Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Cleanup after Removing Department of Justice Ransomware


  • Please log in to reply
6 replies to this topic

#1 thelaw

thelaw

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:02:01 AM

Posted 06 January 2013 - 11:57 PM

I am trying to make sure this system is clean before returning it to a relative. System was hit with the Department of Justice Ransomware which looks like this but in English:

http://www.enigmasoftware.com/turkpolisibllgisayarinizinblokeedilmistirransomware-removal/

I was able to disable the ransomware by going into safemode and unchecking the entry from the StartUp folder. The popup was caused by 2 or 3 files whose name looked like wgsdgsdgdsgsd. Running Emsisoft's Emergency Kit Scanner and RogueKiller removed these entries.

Although there is no longer any popup ransomware, I tried to run a few diagnostic utilites (namely Rkill and Gmer), but they both bluescreened the computer. That is why I suspect something else might be going on. Thanks.

Here is the DDS.txt file:
-------------------------

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 10.5.1
Run by Preferred Customer at 18:40:27 on 2013-01-06
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2047.1496 [GMT -8:00]
.
.
============== Running Processes ================
.
C:\WINDOWS.1\system32\savedump.exe
C:\WINDOWS.1\system32\nvsvc32.exe
C:\WINDOWS.1\System32\wudfhost.exe
C:\WINDOWS.1\Explorer.EXE
C:\WINDOWS.1\system32\spoolsv.exe
C:\WINDOWS.1\system32\acs.exe
C:\WINDOWS.1\System32\spool\DRIVERS\W32X86\3\fppdis2a.exe
C:\shareb\totalrecorder\TotRecSched.exe
C:\WINDOWS.1\system32\RUNDLL32.EXE
C:\WINDOWS.1\system32\ctfmon.exe
C:\Program Files\WinTV\WinTV7\WinTVTray.exe
C:\shareb\Gizmo5\mDNSResponder.exe
C:\PROGRA~1\WinTV\Extend\WINTVE~1.EXE
C:\PROGRA~1\WinTV\TVServer\HAUPPA~1.EXE
C:\Program Files\Oracle\JavaFX 2.1 Runtime\bin\jqs.exe
C:\Program Files\NETGEAR\WNA1100\WifiSvc.exe
C:\PROGRA~1\WinTV\TVServer\CAPTUR~4.EXE
C:\WINDOWS.1\system32\wuauclt.exe
C:\WINDOWS.1\System32\alg.exe
C:\WINDOWS.1\system32\wscntfy.exe
C:\WINDOWS.1\system32\wbem\wmiprvse.exe
C:\WINDOWS.1\system32\svchost.exe -k WudfServiceGroup
C:\WINDOWS.1\system32\svchost.exe -k netsvcs
C:\WINDOWS.1\system32\svchost.exe -k NetworkService
C:\WINDOWS.1\system32\svchost.exe -k LocalService
C:\WINDOWS.1\system32\svchost.exe -k LocalService
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.msn.com
uProxyServer = 8.8.8.8:80
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\oracle\javafx 2.1 runtime\bin\ssv.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\oracle\javafx 2.1 runtime\bin\jp2ssv.dll
TB: &RoboForm: {724D43A0-0D85-11D4-9908-00400523E39A} - c:\sharec\roboform\RoboForm.dll
TB: &RoboForm: {724d43a0-0d85-11d4-9908-00400523e39a} - c:\sharec\roboform\RoboForm.dll
TB: Yahoo! Toolbar: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - c:\program files\yahoo!\companion\installs\cpn\yt.dll
TB: Veoh Browser Plug-in: {D0943516-5076-4020-A3B5-AEFAF26AB263} - c:\sharea\veoh\plugins\reg\VeohToolbar.dll
TB: Veoh Web Player Video Finder: {0FBB9689-D3D7-4f7a-A2E2-585B10099BFC} - c:\program files\veoh networks\veohwebplayer\VeohIEToolbar.dll
uRun: [ctfmon.exe] c:\windows.1\system32\ctfmon.exe
mRun: [pdfFactory Pro Dispatcher v2] c:\windows.1\system32\spool\drivers\w32x86\3\fppdis2a.exe
mRun: [TotalRecorderScheduler] "c:\shareb\totalrecorder\TotRecSched.exe"
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows.1\system32\NvMcTray.dll,NvTaskbarInit
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows.1\system32\NvCpl.dll,NvStartup
mRun: [nwiz] c:\program files\nvidia corporation\nview\nwiz.exe /installquiet
mRun: [KernelFaultCheck] c:\windows.1\system32\dumprep 0 -k
mRun: [jswtrayutil] "c:\program files\netgear\wna1100\jswtrayutil.exe"
dRunOnce: [tscuninstall] c:\windows.1\system32\tscupgrd.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\autost~1.lnk - c:\program files\wintv\Ir.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\wintvr~1.lnk - c:\program files\wintv\wintv7\WinTVTray.exe
mPolicies-Explorer: NoDrives = dword:0
mPolicies-Windows\System: Allow-LogonScript-NetbiosDisabled = dword:1
mPolicies-Explorer: NoDriveTypeAutoRun = dword:145
IE: &2 Customize Menu - c:\sharec\roboform\RoboForm.dll/ComCustomIEMenu.html
IE: &7 Fill Forms - c:\sharec\roboform\RoboForm.dll/ComFillForms.html
IE: &8 Save Forms - c:\sharec\roboform\RoboForm.dll/ComSavePass.html
IE: Add to WebSite-Watcher - c:\documents and settings\preferred customer\application data\aignes\website-watcher\config\settings\wswie.htm
IE: {320AF880-6646-11D3-ABEE-C5DBF3571F46} - c:\sharec\roboform\RoboForm.dll/ComFillForms.html
IE: {320AF880-6646-11D3-ABEE-C5DBF3571F49} - c:\sharec\roboform\RoboForm.dll/ComSavePass.html
IE: {724d43aa-0d85-11d4-9908-00400523e39a} - c:\sharec\roboform\RoboForm.dll/ComShowToolbar.html
IE: {88CFA58B-A63F-4A94-9C54-0C7A58E3333E} - {17A84966-F1E9-4645-AA9E-5E771EE1C859} - c:\sharea\videoget\plugins\VideoGet_IE.dll
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
.
INFO: HKCU has more than 50 listed domains.
If you wish to scan all of them, select the 'Force scan all domains' option.
.
.
INFO: HKLM has more than 50 listed domains.
If you wish to scan all of them, select the 'Force scan all domains' option.
.
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/E/5/6/E5611B10-0D6D-4117-8430-A67417AA88CD/LegitCheckControl.cab
DPF: {50647AB5-18FD-4142-82B0-5852478DD0D5} - hxxp://webeffective.keynote.com/applications/pconnector/download/ConnectorLauncher.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1341968829031
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1347389754156
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0_05-windows-i586.cab
DPF: {CAFEEFAC-0017-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0_05-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0_05-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: NameServer = 198.153.192.40 208.67.220.123
TCP: Interfaces\{EE89F76D-8881-430A-B1FA-5690EA41F985} : DHCPNameServer = 198.153.192.40 208.67.220.123
Notify: !SASWinLogon - c:\sharec\superantispyware\SASWINLO.dll
Notify: AtiExtEvent - <no file>
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows.1\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class - {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - c:\sharec\superantispyware\SASSEH.DLL
LSA: Notification Packages = scecli scecli scecli scecli scecli scecli
mASetup: {B2C3BB6B-E005-4246-B8E5-DF0A4D073CDC} - c:\program files\pixiepack codec pack\InstallerHelper.exe
.
============= SERVICES / DRIVERS ===============
.
R0 hotcore3;hotcore3;c:\windows.1\system32\drivers\hotcore3.sys [2008-10-31 38448]
R0 viasraid;viasraid;c:\windows.1\system32\drivers\viasraid.sys [2003-10-31 77312]
R1 fwdrv;Kerio Personal Firewall Driver;c:\windows.1\system32\drivers\FWDRV.SYS [2007-2-12 102912]
R1 SASDIFSV;SASDIFSV;c:\sharec\superantispyware\sasdifsv.sys [2006-10-10 5632]
R1 SASKUTIL;SASKUTIL;c:\sharec\superantispyware\SASKUTIL.SYS [2007-1-9 30720]
R1 VBoxDrv;VirtualBox Service;c:\windows.1\system32\drivers\VBoxDrv.sys [2012-7-3 158552]
R1 VBoxUSBMon;VirtualBox USB Monitor Driver;c:\windows.1\system32\drivers\VBoxUSBMon.sys [2012-7-3 91992]
R2 Hauppauge WinTV Extender;Hauppauge WinTV Extender;c:\progra~1\wintv\extend\WINTVE~1.EXE [2012-11-25 69120]
R2 HauppaugeTVServer;HauppaugeTVServer;c:\progra~1\wintv\tvserver\HAUPPA~1.EXE [2012-11-25 558592]
R2 MLPTDR_Q;MLPTDR_Q;c:\windows.1\system32\MLPTDR_Q.SYS [2012-4-6 18848]
R2 npf;NetGroup Packet Filter Driver;c:\windows.1\system32\drivers\npf.sys [2010-7-15 35088]
R2 ppsio2;PPDevice;c:\windows.1\system32\drivers\ppsio2.sys [2012-3-28 23200]
R2 WSWNA1100;WSWNA1100;c:\program files\netgear\wna1100\WifiSvc.exe [2012-6-12 266240]
R3 AR9271;Atheros AR9271 Wireless Network Adapter Service;c:\windows.1\system32\drivers\athuw.sys [2012-6-12 1759584]
R3 DsAudioDevice_286;DsAudioDevice_286;c:\windows.1\system32\drivers\DsAudioDevice_286.sys [2008-12-24 16640]
R3 hcw18bda;Hauppauge WinTV 418 Driver;c:\windows.1\system32\drivers\hcw18bda.sys [2011-11-12 719616]
R3 HexTunnelDevice;Hexago Multi-Virtual Tunnel Adapter;c:\windows.1\system32\drivers\hextun.sys [2009-2-23 22176]
R3 JSWSCIMD;jswscimd Service;c:\windows.1\system32\drivers\jswscimd.sys [2012-6-12 57440]
R3 VBoxNetAdp;VirtualBox Host-Only Ethernet Adapter;c:\windows.1\system32\drivers\VBoxNetAdp.sys [2012-6-5 104792]
R3 VBoxNetFlt;VirtualBox Bridged Networking Service;c:\windows.1\system32\drivers\VBoxNetFlt.sys [2012-9-7 116056]
R3 WsAudio_DeviceS(1);WsAudio_DeviceS(1);c:\windows.1\system32\drivers\WsAudio_DeviceS(1).sys [2009-5-14 25704]
R3 WsAudio_DeviceS(2);WsAudio_DeviceS(2);c:\windows.1\system32\drivers\WsAudio_DeviceS(2).sys [2010-1-9 25704]
R3 WsAudio_DeviceS(3);WsAudio_DeviceS(3);c:\windows.1\system32\drivers\WsAudio_DeviceS(3).sys [2010-1-9 25704]
R3 WsAudio_DeviceS(4);WsAudio_DeviceS(4);c:\windows.1\system32\drivers\WsAudio_DeviceS(4).sys [2010-1-9 25704]
R3 WsAudio_DeviceS(5);WsAudio_DeviceS(5);c:\windows.1\system32\drivers\WsAudio_DeviceS(5).sys [2010-1-9 25704]
S0 MFX;MFX;c:\windows.1\system32\drivers\MFX.sys [2005-11-24 49692]
S0 XMS1563K;XMS1563K;c:\windows.1\system32\drivers\XMS1563K.SYS [2005-11-24 49692]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows.1\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 gw6c;Hexago Gateway6 Client;c:\shareb\gateway6 client\gw6c.exe [2009-2-23 385024]
S2 NPVR Recording Service;NPVR Recording Service;"c:\program files\npvr\nrecord.exe" --> c:\program files\npvr\NRecord.exe [?]
S3 a2acc;a2acc;c:\sharec\emsisoft anti-malware\a2accx86.sys [2011-8-28 51632]
S3 a2AntiMalware;Emsisoft Anti-Malware 5.1 - Service;c:\sharec\emsisoft anti-malware\a2service.exe [2011-8-28 3045688]
S3 a2free;a-squared Free Service;c:\sharec\a-squared free\a2service.exe [2007-8-22 1872320]
S3 Ambfilt;Ambfilt;c:\windows.1\system32\drivers\Ambfilt.sys [2009-11-18 1691480]
S3 Andbus;LGE Android Composite USB Device;c:\windows.1\system32\drivers\lgandbus.sys --> c:\windows.1\system32\drivers\lgandbus.sys [?]
S3 AndDiag;LGE Android USB Serial Port;c:\windows.1\system32\drivers\lganddiag.sys --> c:\windows.1\system32\drivers\lganddiag.sys [?]
S3 AndGps;LGE Android USB GPS NMEA Port;c:\windows.1\system32\drivers\lgandgps.sys --> c:\windows.1\system32\drivers\lgandgps.sys [?]
S3 ANDModem;LGE Android USB Modem;c:\windows.1\system32\drivers\lgandmodem.sys --> c:\windows.1\system32\drivers\lgandmodem.sys [?]
S3 androidusb;ADB Interface Driver;c:\windows.1\system32\drivers\lgandadb.sys --> c:\windows.1\system32\drivers\lgandadb.sys [?]
S3 GSService;GSService;c:\windows.1\system32\GSService.exe [2010-11-2 364544]
S3 HwIOctl;HwIOctl;\??\c:\drivers\bios2.2\hwioctl.sys --> c:\drivers\bios2.2\HwIOctl.sys [?]
S3 jswpsapi;JumpStart Wi-Fi Protected Setup;c:\program files\netgear\wna1100\jswpsapi.exe [2012-6-12 360529]
S3 ms6823;IEEE802.11b Wireless USB Adapter;c:\windows.1\system32\drivers\ms6823.sys [2004-6-10 55168]
S3 RTL8192Ce;Realtek Wireless LAN 802.11n PCI-E NIC Driver;c:\windows.1\system32\drivers\rtl8192Ce.sys [2011-12-9 1480296]
S3 SASENUM;SASENUM;c:\sharec\superantispyware\SASENUM.SYS [2006-2-16 4096]
S3 SIS163u;SiS163 USB Wireless LAN Adapter Driver;c:\windows.1\system32\drivers\sis163u.sys [2011-8-28 215552]
S3 STSService;STSService;c:\program files\soundtaxi media suite\STSService.exe [2010-10-29 364544]
S3 Vsp;Vsp;c:\windows.1\system32\drivers\vsp.sys [2008-8-16 3351]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows.1\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
S3 XE102Mp5;XE102Mp5 NDIS Protocol Driver;c:\windows.1\system32\drivers\XE102Mp5.sys [2009-6-15 21120]
S3 XE102Sp5;XE102Sp5 NDIS Protocol Driver;c:\windows.1\system32\drivers\XE102Sp5.sys [2009-6-15 18176]
.
=============== File Associations ===============
.
FileExt: .txt: Applications\AEdit32.exe=c:\shareb\aedit\AEdit32.exe %1 [UserChoice]
ShellExec: BitComet.exe: open="c:\sharec\bitcomet\BitComet.exe"
ShellExec: Foxit Reader.exe: print="c:\sharea\foxit\Foxit Reader.exe"/p "%1"
ShellExec: Foxit Reader.exe: printto="c:\sharea\foxit\Foxit Reader.exe"/t "%1" "%2" "%3" "%4"
.
=============== Created Last 30 ================
.
2013-01-02 08:35:10 93640 ----a-w- c:\windows.1\system32\WindowsAccessBridge.dll
2012-12-27 07:38:37 -------- d-----w- c:\program files\Magical Phones
.
==================== Find3M ====================
.
2012-12-16 12:23:59 290560 ----a-w- c:\windows.1\system32\atmfd.dll
2012-12-15 00:49:28 21104 ----a-w- c:\windows.1\system32\drivers\mbam.sys
2012-12-12 09:20:11 73656 ----a-w- c:\windows.1\system32\FlashPlayerCPLApp.cpl
2012-12-12 09:20:11 697272 ----a-w- c:\windows.1\system32\FlashPlayerApp.exe
2012-11-13 01:25:12 1866368 ----a-w- c:\windows.1\system32\win32k.sys
2012-11-02 02:02:42 375296 ----a-w- c:\windows.1\system32\dpnet.dll
2012-11-01 12:17:54 916992 ----a-w- c:\windows.1\system32\wininet.dll
2012-11-01 12:17:54 43520 ----a-w- c:\windows.1\system32\licmgr10.dll
2012-11-01 12:17:54 1469440 ------w- c:\windows.1\system32\inetcpl.cpl
2012-11-01 00:35:34 385024 ----a-w- c:\windows.1\system32\html.iec
2005-05-14 00:12:00 217073 --sha-r- c:\windows.1\meta4.exe
2005-10-24 18:13:58 66560 --sha-r- c:\windows.1\MOTA113.exe
2005-10-14 04:27:00 422400 --sha-r- c:\windows.1\x2.64.exe
2005-06-26 23:32:28 616448 --sha-r- c:\windows.1\system32\cygwin1.dll
2005-06-22 06:37:42 45568 --sha-r- c:\windows.1\system32\cygz.dll
2006-05-03 20:06:54 163328 --sha-r- c:\windows.1\system32\flvDX.dll
2007-02-21 21:47:16 31232 --sha-r- c:\windows.1\system32\msfDX.dll
2008-03-16 23:30:52 216064 --sha-r- c:\windows.1\system32\nbDX.dll
2006-04-27 18:24:24 2945024 --sha-r- c:\windows.1\system32\Smab.dll
2010-01-07 08:00:00 107520 --sha-r- c:\windows.1\system32\TAKDSDecoder.dll
2005-02-28 21:16:22 240128 --sha-r- c:\windows.1\system32\x.264.exe
.
============= FINISH: 18:41:24.29 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 39,191 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:01 AM

