Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Not really sure what I've got.


  • Please log in to reply
22 replies to this topic

#1 lestat5891

lestat5891

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 28 July 2011 - 07:21 AM

Good morning/afternoon/evening to all! I've had some luck in getting rid of some malware on my old desktop, and I seem to have been infected with something again. I have 2 Malwarebytes logs. I first thought something was wrong when I was getting redirects from Google to advertisment webpages on the 21st. I ran MBAM and it found some infected items, which were fixed by MBAM. Once MBAM finished, I noticed that I did not appear to be suffering from any type of malware. Today, I tried to log into my facebook account and my Norton popped up with a trojan horse detected and blocked. Restarted my computer and figured that I'd run MBAM while I showered. In the time it took me to shower, I came back and saw that there were 4 objects located. These were dealt with by MBAM with a restart. I had the presence of mind to save the log to the desktop for ease of access. Please note that the Trojan.BHO detection on the scan on the 21st is similarly titled to the IPH.Generic.BHO found on the scan today. Well enough with the story; the logs are color coded for days. Red for the 21st, and blue for the 28th.

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7217

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.19088

7/21/2011 8:20:16 AM
mbam-log-2011-07-21 (08-20-16).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 650644
Time elapsed: 4 hour(s), 15 minute(s), 11 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\.fsharproj (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer (PUM.Bad.Proxy) -> Value: ProxyServer -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


And the 28th

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7308

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.19088

7/28/2011 7:40:05 AM
mbam-log-2011-07-28 (07-39-50).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 51331
Time elapsed: 8 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{1755450F-FCE3-4E8E-ACF5-DE1CFD0F20B1} (IPH.GenericBHO) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1755450F-FCE3-4E8E-ACF5-DE1CFD0F20B1} (IPH.GenericBHO) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1755450F-FCE3-4E8E-ACF5-DE1CFD0F20B1} (IPH.GenericBHO) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Windows\SysWOW64\audioses32.dll (IPH.GenericBHO) -> No action taken.


Any help would be appreciated!

Edit: Norton claims to have fully removed the infected material, however; I am currently running another MBAM full scan. I will post the results in a reply (May not be until later today as I usually run my scans while I sleep - they usually take a few hours).

Edited by lestat5891, 28 July 2011 - 07:38 AM.


BC AdBot (Login to Remove)

 


#2 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:08:21 AM

Posted 28 July 2011 - 09:10 AM

Hi lestat5891,

:welcome: to Bleeping Computer.

My name is Jason and I'll be helping you with your computer problems. You can call me by my screename jntkwx or Jason is fine.

Some things to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • Please do not attach logs or put logs in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can also help.
  • Do not run anything while running a fix.
  • If you don't understand a step, please ask for clarification before continuing with any future steps.

Click on the Watch Topic button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Note to others: The instructions here are intended for the person who began this topic. If you need help, please create your own topic in the appropriate forum.

 

:step1: Please post the full MBAM scan results.

:step2: Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer Log Errors
  • List Installed Programs
  • List Users, Partitions and Memory size
Click Go . Please put code boxes around just this log, like this, but without the x: [xcode] MiniToolBox log [/xcode]

:step3: Superantisypware (SAS):

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from http://www.superantispyware.com/downloads/SASDEFINITIONS.EXE (copy and paste that website address) and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a USB drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.

:step4: Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.


In your next reply, please include:
  • MBAM log
  • MiniToolBox log
  • SuperAntiSpyware log
  • GMER log
  • How's the computer running now? Please provide a detailed description any remaining problems, detailed word-for-word error messages that you are receiving, and/or screenshots of strange behavior.

Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#3 lestat5891

lestat5891
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 28 July 2011 - 04:50 PM

Jason, I would like you to know I am going to be working tonight and will be unable to complete all the steps this afternoon. Please bear with me and I'll have all your logs and steps followed when I get home.

#4 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:08:21 AM

Posted 28 July 2011 - 05:00 PM

Jason, I would like you to know I am going to be working tonight and will be unable to complete all the steps this afternoon. Please bear with me and I'll have all your logs and steps followed when I get home.

:thumbup2: Sounds good. In the meantime, please shutdown the infected computer to prevent getting more malware.
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#5 lestat5891

lestat5891
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 29 July 2011 - 06:55 AM

Jason, an update: finished work. Unfortunately I left the house before I read your post. Tried to get the wife to turn it off but she forgot, it seems. I'm running the superantispyware program as I type this (from my phone). I have a lot of programs installed but nothing out of the ordinary (at least that I can see). Anyway I'll post another update when I finish all the steps!

Thanks again for your help. This was irritating me as I hate getting redirects. After the mbam scan/clean I didn't experience any symptoms but I think whatever infection this is got rooted and wasn't totally wiped out with the scan. I would bet that whatever was left lingered and reconstituted and resurfaced.

I had a ton of luck with this site before with a nasty virtumonde infection on my old machine that basically hijacked my IE, so I have a lot of faith.

Anyway, just wanted to let you know I was still here and running through the steps. Sorry about the wait!

#6 lestat5891

lestat5891
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 29 July 2011 - 07:41 PM

This will be a doozy of a post.
Is it normal for GMER to produce a blank log? It didn't find anything.

As far as symptoms: I haven't noticed any as of yet. Will reply if I find more.

MBAM
Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7308

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.19088

7/28/2011 5:44:38 PM
mbam-log-2011-07-28 (17-44-14).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 674934
Time elapsed: 3 hour(s), 13 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\.fsharproj (Trojan.BHO) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Minitoolbox:
MiniToolBox by Farbar 
Ran by Glenn (administrator) on 29-07-2011 at 07:32:46
Windows (TM) Vista Home Premium Service Pack 2 (X64)

***************************************************************************

========================= IE Proxy Settings: ============================== 

Proxy is not enabled.
No Proxy Server is set.
========================= Hosts content: =================================

::1             localhost

127.0.0.1       localhost

========================= IP Configuration: ================================

# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration



Windows IP Configuration

   Host Name . . . . . . . . . . . . : Glenn-PC
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Unknown
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : NVIDIA nForce 10/100/1000 Mbps Ethernet 
   Physical Address. . . . . . . . . : 00-22-19-28-01-6E
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::8586:3e28:1c78:dc2c%11(Preferred) 
   IPv4 Address. . . . . . . . . . . : 192.168.1.2(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Thursday, July 28, 2011 7:42:56 AM
   Lease Expires . . . . . . . . . . : Friday, July 29, 2011 7:42:56 PM
   Default Gateway . . . . . . . . . : 192.168.1.1
   DHCP Server . . . . . . . . . . . : 192.168.1.1
   DHCPv6 IAID . . . . . . . . . . . : 251666969
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-11-37-46-3C-00-22-19-28-01-6E
   DNS Servers . . . . . . . . . . . : 192.168.1.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter Local Area Connection* 6:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : isatap.{DC3BFF9D-8E45-4759-BA96-893D22CA1F6D}
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 7:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 02-00-54-55-4E-01
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
Server:  UnKnown
Address:  192.168.1.1

Name:    google.com
Addresses:  74.125.115.103
	  74.125.115.104
	  74.125.115.105
	  74.125.115.106
	  74.125.115.147
	  74.125.115.99



Pinging google.com [74.125.115.147] with 32 bytes of data:

Reply from 74.125.115.147: bytes=32 time=31ms TTL=52

Reply from 74.125.115.147: bytes=32 time=31ms TTL=52



Ping statistics for 74.125.115.147:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 31ms, Maximum = 31ms, Average = 31ms

Server:  UnKnown
Address:  192.168.1.1

Name:    yahoo.com
Addresses:  98.137.149.56
	  209.191.122.70
	  67.195.160.76
	  69.147.125.65
	  72.30.2.43



Pinging yahoo.com [209.191.122.70] with 32 bytes of data:

Reply from 209.191.122.70: bytes=32 time=40ms TTL=53

Reply from 209.191.122.70: bytes=32 time=41ms TTL=53



Ping statistics for 209.191.122.70:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 40ms, Maximum = 41ms, Average = 40ms



Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
 11 ...00 22 19 28 01 6e ...... NVIDIA nForce 10/100/1000 Mbps Ethernet 
  1 ........................... Software Loopback Interface 1
 12 ...00 00 00 00 00 00 00 e0  isatap.{DC3BFF9D-8E45-4759-BA96-893D22CA1F6D}
 10 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.1.1      192.168.1.2     10
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      192.168.1.0    255.255.255.0         On-link       192.168.1.2    266
      192.168.1.2  255.255.255.255         On-link       192.168.1.2    266
    192.168.1.255  255.255.255.255         On-link       192.168.1.2    266
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link       192.168.1.2    266
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link       192.168.1.2    266
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    306 ::1/128                  On-link
 11    266 fe80::/64                On-link
 11    266 fe80::8586:3e28:1c78:dc2c/128
                                    On-link
  1    306 ff00::/8                 On-link
 11    266 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/28/2011 09:14:45 AM) (Source: Application Error) (User: )
Description: Faulting application hl2.exe, version 0.0.0.0, time stamp 0x4e2f7be8, faulting module filesystem_steam.dll_unloaded, version 0.0.0.0, time stamp 0x4e2f7c3e, exception code 0xc0000005, fault offset 0x7094e649,
process id 0x13a4, application start time 0xhl2.exe0.

Error: (07/28/2011 08:45:22 AM) (Source: Perflib) (User: )
Description: WmiApRplC:\Windows\system32\wbem\wmiaprpl.dll8

Error: (07/28/2011 08:45:19 AM) (Source: Perflib) (User: )
Description: PolicyAgent

Error: (07/28/2011 08:45:19 AM) (Source: Perflib) (User: )
Description: OpenIPSecPerformanceDataC:\Windows\System32\ipsecsvc.dllPolicyAgent8

Error: (07/28/2011 08:45:19 AM) (Source: Perflib) (User: )
Description: PNRPsvcC:\Windows\system32\pnrpperf.dll8

Error: (07/28/2011 08:45:16 AM) (Source: Perflib) (User: )
Description: MSDTCC:\Windows\system32\msdtcuiu.DLL8

Error: (07/28/2011 08:45:15 AM) (Source: Perflib) (User: )
Description: LsaC:\Windows\system32\Secur32.dll8

Error: (07/28/2011 08:45:15 AM) (Source: Perflib) (User: )
Description: ESENTC:\Windows\system32\esentprf.dll8

Error: (07/28/2011 08:45:15 AM) (Source: Perflib) (User: )
Description: EmdCacheC:\Windows\system32\emdmgmt.dll8

Error: (07/28/2011 08:45:15 AM) (Source: Perflib) (User: )
Description: BITSC:\Windows\system32\bitsperf.dll8


System errors:
=============
Error: (07/28/2011 07:51:28 AM) (Source: Service Control Manager) (User: )
Description: Windows Update

Error: (07/28/2011 07:44:03 AM) (Source: Service Control Manager) (User: )
Description: 30000Advanced Networking Service

Error: (07/28/2011 07:36:44 AM) (Source: netbt) (User: )
Description: The name "WORKGROUP      :1d" could not be registered on the interface with IP address 192.168.1.2.
The computer with the IP address 192.168.1.1 did not allow the name to be claimed by
this computer.

Error: (07/28/2011 07:31:34 AM) (Source: netbt) (User: )
Description: The name "WORKGROUP      :1d" could not be registered on the interface with IP address 192.168.1.2.
The computer with the IP address 192.168.1.1 did not allow the name to be claimed by
this computer.

Error: (07/28/2011 07:26:24 AM) (Source: netbt) (User: )
Description: The name "WORKGROUP      :1d" could not be registered on the interface with IP address 192.168.1.2.
The computer with the IP address 192.168.1.1 did not allow the name to be claimed by
this computer.

Error: (07/28/2011 07:23:15 AM) (Source: Service Control Manager) (User: )
Description: Steam Client Service%%1053

Error: (07/28/2011 07:23:15 AM) (Source: Service Control Manager) (User: )
Description: 30000Steam Client Service

Error: (07/28/2011 07:22:23 AM) (Source: Service Control Manager) (User: )
Description: 30000Advanced Networking Service

Error: (07/28/2011 07:21:14 AM) (Source: netbt) (User: )
Description: The name "WORKGROUP      :1d" could not be registered on the interface with IP address 192.168.1.2.
The computer with the IP address 192.168.1.1 did not allow the name to be claimed by
this computer.

Error: (07/28/2011 07:17:29 AM) (Source: Service Control Manager) (User: )
Description: Certificate Propagation 1


Microsoft Office Sessions:
=========================
Error: (07/28/2011 09:14:45 AM) (Source: Application Error)(User: )
Description: hl2.exe0.0.0.04e2f7be8filesystem_steam.dll_unloaded0.0.0.04e2f7c3ec00000057094e64913a401cc4d23f1b93443

Error: (07/28/2011 08:45:22 AM) (Source: Perflib)(User: )
Description: WmiApRplC:\Windows\system32\wbem\wmiaprpl.dll8

Error: (07/28/2011 08:45:19 AM) (Source: Perflib)(User: )
Description: PolicyAgent

Error: (07/28/2011 08:45:19 AM) (Source: Perflib)(User: )
Description: OpenIPSecPerformanceDataC:\Windows\System32\ipsecsvc.dllPolicyAgent8

Error: (07/28/2011 08:45:19 AM) (Source: Perflib)(User: )
Description: PNRPsvcC:\Windows\system32\pnrpperf.dll8

Error: (07/28/2011 08:45:16 AM) (Source: Perflib)(User: )
Description: MSDTCC:\Windows\system32\msdtcuiu.DLL8

Error: (07/28/2011 08:45:15 AM) (Source: Perflib)(User: )
Description: LsaC:\Windows\system32\Secur32.dll8

Error: (07/28/2011 08:45:15 AM) (Source: Perflib)(User: )
Description: ESENTC:\Windows\system32\esentprf.dll8

Error: (07/28/2011 08:45:15 AM) (Source: Perflib)(User: )
Description: EmdCacheC:\Windows\system32\emdmgmt.dll8

Error: (07/28/2011 08:45:15 AM) (Source: Perflib)(User: )
Description: BITSC:\Windows\system32\bitsperf.dll8


