Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

infected with malware - dont know what kind


  • This topic is locked This topic is locked
61 replies to this topic

#1 Bubba7827

Bubba7827

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:12:30 PM

Posted 02 January 2012 - 09:46 AM

my dad's system seems badly infected with malware. MBAM removed 700 or so threats. Also scanned with ad-aware and spybot and eset online virus scanner. I am trying to install microsoft security essentials but the system seems to prevent that. it seems to create random alphanumeric folders in the D drive and then cant find the MSE installation file and I cant browse to it.

Also, the mouse is double clicking instead of single clicking and I cant find a mouse setting to change this.

System has been infected a while. Dad uses system restore when it gets bad, but it doesnt seem like that is a permanent solution.

Thanks in advance for your help.

Here are my logs.

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_29
Run by Jerryberube at 19:42:30 on 2012-01-01
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3582.3075 [GMT -6:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\ehome\ehtray.exe
C:\program files\dell\media experience\dmxlauncher.exe
C:\Program Files\Canon\MyPrinter\BJMyPrt.exe
C:\Program Files\Canon\Solution Menu EX\CNSEMAIN.EXE
C:\Program Files\Musicmatch\Musicmatch Jukebox\mm_tray.exe
D:\My Documents\SetPoint\MediaLife\MediaLifeService.exe
C:\Program Files\Musicmatch\Musicmatch Jukebox\mmtask.exe
C:\program files\real\realplayer\update\realsched.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Documents and Settings\All Users\Application Data\Ad-Aware Browsing Protection\adawarebp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft Location Finder\LocationFinder.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe
D:\My Documents\SetPoint\SetPoint\SetPoint.exe
C:\DOCUME~1\JERRYB~1\LOCALS~1\Temp\bwgo000079d3.exe
C:\Program Files\Windows Desktop Search\WindowsSearch.exe
svchost.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\nlssrv32.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\skeys.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\WINDOWS\system32\SearchIndexer.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\WINDOWS\system32\msiexec.exe
C:\Documents and Settings\Jerryberube\Application Data\U3\43184009D112810E\LaunchPad.exe
C:\WINDOWS\system32\SearchProtocolHost.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://my.yahoo.com/
uSearch Page =
uWindow Title = Windows Internet Explorer provided by Yahoo!
uDefault_Page_URL = hxxp://www.yahoo.com/?fr=fp-yie8
uSearch Bar =
uSearchAssistant =
mSearchAssistant =
uURLSearchHooks: H - No File
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
mURLSearchHooks: Ad-Aware Security Toolbar: {6c97a91e-4524-4019-86af-2aa2d567bf5c} - c:\program files\adawaretb\adawareDx.dll
mWinlogon: Userinit=c:\windows\system32\userinit.exe,SKEYS /I
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\documents and settings\all users\application data\real\realplayer\browserrecordplugin\ie\rpbrowserrecordplugin.dll
BHO: Canon Easy-WebPrint EX BHO: {3785d0ad-bfff-47f6-bf5b-a587c162fed9} - c:\program files\canon\easy-webprint ex\ewpexbho.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Ad-Aware Security Toolbar: {6c97a91e-4524-4019-86af-2aa2d567bf5c} - c:\program files\adawaretb\adawareDx.dll
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SEPsearchhelperie.dll
BHO: RoboForm BHO: {724d43a9-0d85-11d4-9908-00400523e39a} - c:\program files\siber systems\ai roboform\roboform.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.7.7018.1622\swg.dll
BHO: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - No File
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: {e15a8dc0-8516-42a1-81ea-dc94ec1acf10} - Windows Live Toolbar Helper
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: SingleInstance Class: {fdad4da1-61a2-4fd8-9c17-86f7ac245081} - c:\program files\yahoo!\companion\installs\cpn1\YTSingleInstance.dll
TB: &RoboForm: {724d43a0-0d85-11d4-9908-00400523e39a} - c:\program files\siber systems\ai roboform\roboform.dll
TB: {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - No File
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
TB: Canon Easy-WebPrint EX: {759d9886-0c6f-4498-bab6-4a5f47c6c72f} - c:\program files\canon\easy-webprint ex\ewpexhlp.dll
TB: &Windows Live Toolbar: {21fa44ef-376d-4d53-9b0f-8a89d3229068} -
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: Ad-Aware Security Toolbar: {6c97a91e-4524-4019-86af-2aa2d567bf5c} - c:\program files\adawaretb\adawareDx.dll
TB: {604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - No File
TB: {DAB35D68-1CDC-4375-8333-D7BBCEE3C0A0} - No File
TB: {D4027C7F-154A-4066-A1AD-4243D8127440} - No File
EB: Canon Easy-WebPrint EX: {21347690-ec41-4f9a-8887-1f4aee672439} - c:\program files\canon\easy-webprint ex\ewpexhlp.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Microsoft Location Finder] "c:\program files\microsoft location finder\LocationFinder.exe"
uRun: [Google Update] "c:\documents and settings\jerryberube\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [LDM] d:\my documents\desktop messenger\8876480\program\LogitechDesktopMessenger.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [msnmsgr] "c:\program files\windows live\messenger\msnmsgr.exe" /background
uRun: [RoboForm] "c:\program files\siber systems\ai roboform\RoboTaskBarIcon.exe"
mRun: [ehTray] c:\windows\ehome\ehtray.exe
mRun: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [DMXLauncher] c:\program files\dell\media experience\dmxlauncher.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 10.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [CanonMyPrinter] c:\program files\canon\myprinter\BJMyPrt.exe /logon
mRun: [CanonSolutionMenuEx] c:\program files\canon\solution menu ex\CNSEMAIN.EXE /logon
mRun: [MMTray] "c:\program files\musicmatch\musicmatch jukebox\mm_tray.exe"
mRun: [MediaLifeService] "d:\my documents\setpoint\medialife\MediaLifeService.exe"
mRun: [mmtask] "c:\program files\musicmatch\musicmatch jukebox\mmtask.exe"
mRun: [RegWork] c:\program files\regwork\RegWork.exe
mRun: [POINTER] point32.exe
mRun: [TkBellExe] "c:\program files\real\realplayer\update\realsched.exe" -osboot
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [Ad-Aware Browsing Protection] "c:\documents and settings\all users\application data\ad-aware browsing protection\adawarebp.exe"
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\logite~2.lnk - d:\my documents\desktop messenger\8876480\program\LDMConf.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\logite~1.lnk - d:\my documents\setpoint\setpoint\SetPoint.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\window~1.lnk - c:\program files\windows desktop search\WindowsSearch.exe
uPolicies-explorer: RestrictRun = 0 (0x0)
uPolicies-system: NoSecCPL = 0 (0x0)
uPolicies-system: NoDispSettingsPage = 0 (0x0)
uPolicies-system: NoDevMgrPage = 0 (0x0)
uPolicies-system: NoConfigPage = 0 (0x0)
uPolicies-system: NoVirtMemPage = 0 (0x0)
uPolicies-system: NoFileSysPage = 0 (0x0)
uPolicies-system: NoNetSetup = 0 (0x0)
uPolicies-system: NoNetSetupIDPage = 0 (0x0)
uPolicies-system: NoNetSetupSecurityPage = 0 (0x0)
uPolicies-system: NoWorkgroupContents = 0 (0x0)
uPolicies-system: NoEntireNetwork = 0 (0x0)
uPolicies-system: NoFileSharingControl = 0 (0x0)
IE: &Search - http://tbedits.totalrecipesearch.com/one-toolbaredits/menusearch.jhtml?s=100000459&p=YKxdm013YYus&si=43578&a=F02179FD-D0B6-4DD9-A45C-BB955346D43F&n=2011070212
IE: Customize Menu - file://c:\program files\siber systems\ai roboform\RoboFormComCustomizeIEMenu.html
IE: Fill Forms - file://c:\program files\siber systems\ai roboform\RoboFormComFillForms.html
IE: RoboForm Toolbar - file://c:\program files\siber systems\ai roboform\RoboFormComShowToolbar.html
IE: Save Forms - file://c:\program files\siber systems\ai roboform\RoboFormComSavePass.html
IE: {320AF880-6646-11D3-ABEE-C5DBF3571F46} - c:\program files\siber systems\ai roboform\RoboFormComFillForms.html
IE: {320AF880-6646-11D3-ABEE-C5DBF3571F49} - c:\program files\siber systems\ai roboform\RoboFormComSavePass.html
IE: {724d43aa-0d85-11d4-9908-00400523e39a} - c:\program files\siber systems\ai roboform\RoboFormComShowToolbar.html
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files\windows live\writer\WriterBrowserExtension.dll
DPF: {01A88BB1-1174-41EC-ACCB-963509EAE56B} - hxxp://support.dell.com/systemprofiler/SysPro.CAB
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/C/0/C/C0CBBA88-A6F2-48D9-9B0E-1719D1177202/LegitCheckControl.cab
DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} - c:\program files\yahoo!\common\Yinsthelper.dll
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1248045025140
DPF: {6F6FDB9E-5072-498C-BCB0-2B7F00C49EE7} - hxxp://support.dell.com/systemprofiler/DellSystemLite.CAB
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: DhcpNameServer = 192.168.2.1
TCP: Interfaces\{2623A046-C1D6-4A04-B593-28411370A132} : DhcpNameServer = 192.168.2.1
Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - d:\my documents\desktop messenger\8876480\program\GAPlugProtocol-8876480.dll
Notify: LBTWlgn - c:\program files\common files\logitech\bluetooth\LBTWlgn.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - Microsoft AntiMalware ShellExecuteHook
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
LSA: Notification Packages = :\WINDOW
mASetup: {A509B1FF-37FF-4bFF-8CFF-4F3A747040FF} - c:\windows\system32\rundll32.exe c:\windows\system32\advpack.dll,launchinfsectionex c:\program files\internet explorer\clrtour.inf,DefaultInstall.ResetTour,,12
Hosts: 98.158.178.225 www.craigslist.org
Hosts: 98.158.178.225 www.craigslist.net
Hosts: 98.158.178.225 www.craigslist.com
Hosts: 98.158.178.225 craigslist.org
Hosts: 98.158.178.225 craigslist.com
.
Note: multiple HOSTS entries found. Please refer to Attach.txt
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\jerryberube\application data\mozilla\firefox\profiles\faiaf36i.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/?pc=Z125&ocid=zdhp&install_date=20111214
FF - prefs.js: keyword.URL - hxxp://www.bing.com/search?pc=Z125&form=ZGAADF&install_date=20111214&q=
FF - prefs.js: browser.search.selectedEngine - Search the Web
FF - plugin: c:\documents and settings\all users\application data\real\realplayer\browserrecordplugin\mozillaplugins\nprpchromebrowserrecordext.dll
FF - plugin: c:\documents and settings\all users\application data\real\realplayer\browserrecordplugin\mozillaplugins\nprphtml5videoshim.dll
FF - plugin: c:\program files\adobe\reader 10.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\canon\easy-photoprint ex\NPEZFFPI.DLL
FF - plugin: c:\program files\couponalert_2pei\installr\1.bin\NP2pEISb.dll
FF - plugin: c:\program files\google\update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.3.21.57\npGoogleUpdate3.dll
FF - plugin: c:\program files\google\update\1.3.21.65\npGoogleUpdate3.dll
FF - plugin: c:\program files\google\update\1.3.21.79\npGoogleUpdate3.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\microsoft\office live\npOLW.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npyaxmpb.dll
FF - plugin: c:\program files\windows live\photo gallery\NPWLPG.dll
.
---- FIREFOX POLICIES ----
FF - user.js: browser.cache.memory.capacity - 16000
FF - user.js: browser.chrome.favicons - fales
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: content.max.tokenizing.time - 2250000
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 750000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 750000
FF - user.js: dom.disable_window_status_change - true
FF - user.js: network.http.max-connections - 32
FF - user.js: network.http.max-connections-per-server - 8
FF - user.js: network.http.max-persistent-connections-per-proxy - 8
FF - user.js: network.http.max-persistent-connections-per-server - 4
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.firstrequest - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 750
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0
.
============= SERVICES / DRIVERS ===============
.
R2 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr_tdi.sys [2011-2-10 54760]
R2 nlsX86cc;Nalpeiron Licensing Service;c:\windows\system32\nlssrv32.exe [2009-6-7 61440]
R3 LEqdUsb;Logitech SetPoint Unifying KMDF USB Filter;c:\windows\system32\drivers\LEqdUsb.sys [2009-6-17 40720]
R3 LHidEqd;Logitech SetPoint Unifying KMDF HID Filter;c:\windows\system32\drivers\LHidEqd.sys [2009-6-17 10384]
S1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\mpfilter.sys --> c:\windows\system32\drivers\MpFilter.sys [?]
S1 MpKsl29f6d22f;MpKsl29f6d22f;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{bb09ee94-fd70-406c-a95a-8b670f878115}\mpksl29f6d22f.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{bb09ee94-fd70-406c-a95a-8b670f878115}\MpKsl29f6d22f.sys [?]
S1 MpKslc3a340ec;MpKslc3a340ec;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{62c5e6f6-c8d2-4e38-8920-d4a2b0c76355}\mpkslc3a340ec.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{62c5e6f6-c8d2-4e38-8920-d4a2b0c76355}\MpKslc3a340ec.sys [?]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-3-14 135664]
S2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
S2 WinDefend;Windows Defender;"c:\program files\windows defender\msmpeng.exe" --> c:\program files\windows defender\MsMpEng.exe [?]
S3 ATICDSDr;ATICDSDr;c:\dell\drivers\r119714\bin\atiicdxx.sys [2009-7-22 6144]
S3 cpuz132;cpuz132;\??\c:\docume~1\jerryb~1\locals~1\temp\cpuz132\cpuz132_x32.sys --> c:\docume~1\jerryb~1\locals~1\temp\cpuz132\cpuz132_x32.sys [?]
S3 fsssvc;Windows Live Family Safety Service;c:\program files\windows live\family safety\fsssvc.exe [2010-4-28 704872]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\google\update\GoogleUpdate.exe [2010-3-14 135664]
S3 WinRM;Windows Remote Management (WS-Management);c:\windows\system32\svchost.exe -k WINRM [2005-8-16 14336]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
.
=============== Created Last 30 ================
.
2012-01-01 23:43:25 -------- d-----w- c:\program files\ESET
2012-01-01 21:31:57 124 ---ha-w- C:\aaw7boot.cmd
2012-01-01 02:32:12 101720 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2012-01-01 02:09:41 -------- d-----w- c:\documents and settings\jerryberube\local settings\application data\adaware
2012-01-01 02:09:40 -------- d-----w- c:\documents and settings\all users\application data\Ad-Aware Browsing Protection
2012-01-01 02:09:39 -------- d-----w- c:\program files\Toolbar Cleaner
2012-01-01 02:09:33 -------- d-----w- c:\documents and settings\jerryberube\application data\adawaretb
2012-01-01 02:09:32 -------- d-----w- c:\program files\adawaretb
2012-01-01 02:09:17 -------- d-----w- c:\program files\Lavasoft
2012-01-01 02:01:07 -------- d-----w- c:\program files\Spybot - Search & Destroy
2012-01-01 02:01:07 -------- d-----w- c:\documents and settings\all users\application data\Spybot - Search & Destroy
2011-12-29 15:54:35 -------- d-----w- c:\windows\system32\wbem\repository\FS
2011-12-29 15:54:35 -------- d-----w- c:\windows\system32\wbem\Repository
2011-12-28 19:22:46 -------- d-----w- c:\program files\PopUp Killer
2011-12-14 21:40:25 -------- d-----w- c:\program files\PlayItAll
.
==================== Find3M ====================
.
2011-12-10 21:24:06 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-11-23 13:25:32 1859584 ----a-w- c:\windows\system32\win32k.sys
2011-11-04 19:20:51 916992 ----a-w- c:\windows\system32\wininet.dll
2011-11-04 19:20:51 43520 ------w- c:\windows\system32\licmgr10.dll
2011-11-04 19:20:51 1469440 ------w- c:\windows\system32\inetcpl.cpl
2011-11-04 12:23:39 2432 ----a-w- c:\windows\system32\ASOROSet.bin
2011-11-04 11:23:59 385024 ----a-w- c:\windows\system32\html.iec
2011-11-01 16:07:10 1288704 ----a-w- c:\windows\system32\ole32.dll
2011-10-28 05:31:48 33280 ----a-w- c:\windows\system32\csrsrv.dll
2011-10-25 13:37:08 2148864 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-10-25 12:52:02 2027008 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-10-14 23:38:00 456192 ----a-w- c:\windows\system32\encdec.dll
2011-10-10 14:22:41 692736 ----a-w- c:\windows\system32\inetcomm.dll
.
============= FINISH: 19:43:21.23 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:30 PM

Posted 07 January 2012 - 04:11 PM

Hi Bubba7827,

I will be handling your logs to help you get cleaned up. Please give me some time to look them over and I will get back to you as soon as possible. Thanks in advance for your patience.
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#3 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:30 PM

Posted 08 January 2012 - 08:06 AM

Hi Bubba7827,

:welcome: to Bleeping Computer.

My name is Jason and I'll be helping you with your computer problems. You can call me by my screename jntkwx or Jason is fine.

Some things to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • Please do not attach logs or put logs in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can also help.
  • Do not run anything while running a fix.
  • If you don't understand a step, please ask for clarification before continuing with any future steps.

Click on the Watch Topic button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

 

Does your mouse have a brand name?