Posted 08 January 2013 - 10:02 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.
===

Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your Anti-Virus and Anti-Spyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Close any open browsers, and all other programs working. Make sure you save your file if working on a document.
  • Do not install any other programs until this if fixed.[/b]
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
  • Some Rookit infection may damage your boot sector. The Windows Recovery Console may be needed to restore it. Do not bypass this installation. You may regret it.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Note: If you have difficulty properly disabling your protection programs, refer to this link --> http://www.bleepingcomputer.com/forums/topic114351.html

Do not mouse click ComboFix's window while it's running. That may cause it to stall

Note: If after running ComboFix you get this error message "Illegal operation attempted on a registry key that has been marked for deletion." when attempting to run a program all you need to do is restart the computer to reset the registry.
===

Third party programs if not up to date can be the cause of infiltration an infection.

Please run this security check for my review.

Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
===

Please download AdwCleaner by Xplode onto your Desktop.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Search.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Rn].txt (n is a number).

Please post the logs and let me know if the problem persists.

#3 thelaw

thelaw
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:02:01 AM

Posted 09 January 2013 - 06:46 AM

1. ComboFix.txt

ComboFix 13-01-08.01 - Preferred Customer 01/09/2013 2:04.4.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2047.1481 [GMT -8:00]
Running from: c:\documents and settings\Preferred Customer\Desktop\COMBOFIX.EXE
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\8f01a90e-7eb3-48d3-93b1-50d88fd146fb
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\Preferred Customer\Application Data\ImgBurn.exe
c:\documents and settings\Preferred Customer\Application Data\yuvcodecs-1.3.exe
c:\documents and settings\Preferred Customer\WINDOWS
c:\program files\Internet Explorer\SET52F.tmp
c:\program files\Internet Explorer\SET60A.tmp
c:\shareb\AnVir Task Manager\AnVIr.exe
c:\windows.1\ali.exe
c:\windows.1\iun6002.exe
c:\windows.1\msvcr71.dll
c:\windows.1\SET449.tmp
c:\windows.1\SET524.tmp
c:\windows.1\SET60C.tmp
c:\windows.1\SET6E7.tmp
c:\windows.1\SET7CF.tmp
c:\windows.1\system32\_003214_.tmp.dll
c:\windows.1\system32\_003215_.tmp.dll
c:\windows.1\system32\_003216_.tmp.dll
c:\windows.1\system32\_003217_.tmp.dll
c:\windows.1\system32\_003221_.tmp.dll
c:\windows.1\system32\_003222_.tmp.dll
c:\windows.1\system32\_003223_.tmp.dll
c:\windows.1\system32\_003224_.tmp.dll
c:\windows.1\system32\_003225_.tmp.dll
c:\windows.1\system32\_003226_.tmp.dll
c:\windows.1\system32\_003227_.tmp.dll
c:\windows.1\system32\_003228_.tmp.dll
c:\windows.1\system32\_003229_.tmp.dll
c:\windows.1\system32\_003230_.tmp.dll
c:\windows.1\system32\_003231_.tmp.dll
c:\windows.1\system32\_003232_.tmp.dll
c:\windows.1\system32\_003233_.tmp.dll
c:\windows.1\system32\_003234_.tmp.dll
c:\windows.1\system32\_003235_.tmp.dll
c:\windows.1\system32\_003236_.tmp.dll
c:\windows.1\system32\_003237_.tmp.dll
c:\windows.1\system32\_003238_.tmp.dll
c:\windows.1\system32\_003239_.tmp.dll
c:\windows.1\system32\_003240_.tmp.dll
c:\windows.1\system32\_003241_.tmp.dll
c:\windows.1\system32\_003242_.tmp.dll
c:\windows.1\system32\_003243_.tmp.dll
c:\windows.1\system32\_003244_.tmp.dll
c:\windows.1\system32\_003245_.tmp.dll
c:\windows.1\system32\_003246_.tmp.dll
c:\windows.1\system32\_003247_.tmp.dll
c:\windows.1\system32\_003248_.tmp.dll
c:\windows.1\system32\_003249_.tmp.dll
c:\windows.1\system32\_003250_.tmp.dll
c:\windows.1\system32\_003251_.tmp.dll
c:\windows.1\system32\_003252_.tmp.dll
c:\windows.1\system32\_003253_.tmp.dll
c:\windows.1\system32\_003254_.tmp.dll
c:\windows.1\system32\_003255_.tmp.dll
c:\windows.1\system32\_003256_.tmp.dll
c:\windows.1\system32\_003257_.tmp.dll
c:\windows.1\system32\_003258_.tmp.dll
c:\windows.1\system32\_003259_.tmp.dll
c:\windows.1\system32\_003260_.tmp.dll
c:\windows.1\system32\_003261_.tmp.dll
c:\windows.1\system32\_003262_.tmp.dll
c:\windows.1\system32\_003263_.tmp.dll
c:\windows.1\system32\_003264_.tmp.dll
c:\windows.1\system32\_003265_.tmp.dll
c:\windows.1\system32\_003266_.tmp.dll
c:\windows.1\system32\_003267_.tmp.dll
c:\windows.1\system32\_003268_.tmp.dll
c:\windows.1\system32\_003269_.tmp.dll
c:\windows.1\system32\_003270_.tmp.dll
c:\windows.1\system32\_003271_.tmp.dll
c:\windows.1\system32\_003272_.tmp.dll
c:\windows.1\system32\_003273_.tmp.dll
c:\windows.1\system32\_003274_.tmp.dll
c:\windows.1\system32\_003275_.tmp.dll
c:\windows.1\system32\_003276_.tmp.dll
c:\windows.1\system32\_003277_.tmp.dll
c:\windows.1\system32\_003278_.tmp.dll
c:\windows.1\system32\_003279_.tmp.dll
c:\windows.1\system32\_003280_.tmp.dll
c:\windows.1\system32\_003281_.tmp.dll
c:\windows.1\system32\_003282_.tmp.dll
c:\windows.1\system32\_003283_.tmp.dll
c:\windows.1\system32\_003284_.tmp.dll
c:\windows.1\system32\_003285_.tmp.dll
c:\windows.1\system32\_003286_.tmp.dll
c:\windows.1\system32\_003287_.tmp.dll
c:\windows.1\system32\_003288_.tmp.dll
c:\windows.1\system32\_003289_.tmp.dll
c:\windows.1\system32\_003290_.tmp.dll
c:\windows.1\system32\_003292_.tmp.dll
c:\windows.1\system32\_003293_.tmp.dll
c:\windows.1\system32\_003294_.tmp.dll
c:\windows.1\system32\_003295_.tmp.dll
c:\windows.1\system32\_003296_.tmp.dll
c:\windows.1\system32\_003297_.tmp.dll
c:\windows.1\system32\_003298_.tmp.dll
c:\windows.1\system32\_003300_.tmp.dll
c:\windows.1\system32\_003301_.tmp.dll
c:\windows.1\system32\_003302_.tmp.dll
c:\windows.1\system32\_003303_.tmp.dll
c:\windows.1\system32\_003304_.tmp.dll
c:\windows.1\system32\_003305_.tmp.dll
c:\windows.1\system32\_003306_.tmp.dll
c:\windows.1\system32\_003307_.tmp.dll
c:\windows.1\system32\_003308_.tmp.dll
c:\windows.1\system32\_003309_.tmp.dll
c:\windows.1\system32\_003310_.tmp.dll
c:\windows.1\system32\_003311_.tmp.dll
c:\windows.1\system32\_003312_.tmp.dll
c:\windows.1\system32\_003313_.tmp.dll
c:\windows.1\system32\_003314_.tmp.dll
c:\windows.1\system32\_003315_.tmp.dll
c:\windows.1\system32\_003316_.tmp.dll
c:\windows.1\system32\_003318_.tmp.dll
c:\windows.1\system32\_003319_.tmp.dll
c:\windows.1\system32\_003320_.tmp.dll
c:\windows.1\system32\_003321_.tmp.dll
c:\windows.1\system32\_003322_.tmp.dll
c:\windows.1\system32\_003325_.tmp.dll
c:\windows.1\system32\_003326_.tmp.dll
c:\windows.1\system32\_003327_.tmp.dll
c:\windows.1\system32\_003328_.tmp.dll
c:\windows.1\system32\_003329_.tmp.dll
c:\windows.1\system32\_003330_.tmp.dll
c:\windows.1\system32\_003331_.tmp.dll
c:\windows.1\system32\_003333_.tmp.dll
c:\windows.1\system32\_003334_.tmp.dll
c:\windows.1\system32\_003335_.tmp.dll
c:\windows.1\system32\_003336_.tmp.dll
c:\windows.1\system32\_003337_.tmp.dll
c:\windows.1\system32\_003338_.tmp.dll
c:\windows.1\system32\_003339_.tmp.dll
c:\windows.1\system32\_003340_.tmp.dll
c:\windows.1\system32\_003341_.tmp.dll
c:\windows.1\system32\_003342_.tmp.dll
c:\windows.1\system32\_003343_.tmp.dll
c:\windows.1\system32\_003344_.tmp.dll
c:\windows.1\system32\_003345_.tmp.dll
c:\windows.1\system32\_003346_.tmp.dll
c:\windows.1\system32\_003347_.tmp.dll
c:\windows.1\system32\_003348_.tmp.dll
c:\windows.1\system32\_003349_.tmp.dll
c:\windows.1\system32\_003351_.tmp.dll
c:\windows.1\system32\_003352_.tmp.dll
c:\windows.1\system32\_003353_.tmp.dll
c:\windows.1\system32\_003354_.tmp.dll
c:\windows.1\system32\_003355_.tmp.dll
c:\windows.1\system32\_003358_.tmp.dll
c:\windows.1\system32\_003359_.tmp.dll
c:\windows.1\system32\_003360_.tmp.dll
c:\windows.1\system32\_003361_.tmp.dll
c:\windows.1\system32\_003362_.tmp.dll
c:\windows.1\system32\_003363_.tmp.dll
c:\windows.1\system32\_003364_.tmp.dll
c:\windows.1\system32\_003366_.tmp.dll
c:\windows.1\system32\_003367_.tmp.dll
c:\windows.1\system32\_003368_.tmp.dll
c:\windows.1\system32\_003369_.tmp.dll
c:\windows.1\system32\_003370_.tmp.dll
c:\windows.1\system32\_003371_.tmp.dll
c:\windows.1\system32\_003372_.tmp.dll
c:\windows.1\system32\_003373_.tmp.dll
c:\windows.1\system32\_003374_.tmp.dll
c:\windows.1\system32\_003375_.tmp.dll
c:\windows.1\system32\_003376_.tmp.dll
c:\windows.1\system32\_003377_.tmp.dll
c:\windows.1\system32\_003380_.tmp.dll
c:\windows.1\system32\_003381_.tmp.dll
c:\windows.1\system32\_003385_.tmp.dll
c:\windows.1\system32\_003386_.tmp.dll
c:\windows.1\system32\_003388_.tmp.dll
c:\windows.1\system32\_003391_.tmp.dll
c:\windows.1\system32\_003393_.tmp.dll
c:\windows.1\system32\_003394_.tmp.dll
c:\windows.1\system32\_003395_.tmp.dll
c:\windows.1\system32\_003396_.tmp.dll
c:\windows.1\system32\_003399_.tmp.dll
c:\windows.1\system32\_003400_.tmp.dll
c:\windows.1\system32\_003401_.tmp.dll
c:\windows.1\system32\_003402_.tmp.dll
c:\windows.1\system32\_003403_.tmp.dll
c:\windows.1\system32\_003408_.tmp.dll
c:\windows.1\system32\_003410_.tmp.dll
c:\windows.1\system32\drivers\etc\hosts.ics
c:\windows.1\system32\hal.dllbaka
c:\windows.1\system32\NEW13.tmp
c:\windows.1\system32\NEW14.tmp
c:\windows.1\system32\NEW2B.tmp
c:\windows.1\system32\NEWD.tmp
c:\windows.1\system32\SET101.tmp
c:\windows.1\system32\SET102.tmp
c:\windows.1\system32\SET103.tmp
c:\windows.1\system32\SET104.tmp
c:\windows.1\system32\SET105.tmp
c:\windows.1\system32\SET106.tmp
c:\windows.1\system32\SET106B.tmp
c:\windows.1\system32\SET107.tmp
c:\windows.1\system32\SET1073.tmp
c:\windows.1\system32\SET1075.tmp
c:\windows.1\system32\SET1078.tmp
c:\windows.1\system32\SET108.tmp
c:\windows.1\system32\SET108F.tmp
c:\windows.1\system32\SET109.tmp
c:\windows.1\system32\SET10A.tmp
c:\windows.1\system32\SET10A9.tmp
c:\windows.1\system32\SET10B.tmp
c:\windows.1\system32\SET10C.tmp
c:\windows.1\system32\SET10E.tmp
c:\windows.1\system32\SET10F.tmp
c:\windows.1\system32\SET110.tmp
c:\windows.1\system32\SET111.tmp
c:\windows.1\system32\SET112.tmp
c:\windows.1\system32\SET113.tmp
c:\windows.1\system32\SET114.tmp
c:\windows.1\system32\SET115.tmp
c:\windows.1\system32\SET1154.tmp
c:\windows.1\system32\SET115C.tmp
c:\windows.1\system32\SET115E.tmp
c:\windows.1\system32\SET116.tmp
c:\windows.1\system32\SET1161.tmp
c:\windows.1\system32\SET117.tmp
c:\windows.1\system32\SET1178.tmp
c:\windows.1\system32\SET118.tmp
c:\windows.1\system32\SET119.tmp
c:\windows.1\system32\SET1192.tmp
c:\windows.1\system32\SET11A.tmp
c:\windows.1\system32\SET11B.tmp
c:\windows.1\system32\SET11C.tmp
c:\windows.1\system32\SET11D.tmp
c:\windows.1\system32\SET11E.tmp
c:\windows.1\system32\SET11F.tmp
c:\windows.1\system32\SET120.tmp
c:\windows.1\system32\SET121.tmp