=========================== Installed Programs ============================

Abacast Distributed On-Demand
Acrobat.com (Version: 0.0.0)
Acrobat.com (Version: 1.1.377)
Adobe AIR (Version: 1.0.4990)
Adobe AIR (Version: 1.0.8.4990)
Adobe Flash Player 10 ActiveX (Version: 10.3.181.16)
Adobe Reader 9 (Version: 9.0.0)
Aerosoft's - F-16 Fighting Falcon (Version: 1.11)
Aerosoft's - Seahawk & Jayhawk X (Version: 2.11)
AIM 6
Alien Swarm
Aliens vs Predator
Apple Application Support (Version: 1.5.2)
Apple Mobile Device Support (Version: 3.4.1.2)
Apple Software Update (Version: 2.1.3.127)
Black & White® 2 (Version: 1.00.0000)
Bonjour (Version: 2.0.5.0)
Braid
Compatibility Pack for the 2007 Office system (Version: 12.0.6425.1000)
D3DX10 (Version: 15.4.2368.0902)
DC Universe Online
Dell DataSafe Online (Version: 1.1.0023)
Dell Dock (Version: 1.0.0)
Dell Getting Started Guide (Version: 1.00.0000)
Dell Remote Access (Version: 1.0.0.0)
Dell Video Chat (remove only) (Version: 6.0 (6551))
Doom II
Download Manager 2.3.9 (Version: 2.3.9)
EA Download Manager (Version: 5.0.0.288)
Empire: Total War
EQ2MAP Updater 1.2.4 (Version: 1.2.4)
Everquest II: Sentinel's Fate
EverQuest II: The Shadow Odyssey (Version: 1.00.000)
Flight Simulator X Service Pack 1
GameSpy Arcade
GameSpy Comrade (Version: 1.5.0.156)
Garry's Mod
Google Toolbar for Internet Explorer (Version: 1.0.0)
Google Toolbar for Internet Explorer (Version: 7.0.1710.2246)
Google Update Helper (Version: 1.3.21.57)
iPhone Configuration Utility (Version: 2.1.0.163)
iTunes (Version: 10.3.1.55)
Java(TM) 6 Update 11 (Version: 6.0.110)
Junk Mail filter update (Version: 15.4.3502.0922)
Left 4 Dead
Left 4 Dead 2
Left 4 Dead 2 Add-on Support
Left 4 Dead 2 Authoring Tools
Left 4 Dead Authoring Tools
Malwarebytes' Anti-Malware version 1.51.1.1800 (Version: 1.51.1.1800)
Medal of Honor Beta
Microsoft .NET Framework 1.1 (Version: 1.1.4322)
Microsoft .NET Framework 1.1 Security Update (KB2416447)
Microsoft .NET Framework 1.1 Security Update (KB979906)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft Application Error Reporting (Version: 12.0.6015.5000)
Microsoft Flight Simulator X (Version: 10.0.60905)
Microsoft Flight Simulator X: Acceleration (Version: 10.0.61637.0)
Microsoft Office PowerPoint Viewer 2007 (English) (Version: 12.0.6425.1000)
Microsoft Search Enhancement Pack (Version: 3.0.133.0)
Microsoft Silverlight (Version: 4.0.60531.0)
Microsoft SQL Server 2005 Compact Edition [ENU] (Version: 3.1.0000)
Microsoft VC9 runtime libraries (Version: 1.0.0)
Microsoft Visual C++ 2005 ATL Update kb973923 - x64 8.0.50727.4053 (Version: 8.0.50727.4053)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.61001)
Microsoft Visual C++ 2005 Redistributable (x64) (Version: 8.0.56336)
Microsoft Visual C++ 2005 Redistributable (x64) (Version: 8.0.61000)
Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 (Version: 9.0.21022)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.30319 (Version: 10.0.30319)
Microsoft Works (Version: 9.7.0621)
Microsoft WSE 3.0 Runtime (Version: 3.0.5305.0)
MobileMe Control Panel (Version: 3.1.5.0)
MSVCRT (Version: 15.4.2862.0708)
MSVCRT_amd64 (Version: 15.4.2862.0708)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
MSXML 4.0 SP2 Parser and SDK (Version: 4.20.9818.0)
NCsoft Launcher (Version: 1.5.6001)
Norton Internet Security (Version: 16.8.0.41)
NVIDIA 3D Vision Controller Driver (Version: 275.33)
NVIDIA 3D Vision Controller Driver 275.33 (Version: 275.33)
NVIDIA 3D Vision Driver 275.33 (Version: 275.33)
NVIDIA Control Panel 275.33 (Version: 275.33)
NVIDIA Drivers (Version: 1.10.62.40)
NVIDIA Graphics Driver 275.33 (Version: 275.33)
NVIDIA Install Application (Version: 2.275.80.0)
NVIDIA PhysX (Version: 9.10.0514)
NVIDIA PhysX System Software 9.10.0514 (Version: 9.10.0514)
NVIDIA Stereoscopic 3D Driver (Version: 7.17.12.7533)
NVIDIA Update 1.3.5 (Version: 1.3.5)
NVIDIA Update Components (Version: 1.3.5)
Poker Night at the Inventory
Portal
PunkBuster Services (Version: 0.989)
PVSonyDll (Version: 1.00.0001)
QualXServ Service Agreement (Version: 2.0.0)
QuickTime (Version: 7.69.80.9)
RealPlayer
Realtek High Definition Audio Driver
RIFT (Version: 1.0.0)
Roxio Creator Audio (Version: 3.7.0)
Roxio Creator Copy (Version: 3.7.0)
Roxio Creator Data (Version: 3.7.0)
Roxio Creator DE (Version: 10.1)
Roxio Creator DE (Version: 3.7.0)
Roxio Creator Tools (Version: 3.7.0)
Roxio Express Labeler 3 (Version: 3.2.1)
Roxio Update Manager (Version: 6.0.0)
Safari (Version: 5.33.20.27)
Segoe UI (Version: 15.4.2271.0615)
Shatter
SimCity 4 Deluxe
SimCity™ Societies (Version: 1.0.0.0)
SimCity™ Societies Destinations (Version: 1.0.0.1)
Skype Toolbars (Version: 1.0.4051)
Skype™ 4.2 (Version: 4.2.169)
Source SDK
Source SDK Base
StarCraft II (Version: 1.0.1.16195)
Station Launcher (Version: 1.01.2004)
Steam (Version: 1.0.0.0)
System Requirements Lab
System Requirements Lab (Version: 4.1.14.0)
Team Fortress 2
The Sims™ 3 (Version: 1.0.631)
Update for Microsoft .NET Framework 3.5 SP1 (KB963707) (Version: 1)
Vampire: The Masquerade - Bloodlines
Ventrilo Client (Version: 3.0.5)
Viewpoint Media Player
VTFEdit 1.2.5
Windows Live Communications Platform (Version: 15.4.3502.0922)
Windows Live Essentials (Version: 15.4.3502.0922)
Windows Live Essentials (Version: 15.4.3508.1109)
Windows Live ID Sign-in Assistant (Version: 7.250.4225.0)
Windows Live Installer (Version: 15.4.3502.0922)
Windows Live Language Selector (Version: 15.4.3508.1109)
Windows Live Mail (Version: 15.4.3502.0922)
Windows Live Messenger (Version: 15.4.3502.0922)
Windows Live MIME IFilter (Version: 15.4.3502.0922)
Windows Live Movie Maker (Version: 15.4.3502.0922)
Windows Live Photo Common (Version: 15.4.3502.0922)
Windows Live Photo Gallery (Version: 15.4.3502.0922)
Windows Live PIMT Platform (Version: 15.4.3508.1109)
Windows Live SOXE (Version: 15.4.3502.0922)
Windows Live SOXE Definitions (Version: 15.4.3502.0922)
Windows Live Sync (Version: 14.0.8089.726)
Windows Live UX Platform (Version: 15.4.3502.0922)
Windows Live UX Platform Language Pack (Version: 15.4.3508.1109)
Windows Live Writer (Version: 15.4.3502.0922)
Windows Live Writer Resources (Version: 15.4.3502.0922)
WinRAR archiver
WinZip 14.5 (Version: 14.5.9095)
World of Warcraft (Version: 4.2.0.14333)
World of Warcraft MMO Gaming Mouse (Version: 1.07.0000)
World of Warcraft Public Test (Version: 0.0.0.0)
Yahoo! Messenger
YOU DON'T KNOW JACK

========================= Memory info: ===================================

Percentage of memory in use: 40%
Total physical RAM: 8188.57 MB
Available physical RAM: 4893.23 MB
Total Pagefile: 16494.18 MB
Available Pagefile: 13636.05 MB
Total Virtual: 4095.88 MB
Available Virtual: 4009.85 MB

========================= Partitions: =====================================

1 Drive c: (OS) (Fixed) (Total:929.45 GB) (Free:437.57 GB) NTFS
2 Drive d: (RECOVERY) (Fixed) (Total:2 GB) (Free:1 GB) NTFS

========================= Users: ========================================

User accounts for \\GLENN-PC

Administrator            ASPNET                   Glenn                    
Guest                    UpdatusUser              


