Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

basic blue screen windows xp lost desktop


  • Please log in to reply
9 replies to this topic

#1 tagman66

tagman66

  • Members
  • 78 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:00 PM

Posted 04 March 2012 - 08:26 PM

i am running windows xp i lost my icons on my desktop it went back to basic icons and blue screen i cannot access the internet from this account or my antivirus i ran anti-malware no problems showed no faults or warnings just happened when i logged on i am not sure if it is a virus or somthing my kids did .i also ran unhide and it found nothing

Edited by hamluis, 04 March 2012 - 08:41 PM.
Moved from XP to Am I Infected.


BC AdBot (Login to Remove)

 


#2 Celena

Celena

  • Banned Spammer
  • 17 posts
  • OFFLINE
  •  
  • Local time:01:00 PM

Posted 05 March 2012 - 12:19 AM

First thing to try is let Windows check its integrity using the sfc /scannow command when booted in Safe Mode. Read this mini tutorial about using it: http://forums.majorgeeks.com/showthread.php?t=147786 .

Hopefully this allows you to boot sorta normally in Windows and then you should be able to use System Restore to go back to a point in time before the cleaning of CCE.

When the above does not work it is time for a more creative way of using System Restore.

When you have an installation CD for your Windows XP (not a restore CD) you can use the following procedure to use system restore to go back to a restore point before the cleaning by CCE.

When you don't have an installation CD you can use this method when your HD is hooked up to another computer.

Print out the procedure and familiarize with it before starting with it. When you understand what the procedure does it makes applying it a better experience.

In short the procedure does the following:

* boot from the XP installation CD and use the recovery console (command prompt) to copy a back up registry to let Windows boot
* once booted next step is to open System Restore Folders to be accessed with Explorer
* that will allow you to choose a back up registry from the System Restore folders and copy a registry back up in place for the next step
* boot from the CD and use the recovery console and copy the target registry back up in place to boot to another point in time
* now you are back in Windows and you can fully use System Restore again; you are now back in control


I expect and hope one of the above solutions will help you to get back on track.

#3 tagman66

tagman66
  • Topic Starter

  • Members
  • 78 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:00 PM

Posted 06 March 2012 - 05:26 PM

thanks for the help i managed to retore my desktop icons now am i infected with a virus ? will this just happen again do i need to do anything to prevent this ?

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,072 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:00 PM

Posted 07 March 2012 - 09:34 PM

Hello yes you should scan your PC.

Please download MiniToolBox, save it to your desktop and run it.

Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size.
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.

Note: When using "Reset FF Proxy Settings" option Firefox should be closed.



Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware Posted Image and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you cannot update Malwarebytes or use the Internet to download any files to the infected computer, manually update the database by following the instructions in FAQ Section A: 4. Issues.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.

-- Some types of malware will target Malwarebytes and other security tools to keep them from running properly. If that's the case, go to Start > All Programs > Malwarebytes Anti-Malware folder > Tools > click on Malwarebytes Chameleon and follow the onscreen instructions. The Chameleon folder can be accessed by opening the program folder for Malwarebytes Anti-Malware (normally C:\Program Files\Malwarebytes' Anti-Malware or C:\Program Files (x86)\Malwarebytes' Anti-Malware).



Now Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
    For instructions with screenshots, please refer to the How to use SUPERAntiSpyware to scan and remove malware from your computer Guide.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all other options as they are set):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the Control Center screen.
  • Back on the main screen, under "Select Scan Type" check the box for Complete Scan.
  • If your computer is badly infected, be sure to check the box next to Enable Rescue Scan (Highly Infected Systems ONLY).
  • Click the Scan your computer... button.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the scan log after reboot, launch SUPERAntiSpyware again.
  • Click the View Scan Logs button at the bottom.
  • This will open the Scanner Logs Window.
  • Click on the log to highlight it and then click on View Selected Log to open it.
  • Copy and paste the scan log results in your next reply.
-- Some types of malware will disable security tools. If SUPERAntiSpyware will not install, please refer to these instructions for using the SUPERAntiSpyware Installer. If SUPERAntiSpyware is already installed but will not run, then follow the instructions for using RUNSAS.EXE to launch the program.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 tagman66

tagman66
  • Topic Starter

  • Members
  • 78 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:00 PM

Posted 08 March 2012 - 06:49 PM

here are my results from the Malwarebytes Anti-Malware 1.60.1.1000
www.malwarebytes.org

Database version: v2012.03.08.07

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Computer :: USER-34BA057C07 [administrator]

08/03/2012 5:28:24 PM
mbam-log-2012-03-08 (17-28-24).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 262538
Time elapsed: 11 minute(s), 15 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0MiniToolBox by Farbar Version: 18-01-2012
Ran by Computer (administrator) on 08-03-2012 at 17:24:00
Microsoft Windows XP Professional Service Pack 3 (X86)
Boot Mode: Normal
***************************************************************************

========================= Flush DNS: ===================================


Windows IP Configuration



Successfully flushed the DNS Resolver Cache.


========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.
========================= Hosts content: =================================

127.0.0.1 localhost

========================= IP Configuration: ================================

Realtek PCIe GBE Family Controller = Local Area Connection (Connected)


# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : user-34ba057c07

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Broadcast

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No

DNS Suffix Search List. . . . . . : gateway.2wire.net



Ethernet adapter Local Area Connection:



Connection-specific DNS Suffix . : gateway.2wire.net

Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller

Physical Address. . . . . . . . . : 48-5B-39-3D-FD-33

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.2.10

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.2.1

DHCP Server . . . . . . . . . . . : 192.168.2.1

DNS Servers . . . . . . . . . . . : 192.168.2.1

Lease Obtained. . . . . . . . . . : March 7, 2012 7:10:12 PM

Lease Expires . . . . . . . . . . : March 10, 2012 7:10:12 PM

Server: mymodem
Address: 192.168.2.1

Name: google.com
Addresses: 74.125.226.71, 74.125.226.78, 74.125.226.70, 74.125.226.67
74.125.226.73, 74.125.226.64, 74.125.226.69, 74.125.226.72, 74.125.226.68
74.125.226.66, 74.125.226.65



Pinging google.com [74.125.226.71] with 32 bytes of data:



Reply from 74.125.226.71: bytes=32 time=35ms TTL=55

Reply from 74.125.226.71: bytes=32 time=12ms TTL=55



Ping statistics for 74.125.226.71:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 12ms, Maximum = 35ms, Average = 23ms

Server: mymodem
Address: 192.168.2.1

Name: yahoo.com
Addresses: 209.191.122.70, 98.139.127.62, 98.139.183.24



Pinging yahoo.com [209.191.122.70] with 32 bytes of data:



Reply from 209.191.122.70: bytes=32 time=53ms TTL=52

Reply from 209.191.122.70: bytes=32 time=48ms TTL=52



Ping statistics for 209.191.122.70:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 48ms, Maximum = 53ms, Average = 50ms

Server: mymodem
Address: 192.168.2.1

Name: bleepingcomputer.com
Address: 208.43.87.2



Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:



Reply from 208.43.87.2: Destination host unreachable.

Reply from 208.43.87.2: Destination host unreachable.



Ping statistics for 208.43.87.2:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...48 5b 39 3d fd 33 ...... Realtek PCIe GBE Family Controller - Teefer2 Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.2.1 192.168.2.10 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.2.10 192.168.2.10 20
192.168.2.0 255.255.255.0 192.168.2.10 192.168.2.10 20
192.168.2.10 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.2.255 255.255.255.255 192.168.2.10 192.168.2.10 20
224.0.0.0 240.0.0.0 192.168.2.10 192.168.2.10 20
255.255.255.255 255.255.255.255 192.168.2.10 192.168.2.10 1
Default Gateway: 192.168.2.1
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\System32\mswsock.dll [245248] (Microsoft Corporation)
Catalog5 02 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 C:\Windows\System32\mswsock.dll [245248] (Microsoft Corporation)
Catalog5 04 C:\Program Files\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Catalog9 01 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 04 C:\Windows\system32\rsvpsp.dll [92672] (Microsoft Corporation)
Catalog9 05 C:\Windows\system32\rsvpsp.dll [92672] (Microsoft Corporation)
Catalog9 06 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (03/07/2012 06:50:10 PM) (Source: Bonjour Service) (User: )
Description: mDNSCoreReceiveResponse: Unexpected conflict discarding 23 10.2.168.192.in-addr.arpa. PTR user-34ba057c07.local.