:step1: Spybot S&D or Ad-Aware are no longer recommended
  • mvps.org is no longer recommending Spybot S&D or Ad-Aware due to poor testing results. See here - (scroll down and read under Freeware Antispyware Products)
  • Further, most people don't understand Spybot's TeaTimer or how to use it and that feature can cause more problems than it's worth. TeaTimer monitors changes to certain critical keys in Windows registry but does not indicate if the change is normal or a modification made by a malware infection. The user must have an understanding of the registry and how TeaTimer works in order to make informed decisions to allow or deny the detected changes. Additionally, TeaTimer may conflict with other security tools which do a much better job of protecting your computer and even prevent disinfection of malware by those tools.

    I strongly recommend uninstalling Ad-Aware and Spybot Search & Destroy

:step2: Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


Please also post some of the Malwarebytes log when it removed hundreds of items. This can be found under the Logs tab (if you've run Malwarebytes several times, there will be multiple logs here.)
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#4 Bubba7827

Bubba7827
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:12:30 PM

Posted 08 January 2012 - 04:08 PM

Thanks for your help Jason.

I found the mouse issue. A setting in windows explorer was activated to open files with a single click. I changed it back to double click and I think we're set with that.

spybot and adaware have been uninstalled.

had some trouble starting combofix. It reported thet microsoft security exssentials antivirus was running. I disabled the service by running services.msc from the command prompt and then disabled the service. combo fix said it was still running but would proceed anyway, it didnt give me much choice in the matter.

malware logs attached from last week's scans where many problems were found.

combofix.txt posted below.