c:\windows.1\system32\SET123.tmp
c:\windows.1\system32\SET1230.tmp
c:\windows.1\system32\SET1238.tmp
c:\windows.1\system32\SET123A.tmp
c:\windows.1\system32\SET123D.tmp
c:\windows.1\system32\SET124.tmp
c:\windows.1\system32\SET125.tmp
c:\windows.1\system32\SET1254.tmp
c:\windows.1\system32\SET126.tmp
c:\windows.1\system32\SET126E.tmp
c:\windows.1\system32\SET127.tmp
c:\windows.1\system32\SET128.tmp
c:\windows.1\system32\SET129.tmp
c:\windows.1\system32\SET12A.tmp
c:\windows.1\system32\SET12B.tmp
c:\windows.1\system32\SET12C.tmp
c:\windows.1\system32\SET12D.tmp
c:\windows.1\system32\SET12E.tmp
c:\windows.1\system32\SET12F.tmp
c:\windows.1\system32\SET130.tmp
c:\windows.1\system32\SET131.tmp
c:\windows.1\system32\SET1317.tmp
c:\windows.1\system32\SET131F.tmp
c:\windows.1\system32\SET132.tmp
c:\windows.1\system32\SET1321.tmp
c:\windows.1\system32\SET1324.tmp
c:\windows.1\system32\SET133.tmp
c:\windows.1\system32\SET133B.tmp
c:\windows.1\system32\SET134.tmp
c:\windows.1\system32\SET135.tmp
c:\windows.1\system32\SET1355.tmp
c:\windows.1\system32\SET136.tmp
c:\windows.1\system32\SET137.tmp
c:\windows.1\system32\SET138.tmp
c:\windows.1\system32\SET139.tmp
c:\windows.1\system32\SET13B.tmp
c:\windows.1\system32\SET13C.tmp
c:\windows.1\system32\SET13D.tmp
c:\windows.1\system32\SET13E.tmp
c:\windows.1\system32\SET13F.tmp
c:\windows.1\system32\SET140.tmp
c:\windows.1\system32\SET142.tmp
c:\windows.1\system32\SET143.tmp
c:\windows.1\system32\SET144.tmp
c:\windows.1\system32\SET145.tmp
c:\windows.1\system32\SET147.tmp
c:\windows.1\system32\SET148.tmp
c:\windows.1\system32\SET14A.tmp
c:\windows.1\system32\SET14B.tmp
c:\windows.1\system32\SET14C.tmp
c:\windows.1\system32\SET14D.tmp
c:\windows.1\system32\SET14E.tmp
c:\windows.1\system32\SET151.tmp
c:\windows.1\system32\SET152.tmp
c:\windows.1\system32\SET153.tmp
c:\windows.1\system32\SET154.tmp
c:\windows.1\system32\SET155.tmp
c:\windows.1\system32\SET156.tmp
c:\windows.1\system32\SET157.tmp
c:\windows.1\system32\SET158.tmp
c:\windows.1\system32\SET159.tmp
c:\windows.1\system32\SET15A.tmp
c:\windows.1\system32\SET15B.tmp
c:\windows.1\system32\SET15C.tmp
c:\windows.1\system32\SET15D.tmp
c:\windows.1\system32\SET15E.tmp
c:\windows.1\system32\SET15F.tmp
c:\windows.1\system32\SET160.tmp
c:\windows.1\system32\SET161.tmp
c:\windows.1\system32\SET162.tmp
c:\windows.1\system32\SET163.tmp
c:\windows.1\system32\SET164.tmp
c:\windows.1\system32\SET165.tmp
c:\windows.1\system32\SET166.tmp
c:\windows.1\system32\SET167.tmp
c:\windows.1\system32\SET168.tmp
c:\windows.1\system32\SET169.tmp
c:\windows.1\system32\SET16A.tmp
c:\windows.1\system32\SET16B.tmp
c:\windows.1\system32\SET16C.tmp
c:\windows.1\system32\SET16D.tmp
c:\windows.1\system32\SET16F.tmp
c:\windows.1\system32\SET170.tmp
c:\windows.1\system32\SET171.tmp
c:\windows.1\system32\SET172.tmp
c:\windows.1\system32\SET173.tmp
c:\windows.1\system32\SET174.tmp
c:\windows.1\system32\SET175.tmp
c:\windows.1\system32\SET176.tmp
c:\windows.1\system32\SET177.tmp
c:\windows.1\system32\SET178.tmp
c:\windows.1\system32\SET179.tmp
c:\windows.1\system32\SET17A.tmp
c:\windows.1\system32\SET17B.tmp
c:\windows.1\system32\SET17D.tmp
c:\windows.1\system32\SET17E.tmp
c:\windows.1\system32\SET17F.tmp
c:\windows.1\system32\SET180.tmp
c:\windows.1\system32\SET181.tmp
c:\windows.1\system32\SET182.tmp
c:\windows.1\system32\SET184.tmp
c:\windows.1\system32\SET185.tmp
c:\windows.1\system32\SET187.tmp
c:\windows.1\system32\SET188.tmp
c:\windows.1\system32\SET189.tmp
c:\windows.1\system32\SET18A.tmp
c:\windows.1\system32\SET18B.tmp
c:\windows.1\system32\SET18C.tmp
c:\windows.1\system32\SET18D.tmp
c:\windows.1\system32\SET18E.tmp
c:\windows.1\system32\SET18F.tmp
c:\windows.1\system32\SET190.tmp
c:\windows.1\system32\SET191.tmp
c:\windows.1\system32\SET192.tmp
c:\windows.1\system32\SET193.tmp
c:\windows.1\system32\SET194.tmp
c:\windows.1\system32\SET195.tmp
c:\windows.1\system32\SET197.tmp
c:\windows.1\system32\SET198.tmp
c:\windows.1\system32\SET199.tmp
c:\windows.1\system32\SET19A.tmp
c:\windows.1\system32\SET19B.tmp
c:\windows.1\system32\SET19C.tmp
c:\windows.1\system32\SET19D.tmp
c:\windows.1\system32\SET19E.tmp
c:\windows.1\system32\SET19F.tmp
c:\windows.1\system32\SET1A0.tmp
c:\windows.1\system32\SET1A1.tmp
c:\windows.1\system32\SET1A2.tmp
c:\windows.1\system32\SET1A3.tmp
c:\windows.1\system32\SET1A4.tmp
c:\windows.1\system32\SET1A5.tmp
c:\windows.1\system32\SET1A6.tmp
c:\windows.1\system32\SET1A7.tmp
c:\windows.1\system32\SET1A8.tmp
c:\windows.1\system32\SET1A9.tmp
c:\windows.1\system32\SET1AA.tmp
c:\windows.1\system32\SET1AC.tmp
c:\windows.1\system32\SET1AD.tmp
c:\windows.1\system32\SET1AE.tmp
c:\windows.1\system32\SET1AF.tmp
c:\windows.1\system32\SET1B0.tmp
c:\windows.1\system32\SET1B1.tmp
c:\windows.1\system32\SET1B2.tmp
c:\windows.1\system32\SET1B3.tmp
c:\windows.1\system32\SET1B4.tmp
c:\windows.1\system32\SET1B5.tmp
c:\windows.1\system32\SET1B6.tmp
c:\windows.1\system32\SET1B7.tmp
c:\windows.1\system32\SET1B8.tmp
c:\windows.1\system32\SET1B9.tmp
c:\windows.1\system32\SET1BA.tmp
c:\windows.1\system32\SET1BB.tmp
c:\windows.1\system32\SET1BD.tmp
c:\windows.1\system32\SET1BE.tmp
c:\windows.1\system32\SET1BF.tmp
c:\windows.1\system32\SET1C0.tmp
c:\windows.1\system32\SET1C1.tmp
c:\windows.1\system32\SET1C2.tmp
c:\windows.1\system32\SET1C3.tmp
c:\windows.1\system32\SET1C4.tmp
c:\windows.1\system32\SET1C5.tmp
c:\windows.1\system32\SET1C6.tmp
c:\windows.1\system32\SET1C7.tmp
c:\windows.1\system32\SET1C8.tmp
c:\windows.1\system32\SET1C9.tmp
c:\windows.1\system32\SET1CA.tmp
c:\windows.1\system32\SET1CB.tmp
c:\windows.1\system32\SET1CC.tmp
c:\windows.1\system32\SET1CD.tmp
c:\windows.1\system32\SET1CE.tmp
c:\windows.1\system32\SET1CF.tmp
c:\windows.1\system32\SET1D0.tmp
c:\windows.1\system32\SET1D1.tmp
c:\windows.1\system32\SET1D2.tmp
c:\windows.1\system32\SET1D3.tmp
c:\windows.1\system32\SET1D5.tmp
c:\windows.1\system32\SET1D6.tmp
c:\windows.1\system32\SET1D7.tmp
c:\windows.1\system32\SET1D9.tmp
c:\windows.1\system32\SET1DA.tmp
c:\windows.1\system32\SET1DB.tmp
c:\windows.1\system32\SET1DC.tmp
c:\windows.1\system32\SET1DD.tmp
c:\windows.1\system32\SET1DE.tmp
c:\windows.1\system32\SET1DF.tmp
c:\windows.1\system32\SET1E0.tmp
c:\windows.1\system32\SET1E1.tmp
c:\windows.1\system32\SET1E2.tmp
c:\windows.1\system32\SET1E3.tmp
c:\windows.1\system32\SET1E4.tmp
c:\windows.1\system32\SET1E5.tmp
c:\windows.1\system32\SET1E6.tmp
c:\windows.1\system32\SET1E7.tmp
c:\windows.1\system32\SET1E9.tmp
c:\windows.1\system32\SET1EB.tmp
c:\windows.1\system32\SET1ED.tmp
c:\windows.1\system32\SET1EE.tmp
c:\windows.1\system32\SET1EF.tmp
c:\windows.1\system32\SET1F2.tmp
c:\windows.1\system32\SET1F3.tmp
c:\windows.1\system32\SET1F4.tmp
c:\windows.1\system32\SET1F5.tmp
c:\windows.1\system32\SET1F6.tmp
c:\windows.1\system32\SET1F7.tmp
c:\windows.1\system32\SET1F8.tmp
c:\windows.1\system32\SET1F9.tmp
c:\windows.1\system32\SET1FA.tmp
c:\windows.1\system32\SET1FB.tmp
c:\windows.1\system32\SET1FC.tmp
c:\windows.1\system32\SET1FD.tmp
c:\windows.1\system32\SET1FE.tmp
c:\windows.1\system32\SET1FF.tmp
c:\windows.1\system32\SET200.tmp
c:\windows.1\system32\SET201.tmp
c:\windows.1\system32\SET202.tmp
c:\windows.1\system32\SET203.tmp
c:\windows.1\system32\SET204.tmp
c:\windows.1\system32\SET205.tmp
c:\windows.1\system32\SET206.tmp
c:\windows.1\system32\SET207.tmp
c:\windows.1\system32\SET209.tmp
c:\windows.1\system32\SET20A.tmp
c:\windows.1\system32\SET20B.tmp
c:\windows.1\system32\SET20C.tmp
c:\windows.1\system32\SET20E.tmp
c:\windows.1\system32\SET20F.tmp
c:\windows.1\system32\SET210.tmp
c:\windows.1\system32\SET211.tmp
c:\windows.1\system32\SET212.tmp
c:\windows.1\system32\SET213.tmp
c:\windows.1\system32\SET215.tmp
c:\windows.1\system32\SET216.tmp
c:\windows.1\system32\SET217.tmp
c:\windows.1\system32\SET218.tmp
c:\windows.1\system32\SET21A.tmp
c:\windows.1\system32\SET21B.tmp
c:\windows.1\system32\SET21C.tmp
c:\windows.1\system32\SET21D.tmp
c:\windows.1\system32\SET21E.tmp
c:\windows.1\system32\SET21F.tmp
c:\windows.1\system32\SET220.tmp
c:\windows.1\system32\SET221.tmp
c:\windows.1\system32\SET222.tmp
c:\windows.1\system32\SET223.tmp
c:\windows.1\system32\SET224.tmp
c:\windows.1\system32\SET227.tmp
c:\windows.1\system32\SET228.tmp
c:\windows.1\system32\SET229.tmp
c:\windows.1\system32\SET22A.tmp
c:\windows.1\system32\SET22B.tmp
c:\windows.1\system32\SET22C.tmp
c:\windows.1\system32\SET22D.tmp
c:\windows.1\system32\SET22E.tmp
c:\windows.1\system32\SET22F.tmp
c:\windows.1\system32\SET230.tmp
c:\windows.1\system32\SET231.tmp
c:\windows.1\system32\SET232.tmp
c:\windows.1\system32\SET233.tmp
c:\windows.1\system32\SET234.tmp
c:\windows.1\system32\SET235.tmp
c:\windows.1\system32\SET236.tmp
c:\windows.1\system32\SET237.tmp
c:\windows.1\system32\SET238.tmp
c:\windows.1\system32\SET239.tmp
c:\windows.1\system32\SET23A.tmp
c:\windows.1\system32\SET23B.tmp
c:\windows.1\system32\SET23C.tmp
c:\windows.1\system32\SET23D.tmp
c:\windows.1\system32\SET23E.tmp
c:\windows.1\system32\SET23F.tmp
c:\windows.1\system32\SET240.tmp
c:\windows.1\system32\SET241.tmp
c:\windows.1\system32\SET242.tmp
c:\windows.1\system32\SET243.tmp
c:\windows.1\system32\SET244.tmp
c:\windows.1\system32\SET245.tmp
c:\windows.1\system32\SET246.tmp
c:\windows.1\system32\SET247.tmp
c:\windows.1\system32\SET248.tmp
c:\windows.1\system32\SET249.tmp
c:\windows.1\system32\SET24B.tmp
c:\windows.1\system32\SET24C.tmp
c:\windows.1\system32\SET24D.tmp
c:\windows.1\system32\SET24E.tmp
c:\windows.1\system32\SET24F.tmp
c:\windows.1\system32\SET250.tmp
c:\windows.1\system32\SET251.tmp
c:\windows.1\system32\SET252.tmp
c:\windows.1\system32\SET253.tmp
c:\windows.1\system32\SET254.tmp
c:\windows.1\system32\SET255.tmp
c:\windows.1\system32\SET256.tmp
c:\windows.1\system32\SET257.tmp
c:\windows.1\system32\SET258.tmp
c:\windows.1\system32\SET259.tmp
c:\windows.1\system32\SET25A.tmp
c:\windows.1\system32\SET25B.tmp
c:\windows.1\system32\SET25C.tmp
c:\windows.1\system32\SET25D.tmp
c:\windows.1\system32\SET25E.tmp
c:\windows.1\system32\SET25F.tmp
c:\windows.1\system32\SET260.tmp
c:\windows.1\system32\SET261.tmp
c:\windows.1\system32\SET262.tmp
c:\windows.1\system32\SET263.tmp
c:\windows.1\system32\SET264.tmp
c:\windows.1\system32\SET265.tmp
c:\windows.1\system32\SET266.tmp
c:\windows.1\system32\SET268.tmp
c:\windows.1\system32\SET269.tmp
c:\windows.1\system32\SET26A.tmp
c:\windows.1\system32\SET26B.tmp
c:\windows.1\system32\SET26C.tmp
c:\windows.1\system32\SET26D.tmp
c:\windows.1\system32\SET26E.tmp
c:\windows.1\system32\SET270.tmp
c:\windows.1\system32\SET271.tmp
c:\windows.1\system32\SET272.tmp
c:\windows.1\system32\SET273.tmp
c:\windows.1\system32\SET274.tmp
c:\windows.1\system32\SET275.tmp
c:\windows.1\system32\SET276.tmp
c:\windows.1\system32\SET277.tmp
c:\windows.1\system32\SET278.tmp
c:\windows.1\system32\SET27B.tmp
c:\windows.1\system32\SET27C.tmp
c:\windows.1\system32\SET27D.tmp
