Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Advanced StystemCare Security Analyzer pulling up possible malware problems?


  • This topic is locked This topic is locked
14 replies to this topic

#1 piklits

piklits

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 PM

Posted 31 October 2010 - 11:23 PM

Ran a scan on Advanced System Care and in by going through the, 'Security Analyzer,' it says that it blips up 'suggestions' and asks to post this HijackThis! log to see if there is any possible Malware going on. I don't notice a difference in my computer since the day I got it other than just normal use, but I want to make sure that I am not carrying around some Malware, I also have downloaded Malware Bytes and ran several scans and it turns up nothing.


----------------------------------------------------------------------------------------------------------------------




Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 9:10:04 PM, on 10/31/2010
Platform: Windows Vista SP2 (WinNT 6.00.1906)
MSIE: Internet Explorer v8.00 (8.00.6001.18975)
Boot mode: Normal

Running processes:
C:\Program Files (x86)\IObit\Advanced SystemCare 3\AWC.exe
C:\Program Files (x86)\ASUS\ASUS Live Update\ALU.exe
C:\Program Files (x86)\ASUS\SmartLogon\sensorsrv.exe
C:\Program Files (x86)\Windows Media Player\wmplayer.exe
C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files (x86)\ASUS\ATKOSD2\ATKOSD2.exe
C:\Program Files (x86)\ASUS\ATK Media\DMedia.exe
C:\Program Files\ASUS\ASUS Data Security Manager\ADSMTray.exe
C:\Program Files (x86)\Razer\Naga\NagaTray.exe
C:\Program Files\Alwil Software\Avast5\AvastUI.exe
C:\Program Files\Logitech\GamePanel Software\Applets\LCDMedia.exe
C:\Program Files (x86)\Internet Explorer\IELowutil.exe
c:\Users\Owner\Downloads\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = Preserve
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~2\SPYBOT~1\SDHelper.dll
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files (x86)\Microsoft Office\Office12\GrooveShellExtensions.dll
O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
O3 - Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
O4 - HKLM\..\Run: [HControlUser] C:\Program Files (x86)\ASUS\ATK Hotkey\HControlUser.exe
O4 - HKLM\..\Run: [ATKOSD2] C:\Program Files (x86)\ASUS\ATKOSD2\ATKOSD2.exe
O4 - HKLM\..\Run: [ATKMEDIA] C:\Program Files (x86)\ASUS\ATK Media\DMedia.exe
O4 - HKLM\..\Run: [ADSMTray] C:\Program Files\ASUS\ASUS Data Security Manager\ADSMTray.exe
O4 - HKLM\..\Run: [Razer Naga Driver] C:\Program Files (x86)\Razer\Naga\NagaTray.exe
O4 - HKLM\..\Run: [avast5] C:\PROGRA~1\ALWILS~1\Avast5\avastUI.exe /nogui
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [Google Update] "C:\Users\Owner\AppData\Local\Google\Update\GoogleUpdate.exe" /c
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~2\MICROS~1\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~2\MICROS~1\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~2\MICROS~1\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~2\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~2\SPYBOT~1\SDHelper.dll
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files (x86)\Microsoft Office\Office12\GrooveSystemServices.dll
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~2\COMMON~1\Skype\SKYPE4~1.DLL
O18 - Protocol: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - C:\Program Files (x86)\Windows Live\Photo Gallery\AlbumDownloadProtocolHandler.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: ADSM Service (ADSMService) - ASUSTek Computer Inc. - C:\Program Files\ASUS\ASUS Data Security Manager\ADSMSrv.exe
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
O23 - Service: ASLDR Service (ASLDRService) - Unknown owner - C:\Program Files (x86)\ASUS\ATK Hotkey\ASLDRSrv.exe
O23 - Service: ATKGFNEX Service (ATKGFNEXSrv) - Unknown owner - C:\Program Files\ATKGFNEX\GFNEXSrv.exe
O23 - Service: avast! Antivirus - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
O23 - Service: avast! Mail Scanner - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
O23 - Service: avast! Web Scanner - AVAST Software - C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files (x86)\Bonjour\mDNSResponder.exe
O23 - Service: @dfsrres.dll,-101 (DFSR) - Unknown owner - C:\Windows\system32\DFSR.exe (file missing)
O23 - Service: Remote Connections Service (FlexService) - BitMicro Software Corporation - C:\Program Files (x86)\RapidBIT\cisvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files (x86)\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: LMIGuardianSvc - LogMeIn, Inc. - C:\Program Files (x86)\LogMeIn\x64\LMIGuardianSvc.exe
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files (x86)\LogMeIn\x64\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files (x86)\LogMeIn\x64\LogMeIn.exe
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: NVIDIA Display Driver Service (nvsvc) - Unknown owner - C:\Windows\system32\nvvsvc.exe (file missing)
O23 - Service: PnkBstrA - Unknown owner - C:\Windows\system32\PnkBstrA.exe
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: LiveShare P2P Server 9 (RoxLiveShare9) - Unknown owner - C:\Program Files (x86)\Common Files\Roxio Shared\9.0\SharedCOM\RoxLiveShare9.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: Remote Procedure Call (RPC) Net (rpcnet) - Absolute Software Corp. - C:\Windows\SysWOW64\rpcnet.exe
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files (x86)\Spybot - Search & Destroy\SDWinSec.exe
O23 - Service: @%SystemRoot%\system32\SLsvc.exe,-101 (slsvc) - Unknown owner - C:\Windows\system32\SLsvc.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: Syntek AVStream USB2.0 WebCam Service (StkSSrv) - Unknown owner - C:\Windows\System32\StkCSrv.exe (file missing)
O23 - Service: SupportSoft RemoteAssist - SupportSoft, Inc. - C:\Program Files (x86)\Common Files\supportsoft\bin\ssrc.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)

