSr\Desktop\MUSIC BOX BOARD.pcb
[2010/06/11 13:36:43 | 000,000,552 | ---- | C] () -- C:\WINDOWS\System32\d3d8caps.dat
[2010/06/11 13:28:07 | 000,363,520 | ---- | C] () -- C:\Documents and Settings\TomSr\Desktop\rkill.com
[2010/06/10 09:22:44 | 000,000,211 | ---- | C] () -- C:\Boot.bak
[2010/06/10 09:22:34 | 000,260,272 | ---- | C] () -- C:\cmldr
[2010/06/09 11:32:11 | 000,256,512 | ---- | C] () -- C:\WINDOWS\PEV.exe
[2010/06/09 11:32:11 | 000,098,816 | ---- | C] () -- C:\WINDOWS\sed.exe
[2010/06/09 11:32:11 | 000,080,412 | ---- | C] () -- C:\WINDOWS\grep.exe
[2010/06/09 11:32:11 | 000,077,312 | ---- | C] () -- C:\WINDOWS\MBR.exe
[2010/06/09 11:32:11 | 000,068,096 | ---- | C] () -- C:\WINDOWS\zip.exe
[2009/08/17 13:39:23 | 000,000,047 | ---- | C] () -- C:\WINDOWS\NeroDigital.ini
[2008/04/24 16:08:21 | 000,000,059 | ---- | C] () -- C:\WINDOWS\brmx2001.ini
[2008/04/24 16:08:21 | 000,000,052 | ---- | C] () -- C:\WINDOWS\BRPP2KA.INI
[2008/04/24 16:08:21 | 000,000,040 | ---- | C] () -- C:\WINDOWS\opt_1440.ini
[2007/04/17 09:07:36 | 000,101,376 | ---- | C] () -- C:\WINDOWS\System32\mqisnmp.dll
[2007/04/17 09:07:35 | 000,168,960 | ---- | C] () -- C:\WINDOWS\System32\crnxmon.dll
[2007/04/17 09:07:35 | 000,131,584 | ---- | C] () -- C:\WINDOWS\System32\crnxutil.dll
[2007/04/17 09:06:31 | 000,035,100 | ---- | C] () -- C:\WINDOWS\MSTMON01.INI
[2007/04/11 12:31:33 | 000,000,426 | ---- | C] () -- C:\WINDOWS\brwmark.ini
[2006/05/18 08:25:17 | 000,000,125 | ---- | C] () -- C:\WINDOWS\System32\ver.ini
[2006/05/18 08:25:11 | 000,229,376 | ---- | C] () -- C:\WINDOWS\System32\sdl.dll
[2006/05/18 08:25:11 | 000,159,744 | ---- | C] () -- C:\WINDOWS\System32\lgbskin.dll
[2006/05/18 08:25:11 | 000,086,016 | ---- | C] () -- C:\WINDOWS\System32\lgbsysinfo.dll.bak
[2006/05/18 08:25:11 | 000,086,016 | ---- | C] () -- C:\WINDOWS\System32\lgbsysinfo.dll
[2006/05/18 08:25:11 | 000,040,960 | ---- | C] () -- C:\WINDOWS\System32\xcon.dll
[2006/05/18 08:25:11 | 000,036,864 | ---- | C] () -- C:\WINDOWS\System32\xcon.dll.bak
[2006/04/26 12:42:56 | 000,192,512 | ---- | C] () -- C:\WINDOWS\System32\HPB2550V.DLL
[2006/04/26 12:42:56 | 000,094,274 | ---- | C] () -- C:\WINDOWS\System32\HPBHEALR.DLL
[2006/03/31 12:17:34 | 000,000,002 | ---- | C] () -- C:\WINDOWS\msoffice.ini
[2006/03/22 23:29:24 | 000,045,056 | ---- | C] () -- C:\WINDOWS\System32\MSHRES01.DLL
[2006/03/13 00:37:52 | 000,023,553 | ---- | C] () -- C:\WINDOWS\MSUMLT01.INI
[2005/12/21 20:04:48 | 000,000,061 | ---- | C] () -- C:\WINDOWS\smscfg.ini
[2005/11/30 18:16:05 | 000,128,113 | ---- | C] () -- C:\WINDOWS\System32\csellang.ini
[2005/11/30 18:16:05 | 000,045,056 | ---- | C] () -- C:\WINDOWS\System32\csellang.dll
[2005/11/30 18:16:05 | 000,010,165 | ---- | C] () -- C:\WINDOWS\System32\tosmreg.ini
[2005/11/30 18:16:05 | 000,007,671 | ---- | C] () -- C:\WINDOWS\System32\cseltbl.ini
[2005/11/29 17:52:15 | 000,029,184 | ---- | C] () -- C:\WINDOWS\System32\drivers\TSXT_kern_i386.sys
[2005/11/11 17:12:12 | 000,000,000 | ---- | C] () -- C:\WINDOWS\System32\px.ini
[2005/11/07 12:00:07 | 000,000,376 | ---- | C] () -- C:\WINDOWS\ODBC.INI
[2005/11/07 11:27:47 | 000,000,012 | ---- | C] () -- C:\WINDOWS\dirsaver.ini
[2005/11/04 23:07:42 | 000,000,272 | ---- | C] () -- C:\WINDOWS\wininit.ini
[2005/11/04 23:05:40 | 000,000,172 | ---- | C] () -- C:\WINDOWS\Quicken.ini
[2005/11/04 23:03:51 | 000,204,800 | ---- | C] () -- C:\WINDOWS\System32\IVIresizeW7.dll
[2005/11/04 23:03:51 | 000,200,704 | ---- | C] () -- C:\WINDOWS\System32\IVIresizeA6.dll
[2005/11/04 23:03:51 | 000,192,512 | ---- | C] () -- C:\WINDOWS\System32\IVIresizeP6.dll
[2005/11/04 23:03:51 | 000,192,512 | ---- | C] () -- C:\WINDOWS\System32\IVIresizeM6.dll
[2005/11/04 23:03:51 | 000,188,416 | ---- | C] () -- C:\WINDOWS\System32\IVIresizePX.dll
[2005/11/04 23:03:51 | 000,020,480 | ---- | C] () -- C:\WINDOWS\System32\IVIresize.dll
[2005/11/04 22:31:32 | 000,036,736 | ---- | C] () -- C:\WINDOWS\System32\drivers\CSIIDecoder_kern_i386.sys
[2005/11/04 22:27:54 | 000,000,000 | ---- | C] () -- C:\WINDOWS\NDSTray.INI
[2005/11/04 21:59:49 | 000,118,784 | ---- | C] () -- C:\WINDOWS\System32\TCtrlIO.dll
[2005/11/04 21:26:52 | 000,001,793 | ---- | C] () -- C:\WINDOWS\System32\fxsperf.ini
[2005/11/04 19:56:25 | 000,000,272 | ---- | C] () -- C:\WINDOWS\System32\OEMINFO.INI
[2005/08/24 18:20:28 | 000,009,472 | ---- | C] () -- C:\WINDOWS\System32\drivers\tbiosdrv.sys
[2004/08/04 07:00:00 | 000,184,832 | ---- | C] () -- C:\WINDOWS\iwunejiqaluh.dll
[2003/01/07 18:05:08 | 000,002,695 | ---- | C] () -- C:\WINDOWS\System32\OUTLPERF.INI

