Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Infected pc

  • This topic is locked This topic is locked
15 replies to this topic

#1 speedy0101


  • Members
  • 7 posts
  • Local time:02:22 PM

Posted 29 August 2011 - 02:22 PM

Any help much appreciated, I have had problems with this PC for days, solved a few issues but still getting some malaware/ trojans and having difficulty getting rid of. Thanks to all Paul

Attached Files

BC AdBot (Login to Remove)


#2 Shannon2012


  • Security Colleague
  • 3,657 posts
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:09:22 AM

Posted 02 September 2011 - 11:44 AM


Welcome to Bleeping Computer.

My name is Shannon and I will be working with you to remove the malware that is on your machine.

I apologize for the delay in replying to your post, but this forum is extremely busy.

Please Track this topic - On the top right on this tread, click on the Watch Topic button, click on 'Immediate Email Notification', and then click on the Proceed button at the bottom.

Do Not make any changes on your own to the infected computer.

Please set your system to show all files.
Click Start, open My Computer, select the Tools menu and click Folder Options.
Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
Uncheck: Hide file extensions for known file types
Uncheck the Hide protected operating system files (recommended) option.
Click Yes to confirm.

Now, let's look more thoroughly at the infected computer -

We need to see some information about what is happening in your machine. Please perform the following scan:
  • We need to create an OTL Report
  • Please download OTL from here:
  • Main Mirror
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Change the "Extra Registry" option to "Use SafeList"
  • Push the Posted Image button.
  • Two reports will open, copy and paste them into your reply:
  • OTL.txt <-- Will be opened
  • Extra.txt <-- Will be minimized
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

Next, please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)
In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can downlaod, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".

Once you have the above logs, click on the Add Reply button below, copy in the contents of the two OTL logs and the RKU log. Also include any comments that you might have concerning the infection(s) and the infected computer.

#3 Shannon2012


  • Security Colleague
  • 3,657 posts
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:09:22 AM

Posted 08 September 2011 - 06:51 PM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.

#4 Shannon2012


  • Security Colleague
  • 3,657 posts
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:09:22 AM

Posted 13 September 2011 - 06:14 AM

This topic has been re-opened at the request of the person who originally posted.

#5 speedy0101

  • Topic Starter

  • Members
  • 7 posts
  • Local time:02:22 PM

Posted 13 September 2011 - 07:06 AM

Please see attache file and results from the unhooker, the PC is much better than when I first posted this having done a few things myself but is still running very slowly Thanks again

PaulAttached File  OTL.Txt   88.82KB   1 downloads:

RkU Version: 3.8.389.593, Type LE (SR2)
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3, v.6055)
Number of processors #1
0xBF012000 C:\WINDOWS\System32\nv4_disp.dll 4276224 bytes (NVIDIA Corporation, NVIDIA Compatible Windows 2000 Display driver, Version 56.73 )
0x804D7000 C:\WINDOWS\system32\ntoskrnl.exe 2192768 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2192768 bytes
0x804D7000 RAW 2192768 bytes
0x804D7000 WMIxWDM 2192768 bytes
0xF68FF000 C:\WINDOWS\system32\DRIVERS\nv4_mini.sys 1900544 bytes (NVIDIA Corporation, NVIDIA Compatible Windows 2000 Miniport Driver, Version 56.73 )
0xBF800000 Win32k 1859584 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1859584 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xF6B77000 C:\WINDOWS\system32\DRIVERS\HSFDPSP2.sys 1044480 bytes (Conexant Systems, Inc., HSF_DP driver)
0xEC31C000 C:\WINDOWS\system32\drivers\nvmcp.sys 823296 bytes (NVIDIA Corporation, NVIDIAŽ nForce™ MCP APU Audio Library)
0xF6ACF000 C:\WINDOWS\system32\DRIVERS\HSFCXTS2.sys 688128 bytes (Conexant Systems, Inc., HSF_CNXT driver)
0xF759A000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xEC7BB000 C:\WINDOWS\system32\drivers\pwipf6.sys 475136 bytes (Privacyware/PWI, Inc., pwipf6)
0xECA47000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xEC1AB000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xF6812000 C:\WINDOWS\system32\DRIVERS\update.sys 364544 bytes (Microsoft Corporation, Update Driver)
0xED17F000 C:\WINDOWS\system32\DRIVERS\srv.sys 360448 bytes (Microsoft Corporation, Server driver)
0xBF426000 C:\WINDOWS\System32\ATMFD.DLL 290816 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xEDA5D000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xEC409000 C:\WINDOWS\system32\drivers\nvapu.sys 241664 bytes (NVIDIA Corporation, NVIDIAŽ nForce™ Audio Driver)
0xECA10000 C:\WINDOWS\system32\DRIVERS\wg111v3.sys 225280 bytes (Realtek Semiconductor Corporation , NETGEAR WG111v3 54Mbps Wireless USB 2.0 Adapter NDIS Driver)
0xF6C99000 C:\WINDOWS\system32\DRIVERS\HSFBS2S2.sys 221184 bytes (Conexant Systems, Inc., HSF_HWB2 WDM driver)
0xF686B000 C:\WINDOWS\system32\DRIVERS\rdpdr.sys 196608 bytes (Microsoft Corporation, Microsoft RDP Device redirector)
0xF76FA000 SSIDRV.SYS 196608 bytes (Webroot Software, Inc. (www.webroot.com), Spy Sweeper Interdiction Driver)
0xF773B000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xF76CD000 C:\WINDOWS\SYSTEM32\Drivers\NDIS.SYS 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xEC76E000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xEC183000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xF7688000 dmio.sys 155648 bytes (Microsoft Corp., Veritas Software, NT Disk Manager I/O Driver)
0xEC861000 C:\WINDOWS\system32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0xEC3E5000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xF6CE3000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xF6C76000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xEC799000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0x806EF000 ACPI_HAL 131840 bytes
0x806EF000 C:\WINDOWS\system32\hal.dll 131840 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF7650000 fltMgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xF76AE000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xEC967000 C:\WINDOWS\system32\DRIVERS\avipbb.sys 114688 bytes (Avira GmbH, Avira Driver for RootKit Detection)
0xF7580000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xF7670000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xECB77000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes
0xF7627000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xF68D4000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xEC887000 C:\Program Files\UltraISO\drivers\ISODrive.sys 90112 bytes (EZB Systems, Inc., ISO DVD/CD-ROM Device Driver)
0xED0AF000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xECD50000 C:\WINDOWS\system32\DRIVERS\avgntflt.sys 81920 bytes (Avira GmbH, Avira Minifilter Driver)
0xF6CCF000 C:\WINDOWS\system32\DRIVERS\NVENET.sys 81920 bytes (NVIDIA Corporation, NVIDIA nForce MCP Networking Driver.)
0xF6D07000 C:\WINDOWS\system32\DRIVERS\parport.sys 81920 bytes (Microsoft Corporation, Parallel Port Driver)
0xF68EB000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xEC204000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xBF000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xF763E000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xED127000 C:\WINDOWS\System32\Drivers\adfs.SYS 69632 bytes (Adobe Systems, Inc., Adobe Drive File System Driver)
0xF772A000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xF68C3000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xEC4D4000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xF796A000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xEC574000 C:\WINDOWS\system32\drivers\nvarm.sys 65536 bytes (NVIDIA Corporation, NVIDIAŽ nForce™ APU Resource Manager)
0xF794A000 C:\WINDOWS\system32\DRIVERS\serial.sys 65536 bytes (Microsoft Corporation, Serial Device Driver)
0xEC584000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xF797A000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xECED3000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xEC5A4000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xECAF7000 C:\WINDOWS\SYSTEM32\Drivers\SSFMONM.SYS 57344 bytes (Webroot Software, Inc. (www.webroot.com), Spy Sweeper FileSystem Filter Driver)
0xF77DA000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xF799A000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xF77BA000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xF79BA000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xEC534000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xF795A000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xF77AA000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xF79AA000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xF793A000 C:\WINDOWS\system32\DRIVERS\amdk7.sys 40960 bytes (Microsoft Corporation, Processor Device Driver)