--
End of file - 9202 bytes

Edited by hamluis, 01 November 2010 - 09:58 AM.
Moved from Vista forum to Malware Removal Logs ~ Hamluis.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:24 AM

Posted 08 November 2010 - 05:54 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below I will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


And

Please download DeFogger to your desktop.

Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK
IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_disable which will appear on your desktop.


Then

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
Posted Image
m0le is a proud member of UNITE

#3 piklits

piklits
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 PM

Posted 09 November 2010 - 01:42 PM

Thank you for the response,
Did everything that you told me without any problems, only question about this whole thing is that in the Defogger application, can I click the 're-enable' icon?

================================================


DDS (Ver_10-11-09.01) - NTFS_AMD64
Run by Owner at 10:48:06.47 on Tue 11/09/2010
Internet Explorer: 8.0.6001.18975 BrowserJavaVersion: 1.6.0_20
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.4094.2126 [GMT -7:00]

SP: Spybot - Search and Destroy *enabled* (Outdated) {ED588FAF-1B8F-43B4-ACA8-8E3C85DADBE9}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\ASUS\ASUS Data Security Manager\ADSMSrv.exe
C:\Program Files (x86)\ASUS\ATK Hotkey\ASLDRSrv.exe
C:\Program Files\ATKGFNEX\GFNEXSrv.exe
C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
C:\Windows\system32\WUDFHost.exe
C:\Windows\system32\WUDFHost.exe
C:\Windows\system32\nvvsvc.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Program Files (x86)\IObit\Advanced SystemCare 3\AWC.exe
C:\Program Files (x86)\ASUS\ASUS Live Update\ALU.exe
C:\Windows\system32\taskeng.exe
C:\Windows\Explorer.EXE
C:\Program Files (x86)\ASUS\SmartLogon\sensorsrv.exe
C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files (x86)\Bonjour\mDNSResponder.exe
C:\Windows\system32\svchost.exe -k bthsvcs
C:\Program Files (x86)\LogMeIn\x64\LMIGuardianSvc.exe
C:\Program Files (x86)\LogMeIn\x64\RaMaint.exe
C:\Program Files (x86)\LogMeIn\x64\LogMeIn.exe
C:\Windows\System32\svchost.exe -k HPZ12
C:\Windows\System32\svchost.exe -k HPZ12
C:\Windows\SysWOW64\PnkBstrA.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files (x86)\ASUS\ATK Hotkey\HControl.exe
C:\Windows\RAVCpl64.exe
C:\Program Files (x86)\ASUS\ATK Hotkey\MsgTranAgt64.exe
C:\Program Files\Wireless Console 2\wcourier.exe
C:\Program Files (x86)\ASUS\Splendid\ACMON.exe
C:\Program Files\P4G\BatteryLife.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\SysWOW64\rpcnet.exe
C:\Program Files (x86)\ASUS\ATK Hotkey\Atouch64.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\StkCSrv.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\SysWOW64\ACEngSvr.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Windows\system32\SearchIndexer.exe
C:\Program Files (x86)\ASUS\ATK Hotkey\ATKOSD.exe
C:\Program Files (x86)\Spybot - Search & Destroy\SDWinSec.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Program Files (x86)\ASUS\ATK Hotkey\KBFiltr.exe
C:\Program Files (x86)\LogMeIn\x64\LogMeInSystray.exe
C:\Program Files (x86)\ASUS\ATK Hotkey\WDC.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Logitech\GamePanel Software\LGDevAgt.exe
C:\Program Files\Logitech\GamePanel Software\LCD Manager\LCDMon.exe
C:\Program Files\Logitech\GamePanel Software\G-series Software\LGDCore.exe
C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files (x86)\ASUS\ATKOSD2\ATKOSD2.exe
C:\Program Files (x86)\ASUS\ATK Media\DMedia.exe
C:\Program Files\ASUS\ASUS Data Security Manager\ADSMTray.exe
C:\Program Files (x86)\Razer\Naga\NagaTray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Alwil Software\Avast5\AvastUI.exe