Error: (03/07/2012 06:50:10 PM) (Source: Bonjour Service) (User: )
Description: mDNSCoreReceiveResponse: Received from 192.168.2.10:5353 25 10.2.168.192.in-addr.arpa. PTR user-34ba057c07-2.local.

Error: (03/07/2012 06:19:32 PM) (Source: Bonjour Service) (User: )
Description: mDNSCoreReceiveResponse: Unexpected conflict discarding 23 10.2.168.192.in-addr.arpa. PTR user-34ba057c07.local.

Error: (03/07/2012 06:19:32 PM) (Source: Bonjour Service) (User: )
Description: mDNSCoreReceiveResponse: Received from 192.168.2.10:5353 25 10.2.168.192.in-addr.arpa. PTR user-34ba057c07-2.local.

Error: (03/06/2012 06:40:41 PM) (Source: Symantec AntiVirus) (User: )
Description: Security Risk Found!Tracking Cookies in File: Cookie:computer@liveperson.net/ by: Manual scan. Action: Quarantine failed : Leave Alone failed. Action Description: The file was deleted successfully.

Error: (03/06/2012 05:28:04 PM) (Source: Symantec AntiVirus) (User: )
Description: Symantec Endpoint Protection has determined that the virus definitions are missing on this computer. This computer will remain unprotected from viruses until virus definitions are downloaded to this computer.Application has encountered an error.
For more information, please go to: http://www.symantec.com/techsupp/servlet/ProductMessages?product=SAVCORP&version=11.0.6070.422&language=english&module=1000&error=0009&build=symantec_ent

Error: (03/06/2012 05:25:01 PM) (Source: Symantec AntiVirus) (User: )
Description: Symantec Endpoint Protection has determined that the virus definitions are missing on this computer. This computer will remain unprotected from viruses until virus definitions are downloaded to this computer.Application has encountered an error.
For more information, please go to: http://www.symantec.com/techsupp/servlet/ProductMessages?product=SAVCORP&version=11.0.6070.422&language=english&module=1000&error=0009&build=symantec_ent

Error: (03/06/2012 05:22:25 PM) (Source: Symantec AntiVirus) (User: )
Description: Symantec Endpoint Protection has determined that the virus definitions are missing on this computer. This computer will remain unprotected from viruses until virus definitions are downloaded to this computer.Application has encountered an error.
For more information, please go to: http://www.symantec.com/techsupp/servlet/ProductMessages?product=SAVCORP&version=11.0.6070.422&language=english&module=1000&error=0009&build=symantec_ent

Error: (03/06/2012 05:21:37 PM) (Source: Bonjour Service) (User: )
Description: mDNSCoreReceiveResponse: Unexpected conflict discarding 23 10.2.168.192.in-addr.arpa. PTR user-34ba057c07.local.

Error: (03/06/2012 05:21:37 PM) (Source: Bonjour Service) (User: )
Description: mDNSCoreReceiveResponse: Received from 192.168.2.10:5353 25 10.2.168.192.in-addr.arpa. PTR user-34ba057c07-2.local.


System errors:
=============
Error: (03/07/2012 07:08:40 PM) (Source: DCOM) (User: Computer)
Description: The server {16D99191-6280-4B33-A2F5-04805A0FC582} did not register with DCOM within the required timeout.

Error: (03/07/2012 06:48:23 PM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1084" attempting to start the service EventSystem with arguments ""
in order to run the server:
{1BE1F766-5536-11D1-B726-00C04FB926AF}

Error: (03/07/2012 06:48:12 PM) (Source: DCOM) (User: Computer)
Description: DCOM got error "%%1084" attempting to start the service netman with arguments ""
in order to run the server:
{BA126AE5-2166-11D1-B1D0-00805FC1270E}

Error: (03/07/2012 06:41:09 PM) (Source: DCOM) (User: Computer)
Description: DCOM got error "%%1084" attempting to start the service netman with arguments ""
in order to run the server:
{BA126AE5-2166-11D1-B1D0-00805FC1270E}

Error: (03/07/2012 06:36:13 PM) (Source: DCOM) (User: Computer)
Description: DCOM got error "%%1084" attempting to start the service netman with arguments ""
in order to run the server:
{BA126AE5-2166-11D1-B1D0-00805FC1270E}

Error: (03/07/2012 06:28:58 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
AFD
AmdPPM
AsIO
eeCtrl
Fips
IPSec
MRxSmb
NetBIOS
NetBT
RasAcd
Rdbss
SPBBCDrv
SRTSP
SRTSPX
SYMTDI
Tcpip
WPS

Error: (03/07/2012 06:28:58 PM) (Source: Service Control Manager) (User: )
Description: The IPSEC Services service depends on the IPSEC driver service which failed to start because of the following error:
%%31

Error: (03/07/2012 06:28:58 PM) (Source: Service Control Manager) (User: )
Description: The Bonjour Service service depends on the TCP/IP Protocol Driver service which failed to start because of the following error:
%%31

Error: (03/07/2012 06:28:58 PM) (Source: Service Control Manager) (User: )
Description: The Apple Mobile Device service depends on the TCP/IP Protocol Driver service which failed to start because of the following error:
%%31

Error: (03/07/2012 06:28:58 PM) (Source: Service Control Manager) (User: )
Description: The TCP/IP NetBIOS Helper service depends on the AFD service which failed to start because of the following error:
%%31


Microsoft Office Sessions:
=========================
Error: (03/07/2012 06:50:10 PM) (Source: Bonjour Service)(User: )
Description: mDNSCoreReceiveResponse: Unexpected conflict discarding 23 10.2.168.192.in-addr.arpa. PTR user-34ba057c07.local.

Error: (03/07/2012 06:50:10 PM) (Source: Bonjour Service)(User: )
Description: mDNSCoreReceiveResponse: Received from 192.168.2.10:5353 25 10.2.168.192.in-addr.arpa. PTR user-34ba057c07-2.local.

Error: (03/07/2012 06:19:32 PM) (Source: Bonjour Service)(User: )
Description: mDNSCoreReceiveResponse: Unexpected conflict discarding 23 10.2.168.192.in-addr.arpa. PTR user-34ba057c07.local.

Error: (03/07/2012 06:19:32 PM) (Source: Bonjour Service)(User: )
Description: mDNSCoreReceiveResponse: Received from 192.168.2.10:5353 25 10.2.168.192.in-addr.arpa. PTR user-34ba057c07-2.local.

Error: (03/06/2012 06:40:41 PM) (Source: Symantec AntiVirus)(User: )
Description: Security Risk Found!Tracking Cookies in File: Cookie:computer@liveperson.net/ by: Manual scan. Action: Quarantine failed : Leave Alone failed. Action Description: The file was deleted successfully.