0xF798A000 C:\WINDOWS\System32\Drivers\GEARAspiWDM.sys 40960 bytes (GEAR Software Inc., CD DVD Filter)
0xF778A000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xEC5B4000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xF779A000 SSHRMD.SYS 40960 bytes (Webroot Software, Inc. (www.webroot.com), Spy Sweeper Mini Driver)
0xF79DA000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xED6EB000 C:\WINDOWS\System32\Drivers\BlackBox.SYS 36864 bytes (RKU Driver)
0xF77CA000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xEC454000 C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xF79CA000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xEC544000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xF77EA000 PxHelp20.sys 36864 bytes (Sonic Solutions, Px Engine Device Driver for Windows 2000/XP)
0xEC464000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xF7AAA000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xEB065000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xEB7BA000 C:\WINDOWS\system32\DRIVERS\usbccgp.sys 32768 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver)
0xF7AA2000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xF7A92000 C:\WINDOWS\system32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0xEB3CE000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xF7A12000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xF7AC2000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xF7ACA000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xEB437000 C:\WINDOWS\system32\DRIVERS\ssmdrv.sys 24576 bytes (Avira GmbH, AVIRA SnapShot Driver)
0xEB43F000 C:\WINDOWS\System32\Drivers\StarOpen.SYS 24576 bytes
0xF7AF2000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xEDC4F000 C:\WINDOWS\system32\DRIVERS\AegisP.sys 20480 bytes (Meetinghouse Data Communications, IEEE 802.1X Protocol Driver)
0xEDC1F000 C:\WINDOWS\system32\DRIVERS\flpydisk.sys 20480 bytes (Microsoft Corporation, Floppy Driver)
0xEB06D000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xF7A1A000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xF7AB2000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xF7ABA000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xF7A0A000 C:\WINDOWS\SYSTEM32\Drivers\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xF7A9A000 C:\WINDOWS\system32\DRIVERS\usbohci.sys 20480 bytes (Microsoft Corporation, OHCI USB Miniport Driver)
0xEEEFE000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xF7C7E000 C:\WINDOWS\system32\DRIVERS\kbdhid.sys 16384 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xEDAC2000 C:\WINDOWS\system32\drivers\mbam.sys 16384 bytes (Malwarebytes Corporation, Malwarebytes' Anti-Malware)
0xF7C76000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xEB021000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xF74DF000 C:\WINDOWS\system32\drivers\nvax.sys 16384 bytes (NVIDIA Corporation, NVIDIAŽ nForce™ MCP Audio Enumerator)
0xF7B9E000 nv_agp.sys 16384 bytes (NVIDIA Corporation, NVIDIA nForce AGP Filter)
0xF74E3000 C:\WINDOWS\system32\DRIVERS\serenum.sys 16384 bytes (Microsoft Corporation, Serial Port Enumerator)
0xF7B9A000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xF68B7000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xED0FC000 C:\WINDOWS\system32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xED10C000 C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys 12288 bytes (Conexant, Diagnostic Interface DRIVER)
0xF4B98000 C:\WINDOWS\system32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xF74D3000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xEE4F9000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xED5B3000 C:\Program Files\Avira\AntiVir Desktop\avgio.sys 8192 bytes (Avira GmbH, Avira AntiVir Support for Minifilter)
0xF7D24000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xF7C8E000 dmload.sys 8192 bytes (Microsoft Corp., Veritas Software., NT Disk Manager Startup Driver)
0xEB8F0000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xF7D22000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xF7C8A000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xF7D26000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xF7D30000 C:\WINDOWS\System32\Drivers\ParVdm.SYS 8192 bytes (Microsoft Corporation, VDM Parallel Driver)
0xF7D2C000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xF7CCE000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xF7D20000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xF7C8C000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xF7D8B000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xF7DB2000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xF7E4D000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xF7D52000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0x837AA0B0 unknown_irp_handler 3920 bytes
0x837590B0 unknown_irp_handler 3920 bytes
0x837D9168 unknown_irp_handler 3736 bytes
0x83B3D2A0 unknown_irp_handler 3424 bytes
0x839992D0 unknown_irp_handler 3376 bytes
0x83A2D3E0 unknown_irp_handler 3104 bytes
0x83A764C0 unknown_irp_handler 2880 bytes
0x83AB76B8 unknown_irp_handler 2376 bytes
0x83AC86F8 unknown_irp_handler 2312 bytes
0x837C1820 unknown_irp_handler 2016 bytes
0x83863890 unknown_irp_handler 1904 bytes
0x837B48A8 unknown_irp_handler 1880 bytes
0x8381A9D8 unknown_irp_handler 1576 bytes
0x83884A88 unknown_irp_handler 1400 bytes
0x83ABBAC8 unknown_irp_handler 1336 bytes
0x839B7B50 unknown_irp_handler 1200 bytes
0x83A78B60 unknown_irp_handler 1184 bytes
0x838D6B88 unknown_irp_handler 1144 bytes
0x83974BE0 unknown_irp_handler 1056 bytes
0x83A33C00 unknown_irp_handler 1024 bytes
0x8396CC00 unknown_irp_handler 1024 bytes
0x83A45C00 unknown_irp_handler 1024 bytes
0x838B6C58 unknown_irp_handler 936 bytes
0x83A43D58 unknown_irp_handler 680 bytes
0x8388AD88 unknown_irp_handler 632 bytes
0x83AB5DE0 unknown_irp_handler 544 bytes
0x83951EC0 unknown_irp_handler 320 bytes
0x837B5FA8 unknown_irp_handler 88 bytes