C:\Program Files\Windows Media Player\WMPSideShowGadget.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files (x86)\Windows Media Player\wmplayer.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Logitech\GamePanel Software\Applets\LCDCountdown.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Logitech\GamePanel Software\Applets\LCDPop3.exe
C:\Program Files\Logitech\GamePanel Software\Applets\LCDClock.exe
C:\Program Files\Logitech\GamePanel Software\Applets\LCDMedia.exe
C:\Program Files\Logitech\GamePanel Software\Applets\LCDRSS.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Users\Owner\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Owner\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Owner\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\RapidBIT\cidaemon.exe
C:\Program Files (x86)\Internet Explorer\IELowutil.exe
C:\Users\Owner\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Owner\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Users\Owner\Downloads\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uSearch Bar = Preserve
uStart Page = hxxp://www.google.com/
mStart Page = hxxp://www.google.com/ig/redirectdomain?brand=ASUS&bmod=ASUS
mDefault_Page_URL = hxxp://www.google.com/ig/redirectdomain?brand=ASUS&bmod=ASUS
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - C:\PROGRA~2\SPYBOT~1\SDHelper.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - C:\Program Files (x86)\Microsoft Office\Office12\GrooveShellExtensions.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
TB: {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No File
uRun: [SpybotSD TeaTimer] C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
uRun: [Google Update] "C:\Users\Owner\AppData\Local\Google\Update\GoogleUpdate.exe" /c
mRun: [HControlUser] C:\Program Files (x86)\ASUS\ATK Hotkey\HControlUser.exe
mRun: [ATKOSD2] C:\Program Files (x86)\ASUS\ATKOSD2\ATKOSD2.exe
mRun: [ATKMEDIA] C:\Program Files (x86)\ASUS\ATK Media\DMedia.exe
mRun: [ADSMTray] C:\Program Files\ASUS\ASUS Data Security Manager\ADSMTray.exe
mRun: [Razer Naga Driver] C:\Program Files (x86)\Razer\Naga\NagaTray.exe
mRun: [avast5] C:\PROGRA~1\ALWILS~1\Avast5\avastUI.exe /nogui
uPolicies-explorer: NoDesktopCleanupWizard = 1 (0x1)
mPolicies-explorer: NoActiveDesktop = 1 (0x1)
mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - C:\PROGRA~2\MICROS~1\Office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - C:\PROGRA~2\MICROS~1\Office12\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~2\SPYBOT~1\SDHelper.dll
DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files (x86)\Microsoft Office\Office12\GrooveSystemServices.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~2\COMMON~1\Skype\SKYPE4~1.DLL
Handler: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - C:\Program Files (x86)\Windows Live\Photo Gallery\AlbumDownloadProtocolHandler.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - C:\Program Files (x86)\Microsoft Office\Office12\GrooveShellExtensions.dll
LSA: Notification Packages = scecli C:\Program Files\ASUS\ASUS Data Security Manager\ASPWDFLT
BHO-X64: Windows Live ID Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
TB-X64: {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No File
mRun-x64: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun-x64: [RtHDVCpl] RAVCpl64.exe
mRun-x64: [Skytel] Skytel.exe
mRun-x64: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
mRun-x64: [Launch LgDeviceAgent] "C:\Program Files\Logitech\GamePanel Software\LgDevAgt.exe"
mRun-x64: [Launch LCDMon] "C:\Program Files\Logitech\GamePanel Software\LCD Manager\LCDMon.exe"
mRun-x64: [Launch LGDCore] "C:\Program Files\Logitech\GamePanel Software\G-series Software\LGDCore.exe" /SHOWHIDE
mRun-x64: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
mRun-x64: [LogMeIn GUI] "C:\Program Files (x86)\LogMeIn\x64\LogMeInSystray.exe"
Hosts: 127.0.0.1 www.spywareinfo.com