c:\windows.1\system32\SET27E.tmp
c:\windows.1\system32\SET280.tmp
c:\windows.1\system32\SET281.tmp
c:\windows.1\system32\SET282.tmp
c:\windows.1\system32\SET283.tmp
c:\windows.1\system32\SET284.tmp
c:\windows.1\system32\SET286.tmp
c:\windows.1\system32\SET287.tmp
c:\windows.1\system32\SET288.tmp
c:\windows.1\system32\SET28A.tmp
c:\windows.1\system32\SET28B.tmp
c:\windows.1\system32\SET28C.tmp
c:\windows.1\system32\SET28D.tmp
c:\windows.1\system32\SET28E.tmp
c:\windows.1\system32\SET290.tmp
c:\windows.1\system32\SET291.tmp
c:\windows.1\system32\SET292.tmp
c:\windows.1\system32\SET295.tmp
c:\windows.1\system32\SET296.tmp
c:\windows.1\system32\SET297.tmp
c:\windows.1\system32\SET298.tmp
c:\windows.1\system32\SET299.tmp
c:\windows.1\system32\SET29A.tmp
c:\windows.1\system32\SET29B.tmp
c:\windows.1\system32\SET29C.tmp
c:\windows.1\system32\SET29D.tmp
c:\windows.1\system32\SET29F.tmp
c:\windows.1\system32\SET2A0.tmp
c:\windows.1\system32\SET2A1.tmp
c:\windows.1\system32\SET2A2.tmp
c:\windows.1\system32\SET2A3.tmp
c:\windows.1\system32\SET2A4.tmp
c:\windows.1\system32\SET2A8.tmp
c:\windows.1\system32\SET2A9.tmp
c:\windows.1\system32\SET2AA.tmp
c:\windows.1\system32\SET2AB.tmp
c:\windows.1\system32\SET2AC.tmp
c:\windows.1\system32\SET2AD.tmp
c:\windows.1\system32\SET2AE.tmp
c:\windows.1\system32\SET2AF.tmp
c:\windows.1\system32\SET2B0.tmp
c:\windows.1\system32\SET2B1.tmp
c:\windows.1\system32\SET2B2.tmp
c:\windows.1\system32\SET2B3.tmp
c:\windows.1\system32\SET2B4.tmp
c:\windows.1\system32\SET2B5.tmp
c:\windows.1\system32\SET2B6.tmp
c:\windows.1\system32\SET2B7.tmp
c:\windows.1\system32\SET2B8.tmp
c:\windows.1\system32\SET2B9.tmp
c:\windows.1\system32\SET2BA.tmp
c:\windows.1\system32\SET2BB.tmp
c:\windows.1\system32\SET2BC.tmp
c:\windows.1\system32\SET2BD.tmp
c:\windows.1\system32\SET2BE.tmp
c:\windows.1\system32\SET2BF.tmp
c:\windows.1\system32\SET2C0.tmp
c:\windows.1\system32\SET2C1.tmp
c:\windows.1\system32\SET2C2.tmp
c:\windows.1\system32\SET2C3.tmp
c:\windows.1\system32\SET2C4.tmp
c:\windows.1\system32\SET2C5.tmp
c:\windows.1\system32\SET2C6.tmp
c:\windows.1\system32\SET2C7.tmp
c:\windows.1\system32\SET2C8.tmp
c:\windows.1\system32\SET2C9.tmp
c:\windows.1\system32\SET2CA.tmp
c:\windows.1\system32\SET2CB.tmp
c:\windows.1\system32\SET2CC.tmp
c:\windows.1\system32\SET2CF.tmp
c:\windows.1\system32\SET2D0.tmp
c:\windows.1\system32\SET2D2.tmp
c:\windows.1\system32\SET2D3.tmp
c:\windows.1\system32\SET2D4.tmp
c:\windows.1\system32\SET2D5.tmp
c:\windows.1\system32\SET2D6.tmp
c:\windows.1\system32\SET2D8.tmp
c:\windows.1\system32\SET2D9.tmp
c:\windows.1\system32\SET2DA.tmp
c:\windows.1\system32\SET2DB.tmp
c:\windows.1\system32\SET2DC.tmp
c:\windows.1\system32\SET2DF.tmp
c:\windows.1\system32\SET2E1.tmp
c:\windows.1\system32\SET2E2.tmp
c:\windows.1\system32\SET2E3.tmp
c:\windows.1\system32\SET2E4.tmp
c:\windows.1\system32\SET2E5.tmp
c:\windows.1\system32\SET2E6.tmp
c:\windows.1\system32\SET2E7.tmp
c:\windows.1\system32\SET2E8.tmp
c:\windows.1\system32\SET2E9.tmp
c:\windows.1\system32\SET2EB.tmp
c:\windows.1\system32\SET2ED.tmp
c:\windows.1\system32\SET2EE.tmp
c:\windows.1\system32\SET2EF.tmp
c:\windows.1\system32\SET2F0.tmp
c:\windows.1\system32\SET2F1.tmp
c:\windows.1\system32\SET2F2.tmp
c:\windows.1\system32\SET2F3.tmp
c:\windows.1\system32\SET2F4.tmp
c:\windows.1\system32\SET2F5.tmp
c:\windows.1\system32\SET2F6.tmp
c:\windows.1\system32\SET2F7.tmp
c:\windows.1\system32\SET2F8.tmp
c:\windows.1\system32\SET2F9.tmp
c:\windows.1\system32\SET2FB.tmp
c:\windows.1\system32\SET2FC.tmp
c:\windows.1\system32\SET2FD.tmp
c:\windows.1\system32\SET2FE.tmp
c:\windows.1\system32\SET2FF.tmp
c:\windows.1\system32\SET300.tmp
c:\windows.1\system32\SET301.tmp
c:\windows.1\system32\SET302.tmp
c:\windows.1\system32\SET303.tmp
c:\windows.1\system32\SET304.tmp
c:\windows.1\system32\SET305.tmp
c:\windows.1\system32\SET306.tmp
c:\windows.1\system32\SET307.tmp
c:\windows.1\system32\SET308.tmp
c:\windows.1\system32\SET309.tmp
c:\windows.1\system32\SET30A.tmp
c:\windows.1\system32\SET30C.tmp
c:\windows.1\system32\SET30D.tmp
c:\windows.1\system32\SET30E.tmp
c:\windows.1\system32\SET30F.tmp
c:\windows.1\system32\SET310.tmp
c:\windows.1\system32\SET312.tmp
c:\windows.1\system32\SET313.tmp
c:\windows.1\system32\SET314.tmp
c:\windows.1\system32\SET315.tmp
c:\windows.1\system32\SET316.tmp
c:\windows.1\system32\SET317.tmp
c:\windows.1\system32\SET319.tmp
c:\windows.1\system32\SET31A.tmp
c:\windows.1\system32\SET31B.tmp
c:\windows.1\system32\SET31C.tmp
c:\windows.1\system32\SET31D.tmp
c:\windows.1\system32\SET31E.tmp
c:\windows.1\system32\SET31F.tmp
c:\windows.1\system32\SET320.tmp
c:\windows.1\system32\SET322.tmp
c:\windows.1\system32\SET323.tmp
c:\windows.1\system32\SET324.tmp
c:\windows.1\system32\SET325.tmp
c:\windows.1\system32\SET326.tmp
c:\windows.1\system32\SET327.tmp
c:\windows.1\system32\SET32A.tmp
c:\windows.1\system32\SET32B.tmp
c:\windows.1\system32\SET32C.tmp
c:\windows.1\system32\SET32D.tmp
c:\windows.1\system32\SET32E.tmp
c:\windows.1\system32\SET32F.tmp
c:\windows.1\system32\SET330.tmp
c:\windows.1\system32\SET332.tmp
c:\windows.1\system32\SET333.tmp
c:\windows.1\system32\SET334.tmp
c:\windows.1\system32\SET335.tmp
c:\windows.1\system32\SET337.tmp
c:\windows.1\system32\SET338.tmp
c:\windows.1\system32\SET339.tmp
c:\windows.1\system32\SET33B.tmp
c:\windows.1\system32\SET33C.tmp
c:\windows.1\system32\SET33D.tmp
c:\windows.1\system32\SET33E.tmp
c:\windows.1\system32\SET33F.tmp
c:\windows.1\system32\SET340.tmp
c:\windows.1\system32\SET341.tmp
c:\windows.1\system32\SET342.tmp
c:\windows.1\system32\SET344.tmp
c:\windows.1\system32\SET345.tmp
c:\windows.1\system32\SET346.tmp
c:\windows.1\system32\SET347.tmp
c:\windows.1\system32\SET348.tmp
c:\windows.1\system32\SET349.tmp
c:\windows.1\system32\SET34A.tmp
c:\windows.1\system32\SET34B.tmp
c:\windows.1\system32\SET34C.tmp
c:\windows.1\system32\SET34D.tmp
c:\windows.1\system32\SET34E.tmp
c:\windows.1\system32\SET34F.tmp
c:\windows.1\system32\SET350.tmp
c:\windows.1\system32\SET351.tmp
c:\windows.1\system32\SET352.tmp
c:\windows.1\system32\SET354.tmp
c:\windows.1\system32\SET355.tmp
c:\windows.1\system32\SET356.tmp
c:\windows.1\system32\SET35A.tmp
c:\windows.1\system32\SET35B.tmp
c:\windows.1\system32\SET35C.tmp
c:\windows.1\system32\SET35D.tmp
c:\windows.1\system32\SET35F.tmp
c:\windows.1\system32\SET360.tmp
c:\windows.1\system32\SET361.tmp
c:\windows.1\system32\SET362.tmp
c:\windows.1\system32\SET363.tmp
c:\windows.1\system32\SET364.tmp
c:\windows.1\system32\SET365.tmp
c:\windows.1\system32\SET366.tmp
c:\windows.1\system32\SET367.tmp
c:\windows.1\system32\SET368.tmp
c:\windows.1\system32\SET369.tmp
c:\windows.1\system32\SET36A.tmp
c:\windows.1\system32\SET36C.tmp
c:\windows.1\system32\SET36D.tmp
c:\windows.1\system32\SET36E.tmp
c:\windows.1\system32\SET36F.tmp
c:\windows.1\system32\SET371.tmp
c:\windows.1\system32\SET372.tmp
c:\windows.1\system32\SET374.tmp
c:\windows.1\system32\SET375.tmp
c:\windows.1\system32\SET376.tmp
c:\windows.1\system32\SET378.tmp
c:\windows.1\system32\SET379.tmp
c:\windows.1\system32\SET37A.tmp
c:\windows.1\system32\SET37B.tmp
c:\windows.1\system32\SET37C.tmp
c:\windows.1\system32\SET37D.tmp
c:\windows.1\system32\SET37E.tmp
c:\windows.1\system32\SET37F.tmp
c:\windows.1\system32\SET380.tmp
c:\windows.1\system32\SET381.tmp
c:\windows.1\system32\SET382.tmp
c:\windows.1\system32\SET383.tmp
c:\windows.1\system32\SET384.tmp
c:\windows.1\system32\SET385.tmp
c:\windows.1\system32\SET386.tmp
c:\windows.1\system32\SET387.tmp
c:\windows.1\system32\SET388.tmp
c:\windows.1\system32\SET389.tmp
c:\windows.1\system32\SET38B.tmp
c:\windows.1\system32\SET38C.tmp
c:\windows.1\system32\SET38D.tmp
c:\windows.1\system32\SET38E.tmp
c:\windows.1\system32\SET38F.tmp
c:\windows.1\system32\SET391.tmp
c:\windows.1\system32\SET393.tmp
c:\windows.1\system32\SET394.tmp
c:\windows.1\system32\SET397.tmp
c:\windows.1\system32\SET398.tmp
c:\windows.1\system32\SET39A.tmp
c:\windows.1\system32\SET39B.tmp
c:\windows.1\system32\SET39C.tmp
c:\windows.1\system32\SET39D.tmp
c:\windows.1\system32\SET39E.tmp
c:\windows.1\system32\SET39F.tmp
c:\windows.1\system32\SET3A0.tmp
c:\windows.1\system32\SET3A2.tmp
c:\windows.1\system32\SET3A4.tmp
c:\windows.1\system32\SET3A5.tmp
c:\windows.1\system32\SET3A6.tmp
c:\windows.1\system32\SET3A7.tmp
c:\windows.1\system32\SET3A8.tmp
c:\windows.1\system32\SET3A9.tmp
c:\windows.1\system32\SET3AA.tmp
c:\windows.1\system32\SET3AB.tmp
c:\windows.1\system32\SET3AC.tmp
c:\windows.1\system32\SET3AD.tmp
c:\windows.1\system32\SET3AE.tmp
c:\windows.1\system32\SET3B0.tmp
c:\windows.1\system32\SET3B2.tmp
c:\windows.1\system32\SET3B3.tmp
c:\windows.1\system32\SET3B4.tmp
c:\windows.1\system32\SET3B5.tmp
c:\windows.1\system32\SET3B6.tmp
c:\windows.1\system32\SET3B7.tmp
c:\windows.1\system32\SET3B9.tmp
c:\windows.1\system32\SET3BA.tmp
c:\windows.1\system32\SET3BB.tmp
c:\windows.1\system32\SET3BE.tmp
c:\windows.1\system32\SET3BF.tmp
c:\windows.1\system32\SET3C2.tmp
c:\windows.1\system32\SET3C3.tmp
c:\windows.1\system32\SET3C4.tmp
c:\windows.1\system32\SET3C5.tmp
c:\windows.1\system32\SET3C6.tmp
c:\windows.1\system32\SET3C7.tmp
c:\windows.1\system32\SET3C8.tmp
c:\windows.1\system32\SET3C9.tmp
c:\windows.1\system32\SET3CA.tmp
c:\windows.1\system32\SET3CB.tmp
c:\windows.1\system32\SET3CC.tmp
c:\windows.1\system32\SET3CE.tmp
c:\windows.1\system32\SET3D0.tmp
c:\windows.1\system32\SET3D1.tmp
c:\windows.1\system32\SET3D3.tmp
c:\windows.1\system32\SET3D5.tmp
c:\windows.1\system32\SET3D6.tmp
c:\windows.1\system32\SET3D7.tmp
c:\windows.1\system32\SET3D8.tmp
c:\windows.1\system32\SET3DA.tmp
c:\windows.1\system32\SET3DB.tmp
c:\windows.1\system32\SET3DC.tmp
c:\windows.1\system32\SET3DD.tmp
c:\windows.1\system32\SET3DE.tmp
c:\windows.1\system32\SET3DF.tmp
c:\windows.1\system32\SET3E0.tmp
c:\windows.1\system32\SET3E2.tmp
c:\windows.1\system32\SET3E4.tmp
c:\windows.1\system32\SET3E5.tmp
c:\windows.1\system32\SET3E6.tmp
c:\windows.1\system32\SET3E8.tmp
c:\windows.1\system32\SET3EA.tmp
c:\windows.1\system32\SET3EB.tmp
c:\windows.1\system32\SET3EC.tmp
c:\windows.1\system32\SET3ED.tmp
c:\windows.1\system32\SET3EE.tmp
c:\windows.1\system32\SET3EF.tmp
c:\windows.1\system32\SET3F0.tmp
c:\windows.1\system32\SET3F1.tmp
c:\windows.1\system32\SET3F2.tmp
c:\windows.1\system32\SET3F3.tmp
c:\windows.1\system32\SET3F4.tmp
c:\windows.1\system32\SET3F5.tmp
c:\windows.1\system32\SET3F6.tmp
c:\windows.1\system32\SET3F7.tmp
c:\windows.1\system32\SET3F8.tmp
c:\windows.1\system32\SET3F9.tmp
c:\windows.1\system32\SET3FA.tmp
c:\windows.1\system32\SET3FF.tmp
c:\windows.1\system32\SET400.tmp
c:\windows.1\system32\SET402.tmp
c:\windows.1\system32\SET403.tmp
c:\windows.1\system32\SET404.tmp
c:\windows.1\system32\SET406.tmp
c:\windows.1\system32\SET407.tmp
c:\windows.1\system32\SET408.tmp
c:\windows.1\system32\SET409.tmp
c:\windows.1\system32\SET40A.tmp