#6 Shannon2012


  • Security Colleague
  • 3,657 posts
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:09:22 AM

Posted 13 September 2011 - 10:23 AM


Thank you for the reports.

Download Combofix from either of the links below, and save it to your desktop. For information regarding this download, please visit this webpage: how-to-use-combofix

Link 1
Link 2

**Note: It is important that it is saved directly to your desktop**

1. Close any open browsers.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

How to Temporarily Disable your Anti-virusl

Double click on combofix.exe & follow the prompts.
  • When finished, it will produce a report for you.
  • Please copy the "C:\ComboFix.txt" into your reply.
Do not mouseclick combofix's window while it's running. That may cause it to stall


#7 speedy0101

  • Topic Starter

  • Members
  • 7 posts
  • Local time:02:22 PM

Posted 13 September 2011 - 03:17 PM


Combo fix scan below

Thanks again


ComboFix 11-09-13.03 - HOME 13/09/2011 20:17:26.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.735.408 [GMT 1:00]
Running from: c:\documents and settings\HOME\Desktop\ComboFix.exe
AV: Bitdefender Antivirus *Enabled/Updated* {6C4BB89C-B0ED-4F41-A29C-4373888923BB}
AV: ESET NOD32 Antivirus 3.0 *Enabled/Outdated* {E5E70D32-0101-4F12-8FB0-D96ACA4F34C0}
AV: McAfee VirusScan *Enabled/Updated* {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: Bitdefender Firewall *Enabled* {4055920F-2E99-48A8-A270-4243D2B8F242}
FW: McAfee Personal Firewall *Disabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
c:\documents and settings\Administrator.ADMIN-PC.000\Application Data\wruninstall.exe
c:\documents and settings\HOME\Application Data\PriceGong
c:\documents and settings\HOME\Application Data\PriceGong\Data\1.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\a.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\b.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\c.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\d.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\e.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\f.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\g.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\h.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\i.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\J.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\k.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\l.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\m.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\mru.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\n.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\o.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\p.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\q.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\r.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\s.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\t.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\u.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\v.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\w.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\x.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\y.xml
c:\documents and settings\HOME\Application Data\PriceGong\Data\z.xml
c:\documents and settings\HOME\Local Settings\Application Data\lpwobpnv.log
((((((((((((((((((((((((( Files Created from 2011-08-13 to 2011-09-13 )))))))))))))))))))))))))))))))
2011-09-06 15:03 . 2011-09-06 15:03 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-08-30 07:54 . 2011-08-30 07:54 -------- d-----w- c:\documents and settings\HOME\DoctorWeb
2011-08-22 09:40 . 2011-08-22 09:40 -------- d-----w- c:\program files\AVAST Software
2011-08-22 09:19 . 2011-08-22 09:19 -------- d--h--w- c:\documents and settings\All Users\Application Data\Common Files
2011-08-22 09:18 . 2011-08-28 20:05 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData
2011-08-21 23:06 . 2011-08-21 23:06 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Webroot
2011-08-21 23:05 . 2011-07-11 09:07 24496 ----a-w- c:\windows\system32\drivers\sshrmd.sys
2011-08-21 23:05 . 2011-07-11 09:07 181008 ----a-w- c:\windows\system32\drivers\ssidrv.sys
2011-08-21 23:05 . 2011-07-11 09:07 45584 ----a-w- c:\windows\system32\drivers\ssfmonm.sys