================= FIREFOX ===================

FF - ProfilePath - C:\Users\Owner\AppData\Roaming\Mozilla\Firefox\Profiles\etwri9c4.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://en-US.start2.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-US:official
FF - prefs.js: keyword.URL - hxxp://toolbar.ask.com/toolbarv/askRedirect?o=13917&gct=&gc=1&q=
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
FF - HiddenExtension: Java Console: No Registry Reference - C:\Program Files (x86)\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0016-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - C:\Program Files (x86)\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - C:\Program Files (x86)\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
FF - user.js: browser.cache.memory.capacity - 65536
FF - user.js: browser.chrome.favicons - false
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: content.interrupt.parsing - true
FF - user.js: content.max.tokenizing.time - 2250000
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 750000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 750000
FF - user.js: network.http.max-connections - 48
FF - user.js: network.http.max-connections-per-server - 16
FF - user.js: network.http.max-persistent-connections-per-proxy - 16
FF - user.js: network.http.max-persistent-connections-per-server - 8
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.firstrequest - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 0
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0

============= SERVICES / DRIVERS ===============

R0 PxHlpa64;PxHlpa64;C:\Windows\System32\drivers\PxHlpa64.sys [2009-7-6 52856]
R1 aswSP;aswSP;C:\Windows\System32\drivers\aswSP.sys [2010-8-24 121936]
R2 ASMMAP64;ASMMAP64;C:\Program Files\ATKGFNEX\ASMMAP64.sys [2009-3-17 14904]
R2 aswFsBlk;aswFsBlk;C:\Windows\System32\drivers\aswFsBlk.sys [2010-8-24 20048]
R2 aswMonFlt;aswMonFlt;C:\Windows\System32\drivers\aswMonFlt.sys [2010-8-24 61008]
R2 avast! Antivirus;avast! Antivirus;C:\Program Files\Alwil Software\Avast5\AvastSvc.exe [2010-8-24 40384]
R2 LMIGuardianSvc;LMIGuardianSvc;C:\Program Files (x86)\LogMeIn\x64\LMIGuardianSvc.exe [2010-10-20 373640]
R2 LMIInfo;LogMeIn Kernel Information Provider;C:\Program Files (x86)\LogMeIn\x64\rainfo.sys [2010-1-27 15928]
R2 LMIRfsDriver;LogMeIn Remote File System Driver;C:\Windows\System32\drivers\LMIRfsDriver.sys [2010-8-21 72216]
R2 SBSDWSCService;SBSD Security Center Service;C:\Program Files (x86)\Spybot - Search & Destroy\SDWinSec.exe [2010-7-29 1153368]
R2 StkSSrv;Syntek AVStream USB2.0 WebCam Service;C:\Windows\System32\StkCSrv.exe [2008-1-21 31248]
R3 avast! Mail Scanner;avast! Mail Scanner;C:\Program Files\Alwil Software\Avast5\AvastSvc.exe [2010-8-24 40384]
R3 avast! Web Scanner;avast! Web Scanner;C:\Program Files\Alwil Software\Avast5\AvastSvc.exe [2010-8-24 40384]
R3 itecir;ITECIR Infrared Receiver;C:\Windows\System32\drivers\itecir.sys [2009-6-12 59392]
R3 NVHDA;Service for NVIDIA High Definition Audio Driver;C:\Windows\System32\drivers\nvhda64v.sys [2009-8-21 84512]
R3 StkCMini;Syntek AVStream USB2.0 1.3M WebCam;C:\Windows\System32\drivers\StkCMini.sys [2008-3-5 1611152]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-3-18 138576]
S2 FlexService;Remote Connections Service;C:\Program Files (x86)\RapidBIT\cisvc.exe [2009-5-17 41984]
S3 FontCache;Windows Font Cache Service;C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 27648]
S3 HtcUsbMdmV64;HTC Proprietary USB Driver;C:\Windows\System32\drivers\HtcUsbMdmV64.sys [2010-8-11 121800]
S3 HtcVCom32;HTC Diagnostic Port;C:\Windows\System32\drivers\HtcVComV64.sys [2010-8-11 121800]
S3 netr28ux;RT2870 USB Wireless LAN Card Driver for Vista;C:\Windows\System32\drivers\netr28ux.sys [2010-5-8 688640]
S3 NETw5v64;Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;C:\Windows\System32\drivers\NETw5v64.sys [2008-8-28 4745216]
S3 PerfHost;Performance Counter DLL Host;C:\Windows\SysWOW64\perfhost.exe [2008-1-20 19968]
S3 RzSynapse;Razer Naga Driver;C:\Windows\System32\drivers\RzSynapse.sys [2010-3-11 72704]
S3 USBAAPL64;Apple Mobile USB Driver;C:\Windows\System32\drivers\usbaapl64.sys [2010-4-19 50688]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-3-18 1020768]
S3 yukonx64;NDIS6.0 Miniport Driver for Marvell Yukon Ethernet Controller;C:\Windows\System32\drivers\yk60x64.sys [2006-11-2 273408]
S4 clr_optimization_v2.0.50727_64;Microsoft .NET Framework NGEN v2.0.50727_X64;C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe [2009-12-2 89920]