c:\windows.1\system32\SET40C.tmp
c:\windows.1\system32\SET40D.tmp
c:\windows.1\system32\SET40E.tmp
c:\windows.1\system32\SET40F.tmp
c:\windows.1\system32\SET410.tmp
c:\windows.1\system32\SET411.tmp
c:\windows.1\system32\SET412.tmp
c:\windows.1\system32\SET413.tmp
c:\windows.1\system32\SET414.tmp
c:\windows.1\system32\SET415.tmp
c:\windows.1\system32\SET417.tmp
c:\windows.1\system32\SET419.tmp
c:\windows.1\system32\SET41A.tmp
c:\windows.1\system32\SET41C.tmp
c:\windows.1\system32\SET41D.tmp
c:\windows.1\system32\SET41E.tmp
c:\windows.1\system32\SET41F.tmp
c:\windows.1\system32\SET420.tmp
c:\windows.1\system32\SET421.tmp
c:\windows.1\system32\SET422.tmp
c:\windows.1\system32\SET423.tmp
c:\windows.1\system32\SET424.tmp
c:\windows.1\system32\SET428.tmp
c:\windows.1\system32\SET429.tmp
c:\windows.1\system32\SET42A.tmp
c:\windows.1\system32\SET42B.tmp
c:\windows.1\system32\SET42D.tmp
c:\windows.1\system32\SET42E.tmp
c:\windows.1\system32\SET42F.tmp
c:\windows.1\system32\SET430.tmp
c:\windows.1\system32\SET432.tmp
c:\windows.1\system32\SET433.tmp
c:\windows.1\system32\SET437.tmp
c:\windows.1\system32\SET439.tmp
c:\windows.1\system32\SET43B.tmp
c:\windows.1\system32\SET43C.tmp
c:\windows.1\system32\SET43E.tmp
c:\windows.1\system32\SET440.tmp
c:\windows.1\system32\SET441.tmp
c:\windows.1\system32\SET442.tmp
c:\windows.1\system32\SET443.tmp
c:\windows.1\system32\SET444.tmp
c:\windows.1\system32\SET445.tmp
c:\windows.1\system32\SET446.tmp
c:\windows.1\system32\SET447.tmp
c:\windows.1\system32\SET449.tmp
c:\windows.1\system32\SET44A.tmp
c:\windows.1\system32\SET44B.tmp
c:\windows.1\system32\SET44C.tmp
c:\windows.1\system32\SET44D.tmp
c:\windows.1\system32\SET44F.tmp
c:\windows.1\system32\SET450.tmp
c:\windows.1\system32\SET451.tmp
c:\windows.1\system32\SET452.tmp
c:\windows.1\system32\SET455.tmp
c:\windows.1\system32\SET456.tmp
c:\windows.1\system32\SET457.tmp
c:\windows.1\system32\SET459.tmp
c:\windows.1\system32\SET45A.tmp
c:\windows.1\system32\SET45B.tmp
c:\windows.1\system32\SET45C.tmp
c:\windows.1\system32\SET45E.tmp
c:\windows.1\system32\SET45F.tmp
c:\windows.1\system32\SET461.tmp
c:\windows.1\system32\SET462.tmp
c:\windows.1\system32\SET463.tmp
c:\windows.1\system32\SET464.tmp
c:\windows.1\system32\SET465.tmp
c:\windows.1\system32\SET466.tmp
c:\windows.1\system32\SET467.tmp
c:\windows.1\system32\SET468.tmp
c:\windows.1\system32\SET469.tmp
c:\windows.1\system32\SET46A.tmp
c:\windows.1\system32\SET46B.tmp
c:\windows.1\system32\SET46C.tmp
c:\windows.1\system32\SET46D.tmp
c:\windows.1\system32\SET46E.tmp
c:\windows.1\system32\SET46F.tmp
c:\windows.1\system32\SET472.tmp
c:\windows.1\system32\SET473.tmp
c:\windows.1\system32\SET475.tmp
c:\windows.1\system32\SET477.tmp
c:\windows.1\system32\SET478.tmp
c:\windows.1\system32\SET47A.tmp
c:\windows.1\system32\SET47B.tmp
c:\windows.1\system32\SET47C.tmp
c:\windows.1\system32\SET47D.tmp
c:\windows.1\system32\SET47E.tmp
c:\windows.1\system32\SET47F.tmp
c:\windows.1\system32\SET480.tmp
c:\windows.1\system32\SET483.tmp
c:\windows.1\system32\SET485.tmp
c:\windows.1\system32\SET487.tmp
c:\windows.1\system32\SET488.tmp
c:\windows.1\system32\SET489.tmp
c:\windows.1\system32\SET48A.tmp
c:\windows.1\system32\SET48C.tmp
c:\windows.1\system32\SET48D.tmp
c:\windows.1\system32\SET48E.tmp
c:\windows.1\system32\SET48F.tmp
c:\windows.1\system32\SET491.tmp
c:\windows.1\system32\SET493.tmp
c:\windows.1\system32\SET494.tmp
c:\windows.1\system32\SET495.tmp
c:\windows.1\system32\SET496.tmp
c:\windows.1\system32\SET497.tmp
c:\windows.1\system32\SET498.tmp
c:\windows.1\system32\SET499.tmp
c:\windows.1\system32\SET49C.tmp
c:\windows.1\system32\SET49D.tmp
c:\windows.1\system32\SET4A0.tmp
c:\windows.1\system32\SET4A1.tmp
c:\windows.1\system32\SET4A2.tmp
c:\windows.1\system32\SET4A3.tmp
c:\windows.1\system32\SET4A4.tmp
c:\windows.1\system32\SET4A5.tmp
c:\windows.1\system32\SET4A6.tmp
c:\windows.1\system32\SET4A7.tmp
c:\windows.1\system32\SET4A9.tmp
c:\windows.1\system32\SET4AA.tmp
c:\windows.1\system32\SET4AB.tmp
c:\windows.1\system32\SET4AC.tmp
c:\windows.1\system32\SET4AD.tmp
c:\windows.1\system32\SET4AE.tmp
c:\windows.1\system32\SET4AF.tmp
c:\windows.1\system32\SET4B0.tmp
c:\windows.1\system32\SET4B1.tmp
c:\windows.1\system32\SET4B2.tmp
c:\windows.1\system32\SET4B3.tmp
c:\windows.1\system32\SET4B4.tmp
c:\windows.1\system32\SET4B8.tmp
c:\windows.1\system32\SET4B9.tmp
c:\windows.1\system32\SET4BA.tmp
c:\windows.1\system32\SET4BB.tmp
c:\windows.1\system32\SET4BC.tmp
c:\windows.1\system32\SET4C1.tmp
c:\windows.1\system32\SET4C2.tmp
c:\windows.1\system32\SET4C3.tmp
c:\windows.1\system32\SET4C5.tmp
c:\windows.1\system32\SET4C7.tmp
c:\windows.1\system32\SET4C8.tmp
c:\windows.1\system32\SET4CA.tmp
c:\windows.1\system32\SET4CC.tmp
c:\windows.1\system32\SET4CE.tmp
c:\windows.1\system32\SET4CF.tmp
c:\windows.1\system32\SET4D1.tmp
c:\windows.1\system32\SET4D3.tmp
c:\windows.1\system32\SET4D4.tmp
c:\windows.1\system32\SET4D5.tmp
c:\windows.1\system32\SET4D9.tmp
c:\windows.1\system32\SET4DA.tmp
c:\windows.1\system32\SET4DD.tmp
c:\windows.1\system32\SET4DE.tmp
c:\windows.1\system32\SET4DF.tmp
c:\windows.1\system32\SET4E0.tmp
c:\windows.1\system32\SET4E2.tmp
c:\windows.1\system32\SET4E3.tmp
c:\windows.1\system32\SET4E4.tmp
c:\windows.1\system32\SET4E6.tmp
c:\windows.1\system32\SET4E7.tmp
c:\windows.1\system32\SET4E8.tmp
c:\windows.1\system32\SET4E9.tmp
c:\windows.1\system32\SET4EA.tmp
c:\windows.1\system32\SET4EB.tmp
c:\windows.1\system32\SET4EC.tmp
c:\windows.1\system32\SET4ED.tmp
c:\windows.1\system32\SET4EE.tmp
c:\windows.1\system32\SET4F0.tmp
c:\windows.1\system32\SET4F1.tmp
c:\windows.1\system32\SET4F2.tmp
c:\windows.1\system32\SET4F5.tmp
c:\windows.1\system32\SET4F7.tmp
c:\windows.1\system32\SET4FA.tmp
c:\windows.1\system32\SET4FD.tmp
c:\windows.1\system32\SET4FE.tmp
c:\windows.1\system32\SET4FF.tmp
c:\windows.1\system32\SET502.tmp
c:\windows.1\system32\SET503.tmp
c:\windows.1\system32\SET504.tmp
c:\windows.1\system32\SET505.tmp
c:\windows.1\system32\SET507.tmp
c:\windows.1\system32\SET508.tmp
c:\windows.1\system32\SET509.tmp
c:\windows.1\system32\SET50A.tmp
c:\windows.1\system32\SET50B.tmp
c:\windows.1\system32\SET50C.tmp
c:\windows.1\system32\SET50D.tmp
c:\windows.1\system32\SET50E.tmp
c:\windows.1\system32\SET50F.tmp
c:\windows.1\system32\SET510.tmp
c:\windows.1\system32\SET513.tmp
c:\windows.1\system32\SET514.tmp
c:\windows.1\system32\SET516.tmp
c:\windows.1\system32\SET517.tmp
c:\windows.1\system32\SET518.tmp
c:\windows.1\system32\SET51B.tmp
c:\windows.1\system32\SET51D.tmp
c:\windows.1\system32\SET520.tmp
c:\windows.1\system32\SET526.tmp
c:\windows.1\system32\SET528.tmp
c:\windows.1\system32\SET529.tmp
c:\windows.1\system32\SET52A.tmp
c:\windows.1\system32\SET52C.tmp
c:\windows.1\system32\SET52E.tmp
c:\windows.1\system32\SET52F.tmp
c:\windows.1\system32\SET530.tmp
c:\windows.1\system32\SET534.tmp
c:\windows.1\system32\SET538.tmp
c:\windows.1\system32\SET53A.tmp
c:\windows.1\system32\SET53C.tmp
c:\windows.1\system32\SET53D.tmp
c:\windows.1\system32\SET53E.tmp
c:\windows.1\system32\SET53F.tmp
c:\windows.1\system32\SET543.tmp
c:\windows.1\system32\SET545.tmp
c:\windows.1\system32\SET548.tmp
c:\windows.1\system32\SET549.tmp
c:\windows.1\system32\SET54C.tmp
c:\windows.1\system32\SET54D.tmp
c:\windows.1\system32\SET54E.tmp
c:\windows.1\system32\SET54F.tmp
c:\windows.1\system32\SET550.tmp
c:\windows.1\system32\SET551.tmp
c:\windows.1\system32\SET553.tmp
c:\windows.1\system32\SET554.tmp
c:\windows.1\system32\SET555.tmp
c:\windows.1\system32\SET556.tmp
c:\windows.1\system32\SET557.tmp
c:\windows.1\system32\SET558.tmp
c:\windows.1\system32\SET55A.tmp
c:\windows.1\system32\SET55B.tmp
c:\windows.1\system32\SET55C.tmp
c:\windows.1\system32\SET55D.tmp
c:\windows.1\system32\SET560.tmp
c:\windows.1\system32\SET562.tmp
c:\windows.1\system32\SET564.tmp
c:\windows.1\system32\SET565.tmp
c:\windows.1\system32\SET569.tmp
c:\windows.1\system32\SET56B.tmp
c:\windows.1\system32\SET56C.tmp
c:\windows.1\system32\SET56D.tmp
c:\windows.1\system32\SET56E.tmp
c:\windows.1\system32\SET572.tmp
c:\windows.1\system32\SET574.tmp
c:\windows.1\system32\SET575.tmp
c:\windows.1\system32\SET576.tmp
c:\windows.1\system32\SET577.tmp
c:\windows.1\system32\SET579.tmp
c:\windows.1\system32\SET57C.tmp
c:\windows.1\system32\SET57E.tmp
c:\windows.1\system32\SET57F.tmp
c:\windows.1\system32\SET581.tmp
c:\windows.1\system32\SET583.tmp
c:\windows.1\system32\SET584.tmp
c:\windows.1\system32\SET587.tmp
c:\windows.1\system32\SET588.tmp
c:\windows.1\system32\SET589.tmp
c:\windows.1\system32\SET58A.tmp
c:\windows.1\system32\SET58C.tmp
c:\windows.1\system32\SET58D.tmp
c:\windows.1\system32\SET58E.tmp
c:\windows.1\system32\SET58F.tmp
c:\windows.1\system32\SET591.tmp
c:\windows.1\system32\SET592.tmp
c:\windows.1\system32\SET593.tmp
c:\windows.1\system32\SET594.tmp
c:\windows.1\system32\SET595.tmp
c:\windows.1\system32\SET596.tmp
c:\windows.1\system32\SET598.tmp
c:\windows.1\system32\SET599.tmp
c:\windows.1\system32\SET59B.tmp
c:\windows.1\system32\SET59C.tmp
c:\windows.1\system32\SET5A0.tmp
c:\windows.1\system32\SET5A1.tmp
c:\windows.1\system32\SET5A2.tmp
c:\windows.1\system32\SET5A3.tmp
c:\windows.1\system32\SET5A4.tmp
c:\windows.1\system32\SET5A6.tmp
c:\windows.1\system32\SET5A7.tmp
c:\windows.1\system32\SET5A9.tmp
c:\windows.1\system32\SET5AD.tmp
c:\windows.1\system32\SET5AE.tmp
c:\windows.1\system32\SET5B0.tmp
c:\windows.1\system32\SET5B4.tmp
c:\windows.1\system32\SET5B7.tmp
c:\windows.1\system32\SET5B8.tmp
c:\windows.1\system32\SET5B9.tmp
c:\windows.1\system32\SET5BC.tmp
c:\windows.1\system32\SET5BD.tmp
c:\windows.1\system32\SET5C1.tmp
c:\windows.1\system32\SET5C2.tmp
c:\windows.1\system32\SET5C5.tmp
c:\windows.1\system32\SET5C6.tmp
c:\windows.1\system32\SET5CA.tmp
c:\windows.1\system32\SET5CB.tmp
c:\windows.1\system32\SET5CE.tmp
c:\windows.1\system32\SET5CF.tmp
c:\windows.1\system32\SET5D0.tmp
c:\windows.1\system32\SET5D2.tmp
c:\windows.1\system32\SET5D3.tmp
c:\windows.1\system32\SET5D4.tmp
c:\windows.1\system32\SET5D5.tmp
c:\windows.1\system32\SET5D7.tmp
c:\windows.1\system32\SET5D8.tmp
c:\windows.1\system32\SET5D9.tmp
c:\windows.1\system32\SET5DA.tmp
c:\windows.1\system32\SET5DD.tmp
c:\windows.1\system32\SET5DF.tmp
c:\windows.1\system32\SET5E0.tmp
c:\windows.1\system32\SET5E2.tmp
c:\windows.1\system32\SET5E3.tmp
c:\windows.1\system32\SET5E4.tmp
c:\windows.1\system32\SET5E5.tmp
c:\windows.1\system32\SET5E6.tmp
c:\windows.1\system32\SET5E7.tmp
c:\windows.1\system32\SET5EB.tmp
c:\windows.1\system32\SET5EE.tmp
c:\windows.1\system32\SET5F0.tmp
c:\windows.1\system32\SET5F2.tmp
c:\windows.1\system32\SET5F4.tmp
c:\windows.1\system32\SET5F5.tmp
c:\windows.1\system32\SET5F6.tmp
c:\windows.1\system32\SET5F8.tmp
c:\windows.1\system32\SET5FB.tmp
c:\windows.1\system32\SET5FE.tmp
c:\windows.1\system32\SET601.tmp
c:\windows.1\system32\SET603.tmp
c:\windows.1\system32\SET604.tmp
c:\windows.1\system32\SET605.tmp