2011-08-21 23:04 . 2011-07-21 14:33 122696 ----a-w- c:\windows\system32\drivers\pwipf6.sys
2011-08-21 23:03 . 2011-08-22 09:57 6285008 ----a-w- c:\program files\Common Files\wruninstall.exe
2011-08-21 21:03 . 2011-08-28 20:04 -------- d-----w- c:\documents and settings\HOME\Local Settings\Application Data\Webroot
2011-08-21 08:58 . 2011-08-30 10:03 -------- d-----w- c:\documents and settings\All Users\Application Data\STOPzilla!
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
2011-09-03 10:17 . 2007-11-30 13:25 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-08-28 13:54 . 2010-12-27 22:28 167881 ----a-w- C:\MGlogs.zip
2011-08-28 12:50 . 2001-12-31 19:56 56816 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2011-08-14 10:30 . 2011-05-18 07:35 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-07-15 13:29 . 2007-11-30 07:14 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-07-08 14:02 . 2007-11-30 06:50 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
2011-07-06 18:52 . 2008-09-19 17:03 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-06-24 14:10 . 2008-03-16 22:48 139656 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2011-06-21 18:45 . 2007-11-30 13:26 832512 ----a-w- c:\windows\system32\wininet.dll
2011-06-21 18:45 . 2007-11-30 13:27 1830912 ----a-w- c:\windows\system32\inetcpl.cpl
2011-06-21 18:45 . 2007-11-30 13:25 78336 ----a-w- c:\windows\system32\ieencode.dll
2011-06-21 18:45 . 2007-11-30 13:25 17408 ----a-w- c:\windows\system32\corpol.dll
2011-06-21 11:47 . 2007-11-30 06:39 389120 ----a-w- c:\windows\system32\html.iec
2011-06-20 17:44 . 2007-11-30 13:26 293376 ----a-w- c:\windows\system32\winsrv.dll
2011-04-14 16:41 . 2011-05-23 08:14 142296 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
*Note* empty entries & legit default entries are not shown
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}"= "c:\program files\uTorrentBar\prxtbuTo0.dll" [2011-03-28 176936]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{30F9B915-B755-4826-820B-08FBA6BD249D}]
2011-03-28 16:22 176936 ----a-w- c:\program files\ConduitEngine\prxConduitEngine.dll
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}]
2011-03-28 16:22 176936 ------w- c:\program files\uTorrentBar\prxtbuTo0.dll
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}"= "c:\program files\uTorrentBar\prxtbuTo0.dll" [2011-03-28 176936]
"{30F9B915-B755-4826-820B-08FBA6BD249D}"= "c:\program files\ConduitEngine\prxConduitEngine.dll" [2011-03-28 176936]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{BF7380FA-E3B4-4DB2-AF3E-9D8783A45BFC}"= "c:\program files\uTorrentBar\prxtbuTo0.dll" [2011-03-28 176936]
"{30F9B915-B755-4826-820B-08FBA6BD249D}"= "c:\program files\ConduitEngine\prxConduitEngine.dll" [2011-03-28 176936]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2011-06-18 39408]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2009-03-02 209153]
c:\documents and settings\Administrator.ADMIN-PC.000\Start Menu\Programs\Startup\
Install Webroot FF RunOnce.lnk - c:\program files\Common Files\wruninstall.exe [2011-8-22 6285008]
Install Webroot IE RunOnce.lnk - c:\program files\Common Files\wruninstall.exe [2011-8-22 6285008]
c:\documents and settings\All Users\Start Menu\Programs\Startup\
NETGEAR WG111v3 Smart Wizard.lnk - c:\program files\NETGEAR\WG111v3\WG111v3.exe [2007-9-12 1527808]
"EnableLinkedConnections"= 1 (0x1)
"NoFileAssociate"= 0 (0x0)
"NoCommonGroups"= 0 (0x0)
"NoSimpleStartMenu"= 0 (0x0)
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ autocheck autochk *\0aswBoot.exe /M:dc678868a
SecurityProviders msapsspc.dll, schannel.dll, digest.dll, credssp.dll, msnsspc.dll
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EPSON Stylus Photo RX560 Series]
2006-05-23 03:00 139264 ----a-w- c:\windows\system32\spool\drivers\w32x86\3\E_FATIBPE.EXE
"DisableNotifications"= 1 (0x1)
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Common Files\\Adobe\\CS4ServiceManager\\CS4ServiceManager.exe"=
"c:\\Program Files\\tbh\\base\\bin\\tbhDaemon.exe"=
"c:\\Program Files\\tbh\\monitor\\bin\\tbhMonitor.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"5353:TCP"= 5353:TCP:Adobe CSI CS4
"5191:TCP"= 5191:TCP:The Browser Highlighter XCOM
"10475:TCP"= 10475:TCP:BitComet 10475 TCP
"10475:UDP"= 10475:UDP:BitComet 10475 UDP