_______________________________________

ComboFix 12-01-07.03 - Jerryberube 01/08/2012 14:51:04.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3582.2887 [GMT -6:00]
Running from: c:\documents and settings\Jerryberube\Desktop\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\bar.js
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\bar.xul
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\buttons.js
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\constants.js
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\events.js
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\globals.js
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\hosts.js
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\init.js
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\engine_images.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\engine_maps.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\engine_news.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\engine_videos.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\engine_web.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\icon_amazon.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\icon_ebay.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\icon_facebook.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\icon_games.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\icon_msn.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\icon_shopping.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\icon_travel.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\icon_twitter.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\images\startnow_logo.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\installer.xml
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\chevron_button.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\searchbox_button_hover.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\searchbox_button_normal.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\searchbox_dropdown_button_normal.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\searchbox_input_background.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\searchbox_input_left.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\searchbox_input_middle.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\separator.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\splitter.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\toolbarbutton_ff_hover_c.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\toolbarbutton_ie_hover_c.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\toolbarbutton_ie_hover_l.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\toolbarbutton_ie_hover_r.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\toolbarbutton_ie_normal_c.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\toolbarbutton_ie_normal_l.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\skin\toolbarbutton_ie_normal_r.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\content\resources\toolbar.xml
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\locale\en-US\{5911488E-9D1E-40ec-8CBB-06B231CC153F}.dtd
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\locale\en-US\{F02577FF-29CE-4130-8171-B51D94ECA96E}.dtd
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\skin\butoon-hover-background.png
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\chrome\skin\overlay.css
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\{5911488E-9D1E-40ec-8CBB-06B231CC153F}\install.rdf
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\64ffxtbr@TelevisionFanatic.com
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\64ffxtbr@TelevisionFanatic.com\chrome\64ffxtbr.jar
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\extensions\64ffxtbr@TelevisionFanatic.com\install.rdf
c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\searchplugins\bing-zugo.xml
c:\documents and settings\Jerryberube\Recent\Thumbs.db
c:\program files\CouponAlert_2pEI
c:\program files\CouponAlert_2pEI\Installr\1.bin\NP2pEISb.dll
c:\program files\Internet Explorer\SET10.tmp
c:\program files\Internet Explorer\SET11.tmp
c:\program files\Internet Explorer\SET12.tmp
c:\program files\Internet Explorer\SET13.tmp
c:\program files\Internet Explorer\SET14.tmp
c:\program files\Internet Explorer\SET15.tmp
c:\program files\Internet Explorer\SET16.tmp
c:\program files\Internet Explorer\SET17.tmp
c:\program files\Internet Explorer\SET178.tmp
c:\program files\Internet Explorer\SET179.tmp
c:\program files\Internet Explorer\SET17B.tmp
c:\program files\Internet Explorer\SET17C.tmp
c:\program files\Internet Explorer\SET18.tmp
c:\program files\Internet Explorer\SET19.tmp
c:\program files\Internet Explorer\SET1A.tmp
c:\program files\Internet Explorer\SET1B.tmp
c:\program files\Internet Explorer\SET1C.tmp
c:\program files\Internet Explorer\SET1D.tmp
c:\program files\Internet Explorer\SET1E.tmp
c:\program files\Internet Explorer\SET1F.tmp
c:\program files\Internet Explorer\SET20.tmp
c:\program files\Internet Explorer\SET21.tmp
c:\program files\Internet Explorer\SET22.tmp
c:\program files\Internet Explorer\SET23.tmp
c:\program files\Internet Explorer\SET24.tmp
c:\program files\Internet Explorer\SET25.tmp
c:\program files\Internet Explorer\SET26.tmp
c:\program files\Internet Explorer\SET27.tmp
c:\program files\Internet Explorer\SET28.tmp
c:\program files\Internet Explorer\SET29.tmp
c:\program files\Internet Explorer\SET2A.tmp
c:\program files\Internet Explorer\SET2B.tmp
c:\program files\Internet Explorer\SET2C.tmp
c:\program files\Internet Explorer\SET2D.tmp
c:\program files\Internet Explorer\SET2E.tmp
c:\program files\Internet Explorer\SET2F.tmp
c:\program files\Internet Explorer\SET30.tmp
c:\program files\Internet Explorer\SET31.tmp
c:\program files\Internet Explorer\SET32.tmp
c:\program files\Internet Explorer\SET326.tmp
c:\program files\Internet Explorer\SET327.tmp
c:\program files\Internet Explorer\SET33.tmp
c:\program files\Internet Explorer\SET34.tmp
c:\program files\Internet Explorer\SET35.tmp
c:\program files\Internet Explorer\SET36.tmp
c:\program files\Internet Explorer\SET37.tmp
c:\program files\Internet Explorer\SET38.tmp
c:\program files\Internet Explorer\SET39.tmp
c:\program files\Internet Explorer\SET3A.tmp
c:\program files\Internet Explorer\SET3B.tmp
c:\program files\Internet Explorer\SET3C.tmp
c:\program files\Internet Explorer\SET3CD.tmp
c:\program files\Internet Explorer\SET3CE.tmp
c:\program files\Internet Explorer\SET3D.tmp
c:\program files\Internet Explorer\SET4.tmp
c:\program files\Internet Explorer\SET42.tmp
c:\program files\Internet Explorer\SET43.tmp
c:\program files\Internet Explorer\SET46.tmp
c:\program files\Internet Explorer\SET46A.tmp
c:\program files\Internet Explorer\SET46B.tmp
c:\program files\Internet Explorer\SET47.tmp
c:\program files\Internet Explorer\SET5.tmp
c:\program files\Internet Explorer\SET505.tmp
c:\program files\Internet Explorer\SET506.tmp
c:\program files\Internet Explorer\SET539.tmp
c:\program files\Internet Explorer\SET53A.tmp
c:\program files\Internet Explorer\SET58.tmp
c:\program files\Internet Explorer\SET59.tmp
c:\program files\Internet Explorer\SET5B6.tmp
c:\program files\Internet Explorer\SET5B7.tmp
c:\program files\Internet Explorer\SET6.tmp
c:\program files\Internet Explorer\SET61.tmp
c:\program files\Internet Explorer\SET62.tmp
c:\program files\Internet Explorer\SET7.tmp
c:\program files\Internet Explorer\SET73.tmp
c:\program files\Internet Explorer\SET730.tmp
c:\program files\Internet Explorer\SET731.tmp
c:\program files\Internet Explorer\SET74.tmp
c:\program files\Internet Explorer\SET77.tmp
c:\program files\Internet Explorer\SET78.tmp
c:\program files\Internet Explorer\SET8.tmp
c:\program files\Internet Explorer\SET84.tmp
c:\program files\Internet Explorer\SET85.tmp
c:\program files\Internet Explorer\SET87.tmp
c:\program files\Internet Explorer\SET88.tmp
c:\program files\Internet Explorer\SET9.tmp
c:\program files\Internet Explorer\SETA.tmp
c:\program files\Internet Explorer\SETB.tmp
c:\program files\Internet Explorer\SETC.tmp
c:\program files\Internet Explorer\SETD.tmp
c:\program files\Internet Explorer\SETE.tmp
c:\program files\Internet Explorer\SETF.tmp
c:\program files\StartNow Toolbar
c:\program files\StartNow Toolbar\Resources\images\btn-msn.png
c:\program files\StartNow Toolbar\Resources\images\chevronButton.png
c:\program files\StartNow Toolbar\Resources\images\engine_images.png
c:\program files\StartNow Toolbar\Resources\images\engine_maps.png
c:\program files\StartNow Toolbar\Resources\images\engine_news.png
c:\program files\StartNow Toolbar\Resources\images\engine_videos.png
c:\program files\StartNow Toolbar\Resources\images\engine_web.png
c:\program files\StartNow Toolbar\Resources\images\icon_amazon.png
c:\program files\StartNow Toolbar\Resources\images\icon_ebay.png
c:\program files\StartNow Toolbar\Resources\images\icon_facebook.png
c:\program files\StartNow Toolbar\Resources\images\icon_games.png
c:\program files\StartNow Toolbar\Resources\images\icon_msn.png
c:\program files\StartNow Toolbar\Resources\images\icon_shopping.png
c:\program files\StartNow Toolbar\Resources\images\icon_travel.png
c:\program files\StartNow Toolbar\Resources\images\icon_twitter.png
c:\program files\StartNow Toolbar\Resources\images\separator.png
c:\program files\StartNow Toolbar\Resources\images\splitter.png
c:\program files\StartNow Toolbar\Resources\images\startnow_logo.png
c:\program files\StartNow Toolbar\Resources\installer.xml
c:\program files\StartNow Toolbar\Resources\skin\chevron_button.png
c:\program files\StartNow Toolbar\Resources\skin\searchbox_button_hover.png
c:\program files\StartNow Toolbar\Resources\skin\searchbox_button_normal.png
c:\program files\StartNow Toolbar\Resources\skin\searchbox_dropdown_button_normal.png
c:\program files\StartNow Toolbar\Resources\skin\searchbox_input_background.png
c:\program files\StartNow Toolbar\Resources\skin\searchbox_input_left.png
c:\program files\StartNow Toolbar\Resources\skin\searchbox_input_middle.png
c:\program files\StartNow Toolbar\Resources\skin\separator.png
c:\program files\StartNow Toolbar\Resources\skin\splitter.png
c:\program files\StartNow Toolbar\Resources\skin\toolbarbutton_ff_hover_c.png
c:\program files\StartNow Toolbar\Resources\skin\toolbarbutton_ie_hover_c.png
c:\program files\StartNow Toolbar\Resources\skin\toolbarbutton_ie_hover_l.png
c:\program files\StartNow Toolbar\Resources\skin\toolbarbutton_ie_hover_r.png
c:\program files\StartNow Toolbar\Resources\skin\toolbarbutton_ie_normal_c.png
c:\program files\StartNow Toolbar\Resources\skin\toolbarbutton_ie_normal_l.png
c:\program files\StartNow Toolbar\Resources\skin\toolbarbutton_ie_normal_r.png
c:\program files\StartNow Toolbar\Resources\toolbar.xml
c:\program files\StartNow Toolbar\Resources\update.xml
c:\program files\StartNow Toolbar\uninstall.dat
c:\program files\TelevisionFanatic
c:\program files\TelevisionFanatic\bar\Cache\000661CA
c:\program files\TelevisionFanatic\bar\Cache\0006645A
c:\program files\TelevisionFanatic\bar\Cache\0046F5F4.bmp
c:\program files\TelevisionFanatic\bar\Cache\00ACB60C
c:\program files\TelevisionFanatic\bar\Cache\01FF4957
c:\program files\TelevisionFanatic\bar\Cache\01FF4D01.jhtml
c:\program files\TelevisionFanatic\bar\Cache\12D204B8
c:\program files\TelevisionFanatic\bar\Cache\12D2068D
c:\program files\TelevisionFanatic\bar\Cache\12D207B5.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D208A0.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D208DE.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D2090D.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D2095B.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D2099A.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D209C9.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D209F8.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D20A26.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D20A55.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D20A84.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D20AB3.bmp
c:\program files\TelevisionFanatic\bar\Cache\12D2421F
c:\program files\TelevisionFanatic\bar\Cache\12D255B6.bmp
c:\program files\TelevisionFanatic\bar\Cache\files.ini
c:\program files\TelevisionFanatic\bar\History\search3
c:\program files\TelevisionFanatic\bar\IE9Mesg\COMMON.T8S
c:\program files\TelevisionFanatic\bar\Message\COMMON.T8S
c:\program files\TelevisionFanatic\bar\Settings\prevcfg2.htm
c:\program files\TelevisionFanatic\bar\Settings\s_pid.dat
c:\program files\TelevisionFanatic\bar\Settings\s_w1.dat
c:\program files\TelevisionFanatic\bar\Settings\s_w1.dat.bak
c:\program files\TelevisionFanatic\bar\Settings\s_w2.dat
c:\program files\TelevisionFanatic\bar\Settings\s_w2.dat.bak
c:\program files\TelevisionFanatic\bar\Settings\setting3.htm
c:\program files\TelevisionFanatic\bar\Settings\setting3.htm.bak
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\PopupProperties201660906.html
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\PopupProperties201660908.html
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\PopupProperties201660910.html
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\PopupProperties201660915.html
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\PopupProperties201660920.html
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\Radio.html
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\VideosAffinityBtn.html
c:\program files\TelevisionFanaticEI
c:\program files\TotalRecipeSearch_14
c:\program files\TotalRecipeSearch_14\bar\1.bin\CHROME.MANIFEST
c:\program files\TotalRecipeSearch_14\bar\1.bin\T8FFTBPR.DLL
c:\program files\TotalRecipeSearch_14\bar\1.bin\T8UNPAT.DLL
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0009E8BE.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0009E989.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0009E9F6.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0009EA83.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0009EAE1.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0009EB3E.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0009EB7D.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0009EBCB.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0009EBFA.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0009EC38.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0009EC96.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F0847.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F08E3.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F0950.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F09CD.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F0AC7.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F0B73.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F0C5D.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F0C8C.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F0CBB.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F0CFA.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F0D29.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\010F5916.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\01331A2A
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\01465B0E
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0161E5D6
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\01FF4ABF
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\026D809D
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\02890B65
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0823AEDA.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\08AD9F5A.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\08E4B4EA.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0C0C61DE.jhtml
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0F244977.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache(3)\0F3FD43F.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0004DDBA.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0004DE37.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0004DEE3.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0004E03A.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0004E0A8.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0004E0E6.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0004E125.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0004E163.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0004E192.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0004E1E0.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0004E20F.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\00052E5A.bmp
c:\program files\TotalRecipeSearch_14\bar\Cache\0251F5D5
c:\program files\TotalRecipeSearch_14\bar\Cache\02890B65
c:\program files\TotalRecipeSearch_14\bar\Cache\0C0C61DE.jhtml
c:\program files\TotalRecipeSearch_14\bar\Cache\files.ini
c:\program files\TotalRecipeSearch_14\bar\History(3)\search3
c:\program files\TotalRecipeSearch_14\bar\History\search3
c:\program files\TotalRecipeSearch_14\bar\Message\COMMON\8_step1.gif
c:\program files\TotalRecipeSearch_14\bar\Message\COMMON\index.htm
c:\program files\TotalRecipeSearch_14\bar\Message\COMMON\rebut4b.htm
c:\program files\TotalRecipeSearch_14\bar\Message\COMMON\shield.png
c:\program files\TotalRecipeSearch_14\bar\Settings(3)\prevcfg2.htm
c:\program files\TotalRecipeSearch_14\bar\Settings(3)\s_w1.dat
c:\program files\TotalRecipeSearch_14\bar\Settings(3)\s_w1.dat.bak
c:\program files\TotalRecipeSearch_14\bar\Settings(3)\s_w2.dat
c:\program files\TotalRecipeSearch_14\bar\Settings(3)\s_w2.dat.bak
c:\program files\TotalRecipeSearch_14\bar\Settings(3)\setting3.htm
c:\program files\TotalRecipeSearch_14\bar\Settings(3)\setting3.htm.bak
c:\program files\TotalRecipeSearch_14\bar\Settings\prevcfg2.htm
c:\program files\TotalRecipeSearch_14\bar\Settings\s_w1.dat
c:\program files\TotalRecipeSearch_14\bar\Settings\s_w1.dat.bak
c:\program files\TotalRecipeSearch_14\bar\Settings\s_w2.dat
c:\program files\TotalRecipeSearch_14\bar\Settings\s_w2.dat.bak
c:\program files\TotalRecipeSearch_14\bar\Settings\setting3.htm
c:\program files\TotalRecipeSearch_14\bar\Settings\setting3.htm.bak
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14(3)\Cache(2)\PopupProperties100023737.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14(3)\Cache(2)\PopupProperties100023739.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14(3)\Cache(2)\PopupProperties100024344.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14(3)\Cache(2)\PopupProperties100025727.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14(3)\Cache(2)\PopupProperties100025731.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14(3)\Cache(2)\PopupProperties100065004.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14(3)\Cache(2)\PopupProperties200821740.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14(3)\Cache(2)\Radio.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14\Cache\PopupProperties100023737.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14\Cache\PopupProperties100023739.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14\Cache\PopupProperties100024344.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14\Cache\PopupProperties100025727.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14\Cache\PopupProperties100025731.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14\Cache\PopupProperties100065004.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14\Cache\PopupProperties200821740.html
c:\program files\TotalRecipeSearch_14\TotalRecipeSearch_14\Cache\Radio.html
c:\program files\TotalRecipeSearch_14EI
c:\program files\WeatherBlinkEI
c:\windows\bwUnin-7.2.0.137-8876480SL.exe
c:\windows\bwUnin-8.1.1.50-8876480SL.exe
c:\windows\EventSystem.log
c:\windows\iun6002.exe
c:\windows\kb913800.exe
c:\windows\system32\drivers\etc\pic.url
c:\windows\system32\SET10.tmp
c:\windows\system32\SET100.tmp
c:\windows\system32\SET101.tmp
c:\windows\system32\SET102.tmp
c:\windows\system32\SET103.tmp
c:\windows\system32\SET104.tmp
c:\windows\system32\SET105.tmp
c:\windows\system32\SET106.tmp
c:\windows\system32\SET107.tmp
c:\windows\system32\SET108.tmp
c:\windows\system32\SET109.tmp
c:\windows\system32\SET10A.tmp
c:\windows\system32\SET10B.tmp
c:\windows\system32\SET10C.tmp
c:\windows\system32\SET10D.tmp
c:\windows\system32\SET10E.tmp
c:\windows\system32\SET10F.tmp
c:\windows\system32\SET11.tmp
c:\windows\system32\SET111.tmp
c:\windows\system32\SET112.tmp
c:\windows\system32\SET113.tmp
c:\windows\system32\SET114.tmp
c:\windows\system32\SET115.tmp
c:\windows\system32\SET116.tmp
c:\windows\system32\SET117.tmp
c:\windows\system32\SET118.tmp
c:\windows\system32\SET119.tmp
c:\windows\system32\SET11A.tmp
c:\windows\system32\SET11B.tmp
c:\windows\system32\SET11C.tmp
c:\windows\system32\SET11D.tmp
c:\windows\system32\SET11E.tmp
c:\windows\system32\SET11F.tmp
c:\windows\system32\SET12.tmp
c:\windows\system32\SET120.tmp
c:\windows\system32\SET121.tmp
c:\windows\system32\SET122.tmp
c:\windows\system32\SET123.tmp
c:\windows\system32\SET124.tmp
c:\windows\system32\SET125.tmp
c:\windows\system32\SET126.tmp
c:\windows\system32\SET127.tmp
c:\windows\system32\SET128.tmp
c:\windows\system32\SET129.tmp
c:\windows\system32\SET12A.tmp
c:\windows\system32\SET12B.tmp
c:\windows\system32\SET12C.tmp
c:\windows\system32\SET12D.tmp
c:\windows\system32\SET12E.tmp