c:\windows.1\system32\SET606.tmp
c:\windows.1\system32\SET60F.tmp
c:\windows.1\system32\SET613.tmp
c:\windows.1\system32\SET614.tmp
c:\windows.1\system32\SET616.tmp
c:\windows.1\system32\SET617.tmp
c:\windows.1\system32\SET618.tmp
c:\windows.1\system32\SET61C.tmp
c:\windows.1\system32\SET61E.tmp
c:\windows.1\system32\SET622.tmp
c:\windows.1\system32\SET624.tmp
c:\windows.1\system32\SET625.tmp
c:\windows.1\system32\SET62C.tmp
c:\windows.1\system32\SET62F.tmp
c:\windows.1\system32\SET638.tmp
c:\windows.1\system32\SET63B.tmp
c:\windows.1\system32\SET63D.tmp
c:\windows.1\system32\SET641.tmp
c:\windows.1\system32\SET649.tmp
c:\windows.1\system32\SET64B.tmp
c:\windows.1\system32\SET650.tmp
c:\windows.1\system32\SET652.tmp
c:\windows.1\system32\SET655.tmp
c:\windows.1\system32\SET659.tmp
c:\windows.1\system32\SET65B.tmp
c:\windows.1\system32\SET65C.tmp
c:\windows.1\system32\SET663.tmp
c:\windows.1\system32\SET664.tmp
c:\windows.1\system32\SET665.tmp
c:\windows.1\system32\SET667.tmp
c:\windows.1\system32\SET668.tmp
c:\windows.1\system32\SET669.tmp
c:\windows.1\system32\SET66A.tmp
c:\windows.1\system32\SET66C.tmp
c:\windows.1\system32\SET66E.tmp
c:\windows.1\system32\SET66F.tmp
c:\windows.1\system32\SET671.tmp
c:\windows.1\system32\SET674.tmp
c:\windows.1\system32\SET676.tmp
c:\windows.1\system32\SET67B.tmp
c:\windows.1\system32\SET67C.tmp
c:\windows.1\system32\SET684.tmp
c:\windows.1\system32\SET686.tmp
c:\windows.1\system32\SET68A.tmp
c:\windows.1\system32\SET68B.tmp
c:\windows.1\system32\SET68D.tmp
c:\windows.1\system32\SET68F.tmp
c:\windows.1\system32\SET694.tmp
c:\windows.1\system32\SET697.tmp
c:\windows.1\system32\SET69C.tmp
c:\windows.1\system32\SET69D.tmp
c:\windows.1\system32\SET6A0.tmp
c:\windows.1\system32\SET6A1.tmp
c:\windows.1\system32\SET6A2.tmp
c:\windows.1\system32\SET6A5.tmp
c:\windows.1\system32\SET6A6.tmp
c:\windows.1\system32\SET6AA.tmp
c:\windows.1\system32\SET6AB.tmp
c:\windows.1\system32\SET6AE.tmp
c:\windows.1\system32\SET6B0.tmp
c:\windows.1\system32\SET6B5.tmp
c:\windows.1\system32\SET6B8.tmp
c:\windows.1\system32\SET6BA.tmp
c:\windows.1\system32\SET6BD.tmp
c:\windows.1\system32\SET6C0.tmp
c:\windows.1\system32\SET6C1.tmp
c:\windows.1\system32\SET6C2.tmp
c:\windows.1\system32\SET6C5.tmp
c:\windows.1\system32\SET6C6.tmp
c:\windows.1\system32\SET6CC.tmp
c:\windows.1\system32\SET6CE.tmp
c:\windows.1\system32\SET6CF.tmp
c:\windows.1\system32\SET6D0.tmp
c:\windows.1\system32\SET6D6.tmp
c:\windows.1\system32\SET6DA.tmp
c:\windows.1\system32\SET6E3.tmp
c:\windows.1\system32\SET6E9.tmp
c:\windows.1\system32\SET6EB.tmp
c:\windows.1\system32\SET6EC.tmp
c:\windows.1\system32\SET6ED.tmp
c:\windows.1\system32\SET6F7.tmp
c:\windows.1\system32\SET6FB.tmp
c:\windows.1\system32\SET706.tmp
c:\windows.1\system32\SET717.tmp
c:\windows.1\system32\SET744.tmp
c:\windows.1\system32\SET74B.tmp
c:\windows.1\system32\SET74C.tmp
c:\windows.1\system32\SET74D.tmp
c:\windows.1\system32\SET74F.tmp
c:\windows.1\system32\SET750.tmp
c:\windows.1\system32\SET751.tmp
c:\windows.1\system32\SET754.tmp
c:\windows.1\system32\SET756.tmp
c:\windows.1\system32\SET757.tmp
c:\windows.1\system32\SET759.tmp
c:\windows.1\system32\SET75C.tmp
c:\windows.1\system32\SET75E.tmp
c:\windows.1\system32\SET763.tmp
c:\windows.1\system32\SET764.tmp
c:\windows.1\system32\SET76C.tmp
c:\windows.1\system32\SET773.tmp
c:\windows.1\system32\SET77C.tmp
c:\windows.1\system32\SET785.tmp
c:\windows.1\system32\SET788.tmp
c:\windows.1\system32\SET789.tmp
c:\windows.1\system32\SET78A.tmp
c:\windows.1\system32\SET78D.tmp
c:\windows.1\system32\SET78E.tmp
c:\windows.1\system32\SET792.tmp
c:\windows.1\system32\SET793.tmp
c:\windows.1\system32\SET796.tmp
c:\windows.1\system32\SET798.tmp
c:\windows.1\system32\SET79D.tmp
c:\windows.1\system32\SET7A0.tmp
c:\windows.1\system32\SET7A2.tmp
c:\windows.1\system32\SET7A5.tmp
c:\windows.1\system32\SET7A8.tmp
c:\windows.1\system32\SET7AA.tmp
c:\windows.1\system32\SET7AE.tmp
c:\windows.1\system32\SETF8F.tmp
c:\windows.1\system32\SETF97.tmp
c:\windows.1\system32\SETF99.tmp
c:\windows.1\system32\SETF9C.tmp
c:\windows.1\system32\SETFB3.tmp
c:\windows.1\system32\SETFCD.tmp
c:\windows.1\system32\tmp.reg
c:\windows.1\system32\winlogon.bak
c:\windows.1\wininit.ini
c:\windows.1\XSxS
.
.
((((((((((((((((((((((((( Files Created from 2012-12-09 to 2013-01-09 )))))))))))))))))))))))))))))))
.
.
2013-01-02 08:35 . 2012-11-28 18:35 93640 ----a-w- c:\windows.1\system32\WindowsAccessBridge.dll
2012-12-27 07:38 . 2012-12-27 07:39 -------- d-----w- c:\program files\Magical Phones
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-01-09 09:20 . 2012-04-05 01:07 697864 ----a-w- c:\windows.1\system32\FlashPlayerApp.exe
2013-01-09 09:20 . 2011-08-28 23:44 74248 ----a-w- c:\windows.1\system32\FlashPlayerCPLApp.cpl
2012-12-16 12:23 . 2004-08-12 12:55 290560 ----a-w- c:\windows.1\system32\atmfd.dll
2012-12-15 00:49 . 2008-11-13 18:59 21104 ----a-w- c:\windows.1\system32\drivers\mbam.sys
2012-11-13 01:25 . 2010-01-09 20:05 1866368 ----a-w- c:\windows.1\system32\win32k.sys
2012-11-06 02:01 . 2008-04-14 12:42 1371648 ----a-w- c:\windows.1\system32\msxml6.dll
2012-11-02 02:02 . 2004-08-12 12:56 375296 ----a-w- c:\windows.1\system32\dpnet.dll
2012-11-01 12:17 . 2004-08-12 13:09 916992 ----a-w- c:\windows.1\system32\wininet.dll
2012-11-01 12:17 . 2004-08-12 12:59 43520 ----a-w- c:\windows.1\system32\licmgr10.dll
2012-11-01 12:17 . 2004-08-12 12:58 1469440 ------w- c:\windows.1\system32\inetcpl.cpl
2012-11-01 00:35 . 2004-08-12 12:57 385024 ----a-w- c:\windows.1\system32\html.iec
2005-05-14 00:12 217073 --sha-r- c:\windows.1\meta4.exe
2005-10-24 18:13 66560 --sha-r- c:\windows.1\MOTA113.exe
2005-10-14 04:27 422400 --sha-r- c:\windows.1\x2.64.exe
2005-06-26 23:32 616448 --sha-r- c:\windows.1\system32\cygwin1.dll
2005-06-22 06:37 45568 --sha-r- c:\windows.1\system32\cygz.dll
2006-05-03 20:06 163328 --sha-r- c:\windows.1\system32\flvDX.dll
2007-02-21 21:47 31232 --sha-r- c:\windows.1\system32\msfDX.dll
2008-03-16 23:30 216064 --sha-r- c:\windows.1\system32\nbDX.dll
2006-04-27 18:24 2945024 --sha-r- c:\windows.1\system32\Smab.dll
2010-01-07 08:00 107520 --sha-r- c:\windows.1\system32\TAKDSDecoder.dll
2005-02-28 21:16 240128 --sha-r- c:\windows.1\system32\x.264.exe
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"pdfFactory Pro Dispatcher v2"="c:\windows.1\System32\spool\DRIVERS\W32X86\3\fppdis2a.exe" [2003-11-06 385024]
"TotalRecorderScheduler"="c:\shareb\totalrecorder\TotRecSched.exe" [2005-05-19 81920]
"NvMediaCenter"="c:\windows.1\system32\NvMcTray.dll" [2011-01-08 111208]
"NvCplDaemon"="c:\windows.1\system32\NvCpl.dll" [2011-01-08 13880424]
"nwiz"="c:\program files\NVIDIA Corporation\nView\nwiz.exe" [2010-11-04 1753192]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"tscuninstall"="c:\windows.1\system32\tscupgrd.exe" [2004-08-12 44544]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
AutoStart IR.lnk - c:\program files\WinTV\Ir.exe [2012-11-25 117344]
WinTV Recording Status..lnk - c:\program files\WinTV\WinTV7\WinTVTray.exe [2012-11-25 82944]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\sharec\superantispyware\SASSEH.DLL" [2006-12-20 77824]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"mixer"=DrvTrNTm.dll
"wave"=DrvTrNTm.dll
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ autocheck autochk /p \??\F:\0autocheck autochk *
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^AudioDeck.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\AudioDeck.lnk
backup=c:\windows.1\pss\AudioDeck.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^AutoStart IR.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\AutoStart IR.lnk
backup=c:\windows.1\pss\AutoStart IR.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Google Updater.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Google Updater.lnk
backup=c:\windows.1\pss\Google Updater.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^NextPVR Tray.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\NextPVR Tray.lnk
backup=c:\windows.1\pss\NextPVR Tray.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^Preferred Customer^Start Menu^Programs^Startup^Scanner Utilities.lnk]
backup=c:\windows.1\pss\Scanner Utilities.lnkStartup
.
[HKLM\~\startupfolder\C:^Documents and Settings^Preferred Customer^Start Menu^Programs^Startup^Spoon Sandbox Manager 3.24.lnk]
path=c:\documents and settings\Preferred Customer\Start Menu\Programs\Startup\Spoon Sandbox Manager 3.24.lnk
backup=c:\windows.1\pss\Spoon Sandbox Manager 3.24.lnkStartup
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Alcmtr]
2010-01-20 02:46 64032 ----a-w- c:\windows.1\ALCMTR.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AlcWzrd]
2010-01-20 02:46 2815520 ----a-w- c:\windows.1\ALCWZRD.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2008-04-14 13:42 15360 ----a-w- c:\windows.1\system32\ctfmon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\emMON]
2006-02-07 11:57 61440 ----a-r- c:\windows.1\emMON.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IMEKRMIG6.1]
2004-08-12 13:58 44032 ----a-w- c:\windows.1\ime\IMKR6_1\imekrmig.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IMJPMIG8.1]
2004-08-12 13:58 208952 ----a-w- c:\windows.1\ime\IMJP8_1\imjpmig.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NBJ]
2004-09-22 23:10 1871872 ----a-w- c:\sharec\nero\Nero BackItUp\NBJ.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
2011-01-08 03:56 13880424 ----a-w- c:\windows.1\system32\nvcpl.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvMediaCenter]
2011-01-08 03:56 111208 ----a-w- c:\windows.1\system32\nvmctray.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\OneTouch Monitor]
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RTHDCPL]
2010-01-20 02:46 18790432 ----a-w- c:\windows.1\RTHDCPL.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMan]
2010-01-20 02:46 84512 ----a-w- c:\windows.1\SOUNDMAN.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
2009-03-03 06:26 185896 ----a-w- c:\program files\Common Files\Real\Update_OB\realsched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Veoh]
2008-04-02 01:35 3587120 ----a-w- c:\sharea\veoh\VeohClient.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VeohPlugin]
2010-01-26 17:46 2633976 ----a-w- c:\program files\Veoh Networks\VeohWebPlayer\veohwebplayer.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"MsSecurity1.209.4"=2 (0x2)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)
"DisableUnicastResponsesToMulticastBroadcast"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\sharea\\maxthon\\Maxthon.exe"=
"c:\\sharea\\kerio\\PERSFW.exe"=
"c:\\shareb\\mirc\\mirc.exe"=
"c:\\sharec\\bitcomet\\BitComet.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\AV-CLS\\WGET.EXE"=
"c:\\sharea\\veoh\\VeohClient.exe"=