Error: (03/06/2012 05:28:04 PM) (Source: Symantec AntiVirus)(User: )
Description: Symantec Endpoint Protection has determined that the virus definitions are missing on this computer. This computer will remain unprotected from viruses until virus definitions are downloaded to this computer.Application has encountered an error.
For more information, please go to: http://www.symantec.com/techsupp/servlet/ProductMessages?product=SAVCORP&version=11.0.6070.422&language=english&module=1000&error=0009&build=symantec_ent

Error: (03/06/2012 05:25:01 PM) (Source: Symantec AntiVirus)(User: )
Description: Symantec Endpoint Protection has determined that the virus definitions are missing on this computer. This computer will remain unprotected from viruses until virus definitions are downloaded to this computer.Application has encountered an error.
For more information, please go to: http://www.symantec.com/techsupp/servlet/ProductMessages?product=SAVCORP&version=11.0.6070.422&language=english&module=1000&error=0009&build=symantec_ent

Error: (03/06/2012 05:22:25 PM) (Source: Symantec AntiVirus)(User: )
Description: Symantec Endpoint Protection has determined that the virus definitions are missing on this computer. This computer will remain unprotected from viruses until virus definitions are downloaded to this computer.Application has encountered an error.
For more information, please go to: http://www.symantec.com/techsupp/servlet/ProductMessages?product=SAVCORP&version=11.0.6070.422&language=english&module=1000&error=0009&build=symantec_ent

Error: (03/06/2012 05:21:37 PM) (Source: Bonjour Service)(User: )
Description: mDNSCoreReceiveResponse: Unexpected conflict discarding 23 10.2.168.192.in-addr.arpa. PTR user-34ba057c07.local.

Error: (03/06/2012 05:21:37 PM) (Source: Bonjour Service)(User: )
Description: mDNSCoreReceiveResponse: Received from 192.168.2.10:5353 25 10.2.168.192.in-addr.arpa. PTR user-34ba057c07-2.local.


=========================== Installed Programs ============================

a-squared Free 4.5 (Version: 4.5)
Adobe AIR (Version: 2.5.1.17730)
Adobe Flash Player 10 Plugin (Version: 10.1.102.64)
Adobe Flash Player 11 ActiveX (Version: 11.1.102.55)
Adobe Reader X (10.1.2) (Version: 10.1.2)
Adobe Shockwave Player 11.5 (Version: 11.5.6.606)
aioprnt (Version: 5.7.4.0)
aioscnnr (Version: 6.0.2.0)
AMD Processor Driver (Version: 1.3.2.0053)
Apple Application Support (Version: 2.1.7)
Apple Mobile Device Support (Version: 5.1.1.4)
Apple Software Update (Version: 2.1.3.127)
Ashampoo Burning Studio 6 FREE (Version: 6.7.7)
Ask Toolbar (Version: 1.12.2.0)
ATI - Software Uninstall Utility (Version: 6.14.10.1022)
ATI AVIVO Codecs (Version: 10.5.0.40428)
ATI Catalyst Control Center (Version: 2.009.0730.0057)
ATI Display Driver (Version: 8.641-090730a1-087108C)
ATI Parental Control & Encoder (Version: 3.0)
BitTorrent (Version: 7.2.0)
Bonjour (Version: 3.0.0.10)
C4USelfUpdater (Version: 1.00.0000)
Catalyst Control Center Core Implementation (Version: 2009.0730.58.43017)
Catalyst Control Center Graphics Full Existing (Version: 2009.0730.58.43017)
Catalyst Control Center Graphics Full New (Version: 2009.0730.58.43017)
Catalyst Control Center Graphics Light (Version: 2009.0730.58.43017)
Catalyst Control Center Localization All (Version: 2009.0730.58.43017)
ccc-core-preinstall (Version: 2009.0730.58.43017)
ccc-core-static (Version: 2009.0730.58.43017)
ccc-utility (Version: 2009.0730.58.43017)
CCC Help Chinese Standard (Version: 2009.0730.0057.43017)
CCC Help Chinese Traditional (Version: 2009.0730.0057.43017)
CCC Help Czech (Version: 2009.0730.0057.43017)
CCC Help Danish (Version: 2009.0730.0057.43017)
CCC Help Dutch (Version: 2009.0730.0057.43017)
CCC Help English (Version: 2009.0730.0057.43017)
CCC Help Finnish (Version: 2009.0730.0057.43017)
CCC Help French (Version: 2009.0730.0057.43017)
CCC Help German (Version: 2009.0730.0057.43017)
CCC Help Greek (Version: 2009.0730.0057.43017)
CCC Help Hungarian (Version: 2009.0730.0057.43017)
CCC Help Italian (Version: 2009.0730.0057.43017)
CCC Help Japanese (Version: 2009.0730.0057.43017)
CCC Help Korean (Version: 2009.0730.0057.43017)
CCC Help Norwegian (Version: 2009.0730.0057.43017)
CCC Help Polish (Version: 2009.0730.0057.43017)
CCC Help Portuguese (Version: 2009.0730.0057.43017)
CCC Help Russian (Version: 2009.0730.0057.43017)
CCC Help Spanish (Version: 2009.0730.0057.43017)
CCC Help Swedish (Version: 2009.0730.0057.43017)
CCC Help Thai (Version: 2009.0730.0057.43017)
CCC Help Turkish (Version: 2009.0730.0057.43017)
CCleaner (Version: 3.00)
center (Version: 6.2.5.0)
Cobian Backup 10
EPU-4 Engine (Version: 1.00.33)
essentials (Version: 6.0.14.0)
Facebook Video Calling 1.1.1.1 (Version: 1.1.1)
FrostWire 5.3.2 (Version: 5.3.2.0)
High-Definition Video Playback (Version: 11.1.10400.2.65)
ImgBurn (Version: 2.5.6.0)
iTunes (Version: 10.6.0.40)
Java Auto Updater (Version: 2.0.2.4)
Java™ 6 Update 23 (Version: 6.0.230)
K-Lite Codec Pack 5.8.3 (Full) (Version: 5.8.3)
Kodak AIO Printer (Version: 6.2.4.0)
KODAK AiO Software (Version: 6.2.6.20)
ksDIP (Version: 3.20.0000.0000)
LeapFrog Connect (Version: 3.2.19.13664)
LeapFrog LeapPad Explorer Plugin (Version: 3.2.22.13714)
LeapFrog Tag Plugin (Version: 3.2.19.13664)
LiveUpdate 3.3 (Symantec Corporation) (Version: 3.3.0.96)
Malwarebytes Anti-Malware version 1.60.0.1800 (Version: 1.60.0.1800)
Microsoft .NET Framework 2.0 Service Pack 2 (Version: 2.2.30729)
Microsoft .NET Framework 3.0 Service Pack 2 (Version: 3.2.30729)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft Compression Client Pack 1.0 for Windows XP (Version: 1)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.59193)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (Version: 10.0.40219)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
MSXML 6.0 Parser (Version: 6.10.1129.0)
Nero 11 Kwik Themes Basic (Version: 11.0.11200.12.0)
Nero Audio Pack 1 (Version: 11.0.11500.110.0)
Nero Core Components 11 (Version: 11.0.15000.1.12)
Nero Kwik Media (Version: 1.10.23000.128.100)
Nero Kwik Media (Version: 11.0.15300)
Nero Kwik Media Help (CHM) (Version: 11.0.10200)
Nero Update (Version: 11.0.11400.27.0)
nero.prerequisites.msi (Version: 11.0.20008)
ocr (Version: 6.2.3.50)
OpenOffice.org 3.2 (Version: 3.2.9502)
Partition Wizard Professional Edition 5.0
Platform (Version: 1.34)
PreReq (Version: 6.2.2.60)
QuickTime (Version: 7.69.80.9)
REALTEK GbE & FE Ethernet PCI-E NIC Driver (Version: 1.23.0000)
Realtek High Definition Audio Driver (Version: 5.10.0.5880)
Skins (Version: 2009.0730.58.43017)
SpywareBlaster 4.4 (Version: 4.4.0)
Symantec Endpoint Protection (Version: 11.0.6005.562)
TurboTax 2010 (Version: 1.00.0000)
Update for Microsoft .NET Framework 3.5 SP1 (KB963707) (Version: 1)
Update for Microsoft Windows (KB971513)
Update for Windows Internet Explorer 7 (KB980182) (Version: 1)
Update for Windows Internet Explorer 8 (KB976662) (Version: 1)
Update for Windows XP (KB2141007) (Version: 1)
Update for Windows XP (KB2345886) (Version: 1)
Update for Windows XP (KB2467659) (Version: 1)
Update for Windows XP (KB2541763) (Version: 1)
Update for Windows XP (KB2607712) (Version: 1)
Update for Windows XP (KB2616676) (Version: 1)
Update for Windows XP (KB2641690) (Version: 1)
Update for Windows XP (KB898461) (Version: 1)
Update for Windows XP (KB951978) (Version: 1)
Update for Windows XP (KB955759) (Version: 1)
Update for Windows XP (KB967715) (Version: 1)
Update for Windows XP (KB968389) (Version: 1)
Update for Windows XP (KB971029) (Version: 1)
Update for Windows XP (KB971737) (Version: 1)
Update for Windows XP (KB973687) (Version: 1)
Update for Windows XP (KB973815) (Version: 1)
Use the entry named LeapFrog Connect to uninstall (LeapFrog LeapPad Explorer Plugin)
Use the entry named LeapFrog Connect to uninstall (LeapFrog Tag Plugin) (Version: 3.2.19.13664)
VIA Platform Device Manager (Version: 1.34)
WBFS Manager 2.5 (Version: 2.5)
WebFldrs XP (Version: 9.50.7523)
Windows Driver Package - LeapFrog (FlyUsb) USB (11/05/2008 1.1.1.0) (Version: 11/05/2008 1.1.1.0)
Windows Driver Package - Leapfrog (Leapfrog-USBLAN) Net (09/10/2009 02.03.05.012) (Version: 09/10/2009 02.03.05.012)
Windows Genuine Advantage Notifications (KB905474) (Version: 1.9.0040.0)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Genuine Advantage Validation Tool (KB892130) (Version: 1.7.0069.2)
Windows Internet Explorer 8 (Version: 20090308.140743)
Windows Media Format 11 runtime
Windows Media Player 11
WinPatrol (Version: 19.3.2010.5)
WinRAR archiver
XP Royale Theme
Zune Desktop Theme (Version: 1.0.5341.0)