R1 pwipf6;pwipf6;c:\windows\system32\drivers\pwipf6.sys [22/08/2011 00:04 122696]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [28/08/2011 01:09 108289]
R2 Application Updater;Application Updater;c:\program files\Application Updater\ApplicationUpdater.exe [06/05/2011 17:33 393112]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [19/09/2008 18:03 366640]
R2 SSFMONM;Spy Sweeper File System Filter Driver;c:\windows\system32\drivers\ssfmonm.sys [22/08/2011 00:05 45584]
R2 tbhMonitor.exe;The Browser Highlighter Monitor;c:\program files\tbh\monitor\bin\tbhMonitor.exe [22/10/2009 14:57 70952]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [28/08/2011 10:16 22712]
R3 RTL8187B;NETGEAR WG111v3 54Mbps Wireless USB 2.0 Adapter Vista Driver;c:\windows\system32\drivers\wg111v3.sys [23/04/2007 14:11 224896]
S0 SmartDefragDriver;SmartDefragDriver;c:\windows\system32\Drivers\SmartDefragDriver.sys --> c:\windows\system32\Drivers\SmartDefragDriver.sys [?]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [18/03/2010 13:16 130384]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [05/11/2010 23:32 136176]
S2 NAUpdate;@c:\program files\Nero\Update\NASvc.exe,-200;"c:\program files\Nero\Update\NASvc.exe" --> c:\program files\Nero\Update\NASvc.exe [?]
S2 NOD32FiXTemDono;Eset Nod32 Boot;c:\windows\system32\regedt32.exe [23/08/2001 13:00 3584]
S3 esgiguard;esgiguard;\??\c:\program files\Enigma Software Group\SpyHunter\esgiguard.sys --> c:\program files\Enigma Software Group\SpyHunter\esgiguard.sys [?]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [05/11/2010 23:32 136176]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [18/03/2010 13:16 753504]
S4 ABBYY.Licensing.FineReader.Corporate.10.0;ABBYY FineReader 10 CE Licensing Service;c:\program files\Common Files\ABBYY\FineReader\10.00\Licensing\CE\NetworkLicenseServer.exe [19/12/2009 01:06 814344]
S4 AdvancedSystemCareService;Advanced SystemCare Service;c:\program files\IObit\Advanced SystemCare 4\ASCService.exe [15/06/2011 18:13 353168]
Contents of the 'Scheduled Tasks' folder
2011-09-07 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 12:34]
2001-12-31 c:\windows\Tasks\ASC4_PerformanceMonitor.job
- c:\program files\IObit\Advanced SystemCare 4\PMonitor.exe [2011-06-15 13:46]
2011-09-13 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-11-05 22:31]
2011-09-13 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-11-05 22:31]
2011-09-13 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1801674531-448539723-2146743481-1003Core.job
- c:\documents and settings\HOME\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-15 23:29]
2011-09-13 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1801674531-448539723-2146743481-1003UA.job
- c:\documents and settings\HOME\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-09-15 23:29]
2001-12-31 c:\windows\Tasks\OGALogon.job
- c:\windows\system32\OGAEXEC.exe [2009-08-03 14:07]
------- Supplementary Scan -------
uStart Page = hxxp://www.aol.co.uk/
uDefault_Search_URL = hxxp://www.google.com/ie
uInternet Settings,ProxyOverride = *.local;localhost
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_7461B1589E8B4FB7.dll/cmsidewiki.html
Trusted Zone: bitdefender.com\www
TCP: DhcpNameServer =
TCP: Interfaces\{42B492B1-1084-4FD5-8C4E-E61457D62B78}: NameServer =
FF - ProfilePath - c:\documents and settings\HOME\Application Data\Mozilla\Firefox\Profiles\p21t5a3c.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: keyword.URL - chrome://browser-region/locale/region.properties
- - - - ORPHANS REMOVED - - - -
Notify-TPSvc - TPSvc.dll
MSConfigStartUp-IxaQgjxg - c:\documents and settings\HOME\Local Settings\Application Data\auievjrp\ixaqgjxg.exe
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-13 20:40
Windows 5.1.2600 Service Pack 3, v.6055 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
--------------------- LOCKED REGISTRY KEYS ---------------------
@DACL=(02 0000)
--------------------- DLLs Loaded Under Running Processes ---------------------
- - - - - - - > 'winlogon.exe'(952)
c:\program files\Common Files\Adobe\Adobe Drive CS4\AdobeDriveCS4_NP.dll
Completion time: 2011-09-13 20:48:23
ComboFix-quarantined-files.txt 2011-09-13 19:48
ComboFix2.txt 2011-05-11 21:46
Pre-Run: 11,105,259,520 bytes free
Post-Run: 12,123,840,512 bytes free
- - End Of File - - 48D87BC5116AF897928D50E414E12935