c:\windows\system32\SET12F.tmp
c:\windows\system32\SET13.tmp
c:\windows\system32\SET130.tmp
c:\windows\system32\SET131.tmp
c:\windows\system32\SET132.tmp
c:\windows\system32\SET133.tmp
c:\windows\system32\SET135.tmp
c:\windows\system32\SET136.tmp
c:\windows\system32\SET137.tmp
c:\windows\system32\SET138.tmp
c:\windows\system32\SET139.tmp
c:\windows\system32\SET13A.tmp
c:\windows\system32\SET13B.tmp
c:\windows\system32\SET13C.tmp
c:\windows\system32\SET13D.tmp
c:\windows\system32\SET13E.tmp
c:\windows\system32\SET13F.tmp
c:\windows\system32\SET140.tmp
c:\windows\system32\SET141.tmp
c:\windows\system32\SET142.tmp
c:\windows\system32\SET143.tmp
c:\windows\system32\SET144.tmp
c:\windows\system32\SET145.tmp
c:\windows\system32\SET146.tmp
c:\windows\system32\SET147.tmp
c:\windows\system32\SET148.tmp
c:\windows\system32\SET149.tmp
c:\windows\system32\SET14A.tmp
c:\windows\system32\SET14B.tmp
c:\windows\system32\SET14C.tmp
c:\windows\system32\SET14D.tmp
c:\windows\system32\SET14E.tmp
c:\windows\system32\SET14F.tmp
c:\windows\system32\SET15.tmp
c:\windows\system32\SET150.tmp
c:\windows\system32\SET151.tmp
c:\windows\system32\SET152.tmp
c:\windows\system32\SET153.tmp
c:\windows\system32\SET154.tmp
c:\windows\system32\SET155.tmp
c:\windows\system32\SET156.tmp
c:\windows\system32\SET157.tmp
c:\windows\system32\SET159.tmp
c:\windows\system32\SET15A.tmp
c:\windows\system32\SET15B.tmp
c:\windows\system32\SET15C.tmp
c:\windows\system32\SET15D.tmp
c:\windows\system32\SET15E.tmp
c:\windows\system32\SET15F.tmp
c:\windows\system32\SET16.tmp
c:\windows\system32\SET160.tmp
c:\windows\system32\SET161.tmp
c:\windows\system32\SET162.tmp
c:\windows\system32\SET163.tmp
c:\windows\system32\SET164.tmp
c:\windows\system32\SET165.tmp
c:\windows\system32\SET166.tmp
c:\windows\system32\SET167.tmp
c:\windows\system32\SET168.tmp
c:\windows\system32\SET169.tmp
c:\windows\system32\SET16A.tmp
c:\windows\system32\SET16B.tmp
c:\windows\system32\SET16C.tmp
c:\windows\system32\SET16D.tmp
c:\windows\system32\SET16E.tmp
c:\windows\system32\SET16F.tmp
c:\windows\system32\SET17.tmp
c:\windows\system32\SET170.tmp
c:\windows\system32\SET171.tmp
c:\windows\system32\SET172.tmp
c:\windows\system32\SET173.tmp
c:\windows\system32\SET174.tmp
c:\windows\system32\SET175.tmp
c:\windows\system32\SET176.tmp
c:\windows\system32\SET177.tmp
c:\windows\system32\SET178.tmp
c:\windows\system32\SET179.tmp
c:\windows\system32\SET17A.tmp
c:\windows\system32\SET17B.tmp
c:\windows\system32\SET17D.tmp
c:\windows\system32\SET17E.tmp
c:\windows\system32\SET17F.tmp
c:\windows\system32\SET18.tmp
c:\windows\system32\SET180.tmp
c:\windows\system32\SET181.tmp
c:\windows\system32\SET182.tmp
c:\windows\system32\SET183.tmp
c:\windows\system32\SET184.tmp
c:\windows\system32\SET185.tmp
c:\windows\system32\SET186.tmp
c:\windows\system32\SET187.tmp
c:\windows\system32\SET188.tmp
c:\windows\system32\SET189.tmp
c:\windows\system32\SET18A.tmp
c:\windows\system32\SET18B.tmp
c:\windows\system32\SET18C.tmp
c:\windows\system32\SET18D.tmp
c:\windows\system32\SET18E.tmp
c:\windows\system32\SET18F.tmp
c:\windows\system32\SET19.tmp
c:\windows\system32\SET190.tmp
c:\windows\system32\SET191.tmp
c:\windows\system32\SET192.tmp
c:\windows\system32\SET193.tmp
c:\windows\system32\SET194.tmp
c:\windows\system32\SET195.tmp
c:\windows\system32\SET196.tmp
c:\windows\system32\SET197.tmp
c:\windows\system32\SET198.tmp
c:\windows\system32\SET199.tmp
c:\windows\system32\SET19A.tmp
c:\windows\system32\SET19B.tmp
c:\windows\system32\SET19C.tmp
c:\windows\system32\SET19D.tmp
c:\windows\system32\SET19E.tmp
c:\windows\system32\SET19F.tmp
c:\windows\system32\SET1A.tmp
c:\windows\system32\SET1A1.tmp
c:\windows\system32\SET1A2.tmp
c:\windows\system32\SET1A3.tmp
c:\windows\system32\SET1A4.tmp
c:\windows\system32\SET1A5.tmp
c:\windows\system32\SET1A6.tmp
c:\windows\system32\SET1A7.tmp
c:\windows\system32\SET1A8.tmp
c:\windows\system32\SET1A9.tmp
c:\windows\system32\SET1AA.tmp
c:\windows\system32\SET1AB.tmp
c:\windows\system32\SET1AC.tmp
c:\windows\system32\SET1AD.tmp
c:\windows\system32\SET1AE.tmp
c:\windows\system32\SET1AF.tmp
c:\windows\system32\SET1B.tmp
c:\windows\system32\SET1B0.tmp
c:\windows\system32\SET1B1.tmp
c:\windows\system32\SET1B2.tmp
c:\windows\system32\SET1B3.tmp
c:\windows\system32\SET1B4.tmp
c:\windows\system32\SET1B5.tmp
c:\windows\system32\SET1B6.tmp
c:\windows\system32\SET1B7.tmp
c:\windows\system32\SET1B8.tmp
c:\windows\system32\SET1B9.tmp
c:\windows\system32\SET1BA.tmp
c:\windows\system32\SET1BB.tmp
c:\windows\system32\SET1BC.tmp
c:\windows\system32\SET1BD.tmp
c:\windows\system32\SET1BE.tmp
c:\windows\system32\SET1BF.tmp
c:\windows\system32\SET1C.tmp
c:\windows\system32\SET1C0.tmp
c:\windows\system32\SET1C1.tmp
c:\windows\system32\SET1C2.tmp
c:\windows\system32\SET1C3.tmp
c:\windows\system32\SET1C5.tmp
c:\windows\system32\SET1C6.tmp
c:\windows\system32\SET1C7.tmp
c:\windows\system32\SET1C8.tmp
c:\windows\system32\SET1C9.tmp
c:\windows\system32\SET1CA.tmp
c:\windows\system32\SET1CB.tmp
c:\windows\system32\SET1CC.tmp
c:\windows\system32\SET1CD.tmp
c:\windows\system32\SET1CE.tmp
c:\windows\system32\SET1CF.tmp
c:\windows\system32\SET1D.tmp
c:\windows\system32\SET1D0.tmp
c:\windows\system32\SET1D1.tmp
c:\windows\system32\SET1D2.tmp
c:\windows\system32\SET1D3.tmp
c:\windows\system32\SET1D4.tmp
c:\windows\system32\SET1D5.tmp
c:\windows\system32\SET1D6.tmp
c:\windows\system32\SET1D7.tmp
c:\windows\system32\SET1D8.tmp
c:\windows\system32\SET1D9.tmp
c:\windows\system32\SET1DA.tmp
c:\windows\system32\SET1DB.tmp
c:\windows\system32\SET1DC.tmp
c:\windows\system32\SET1DD.tmp
c:\windows\system32\SET1DE.tmp
c:\windows\system32\SET1DF.tmp
c:\windows\system32\SET1E.tmp
c:\windows\system32\SET1E0.tmp
c:\windows\system32\SET1E1.tmp
c:\windows\system32\SET1E2.tmp
c:\windows\system32\SET1E3.tmp
c:\windows\system32\SET1E4.tmp
c:\windows\system32\SET1E5.tmp
c:\windows\system32\SET1E6.tmp
c:\windows\system32\SET1E7.tmp
c:\windows\system32\SET1E9.tmp
c:\windows\system32\SET1EA.tmp
c:\windows\system32\SET1EB.tmp
c:\windows\system32\SET1EC.tmp
c:\windows\system32\SET1ED.tmp
c:\windows\system32\SET1EE.tmp
c:\windows\system32\SET1EF.tmp
c:\windows\system32\SET1F.tmp
c:\windows\system32\SET1F0.tmp
c:\windows\system32\SET1F1.tmp
c:\windows\system32\SET1F2.tmp
c:\windows\system32\SET1F3.tmp
c:\windows\system32\SET1F4.tmp
c:\windows\system32\SET1F5.tmp
c:\windows\system32\SET1F6.tmp
c:\windows\system32\SET1F7.tmp
c:\windows\system32\SET1F8.tmp
c:\windows\system32\SET1F9.tmp
c:\windows\system32\SET1FA.tmp
c:\windows\system32\SET1FB.tmp
c:\windows\system32\SET1FC.tmp
c:\windows\system32\SET1FD.tmp
c:\windows\system32\SET1FE.tmp
c:\windows\system32\SET1FF.tmp
c:\windows\system32\SET20.tmp
c:\windows\system32\SET200.tmp
c:\windows\system32\SET201.tmp
c:\windows\system32\SET202.tmp
c:\windows\system32\SET203.tmp
c:\windows\system32\SET204.tmp
c:\windows\system32\SET205.tmp
c:\windows\system32\SET206.tmp
c:\windows\system32\SET207.tmp
c:\windows\system32\SET208.tmp
c:\windows\system32\SET209.tmp
c:\windows\system32\SET20A.tmp
c:\windows\system32\SET20B.tmp
c:\windows\system32\SET20D.tmp
c:\windows\system32\SET20E.tmp
c:\windows\system32\SET20F.tmp
c:\windows\system32\SET21.tmp
c:\windows\system32\SET210.tmp
c:\windows\system32\SET211.tmp
c:\windows\system32\SET212.tmp
c:\windows\system32\SET213.tmp
c:\windows\system32\SET214.tmp
c:\windows\system32\SET215.tmp
c:\windows\system32\SET216.tmp
c:\windows\system32\SET217.tmp
c:\windows\system32\SET218.tmp
c:\windows\system32\SET219.tmp
c:\windows\system32\SET21A.tmp
c:\windows\system32\SET21B.tmp
c:\windows\system32\SET21C.tmp
c:\windows\system32\SET21D.tmp
c:\windows\system32\SET21E.tmp
c:\windows\system32\SET21F.tmp
c:\windows\system32\SET22.tmp
c:\windows\system32\SET220.tmp
c:\windows\system32\SET221.tmp
c:\windows\system32\SET222.tmp
c:\windows\system32\SET223.tmp
c:\windows\system32\SET224.tmp
c:\windows\system32\SET225.tmp
c:\windows\system32\SET226.tmp
c:\windows\system32\SET227.tmp
c:\windows\system32\SET228.tmp
c:\windows\system32\SET229.tmp
c:\windows\system32\SET22A.tmp
c:\windows\system32\SET22B.tmp
c:\windows\system32\SET22C.tmp
c:\windows\system32\SET22D.tmp
c:\windows\system32\SET22E.tmp
c:\windows\system32\SET22F.tmp
c:\windows\system32\SET23.tmp
c:\windows\system32\SET231.tmp
c:\windows\system32\SET232.tmp
c:\windows\system32\SET233.tmp
c:\windows\system32\SET234.tmp
c:\windows\system32\SET235.tmp
c:\windows\system32\SET236.tmp
c:\windows\system32\SET237.tmp
c:\windows\system32\SET238.tmp
c:\windows\system32\SET239.tmp
c:\windows\system32\SET23A.tmp
c:\windows\system32\SET23B.tmp
c:\windows\system32\SET23C.tmp
c:\windows\system32\SET23D.tmp
c:\windows\system32\SET23E.tmp
c:\windows\system32\SET23F.tmp
c:\windows\system32\SET24.tmp
c:\windows\system32\SET240.tmp
c:\windows\system32\SET241.tmp
c:\windows\system32\SET242.tmp
c:\windows\system32\SET243.tmp
c:\windows\system32\SET244.tmp
c:\windows\system32\SET245.tmp
c:\windows\system32\SET246.tmp
c:\windows\system32\SET247.tmp
c:\windows\system32\SET248.tmp
c:\windows\system32\SET249.tmp
c:\windows\system32\SET24A.tmp
c:\windows\system32\SET24B.tmp
c:\windows\system32\SET24C.tmp
c:\windows\system32\SET24D.tmp
c:\windows\system32\SET24E.tmp
c:\windows\system32\SET24F.tmp
c:\windows\system32\SET25.tmp
c:\windows\system32\SET250.tmp
c:\windows\system32\SET251.tmp
c:\windows\system32\SET252.tmp
c:\windows\system32\SET253.tmp
c:\windows\system32\SET255.tmp
c:\windows\system32\SET256.tmp
c:\windows\system32\SET257.tmp
c:\windows\system32\SET258.tmp
c:\windows\system32\SET259.tmp
c:\windows\system32\SET25A.tmp
c:\windows\system32\SET25B.tmp
c:\windows\system32\SET25C.tmp
c:\windows\system32\SET25D.tmp
c:\windows\system32\SET25E.tmp
c:\windows\system32\SET25F.tmp
c:\windows\system32\SET26.tmp
c:\windows\system32\SET260.tmp
c:\windows\system32\SET261.tmp
c:\windows\system32\SET262.tmp
c:\windows\system32\SET263.tmp
c:\windows\system32\SET264.tmp
c:\windows\system32\SET265.tmp
c:\windows\system32\SET266.tmp
c:\windows\system32\SET267.tmp
c:\windows\system32\SET268.tmp
c:\windows\system32\SET269.tmp
c:\windows\system32\SET26A.tmp
c:\windows\system32\SET26B.tmp
c:\windows\system32\SET26C.tmp
c:\windows\system32\SET26D.tmp
c:\windows\system32\SET26E.tmp
c:\windows\system32\SET26F.tmp
c:\windows\system32\SET27.tmp
c:\windows\system32\SET270.tmp
c:\windows\system32\SET271.tmp
c:\windows\system32\SET272.tmp
c:\windows\system32\SET273.tmp
c:\windows\system32\SET274.tmp
c:\windows\system32\SET275.tmp
c:\windows\system32\SET276.tmp
c:\windows\system32\SET277.tmp
c:\windows\system32\SET279.tmp
c:\windows\system32\SET27A.tmp
c:\windows\system32\SET27B.tmp
c:\windows\system32\SET27C.tmp
c:\windows\system32\SET27D.tmp
c:\windows\system32\SET27E.tmp
c:\windows\system32\SET27F.tmp
c:\windows\system32\SET28.tmp
c:\windows\system32\SET280.tmp
c:\windows\system32\SET281.tmp
c:\windows\system32\SET282.tmp
c:\windows\system32\SET283.tmp
c:\windows\system32\SET284.tmp
c:\windows\system32\SET285.tmp
c:\windows\system32\SET286.tmp
c:\windows\system32\SET287.tmp
c:\windows\system32\SET288.tmp
c:\windows\system32\SET289.tmp
c:\windows\system32\SET28A.tmp
c:\windows\system32\SET28B.tmp
c:\windows\system32\SET28C.tmp
c:\windows\system32\SET28D.tmp
c:\windows\system32\SET28E.tmp
c:\windows\system32\SET28F.tmp
c:\windows\system32\SET29.tmp
c:\windows\system32\SET290.tmp
c:\windows\system32\SET291.tmp
c:\windows\system32\SET292.tmp
c:\windows\system32\SET293.tmp
c:\windows\system32\SET294.tmp
c:\windows\system32\SET295.tmp
c:\windows\system32\SET296.tmp
c:\windows\system32\SET297.tmp
c:\windows\system32\SET298.tmp
c:\windows\system32\SET299.tmp
c:\windows\system32\SET29A.tmp
c:\windows\system32\SET29B.tmp
c:\windows\system32\SET29D.tmp
c:\windows\system32\SET29E.tmp
c:\windows\system32\SET29F.tmp
c:\windows\system32\SET2A.tmp
c:\windows\system32\SET2A0.tmp
c:\windows\system32\SET2A1.tmp
c:\windows\system32\SET2A2.tmp
c:\windows\system32\SET2A3.tmp
c:\windows\system32\SET2A4.tmp
c:\windows\system32\SET2A5.tmp
c:\windows\system32\SET2A6.tmp
c:\windows\system32\SET2A7.tmp
c:\windows\system32\SET2A8.tmp
c:\windows\system32\SET2A9.tmp
c:\windows\system32\SET2AA.tmp
c:\windows\system32\SET2AB.tmp
c:\windows\system32\SET2AC.tmp
c:\windows\system32\SET2AD.tmp
c:\windows\system32\SET2AE.tmp
c:\windows\system32\SET2AF.tmp
c:\windows\system32\SET2B.tmp
c:\windows\system32\SET2B0.tmp
c:\windows\system32\SET2B1.tmp
c:\windows\system32\SET2B2.tmp
c:\windows\system32\SET2B3.tmp
c:\windows\system32\SET2B4.tmp
c:\windows\system32\SET2B5.tmp
c:\windows\system32\SET2B6.tmp
c:\windows\system32\SET2B7.tmp
c:\windows\system32\SET2B8.tmp
c:\windows\system32\SET2B9.tmp
c:\windows\system32\SET2BA.tmp
c:\windows\system32\SET2BB.tmp
c:\windows\system32\SET2BC.tmp
c:\windows\system32\SET2BD.tmp
c:\windows\system32\SET2BE.tmp
c:\windows\system32\SET2BF.tmp
c:\windows\system32\SET2C.tmp
c:\windows\system32\SET2C1.tmp
c:\windows\system32\SET2C2.tmp
c:\windows\system32\SET2C3.tmp
c:\windows\system32\SET2C4.tmp
c:\windows\system32\SET2C5.tmp
c:\windows\system32\SET2C6.tmp
c:\windows\system32\SET2C7.tmp
c:\windows\system32\SET2C8.tmp
c:\windows\system32\SET2C9.tmp
c:\windows\system32\SET2CA.tmp
c:\windows\system32\SET2CB.tmp
c:\windows\system32\SET2CC.tmp
c:\windows\system32\SET2CD.tmp
c:\windows\system32\SET2CE.tmp
c:\windows\system32\SET2CF.tmp
c:\windows\system32\SET2D.tmp
c:\windows\system32\SET2D0.tmp
c:\windows\system32\SET2D1.tmp
c:\windows\system32\SET2D2.tmp
c:\windows\system32\SET2D3.tmp
c:\windows\system32\SET2D4.tmp
c:\windows\system32\SET2D5.tmp
c:\windows\system32\SET2D6.tmp
c:\windows\system32\SET2D7.tmp
c:\windows\system32\SET2D8.tmp
c:\windows\system32\SET2D9.tmp
c:\windows\system32\SET2DA.tmp
c:\windows\system32\SET2DB.tmp
c:\windows\system32\SET2DC.tmp
c:\windows\system32\SET2DD.tmp
c:\windows\system32\SET2DE.tmp
c:\windows\system32\SET2DF.tmp
c:\windows\system32\SET2E.tmp
c:\windows\system32\SET2E0.tmp
c:\windows\system32\SET2E1.tmp
c:\windows\system32\SET2E2.tmp
c:\windows\system32\SET2E3.tmp
c:\windows\system32\SET2E5.tmp
c:\windows\system32\SET2E6.tmp
c:\windows\system32\SET2E7.tmp
c:\windows\system32\SET2E8.tmp
c:\windows\system32\SET2E9.tmp
c:\windows\system32\SET2EA.tmp
c:\windows\system32\SET2EB.tmp
c:\windows\system32\SET2EC.tmp
c:\windows\system32\SET2ED.tmp
c:\windows\system32\SET2EE.tmp
c:\windows\system32\SET2EF.tmp
c:\windows\system32\SET2F.tmp
c:\windows\system32\SET2F0.tmp
c:\windows\system32\SET2F1.tmp
c:\windows\system32\SET2F2.tmp
c:\windows\system32\SET2F3.tmp
c:\windows\system32\SET2F4.tmp
c:\windows\system32\SET2F5.tmp
c:\windows\system32\SET2F6.tmp
c:\windows\system32\SET2F7.tmp
c:\windows\system32\SET2F8.tmp
c:\windows\system32\SET2F9.tmp
c:\windows\system32\SET2FA.tmp
c:\windows\system32\SET2FB.tmp
c:\windows\system32\SET2FC.tmp
c:\windows\system32\SET2FD.tmp
c:\windows\system32\SET2FE.tmp
c:\windows\system32\SET2FF.tmp
c:\windows\system32\SET30.tmp
c:\windows\system32\SET300.tmp
c:\windows\system32\SET301.tmp
c:\windows\system32\SET302.tmp
c:\windows\system32\SET303.tmp
c:\windows\system32\SET304.tmp
c:\windows\system32\SET305.tmp
c:\windows\system32\SET306.tmp
c:\windows\system32\SET307.tmp
c:\windows\system32\SET309.tmp
c:\windows\system32\SET30A.tmp
c:\windows\system32\SET30B.tmp
c:\windows\system32\SET30C.tmp
c:\windows\system32\SET30D.tmp
c:\windows\system32\SET30E.tmp
c:\windows\system32\SET30F.tmp
c:\windows\system32\SET31.tmp
c:\windows\system32\SET310.tmp
c:\windows\system32\SET311.tmp
c:\windows\system32\SET312.tmp
c:\windows\system32\SET313.tmp
c:\windows\system32\SET314.tmp
c:\windows\system32\SET315.tmp
c:\windows\system32\SET316.tmp
c:\windows\system32\SET317.tmp
c:\windows\system32\SET318.tmp
c:\windows\system32\SET319.tmp
c:\windows\system32\SET31A.tmp
c:\windows\system32\SET31B.tmp
c:\windows\system32\SET31C.tmp
c:\windows\system32\SET31D.tmp
c:\windows\system32\SET31E.tmp
c:\windows\system32\SET31F.tmp
c:\windows\system32\SET32.tmp
c:\windows\system32\SET320.tmp
c:\windows\system32\SET321.tmp
c:\windows\system32\SET322.tmp
c:\windows\system32\SET323.tmp
c:\windows\system32\SET324.tmp
c:\windows\system32\SET325.tmp
c:\windows\system32\SET326.tmp
c:\windows\system32\SET327.tmp
c:\windows\system32\SET328.tmp
c:\windows\system32\SET329.tmp
c:\windows\system32\SET32A.tmp
c:\windows\system32\SET32B.tmp
c:\windows\system32\SET32C.tmp
c:\windows\system32\SET32D.tmp
c:\windows\system32\SET32E.tmp
c:\windows\system32\SET32F.tmp
c:\windows\system32\SET33.tmp
c:\windows\system32\SET330.tmp
c:\windows\system32\SET331.tmp
c:\windows\system32\SET332.tmp
c:\windows\system32\SET333.tmp
c:\windows\system32\SET334.tmp
c:\windows\system32\SET335.tmp
c:\windows\system32\SET337.tmp
c:\windows\system32\SET338.tmp
c:\windows\system32\SET339.tmp
c:\windows\system32\SET33A.tmp
c:\windows\system32\SET33B.tmp
c:\windows\system32\SET33C.tmp
c:\windows\system32\SET33D.tmp
c:\windows\system32\SET33E.tmp
c:\windows\system32\SET33F.tmp
c:\windows\system32\SET34.tmp
c:\windows\system32\SET340.tmp
c:\windows\system32\SET341.tmp
c:\windows\system32\SET342.tmp
c:\windows\system32\SET343.tmp
c:\windows\system32\SET344.tmp
c:\windows\system32\SET345.tmp
c:\windows\system32\SET346.tmp
c:\windows\system32\SET347.tmp
c:\windows\system32\SET348.tmp
c:\windows\system32\SET349.tmp
c:\windows\system32\SET34A.tmp
c:\windows\system32\SET34B.tmp
c:\windows\system32\SET34C.tmp
c:\windows\system32\SET34D.tmp
c:\windows\system32\SET34E.tmp
c:\windows\system32\SET34F.tmp
c:\windows\system32\SET35.tmp
c:\windows\system32\SET351.tmp
c:\windows\system32\SET352.tmp
c:\windows\system32\SET353.tmp
c:\windows\system32\SET354.tmp
c:\windows\system32\SET355.tmp
c:\windows\system32\SET356.tmp
c:\windows\system32\SET357.tmp
c:\windows\system32\SET358.tmp
c:\windows\system32\SET359.tmp
c:\windows\system32\SET35A.tmp
c:\windows\system32\SET35B.tmp
c:\windows\system32\SET35C.tmp
c:\windows\system32\SET35D.tmp
c:\windows\system32\SET35E.tmp
c:\windows\system32\SET35F.tmp
c:\windows\system32\SET36.tmp
c:\windows\system32\SET360.tmp
c:\windows\system32\SET361.tmp
c:\windows\system32\SET362.tmp
c:\windows\system32\SET363.tmp
c:\windows\system32\SET364.tmp
c:\windows\system32\SET365.tmp
c:\windows\system32\SET366.tmp
c:\windows\system32\SET367.tmp
c:\windows\system32\SET368.tmp
c:\windows\system32\SET369.tmp
c:\windows\system32\SET36A.tmp
c:\windows\system32\SET36B.tmp
c:\windows\system32\SET36C.tmp
c:\windows\system32\SET36D.tmp
c:\windows\system32\SET36E.tmp
c:\windows\system32\SET36F.tmp
c:\windows\system32\SET37.tmp
c:\windows\system32\SET370.tmp
c:\windows\system32\SET371.tmp
c:\windows\system32\SET372.tmp
c:\windows\system32\SET373.tmp
c:\windows\system32\SET375.tmp
c:\windows\system32\SET376.tmp
c:\windows\system32\SET377.tmp
c:\windows\system32\SET378.tmp
c:\windows\system32\SET379.tmp
c:\windows\system32\SET37A.tmp
c:\windows\system32\SET37B.tmp
c:\windows\system32\SET37C.tmp
c:\windows\system32\SET37D.tmp
c:\windows\system32\SET37E.tmp
c:\windows\system32\SET37F.tmp
c:\windows\system32\SET380.tmp
c:\windows\system32\SET381.tmp
c:\windows\system32\SET382.tmp
c:\windows\system32\SET383.tmp
c:\windows\system32\SET384.tmp
c:\windows\system32\SET385.tmp
c:\windows\system32\SET386.tmp
c:\windows\system32\SET387.tmp
c:\windows\system32\SET388.tmp
c:\windows\system32\SET389.tmp
c:\windows\system32\SET38A.tmp
c:\windows\system32\SET38B.tmp
c:\windows\system32\SET38C.tmp
c:\windows\system32\SET38D.tmp
c:\windows\system32\SET38E.tmp
c:\windows\system32\SET38F.tmp
c:\windows\system32\SET39.tmp
c:\windows\system32\SET390.tmp
c:\windows\system32\SET391.tmp
c:\windows\system32\SET392.tmp
c:\windows\system32\SET393.tmp
c:\windows\system32\SET394.tmp
c:\windows\system32\SET395.tmp
c:\windows\system32\SET396.tmp
c:\windows\system32\SET397.tmp
c:\windows\system32\SET399.tmp
c:\windows\system32\SET39A.tmp
c:\windows\system32\SET39B.tmp
c:\windows\system32\SET39C.tmp
c:\windows\system32\SET39D.tmp
c:\windows\system32\SET39E.tmp
c:\windows\system32\SET39F.tmp
c:\windows\system32\SET3A.tmp
c:\windows\system32\SET3A0.tmp
c:\windows\system32\SET3A1.tmp
c:\windows\system32\SET3A2.tmp
c:\windows\system32\SET3A3.tmp
c:\windows\system32\SET3A4.tmp
c:\windows\system32\SET3A5.tmp
c:\windows\system32\SET3A6.tmp
c:\windows\system32\SET3A7.tmp
c:\windows\system32\SET3A8.tmp
c:\windows\system32\SET3A9.tmp
c:\windows\system32\SET3AA.tmp
c:\windows\system32\SET3AB.tmp
c:\windows\system32\SET3AC.tmp
c:\windows\system32\SET3AD.tmp
c:\windows\system32\SET3AE.tmp
c:\windows\system32\SET3AF.tmp
c:\windows\system32\SET3B.tmp
c:\windows\system32\SET3B0.tmp
c:\windows\system32\SET3B1.tmp
c:\windows\system32\SET3B2.tmp
c:\windows\system32\SET3B3.tmp
c:\windows\system32\SET3B4.tmp
c:\windows\system32\SET3B5.tmp
c:\windows\system32\SET3B6.tmp
c:\windows\system32\SET3B7.tmp
c:\windows\system32\SET3B8.tmp
c:\windows\system32\SET3B9.tmp
c:\windows\system32\SET3BA.tmp
c:\windows\system32\SET3BB.tmp
c:\windows\system32\SET3BD.tmp
c:\windows\system32\SET3BE.tmp
c:\windows\system32\SET3BF.tmp
c:\windows\system32\SET3C.tmp
c:\windows\system32\SET3C0.tmp
c:\windows\system32\SET3C1.tmp
c:\windows\system32\SET3C2.tmp
c:\windows\system32\SET3C3.tmp
c:\windows\system32\SET3C4.tmp
c:\windows\system32\SET3C5.tmp
c:\windows\system32\SET3C6.tmp
c:\windows\system32\SET3C7.tmp
c:\windows\system32\SET3C8.tmp
c:\windows\system32\SET3C9.tmp
c:\windows\system32\SET3CA.tmp
c:\windows\system32\SET3CB.tmp
c:\windows\system32\SET3CC.tmp