========================= Memory info: ===================================

Percentage of memory in use: 33%
Total physical RAM: 1791.1 MB
Available physical RAM: 1182.5 MB
Total Pagefile: 3685.87 MB
Available Pagefile: 3238.12 MB
Total Virtual: 2047.88 MB
Available Virtual: 1971.11 MB

========================= Partitions: =====================================

1 Drive c: (windows) (Fixed) (Total:200.73 GB) (Free:148.66 GB) NTFS

========================= Users: ========================================
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 03/08/2012 at 06:22 PM

Application Version : 5.0.1146

Core Rules Database Version : 8318
Trace Rules Database Version: 6130

Scan type : Complete Scan
Total Scan Time : 00:28:17

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned : 565
Memory threats detected : 0
Registry items scanned : 33080
Registry threats detected : 0
File items scanned : 44682
File threats detected : 108

Adware.Tracking Cookie
C:\Documents and Settings\Computer\Cookies\C6E5K4OZ.txt [ /collective-media.net ]
C:\Documents and Settings\Computer\Cookies\QVFJGL8L.txt [ /solvemedia.com ]
C:\Documents and Settings\Computer\Cookies\OD28RB97.txt [ /kontera.com ]
C:\Documents and Settings\Computer\Cookies\YD6EZ2NR.txt [ /in.getclicky.com ]
C:\Documents and Settings\Computer\Cookies\6QZ3NDOM.txt [ /ads.bleepingcomputer.com ]
C:\Documents and Settings\Computer\Cookies\1EI07ZJT.txt [ /adserver.adtechus.com ]
C:\Documents and Settings\Computer\Cookies\W62LZ8L2.txt [ /yieldmanager.net ]
C:\Documents and Settings\Computer\Cookies\6KVNCU7V.txt [ /media6degrees.com ]
C:\Documents and Settings\Computer\Cookies\F70ONPH9.txt [ /casalemedia.com ]
C:\Documents and Settings\Computer\Cookies\MNJOWAH2.txt [ /invitemedia.com ]
C:\DOCUMENTS AND SETTINGS\GUEST\Cookies\guest@adinterax[2].txt [ Cookie:guest@adinterax.com/ ]
C:\DOCUMENTS AND SETTINGS\GUEST\Cookies\guest@doubleclick[1].txt [ Cookie:guest@doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\GUEST\Cookies\guest@msnportal.112.2o7[1].txt [ Cookie:guest@msnportal.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\GUEST\Cookies\guest@interclick[1].txt [ Cookie:guest@interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\2V5MBSOJ.txt [ Cookie:nichole@calendar.pdgmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\M32XXO33.txt [ Cookie:nichole@bizrate.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\RBG7FBNX.txt [ Cookie:nichole@casalemedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@adxpose[2].txt [ Cookie:nichole@adxpose.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\PTCOKH9S.txt [ Cookie:nichole@www.google.com/accounts ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\2KPB09WL.txt [ Cookie:nichole@adcentriconline.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@zbox.zanox[1].txt [ Cookie:nichole@zbox.zanox.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\12D83R30.txt [ Cookie:nichole@nextag.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\7EHFCNYO.txt [ Cookie:nichole@doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\YB8Y7WVH.txt [ Cookie:nichole@bs.serving-sys.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\LEZR9IXF.txt [ Cookie:nichole@pointroll.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\MKYV78HB.txt [ Cookie:nichole@apmebf.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\OLD5VN9Z.txt [ Cookie:nichole@media6degrees.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\LQEY8WXE.txt [ Cookie:nichole@h.atdmt.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@imrworldwide[3].txt [ Cookie:nichole@imrworldwide.com/cgi-bin ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\6GFF6ZBW.txt [ Cookie:nichole@ads.networldmedia.net/servlet/ajrotator ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\U38NVNNN.txt [ Cookie:nichole@ru4.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@find.rcdriver[1].txt [ Cookie:nichole@find.rcdriver.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\TEBR0JWV.txt [ Cookie:nichole@ads.gamesbannernet.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\1XAAXOTL.txt [ Cookie:nichole@xm.xtendmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@banner.motorcycle-usa[2].txt [ Cookie:nichole@banner.motorcycle-usa.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@indieclick[1].txt [ Cookie:nichole@indieclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\GVJCUH5F.txt [ Cookie:nichole@dmtracker.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\KEX4S65L.txt [ Cookie:nichole@sympatico.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\B0JOHKIC.txt [ Cookie:nichole@mmotraffic.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\A4O7RNF8.txt [ Cookie:nichole@legolas-media.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\CYN2ZCCH.txt [ Cookie:nichole@collective-media.net/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\N0EHYDZG.txt [ Cookie:nichole@mediaplex.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\1QUNEE0P.txt [ Cookie:nichole@advertising.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\RDMGLFO0.txt [ Cookie:nichole@revsci.net/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\K82Y1TAG.txt [ Cookie:nichole@www.google.ca/accounts ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\T9O7O65W.txt [ Cookie:nichole@vitamine.networldmedia.net/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\M0ZTJ5L1.txt [ Cookie:nichole@ad.yieldmanager.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\8ZWDJJZU.txt [ Cookie:nichole@adsonar.com/adserving ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\GFCE55Y7.txt [ Cookie:nichole@lucidmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@85playgames.media-toolbar[2].txt [ Cookie:nichole@85playgames.media-toolbar.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@e-2dj6wjny-1gdpml.stats.esomniture[2].txt [ Cookie:nichole@e-2dj6wjny-1gdpml.stats.esomniture.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\NY5AW4QJ.txt [ Cookie:nichole@www.sleepcountry.ca/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@optimize.indieclick[2].txt [ Cookie:nichole@optimize.indieclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@gotacha.rotator.hadj7.adjuggler[2].txt [ Cookie:nichole@gotacha.rotator.hadj7.adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\II8XU9LB.txt [ Cookie:nichole@www.googleadservices.com/pagead/conversion/1070700309/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\3XYXYYSJ.txt [ Cookie:nichole@www.gamerclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\9KMWL5QD.txt [ Cookie:nichole@accounts.youtube.com/accounts ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\LGG9HWPS.txt [ Cookie:nichole@lfstmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\1MY2JPW3.txt [ Cookie:nichole@c.atdmt.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\4WU75H5R.txt [ Cookie:nichole@a1.interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\OZEZ3072.txt [ Cookie:nichole@amazon-adsystem.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@e-2dj6wjkyooajcaq.stats.esomniture[2].txt [ Cookie:nichole@e-2dj6wjkyooajcaq.stats.esomniture.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\6PJLE3QO.txt [ Cookie:nichole@thefind.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@gotacha.rotator.hadj7.adjuggler[1].txt [ Cookie:nichole@gotacha.rotator.hadj7.adjuggler.net/servlet/ajrotator/123394/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@clickztrax[2].txt [ Cookie:nichole@clickztrax.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@e-2dj6wjkoumcjmbp.stats.esomniture[2].txt [ Cookie:nichole@e-2dj6wjkoumcjmbp.stats.esomniture.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\E4GC8X9O.txt [ Cookie:nichole@eyewonder.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\279CE1L8.txt [ Cookie:nichole@in.getclicky.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\TT0NTVKO.txt [ Cookie:nichole@gsimedia.net/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\UC50F2EA.txt [ Cookie:nichole@microsoftwlcashback.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\HDDW16HV.txt [ Cookie:nichole@accounts.google.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\Q0QUQXQ8.txt [ Cookie:nichole@zuhumedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\1UYLX229.txt [ Cookie:nichole@www.fathead.com/find/murals/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@dealtime[2].txt [ Cookie:nichole@dealtime.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\Z272MADS.txt [ Cookie:nichole@adinterax.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@adsplash.rotator.hadj1.adjuggler[1].txt [ Cookie:nichole@adsplash.rotator.hadj1.adjuggler.net/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\FBJ2UM46.txt [ Cookie:nichole@www.fathead.com/find/photography/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\nichole@adtrackrs[2].txt [ Cookie:nichole@adtrackrs.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\PLF8OPFN.txt [ Cookie:nichole@www.fathead.com/find/old-masters/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\1QWJEV76.txt [ Cookie:nichole@www.fathead.com/find/dia/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\P63VCICH.txt [ Cookie:nichole@gamerclick.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\ZJBSZTY0.txt [ Cookie:nichole@mediaforge.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\3DVBZ98V.txt [ Cookie:nichole@steelhousemedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\FR2HLV2N.txt [ Cookie:nichole@us.sitestat.com/future/gamesradar/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\IDI00564.txt [ Cookie:nichole@publishers.clickbooth.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\IAP32IW1.txt [ Cookie:nichole@marquee.blogs.cnn.com/2012/01/27/toddlers-tiaras-mom-sues-media-outlets-for-sexualizing-her-daughter/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\SKMHZ0IW.txt [ Cookie:nichole@software.crackberry.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\MXT0APNO.txt [ Cookie:nichole@blog.country.inmusic.ca/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\VR2VENVU.txt [ Cookie:nichole@www.googleadservices.com/pagead/conversion/1069788006/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\SW7J112Q.txt [ Cookie:nichole@clickboothlnk.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\IUY9M98G.txt [ Cookie:nichole@www.fathead.com/find/modern-masters/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\YAH8ARM2.txt [ Cookie:nichole@us.sitestat.com/future/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\XTY54N34.txt [ Cookie:nichole@nancygrace.blogs.cnn.com/2012/01/10/teenage-girl-pleads-guilty-in-alleged-thrill-killing-of-9-year-old/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\6Q13XHKL.txt [ Cookie:nichole@eas.apm.emediate.eu/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\42VW2VC6.txt [ Cookie:nichole@www.googleadservices.com/pagead/conversion/996645526/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\P0EJEEKK.txt [ Cookie:nichole@akamai.interclickproxy.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\43VAAPYO.txt [ Cookie:nichole@www.hlntv.com/article/2011/12/28/aliahnas-home-surrounded-sex-offenders ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\XAOONI6A.txt [ Cookie:nichole@www.googleadservices.com/pagead/conversion/1001987941/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\MRDZL1DM.txt [ Cookie:nichole@crackberry.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\DO7AYNMD.txt [ Cookie:nichole@atrack.allposters.com/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\77EW4X5W.txt [ Cookie:nichole@delivery.ctasnet.com/adserver/www/delivery/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\TY0WJY0P.txt [ Cookie:nichole@www.googleadservices.com/pagead/conversion/1032956981/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\7HHL9IYK.txt [ Cookie:nichole@www.googleadservices.com/pagead/conversion/1013781419/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\21HF9G9E.txt [ Cookie:nichole@sleepcountry.ca/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\Cookies\92ZE5CLB.txt [ Cookie:nichole@crackberry.com/blackberry-soft-shell/ ]
C:\DOCUMENTS AND SETTINGS\NICHOLE\COOKIES\NICHOLE@ADS.CNN[1].TXT [ /ADS.CNN ]
83.memecounter.com [ C:\DOCUMENTS AND SETTINGS\SHAYNE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\CPDDFHHL ]
serving-sys.com [ C:\DOCUMENTS AND SETTINGS\SHAYNE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\CPDDFHHL ]