#8 Shannon2012


  • Security Colleague
  • 3,657 posts
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:09:22 AM

Posted 14 September 2011 - 12:38 PM


The ComboFix report looks good. How is your computer running?

We need to check a file to see if it is infected-

Before we start, please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Please click this link-->Jotti
When the Jotti page has finished loading, click Jotti's Browse button and navigate to the following file and click the Submit file button within Jotti.


If Jotti reports that the file has been scanned before and gives you those results, click on the Scan Again button.
Please post back the results of the scan in your next post. You can just send me the link to the results.
If Jotti is busy, try the same at Virustotal: http://www.virustotal.com/

The ComboFix report pointed out that you have multiple anti-virus programs installed. You should not have more than one anti virus product installed and running on your computer at a time. The reason for this is that if mutiple products have their automatic (Real-Time) protection switched on, then those products which do not encrypt the virus strings within them can cause other anti virus products to cause "false alarms". It can also lead to a clash as products fight for access to files which are being opened since they need to be checked for viruses. In general terms, the programs may conflict and cause:
False Alarms: When the anti virus software tells you that your PC has a virus when it actually doesn't.
System Performance Problems: Your system may lock up due to multiple products attempting to access the same file at the same time.
You currently have three anti-virus programs running - Bitdefender Antivirus, ESET NOD32 Antivirus 3.0, and McAfee VirusScan. Please go to add/remove programs in the control panel and remove all anti-virus programs but one.

Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.
Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Select your Platform: Windows x86 Offline.
  • Save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java™ 6 Update in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u26-windows-i586.exe to install the newest version.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
-- Java is updated frequently. If you want to be automatically notified of future updates, just turn on the Java Automatic Update feature and you will not have to remember to update when Java releases a new version.

Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.
Next, your logs show that you are using peer-to-peer (P2P) or file-sharing programs like uTorrent.

These programs allow one to share files between users as the name(s) suggest. In today's world, the cyber crime has grown to an enormous business and any means is used to infect personal computers and to make use of their stored data or machine power for further propagation of the malware files. A popular means is the use of file-sharing tools as a tremendous amount of prospective victims can be reached through it.

It is therefore possible to be infected by downloading manipulated files via peer-to-peer tools and thus suggested to be used with intense care. Some further readings on this subject - Risks of File-Sharing Technology

It is pretty much certain that if you continue to use P2P programs, you will get infected again.

I would recommend that you uninstall uTorrent, however that choice is up to you. If you choose to remove this program, you can do so via Start > Control Panel > Add/Remove Programs.

Finally, please run Malwarebytes' Anti-Malware (MBAM)
  • Click on the Update tab and click the Check for Updates button.
  • When the update is finished, click on the Scanner tab.
  • Select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy & Paste the entire report in your next reply.

In your reply, please copy in the MBAM report and the Jotti link or a report on what it found. How is your computer doing?