=============== File Associations ===============

JSEFile=C:\Windows\SysWOW64\WScript.exe "%1" %*

=============== Created Last 30 ================

2010-11-09 16:44:39 8006480 ----a-w- C:\PROGRA~3\Microsoft\Windows Defender\Definition Updates\{A023A1A2-C8A3-44EF-B1E0-C372897E3C37}\mpengine.dll
2010-10-27 17:14:29 1927680 ----a-w- C:\Windows\System32\gameux.dll
2010-10-27 17:14:29 1696256 ----a-w- C:\Windows\SysWow64\gameux.dll
2010-10-27 17:14:26 32256 ----a-w- C:\Windows\System32\Apphlpdm.dll
2010-10-27 17:14:26 28672 ----a-w- C:\Windows\SysWow64\Apphlpdm.dll
2010-10-27 17:14:24 4240384 ----a-w- C:\Windows\SysWow64\GameUXLegacyGDFs.dll
2010-10-27 17:14:23 4240384 ----a-w- C:\Windows\System32\GameUXLegacyGDFs.dll
2010-10-21 01:36:44 -------- d-----w- C:\Windows\en
2010-10-21 00:27:54 469256 ----a-w- C:\Program Files (x86)\Common Files\Windows Live\.cache\cba876d71cb70b62d\InstallManager_WLE_WLE.exe
2010-10-21 00:27:24 15712 ----a-w- C:\Program Files (x86)\Common Files\Windows Live\.cache\bb6f05971cb70b621\MeshBetaRemover.exe
2010-10-21 00:26:56 94040 ----a-w- C:\Program Files (x86)\Common Files\Windows Live\.cache\aac9da371cb70b61a\DSETUP.dll
2010-10-21 00:26:56 525656 ----a-w- C:\Program Files (x86)\Common Files\Windows Live\.cache\aac9da371cb70b61a\DXSETUP.exe
2010-10-21 00:26:56 1691480 ----a-w- C:\Program Files (x86)\Common Files\Windows Live\.cache\aac9da371cb70b61a\dsetup32.dll
2010-10-21 00:26:55 525656 ----a-w- C:\Program Files (x86)\Common Files\Windows Live\.cache\a7f165d71cb70b619\DXSETUP.exe
2010-10-21 00:26:55 1691480 ----a-w- C:\Program Files (x86)\Common Files\Windows Live\.cache\a7f165d71cb70b619\dsetup32.dll
2010-10-21 00:26:54 94040 ----a-w- C:\Program Files (x86)\Common Files\Windows Live\.cache\a7f165d71cb70b619\DSETUP.dll
2010-10-21 00:25:47 -------- d-----w- C:\Users\Owner\AppData\Local\Windows Live
2010-10-21 00:24:48 754688 ----a-w- C:\Windows\SysWow64\webservices.dll
2010-10-21 00:24:48 1103872 ----a-w- C:\Windows\System32\webservices.dll
2010-10-20 08:34:28 57752 ----a-w- C:\Windows\SysWow64\rpcnet.dll
2010-10-20 08:34:28 57752 ------w- C:\Windows\SysWow64\rpcnet.exe
2010-10-20 08:16:53 17408 ----a-w- C:\Windows\SysWow64\rpcnetp.dll
2010-10-20 08:15:54 17408 ----a-w- C:\Windows\SysWow64\rpcnetp.exe
2010-10-16 19:25:41 -------- d-----r- C:\Program Files (x86)\Skype
2010-10-13 21:11:15 451584 ----a-w- C:\Windows\System32\drivers\srv.sys
2010-10-13 21:11:15 179712 ----a-w- C:\Windows\System32\srvsvc.dll
2010-10-13 21:11:15 145920 ----a-w- C:\Windows\System32\drivers\srvnet.sys
2010-10-13 21:11:14 175104 ----a-w- C:\Windows\System32\drivers\srv2.sys
2010-10-13 21:11:13 9728 ----a-w- C:\Windows\SysWow64\sscore.dll
2010-10-13 21:11:13 12288 ----a-w- C:\Windows\System32\sscore.dll
2010-10-13 21:11:12 17920 ----a-w- C:\Windows\SysWow64\netevent.dll
2010-10-13 21:11:12 17920 ----a-w- C:\Windows\System32\netevent.dll
2010-10-13 21:11:05 343040 ----a-w- C:\Windows\System32\schannel.dll
2010-10-13 21:11:05 274944 ----a-w- C:\Windows\SysWow64\schannel.dll
2010-10-13 21:11:02 867328 ----a-w- C:\Windows\SysWow64\wmpmde.dll
2010-10-13 21:11:02 1090048 ----a-w- C:\Windows\System32\wmpmde.dll