== End of log ==

Superantispyware:
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/29/2011 at 01:01 PM

Application Version : 4.55.1000

Core Rules Database Version : 7484
Trace Rules Database Version: 5296

Scan type : Complete Scan
Total Scan Time : 05:20:30

Memory items scanned : 600
Memory threats detected : 0
Registry items scanned : 12058
Registry threats detected : 0
File items scanned : 510500
File threats detected : 49

Adware.Tracking Cookie
.adbureau.net [ C:\Program Files (x86)\Sony\EverQuest II\mozilla\cookies.txt ]
.cgm.adbureau.net [ C:\Program Files (x86)\Sony\EverQuest II\mozilla\cookies.txt ]
.sonyonlineentertainment.112.2o7.net [ C:\Program Files (x86)\Sony\EverQuest II\mozilla\cookies.txt ]
C:\Users\Glenn\AppData\Local\Temp\Cookies\glenn@adecn[1].txt
C:\Users\Glenn\AppData\Local\Temp\Cookies\glenn@atdmt[2].txt
C:\Users\Glenn\AppData\Local\Temp\Cookies\glenn@bs.serving-sys[1].txt
C:\Users\Glenn\AppData\Local\Temp\Cookies\glenn@doubleclick[1].txt
C:\Users\Glenn\AppData\Local\Temp\Cookies\glenn@serving-sys[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@2o7[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@a1.interclick[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@ad.wsod[2].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@ad.yieldmanager[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@adbrite[2].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@adecn[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@ads.egotastic[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@ads.pointroll[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@ads.undertone[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@advertising[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@adxpose[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@apmebf[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@atdmt[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@bs.serving-sys[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@collective-media[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@content.yieldmanager[2].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@content.yieldmanager[3].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@dc.tremormedia[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@doubleclick[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@insightexpressai[2].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@interclick[2].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@invitemedia[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@media6degrees[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@mediabrandsww[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@mediaplex[2].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@msnportal.112.2o7[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@network.realmedia[2].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@overture[2].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@pointroll[2].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@realmedia[2].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@ru4[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@serving-sys[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@specificclick[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@specificmedia[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@tribalfusion[2].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@yieldmanager[1].txt
C:\Users\Glenn\AppData\Local\Temp\Low\Cookies\glenn@zedo[2].txt

Trojan.Agent/Gen-Bancos
C:\USERS\GLENN\APPDATA\LOCAL\TEMP\GM_TTT_47205\GMWDIAG123\WINDOWS_DIALOGS.DLL
C:\USERS\GLENN\APPDATA\LOCAL\TEMP\GM_TTT_67118\GMWDIAG123\WINDOWS_DIALOGS.DLL
C:\USERS\GLENN\APPDATA\LOCAL\TEMP\GM_TTT_68179\GMWDIAG123\WINDOWS_DIALOGS.DLL
C:\USERS\GLENN\APPDATA\LOCAL\TEMP\GM_TTT_78794\GMWDIAG123\WINDOWS_DIALOGS.DLL

Edited by lestat5891, 29 July 2011 - 07:46 PM.


#7 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:08:21 AM

Posted 29 July 2011 - 08:04 PM

Hi lestat5891,

Yes, GMER can sometimes produce a blank log. Try running it again, but unchecking Devices.

:step1: Rerun Malwarebytes
Open Malwarebytes, click on the Update tab, and click the check for Updates button.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

If you have trouble updating, troubleshoot Malwarebytes' Anti-Malware

:step2: Please download SystemLook from one of the links below and save it to your Desktop.

Download

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    :dir
    %windir%\system32 /n*.* /t7
    %temp% /n*.* /t7
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#8 lestat5891

lestat5891
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 29 July 2011 - 08:55 PM

MBAM had a clean scan. I'm way enjoying the time that it took to do the quick scan over the full scan :D. Running GMER again will be my while-I-Sleep task. It even popped up with a window that said it found nothing. Anywho, here's my MBAM log and my SystemLook logs.

MBAM:
Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7308

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.19088

7/29/2011 9:49:47 PM
mbam-log-2011-07-29 (21-49-47).txt

Scan type: Quick scan
Objects scanned: 189650
Time elapsed: 5 minute(s), 8 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Systemlook
SystemLook 04.09.10 by jpshortstuff
Log created at 21:50 on 29/07/2011 by Glenn
Administrator - Elevation successful

========== dir ==========

C:\Windows\system32 - Parameters: "/n*.* /t7"

---Files---
7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0 --ah--- 3616 bytes [15:22 02/11/2006] [00:34 30/07/2011]
7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0 --ah--- 3616 bytes [15:22 02/11/2006] [00:34 30/07/2011]
perfc009.dat --a---- 130970 bytes [12:46 02/11/2006] [22:42 29/07/2011]
perfh009.dat --a---- 666038 bytes [12:46 02/11/2006] [22:42 29/07/2011]
PerfStringBackup.INI --a---- 794806 bytes [12:46 02/11/2006] [22:42 29/07/2011]

---Folders---
0409 d------ [15:15 02/11/2006]
AdvancedInstallers d------ [13:33 02/11/2006]
ar-SA d------ [13:33 02/11/2006]
bg-BG d------ [13:33 02/11/2006]
Boot d------ [13:33 02/11/2006]
Branding d------ [15:15 02/11/2006]
ca-ES d------ [08:19 01/12/2010]
catroot d------ [13:33 02/11/2006]
catroot2 d------ [13:33 02/11/2006]
CodeIntegrity d------ [13:33 02/11/2006]
com d------ [13:33 02/11/2006]
config d------ [13:33 02/11/2006]
cs-CZ d------ [13:33 02/11/2006]
da-DK d------ [13:33 02/11/2006]
de-DE d------ [13:33 02/11/2006]
drivers d------ [13:33 02/11/2006]
DriverStore d------ [13:33 02/11/2006]
DRVSTORE d----c- [16:37 03/03/2009]
el-GR d------ [13:34 02/11/2006]
en d------ [15:15 02/11/2006]
en-US d------ [13:34 02/11/2006]
es-ES d------ [13:34 02/11/2006]
et-EE d------ [13:34 02/11/2006]
eu-ES d------ [08:19 01/12/2010]
EventProviders d------ [22:11 18/07/2010]
fi-FI d------ [13:34 02/11/2006]
fr-FR d------ [13:34 02/11/2006]
GroupPolicy d------ [13:34 02/11/2006]
GroupPolicyUsers d------ [13:34 02/11/2006]
he-IL d------ [13:34 02/11/2006]
hr-HR d------ [13:34 02/11/2006]
hu-HU d------ [13:34 02/11/2006]
ias d------ [13:34 02/11/2006]
icsxml d------ [13:34 02/11/2006]
IME d------ [13:34 02/11/2006]
inetsrv d------ [13:34 02/11/2006]
it-IT d------ [13:34 02/11/2006]
ja-JP d------ [13:34 02/11/2006]
ko-KR d------ [13:34 02/11/2006]
licensing d------ [13:34 02/11/2006]
LogFiles d------ [13:34 02/11/2006]
lt-LT d------ [13:34 02/11/2006]
lv-LV d------ [13:34 02/11/2006]
manifeststore d------ [13:34 02/11/2006]
Microsoft d---s-- [15:21 02/11/2006]
migration d------ [13:34 02/11/2006]
migwiz d------ [13:34 02/11/2006]
Msdtc d------ [13:34 02/11/2006]
MUI d------ [13:34 02/11/2006]
nb-NO d------ [13:34 02/11/2006]
NDF d------ [13:34 02/11/2006]
networklist d------ [13:34 02/11/2006]
nl-NL d------ [13:34 02/11/2006]
oem d------ [01:47 26/02/2009]
oobe d------ [13:34 02/11/2006]
pl-PL d------ [13:34 02/11/2006]
Printing_Admin_Scripts d------ [15:15 02/11/2006]
pt-BR d------ [13:34 02/11/2006]
pt-PT d------ [13:34 02/11/2006]
ras d------ [13:34 02/11/2006]
RemInst d------ [13:34 02/11/2006]
restore d------ [15:07 02/11/2006]
ro-RO d------ [13:34 02/11/2006]
ru-RU d------ [13:34 02/11/2006]
setup d------ [13:34 02/11/2006]
sk-SK d------ [13:34 02/11/2006]
sl-SI d------ [13:34 02/11/2006]
slmgr d------ [15:15 02/11/2006]
SLUI d------ [13:34 02/11/2006]
SMI d------ [13:34 02/11/2006]
Speech d------ [13:34 02/11/2006]
spool d------ [13:34 02/11/2006]
sr-Latn-CS d------ [13:34 02/11/2006]
sv-SE d------ [13:34 02/11/2006]
sysprep d------ [13:34 02/11/2006]
Tasks d------ [13:34 02/11/2006]
th-TH d------ [13:34 02/11/2006]
tr-TR d------ [13:34 02/11/2006]
uk-UA d------ [13:34 02/11/2006]
vi-VN d------ [08:19 01/12/2010]
wbem d------ [13:34 02/11/2006]
WCN d------ [15:15 02/11/2006]
WDI d------ [13:34 02/11/2006]
wfp d------ [13:34 02/11/2006]
winevt d------ [13:34 02/11/2006]
winrm d------ [15:15 02/11/2006]
zh-CN d------ [13:34 02/11/2006]
zh-HK d------ [13:34 02/11/2006]
zh-TW d------ [13:34 02/11/2006]