"c:\\shareb\\orbitdownloader\\orbitnet.exe"=
"c:\\sharea\\Free Music Zilla\\FMZilla.exe"=
"c:\\sharea\\maxthon2\\Modules\\MxDownloader\\MxDownloadServer.exe"=
"c:\\shareb\\orbitdownloader\\orbitdm.exe"=
"c:\\sharea\\streamripper\\streamripper.exe"=
"c:\\shareb\\Gizmo5\\mDNSResponder.exe"=
"c:\\shareb\\Gizmo5\\Gizmo5.exe"=
"c:\\shareb\\GomPlayer\\GOM.exe"=
"c:\\shareb\\Gateway6 Client\\gw6c-gui.exe"=
"c:\\Program Files\\Windows Media Player\\wmplayer.exe"=
"c:\\Program Files\\Veoh Networks\\VeohWebPlayer\\veohwebplayer.exe"=
"c:\\sharea\\opera\\opera.exe"=
"c:\\Program Files\\WinTV\\WinTV7\\WinTV7.exe"=
"c:\\Program Files\\WinTV\\Extend\\WinTVExtender.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"7190:TCP"= 7190:TCP:BitComet 7190 TCP
"7190:UDP"= 7190:UDP:BitComet 7190 UDP
.
R0 hotcore3;hotcore3;c:\windows.1\system32\drivers\hotcore3.sys [10/31/2008 11:21 AM 38448]
R0 viasraid;viasraid;c:\windows.1\system32\drivers\viasraid.sys [10/31/2003 10:22 AM 77312]
R1 fwdrv;Kerio Personal Firewall Driver;c:\windows.1\system32\drivers\FWDRV.SYS [2/12/2007 10:43 PM 102912]
R1 SASDIFSV;SASDIFSV;c:\sharec\superantispyware\sasdifsv.sys [10/10/2006 12:53 PM 5632]
R1 SASKUTIL;SASKUTIL;c:\sharec\superantispyware\SASKUTIL.SYS [1/9/2007 2:09 PM 30720]
R1 VBoxDrv;VirtualBox Service;c:\windows.1\system32\drivers\VBoxDrv.sys [7/3/2012 12:51 AM 158552]
R1 VBoxUSBMon;VirtualBox USB Monitor Driver;c:\windows.1\system32\drivers\VBoxUSBMon.sys [7/3/2012 12:51 AM 91992]
R2 Hauppauge WinTV Extender;Hauppauge WinTV Extender;c:\progra~1\WinTV\Extend\WINTVE~1.EXE [11/25/2012 12:52 PM 69120]
R2 HauppaugeTVServer;HauppaugeTVServer;c:\progra~1\WinTV\TVServer\HAUPPA~1.EXE [11/25/2012 12:52 PM 558592]
R2 MLPTDR_Q;MLPTDR_Q;c:\windows.1\system32\MLPTDR_Q.SYS [4/6/2012 3:24 PM 18848]
R2 npf;NetGroup Packet Filter Driver;c:\windows.1\system32\drivers\npf.sys [7/15/2010 4:45 PM 35088]
R2 ppsio2;PPDevice;c:\windows.1\system32\drivers\ppsio2.sys [3/28/2012 4:55 PM 23200]
R2 WSWNA1100;WSWNA1100;c:\program files\NETGEAR\WNA1100\WifiSvc.exe [6/12/2012 9:10 PM 266240]
R3 AR9271;Atheros AR9271 Wireless Network Adapter Service;c:\windows.1\system32\drivers\athuw.sys [6/12/2012 9:10 PM 1759584]
R3 DsAudioDevice_286;DsAudioDevice_286;c:\windows.1\system32\drivers\DsAudioDevice_286.sys [12/24/2008 10:46 PM 16640]
R3 hcw18bda;Hauppauge WinTV 418 Driver;c:\windows.1\system32\drivers\hcw18bda.sys [11/12/2011 2:56 PM 719616]
R3 HexTunnelDevice;Hexago Multi-Virtual Tunnel Adapter;c:\windows.1\system32\drivers\hextun.sys [2/23/2009 8:30 PM 22176]
R3 JSWSCIMD;jswscimd Service;c:\windows.1\system32\drivers\jswscimd.sys [6/12/2012 9:10 PM 57440]
R3 pcouffin;VSO Software pcouffin;c:\windows.1\system32\drivers\pcouffin.sys [12/26/2006 11:20 PM 47360]
R3 VBoxNetAdp;VirtualBox Host-Only Ethernet Adapter;c:\windows.1\system32\drivers\VBoxNetAdp.sys [6/5/2012 3:33 PM 104792]
R3 VBoxNetFlt;VirtualBox Bridged Networking Service;c:\windows.1\system32\drivers\VBoxNetFlt.sys [9/7/2012 5:38 PM 116056]
R3 WsAudio_DeviceS(1);WsAudio_DeviceS(1);c:\windows.1\system32\drivers\WsAudio_DeviceS(1).sys [5/14/2009 2:09 PM 25704]
R3 WsAudio_DeviceS(2);WsAudio_DeviceS(2);c:\windows.1\system32\drivers\WsAudio_DeviceS(2).sys [1/9/2010 11:31 PM 25704]
R3 WsAudio_DeviceS(3);WsAudio_DeviceS(3);c:\windows.1\system32\drivers\WsAudio_DeviceS(3).sys [1/9/2010 11:31 PM 25704]
R3 WsAudio_DeviceS(4);WsAudio_DeviceS(4);c:\windows.1\system32\drivers\WsAudio_DeviceS(4).sys [1/9/2010 11:31 PM 25704]
R3 WsAudio_DeviceS(5);WsAudio_DeviceS(5);c:\windows.1\system32\drivers\WsAudio_DeviceS(5).sys [1/9/2010 11:32 PM 25704]
S0 MFX;MFX;c:\windows.1\system32\drivers\MFX.sys [11/24/2005 3:53 PM 49692]
S0 XMS1563K;XMS1563K;c:\windows.1\system32\drivers\XMS1563K.SYS [11/24/2005 3:59 PM 49692]
S2 gw6c;Hexago Gateway6 Client;c:\shareb\Gateway6 Client\gw6c.exe [2/23/2009 8:30 PM 385024]
S2 NPVR Recording Service;NPVR Recording Service;"c:\program files\NPVR\NRecord.exe" --> c:\program files\NPVR\NRecord.exe [?]
S3 a2acc;a2acc;c:\sharec\Emsisoft Anti-Malware\a2accx86.sys [8/28/2011 9:12 PM 51632]
S3 a2AntiMalware;Emsisoft Anti-Malware 5.1 - Service;c:\sharec\Emsisoft Anti-Malware\a2service.exe [8/28/2011 9:12 PM 3045688]
S3 a2free;a-squared Free Service;c:\sharec\a-squared Free\a2service.exe [8/22/2007 3:43 PM 1872320]
S3 Ambfilt;Ambfilt;c:\windows.1\system32\drivers\Ambfilt.sys [11/18/2009 7:16 AM 1691480]
S3 Andbus;LGE Android Composite USB Device;c:\windows.1\system32\DRIVERS\lgandbus.sys --> c:\windows.1\system32\DRIVERS\lgandbus.sys [?]
S3 AndDiag;LGE Android USB Serial Port;c:\windows.1\system32\DRIVERS\lganddiag.sys --> c:\windows.1\system32\DRIVERS\lganddiag.sys [?]
S3 AndGps;LGE Android USB GPS NMEA Port;c:\windows.1\system32\DRIVERS\lgandgps.sys --> c:\windows.1\system32\DRIVERS\lgandgps.sys [?]
S3 ANDModem;LGE Android USB Modem;c:\windows.1\system32\DRIVERS\lgandmodem.sys --> c:\windows.1\system32\DRIVERS\lgandmodem.sys [?]
S3 androidusb;ADB Interface Driver;c:\windows.1\system32\Drivers\lgandadb.sys --> c:\windows.1\system32\Drivers\lgandadb.sys [?]
S3 GSService;GSService;c:\windows.1\system32\GSService.exe [11/2/2010 12:37 AM 364544]
S3 HwIOctl;HwIOctl;\??\c:\drivers\bios2.2\HwIOctl.sys --> c:\drivers\bios2.2\HwIOctl.sys [?]
S3 jswpsapi;JumpStart Wi-Fi Protected Setup;c:\program files\NETGEAR\WNA1100\jswpsapi.exe [6/12/2012 9:10 PM 360529]
S3 ms6823;IEEE802.11b Wireless USB Adapter;c:\windows.1\system32\drivers\ms6823.sys [6/10/2004 10:47 AM 55168]
S3 RTL8192Ce;Realtek Wireless LAN 802.11n PCI-E NIC Driver;c:\windows.1\system32\drivers\rtl8192Ce.sys [12/9/2011 5:16 PM 1480296]
S3 SASENUM;SASENUM;c:\sharec\superantispyware\SASENUM.SYS [2/16/2006 4:51 PM 4096]
S3 SIS163u;SiS163 USB Wireless LAN Adapter Driver;c:\windows.1\system32\drivers\sis163u.sys [8/28/2011 3:13 PM 215552]
S3 STSService;STSService;c:\program files\SoundTaxi Media Suite\STSService.exe [10/29/2010 6:44 AM 364544]
S3 Vsp;Vsp;c:\windows.1\system32\drivers\vsp.sys [8/16/2008 12:11 PM 3351]
S3 XE102Mp5;XE102Mp5 NDIS Protocol Driver;c:\windows.1\system32\drivers\XE102Mp5.sys [6/15/2009 10:27 PM 21120]
S3 XE102Sp5;XE102Sp5 NDIS Protocol Driver;c:\windows.1\system32\drivers\XE102Sp5.sys [6/15/2009 10:27 PM 18176]
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{B2C3BB6B-E005-4246-B8E5-DF0A4D073CDC}]
2008-06-18 23:04 8192 ----a-w- c:\program files\PixiePack Codec Pack\InstallerHelper.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-01-09 c:\windows.1\Tasks\Adobe Flash Player Updater.job
- c:\windows.1\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-05 09:20]
.
2013-01-09 c:\windows.1\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-11-10 23:44]
.
2013-01-09 c:\windows.1\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-11-10 23:44]
.
2013-01-08 c:\windows.1\Tasks\User_Feed_Synchronization-{52AAEEDE-6257-43D1-9F73-6606B3DDDBA9}.job
- c:\windows.1\system32\msfeedssync.exe [2007-08-14 11:31]
.
2013-01-09 c:\windows.1\Tasks\WpsUpdateTask_Preferred Customer.job
- c:\sharec\Kingsoft Office\office6\wpsupdate.exe [2011-08-24 16:00]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
uInternet Settings,ProxyServer = 8.8.8.8:80
IE: &2 Customize Menu - c:\sharec\roboform\RoboForm.dll/ComCustomIEMenu.html
IE: &7 Fill Forms - c:\sharec\roboform\RoboForm.dll/ComFillForms.html
IE: &8 Save Forms - c:\sharec\roboform\RoboForm.dll/ComSavePass.html
IE: Add to WebSite-Watcher - c:\documents and settings\Preferred Customer\Application Data\aignes\WebSite-Watcher\config\settings\wswie.htm
Trusted Zone: com.tw\asia.msi
Trusted Zone: com.tw\global.msi
Trusted Zone: com.tw\www.msi
Trusted Zone: keynote.com\webeffective
Trusted Zone: microsoft.com\*.update
Trusted Zone: windowsupdate.com\download
TCP: DhcpNameServer = 198.153.192.40 208.67.220.123
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
HKLM-Run-jswtrayutil - c:\program files\NETGEAR\WNA1100\jswtrayutil.exe
Notify-!SASWinLogon - c:\sharec\superantispyware\SASWINLO.dll
Notify-AtiExtEvent - (no file)
Notify-WgaLogon - (no file)
SafeBoot-53389507.sys
SafeBoot-AVG Anti-Spyware Driver
SafeBoot-WudfPf
SafeBoot-WudfRd
SafeBoot-AVG Anti-Spyware Guard
MSConfigStartUp-avast! - c:\sharec\avast\ashDisp.exe
MSConfigStartUp-AVG7_CC - c:\sharec\avg\avgcc.exe
MSConfigStartUp-AVG8_TRAY - c:\progra~1\AVG\AVG8\avgtray.exe
MSConfigStartUp-avgnt - c:\sharec\Avira\AntiVir Desktop\avgnt.exe
MSConfigStartUp-DivXUpdate - c:\program files\DivX\DivX Update\DivXUpdate.exe
MSConfigStartUp-Google Update - c:\documents and settings\Preferred Customer\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
MSConfigStartUp-nwiz - nwiz.exe
MSConfigStartUp-PVR Agent - c:\program files\KWorld Multimedia\PVR Plus\TVR\Scheduled.exe
MSConfigStartUp-SunJavaUpdateSched - c:\program files\Java\jre6\bin\jusched.exe
AddRemove-AnVir Task Manager - c:\shareb\AnVir Task Manager\AnVir.exe
AddRemove-AutoItv3 - c:\shareb\AutoIt3\Uninstall.exe
AddRemove-HijackThis - c:\docume~1\PREFER~1\LOCALS~1\Temp\Temporary Directory 1 for hijackthis.zip\HijackThis.exe
AddRemove-WinCDGPro3 - c:\windows.1\iun6002.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-01-09 02:29
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-583907252-362288127-839522115-1004\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{69867A5E-2F80-EF98-04CF-077993F5FA6A}*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
"iaijdipgadedehonhb"=hex:6a,61,65,6d,67,6a,64,6f,67,63,65,70,66,6d,61,6b,67,6a,
6e,6a,00,00
"haolcgegbdliplea"=hex:6a,61,65,6d,67,6a,64,6f,67,63,65,70,66,6d,61,6b,67,6a,
6e,6a,00,19
.
[HKEY_USERS\S-1-5-21-583907252-362288127-839522115-1004\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{866FC1BC-AD34-DF49-6EF9-802F6C862B33}*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-583907252-362288127-839522115-1004\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{C41CA6EF-AA7E-38C1-A5A1-F0AE85CBA3E3}*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
"hagaebbbifileian"=hex:61,62,68,64,69,69,69,6d,64,65,62,70,6b,6d,62,70,69,69,
6b,63,6e,6a,68,64,61,6b,6f,6b,68,66,6e,6e,66,64,00,01
"jadblapgecjcgmjfjjee"=hex:6f,61,68,61,63,62,6d,69,63,66,61,6e,6d,6e,63,70,6e,
6e,6d,6f,61,66,61,66,66,61,67,62,70,65,00,00
.
[HKEY_USERS\S-1-5-21-583907252-362288127-839522115-1004\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{C90784AE-1706-31FB-F1F8-357803A8A6AA}*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS.1\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_146_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS.1\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_146_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
Completion time: 2013-01-09 02:34:13
ComboFix-quarantined-files.txt 2013-01-09 10:34
ComboFix2.txt 2008-06-09 06:06
.
Pre-Run: 514,176,778,240 bytes free
Post-Run: 514,511,405,056 bytes free
.
- - End Of File - - 9CBF6069288F55E4EF0D72B137761B0B