#9 speedy0101

  • Topic Starter

  • Members
  • 7 posts
  • Local time:02:22 PM

Posted 15 September 2011 - 03:55 PM


Although the file awvtt.dll shows up in the combo fox scan I cant seem to find it now and the PC is still running very slowly


#10 Shannon2012


  • Security Colleague
  • 3,657 posts
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:09:22 AM

Posted 17 September 2011 - 07:11 AM

Have you finished with the rest of the instructions/ If so, please send the MBAM repor.

#11 speedy0101

  • Topic Starter

  • Members
  • 7 posts
  • Local time:02:22 PM

Posted 25 September 2011 - 03:15 PM


Apologies I have been away but the result was as below:

Malwarebytes' Anti-Malware

Database version: 7736

Windows 5.1.2600 Service Pack 3, v.6055
Internet Explorer 7.0.5730.13

18/09/2011 02:54:31
mbam-log-2011-09-18 (02-54-31).txt

Scan type: Full scan (C:\|)
Objects scanned: 333259
Time elapsed: 5 hour(s), 25 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

#12 Shannon2012


  • Security Colleague
  • 3,657 posts
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:09:22 AM

Posted 25 September 2011 - 04:53 PM


Welcome back! Thanks for the MBAM report.

Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • If the AV Scan window appears, select (none).
  • Click Scan (if asked to update the Avast anti-virus definitions, click on No).
  • When you get the "Scan finished successfully" message, click the save log button, save it to your desktop (MBR.txt) and post it in your next reply.
  • It will also copy the MBR (Master Boot Record) into a file on your desktop as MBR.dat.


#13 speedy0101

  • Topic Starter

  • Members
  • 7 posts
  • Local time:02:22 PM

Posted 26 September 2011 - 03:49 AM


Results shown below:

aswMBR version Copyright© 2011 AVAST Software
Run date: 2011-09-26 09:38:24
09:38:24.828 OS Version: Windows 5.1.2600 Service Pack 3, v.6055
09:38:24.828 Number of processors: 1 586 0xA00
09:38:24.828 ComputerName: ADMIN-PC UserName: HOME
09:38:31.343 Initialize success
09:39:03.937 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
09:39:03.937 Disk 0 Vendor: Maxtor_6Y080L0 YAR41BW0 Size: 78167MB BusType: 3
09:39:03.968 Disk 0 MBR read successfully
09:39:03.968 Disk 0 MBR scan
09:39:03.968 Disk 0 Windows XP default MBR code
09:39:03.984 Disk 0 scanning sectors +160055595
09:39:04.078 Disk 0 scanning C:\WINDOWS\system32\drivers
09:39:26.546 Service scanning
09:39:34.515 Service PCANDIS5 F:\UTILIT~C\Netgear\PCANDIS5.SYS **LOCKED** 21
09:39:35.265 Modules scanning
09:40:02.171 Disk 0 trace - called modules:
09:40:02.187 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys
09:40:02.187 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x83abaab8]
09:40:02.187 3 CLASSPNP.SYS[f77dafd7] -> nt!IofCallDriver -> \Device\00000064[0x83aea9e8]
09:40:02.203 5 ACPI.sys[f7741620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-3[0x83a9b940]
09:40:02.203 Scan finished successfully
09:46:47.093 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\HOME\Desktop\MBR.dat"
09:46:47.125 The log file has been saved successfully to "C:\Documents and Settings\HOME\Desktop\aswMBR.txt"



#14 Shannon2012


  • Security Colleague
  • 3,657 posts
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:09:22 AM

Posted 26 September 2011 - 09:00 AM


So far, your computer is looking clear of infections.

Download Security Check by screen317 from here or here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
Next, I'd like for you to scan your machine with ESET OnlineScan
  • Hold down Control key and click on the following link to open ESET OnlineScan in a new window.
  • ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip the next two steps)
  • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
Then, get a fresh OTL scan.
  • Double click on the Posted Image icon on your desktop.
  • In the Extra Registry Box, check None
  • Click the "Scan All Users" checkbox.
  • Push the Posted Image button.
  • A report will open, copy and paste it into your reply:
  • OTL.txt <-- Will be the opened report

In your reply, please copy in the contents of the SecurityCheck, the ESET OnlineScan, and the OTL reports.

#15 Shannon2012


  • Security Colleague
  • 3,657 posts
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:09:22 AM

Posted 12 October 2011 - 07:09 AM


Are you still in need of help?

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users