========== LOP Check ==========

[2008/08/26 13:22:57 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\services
[2005/11/04 23:09:56 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Viewpoint
[2007/11/21 14:56:58 | 000,000,000 | ---D | M] -- C:\Documents and Settings\All Users\Application Data\Yahoo
[2008/01/25 12:12:59 | 000,000,000 | ---D | M] -- C:\Documents and Settings\TomSr\Application Data\SmartDraw
[2005/11/04 22:39:12 | 000,000,000 | ---D | M] -- C:\Documents and Settings\TomSr\Application Data\toshiba
[2010/06/29 08:07:05 | 000,000,328 | ---- | M] () -- C:\WINDOWS\Tasks\GlaryInitialize.job
[2010/06/29 08:07:07 | 000,000,444 | ---- | M] () -- C:\WINDOWS\Tasks\SDMsgUpdate (TE).job
[2010/06/29 14:14:00 | 000,000,422 | -H-- | M] () -- C:\WINDOWS\Tasks\User_Feed_Synchronization-{4AAEFB61-EB8F-4C85-BEDD-90E936016B85}.job

========== Purity Check ==========


< End of report >

OTL Extras logfile created on: 6/29/2010 4:19:25 PM - Run 1
OTL by OldTimer - Version 3.2.7.0 Folder = C:\Documents and Settings\TomSr\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

446.00 Mb Total Physical Memory | 189.00 Mb Available Physical Memory | 42.00% Memory free
1.00 Gb Paging File | 1.00 Gb Available in Paging File | 57.00% Paging File free
Paging file location(s): c:\pagefile.sys 672 1344 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 74.29 Gb Total Space | 57.75 Gb Free Space | 77.73% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
E: Drive not present or media not loaded
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded
Drive Z: | 149.04 Gb Total Space | 86.63 Gb Free Space | 58.13% Space Free | Partition Type: NTFS

Computer Name: TOMSRLAPTOP
Current User Name: tomsr
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: Current user
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Minimal

========== Extra Registry (SafeList) ==========


========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
exefile [open] -- "%1" %*
htmlfile [edit] -- "C:\Program Files\Microsoft Office\OFFICE11\msohtmed.exe" %1 (Microsoft Corporation)
htmlfile [print] -- "C:\Program Files\Microsoft Office\OFFICE11\msohtmed.exe" /p %1 (Microsoft Corporation)
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l (Microsoft Corporation)
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [open] -- %SystemRoot%\Explorer.exe /idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"FirstRunDisabled" = 1
"AntiVirusDisableNotify" = 0
"UpdatesDisableNotify" = 0
"AntiVirusOverride" = 0
"FirewallOverride" = 0
"FirewallDisableNotify" = 0