==================== Find3M ====================

2010-11-09 16:36:54 17408 ----a-w- C:\Windows\System32\rpcnetp.exe
2010-11-04 05:03:04 45056 ----a-w- C:\Windows\System32\acovcnt.exe
2010-10-20 08:38:50 87456 ----a-w- C:\Windows\System32\LMIRfsClientNP.dll
2010-10-20 08:38:50 80768 ----a-w- C:\Windows\System32\LMIinit.dll
2010-10-20 08:38:50 33152 ----a-w- C:\Windows\System32\LMIport.dll
2010-10-19 18:41:44 270720 ------w- C:\Windows\System32\MpSigStub.exe
2010-10-12 06:10:06 44544 ----a-w- C:\Windows\SysWow64\agremove.exe
2010-09-23 07:32:56 301936 ----a-w- C:\Windows\WLXPGSS.SCR
2010-09-13 14:32:37 8147968 ----a-w- C:\Windows\System32\wmploc.DLL
2010-09-13 13:56:41 8147456 ----a-w- C:\Windows\SysWow64\wmploc.DLL
2010-09-08 06:41:05 1147904 ----a-w- C:\Windows\System32\wininet.dll
2010-09-08 06:36:53 56832 ----a-w- C:\Windows\System32\licmgr10.dll
2010-09-08 06:36:38 1538560 ----a-w- C:\Windows\System32\inetcpl.cpl
2010-09-08 06:36:24 132096 ----a-w- C:\Windows\System32\iesysprep.dll
2010-09-08 06:36:23 77312 ----a-w- C:\Windows\System32\iesetup.dll
2010-09-08 06:01:28 916480 ----a-w- C:\Windows\SysWow64\wininet.dll
2010-09-08 05:57:18 43520 ----a-w- C:\Windows\SysWow64\licmgr10.dll
2010-09-08 05:57:05 1469440 ----a-w- C:\Windows\SysWow64\inetcpl.cpl
2010-09-08 05:56:53 71680 ----a-w- C:\Windows\SysWow64\iesetup.dll
2010-09-08 05:56:53 109056 ----a-w- C:\Windows\SysWow64\iesysprep.dll
2010-09-08 05:36:07 479232 ----a-w- C:\Windows\System32\html.iec
2010-09-08 05:04:36 385024 ----a-w- C:\Windows\SysWow64\html.iec
2010-09-08 04:51:18 162816 ----a-w- C:\Windows\System32\ieUnatt.exe
2010-09-08 04:49:56 1638912 ----a-w- C:\Windows\System32\mshtml.tlb
2010-09-08 04:26:46 133632 ----a-w- C:\Windows\SysWow64\ieUnatt.exe
2010-09-08 04:25:15 1638912 ----a-w- C:\Windows\SysWow64\mshtml.tlb
2010-09-07 15:12:17 38848 ----a-w- C:\Windows\avastSS.scr
2010-09-07 14:47:33 61008 ----a-w- C:\Windows\System32\drivers\aswMonFlt.sys
2010-08-31 17:27:07 633856 ----a-w- C:\Windows\System32\comctl32.dll
2010-08-31 15:46:37 954752 ----a-w- C:\Windows\SysWow64\mfc40.dll
2010-08-31 15:46:37 954288 ----a-w- C:\Windows\SysWow64\mfc40u.dll
2010-08-31 15:44:31 531968 ----a-w- C:\Windows\SysWow64\comctl32.dll
2010-08-31 14:57:39 2753024 ----a-w- C:\Windows\System32\win32k.sys
2010-08-26 17:46:52 189952 ----a-w- C:\Windows\System32\t2embed.dll
2010-08-26 17:40:08 100352 ----a-w- C:\Windows\apppatch\AppPatch64\acspecfc.dll
2010-08-26 17:40:07 331776 ----a-w- C:\Windows\apppatch\AppPatch64\AcLayers.dll
2010-08-26 17:40:07 284672 ----a-w- C:\Windows\apppatch\AppPatch64\AcGenral.dll
2010-08-26 16:37:45 157184 ----a-w- C:\Windows\SysWow64\t2embed.dll
2010-08-26 16:33:06 173056 ----a-w- C:\Windows\apppatch\AcXtrnal.dll
2010-08-26 16:33:04 542720 ----a-w- C:\Windows\apppatch\AcLayers.dll
2010-08-26 16:33:04 458752 ----a-w- C:\Windows\apppatch\AcSpecfc.dll
2010-08-26 16:33:04 2159616 ----a-w- C:\Windows\apppatch\AcGenral.dll
2010-08-17 14:54:20 273920 ----a-w- C:\Windows\System32\spoolsv.exe

============= FINISH: 10:49:11.43 ===============

GMER 1.0.15.15530 - http://www.gmer.net
Rootkit scan 2010-11-09 11:34:49
Windows 6.0.6002 Service Pack 2
Running: nzx9r35v.exe


---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\001f81000250
Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\001f81000250@001fcc102467 0xC6 0xA0 0xE8 0xB2 ...
Reg HKLM\SYSTEM\ControlSet002\Services\BTHPORT\Parameters\Keys\001f81000250 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\BTHPORT\Parameters\Keys\001f81000250@001fcc102467 0xC6 0xA0 0xE8 0xB2 ...
Reg HKLM\SYSTEM\ControlSet003\Services\BTHPORT\Parameters\Keys\001f81000250 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\BTHPORT\Parameters\Keys\001f81000250@001fcc102467 0xC6 0xA0 0xE8 0xB2 ...
Reg HKLM\SYSTEM\ControlSet004\Services\BTHPORT\Parameters\Keys\001f81000250 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet004\Services\BTHPORT\Parameters\Keys\001f81000250@001fcc102467 0xC6 0xA0 0xE8 0xB2 ...
Reg HKLM\SYSTEM\ControlSet005\Services\BTHPORT\Parameters\Keys\001f81000250 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet005\Services\BTHPORT\Parameters\Keys\001f81000250@001fcc102467 0xC6 0xA0 0xE8 0xB2 ...
Reg HKLM\SYSTEM\ControlSet006\Services\BTHPORT\Parameters\Keys\001f81000250 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet006\Services\BTHPORT\Parameters\Keys\001f81000250@001fcc102467 0xC6 0xA0 0xE8 0xB2 ...
Reg HKLM\SYSTEM\ControlSet007\Services\BTHPORT\Parameters\Keys\001f81000250 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet007\Services\BTHPORT\Parameters\Keys\001f81000250@001fcc102467 0xC6 0xA0 0xE8 0xB2 ...

---- Files - GMER 1.0.15 ----

File C:\ADSM_PData_0150 0 bytes
File C:\ADSM_PData_0150\DB 0 bytes
File C:\ADSM_PData_0150\DB\SI.db 624 bytes
File C:\ADSM_PData_0150\DB\UL.db 16 bytes
File C:\ADSM_PData_0150\DB\VL.db 16 bytes
File C:\ADSM_PData_0150\DB\WAL.db 2048 bytes
File C:\ADSM_PData_0150\DB\_avt 512 bytes
File C:\ADSM_PData_0150\DragWait.exe 315392 bytes executable
File C:\ADSM_PData_0150\_avt 512 bytes
File C:\Program Files\ASUS\ASUS Data Security Manager\driver\x64 0 bytes
File C:\Program Files\ASUS\ASUS Data Security Manager\driver\x64\AsDsm.sys 34872 bytes executable
File C:\Program Files\ASUS\ASUS Data Security Manager\driver\x64\_avt 512 bytes

---- EOF - GMER 1.0.15 ----

#4 piklits

piklits
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 PM

Posted 09 November 2010 - 01:44 PM

Also Defogger did not ask me to reboot, sorry for the 2nd post.