c:\windows\system32\SET3CD.tmp
c:\windows\system32\SET3CE.tmp
c:\windows\system32\SET3CF.tmp
c:\windows\system32\SET3D.tmp
c:\windows\system32\SET3D0.tmp
c:\windows\system32\SET3D1.tmp
c:\windows\system32\SET3D2.tmp
c:\windows\system32\SET3D3.tmp
c:\windows\system32\SET3D4.tmp
c:\windows\system32\SET3D5.tmp
c:\windows\system32\SET3D6.tmp
c:\windows\system32\SET3D7.tmp
c:\windows\system32\SET3D8.tmp
c:\windows\system32\SET3D9.tmp
c:\windows\system32\SET3DA.tmp
c:\windows\system32\SET3DB.tmp
c:\windows\system32\SET3DC.tmp
c:\windows\system32\SET3DE.tmp
c:\windows\system32\SET3DF.tmp
c:\windows\system32\SET3E.tmp
c:\windows\system32\SET3E0.tmp
c:\windows\system32\SET3E1.tmp
c:\windows\system32\SET3E2.tmp
c:\windows\system32\SET3E3.tmp
c:\windows\system32\SET3E4.tmp
c:\windows\system32\SET3E5.tmp
c:\windows\system32\SET3E6.tmp
c:\windows\system32\SET3E7.tmp
c:\windows\system32\SET3E8.tmp
c:\windows\system32\SET3E9.tmp
c:\windows\system32\SET3EA.tmp
c:\windows\system32\SET3EB.tmp
c:\windows\system32\SET3EC.tmp
c:\windows\system32\SET3ED.tmp
c:\windows\system32\SET3EE.tmp
c:\windows\system32\SET3EF.tmp
c:\windows\system32\SET3F.tmp
c:\windows\system32\SET3F0.tmp
c:\windows\system32\SET3F1.tmp
c:\windows\system32\SET3F2.tmp
c:\windows\system32\SET3F3.tmp
c:\windows\system32\SET3F4.tmp
c:\windows\system32\SET3F5.tmp
c:\windows\system32\SET3F6.tmp
c:\windows\system32\SET3F7.tmp
c:\windows\system32\SET3F8.tmp
c:\windows\system32\SET3F9.tmp
c:\windows\system32\SET3FA.tmp
c:\windows\system32\SET3FB.tmp
c:\windows\system32\SET3FC.tmp
c:\windows\system32\SET3FD.tmp
c:\windows\system32\SET3FE.tmp
c:\windows\system32\SET3FF.tmp
c:\windows\system32\SET40.tmp
c:\windows\system32\SET400.tmp
c:\windows\system32\SET401.tmp
c:\windows\system32\SET402.tmp
c:\windows\system32\SET403.tmp
c:\windows\system32\SET405.tmp
c:\windows\system32\SET406.tmp
c:\windows\system32\SET407.tmp
c:\windows\system32\SET408.tmp
c:\windows\system32\SET409.tmp
c:\windows\system32\SET40A.tmp
c:\windows\system32\SET40B.tmp
c:\windows\system32\SET40C.tmp
c:\windows\system32\SET40D.tmp
c:\windows\system32\SET40E.tmp
c:\windows\system32\SET40F.tmp
c:\windows\system32\SET41.tmp
c:\windows\system32\SET410.tmp
c:\windows\system32\SET411.tmp
c:\windows\system32\SET412.tmp
c:\windows\system32\SET413.tmp
c:\windows\system32\SET414.tmp
c:\windows\system32\SET415.tmp
c:\windows\system32\SET416.tmp
c:\windows\system32\SET417.tmp
c:\windows\system32\SET418.tmp
c:\windows\system32\SET419.tmp
c:\windows\system32\SET41A.tmp
c:\windows\system32\SET41B.tmp
c:\windows\system32\SET41C.tmp
c:\windows\system32\SET41D.tmp
c:\windows\system32\SET41E.tmp
c:\windows\system32\SET41F.tmp
c:\windows\system32\SET42.tmp
c:\windows\system32\SET420.tmp
c:\windows\system32\SET421.tmp
c:\windows\system32\SET422.tmp
c:\windows\system32\SET423.tmp
c:\windows\system32\SET424.tmp
c:\windows\system32\SET425.tmp
c:\windows\system32\SET426.tmp
c:\windows\system32\SET427.tmp
c:\windows\system32\SET429.tmp
c:\windows\system32\SET42A.tmp
c:\windows\system32\SET42B.tmp
c:\windows\system32\SET42C.tmp
c:\windows\system32\SET42D.tmp
c:\windows\system32\SET42E.tmp
c:\windows\system32\SET42F.tmp
c:\windows\system32\SET43.tmp
c:\windows\system32\SET430.tmp
c:\windows\system32\SET431.tmp
c:\windows\system32\SET432.tmp
c:\windows\system32\SET433.tmp
c:\windows\system32\SET434.tmp
c:\windows\system32\SET435.tmp
c:\windows\system32\SET436.tmp
c:\windows\system32\SET437.tmp
c:\windows\system32\SET438.tmp
c:\windows\system32\SET439.tmp
c:\windows\system32\SET43A.tmp
c:\windows\system32\SET43B.tmp
c:\windows\system32\SET43C.tmp
c:\windows\system32\SET43D.tmp
c:\windows\system32\SET43E.tmp
c:\windows\system32\SET43F.tmp
c:\windows\system32\SET44.tmp
c:\windows\system32\SET440.tmp
c:\windows\system32\SET441.tmp
c:\windows\system32\SET442.tmp
c:\windows\system32\SET443.tmp
c:\windows\system32\SET444.tmp
c:\windows\system32\SET445.tmp
c:\windows\system32\SET446.tmp
c:\windows\system32\SET447.tmp
c:\windows\system32\SET448.tmp
c:\windows\system32\SET449.tmp
c:\windows\system32\SET44A.tmp
c:\windows\system32\SET44B.tmp
c:\windows\system32\SET44D.tmp
c:\windows\system32\SET44E.tmp
c:\windows\system32\SET44F.tmp
c:\windows\system32\SET45.tmp
c:\windows\system32\SET450.tmp
c:\windows\system32\SET451.tmp
c:\windows\system32\SET452.tmp
c:\windows\system32\SET453.tmp
c:\windows\system32\SET454.tmp
c:\windows\system32\SET455.tmp
c:\windows\system32\SET456.tmp
c:\windows\system32\SET457.tmp
c:\windows\system32\SET458.tmp
c:\windows\system32\SET459.tmp
c:\windows\system32\SET45A.tmp
c:\windows\system32\SET45B.tmp
c:\windows\system32\SET45C.tmp
c:\windows\system32\SET45D.tmp
c:\windows\system32\SET45E.tmp
c:\windows\system32\SET45F.tmp
c:\windows\system32\SET46.tmp
c:\windows\system32\SET460.tmp
c:\windows\system32\SET461.tmp
c:\windows\system32\SET462.tmp
c:\windows\system32\SET463.tmp
c:\windows\system32\SET464.tmp
c:\windows\system32\SET465.tmp
c:\windows\system32\SET466.tmp
c:\windows\system32\SET467.tmp
c:\windows\system32\SET468.tmp
c:\windows\system32\SET469.tmp
c:\windows\system32\SET46A.tmp
c:\windows\system32\SET46B.tmp
c:\windows\system32\SET46C.tmp
c:\windows\system32\SET46D.tmp
c:\windows\system32\SET46E.tmp
c:\windows\system32\SET46F.tmp
c:\windows\system32\SET47.tmp
c:\windows\system32\SET470.tmp
c:\windows\system32\SET471.tmp
c:\windows\system32\SET472.tmp
c:\windows\system32\SET473.tmp
c:\windows\system32\SET474.tmp
c:\windows\system32\SET475.tmp
c:\windows\system32\SET476.tmp
c:\windows\system32\SET477.tmp
c:\windows\system32\SET478.tmp
c:\windows\system32\SET479.tmp
c:\windows\system32\SET47B.tmp
c:\windows\system32\SET47C.tmp
c:\windows\system32\SET47D.tmp
c:\windows\system32\SET47E.tmp
c:\windows\system32\SET47F.tmp
c:\windows\system32\SET48.tmp
c:\windows\system32\SET480.tmp
c:\windows\system32\SET481.tmp
c:\windows\system32\SET482.tmp
c:\windows\system32\SET483.tmp
c:\windows\system32\SET484.tmp
c:\windows\system32\SET485.tmp
c:\windows\system32\SET486.tmp
c:\windows\system32\SET487.tmp
c:\windows\system32\SET488.tmp
c:\windows\system32\SET489.tmp
c:\windows\system32\SET48A.tmp
c:\windows\system32\SET48B.tmp
c:\windows\system32\SET48C.tmp
c:\windows\system32\SET48D.tmp
c:\windows\system32\SET48E.tmp
c:\windows\system32\SET48F.tmp
c:\windows\system32\SET49.tmp
c:\windows\system32\SET490.tmp
c:\windows\system32\SET491.tmp
c:\windows\system32\SET492.tmp
c:\windows\system32\SET493.tmp
c:\windows\system32\SET495.tmp
c:\windows\system32\SET496.tmp
c:\windows\system32\SET497.tmp
c:\windows\system32\SET498.tmp
c:\windows\system32\SET499.tmp
c:\windows\system32\SET49A.tmp
c:\windows\system32\SET49B.tmp
c:\windows\system32\SET49C.tmp
c:\windows\system32\SET49D.tmp
c:\windows\system32\SET49E.tmp
c:\windows\system32\SET49F.tmp
c:\windows\system32\SET4A.tmp
c:\windows\system32\SET4A0.tmp
c:\windows\system32\SET4A1.tmp
c:\windows\system32\SET4A2.tmp
c:\windows\system32\SET4A3.tmp
c:\windows\system32\SET4A4.tmp
c:\windows\system32\SET4A5.tmp
c:\windows\system32\SET4A6.tmp
c:\windows\system32\SET4A7.tmp
c:\windows\system32\SET4A8.tmp
c:\windows\system32\SET4A9.tmp
c:\windows\system32\SET4AA.tmp
c:\windows\system32\SET4AB.tmp
c:\windows\system32\SET4AC.tmp
c:\windows\system32\SET4AD.tmp
c:\windows\system32\SET4AE.tmp
c:\windows\system32\SET4AF.tmp
c:\windows\system32\SET4B.tmp
c:\windows\system32\SET4B0.tmp
c:\windows\system32\SET4B1.tmp
c:\windows\system32\SET4B2.tmp
c:\windows\system32\SET4B3.tmp
c:\windows\system32\SET4B4.tmp
c:\windows\system32\SET4B5.tmp
c:\windows\system32\skinboxer43.dll
d:\my documents\~WRL0492.tmp
d:\my documents\~WRL0516.tmp
d:\my documents\~WRL0768.tmp
d:\my documents\~WRL0926.tmp
d:\my documents\~WRL1189.tmp
d:\my documents\~WRL1455.tmp
d:\my documents\~WRL2879.tmp
d:\my documents\~WRL3534.tmp
d:\my documents\~WRL3610.tmp
d:\my documents\SET26.tmp
d:\my documents\SETD.tmp
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_TELEVISIONFANATICSERVICE
-------\Legacy_TOTALRECIPESEARCH_14SERVICE
.
.
((((((((((((((((((((((((( Files Created from 2011-12-08 to 2012-01-08 )))))))))))))))))))))))))))))))
.
.
2012-01-07 01:06 . 2012-01-07 01:06 11776 ----a-w- c:\program files\Mozilla Firefox\plugins\nprjplug.dll
2012-01-07 01:06 . 2012-01-07 01:06 -------- d-----w- c:\program files\Common Files\xing shared
2012-01-07 01:06 . 2012-01-07 01:06 150696 ----a-w- c:\program files\Mozilla Firefox\plugins\nppl3260.dll
2012-01-07 01:06 . 2012-01-07 01:06 108544 ----a-w- c:\program files\Mozilla Firefox\plugins\nprpjplug.dll
2012-01-01 23:43 . 2012-01-01 23:43 -------- d-----w- c:\program files\ESET
2012-01-01 21:31 . 2012-01-01 21:31 124 ---ha-w- C:\aaw7boot.cmd
2012-01-01 02:32 . 2012-01-01 02:32 101720 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2012-01-01 02:09 . 2012-01-01 02:09 -------- d-----w- c:\documents and settings\Jerryberube\Local Settings\Application Data\adaware
2012-01-01 02:09 . 2012-01-08 21:02 -------- d-----w- c:\documents and settings\All Users\Application Data\Ad-Aware Browsing Protection
2012-01-01 02:09 . 2012-01-01 02:09 -------- d-----w- c:\program files\Toolbar Cleaner
2012-01-01 02:09 . 2012-01-03 02:12 -------- d-----w- c:\documents and settings\Jerryberube\Application Data\adawaretb
2012-01-01 02:09 . 2012-01-01 02:09 -------- d-----w- c:\program files\adawaretb
2012-01-01 02:09 . 2012-01-01 02:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2012-01-01 02:09 . 2012-01-01 02:09 -------- d-----w- c:\program files\Lavasoft
2012-01-01 02:01 . 2012-01-02 01:33 -------- d-----w- c:\program files\Spybot - Search & Destroy
2012-01-01 02:01 . 2012-01-02 01:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2011-12-29 15:54 . 2011-12-29 15:54 -------- d-----w- c:\windows\system32\wbem\Repository
2011-12-28 19:22 . 2011-12-29 15:50 -------- d-----w- c:\program files\PopUp Killer
2011-12-14 21:40 . 2011-12-29 15:52 -------- d-----w- c:\program files\PlayItAll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-01-07 01:06 . 2003-03-19 01:14 499712 ----a-w- c:\windows\system32\msvcp71.dll
2012-01-07 01:06 . 2003-02-21 09:42 348160 ----a-w- c:\windows\system32\msvcr71.dll
2011-12-10 21:24 . 2010-12-20 21:06 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-11-23 13:25 . 2005-08-16 12:18 1859584 ----a-w- c:\windows\system32\win32k.sys
2011-11-04 19:20 . 2005-08-16 12:18 916992 ----a-w- c:\windows\system32\wininet.dll
2011-11-04 19:20 . 2005-08-16 12:18 43520 ------w- c:\windows\system32\licmgr10.dll
2011-11-04 19:20 . 2005-08-16 12:18 1469440 ------w- c:\windows\system32\inetcpl.cpl
2011-11-04 11:23 . 2005-08-16 12:18 385024 ----a-w- c:\windows\system32\html.iec
2011-11-01 16:07 . 2005-08-16 12:18 1288704 ----a-w- c:\windows\system32\ole32.dll
2011-10-28 05:31 . 2005-08-16 12:18 33280 ----a-w- c:\windows\system32\csrsrv.dll
2011-10-25 13:37 . 2005-08-16 12:18 2148864 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-10-25 12:52 . 2004-08-04 06:59 2027008 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-10-14 23:38 . 2005-08-16 12:18 456192 ----a-w- c:\windows\system32\encdec.dll
2011-07-08 07:16 . 2011-07-12 16:23 142296 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{6c97a91e-4524-4019-86af-2aa2d567bf5c}]
2011-10-21 09:10 87440 ----a-w- c:\program files\adawaretb\adawareDx.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{6c97a91e-4524-4019-86af-2aa2d567bf5c}"= "c:\program files\adawaretb\adawareDx.dll" [2011-10-21 87440]
.
[HKEY_CLASSES_ROOT\clsid\{6c97a91e-4524-4019-86af-2aa2d567bf5c}]
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Microsoft Location Finder"="c:\program files\Microsoft Location Finder\LocationFinder.exe" [2005-08-24 101080]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2010-03-14 39408]
"LDM"="d:\my documents\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe" [2010-11-29 67128]
"RoboForm"="c:\program files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe" [2011-09-25 107000]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray"="c:\windows\ehome\ehtray.exe" [2005-09-29 67584]
"Logitech Hardware Abstraction Layer"="KHALMNPR.EXE" [2009-06-17 55824]
"DMXLauncher"="c:\program files\dell\media experience\dmxlauncher.exe" [2005-10-05 94208]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 10.0\Reader\Reader_sl.exe" [2011-09-05 35736]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
"CanonMyPrinter"="c:\program files\Canon\MyPrinter\BJMyPrt.exe" [2010-03-25 2516296]
"CanonSolutionMenuEx"="c:\program files\Canon\Solution Menu EX\CNSEMAIN.EXE" [2010-04-02 1185112]
"MMTray"="c:\program files\Musicmatch\Musicmatch Jukebox\mm_tray.exe" [2005-05-03 135168]
"MediaLifeService"="d:\my documents\SetPoint\MediaLife\MediaLifeService.exe" [2005-05-13 110739]
"mmtask"="c:\program files\Musicmatch\Musicmatch Jukebox\mmtask.exe" [2005-05-03 53248]
"RegWork"="c:\program files\RegWork\RegWork.exe" [2011-02-15 13945712]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-04-08 254696]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2009-06-17 55824]
"Ad-Aware Browsing Protection"="c:\documents and settings\All Users\Application Data\Ad-Aware Browsing Protection\adawarebp.exe" [2011-10-21 198032]
"TkBellExe"="c:\program files\real\realplayer\update\realsched.exe" [2012-01-07 296056]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Logitech Desktop Messenger Agent.lnk - d:\my documents\Desktop Messenger\8876480\Program\LDMConf.exe [2010-11-29 226832]
Logitech SetPoint.lnk - d:\my documents\SetPoint\SetPoint\SetPoint.exe [2011-8-25 813584]
Windows Search.lnk - c:\program files\Windows Desktop Search\WindowsSearch.exe [2008-5-26 123904]
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"NoSecCPL"= 0 (0x0)
"NoDevMgrPage"= 0 (0x0)
"NoConfigPage"= 0 (0x0)
"NoVirtMemPage"= 0 (0x0)
"NoFileSysPage"= 0 (0x0)
"NoNetSetup"= 0 (0x0)
"NoNetSetupIDPage"= 0 (0x0)
"NoNetSetupSecurityPage"= 0 (0x0)
"NoWorkgroupContents"= 0 (0x0)
"NoEntireNetwork"= 0 (0x0)
"NoFileSharingControl"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
"Userinit"="c:\windows\system32\userinit.exe,,SKEYS /I"
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
2009-07-20 17:28 72208 ----a-w- c:\program files\Common Files\Logitech\Bluetooth\LBTWLgn.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\mmc.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Vuze\\Azureus.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"d:\\My Documents\\My Pictures\\magicJackOutlookAddin.exe"=
"c:\\Program Files\\adawaretb\\dtUser.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
"5985:TCP"= 5985:TCP:*:Disabled:Windows Remote Management
.
R2 nlsX86cc;Nalpeiron Licensing Service;c:\windows\system32\nlssrv32.exe [6/7/2009 6:20 AM 61440]
R3 LEqdUsb;Logitech SetPoint Unifying KMDF USB Filter;c:\windows\system32\drivers\LEqdUsb.sys [6/17/2009 10:55 AM 40720]
R3 LHidEqd;Logitech SetPoint Unifying KMDF HID Filter;c:\windows\system32\drivers\LHidEqd.sys [6/17/2009 10:55 AM 10384]
S1 MpKsl29f6d22f;MpKsl29f6d22f;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{BB09EE94-FD70-406C-A95A-8B670F878115}\MpKsl29f6d22f.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{BB09EE94-FD70-406C-A95A-8B670F878115}\MpKsl29f6d22f.sys [?]
S1 MpKslc3a340ec;MpKslc3a340ec;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{62C5E6F6-C8D2-4E38-8920-D4A2B0C76355}\MpKslc3a340ec.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{62C5E6F6-C8D2-4E38-8920-D4A2B0C76355}\MpKslc3a340ec.sys [?]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3/18/2010 12:16 PM 130384]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [3/14/2010 12:59 PM 135664]
S2 WinDefend;Windows Defender;"c:\program files\Windows Defender\MsMpEng.exe" --> c:\program files\Windows Defender\MsMpEng.exe [?]
S3 ATICDSDr;ATICDSDr;c:\dell\drivers\R119714\BIN\atiicdxx.sys [7/22/2009 5:49 PM 6144]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [3/14/2010 12:59 PM 135664]
S3 WinRM;Windows Remote Management (WS-Management);c:\windows\system32\svchost.exe -k WINRM [8/16/2005 6:18 AM 14336]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [3/18/2010 12:16 PM 753504]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WINRM REG_MULTI_SZ WINRM
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{A509B1FF-37FF-4bFF-8CFF-4F3A747040FF}]
2009-03-08 10:32 128512 ----a-w- c:\windows\system32\advpack.dll
.
Contents of the 'Scheduled Tasks' folder
.
2012-01-08 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-03-14 18:59]
.
2012-01-08 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-03-14 18:59]
.
2012-01-08 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-3062792194-1690480861-4063121711-1005Core.job
- c:\documents and settings\Jerryberube\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-28 03:41]
.
2012-01-08 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-3062792194-1690480861-4063121711-1005UA.job
- c:\documents and settings\Jerryberube\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-28 03:41]
.
2012-01-08 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-3062792194-1690480861-4063121711-1005.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2011-11-29 22:02]
.
2012-01-07 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-3062792194-1690480861-4063121711-1005.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2011-11-29 22:02]
.
2012-01-06 c:\windows\Tasks\Regwork.job
- c:\program files\RegWork\RegWork.exe [2011-02-18 00:17]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://my.yahoo.com/
uSearchAssistant =
IE: Customize Menu - file://c:\program files\Siber Systems\AI RoboForm\RoboFormComCustomizeIEMenu.html
IE: Fill Forms - file://c:\program files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
IE: RoboForm Toolbar - file://c:\program files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
IE: Save Forms - file://c:\program files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
TCP: DhcpNameServer = 192.168.2.1
Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - d:\my documents\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll
FF - ProfilePath - c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/?pc=Z125&ocid=zdhp&install_date=20111214
FF - prefs.js: keyword.URL - hxxp://www.bing.com/search?pc=Z125&form=ZGAADF&install_date=20111214&q=
FF - prefs.js: browser.search.selectedEngine - Search the Web
FF - user.js: browser.cache.memory.capacity - 16000
FF - user.js: browser.chrome.favicons - fales
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: content.max.tokenizing.time - 2250000
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 750000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 750000
FF - user.js: dom.disable_window_status_change - true
FF - user.js: network.http.max-connections - 32
FF - user.js: network.http.max-connections-per-server - 8
FF - user.js: network.http.max-persistent-connections-per-proxy - 8
FF - user.js: network.http.max-persistent-connections-per-server - 4
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.firstrequest - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 750
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0
.
- - - - ORPHANS REMOVED - - - -
.
WebBrowser-{DAB35D68-1CDC-4375-8333-D7BBCEE3C0A0} - (no file)
WebBrowser-{D4027C7F-154A-4066-A1AD-4243D8127440} - (no file)
HKLM-Run-QuickTime Task - c:\program files\QuickTime\qttask.exe
HKLM-Run-POINTER - point32.exe
HKLM-Run-MSC - c:\program files\Microsoft Security Client\msseces.exe
AddRemove-Adobe Shockwave Player - c:\windows\system32\Adobe\Shockwave 11\uninstaller.exe
AddRemove-Macromedia Shockwave Player - c:\windows\system32\Macromed\SHOCKW~1\UNWISE.EXE
AddRemove-Money2006b - c:\program files\microsoft money 2006\MNYCoreFiles\Setup\uninst.exe
AddRemove-PictureItPrem_v11 - c:\program files\Common Files\Microsoft Shared\Picture It!\RmvSuite.exe
AddRemove-Google Chrome - c:\documents and settings\Jerryberube\Local Settings\Application Data\Google\Chrome\Application\15.0.874.106\Installer\setup.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-01-08 15:02
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3062792194-1690480861-4063121711-1005\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(648)
c:\program files\common files\logitech\bluetooth\LBTWlgn.dll
c:\program files\common files\logitech\bluetooth\LBTServ.dll
.
- - - - - - - > 'explorer.exe'(1828)
c:\windows\system32\WININET.dll
c:\documents and settings\All Users\Application Data\Ad-Aware Browsing Protection\adawarebp.dll
d:\my documents\SetPoint\SetPoint\lgscroll.dll
c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86\MSVCR80.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\IEFRAME.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\eHome\ehRecvr.exe
c:\windows\eHome\ehSched.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
c:\windows\system32\skeys.exe
c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe
c:\windows\system32\SearchIndexer.exe
c:\windows\eHome\ehmsas.exe
c:\windows\system32\dllhost.exe
c:\docume~1\JERRYB~1\LOCALS~1\Temp\bwgo0000c5e0.exe
c:\program files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2012-01-08 15:05:55 - machine was rebooted
ComboFix-quarantined-files.txt 2012-01-08 21:05
.
Pre-Run: 65,141,407,744 bytes free
Post-Run: 67,783,131,136 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Windows XP Media Center Edition" /fastdetect /NoExecute=OptIn
.
- - End Of File - - BED7CF12D94C49A52D488BC10E265D6B