C:\Users\Glenn\AppData\Local\Temp - Parameters: "/n*.* /t7"

---Files---
EAD5E16.exe --a---- 71680 bytes [11:43 28/07/2011] [11:43 28/07/2011]
EAD5E16.tmp --a---- 0 bytes [11:43 28/07/2011] [11:43 28/07/2011]
EAD626A.exe --a---- 53248 bytes [20:18 26/07/2011] [20:18 26/07/2011]
EAD626A.tmp --a---- 0 bytes [20:18 26/07/2011] [20:18 26/07/2011]
EAD63F0.exe --a---- 206848 bytes [11:21 28/07/2011] [11:21 28/07/2011]
EAD63F0.tmp --a---- 0 bytes [11:21 28/07/2011] [11:21 28/07/2011]
EAD7BB4.exe --a---- 44726104 bytes [22:35 29/07/2011] [22:37 29/07/2011]
EAD7BB4.tmp --a---- 0 bytes [22:35 29/07/2011] [22:35 29/07/2011]
emoticats.bmp --a---- 21176 bytes [04:45 19/10/2009] [20:26 26/07/2011]
Glenn.bmp --a---- 31832 bytes [14:47 03/03/2009] [22:35 29/07/2011]
installerdll196093.dll --a---- 3035456 bytes [21:25 22/07/2011] [21:25 22/07/2011]
java_install_reg.log --a---- 17465 bytes [16:27 12/03/2009] [04:02 27/07/2011]
jinstall.cfg --a---- 1305 bytes [18:39 12/03/2009] [11:27 28/07/2011]
jupdate_d6761a26 --a---- 7805 bytes [11:26 28/07/2011] [11:26 28/07/2011]
jusched.log --a---- 56547 bytes [14:52 03/03/2009] [22:42 29/07/2011]
pgloqpog.sys --a---- 100864 bytes [23:49 29/07/2011] [23:49 29/07/2011]
Setup.exe --a---- 43626016 bytes [21:46 22/07/2011] [21:46 22/07/2011]
thethread.bmp --a---- 21176 bytes [16:50 03/03/2009] [20:26 26/07/2011]
~DF111E.tmp --a---- 147456 bytes [11:27 28/07/2011] [11:27 28/07/2011]
~DF32D7.tmp --a---- 16384 bytes [00:42 30/07/2011] [01:49 30/07/2011]
~DF804A.tmp --a---- 16384 bytes [00:42 30/07/2011] [00:42 30/07/2011]
~DF8A5B.tmp --a---- 32768 bytes [00:42 30/07/2011] [00:49 30/07/2011]
~DFFA14.tmp --a---- 16384 bytes [01:43 30/07/2011] [01:43 30/07/2011]