#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:24 AM

Posted 09 November 2010 - 06:59 PM

Your PC logs look fine.

Please run MBAM and SAS to take a quick look

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


And

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

I can't see there being much wrong with these.
Posted Image
m0le is a proud member of UNITE

#6 piklits

piklits
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 PM

Posted 13 November 2010 - 12:55 PM

Did both scans and they are posted below. Sorry it took me a little bit to get back to you, but I do appreciate the speedy reply. Also, you never did clarify if I can Re-enable the CD Emulator Drivers that the Defogger application disabled.


Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 5104

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18975

11/13/2010 12:32:51 AM
mbam-log-2010-11-13 (00-32-51).txt

Scan type: Full scan (C:\|)
Objects scanned: 298689
Time elapsed: 58 minute(s), 23 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)






SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 11/13/2010 at 03:41 AM

Application Version : 4.45.1000

Core Rules Database Version : 5856
Trace Rules Database Version: 3668

Scan type : Complete Scan
Total Scan Time : 02:56:13

Memory items scanned : 661
Memory threats detected : 0
Registry items scanned : 15773
Registry threats detected : 0
File items scanned : 159590
File threats detected : 292

Adware.Tracking Cookie
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.undertone[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@rev.remnantmedianetwork[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adlegend[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@verbatim.rotator.hadj7.adjuggler[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adserver.adtechus[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@collective-media[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@yieldmanager[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@invitemedia[2].txt
.bs.serving-sys.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.adlegend.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.tribalfusion.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.apmebf.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.mediaplex.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.mediaplex.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.bs.serving-sys.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.content.yieldmanager.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.content.yieldmanager.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.specificclick.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.doubleclick.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.eyewonder.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.insightexpressai.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.adecn.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.pointroll.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.pointroll.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Cookies ]
cdn.insights.gravity.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
cdn4.specificclick.net [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
cdn5.specificclick.net [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
convoad.technoratimedia.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
core.insightexpressai.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
crackle.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
ds.serving-sys.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
ec.atdmt.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
i.adultswim.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
m1.2mdn.net [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
media.mtvnservices.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
media.nintendo.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
media.scanscout.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
media1.break.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
naiadsystems.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
objects.tremormedia.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
s0.2mdn.net [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
secure-us.imrworldwide.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
serving-sys.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
static.2mdn.net [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
udn.specificclick.net [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
us.media.blizzard.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
video.redorbit.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
www.crackle.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
www.pornhub.com [ C:\Users\Owner\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\894LM5TC ]
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@247realmedia[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@2o7[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@99counters[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@a1.interclick[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@account.live[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ad.admogulmedia[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ad.burstdirectads[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ad.yieldmanager[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ad2.doublepimp[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@adbrite[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@adbureau[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@adlegend[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.4shared[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.ad4game[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.addynamix[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.adultadvertising[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.adultswim[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.audxch[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.bridgetrack[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.contactmusic[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.eyecuedigital[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.financialcontent[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.fulldls[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.gamersmedia[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.infinisource[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.ookla[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.pointroll[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.simonandschuster[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.sumotorrent[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ads.undertone[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@adserver.adreactor[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@adserver.adtechus[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@adserving.contextualmarketplace[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@adultswim[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@advertising[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@adviva[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@americafirstcreditunion.122.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@apmebf[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@at.atwola[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@atdmt[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@atdmt[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@atlas.entrepreneur[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@banners.blackberryinsight[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@blackberryinsight[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@bluestreak[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@bonneville.112.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@bs.serving-sys[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@bucksbanner961[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@burstbeacon[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@burstnet[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@buycom.122.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@buycom.db.advertising[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@casalemedia[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@cdn4.specificclick[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@cgm.adbureau[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@chitika[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@click.cashengines[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@clicksor[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@clicktorrent[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@collective-media[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@content.yieldmanager[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@content.yieldmanager[3].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@crackberry[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@crackle[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@d.precisionadnetwork[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@dc.tremormedia[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@densebanner335[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@divx.112.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@dmtracker[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@doubleclick[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@doubleclick[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@draftfcb.112.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@e-2dj6whk4ohd5abo.stats.esomniture[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@e-2dj6whlowgcjihp.stats.esomniture[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@eaeacom.112.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@eas.apm.emediate[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@edge.ru4[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ehg-artnetworldwide.hitbox[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ehg-researchinmotion.hitbox[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ehg-verizon.hitbox[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@electronicarts.112.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@entrepreneur.122.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ext-us.bestofmedia[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@eyewonder[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@fastclick[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@forums.crackberry[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@goodyeartires.122.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@great-warez[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@hitbox[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@homestore.122.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ice.112.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ie-stat.bmmetrix[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@imrworldwide[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@insightexpressai[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@interclick[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@intermundomedia[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@invitemedia[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@kontera[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@largebanner360[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@lucidmedia[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@media.adfrontiers[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@media.adrevolver[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@media.photobucket[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@media.samuraimediagroup[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@media6degrees[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@mediafire[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@mediaplex[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@mediatraffic[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@microsoftgamestudio.112.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@microsoftinternetexplorer.112.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@moneybanner728[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@movieticketscom.122.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@msnaccountservices.112.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@myroitracking[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@naiadsystems[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@network.realmedia[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@nextag[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@oasn03.247realmedia[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@oasn04.247realmedia[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@optimize.indieclick[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@peer2.122.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@pointroll[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@pornhublive[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@pornhub[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@pro-market[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@qnsr[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@questionmarket[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@realmedia[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@revenue[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@revsci[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@revsci[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@richmedia.yahoo[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@rotator.adjuggler[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@rotator.adjuggler[3].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@rotator.hadj7.adjuggler[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@ru4[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@sales.liveperson[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@sales.liveperson[3].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@sales.liveperson[4].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@sales.liveperson[5].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@sales.liveperson[6].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@server.iad.liveperson[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@server.iad.liveperson[3].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@serving-sys[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@sexetc[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@sixapart.adbureau[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@slaysbanner691[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@smartadserver[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@socialmedia[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@specificclick[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@specificmedia[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@statcounter[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@stats.adbrite[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@stats.gamestop[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@tacoda[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@track.bestbuy[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@tracking.keywordmax[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@tracking.realtor[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@tradedoubler[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@traffic.buyservices[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@trafficmp[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@tribalfusion[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@videoegg.adbureau[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@webcastr.122.2o7[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www.adultadvertising[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www.blackberryinsight[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www.burstbeacon[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www.crackserialcodes[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www.downloadserialcrack[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www.googleadservices[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www.googleadservices[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www.googleadservices[7].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www.pornhublive[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www.pornhub[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www7.addfreestats[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@www8.addfreestats[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@xiti[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@yadro[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\Low\owner@zedo[2].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad.yieldmanager[1].txt
C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@smartadserver[1].txt