Attached Files



#5 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:30 PM

Posted 09 January 2012 - 01:22 PM

Hi Bubba7827,

Looking good. :thumbup2:

Please open notepad and copy/paste the text in the quotebox below into it:

http://www.bleepingcomputer.com/forums/topic435779.html

KillAll::

Collect::
c:\docume~1\JERRYB~1\LOCALS~1\Temp\bwgo0000c5e0.exe

Suspect::
c:\windows\system32\skeys.exe

Registry::
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\Windows\\system32\\userinit.exe,"

Save this as CFScript.txt


Posted Image


Refering to the picture above, drag CFScript.txt into ComboFix.exe

When finished, it shall produce a log for you. Post that log in your next reply.

**Note**

When CF finishes running, the ComboFix log will open along with a message box--do not be alarmed. With the above script, ComboFix will capture files to submit for analysis.
  • Ensure you are connected to the internet and click OK on the message box.

Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#6 Bubba7827

Bubba7827
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:12:30 PM

Posted 09 January 2012 - 07:15 PM

ok. still having the same problemm with combofix detecting an active antivirus running. I opened the services again and disables widows security again and again combofix reported the antivirus still running but i dont know which one and dont know how to stop it. combofix ran even though the antivirus wasn not disabled and warned me "at my own risk".

also, a window came up asking if I want to upgrade combofix to the latest version. I declined.