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\GloballyOpenPorts\List]
"1900:UDP" = 1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007
"2869:TCP" = 2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008
"139:TCP" = 139:TCP:*:Enabled:@xpsp2res.dll,-22004
"445:TCP" = 445:TCP:*:Enabled:@xpsp2res.dll,-22005
"137:UDP" = 137:UDP:*:Enabled:@xpsp2res.dll,-22001
"138:UDP" = 138:UDP:*:Enabled:@xpsp2res.dll,-22002
"10243:TCP" = 10243:TCP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service
"10280:UDP" = 10280:UDP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service
"10281:UDP" = 10281:UDP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service
"10282:UDP" = 10282:UDP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service
"10283:UDP" = 10283:UDP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service
"10284:UDP" = 10284:UDP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = 1
"DoNotAllowExceptions" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]
"1900:UDP" = 1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007
"2869:TCP" = 2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008
"139:TCP" = 139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004
"445:TCP" = 445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005
"137:UDP" = 137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001
"138:UDP" = 138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002
"10243:TCP" = 10243:TCP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service
"10280:UDP" = 10280:UDP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service
"10281:UDP" = 10281:UDP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service
"10282:UDP" = 10282:UDP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service
"10283:UDP" = 10283:UDP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service
"10284:UDP" = 10284:UDP:LocalSubNet:Enabled:Windows Media Player Network Sharing Service

========== Authorized Applications List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]
"%windir%\system32\sessmgr.exe" = %windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019 -- (Microsoft Corporation)
"%windir%\Network Diagnostic\xpnetdiag.exe" = %windir%\Network Diagnostic\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000 -- (Microsoft Corporation)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"%windir%\system32\sessmgr.exe" = %windir%\system32\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019 -- (Microsoft Corporation)
"C:\TOSHIBA\ivp\NetInt\Netint.exe" = C:\TOSHIBA\ivp\NetInt\Netint.exe:*:Enabled:NIE - Toshiba Software Upgrade Engine -- (TOSHIBA Corporation)
"C:\TOSHIBA\Ivp\ISM\pinger.exe" = C:\TOSHIBA\IVP\ISM\pinger.exe:*:Enabled:Toshiba Software Upgrades Pinger -- (TOSHIBA Corporation)
"C:\Program Files\Common Files\AOL\Loader\aolload.exe" = C:\Program Files\Common Files\AOL\Loader\aolload.exe:*:Enabled:AOL Application Loader -- (America Online, Inc.)
"C:\Program Files\Yahoo!\Yahoo! Music Engine\YahooMusicEngine.exe" = C:\Program Files\Yahoo!\Yahoo! Music Engine\YahooMusicEngine.exe:*:Disabled:Yahoo! Music Engine -- (Yahoo!)
"%windir%\Network Diagnostic\xpnetdiag.exe" = %windir%\Network Diagnostic\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000 -- (Microsoft Corporation)
"%windir%\system32\lsass.exe" = %windir%\system32\lsass.exe:*:Enabled:Local Security Authority Subsystem Service -- (Microsoft Corporation)