User accounts for \\USER-34BA057C07

Administrator Computer Guest
HelpAssistant Nichole shayne
SUPPORT_388945a0


**** End of log ****

(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)
scans

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,072 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:00 PM

Posted 08 March 2012 - 08:32 PM

Hello, you should run these 2 next as the loss of the desktop is usually caused bt a malware.

You also need to update some apps .We'll do that after this. I would also like to say there is a good chance you infevted yourself from a torrent download and file sharing.



Please download TDSSKiller.zip and and extract it.
  • Run TDSSKiller.exe.
  • Click Start scan.
  • When it is finished the utility outputs a list of detected objects with description.
    The utility automatically selects an action (Cure or Delete) for malicious objects.
    The utility prompts the user to select an action to apply to suspicious objects (Skip, by default). Let the options as it is and click Continue
  • Let reboot if needed and tell me if the tool needed a reboot.
  • Click on Report and post the contents of the text file that will open.

    Note: By default, the utility outputs the log into system disk (it is usually the disk with installed operating system, C:\) root folder. The Log has a name like: TDSSKiller.Version_Date_Time_log.txt.



If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to these[/color] instructions. In some cases it may be necessary to redownload TDSSKiller and randomly rename it before downloading and saving to the computer.



I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


[color="#8B0000"]NOTE: In some instances if no malware is found there will be no log produced.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 tagman66