---Folders---
05312231-00000de8-z2kd8rrlse d------ [02:31 01/06/2011]
05312254-000007b4-6jap978shj d------ [02:54 01/06/2011]
05312305-000007b4-ereiqtezzl d------ [03:05 01/06/2011]
05312306-000007b4-ca3rcr47oa d------ [03:06 01/06/2011]
05312306-000007b4-ecqvenab2n d------ [03:06 01/06/2011]
05312307-000007b4-er5f2iv491 d------ [03:07 01/06/2011]
05312309-00000408-exv0gy822j d------ [03:09 01/06/2011]
05312317-00000408-9uaetbb86e d------ [03:17 01/06/2011]
05312317-00000408-b25t7rb1k6 d------ [03:17 01/06/2011]
05312317-00000408-qlv53caxqq d------ [03:17 01/06/2011]
05312319-00000408-axusdwmjfj d------ [03:19 01/06/2011]
1 d------ [03:11 15/06/2009]
11111230000024d806zkdqfx8e d------ [17:30 11/11/2009]
11111230000024d806zrt2ketm d------ [17:30 11/11/2009]
11111230000024d8tax7tf37b6 d------ [17:30 11/11/2009]
11111231000024d84pf1k1ever d------ [17:31 11/11/2009]
11111231000024d8ci86fy9e50 d------ [17:31 11/11/2009]
11111231000024d8e1a70ag6sx d------ [17:31 11/11/2009]
11111231000024d8gadcnrm8no d------ [17:31 11/11/2009]
11111231000024d8henebhuhzl d------ [17:31 11/11/2009]
11111233000024d8djn1nvh8nu d------ [17:33 11/11/2009]
11111233000024d8e2wooosovu d------ [17:33 11/11/2009]
11111233000024d8zy8qrv409u d------ [17:33 11/11/2009]
11111234000024d8ktzht4skge d------ [17:34 11/11/2009]
11111234000024d8o7caxejso7 d------ [17:34 11/11/2009]
11301746-00001058-8l09s7hbdb d------ [22:46 30/11/2010]
11301748-00001868-6cx6r28p2m d------ [22:48 30/11/2010]
5865538 d------ [16:34 03/03/2009]
AIM_6.8.14.6 d------ [16:19 03/03/2009]
aolbartcache d------ [13:13 05/03/2009]
BingBarInstallerLogs d------ [03:03 01/06/2011]
Blizzard d------ [19:09 18/07/2010]
Blizzard Installer Temporary Data - 0c4d996e d------ [20:01 18/07/2010]
Blizzard Installer Temporary Data - 0e82a602 d------ [19:39 30/07/2010]
Blizzard Installer Temporary Data - d710901b d------ [19:34 18/07/2010]
Blizzard Installer Temporary Data - ec83d36a d------ [23:33 18/07/2010]
Blizzard Launcher Temporary - bc9939b8 d------ [23:07 14/06/2009]
bye14C8.tmp d------ [19:16 12/03/2009]
Cookies d--hs-- [05:29 07/07/2009]
Curse d------ [12:25 06/02/2010]
Deployment d------ [12:16 06/02/2010]
F8D0.dir d------ [13:28 14/03/2011]
gm_ttt_47205 d------ [14:16 10/04/2010]
gm_ttt_67118 d------ [14:15 10/04/2010]
gm_ttt_68179 d------ [13:28 11/04/2010]
gm_ttt_78794 d------ [14:18 10/04/2010]
Google Toolbar d------ [20:35 16/03/2011]
History d--hs-- [05:29 07/07/2009]
hsperfdata_Glenn d------ [16:27 12/03/2009]
isp2CD6.tmp d------ [16:03 09/10/2010]
isp4A19.tmp d------ [18:23 12/03/2009]
isp58B.tmp d------ [18:19 12/03/2009]
isp8CEF.tmp d------ [16:08 09/10/2010]
ispD25F.tmp d------ [19:15 12/03/2009]
ispF41D.tmp d------ [18:17 12/03/2009]
ispFB5E.tmp d------ [18:23 12/03/2009]
issFAFD.tmp d------ [18:23 12/03/2009]
Low d------ [14:47 03/03/2009]
MessengerCache d------ [15:19 03/03/2009]
Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.30319 d------ [13:00 24/11/2010]
MsgrTemp d------ [03:45 02/07/2011]
NiStandardMaterial d------ [23:53 03/03/2011]
nseC927.tmp d------ [03:39 09/08/2010]
nsf53C4.tmp d------ [03:28 03/08/2010]
nsgB6DB.tmp d------ [22:38 29/07/2010]
nsmEF31.tmp d------ [03:52 18/08/2010]
nsn7E28.tmp d------ [16:19 14/08/2010]
nsp76E6.tmp d------ [16:33 03/03/2009]
nsv4BA4.tmp d------ [23:53 06/08/2010]
nsz5F5A.tmp d------ [23:57 11/08/2010]
offer d------ [15:25 16/11/2009]
pft3E9C.tmp d------ [05:29 21/03/2009]
pftA7F4.tmp d------ [03:32 16/11/2009]
scoped_dir10082 d------ [04:27 27/07/2011]
scoped_dir1022 d------ [21:34 10/06/2010]
scoped_dir10549 d------ [15:49 21/07/2011]
scoped_dir10720 d------ [21:05 13/07/2011]
scoped_dir10723 d------ [02:40 22/07/2010]
scoped_dir10839 d------ [20:40 30/05/2010]
scoped_dir10885 d------ [00:34 10/07/2010]
scoped_dir10947 d------ [00:34 10/07/2010]
scoped_dir10961 d------ [00:34 10/07/2010]
scoped_dir1103 d------ [12:13 08/06/2010]
scoped_dir11167 d------ [05:21 30/11/2010]
scoped_dir11651 d------ [02:04 18/07/2010]
scoped_dir11751 d------ [12:21 06/02/2011]
scoped_dir11762 d------ [22:39 29/07/2010]
scoped_dir11904 d------ [11:32 13/05/2010]
scoped_dir11953 d------ [22:39 05/10/2010]
scoped_dir12177 d------ [15:49 21/07/2011]
scoped_dir12186 d------ [19:43 29/06/2011]
scoped_dir12309 d------ [23:41 19/04/2011]
scoped_dir12394 d------ [21:17 26/09/2010]
scoped_dir12400 d------ [19:40 16/03/2010]
scoped_dir131 d------ [12:36 09/11/2010]
scoped_dir1316 d------ [12:21 21/05/2010]
scoped_dir1319 d------ [12:21 21/05/2010]
scoped_dir13421 d------ [12:47 04/06/2011]
scoped_dir13438 d------ [14:16 18/11/2010]
scoped_dir13441 d------ [02:40 22/07/2010]
scoped_dir13467 d------ [19:43 30/07/2010]
scoped_dir1354 d------ [12:55 09/03/2010]
scoped_dir13630 d------ [07:21 03/08/2010]
scoped_dir13771 d------ [22:00 13/05/2011]
scoped_dir14470 d------ [19:37 17/07/2010]
scoped_dir14539 d------ [13:36 05/03/2010]
scoped_dir14660 d------ [11:30 09/07/2011]
scoped_dir15119 d------ [01:16 02/07/2010]
scoped_dir15123 d------ [11:50 30/06/2011]
scoped_dir15426 d------ [11:02 24/04/2010]
scoped_dir15433 d------ [11:39 27/03/2010]
scoped_dir15632 d------ [16:14 14/11/2010]
scoped_dir15635 d------ [16:14 14/11/2010]
scoped_dir15881 d------ [13:36 05/03/2010]
scoped_dir16291 d------ [07:29 17/06/2011]
scoped_dir16518 d------ [20:45 11/01/2011]
scoped_dir16716 d------ [20:00 14/05/2010]
scoped_dir17063 d------ [20:40 30/05/2010]
scoped_dir17193 d------ [11:27 14/09/2010]
scoped_dir17208 d------ [21:13 18/07/2010]
scoped_dir17236 d------ [02:43 25/02/2010]
scoped_dir17273 d------ [11:36 09/09/2010]
scoped_dir17732 d------ [08:22 02/12/2010]
scoped_dir17859 d------ [12:47 04/06/2011]
scoped_dir17942 d------ [00:34 10/07/2010]
scoped_dir18192 d------ [21:34 10/06/2010]
scoped_dir18196 d------ [11:39 24/03/2011]
scoped_dir18548 d------ [22:06 18/07/2010]
scoped_dir1881 d------ [12:45 01/09/2010]
scoped_dir18889 d------ [07:29 17/06/2011]
scoped_dir19156 d------ [11:36 09/09/2010]
scoped_dir19378 d------ [04:53 17/11/2010]
scoped_dir1940 d------ [22:40 06/02/2011]
scoped_dir19419 d------ [04:11 17/06/2010]
scoped_dir19992 d------ [12:08 06/05/2011]
scoped_dir20012 d------ [01:22 02/07/2010]
scoped_dir20059 d------ [12:14 30/06/2011]
scoped_dir20073 d------ [01:29 05/07/2010]
scoped_dir20131 d------ [01:04 20/12/2010]
scoped_dir20407 d------ [12:08 06/05/2011]
scoped_dir20580 d------ [21:13 18/07/2010]
scoped_dir20684 d------ [12:31 22/01/2011]
scoped_dir2082 d------ [13:42 01/02/2011]
scoped_dir21030 d------ [14:53 07/07/2010]
scoped_dir21040 d------ [22:37 29/07/2011]
scoped_dir21044 d------ [08:22 02/12/2010]
scoped_dir211 d------ [23:44 25/02/2010]
scoped_dir21118 d------ [14:53 07/07/2010]
scoped_dir21134 d------ [23:41 19/04/2011]
scoped_dir21192 d------ [20:16 21/09/2010]
scoped_dir21234 d------ [08:26 12/01/2011]
scoped_dir21332 d------ [12:45 01/09/2010]
scoped_dir21464 d------ [22:39 29/07/2011]
scoped_dir21538 d------ [07:27 12/08/2010]
scoped_dir21880 d------ [14:05 25/03/2011]
scoped_dir21890 d------ [18:43 20/07/2011]
scoped_dir21926 d------ [21:51 13/10/2010]
scoped_dir22152 d------ [22:46 21/05/2010]
scoped_dir22474 d------ [12:55 09/03/2010]
scoped_dir22486 d------ [22:39 21/05/2010]
scoped_dir2252 d------ [20:34 17/07/2010]
scoped_dir22684 d------ [12:29 13/04/2011]
scoped_dir22714 d------ [12:29 13/04/2011]
scoped_dir22790 d------ [08:26 12/01/2011]
scoped_dir22833 d------ [19:06 06/03/2010]
scoped_dir22847 d------ [18:24 02/09/2010]
scoped_dir22881 d------ [02:43 25/02/2010]
scoped_dir23033 d------ [01:16 02/07/2010]
scoped_dir23066 d------ [01:12 24/08/2010]
scoped_dir23095 d------ [22:00 13/08/2010]
scoped_dir23103 d------ [11:33 17/10/2010]
scoped_dir2319 d------ [11:50 30/06/2011]
scoped_dir23196 d------ [19:49 24/08/2010]
scoped_dir2355 d------ [19:37 17/07/2010]
scoped_dir24054 d------ [20:37 30/07/2010]
scoped_dir24169 d------ [01:22 02/07/2010]
scoped_dir24172 d------ [22:39 21/05/2010]
scoped_dir2427 d------ [19:06 06/03/2010]
scoped_dir24432 d------ [19:43 30/07/2010]
scoped_dir24539 d------ [06:20 31/03/2010]
scoped_dir24699 d------ [02:04 18/07/2010]
scoped_dir24852 d------ [18:44 20/07/2011]