========== HKEY_LOCAL_MACHINE Uninstall List ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{008D69EB-70FF-46AB-9C75-924620DF191A}" = TOSHIBA Speech System SR Engine(U.S.) Version1.0
"{05832D65-6EDB-4D32-BA78-BCD0E2B91C02}" = Atheros Wireless LAN MiniPCI card Driver
"{0BEDBD4E-2D34-47B5-9973-57E62B29307C}" = ATI Control Panel
"{1206EF92-2E83-4859-ACCB-2048C3CB7DA6}" = Sonic DLA
"{12B3A009-A080-4619-9A2A-C6DB151D8D67}" = TOSHIBA Assist
"{2DBE41DD-2129-4C65-A3D3-5647236A60F3}" = Quicken 2005
"{3248F0A8-6813-11D6-A77B-00B0D0150040}" = J2SE Runtime Environment 5.0 Update 4
"{350C97B0-3D7C-4EE8-BAA9-00BCB3D54227}" = WebFldrs XP
"{3FBF6F99-8EC6-41B4-8527-0A32241B5496}" = TOSHIBA Speech System TTS Engine(U.S.) Version1.0
"{425A2BC2-AA64-4107-9C29-484245BBEA05}" = TOSHIBA Software Upgrades
"{47D2103B-FD51-4017-9C20-DD408B17D726}" = Office 2003 Trial Assistant
"{4A3C74BA-B483-421B-B557-E39F3CB8C7F8}" = ExpressPCB
"{5D96E2B1-D9AC-46E0-9073-425C5F63E338}" = Touch and Launch
"{64212898-097F-4F3F-AECA-6D34A7EF82DF}" = TOSHIBA Zooming Utility
"{64DD71BC-3109-4C88-9AD3-D5422644B722}" = TOSHIBA Hotkey Utility
"{6815FCDD-401D-481E-BA88-31B4754C2B46}" = Macromedia Flash Player 8
"{69BE47C2-36FE-4397-8199-85D8EAE69982}" = TOSHIBA TouchPad ON/Off Utility
"{6D52C408-B09A-4520-9B18-475B81D393F1}" = Microsoft Works
"{7148F0A8-6813-11D6-A77B-00B0D0142000}" = Java 2 Runtime Environment, SE v1.4.2
"{71D658CF-4E0D-4DA8-AA67-8C0B6F1C01FE}" = Atheros Client Utility
"{78C68CB9-3DF5-44F3-AB9D-FA305C5EB85C}" = TOSHIBA Utilities
"{8B12BA86-ADAC-4BA6-B441-FFC591087252}" = TOSHIBA Virtual Sound
"{8FD0AC90-1268-4A53-977E-E8E90D10EF6A}" = Crown Print Monitor+
"{91110409-6000-11D3-8CFE-0150048383C9}" = Microsoft Office Professional Edition 2003
"{91810AFC-A4F8-4EBA-A5AA-B198BBC81144}" = InterVideo WinDVD for TOSHIBA
"{91A10409-6000-11D3-8CFE-0150048383C9}" = Microsoft Office OneNote 2003
"{94FB906A-CF42-4128-A509-D353026A607E}" = REALTEK Gigabit and Fast Ethernet NIC Driver
"{9541FED0-327F-4DF0-8B96-EF57EF622F19}" = Sonic RecordNow!
"{9D765FA6-F2BC-40AF-8145-50808F9BDF4E}" = DVD-RAM Driver
"{9FE35071-CAB2-4E79-93E7-BFC6A2DC5C5D}" = CD/DVD Drive Acoustic Silencer
"{A3051CD0-2F64-3813-A88D-B8DCCDE8F8C7}" = Microsoft .NET Framework 3.0 Service Pack 2
"{A6690C0E-B96E-4F0F-A8EB-D5B332454AC6}" = TOSHIBA Controls
"{AC76BA86-7AD7-1033-7B44-A70800000002}" = Adobe Reader 7.0.8
"{B4092C6D-E886-4CB2-BA68-FE5A88D31DE6}_is1" = Spybot - Search & Destroy
"{BA561482-C49D-4687-A61C-96236C1688F0}" = ArcSoft Software Suite
"{BA68600E-96D9-4E92-80F2-26B9681B5A63}" = Microsoft Office Outlook 2003 with Business Contact Manager Update
"{BDD83DC9-BEE9-4654-A5DA-CC46C250088D}" = TOSHIBA ConfigFree
"{BE3F89C0-42D5-11D5-A40A-00105AC8331A}" = Metamail (Toshiba Registration Utility)
"{C09FB3CD-3D0C-3F2D-899A-6A1D67F2073F}" = Microsoft .NET Framework 2.0 Service Pack 2
"{CB2F7EDD-9D1F-43C1-90FC-4F52EAE172A1}" = Microsoft .NET Framework 1.1
"{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}" = SUPERAntiSpyware
"{CE2CDD62-0124-36CA-84D3-9F4DCF5C5BD9}" = Microsoft .NET Framework 3.5 SP1
"{E09B48B5-E141-427A-AB0C-D3605127224A}" = Microsoft SQL Server Desktop Engine (MICROSOFTSMLBIZ)
"{ED5F7AF9-347B-4440-A211-C6236508CC08}" = ExpressPCB
"{EE033C1F-443E-41EC-A0E2-559B539A4E4D}" = TOSHIBA Speech System Applications
"{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}" = Realtek High Definition Audio Driver
"Adobe Flash Player ActiveX" = Adobe Flash Player 10 ActiveX
"All ATI Software" = ATI - Software Uninstall Utility
"ATI Display Driver" = ATI Display Driver
"CCleaner" = CCleaner
"Glary Utilities_is1" = Glary Utilities 2.23.0.923
"Google Desktop" = Google Desktop
"ie8" = Windows Internet Explorer 8
"InstallShield_{2DBE41DD-2129-4C65-A3D3-5647236A60F3}" = Quicken 2005
"KONICA MINOLTA magicolor 2530DL" = KONICA MINOLTA magicolor 2530DL
"Malwarebytes' Anti-Malware_is1" = Malwarebytes' Anti-Malware
"Microsoft .NET Framework 1.1 (1033)" = Microsoft .NET Framework 1.1
"Microsoft .NET Framework 3.5 SP1" = Microsoft .NET Framework 3.5 SP1
"MSCompPackV1" = Microsoft Compression Client Pack 1.0 for Windows XP
"PC Diagnostic Tool" = TOSHIBA PC Diagnostic Tool
"Power Saver" = TOSHIBA Power Saver
"QuickTime" = QuickTime
"RealPlayer 6.0" = RealPlayer Basic
"SynTPDeinstKey" = Synaptics Pointing Device Driver
"TOSHIBA Software Modem" = TOSHIBA Software Modem
"ViewpointMediaPlayer" = Viewpoint Media Player
"WGA" = Windows Genuine Advantage Validation Tool
"Windows Media Format Runtime" = Windows Media Format 11 runtime
"Windows Media Player" = Windows Media Player 11
"Windows XP Service Pack" = Windows XP Service Pack 3
"WMCSetup" = Windows Media Connect
"WMFDist11" = Windows Media Format 11 runtime
"wmp11" = Windows Media Player 11
"Wudf01000" = Microsoft User-Mode Driver Framework Feature Pack 1.0
"Yahoo! Music Engine" = Yahoo! Music Engine