#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:24 AM

Posted 13 November 2010 - 04:36 PM

You can enable the emulation after I give the all clear. :)

Please run one more scan, with ESET, and we should be good to go to that all clear

  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Leave the top box checked and then check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#8 piklits

piklits
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 PM

Posted 14 November 2010 - 04:11 PM

looks like some trojans actually.



C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\12\1dd6a40c-593a799b multiple threats
C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\7bb99554-65628c10 probably a variant of Win32/Agent.DYXWUMY trojan
C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29\7adbb65d-2a34e6af multiple threats
C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43\556445eb-4b41bd3c probably a variant of Win32/Agent.DYXWUMY trojan
C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44\5473416c-2ba4956c multiple threats
C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\49\1eff1eb1-2ecbc230 probably a variant of Win32/Agent.DYXWUMY trojan
C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\e649f74-2bdb413e multiple threats
C:\Users\Owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\58\fa8f07a-49c02786 probably a variant of Win32/Agent.DYXWUMY trojan

#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:24 AM

Posted 14 November 2010 - 05:22 PM

All trojans but all in the Java cache. They are copies of the virus which Java has copied. They are actually not live malware and ESET has removed them anyway :)

How's the PC running now?
Posted Image
m0le is a proud member of UNITE

#10 piklits

piklits
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 PM

Posted 14 November 2010 - 05:36 PM

Actually I never really had a problem in the first place, my initial post was based off of application called 'Advanced System Care Free' and under a scan called 'Security Analyzer', it usually reported back no problems, but back when I posted this thread, it had a 'suggestions...' in place of the 'no problems' that usually popped up. The application then told me to create a HiJack This! log and post it on this website, but if you have the okay that nothing is wrong, then I see no reason to fret.

On that EST program that you told me to run, the instructions asked me to not check the 'remove found threats' box, so how should I proceed to get those Trojan images off my computer?

#11 piklits

piklits
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 PM

Posted 14 November 2010 - 05:38 PM

I'm sorry, I just went back and reread the instructions and it told me to leave the box checked.
Should I run another scan and leave the box checked this time?

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:24 AM

Posted 14 November 2010 - 05:52 PM

Yes. :)
Posted Image
m0le is a proud member of UNITE

#13 piklits

piklits
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 PM

Posted 14 November 2010 - 07:28 PM

threats found and cleaned. seem to be good now.

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:24 AM

Posted 14 November 2010 - 08:56 PM

:thumbup2:

Let's clear up and clear out

You're clean. Good stuff! :thumbup2:

Let's do some clearing up

We Need to Clean Up our Mess
Download and Run OTC

We will now remove the tools we used during this fix using OTC.

  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Use and update your AntiVirus Software

You must have a good antivirus. There are plenty to choose from but I personally recommend the free options of Avast and Avira Antivir. If you want to purchase a security program then I recommend any of the following: AVG, Norton, McAfee, Kaspersky and ESET Nod32.

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

Use this next program to check for updates for programs already on your system. Download Security Check by screen317 from here or here.

  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically, make sure that updates on any that are flagged are carried out as soon as possible

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it piklits, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:24 AM

Posted 21 November 2010 - 11:41 AM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. :)

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users