scoped_dir25023 d------ [02:19 26/11/2010]
scoped_dir25080 d------ [11:30 09/07/2011]
scoped_dir25151 d------ [14:59 22/04/2010]
scoped_dir25277 d------ [12:36 03/12/2010]
scoped_dir25287 d------ [12:36 03/12/2010]
scoped_dir25406 d------ [22:46 21/05/2010]
scoped_dir25430 d------ [22:00 13/08/2010]
scoped_dir25553 d------ [00:34 10/07/2010]
scoped_dir25673 d------ [11:27 14/09/2010]
scoped_dir25730 d------ [20:34 17/07/2010]
scoped_dir25875 d------ [07:26 13/10/2010]
scoped_dir25942 d------ [13:42 01/02/2011]
scoped_dir26269 d------ [15:29 17/09/2010]
scoped_dir2634 d------ [01:51 24/06/2010]
scoped_dir2635 d------ [08:30 01/12/2010]
scoped_dir26435 d------ [11:33 17/10/2010]
scoped_dir26590 d------ [02:19 26/11/2010]
scoped_dir26679 d------ [20:39 18/12/2010]
scoped_dir26922 d------ [05:21 30/11/2010]
scoped_dir27009 d------ [01:26 27/07/2011]
scoped_dir27584 d------ [12:06 02/04/2011]
scoped_dir27646 d------ [06:20 31/03/2010]
scoped_dir2776 d------ [11:02 24/04/2010]
scoped_dir27872 d------ [04:38 03/03/2011]
scoped_dir27962 d------ [20:39 18/12/2010]
scoped_dir27972 d------ [22:39 29/07/2010]
scoped_dir27993 d------ [22:36 12/12/2010]
scoped_dir2815 d------ [00:33 01/04/2011]
scoped_dir28192 d------ [12:52 16/04/2010]
scoped_dir28350 d------ [11:32 13/05/2010]
scoped_dir2838 d------ [04:38 03/03/2011]
scoped_dir28556 d------ [03:14 05/07/2010]
scoped_dir28559 d------ [22:00 13/05/2011]
scoped_dir28700 d------ [15:29 17/09/2010]
scoped_dir28701 d------ [22:39 05/10/2010]
scoped_dir28782 d------ [12:06 02/04/2011]
scoped_dir28792 d------ [11:22 28/07/2011]
scoped_dir28806 d------ [03:04 02/03/2010]
scoped_dir2882 d------ [08:30 01/12/2010]
scoped_dir28832 d------ [18:24 02/09/2010]
scoped_dir28878 d------ [20:55 07/02/2011]
scoped_dir29119 d------ [22:58 29/07/2010]
scoped_dir29190 d------ [11:44 28/07/2011]
scoped_dir29387 d------ [21:58 18/07/2010]
scoped_dir29397 d------ [21:58 18/07/2010]
scoped_dir29490 d------ [00:33 01/04/2011]
scoped_dir29594 d------ [04:27 27/07/2011]
scoped_dir29759 d------ [12:21 06/02/2011]
scoped_dir29944 d------ [01:03 28/06/2011]
scoped_dir3011 d------ [00:34 10/07/2010]
scoped_dir30238 d------ [12:40 03/05/2010]
scoped_dir30348 d------ [19:40 16/03/2010]
scoped_dir30463 d------ [07:21 03/08/2010]
scoped_dir30718 d------ [17:42 11/09/2010]
scoped_dir30725 d------ [17:42 11/09/2010]
scoped_dir3074 d------ [07:26 11/06/2010]
scoped_dir30968 d------ [03:04 02/03/2010]
scoped_dir30993 d------ [22:06 18/07/2010]
scoped_dir31033 d------ [07:27 12/08/2010]
scoped_dir31286 d------ [20:00 14/05/2010]
scoped_dir31491 d------ [20:16 21/09/2010]
scoped_dir31525 d------ [21:51 13/10/2010]
scoped_dir31608 d------ [09:29 29/10/2010]
scoped_dir3171 d------ [13:03 13/04/2010]
scoped_dir31740 d------ [22:58 29/07/2010]
scoped_dir31931 d------ [12:04 28/03/2010]
scoped_dir31947 d------ [20:55 07/02/2011]
scoped_dir32079 d------ [12:13 08/06/2010]
scoped_dir32086 d------ [20:45 11/01/2011]
scoped_dir32323 d------ [01:03 28/06/2011]
scoped_dir3264 d------ [14:11 15/09/2010]
scoped_dir32729 d------ [11:22 28/07/2011]
scoped_dir3325 d------ [22:40 06/02/2011]
scoped_dir3332 d------ [17:17 11/10/2010]
scoped_dir334 d------ [11:24 28/07/2011]
scoped_dir3634 d------ [12:52 16/04/2010]
scoped_dir3656 d------ [17:17 11/10/2010]
scoped_dir3686 d------ [04:11 17/06/2010]
scoped_dir3873 d------ [21:17 26/09/2010]
scoped_dir3923 d------ [14:11 15/09/2010]
scoped_dir4036 d------ [12:36 09/11/2010]
scoped_dir4252 d------ [11:44 28/07/2011]
scoped_dir427 d------ [01:04 20/12/2010]
scoped_dir4638 d------ [11:46 28/07/2011]
scoped_dir5196 d------ [18:43 20/07/2011]
scoped_dir5304 d------ [14:16 18/11/2010]
scoped_dir5388 d------ [12:40 03/05/2010]
scoped_dir5447 d------ [14:05 25/03/2011]
scoped_dir5457 d------ [21:58 18/07/2010]
scoped_dir5613 d------ [20:37 30/07/2010]
scoped_dir569 d------ [07:26 13/10/2010]
scoped_dir5838 d------ [12:04 28/03/2010]
scoped_dir5980 d------ [21:58 18/07/2010]
scoped_dir6010 d------ [01:29 05/07/2010]
scoped_dir6043 d------ [11:39 24/03/2011]
scoped_dir6201 d------ [20:00 18/07/2010]
scoped_dir6540 d------ [07:26 11/06/2010]
scoped_dir6545 d------ [22:37 29/07/2011]
scoped_dir6996 d------ [22:36 12/12/2010]
scoped_dir7002 d------ [01:26 27/07/2011]
scoped_dir7033 d------ [14:16 18/11/2010]
scoped_dir7085 d------ [14:16 18/11/2010]
scoped_dir7129 d------ [11:39 27/03/2010]
scoped_dir7139 d------ [12:14 30/06/2011]
scoped_dir7761 d------ [03:14 05/07/2010]
scoped_dir7805 d------ [04:53 17/11/2010]
scoped_dir7866 d------ [14:20 18/11/2010]
scoped_dir7869 d------ [14:20 18/11/2010]
scoped_dir7908 d------ [23:44 25/02/2010]
scoped_dir7981 d------ [19:49 24/08/2010]
scoped_dir8498 d------ [13:03 13/04/2010]
scoped_dir8520 d------ [12:31 22/01/2011]
scoped_dir8966 d------ [20:00 18/07/2010]
scoped_dir916 d------ [01:12 24/08/2010]
scoped_dir9228 d------ [14:59 22/04/2010]
scoped_dir9442 d------ [19:43 29/06/2011]
scoped_dir9478 d------ [09:29 29/10/2010]
scoped_dir956 d------ [01:51 24/06/2010]
ssl d------ [09:05 08/03/2009]
SUPERSetup d------ [11:36 29/07/2011]
Temp1_championBuilder_0_2_0.zip d------ [07:34 18/08/2009]
Temporary Internet Files d--hs-- [05:29 07/07/2009]
UCDebugger d------ [21:49 21/06/2009]
VSD87B5.tmp d------ [12:16 06/02/2010]
VSDBFC1.tmp d------ [17:38 18/07/2010]
VSDDA91.tmp d------ [17:37 18/07/2010]
Windows Live Toolbar d------ [16:19 03/03/2009]
WPDNSE d------ [22:37 29/07/2011]
WZSE0.TMP d------ [08:38 08/05/2010]
{03840EE4-90D2-4817-B371-9A2836C1DB57} d------ [05:22 01/09/2009]
{043FB3D0-49C5-453B-BA25-D62092769502} d------ [20:30 30/07/2010]
{069182B9-10BA-465C-BE6D-24FF2C05201D} d------ [22:48 30/11/2010]
{0DB96373-4725-4127-936B-A7522479AF71} d------ [05:22 01/09/2009]
{1BCECCBE-F13E-4553-B09F-7E76C304605E} d------ [05:22 01/09/2009]
{1E085720-D1BB-4BD3-A82D-DB66F7B81054} d------ [17:39 13/07/2009]
{1f76db5f-b2b5-4969-a092-d4636d25e1b2} d------ [02:37 27/07/2010]
{26B99FC7-9AAA-4142-9B28-5CD1595D7B16} d------ [17:09 12/10/2009]
{2C522CDF-624C-4A8B-B9F8-435ABE6E8FB4} d------ [17:50 13/05/2010]
{41AA6493-7439-40F8-9FE0-313093E83D1B} d------ [17:39 13/07/2009]
{440A9B34-68DB-46F0-B57A-434191373E68} d------ [04:24 17/11/2010]
{45F480C6-773C-4BF9-8706-E7E3CB0E828A} d------ [05:29 21/03/2009]
{46D0BEF4-E07C-44E2-80FE-1DFA9B284C16} d------ [19:00 21/07/2011]
{50A4D937-49F9-4008-9BDF-82A9A6FF3228} d------ [20:25 30/07/2010]
{5C2E99C7-693F-4CCE-B5F9-00ED5CAE293B} d------ [22:46 30/11/2010]
{6A76D68F-5E4C-4BCB-83BB-6064F08F688B} d------ [03:39 16/11/2009]
{6BA3DD89-DCED-41B3-A043-3C290550367F} d------ [14:22 12/07/2011]
{70FF7DF1-E69E-47df-9AA6-F062FADD6146} d------ [15:44 19/04/2009]
{769F9328-A663-490F-A868-A35CC87493C6} d------ [04:24 17/11/2010]
{7EFD3966-6384-4913-B3A5-206654F97305} d------ [14:20 12/07/2011]
{7F4CFE2A-C00B-4FDA-A7EF-42D7EAD477A3} d------ [04:26 17/11/2010]
{7fe2b978-1bf0-4b84-9bbc-3bd16bb4d8fe} d------ [03:13 30/11/2009]
{808F8B00-85AA-43C8-B139-F9CB91CBBDB5} d------ [20:30 30/07/2010]
{92C79C6F-9BB5-469A-97F5-9F30B244EF1D} d------ [04:26 17/11/2010]
{9527A496-5DF9-412A-ADC7-168BA5379CA6} d------ [18:21 09/10/2009]
{9D6C489A-E07A-4EED-AAE9-31367A09F818} d------ [14:22 12/07/2011]
{A5365AC9-71DB-4132-901F-DBC70C60A029} d------ [02:31 01/06/2011]
{adf37c9d-c884-494a-91e9-5cf5a838fc70} d------ [02:52 03/09/2010]
{b5aaf13e-5e60-4c4e-8586-68bbdb16da5e} d------ [20:25 14/06/2009]
{B95F43A4-598A-4B29-B24E-EA4584CF8BEA} d------ [20:31 30/07/2010]
{BEEC3ADF-8DF9-445C-BFD8-228A87E6D6AA} d------ [02:29 04/06/2009]
{C7E378CC-182F-467C-9380-C7D02BE6A8E1} d------ [04:26 17/11/2010]
{CB74E971-D7DA-40F1-AD87-6D461B714A74} d------ [21:20 01/10/2009]
{CEB57E13-386E-4E5D-9319-A515DFCA2114} d------ [20:29 30/07/2010]
{D66F6E33-44C6-450D-A128-FA484B728CA3} d------ [19:00 21/07/2011]
{DA603593-CA7E-48BA-A264-C9EED22E62DF} d------ [18:23 12/03/2009]
{DF5B8592-7C5D-4D57-8E08-AB3971D5E7E9} d------ [15:35 03/03/2009]
{DFF72779-2226-414E-9C85-38E6BDB29A50} d------ [04:26 17/11/2010]
{E562548C-1901-4940-A733-2AC900588E2A} d------ [18:43 13/05/2010]
{EDABE4E1-EBD6-42C3-9C26-84251086BF91} d------ [19:50 04/03/2011]
{F7FE2BA5-FB08-4943-B618-E38BB4C14E07} d------ [03:33 16/11/2009]