ComboFix 12-01-07.03 - Jerryberube 01/09/2012 17:59:16.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3582.2975 [GMT -6:00]
Running from: c:\documents and settings\Jerryberube\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Jerryberube\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
file zipped: c:\docume~1\JERRYB~1\LOCALS~1\Temp\bwgo0000c5e0.exe
file zipped: c:\windows\system32\skeys.exe
.
ADS - WINDOWS: deleted 64 bytes in 1 streams.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\docume~1\JERRYB~1\LOCALS~1\Temp\bwgo0000c5e0.exe
c:\windows\system32\SET4B6.tmp
c:\windows\system32\SET4B7.tmp
c:\windows\system32\SET4B9.tmp
c:\windows\system32\SET4BA.tmp
c:\windows\system32\SET4BB.tmp
c:\windows\system32\SET4BC.tmp
c:\windows\system32\SET4BD.tmp
c:\windows\system32\SET4BE.tmp
c:\windows\system32\SET4BF.tmp
c:\windows\system32\SET4C.tmp
c:\windows\system32\SET4C0.tmp
c:\windows\system32\SET4C1.tmp
c:\windows\system32\SET4C2.tmp
c:\windows\system32\SET4C3.tmp
c:\windows\system32\SET4C4.tmp
c:\windows\system32\SET4C5.tmp
c:\windows\system32\SET4C6.tmp
c:\windows\system32\SET4C7.tmp
c:\windows\system32\SET4C8.tmp
c:\windows\system32\SET4C9.tmp
c:\windows\system32\SET4CA.tmp
c:\windows\system32\SET4CB.tmp
c:\windows\system32\SET4CC.tmp
c:\windows\system32\SET4CD.tmp
c:\windows\system32\SET4CE.tmp
c:\windows\system32\SET4CF.tmp
c:\windows\system32\SET4D.tmp
c:\windows\system32\SET4D0.tmp
c:\windows\system32\SET4D1.tmp
c:\windows\system32\SET4D2.tmp
c:\windows\system32\SET4D3.tmp
c:\windows\system32\SET4D4.tmp
c:\windows\system32\SET4D5.tmp
c:\windows\system32\SET4D6.tmp
c:\windows\system32\SET4D7.tmp
c:\windows\system32\SET4D8.tmp
c:\windows\system32\SET4D9.tmp
c:\windows\system32\SET4DA.tmp
c:\windows\system32\SET4DB.tmp
c:\windows\system32\SET4DD.tmp
c:\windows\system32\SET4DE.tmp
c:\windows\system32\SET4DF.tmp
c:\windows\system32\SET4E.tmp
c:\windows\system32\SET4E0.tmp
c:\windows\system32\SET4E1.tmp
c:\windows\system32\SET4E2.tmp
c:\windows\system32\SET4E3.tmp
c:\windows\system32\SET4E4.tmp
c:\windows\system32\SET4E5.tmp
c:\windows\system32\SET4E6.tmp
c:\windows\system32\SET4E7.tmp
c:\windows\system32\SET4E8.tmp
c:\windows\system32\SET4E9.tmp
c:\windows\system32\SET4EA.tmp
c:\windows\system32\SET4EB.tmp
c:\windows\system32\SET4EC.tmp
c:\windows\system32\SET4ED.tmp
c:\windows\system32\SET4EE.tmp
c:\windows\system32\SET4EF.tmp
c:\windows\system32\SET4F.tmp
c:\windows\system32\SET4F0.tmp
c:\windows\system32\SET4F1.tmp
c:\windows\system32\SET4F2.tmp
c:\windows\system32\SET4F3.tmp
c:\windows\system32\SET4F4.tmp
c:\windows\system32\SET4F5.tmp
c:\windows\system32\SET4F6.tmp
c:\windows\system32\SET4F7.tmp
c:\windows\system32\SET4F8.tmp
c:\windows\system32\SET4F9.tmp
c:\windows\system32\SET4FA.tmp
c:\windows\system32\SET4FB.tmp
c:\windows\system32\SET4FC.tmp
c:\windows\system32\SET4FD.tmp
c:\windows\system32\SET4FE.tmp
c:\windows\system32\SET4FF.tmp
c:\windows\system32\SET50.tmp
c:\windows\system32\SET501.tmp
c:\windows\system32\SET502.tmp
c:\windows\system32\SET503.tmp
c:\windows\system32\SET504.tmp
c:\windows\system32\SET505.tmp
c:\windows\system32\SET506.tmp
c:\windows\system32\SET507.tmp
c:\windows\system32\SET508.tmp
c:\windows\system32\SET509.tmp
c:\windows\system32\SET50A.tmp
c:\windows\system32\SET50B.tmp
c:\windows\system32\SET50C.tmp
c:\windows\system32\SET50D.tmp
c:\windows\system32\SET50E.tmp
c:\windows\system32\SET50F.tmp
c:\windows\system32\SET51.tmp
c:\windows\system32\SET510.tmp
c:\windows\system32\SET511.tmp
c:\windows\system32\SET512.tmp
c:\windows\system32\SET513.tmp
c:\windows\system32\SET514.tmp
c:\windows\system32\SET516.tmp
c:\windows\system32\SET517.tmp
c:\windows\system32\SET518.tmp
c:\windows\system32\SET519.tmp
c:\windows\system32\SET51A.tmp
c:\windows\system32\SET51B.tmp
c:\windows\system32\SET51C.tmp
c:\windows\system32\SET51D.tmp
c:\windows\system32\SET51E.tmp
c:\windows\system32\SET51F.tmp
c:\windows\system32\SET52.tmp
c:\windows\system32\SET520.tmp
c:\windows\system32\SET521.tmp
c:\windows\system32\SET522.tmp
c:\windows\system32\SET523.tmp
c:\windows\system32\SET524.tmp
c:\windows\system32\SET525.tmp
c:\windows\system32\SET526.tmp
c:\windows\system32\SET527.tmp
c:\windows\system32\SET528.tmp
c:\windows\system32\SET529.tmp
c:\windows\system32\SET52A.tmp
c:\windows\system32\SET52B.tmp
c:\windows\system32\SET52C.tmp
c:\windows\system32\SET52D.tmp
c:\windows\system32\SET52E.tmp
c:\windows\system32\SET52F.tmp
c:\windows\system32\SET53.tmp
c:\windows\system32\SET530.tmp
c:\windows\system32\SET531.tmp
c:\windows\system32\SET532.tmp
c:\windows\system32\SET533.tmp
c:\windows\system32\SET534.tmp
c:\windows\system32\SET535.tmp
c:\windows\system32\SET536.tmp
c:\windows\system32\SET537.tmp
c:\windows\system32\SET538.tmp
c:\windows\system32\SET539.tmp
c:\windows\system32\SET53A.tmp
c:\windows\system32\SET53B.tmp
c:\windows\system32\SET53C.tmp
c:\windows\system32\SET53D.tmp
c:\windows\system32\SET53E.tmp
c:\windows\system32\SET53F.tmp
c:\windows\system32\SET54.tmp
c:\windows\system32\SET540.tmp
c:\windows\system32\SET541.tmp
c:\windows\system32\SET542.tmp
c:\windows\system32\SET543.tmp
c:\windows\system32\SET544.tmp
c:\windows\system32\SET545.tmp
c:\windows\system32\SET546.tmp
c:\windows\system32\SET547.tmp
c:\windows\system32\SET548.tmp
c:\windows\system32\SET54A.tmp
c:\windows\system32\SET54B.tmp
c:\windows\system32\SET54C.tmp
c:\windows\system32\SET54D.tmp
c:\windows\system32\SET54E.tmp
c:\windows\system32\SET54F.tmp
c:\windows\system32\SET55.tmp
c:\windows\system32\SET550.tmp
c:\windows\system32\SET551.tmp
c:\windows\system32\SET552.tmp
c:\windows\system32\SET553.tmp
c:\windows\system32\SET554.tmp
c:\windows\system32\SET555.tmp
c:\windows\system32\SET556.tmp
c:\windows\system32\SET557.tmp
c:\windows\system32\SET558.tmp
c:\windows\system32\SET559.tmp
c:\windows\system32\SET55A.tmp
c:\windows\system32\SET55B.tmp
c:\windows\system32\SET55C.tmp
c:\windows\system32\SET55D.tmp
c:\windows\system32\SET55E.tmp
c:\windows\system32\SET55F.tmp
c:\windows\system32\SET56.tmp
c:\windows\system32\SET560.tmp
c:\windows\system32\SET561.tmp
c:\windows\system32\SET562.tmp
c:\windows\system32\SET563.tmp
c:\windows\system32\SET564.tmp
c:\windows\system32\SET565.tmp
c:\windows\system32\SET566.tmp
c:\windows\system32\SET567.tmp
c:\windows\system32\SET568.tmp
c:\windows\system32\SET569.tmp
c:\windows\system32\SET56A.tmp
c:\windows\system32\SET56B.tmp
c:\windows\system32\SET56D.tmp
c:\windows\system32\SET56E.tmp
c:\windows\system32\SET56F.tmp
c:\windows\system32\SET57.tmp
c:\windows\system32\SET570.tmp
c:\windows\system32\SET571.tmp
c:\windows\system32\SET572.tmp
c:\windows\system32\SET573.tmp
c:\windows\system32\SET574.tmp
c:\windows\system32\SET575.tmp
c:\windows\system32\SET576.tmp
c:\windows\system32\SET577.tmp
c:\windows\system32\SET578.tmp
c:\windows\system32\SET579.tmp
c:\windows\system32\SET57A.tmp
c:\windows\system32\SET57B.tmp
c:\windows\system32\SET57C.tmp
c:\windows\system32\SET57D.tmp
c:\windows\system32\SET57E.tmp
c:\windows\system32\SET57F.tmp
c:\windows\system32\SET58.tmp
c:\windows\system32\SET580.tmp
c:\windows\system32\SET581.tmp
c:\windows\system32\SET582.tmp
c:\windows\system32\SET583.tmp
c:\windows\system32\SET584.tmp
c:\windows\system32\SET585.tmp
c:\windows\system32\SET586.tmp
c:\windows\system32\SET587.tmp
c:\windows\system32\SET588.tmp
c:\windows\system32\SET589.tmp
c:\windows\system32\SET58A.tmp
c:\windows\system32\SET58B.tmp
c:\windows\system32\SET58C.tmp
c:\windows\system32\SET58D.tmp
c:\windows\system32\SET58E.tmp
c:\windows\system32\SET58F.tmp
c:\windows\system32\SET59.tmp
c:\windows\system32\SET591.tmp
c:\windows\system32\SET592.tmp
c:\windows\system32\SET593.tmp
c:\windows\system32\SET594.tmp
c:\windows\system32\SET595.tmp
c:\windows\system32\SET596.tmp
c:\windows\system32\SET597.tmp
c:\windows\system32\SET598.tmp
c:\windows\system32\SET599.tmp
c:\windows\system32\SET59A.tmp
c:\windows\system32\SET59B.tmp
c:\windows\system32\SET59C.tmp
c:\windows\system32\SET59D.tmp
c:\windows\system32\SET59E.tmp
c:\windows\system32\SET59F.tmp
c:\windows\system32\SET5A.tmp
c:\windows\system32\SET5A0.tmp
c:\windows\system32\SET5A1.tmp
c:\windows\system32\SET5A2.tmp
c:\windows\system32\SET5A3.tmp
c:\windows\system32\SET5A4.tmp
c:\windows\system32\SET5A5.tmp
c:\windows\system32\SET5A6.tmp
c:\windows\system32\SET5A7.tmp
c:\windows\system32\SET5A8.tmp
c:\windows\system32\SET5A9.tmp
c:\windows\system32\SET5AA.tmp
c:\windows\system32\SET5AB.tmp
c:\windows\system32\SET5AC.tmp
c:\windows\system32\SET5AD.tmp
c:\windows\system32\SET5AE.tmp
c:\windows\system32\SET5AF.tmp
c:\windows\system32\SET5B.tmp
c:\windows\system32\SET5B0.tmp
c:\windows\system32\SET5B1.tmp
c:\windows\system32\SET5B2.tmp
c:\windows\system32\SET5B3.tmp
c:\windows\system32\SET5B5.tmp
c:\windows\system32\SET5B6.tmp
c:\windows\system32\SET5B7.tmp
c:\windows\system32\SET5B8.tmp
c:\windows\system32\SET5B9.tmp
c:\windows\system32\SET5BA.tmp
c:\windows\system32\SET5BB.tmp
c:\windows\system32\SET5BC.tmp
c:\windows\system32\SET5BD.tmp
c:\windows\system32\SET5BE.tmp
c:\windows\system32\SET5BF.tmp
c:\windows\system32\SET5C0.tmp
c:\windows\system32\SET5C1.tmp
c:\windows\system32\SET5C2.tmp
c:\windows\system32\SET5C3.tmp
c:\windows\system32\SET5C4.tmp
c:\windows\system32\SET5C5.tmp
c:\windows\system32\SET5C7.tmp
c:\windows\system32\SET5C8.tmp
c:\windows\system32\SET5C9.tmp
c:\windows\system32\SET5CA.tmp
c:\windows\system32\SET5CB.tmp
c:\windows\system32\SET5CC.tmp
c:\windows\system32\SET5CD.tmp
c:\windows\system32\SET5CE.tmp
c:\windows\system32\SET5CF.tmp
c:\windows\system32\SET5D.tmp
c:\windows\system32\SET5D0.tmp
c:\windows\system32\SET5D1.tmp
c:\windows\system32\SET5D2.tmp
c:\windows\system32\SET5D3.tmp
c:\windows\system32\SET5D4.tmp
c:\windows\system32\SET5D5.tmp
c:\windows\system32\SET5D6.tmp
c:\windows\system32\SET5D7.tmp
c:\windows\system32\SET5D8.tmp
c:\windows\system32\SET5D9.tmp
c:\windows\system32\SET5DA.tmp
c:\windows\system32\SET5DB.tmp
c:\windows\system32\SET5DC.tmp
c:\windows\system32\SET5DD.tmp
c:\windows\system32\SET5DE.tmp
c:\windows\system32\SET5DF.tmp
c:\windows\system32\SET5E.tmp
c:\windows\system32\SET5E0.tmp
c:\windows\system32\SET5E1.tmp
c:\windows\system32\SET5E2.tmp
c:\windows\system32\SET5E3.tmp
c:\windows\system32\SET5E4.tmp
c:\windows\system32\SET5E5.tmp
c:\windows\system32\SET5E6.tmp
c:\windows\system32\SET5E7.tmp
c:\windows\system32\SET5E8.tmp
c:\windows\system32\SET5E9.tmp
c:\windows\system32\SET5EA.tmp
c:\windows\system32\SET5EB.tmp
c:\windows\system32\SET5EC.tmp
c:\windows\system32\SET5ED.tmp
c:\windows\system32\SET5EE.tmp
c:\windows\system32\SET5EF.tmp
c:\windows\system32\SET5F.tmp
c:\windows\system32\SET5F0.tmp
c:\windows\system32\SET5F1.tmp
c:\windows\system32\SET5F2.tmp
c:\windows\system32\SET5F3.tmp
c:\windows\system32\SET5F4.tmp
c:\windows\system32\SET5F5.tmp
c:\windows\system32\SET5F6.tmp
c:\windows\system32\SET5F7.tmp
c:\windows\system32\SET5F8.tmp
c:\windows\system32\SET5F9.tmp
c:\windows\system32\SET5FA.tmp
c:\windows\system32\SET5FB.tmp
c:\windows\system32\SET5FC.tmp
c:\windows\system32\SET5FE.tmp
c:\windows\system32\SET5FF.tmp
c:\windows\system32\SET60.tmp
c:\windows\system32\SET600.tmp
c:\windows\system32\SET601.tmp
c:\windows\system32\SET602.tmp
c:\windows\system32\SET603.tmp
c:\windows\system32\SET604.tmp
c:\windows\system32\SET605.tmp
c:\windows\system32\SET606.tmp
c:\windows\system32\SET607.tmp
c:\windows\system32\SET608.tmp
c:\windows\system32\SET609.tmp
c:\windows\system32\SET60A.tmp
c:\windows\system32\SET60B.tmp
c:\windows\system32\SET60C.tmp
c:\windows\system32\SET60D.tmp
c:\windows\system32\SET60E.tmp
c:\windows\system32\SET60F.tmp
c:\windows\system32\SET61.tmp
c:\windows\system32\SET610.tmp
c:\windows\system32\SET611.tmp
c:\windows\system32\SET612.tmp
c:\windows\system32\SET613.tmp
c:\windows\system32\SET614.tmp
c:\windows\system32\SET615.tmp
c:\windows\system32\SET616.tmp
c:\windows\system32\SET617.tmp
c:\windows\system32\SET618.tmp
c:\windows\system32\SET619.tmp
c:\windows\system32\SET61A.tmp
c:\windows\system32\SET61B.tmp
c:\windows\system32\SET61C.tmp
c:\windows\system32\SET61D.tmp
c:\windows\system32\SET61E.tmp
c:\windows\system32\SET61F.tmp
c:\windows\system32\SET62.tmp
c:\windows\system32\SET620.tmp
c:\windows\system32\SET622.tmp
c:\windows\system32\SET623.tmp
c:\windows\system32\SET624.tmp
c:\windows\system32\SET625.tmp
c:\windows\system32\SET626.tmp
c:\windows\system32\SET627.tmp
c:\windows\system32\SET628.tmp
c:\windows\system32\SET629.tmp
c:\windows\system32\SET62A.tmp
c:\windows\system32\SET62B.tmp
c:\windows\system32\SET62C.tmp
c:\windows\system32\SET62D.tmp
c:\windows\system32\SET62E.tmp
c:\windows\system32\SET62F.tmp
c:\windows\system32\SET63.tmp
c:\windows\system32\SET630.tmp
c:\windows\system32\SET631.tmp
c:\windows\system32\SET632.tmp
c:\windows\system32\SET633.tmp
c:\windows\system32\SET634.tmp
c:\windows\system32\SET635.tmp
c:\windows\system32\SET636.tmp
c:\windows\system32\SET637.tmp
c:\windows\system32\SET638.tmp
c:\windows\system32\SET639.tmp
c:\windows\system32\SET63A.tmp
c:\windows\system32\SET63B.tmp
c:\windows\system32\SET63C.tmp
c:\windows\system32\SET63D.tmp
c:\windows\system32\SET63E.tmp
c:\windows\system32\SET63F.tmp
c:\windows\system32\SET64.tmp
c:\windows\system32\SET640.tmp
c:\windows\system32\SET641.tmp
c:\windows\system32\SET642.tmp
c:\windows\system32\SET643.tmp
c:\windows\system32\SET644.tmp
c:\windows\system32\SET646.tmp
c:\windows\system32\SET647.tmp
c:\windows\system32\SET648.tmp
c:\windows\system32\SET649.tmp
c:\windows\system32\SET64A.tmp
c:\windows\system32\SET64B.tmp
c:\windows\system32\SET64C.tmp
c:\windows\system32\SET64D.tmp
c:\windows\system32\SET64E.tmp
c:\windows\system32\SET64F.tmp
c:\windows\system32\SET65.tmp
c:\windows\system32\SET650.tmp
c:\windows\system32\SET651.tmp
c:\windows\system32\SET652.tmp
c:\windows\system32\SET653.tmp
c:\windows\system32\SET654.tmp
c:\windows\system32\SET655.tmp
c:\windows\system32\SET656.tmp
c:\windows\system32\SET657.tmp
c:\windows\system32\SET658.tmp
c:\windows\system32\SET659.tmp
c:\windows\system32\SET65A.tmp
c:\windows\system32\SET65B.tmp
c:\windows\system32\SET66.tmp
c:\windows\system32\SET67.tmp
c:\windows\system32\SET68.tmp
c:\windows\system32\SET69.tmp
c:\windows\system32\SET6A.tmp
c:\windows\system32\SET6B.tmp
c:\windows\system32\SET6C.tmp
c:\windows\system32\SET6CC.tmp
c:\windows\system32\SET6D.tmp
c:\windows\system32\SET6D1.tmp
c:\windows\system32\SET6D2.tmp
c:\windows\system32\SET6D4.tmp
c:\windows\system32\SET6D5.tmp
c:\windows\system32\SET6D6.tmp
c:\windows\system32\SET6D7.tmp
c:\windows\system32\SET6E.tmp
c:\windows\system32\SET6F.tmp
c:\windows\system32\SET7.tmp
c:\windows\system32\SET70.tmp
c:\windows\system32\SET71.tmp
c:\windows\system32\SET72.tmp
c:\windows\system32\SET73.tmp
c:\windows\system32\SET733.tmp
c:\windows\system32\SET734.tmp
c:\windows\system32\SET735.tmp
c:\windows\system32\SET736.tmp
c:\windows\system32\SET737.tmp
c:\windows\system32\SET738.tmp
c:\windows\system32\SET739.tmp
c:\windows\system32\SET73A.tmp
c:\windows\system32\SET73B.tmp
c:\windows\system32\SET73C.tmp
c:\windows\system32\SET73D.tmp
c:\windows\system32\SET73E.tmp
c:\windows\system32\SET73F.tmp
c:\windows\system32\SET74.tmp
c:\windows\system32\SET741.tmp
c:\windows\system32\SET742.tmp
c:\windows\system32\SET743.tmp
c:\windows\system32\SET744.tmp
c:\windows\system32\SET745.tmp
c:\windows\system32\SET746.tmp
c:\windows\system32\SET747.tmp
c:\windows\system32\SET748.tmp
c:\windows\system32\SET749.tmp
c:\windows\system32\SET74A.tmp
c:\windows\system32\SET74B.tmp
c:\windows\system32\SET74C.tmp
c:\windows\system32\SET74D.tmp
c:\windows\system32\SET74E.tmp
c:\windows\system32\SET74F.tmp
c:\windows\system32\SET75.tmp
c:\windows\system32\SET750.tmp
c:\windows\system32\SET751.tmp
c:\windows\system32\SET752.tmp
c:\windows\system32\SET753.tmp
c:\windows\system32\SET754.tmp
c:\windows\system32\SET755.tmp
c:\windows\system32\SET756.tmp
c:\windows\system32\SET76.tmp
c:\windows\system32\SET77.tmp
c:\windows\system32\SET78.tmp
c:\windows\system32\SET79.tmp
c:\windows\system32\SET7A.tmp
c:\windows\system32\SET7B.tmp
c:\windows\system32\SET7C.tmp
c:\windows\system32\SET7D.tmp
c:\windows\system32\SET7E.tmp
c:\windows\system32\SET7F.tmp
c:\windows\system32\SET8.tmp
c:\windows\system32\SET80.tmp
c:\windows\system32\SET81.tmp
c:\windows\system32\SET82.tmp
c:\windows\system32\SET83.tmp
c:\windows\system32\SET84.tmp
c:\windows\system32\SET85.tmp
c:\windows\system32\SET86.tmp
c:\windows\system32\SET88.tmp
c:\windows\system32\SET89.tmp
c:\windows\system32\SET8A.tmp
c:\windows\system32\SET8B.tmp
c:\windows\system32\SET8C.tmp
c:\windows\system32\SET8D.tmp
c:\windows\system32\SET8E.tmp
c:\windows\system32\SET8F.tmp
c:\windows\system32\SET9.tmp
c:\windows\system32\SET90.tmp
c:\windows\system32\SET91.tmp
c:\windows\system32\SET92.tmp
c:\windows\system32\SET93.tmp
c:\windows\system32\SET94.tmp
c:\windows\system32\SET95.tmp
c:\windows\system32\SET96.tmp
c:\windows\system32\SET97.tmp
c:\windows\system32\SET98.tmp
c:\windows\system32\SET99.tmp
c:\windows\system32\SET9A.tmp
c:\windows\system32\SET9B.tmp
c:\windows\system32\SET9C.tmp
c:\windows\system32\SET9D.tmp
c:\windows\system32\SET9E.tmp
c:\windows\system32\SET9F.tmp
c:\windows\system32\SETA.tmp
c:\windows\system32\SETA0.tmp
c:\windows\system32\SETA1.tmp
c:\windows\system32\SETA2.tmp
c:\windows\system32\SETA3.tmp
c:\windows\system32\SETA5.tmp
c:\windows\system32\SETA6.tmp
c:\windows\system32\SETA7.tmp
c:\windows\system32\SETA8.tmp
c:\windows\system32\SETA9.tmp
c:\windows\system32\SETAA.tmp
c:\windows\system32\SETAB.tmp
c:\windows\system32\SETAC.tmp
c:\windows\system32\SETAD.tmp
c:\windows\system32\SETAE.tmp
c:\windows\system32\SETAF.tmp
c:\windows\system32\SETB.tmp
c:\windows\system32\SETB0.tmp
c:\windows\system32\SETB1.tmp
c:\windows\system32\SETB2.tmp
c:\windows\system32\SETB3.tmp
c:\windows\system32\SETB4.tmp
c:\windows\system32\SETB5.tmp
c:\windows\system32\SETB6.tmp
c:\windows\system32\SETB7.tmp
c:\windows\system32\SETB8.tmp
c:\windows\system32\SETB9.tmp
c:\windows\system32\SETBA.tmp
c:\windows\system32\SETBB.tmp
c:\windows\system32\SETBC.tmp
c:\windows\system32\SETBD.tmp
c:\windows\system32\SETBE.tmp
c:\windows\system32\SETBF.tmp
c:\windows\system32\SETC.tmp
c:\windows\system32\SETC0.tmp
c:\windows\system32\SETC1.tmp
c:\windows\system32\SETC2.tmp
c:\windows\system32\SETC3.tmp
c:\windows\system32\SETC4.tmp
c:\windows\system32\SETC5.tmp
c:\windows\system32\SETC6.tmp
c:\windows\system32\SETC7.tmp
c:\windows\system32\SETC9.tmp
c:\windows\system32\SETCA.tmp
c:\windows\system32\SETCB.tmp
c:\windows\system32\SETCC.tmp
c:\windows\system32\SETCD.tmp
c:\windows\system32\SETCE.tmp
c:\windows\system32\SETCF.tmp
c:\windows\system32\SETD.tmp
c:\windows\system32\SETD0.tmp
c:\windows\system32\SETD1.tmp
c:\windows\system32\SETD2.tmp
c:\windows\system32\SETD3.tmp
c:\windows\system32\SETD4.tmp
c:\windows\system32\SETD5.tmp
c:\windows\system32\SETD6.tmp
c:\windows\system32\SETD7.tmp
c:\windows\system32\SETD8.tmp
c:\windows\system32\SETD9.tmp
c:\windows\system32\SETDA.tmp
c:\windows\system32\SETDB.tmp
c:\windows\system32\SETDC.tmp
c:\windows\system32\SETDD.tmp
c:\windows\system32\SETDE.tmp
c:\windows\system32\SETDF.tmp
c:\windows\system32\SETE.tmp
c:\windows\system32\SETE0.tmp
c:\windows\system32\SETE1.tmp
c:\windows\system32\SETE2.tmp
c:\windows\system32\SETE3.tmp
c:\windows\system32\SETE4.tmp
c:\windows\system32\SETE5.tmp
c:\windows\system32\SETE6.tmp
c:\windows\system32\SETE7.tmp
c:\windows\system32\SETE8.tmp
c:\windows\system32\SETE9.tmp
c:\windows\system32\SETEA.tmp
c:\windows\system32\SETEB.tmp
c:\windows\system32\SETED.tmp
c:\windows\system32\SETEE.tmp
c:\windows\system32\SETEF.tmp
c:\windows\system32\SETF.tmp
c:\windows\system32\SETF0.tmp
c:\windows\system32\SETF1.tmp
c:\windows\system32\SETF2.tmp
c:\windows\system32\SETF3.tmp
c:\windows\system32\SETF4.tmp
c:\windows\system32\SETF5.tmp
c:\windows\system32\SETF6.tmp
c:\windows\system32\SETF7.tmp
c:\windows\system32\SETF8.tmp
c:\windows\system32\SETF9.tmp
c:\windows\system32\SETFA.tmp
c:\windows\system32\SETFB.tmp
c:\windows\system32\SETFC.tmp
c:\windows\system32\SETFD.tmp
c:\windows\system32\SETFE.tmp
c:\windows\system32\SETFF.tmp
.
.
((((((((((((((((((((((((( Files Created from 2011-12-10 to 2012-01-10 )))))))))))))))))))))))))))))))
.
.
2012-01-07 01:06 . 2012-01-07 01:06 11776 ----a-w- c:\program files\Mozilla Firefox\plugins\nprjplug.dll
2012-01-07 01:06 . 2012-01-07 01:06 -------- d-----w- c:\program files\Common Files\xing shared
2012-01-07 01:06 . 2012-01-07 01:06 150696 ----a-w- c:\program files\Mozilla Firefox\plugins\nppl3260.dll
2012-01-07 01:06 . 2012-01-07 01:06 108544 ----a-w- c:\program files\Mozilla Firefox\plugins\nprpjplug.dll
2012-01-01 23:43 . 2012-01-01 23:43 -------- d-----w- c:\program files\ESET
2012-01-01 21:31 . 2012-01-01 21:31 124 ---ha-w- C:\aaw7boot.cmd
2012-01-01 02:32 . 2012-01-01 02:32 101720 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2012-01-01 02:09 . 2012-01-01 02:09 -------- d-----w- c:\documents and settings\Jerryberube\Local Settings\Application Data\adaware
2012-01-01 02:09 . 2012-01-10 00:08 -------- d-----w- c:\documents and settings\All Users\Application Data\Ad-Aware Browsing Protection
2012-01-01 02:09 . 2012-01-01 02:09 -------- d-----w- c:\program files\Toolbar Cleaner
2012-01-01 02:09 . 2012-01-03 02:12 -------- d-----w- c:\documents and settings\Jerryberube\Application Data\adawaretb
2012-01-01 02:09 . 2012-01-01 02:09 -------- d-----w- c:\program files\adawaretb
2012-01-01 02:09 . 2012-01-01 02:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2012-01-01 02:09 . 2012-01-01 02:09 -------- d-----w- c:\program files\Lavasoft
2012-01-01 02:01 . 2012-01-02 01:33 -------- d-----w- c:\program files\Spybot - Search & Destroy
2012-01-01 02:01 . 2012-01-02 01:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2011-12-29 15:54 . 2011-12-29 15:54 -------- d-----w- c:\windows\system32\wbem\Repository
2011-12-28 19:22 . 2011-12-29 15:50 -------- d-----w- c:\program files\PopUp Killer
2011-12-14 21:40 . 2011-12-29 15:52 -------- d-----w- c:\program files\PlayItAll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-01-07 01:06 . 2003-03-19 01:14 499712 ----a-w- c:\windows\system32\msvcp71.dll
2012-01-07 01:06 . 2003-02-21 09:42 348160 ----a-w- c:\windows\system32\msvcr71.dll
2011-12-10 21:24 . 2010-12-20 21:06 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-11-23 13:25 . 2005-08-16 12:18 1859584 ----a-w- c:\windows\system32\win32k.sys
2011-11-04 19:20 . 2005-08-16 12:18 916992 ----a-w- c:\windows\system32\wininet.dll
2011-11-04 19:20 . 2005-08-16 12:18 43520 ------w- c:\windows\system32\licmgr10.dll
2011-11-04 19:20 . 2005-08-16 12:18 1469440 ------w- c:\windows\system32\inetcpl.cpl
2011-11-04 11:23 . 2005-08-16 12:18 385024 ----a-w- c:\windows\system32\html.iec
2011-11-01 16:07 . 2005-08-16 12:18 1288704 ----a-w- c:\windows\system32\ole32.dll
2011-10-28 05:31 . 2005-08-16 12:18 33280 ----a-w- c:\windows\system32\csrsrv.dll
2011-10-25 13:37 . 2005-08-16 12:18 2148864 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-10-25 12:52 . 2004-08-04 06:59 2027008 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-10-14 23:38 . 2005-08-16 12:18 456192 ----a-w- c:\windows\system32\encdec.dll
2011-07-08 07:16 . 2011-07-12 16:23 142296 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((( SnapShot@2012-01-08_21.01.53 )))))))))))))))))))))))))))))))))))))))))
.
+ 2012-01-10 00:08 . 2012-01-10 00:08 16384 c:\windows\temp\Perflib_Perfdata_51c.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{6c97a91e-4524-4019-86af-2aa2d567bf5c}]
2011-10-21 09:10 87440 ----a-w- c:\program files\adawaretb\adawareDx.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{6c97a91e-4524-4019-86af-2aa2d567bf5c}"= "c:\program files\adawaretb\adawareDx.dll" [2011-10-21 87440]
.
[HKEY_CLASSES_ROOT\clsid\{6c97a91e-4524-4019-86af-2aa2d567bf5c}]
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Microsoft Location Finder"="c:\program files\Microsoft Location Finder\LocationFinder.exe" [2005-08-24 101080]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2010-03-14 39408]
"LDM"="d:\my documents\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe" [2010-11-29 67128]
"RoboForm"="c:\program files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe" [2011-09-25 107000]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray"="c:\windows\ehome\ehtray.exe" [2005-09-29 67584]
"Logitech Hardware Abstraction Layer"="KHALMNPR.EXE" [2009-06-17 55824]
"DMXLauncher"="c:\program files\dell\media experience\dmxlauncher.exe" [2005-10-05 94208]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 10.0\Reader\Reader_sl.exe" [2011-09-05 35736]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
"CanonMyPrinter"="c:\program files\Canon\MyPrinter\BJMyPrt.exe" [2010-03-25 2516296]
"CanonSolutionMenuEx"="c:\program files\Canon\Solution Menu EX\CNSEMAIN.EXE" [2010-04-02 1185112]
"MMTray"="c:\program files\Musicmatch\Musicmatch Jukebox\mm_tray.exe" [2005-05-03 135168]
"MediaLifeService"="d:\my documents\SetPoint\MediaLife\MediaLifeService.exe" [2005-05-13 110739]
"mmtask"="c:\program files\Musicmatch\Musicmatch Jukebox\mmtask.exe" [2005-05-03 53248]
"RegWork"="c:\program files\RegWork\RegWork.exe" [2011-02-15 13945712]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-04-08 254696]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2009-06-17 55824]
"Ad-Aware Browsing Protection"="c:\documents and settings\All Users\Application Data\Ad-Aware Browsing Protection\adawarebp.exe" [2011-10-21 198032]
"TkBellExe"="c:\program files\real\realplayer\update\realsched.exe" [2012-01-07 296056]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Logitech Desktop Messenger Agent.lnk - d:\my documents\Desktop Messenger\8876480\Program\LDMConf.exe [2010-11-29 226832]
Logitech SetPoint.lnk - d:\my documents\SetPoint\SetPoint\SetPoint.exe [2011-8-25 813584]
Windows Search.lnk - c:\program files\Windows Desktop Search\WindowsSearch.exe [2008-5-26 123904]
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"NoSecCPL"= 0 (0x0)
"NoDevMgrPage"= 0 (0x0)
"NoConfigPage"= 0 (0x0)
"NoVirtMemPage"= 0 (0x0)
"NoFileSysPage"= 0 (0x0)
"NoNetSetup"= 0 (0x0)
"NoNetSetupIDPage"= 0 (0x0)
"NoNetSetupSecurityPage"= 0 (0x0)
"NoWorkgroupContents"= 0 (0x0)
"NoEntireNetwork"= 0 (0x0)
"NoFileSharingControl"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
"Userinit"="c:\windows\system32\userinit.exe,,SKEYS /I"
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
2009-07-20 17:28 72208 ----a-w- c:\program files\Common Files\Logitech\Bluetooth\LBTWLgn.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\mmc.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Vuze\\Azureus.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"d:\\My Documents\\My Pictures\\magicJackOutlookAddin.exe"=
"c:\\Program Files\\adawaretb\\dtUser.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
"5985:TCP"= 5985:TCP:*:Disabled:Windows Remote Management
.
R2 nlsX86cc;Nalpeiron Licensing Service;c:\windows\system32\nlssrv32.exe [6/7/2009 6:20 AM 61440]
R3 LEqdUsb;Logitech SetPoint Unifying KMDF USB Filter;c:\windows\system32\drivers\LEqdUsb.sys [6/17/2009 10:55 AM 40720]
R3 LHidEqd;Logitech SetPoint Unifying KMDF HID Filter;c:\windows\system32\drivers\LHidEqd.sys [6/17/2009 10:55 AM 10384]
S1 MpKsl29f6d22f;MpKsl29f6d22f;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{BB09EE94-FD70-406C-A95A-8B670F878115}\MpKsl29f6d22f.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{BB09EE94-FD70-406C-A95A-8B670F878115}\MpKsl29f6d22f.sys [?]
S1 MpKslc3a340ec;MpKslc3a340ec;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{62C5E6F6-C8D2-4E38-8920-D4A2B0C76355}\MpKslc3a340ec.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{62C5E6F6-C8D2-4E38-8920-D4A2B0C76355}\MpKslc3a340ec.sys [?]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3/18/2010 12:16 PM 130384]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [3/14/2010 12:59 PM 135664]
S2 WinDefend;Windows Defender;"c:\program files\Windows Defender\MsMpEng.exe" --> c:\program files\Windows Defender\MsMpEng.exe [?]
S3 ATICDSDr;ATICDSDr;c:\dell\drivers\R119714\BIN\atiicdxx.sys [7/22/2009 5:49 PM 6144]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [3/14/2010 12:59 PM 135664]
S3 WinRM;Windows Remote Management (WS-Management);c:\windows\system32\svchost.exe -k WINRM [8/16/2005 6:18 AM 14336]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [3/18/2010 12:16 PM 753504]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WINRM REG_MULTI_SZ WINRM
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{A509B1FF-37FF-4bFF-8CFF-4F3A747040FF}]
2009-03-08 10:32 128512 ----a-w- c:\windows\system32\advpack.dll
.
Contents of the 'Scheduled Tasks' folder
.
2012-01-10 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-03-14 18:59]
.
2012-01-09 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-03-14 18:59]
.
2012-01-09 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-3062792194-1690480861-4063121711-1005Core.job
- c:\documents and settings\Jerryberube\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-28 03:41]
.
2012-01-09 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-3062792194-1690480861-4063121711-1005UA.job
- c:\documents and settings\Jerryberube\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-28 03:41]
.
2012-01-10 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-3062792194-1690480861-4063121711-1005.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2011-11-29 22:02]
.
2012-01-07 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-3062792194-1690480861-4063121711-1005.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2011-11-29 22:02]
.
2012-01-06 c:\windows\Tasks\Regwork.job
- c:\program files\RegWork\RegWork.exe [2011-02-18 00:17]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://my.yahoo.com/
uSearchAssistant =
IE: Customize Menu - file://c:\program files\Siber Systems\AI RoboForm\RoboFormComCustomizeIEMenu.html
IE: Fill Forms - file://c:\program files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
IE: RoboForm Toolbar - file://c:\program files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
IE: Save Forms - file://c:\program files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
TCP: DhcpNameServer = 192.168.2.1
Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - d:\my documents\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll
FF - ProfilePath - c:\documents and settings\Jerryberube\Application Data\Mozilla\Firefox\Profiles\faiaf36i.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/?pc=Z125&ocid=zdhp&install_date=20111214
FF - prefs.js: keyword.URL - hxxp://www.bing.com/search?pc=Z125&form=ZGAADF&install_date=20111214&q=
FF - prefs.js: browser.search.selectedEngine - Search the Web
FF - user.js: browser.cache.memory.capacity - 16000
FF - user.js: browser.chrome.favicons - fales
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: content.max.tokenizing.time - 2250000
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 750000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 750000
FF - user.js: dom.disable_window_status_change - true
FF - user.js: network.http.max-connections - 32
FF - user.js: network.http.max-connections-per-server - 8
FF - user.js: network.http.max-persistent-connections-per-proxy - 8
FF - user.js: network.http.max-persistent-connections-per-server - 4
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.firstrequest - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 750
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-01-09 18:08
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3062792194-1690480861-4063121711-1005\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(652)
c:\program files\common files\logitech\bluetooth\LBTWlgn.dll
c:\program files\common files\logitech\bluetooth\LBTServ.dll
.
- - - - - - - > 'explorer.exe'(2800)
c:\windows\system32\WININET.dll
c:\documents and settings\All Users\Application Data\Ad-Aware Browsing Protection\adawarebp.dll
d:\my documents\SetPoint\SetPoint\lgscroll.dll
c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86\MSVCR80.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\IEFRAME.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\eHome\ehRecvr.exe
c:\windows\eHome\ehSched.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
c:\windows\system32\skeys.exe
c:\docume~1\JERRYB~1\LOCALS~1\Temp\bwgo00009b36.exe
c:\windows\system32\SearchIndexer.exe
c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe
c:\program files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
c:\windows\eHome\ehmsas.exe
c:\windows\system32\dllhost.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2012-01-09 18:12:05 - machine was rebooted
ComboFix-quarantined-files.txt 2012-01-10 00:12
ComboFix2.txt 2012-01-08 21:05
.
Pre-Run: 69,030,326,272 bytes free
Post-Run: 69,052,440,576 bytes free
.
- - End Of File - - CF5422994F7E1507631228D6C96E36C8
Upload was successful