========== Last 10 Event Log Errors ==========

[ Application Events ]
Error - 6/28/2010 1:49:39 PM | Computer Name = TOMSRLAPTOP | Source = Userenv | ID = 1053
Description = Windows cannot determine the user or computer name. (The specified
domain either does not exist or could not be contacted. ). Group Policy processing
aborted.

Error - 6/29/2010 8:50:16 AM | Computer Name = TOMSRLAPTOP | Source = Userenv | ID = 1054
Description = Windows cannot obtain the domain controller name for your computer
network. (The specified domain either does not exist or could not be contacted.
). Group Policy processing aborted.

Error - 6/29/2010 8:50:32 AM | Computer Name = TOMSRLAPTOP | Source = AutoEnrollment | ID = 15
Description = Automatic certificate enrollment for local system failed to contact
the active directory (0x8007054b). The specified domain either does not exist
or could not be contacted. Enrollment will not be performed.

Error - 6/29/2010 8:52:38 AM | Computer Name = TOMSRLAPTOP | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: The connection with the server was terminated abnormally

Error - 6/29/2010 8:52:39 AM | Computer Name = TOMSRLAPTOP | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 6/29/2010 9:07:02 AM | Computer Name = TOMSRLAPTOP | Source = Userenv | ID = 1053
Description = Windows cannot determine the user or computer name. (The specified
domain either does not exist or could not be contacted. ). Group Policy processing
aborted.

Error - 6/29/2010 10:52:47 AM | Computer Name = TOMSRLAPTOP | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: The connection with the server was terminated abnormally

Error - 6/29/2010 10:52:47 AM | Computer Name = TOMSRLAPTOP | Source = crypt32 | ID = 131080
Description = Failed auto update retrieval of third-party root list sequence number
from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt>
with error: This network connection does not exist.

Error - 6/29/2010 12:45:05 PM | Computer Name = TOMSRLAPTOP | Source = Userenv | ID = 1053
Description = Windows cannot determine the user or computer name. (The specified
domain either does not exist or could not be contacted. ). Group Policy processing
aborted.

Error - 6/29/2010 4:49:56 PM | Computer Name = TOMSRLAPTOP | Source = AutoEnrollment | ID = 15
Description = Automatic certificate enrollment for local system failed to contact
the active directory (0x8007054b). The specified domain either does not exist
or could not be contacted. Enrollment will not be performed.

[ System Events ]
Error - 6/29/2010 8:49:58 AM | Computer Name = TOMSRLAPTOP | Source = Ftdisk | ID = 262189
Description = The system could not sucessfully load the crash dump driver.

Error - 6/29/2010 8:49:58 AM | Computer Name = TOMSRLAPTOP | Source = Ftdisk | ID = 262193
Description = Configuring the Page file for crash dump failed. Make sure there is
a page file on the boot partition and that is large enough to contain all physical
memory.

Error - 6/29/2010 8:50:01 AM | Computer Name = TOMSRLAPTOP | Source = NETLOGON | ID = 5719
Description = No Domain Controller is available for domain MSI due to the following:
%%1311. Make sure that the computer is connected to the network and try again. If
the problem persists, please contact your domain administrator.

Error - 6/29/2010 8:50:02 AM | Computer Name = TOMSRLAPTOP | Source = W32Time | ID = 39452701
Description = The time provider NtpClient is configured to acquire time from one
or more time sources, however none of the sources are currently accessible. No attempt
to contact a source will be made for 14 minutes. NtpClient has no source of accurate
time.

Error - 6/29/2010 8:50:17 AM | Computer Name = TOMSRLAPTOP | Source = W32Time | ID = 39452701
Description = The time provider NtpClient is configured to acquire time from one
or more time sources, however none of the sources are currently accessible. No attempt
to contact a source will be made for 14 minutes. NtpClient has no source of accurate
time.

Error - 6/29/2010 9:05:26 AM | Computer Name = TOMSRLAPTOP | Source = W32Time | ID = 39452701
Description = The time provider NtpClient is configured to acquire time from one
or more time sources, however none of the sources are currently accessible. No attempt
to contact a source will be made for 29 minutes. NtpClient has no source of accurate
time.

Error - 6/29/2010 9:35:35 AM | Computer Name = TOMSRLAPTOP | Source = W32Time | ID = 39452701
Description = The time provider NtpClient is configured to acquire time from one
or more time sources, however none of the sources are currently accessible. No attempt
to contact a source will be made for 59 minutes. NtpClient has no source of accurate
time.