tagman66
  • Topic Starter

  • Members
  • 78 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:00 PM

Posted 09 March 2012 - 07:27 PM

tdskiller did not need to reboot18:20:58.0562 0248 TDSS rootkit removing tool 2.7.19.0 Mar 5 2012 11:23:39
18:20:58.0859 0248 ============================================================
18:20:58.0859 0248 Current date / time: 2012/03/09 18:20:58.0859
18:20:58.0859 0248 SystemInfo:
18:20:58.0859 0248
18:20:58.0859 0248 OS Version: 5.1.2600 ServicePack: 3.0
18:20:58.0859 0248 Product type: Workstation
18:20:58.0859 0248 ComputerName: USER-34BA057C07
18:20:58.0859 0248 UserName: Computer
18:20:58.0859 0248 Windows directory: C:\WINDOWS
18:20:58.0859 0248 System windows directory: C:\WINDOWS
18:20:58.0859 0248 Processor architecture: Intel x86
18:20:58.0859 0248 Number of processors: 1
18:20:58.0859 0248 Page size: 0x1000
18:20:58.0859 0248 Boot type: Normal boot
18:20:58.0859 0248 ============================================================
18:21:00.0750 0248 Drive \Device\Harddisk0\DR0 - Size: 0x3A38B2E000 (232.89 Gb), SectorSize: 0x200, Cylinders: 0x76C1, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000054
18:21:00.0781 0248 \Device\Harddisk0\DR0:
18:21:00.0781 0248 MBR used
18:21:00.0781 0248 \Device\Harddisk0\DR0\Partition0: MBR, Type 0x7, StartLBA 0x3F, BlocksNum 0x1D1C4542
18:21:00.0796 0248 Initialize success
18:21:00.0796 0248 ============================================================
18:22:45.0078 2404 ============================================================
18:22:45.0078 2404 Scan started
18:22:45.0078 2404 Mode: Manual;
18:22:45.0078 2404 ============================================================
18:22:45.0437 2404 Abiosdsk - ok
18:22:45.0453 2404 abp480n5 - ok
18:22:45.0515 2404 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
18:22:45.0515 2404 ACPI - ok
18:22:45.0578 2404 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
18:22:45.0578 2404 ACPIEC - ok
18:22:45.0609 2404 adpu160m - ok
18:22:45.0671 2404 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
18:22:45.0687 2404 aec - ok
18:22:45.0734 2404 AFD (1e44bc1e83d8fd2305f8d452db109cf9) C:\WINDOWS\System32\drivers\afd.sys
18:22:45.0734 2404 AFD - ok
18:22:45.0765 2404 Aha154x - ok
18:22:45.0796 2404 aic78u2 - ok
18:22:45.0812 2404 aic78xx - ok
18:22:45.0843 2404 AliIde - ok
18:22:45.0890 2404 amdide1 (6e58654cb25730b2579e45e1fd116a47) C:\WINDOWS\system32\drivers\amdide1.sys
18:22:45.0890 2404 amdide1 - ok
18:22:45.0937 2404 AmdPPM (033448d435e65c4bd72e70521fd05c76) C:\WINDOWS\system32\DRIVERS\AmdPPM.sys
18:22:45.0937 2404 AmdPPM - ok
18:22:45.0968 2404 amsint - ok
18:22:46.0000 2404 asc - ok
18:22:46.0031 2404 asc3350p - ok
18:22:46.0046 2404 asc3550 - ok
18:22:46.0078 2404 AsIO (2b4e66fac6503494a2c6f32bb6ab3826) C:\WINDOWS\system32\drivers\AsIO.sys
18:22:46.0078 2404 AsIO - ok
18:22:46.0125 2404 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
18:22:46.0140 2404 AsyncMac - ok
18:22:46.0203 2404 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
18:22:46.0203 2404 atapi - ok
18:22:46.0234 2404 Atdisk - ok
18:22:46.0359 2404 ati2mtag (c4828a671467c6fb43f2e6d54b5950ee) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
18:22:46.0421 2404 ati2mtag - ok
18:22:46.0500 2404 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
18:22:46.0500 2404 Atmarpc - ok
18:22:46.0562 2404 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
18:22:46.0562 2404 audstub - ok
18:22:46.0625 2404 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
18:22:46.0625 2404 Beep - ok
18:22:46.0703 2404 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
18:22:46.0703 2404 cbidf2k - ok
18:22:46.0750 2404 cd20xrnt - ok
18:22:46.0765 2404 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
18:22:46.0781 2404 Cdaudio - ok
18:22:46.0828 2404 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
18:22:46.0828 2404 Cdfs - ok
18:22:46.0875 2404 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
18:22:46.0875 2404 Cdrom - ok
18:22:46.0906 2404 Changer - ok
18:22:46.0937 2404 CmdIde - ok
18:22:47.0000 2404 COH_Mon (de88a385898f6d13026f94f749fbaed2) C:\WINDOWS\system32\Drivers\COH_Mon.sys
18:22:47.0000 2404 COH_Mon - ok
18:22:47.0062 2404 Cpqarray - ok
18:22:47.0078 2404 dac2w2k - ok
18:22:47.0109 2404 dac960nt - ok
18:22:47.0171 2404 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
18:22:47.0171 2404 Disk - ok
18:22:47.0234 2404 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
18:22:47.0265 2404 dmboot - ok
18:22:47.0328 2404 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
18:22:47.0328 2404 dmio - ok
18:22:47.0343 2404 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
18:22:47.0343 2404 dmload - ok
18:22:47.0406 2404 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
18:22:47.0406 2404 DMusic - ok
18:22:47.0453 2404 dpti2o - ok
18:22:47.0484 2404 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
18:22:47.0484 2404 drmkaud - ok
18:22:47.0578 2404 eeCtrl (579a6b6135d32b857faf0e3a974535d8) C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys
18:22:47.0593 2404 eeCtrl - ok
18:22:47.0625 2404 EraserUtilRebootDrv (028d50f059bd0d2ccb209e9011b9a9a4) C:\Program Files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys
18:22:47.0625 2404 EraserUtilRebootDrv - ok
18:22:47.0718 2404 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
18:22:47.0765 2404 Fastfat - ok
18:22:47.0859 2404 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
18:22:47.0859 2404 Fdc - ok
18:22:47.0906 2404 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
18:22:47.0906 2404 Fips - ok
18:22:47.0937 2404 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
18:22:47.0953 2404 Flpydisk - ok
18:22:48.0000 2404 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\DRIVERS\fltMgr.sys
18:22:48.0000 2404 FltMgr - ok
18:22:48.0046 2404 FlyUsb (8efa9bfc940d9eb9348d9dafb839fe25) C:\WINDOWS\system32\DRIVERS\FlyUsb.sys
18:22:48.0046 2404 FlyUsb - ok
18:22:48.0125 2404 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
18:22:48.0125 2404 Fs_Rec - ok
18:22:48.0156 2404 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
18:22:48.0156 2404 Ftdisk - ok
18:22:48.0218 2404 GEARAspiWDM (8182ff89c65e4d38b2de4bb0fb18564e) C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys
18:22:48.0218 2404 GEARAspiWDM - ok
18:22:48.0281 2404 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
18:22:48.0281 2404 Gpc - ok
18:22:48.0312 2404 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
18:22:48.0312 2404 HDAudBus - ok
18:22:48.0359 2404 hidusb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
18:22:48.0359 2404 hidusb - ok
18:22:48.0390 2404 hpn - ok
18:22:48.0453 2404 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
18:22:48.0453 2404 HTTP - ok
18:22:48.0484 2404 i2omgmt - ok
18:22:48.0515 2404 i2omp - ok
18:22:48.0562 2404 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
18:22:48.0703 2404 i8042prt - ok
18:22:48.0859 2404 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
18:22:48.0859 2404 Imapi - ok
18:22:48.0875 2404 ini910u - ok
18:22:48.0906 2404 IntelIde - ok
18:22:48.0953 2404 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\DRIVERS\Ip6Fw.sys
18:22:48.0953 2404 Ip6Fw - ok
18:22:49.0015 2404 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
18:22:49.0015 2404 IpFilterDriver - ok
18:22:49.0062 2404 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
18:22:49.0062 2404 IpInIp - ok
18:22:49.0125 2404 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
18:22:49.0125 2404 IpNat - ok
18:22:49.0187 2404 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
18:22:49.0187 2404 IPSec - ok
18:22:49.0234 2404 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
18:22:49.0234 2404 IRENUM - ok
18:22:49.0312 2404 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
18:22:49.0312 2404 isapnp - ok