#7 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:30 PM

Posted 10 January 2012 - 10:21 AM

Hi Bubba7827,

How's your computer running now?
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#8 Bubba7827

Bubba7827
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:12:30 PM

Posted 10 January 2012 - 09:09 PM

seems to be running pretty well.

still cant get microsoft security essentials installed.

the windows installer tells me "the feature you are trying to use is on a network resourse that is unavailable."

It wants a new path to the epp.msi file and it prompts me with a d:\ folder with a long alphanumeric apparently random name.

there are a couple similar folders on the d drive and I cant delete them. One is in use - possibly related to the MSE install but I dont know how or why it is tinstalling to D drive. I ran it from the desktop.

the other folder i cant delete tells me it cant delete filterpipelineprintproc.dll and my access is denied and it wants me to check if the disk is full or write protected. It is neither. file possibly in use but for what I dont know. I am suspicious of this folder.

and so the end result is that I cannot get MSE installed to set up protection for this computer. I am unclear exactly what antivirus program it is running in the first place and i dont know how to tell. None are evidently installed other than microsoft security center (different than MSE - previuous version i think)

Windows update doesnt want to run either. Something about not having the latest service pack installed but I do have SP3 installed. So I went through the microsoft :fix it for me" routine but the results are not improved there.

So let me know what the next move is.

Thanks for your help.

Bubba

#9 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:30 PM

Posted 11 January 2012 - 03:45 PM

Hi Bubba7827,

  • Please download Dial-A-Fix from one of the following mirrors (note that this tool is quite old and can cause quite some error messages; just ignore them and continue):
  • Extract the zip file to your desktop.
  • Double click Dial-a-Fix.exe to start the program. Note - you might see an error message regarding Internet Explorer. Just ignore this and continue.
  • Press the green double checkmark box (Looks like this: Posted Image)
  • UNcheck Empty Temp Folders, as well as Adjust Time/Date in the prep section. The prep section should then look like this:

    Posted Image

    Posted Image
  • Click on go
  • Exit/Close Dial-A-Fix

How's your computer running now?
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#10 Bubba7827

Bubba7827
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:12:30 PM

Posted 11 January 2012 - 09:02 PM

still cant install MSE and still cant delete d: alphanumeric folder. Same errors as described above.

also seem to have quite a few toolbars and other add ons to internet explorer that need to be uninstalled. suspect some malware here as well. some doesnt seem to have a remove option.

thanks for your help. Keep it coming.

Edited by Bubba7827, 11 January 2012 - 09:19 PM.


#11 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:30 PM

Posted 12 January 2012 - 10:53 AM

Hi Bubba7827,

I appreciate your patience while I troubleshoot this with you. :)

We need to scan the system with this special tool:
  • Please download and save: Junction.zip
  • Unzip it and place Junction.exe in the Windows directory (C:\Windows).
  • Go to Start => Run... => Copy and paste the following command in the Run box and click OK:

    cmd /c junction -s d:\ >log.txt&log.txt& del log.txt
  • A command window opens starting to scan the system. Wait until a log file opens. Copy and paste the log in your next reply.

Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#12 Bubba7827

Bubba7827
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:12:30 PM

Posted 12 January 2012 - 08:43 PM

I dont think that worked as planned.

Here's the log


Junction v1.06 - Windows junction creator and reparse point viewer
Copyright © 2000-2010 Mark Russinovich
Sysinternals - www.sysinternals.com


Failed to open \\?\d:\\System Volume Information: Access is denied.


...

...

...

...

...

...

...

No reparse points found.




#13 Bubba7827

Bubba7827
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:12:30 PM

Posted 12 January 2012 - 08:52 PM

not trying to tell you how to do your job...

here's a post about a guy that seemed to have similar problems as we have

http://www.techspot.com/vb/topic170247.html

I havent followed any advice other than yours but didnt know if perhaps this info would help.

Thanks.

#14 jntkwx

jntkwx

  • Malware Response Team
  • 4,339 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New England, U.S.A.
  • Local time:01:30 PM

Posted 13 January 2012 - 12:25 PM

Hi Bubba7827,

Thanks for the link, but that was a different problem.

I think you actually have Microsoft Security Essentials successfully installed.

Could you tell me exactly what folders and files you cannot delete on the D drive?

Was this Microsoft FixIt article what you tried before? If not, please try this FixIt, and let me know whether you are able to run Windows Update.
Regards,
Jason

 

Simple and easy ways to keep your computer safe and secure on the Internet

If I am helping you and have not returned in 48 hours, please feel free to send me a PM with a link to the topic.
My help is free... however, if you wish to show appreciation and support me personally fighting against malware, please consider a donation: btn_donate_SM.gif


#15 Bubba7827

Bubba7827
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Local time:12:30 PM

Posted 13 January 2012 - 10:05 PM

cant delete folder d:/f1ad738a55d2356aecc7

I dont know if that is the same fixit or not. the one i used looked similar. in any case i ran the one from your link and then ran windows update.

the windows update was interrupted with a message as follows:

"the feature you are trying to use is on a network resource that is unavailable. click OK to try again or enter an alternate path to a folder containing the installation package silverlight.msi in the box below. the box defaults to d:\72aee475a690edcf172b22

so then i browse and look for silverlight.msi and it is found in that same d drive folder (not the one that i cant delete but the one in the default box) but when i pick it i get a second error as follows

the file silverlight.msi is not a valid installation package for the product microsoft silverlight. try to find the installation package silverlight.msi in a folder from which you can install microsoft silverlight.

I also tried moving the silverlight.msi file to the desktop and browsing to it there but the same message came up.

I think the rest of the windows update ran successfully with that exception. I got as final message with a microsoft kb number thus: Security Update for Microsoft Silverlight (KB2617986).

something else I notice is that when i search from the address bar of windows explorer the bnrowser redirects to a search.incredimail address. I cant figure out how to uninstall this either.

Edited by Bubba7827, 13 January 2012 - 10:32 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users