Error - 6/29/2010 10:35:34 AM | Computer Name = TOMSRLAPTOP | Source = W32Time | ID = 39452701
Description = The time provider NtpClient is configured to acquire time from one
or more time sources, however none of the sources are currently accessible. No attempt
to contact a source will be made for 119 minutes. NtpClient has no source of accurate
time.

Error - 6/29/2010 12:35:36 PM | Computer Name = TOMSRLAPTOP | Source = W32Time | ID = 39452701
Description = The time provider NtpClient is configured to acquire time from one
or more time sources, however none of the sources are currently accessible. No attempt
to contact a source will be made for 239 minutes. NtpClient has no source of accurate
time.

Error - 6/29/2010 4:35:38 PM | Computer Name = TOMSRLAPTOP | Source = W32Time | ID = 39452701
Description = The time provider NtpClient is configured to acquire time from one
or more time sources, however none of the sources are currently accessible. No attempt
to contact a source will be made for 479 minutes. NtpClient has no source of accurate
time.


< End of report >


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:23 PM

Posted 30 June 2010 - 01:21 PM

Run OTL

Under the Custom Scans/Fixes box at the bottom, paste in the following

CODE
:OTL
MOD - C:\WINDOWS\iwunejiqaluh.dll ()
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = http=127.0.0.1:1049
O4 - HKLM..\Run: [Hqefudivosogike] C:\WINDOWS\iwunejiqaluh.DLL ()
O4 - HKCU..\Run: [Bvaduyokuyepe] C:\WINDOWS\srashle.DLL (Wondershare)
[2010/06/08 14:25:07 | 000,000,000 | ---D | C] -- C:\Documents and Settings\TomSr\Local Settings\Application Data\cywdme
[2010/06/29 14:39:07 | 000,000,120 | ---- | M] () -- C:\WINDOWS\Tveriracevenupe.dat
[2010/06/29 08:07:32 | 000,000,000 | ---- | M] () -- C:\WINDOWS\Hrizocupuwowo.bin
[2010/06/18 21:27:46 | 000,000,012 | ---- | C] () -- C:\Documents and Settings\NetworkService\Application Data\cakzob.dat
[2004/08/04 07:00:00 | 000,184,832 | ---- | C] () -- C:\WINDOWS\iwunejiqaluh.dll
:reg
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\open\command]
""=""%1" %*"


Then click the Run Fix button at the top

Let the program run unhindered.

When done it will say "Fix Complete press ok to open the log"
Please post that log in your next reply. Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTL\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.
Posted Image
m0le is a proud member of UNITE

#7 mgmtsys

mgmtsys
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 30 June 2010 - 01:33 PM

Thanks again...unfortunately someone logged me off the computer overnight so I had to log back in, if that would affect anything.

========== OTL ==========
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyServer| /E : value set successfully!
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\Hqefudivosogike deleted successfully.
C:\WINDOWS\iwunejiqaluh.dll moved successfully.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\\Bvaduyokuyepe not found.
C:\WINDOWS\srashle.dll moved successfully.
C:\Documents and Settings\TomSr\Local Settings\Application Data\cywdme folder moved successfully.
C:\WINDOWS\Tveriracevenupe.dat moved successfully.
C:\WINDOWS\Hrizocupuwowo.bin moved successfully.
C:\Documents and Settings\NetworkService\Application Data\cakzob.dat moved successfully.
File C:\WINDOWS\iwunejiqaluh.dll not found.
========== REGISTRY ==========
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\open\command\\""|""%1" %*" /E : value set successfully!

OTL by OldTimer - Version 3.2.7.0 log created on 06302010_133022


#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:23 PM

Posted 30 June 2010 - 04:16 PM

Okay, that's removed much of the malware - there may still be infected files but nothing massively troubling.

I notice that you were getting redirects. Which browser are you using? Also, is this still happening?
Posted Image
m0le is a proud member of UNITE

#9 mgmtsys

mgmtsys
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 01 July 2010 - 07:57 AM

Thank you for your help. The browser on this computer is IE 8.0.6001.18702. They have not been browsing much, so I do not know if the pop-ups continue. If they're gone as you suggest you've saved us a lot of headache.

#10 mgmtsys

mgmtsys
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 01 July 2010 - 03:38 PM

Well they got through most of the day; now Sysinternals Antivirus has popped up. Should I follow the instructions listed here:

http://www.bleepingcomputer.com/virus-remo...rnals-antivirus

or would you suggest something else? Thanks in advance.

#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:23 PM

Posted 01 July 2010 - 04:52 PM

You don't need to run the entire fix.