18:22:49.0375 2404 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
18:22:49.0375 2404 Kbdclass - ok
18:22:49.0406 2404 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
18:22:49.0406 2404 kbdhid - ok
18:22:49.0453 2404 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
18:22:49.0453 2404 kmixer - ok
18:22:49.0515 2404 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
18:22:49.0515 2404 KSecDD - ok
18:22:49.0546 2404 lbrtfdc - ok
18:22:49.0609 2404 Leapfrog-USBLAN (5cffda921fe0c9e9ebde3150d3c81594) C:\WINDOWS\system32\DRIVERS\btblan.sys
18:22:49.0609 2404 Leapfrog-USBLAN - ok
18:22:49.0671 2404 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
18:22:49.0671 2404 mnmdd - ok
18:22:49.0734 2404 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
18:22:49.0765 2404 Modem - ok
18:22:49.0859 2404 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
18:22:49.0859 2404 Mouclass - ok
18:22:49.0921 2404 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
18:22:49.0921 2404 mouhid - ok
18:22:49.0968 2404 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
18:22:49.0968 2404 MountMgr - ok
18:22:50.0000 2404 mraid35x - ok
18:22:50.0046 2404 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
18:22:50.0046 2404 MRxDAV - ok
18:22:50.0109 2404 MRxSmb (7d304a5eb4344ebeeab53a2fe3ffb9f0) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
18:22:50.0125 2404 MRxSmb - ok
18:22:50.0171 2404 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
18:22:50.0171 2404 Msfs - ok
18:22:50.0234 2404 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
18:22:50.0234 2404 MSKSSRV - ok
18:22:50.0265 2404 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
18:22:50.0281 2404 MSPCLOCK - ok
18:22:50.0312 2404 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
18:22:50.0328 2404 MSPQM - ok
18:22:50.0375 2404 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
18:22:50.0375 2404 mssmbios - ok
18:22:50.0421 2404 MTsensor (d48659bb24c48345d926ecb45c1ebdf5) C:\WINDOWS\system32\DRIVERS\ASACPI.sys
18:22:50.0421 2404 MTsensor - ok
18:22:50.0468 2404 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys
18:22:50.0484 2404 Mup - ok
18:22:50.0593 2404 NAVENG (862f55824ac81295837b0ab63f91071f) C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20120308.002\NAVENG.SYS
18:22:50.0593 2404 NAVENG - ok
18:22:50.0625 2404 NAVEX15 (529d571b551cb9da44237389b936f1ae) C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20120308.002\NAVEX15.SYS
18:22:50.0671 2404 NAVEX15 - ok
18:22:50.0750 2404 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
18:22:50.0750 2404 NDIS - ok
18:22:50.0796 2404 NdisTapi (0109c4f3850dfbab279542515386ae22) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
18:22:50.0796 2404 NdisTapi - ok
18:22:50.0859 2404 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
18:22:50.0859 2404 Ndisuio - ok
18:22:50.0890 2404 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
18:22:50.0890 2404 NdisWan - ok
18:22:50.0953 2404 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
18:22:50.0953 2404 NDProxy - ok
18:22:51.0015 2404 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
18:22:51.0015 2404 NetBIOS - ok
18:22:51.0046 2404 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
18:22:51.0046 2404 NetBT - ok
18:22:51.0156 2404 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
18:22:51.0156 2404 Npfs - ok
18:22:51.0218 2404 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
18:22:51.0250 2404 Ntfs - ok
18:22:51.0296 2404 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
18:22:51.0296 2404 Null - ok
18:22:51.0359 2404 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
18:22:51.0359 2404 NwlnkFlt - ok
18:22:51.0406 2404 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
18:22:51.0406 2404 NwlnkFwd - ok
18:22:51.0468 2404 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
18:22:51.0468 2404 Parport - ok
18:22:51.0531 2404 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
18:22:51.0531 2404 PartMgr - ok
18:22:51.0578 2404 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
18:22:51.0578 2404 ParVdm - ok
18:22:51.0625 2404 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
18:22:51.0625 2404 PCI - ok
18:22:51.0656 2404 PCIDump - ok
18:22:51.0703 2404 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
18:22:51.0703 2404 PCIIde - ok
18:22:51.0750 2404 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
18:22:51.0765 2404 Pcmcia - ok
18:22:51.0796 2404 PDCOMP - ok
18:22:51.0828 2404 PDFRAME - ok
18:22:51.0843 2404 PDRELI - ok
18:22:51.0875 2404 PDRFRAME - ok
18:22:51.0906 2404 perc2 - ok
18:22:51.0921 2404 perc2hib - ok
18:22:51.0984 2404 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
18:22:51.0984 2404 PptpMiniport - ok
18:22:52.0015 2404 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
18:22:52.0015 2404 PSched - ok
18:22:52.0062 2404 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
18:22:52.0062 2404 Ptilink - ok
18:22:52.0093 2404 pwdrvio (aab0efaff96126a6169355f487a32242) C:\WINDOWS\system32\pwdrvio.sys
18:22:52.0093 2404 pwdrvio - ok
18:22:52.0140 2404 pwdspio (d74205ced10211cee23c13c230d8511f) C:\WINDOWS\system32\pwdspio.sys
18:22:52.0140 2404 pwdspio - ok
18:22:52.0187 2404 ql1080 - ok
18:22:52.0203 2404 Ql10wnt - ok
18:22:52.0234 2404 ql12160 - ok
18:22:52.0265 2404 ql1240 - ok
18:22:52.0281 2404 ql1280 - ok
18:22:52.0328 2404 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
18:22:52.0328 2404 RasAcd - ok
18:22:52.0390 2404 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
18:22:52.0390 2404 Rasl2tp - ok
18:22:52.0437 2404 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
18:22:52.0437 2404 RasPppoe - ok
18:22:52.0484 2404 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
18:22:52.0484 2404 Raspti - ok
18:22:52.0531 2404 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
18:22:52.0531 2404 Rdbss - ok
18:22:52.0562 2404 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
18:22:52.0562 2404 RDPCDD - ok
18:22:52.0625 2404 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
18:22:52.0625 2404 rdpdr - ok
18:22:52.0671 2404 RDPWD (fc105dd312ed64eb66bff111e8ec6eac) C:\WINDOWS\system32\drivers\RDPWD.sys
18:22:52.0671 2404 RDPWD - ok
18:22:52.0750 2404 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
18:22:52.0750 2404 redbook - ok
18:22:52.0890 2404 RTHDMIAzAudService (3cf6631543c743c29a369287ea67ffe6) C:\WINDOWS\system32\drivers\RtKHDMI.sys
18:22:52.0953 2404 RTHDMIAzAudService - ok
18:22:53.0015 2404 RTLE8023xp (a1ad65718870dbf2bcb81e3c1406469e) C:\WINDOWS\system32\DRIVERS\Rtenicxp.sys
18:22:53.0031 2404 RTLE8023xp - ok
18:22:53.0093 2404 SASDIFSV (39763504067962108505bff25f024345) C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS
18:22:53.0093 2404 SASDIFSV - ok
18:22:53.0125 2404 SASKUTIL (77b9fc20084b48408ad3e87570eb4a85) C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS
18:22:53.0125 2404 SASKUTIL - ok
18:22:53.0218 2404 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
18:22:53.0234 2404 Secdrv - ok
18:22:53.0265 2404 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
18:22:53.0281 2404 serenum - ok
18:22:53.0312 2404 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys
18:22:53.0312 2404 Serial - ok
18:22:53.0390 2404 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
18:22:53.0390 2404 Sfloppy - ok
18:22:53.0453 2404 Simbad - ok
18:22:53.0515 2404 Sparrow - ok
18:22:53.0625 2404 SPBBCDrv (e87cf104f12c92401c4d33c50a3d5dc8) C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCDrv.sys
18:22:53.0625 2404 SPBBCDrv - ok
18:22:53.0687 2404 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
18:22:53.0687 2404 splitter - ok
18:22:53.0750 2404 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
18:22:53.0750 2404 sr - ok
18:22:53.0796 2404 SRTSP (5a293729e1f9fce3a2106d1f5dc5e98a) C:\WINDOWS\system32\Drivers\SRTSP.SYS