-= EOF =-

#9 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:08:21 AM

Posted 29 July 2011 - 09:03 PM

Let's upload a couple files for a second opinion on what they actually are.

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:
How to see hidden files in Windows

Virustotal: http://www.virustotal.com/

When the Virustotal page has finished loading, click the Choose File button and navigate to each of the following files and click Send File.

C:\Users\Glenn\AppData\Local\Temp\EAD5E16.exe
C:\Users\Glenn\AppData\Local\Temp\EAD626A.exe
C:\Users\Glenn\AppData\Local\Temp\EAD63F0.exe


If prompted to reanalyze a file, please do so.

Please post back the website addresses (URLs) of the Virustotal result in your next post.
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#10 lestat5891

lestat5891
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 29 July 2011 - 09:54 PM

Well the first and last one were squeaky clean. The center one was the only one with indication.


EAD5E16.exe:
http://www.virustotal.com/file-scan/report.html?id=6026cd4509efa8576318709b0c0fce35cf664659c8347ed197d63b6849329c72-1311993054
EAD626A.exe
http://www.virustotal.com/file-scan/report.html?id=0d88784e7ede50ff78fc55e42f83fc337deb48483348229980ab331a27113ce2-1311993296
EAD63F0.exe
http://www.virustotal.com/file-scan/report.html?id=07359df40de71a971e5a1a25d545d4b5d7f0ea7c4a6eecfedadd53835aeedbe7-1311994000

#11 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:08:21 AM

Posted 29 July 2011 - 09:57 PM

How's your computer running now?
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#12 lestat5891

lestat5891
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 29 July 2011 - 10:14 PM

Running fine, no problems browsing. No pop-ups from Norton or redirects from google so far. Only annoyance is when I'm on the SWTOR forums I have to enter my password a lot, probably because I don't let my pc remember any passwords.

EDIT and by a lot, i don't mean excessively, just when i close the browser and open it up again.

Edited by lestat5891, 29 July 2011 - 10:15 PM.


#13 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:08:21 AM

Posted 29 July 2011 - 10:22 PM

Let's double check we've found everything.

:step1: I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image
      icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.

Edited by jntkwx, 29 July 2011 - 10:23 PM.

Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#14 lestat5891

lestat5891
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Local time:08:21 AM

Posted 29 July 2011 - 10:32 PM

Jason, for clarification, installing and running the ActiveX program for ESET is ok, right?


EDIT: Herp derp. Sorry. Disregard.

Edited by lestat5891, 29 July 2011 - 10:33 PM.


#15 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:08:21 AM

Posted 29 July 2011 - 10:35 PM

Yes, please install and run the ActiveX for ESET.
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users