Please run MBAM

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.
Posted Image
m0le is a proud member of UNITE

#12 mgmtsys

mgmtsys
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 02 July 2010 - 07:49 AM

I ran the scan and left the computer for a few hours only to find that it had restarted itself with no log file. So I ran it again this morning while monitoring it. I had to use the Task Manager to kill the Sysinternals Antivirus process probably 15 times during the scan. Here is the log:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4266

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

7/2/2010 7:43:17 AM
mbam-log-2010-07-02 (07-43-17).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 248375
Time elapsed: 46 minute(s), 26 second(s)

Memory Processes Infected: 2
Memory Modules Infected: 1
Registry Keys Infected: 6
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 5
Files Infected: 337

Memory Processes Infected:
C:\Program Files\Sysinternals Antivirus\Sysinternals Antivirus.exe (Rogue.SysinternalsAntivirus) -> Unloaded process successfully.
C:\Program Files\svchost.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:
C:\Program Files\adc_w32.dll (Rogue.SysinternalsAntivirus) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{149256d5-e103-4523-bb43-2cfb066839d6} (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{149256d5-e103-4523-bb43-2cfb066839d6} (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{149256d5-e103-4523-bb43-2cfb066839d6} (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{149256d5-e103-4523-bb43-2cfb066839d6} (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\adbupd (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ADBUPD (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CLASSES_ROOT\exefile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: (C:\Program Files\alggui.exe "%1" %*) Good: ("%1" %*) -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\TomSr\Start Menu\Programs\Sysinternals Antivirus (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\Sysinternals Antivirus (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Sysinternals Antivirus (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\scdata (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images (Trojan.Dropper) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\Sysinternals Antivirus\Sysinternals Antivirus.exe (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\adc_w32.dll (Rogue.SysinternalsAntivirus) -> Delete on reboot.
C:\Program Files\scdata\dbsinit.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\Documents and Settings\rich\Local Settings\Application Data\syssvc.exe.vir (Trojan.KillAV) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\Documents and Settings\TomSr\Local Settings\Application Data\syssvc.exe.vir (Trojan.KillAV) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1127\A0030853.exe (Trojan.KillAV) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1127\A0031094.exe (Trojan.KillAV) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1127\A0031095.exe (Trojan.KillAV) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1128\A0031359.exe (Trojan.KillAV) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1129\A0031809.exe (Rogue.AVSecuritySuite) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1129\A0031810.exe (Rogue.AVSecuritySuite) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1134\A0031905.dll (Trojan.Agent.Gen) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1135\A0034002.exe (Packed.Krap) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038568.exe (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038573.dll (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038583.dll (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038594.dll (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038609.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038617.dll (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038619.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038626.dll (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038628.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038635.dll (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038637.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038644.dll (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038653.dll (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038655.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038662.dll (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038664.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038646.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win10.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win101.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win160.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win162.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win164.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win166.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win168.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win16A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win16C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win16E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win170.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win2D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win2F.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win31.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win33.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win35.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win37.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win39.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win3B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win3D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win3E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win40.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win42.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win44.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win46.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win48.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win4A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win4C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win4E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win50.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win55.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win57.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win59.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win5B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win5D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win5E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win6.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win60.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win62.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win64.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win69.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win6B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win6D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win6F.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win71.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win73.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win75.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win77.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win79.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win103.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win142.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win16.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1B2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1DB.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win201.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win228.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win53.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win67.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win8D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winA.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winB2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winD9.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winEC.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win7B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win7D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win7F.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win8.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win81.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win83.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win85.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win87.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win89.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win8B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win8F.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win91.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win93.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win95.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win97.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win99.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win9B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win9D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win9F.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winA1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winA2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winA4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winA6.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winA8.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winAA.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winAC.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winAE.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winB0.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winB4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winB6.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winB8.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winBA.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winBC.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winBE.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winC.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winC0.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winC2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winC4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winC7.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winC9.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winCB.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winCD.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winCF.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winD1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winD3.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winD5.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winD7.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winDB.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winDD.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winDF.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winE.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winE1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winE3.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winE5.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winE7.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winE9.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winEA.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winEE.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winF0.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winF2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winF4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winF7.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winF9.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winFB.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winFD.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winFF.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win105.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win107.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win108.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win10A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win10C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win10E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win110.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win112.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win114.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win116.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win118.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win11A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win11C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win11E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win12.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win120.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win122.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win124.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win126.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win128.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win12A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win12C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win12E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win130.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win132.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win134.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win137.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win138.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win13A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win13C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win13E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win14.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win140.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win144.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win146.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win148.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win14A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win14C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win14E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win150.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win152.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win154.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win156.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win158.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win15A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win15C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win15E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1A0.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1A2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1A4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1A6.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1A8.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1AA.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1AC.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1AE.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1B0.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win173.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win175.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win177.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win179.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win17B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win17D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win17E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win18.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win180.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win182.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win184.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win186.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win188.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win18A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win18C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win18E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win190.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win192.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win194.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win196.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win199.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win19B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win19D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win19E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1B4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1B6.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1B8.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1BA.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1BC.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1BE.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1C0.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1C2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1C4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1C6.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1C8.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1CA.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1CC.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1D0.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1D2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1D4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1D6.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1D9.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1DD.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1DF.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1E1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1E3.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1E5.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1E7.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1F.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1FF.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win203.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win205.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win207.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win209.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win20C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win20E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win21.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win210.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win212.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win214.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win216.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win218.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win21A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win21C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win21E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win220.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win222.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win224.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win226.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win22A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win22C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win22E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win23.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win230.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win232.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win234.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win25.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win27.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win29.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win2B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\06302010_133022\C_WINDOWS\srashle.dll (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\Documents and Settings\TomSr\Start Menu\Programs\Sysinternals Antivirus\Sysinternals Antivirus.lnk (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Sysinternals Antivirus\Sysinternals Antivirus.lnk (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\scdata\wispex.html (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\i1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\i2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\i3.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\j1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\j2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\j3.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\jj1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\jj2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\jj3.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\l1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\l2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\l3.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\pix.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\t1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\t2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\Thumbs.db (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\up1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\up2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\w1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\w11.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\w2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\w3.jpg (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\word.doc (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\wt1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\wt2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\wt3.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\TomSr\Desktop\Sysinternals Antivirus.LNK (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Sysinternals Antivirus.LNK (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\alggui.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\nuar.old (Malware.Trace) -> Quarantined and deleted successfully.
C:\Program Files\skynet.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Program Files\svchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\wp3.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Program Files\wp4.dat (Malware.Trace) -> Quarantined and deleted successfully.