18:22:53.0796 2404 SRTSP - ok
18:22:53.0859 2404 SRTSPL (0ddb7fba32be09d8057063c0cee24137) C:\WINDOWS\system32\Drivers\SRTSPL.SYS
18:22:53.0875 2404 SRTSPL - ok
18:22:53.0921 2404 SRTSPX (a99719dfb61b61aa5026341bbb733c0a) C:\WINDOWS\system32\Drivers\SRTSPX.SYS
18:22:53.0921 2404 SRTSPX - ok
18:22:53.0984 2404 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
18:22:53.0984 2404 Srv - ok
18:22:54.0046 2404 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
18:22:54.0046 2404 swenum - ok
18:22:54.0093 2404 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
18:22:54.0109 2404 swmidi - ok
18:22:54.0156 2404 symc810 - ok
18:22:54.0187 2404 symc8xx - ok
18:22:54.0234 2404 SymEvent (a54ff04bd6e75dc4d8cb6f3e352635e0) C:\WINDOWS\system32\Drivers\SYMEVENT.SYS
18:22:54.0234 2404 SymEvent - ok
18:22:54.0296 2404 SYMREDRV (394b2368212114d538316812af60fddd) C:\WINDOWS\System32\Drivers\SYMREDRV.SYS
18:22:54.0296 2404 SYMREDRV - ok
18:22:54.0343 2404 SYMTDI (d46676bb414c7531bdffe637a33f5033) C:\WINDOWS\System32\Drivers\SYMTDI.SYS
18:22:54.0343 2404 SYMTDI - ok
18:22:54.0375 2404 sym_hi - ok
18:22:54.0406 2404 sym_u3 - ok
18:22:54.0453 2404 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
18:22:54.0453 2404 sysaudio - ok
18:22:54.0515 2404 SysPlant (5dcc2c7acc29dfba5ba82ed47d99c7e5) C:\WINDOWS\SYSTEM32\Drivers\SysPlant.sys
18:22:54.0515 2404 SysPlant - ok
18:22:54.0578 2404 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
18:22:54.0578 2404 Tcpip - ok
18:22:54.0625 2404 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
18:22:54.0640 2404 TDPIPE - ok
18:22:54.0671 2404 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
18:22:54.0687 2404 TDTCP - ok
18:22:54.0750 2404 Teefer2 (1d3c046a9106de97ddc8276958700bf4) C:\WINDOWS\system32\DRIVERS\teefer2.sys
18:22:54.0750 2404 Teefer2 - ok
18:22:54.0812 2404 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
18:22:54.0812 2404 TermDD - ok
18:22:54.0859 2404 TosIde - ok
18:22:54.0906 2404 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
18:22:54.0921 2404 Udfs - ok
18:22:54.0953 2404 ultra - ok
18:22:55.0015 2404 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
18:22:55.0015 2404 Update - ok
18:22:55.0062 2404 USBAAPL (83cafcb53201bbac04d822f32438e244) C:\WINDOWS\system32\Drivers\usbaapl.sys
18:22:55.0078 2404 USBAAPL - ok
18:22:55.0125 2404 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
18:22:55.0125 2404 usbccgp - ok
18:22:55.0171 2404 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
18:22:55.0171 2404 usbehci - ok
18:22:55.0218 2404 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
18:22:55.0218 2404 usbhub - ok
18:22:55.0250 2404 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys
18:22:55.0250 2404 usbohci - ok
18:22:55.0296 2404 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
18:22:55.0296 2404 usbprint - ok
18:22:55.0343 2404 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
18:22:55.0343 2404 usbscan - ok
18:22:55.0406 2404 usbstor (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
18:22:55.0406 2404 usbstor - ok
18:22:55.0453 2404 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
18:22:55.0453 2404 VgaSave - ok
18:22:55.0546 2404 VIAHdAudAddService (8586d10602ff4994e0f56a13a47d2b28) C:\WINDOWS\system32\drivers\viahduaa.sys
18:22:55.0562 2404 VIAHdAudAddService - ok
18:22:55.0593 2404 ViaIde - ok
18:22:55.0625 2404 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
18:22:55.0640 2404 VolSnap - ok
18:22:55.0703 2404 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
18:22:55.0703 2404 Wanarp - ok
18:22:55.0734 2404 WDICA - ok
18:22:55.0765 2404 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
18:22:55.0765 2404 wdmaud - ok
18:22:55.0859 2404 WmiAcpi (c42584fd66ce9e17403aebca199f7bdb) C:\WINDOWS\system32\DRIVERS\wmiacpi.sys
18:22:55.0859 2404 WmiAcpi - ok
18:22:55.0937 2404 WPS (e8e745b8eee63c7cf7d34833d3b8ca7f) C:\WINDOWS\system32\drivers\wpsdrvnt.sys
18:22:55.0937 2404 WPS - ok
18:22:56.0000 2404 WpsHelper (ff983a25ae6f7d3f87f26bf51f02a201) C:\WINDOWS\system32\drivers\WpsHelper.sys
18:22:56.0000 2404 WpsHelper - ok
18:22:56.0078 2404 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
18:22:56.0078 2404 WudfPf - ok
18:22:56.0125 2404 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
18:22:56.0140 2404 WudfRd - ok
18:22:56.0171 2404 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
18:22:56.0296 2404 \Device\Harddisk0\DR0 - ok
18:22:56.0296 2404 Boot (0x1200) (9cc8aea4e4fd0cc25d26c0a7b6903794) \Device\Harddisk0\DR0\Partition0
18:22:56.0296 2404 \Device\Harddisk0\DR0\Partition0 - ok
18:22:56.0312 2404 ============================================================
18:22:56.0312 2404 Scan finished
18:22:56.0312 2404 ============================================================
18:22:56.0328 0200 Detected object count: 0
18:22:56.0328 0200 Actual detected object count: 0C:\Documents and Settings\Computer\.frostwire5\updates\frostwire-5.3.2.windows.exe Win32/OpenCandy application deleted - quarantined
C:\Documents and Settings\Computer\Application Data\FrostWire\.AppSpecialShare\frostwire-4.21.7.windows.exe Win32/OpenCandy application deleted - quarantined
C:\Documents and Settings\Computer\Desktop\SmitfraudFix.exe multiple threats deleted - quarantined
C:\Documents and Settings\Computer\Desktop\SmitfraudFix\Process.exe Win32/PrcView application cleaned by deleting - quarantined
C:\Documents and Settings\Computer\Desktop\SmitfraudFix\restart.exe Win32/Shutdown.NAA application cleaned by deleting - quarantined
C:\System Volume Information\_restore{ABF1B7F4-6367-4805-B9A6-D0E4CDCAAB13}\RP429\A0035253.exe Win32/OpenCandy application deleted - quarantined
C:\System Volume Information\_restore{ABF1B7F4-6367-4805-B9A6-D0E4CDCAAB13}\RP429\A0035254.exe Win32/OpenCandy application deleted - quarantined
C:\System Volume Information\_restore{ABF1B7F4-6367-4805-B9A6-D0E4CDCAAB13}\RP429\A0035255.exe multiple threats deleted - quarantined
C:\System Volume Information\_restore{ABF1B7F4-6367-4805-B9A6-D0E4CDCAAB13}\RP429\A0035256.exe Win32/PrcView application cleaned by deleting - quarantined
C:\System Volume Information\_restore{ABF1B7F4-6367-4805-B9A6-D0E4CDCAAB13}\RP429\A0035257.exe Win32/Shutdown.NAA application cleaned by deleting - quarantined

18:24:51.0062 3640 Deinitialize success

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,072 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:00 PM

Posted 09 March 2012 - 10:59 PM

Looks clean now. How is it running?

Run TFC by OT (Temp File Cleaner)
Please download TFC by Old Timer and save it to your desktop.
alternate download link

Save any unsaved work. TFC will close ALL open programs including your browser!
Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 tagman66

tagman66
  • Topic Starter

  • Members
  • 78 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:00 PM

Posted 10 March 2012 - 10:08 AM

ran tfc seems to be working fine now thanks

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,072 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:00 PM

Posted 10 March 2012 - 10:14 AM

Great! and you're welcome.
If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.

Tips to protect yourself against malware and reduce the potential for re-infection:Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs. They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users. The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications. Read P2P Software User Advisories and Risks of File-Sharing Technology.

Keeping Autorun enabled on USB and other removable drives has become a significant security risk due to the increasing number of malware variants that can infect them and transfer the infection to your computer. To learn more about this risk, please read:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users