#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:23 PM

Posted 02 July 2010 - 05:28 PM

Can you rerun MBAM for me. Just to check for regenerating files


Posted Image
m0le is a proud member of UNITE

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:23 PM

Posted 05 July 2010 - 06:58 PM

Hi,

I have not had a reply from you for 3 days. Can you please tell me if you still need help with your computer as I am unable to help other members with their problems while I have your topic still open. The time taken between posts can also change the situation with your PC making it more difficult to help you.

If you like you can PM me.

Thanks,


m0le
Posted Image
m0le is a proud member of UNITE

#15 mgmtsys

mgmtsys
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:09:23 AM

Posted 06 July 2010 - 10:22 AM

Sorry about that, was away for a few days. Sysinternals Antivirus has reared its ugly head again. Here is the log from the latest MBAM scan:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4282

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

7/6/2010 10:20:42 AM
mbam-log-2010-07-06 (10-20-42).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 253629
Time elapsed: 51 minute(s), 10 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 1
Registry Keys Infected: 6
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 5
Files Infected: 76

Memory Processes Infected:
C:\Program Files\svchost.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:
C:\Program Files\adc_w32.dll (Trojan.FakeAlert) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{149256d5-e103-4523-bb43-2cfb066839d6} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{149256d5-e103-4523-bb43-2cfb066839d6} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{149256d5-e103-4523-bb43-2cfb066839d6} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{149256d5-e103-4523-bb43-2cfb066839d6} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\adbupd (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ADBUPD (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CLASSES_ROOT\exefile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: (C:\Program Files\alggui.exe "%1" %*) Good: ("%1" %*) -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\TomSr\Start Menu\Programs\Sysinternals Antivirus (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\Sysinternals Antivirus (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Sysinternals Antivirus (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\scdata (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images (Trojan.Dropper) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\adc_w32.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\TomSr\Local Settings\temp\win1A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\TomSr\Local Settings\temp\win1F.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\TomSr\Local Settings\Temporary Internet Files\Content.IE5\GHYQ3592\cn[1].aspx (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\TomSr\Local Settings\Temporary Internet Files\Content.IE5\ZZF1AR68\PC_protect[1].exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Program Files\scdata\dbsinit.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\Sysinternals Antivirus\Sysinternals Antivirus.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038574.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038595.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038618.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038627.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038636.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038654.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038663.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038584.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1141\A0038645.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CF8A54B3-00DE-4AA7-AEA8-9EB54C29EA21}\RP1142\A0038737.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win10.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win2F.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win33.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win37.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win3B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win3E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win42.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win46.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win50.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win55.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win8.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\winC.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win14.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win18.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win1D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win23.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win236.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win238.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win23A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win27.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\temp\win2B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\TomSr\Start Menu\Programs\Sysinternals Antivirus\Sysinternals Antivirus.lnk (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Sysinternals Antivirus\Sysinternals Antivirus.lnk (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\scdata\wispex.html (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\i1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\i2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\i3.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\j1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\j2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\j3.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\jj1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\jj2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\jj3.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\l1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\l2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\l3.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\pix.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\t1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\t2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\Thumbs.db (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\up1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\up2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\w1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\w11.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\w2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\w3.jpg (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\word.doc (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\wt1.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\wt2.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Program Files\scdata\images\wt3.gif (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\TomSr\Desktop\Sysinternals Antivirus.LNK (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Sysinternals Antivirus.LNK (Rogue.SysinternalsAntivirus) -> Quarantined and deleted successfully.
C:\Program Files\alggui.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\nuar.old (Malware.Trace) -> Quarantined and deleted successfully.
C:\Program Files\skynet.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Program Files\svchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\wp3.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Program Files\wp4.dat (Malware.Trace) -> Quarantined and deleted successfully.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users