2. Checkup.txt

Results of screen317's Security Check version 0.99.56
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Disabled!
Kerio Personal Firewall 2.1.5
`````````Anti-malware/Other Utilities Check:`````````
Out of date Spybot installed!
CA Yahoo! Anti-Spy (remove only)
Spybot - Search & Destroy 1.5.2.20
Spybot - Search & Destroy
SUPERAntiSpyware Free Edition
Advanced WindowsCare 2.41 Professional
Rootkit Unhooker Uninstall
Malwarebytes Anti-Malware version 1.70.0.1100
JavaFX 2.1.1
Java 7 Update 10
Java version out of Date!
Adobe Flash Player 11.5.502.146
````````Process Check: objlist.exe by Laurent````````
`````````````````System Health check`````````````````
Total Fragmentation on Drive C:: 10%
````````````````````End of Log``````````````````````


3. AdwCleaner[R1].txt

# AdwCleaner v2.105 - Logfile created 01/09/2013 at 03:03:03
# Updated 08/01/2013 by Xplode
# Operating system : Microsoft Windows XP Service Pack 3 (32 bits)
# User : Preferred Customer - COMPUTER3
# Boot Mode : Normal
# Running from : C:\Documents and Settings\Preferred Customer\Desktop\adwcleaner.exe
# Option [Search]


***** [Services] *****


***** [Files / Folders] *****

Folder Found : C:\Documents and Settings\All Users\Application Data\boost_interprocess

***** [Registry] *****

Key Found : HKCU\Software\Conduit
Key Found : HKCU\Software\Softonic
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1
Key Found : HKLM\Software\MetaStream
Key Found : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Found : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\ViewpointMediaPlayer
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\webHancer Agent
Key Found : HKLM\SOFTWARE\MozillaPlugins\@viewpoint.com/VMP
Key Found : HKLM\Software\TENCENT

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18702

[OK] Registry is clean.

-\\ Opera v [Unable to get version]

File : C:\Documents and Settings\Preferred Customer\Application Data\Opera\Opera\operaprefs.ini

Found : application/x-veohversion4-plugin=,0
Found : application/x-veohtvplugin=,0
Found : application/x-webplayervideoplugin=,0
Found : application/x-veohversion4-plugin=6,,C:\sharea\veoh\Plugins\noreg\NPVeohVersion.dll,NPVeohVersion4 p[...]
Found : application/x-veohtvplugin=6,,,,veoh,|
Found : application/x-webplayervideoplugin=6,,C:\Program Files\Veoh Networks\VeohWebPlayer\npWebPlayerVideoP[...]

*************************

AdwCleaner[R1].txt - [2095 octets] - [09/01/2013 03:03:03]

########## EOF - C:\AdwCleaner[R1].txt - [2155 octets] ##########

#4 nasdaq

nasdaq

  • Malware Response Team
  • 39,191 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:01 AM

Posted 09 January 2013 - 09:31 AM

Java 7 Update 10
Java version out of Date!

You have the latest Java version. The tool need to be updated.

===

Remove the AdWare, PUP (Potentially Unwanted Program) installed on your computer.

  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Everything that was found will be deleted.
  • Follow the prompts to reboot the computer. A text file will open after the restart.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number)..

Please post the log and let me know what problem persists.

#5 thelaw

thelaw
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:02:01 AM

Posted 10 January 2013 - 02:28 AM

There was no obvious signs of malware when I started this thread, so it is hard to say what exactly is wrong. Gmer now does finish scanning. Previously, Gmer would bluescreen the computer.

Rkill still bluescreens though. Is this a malware issue?

Also, from the DDS report, there were some hidden .exe files listed in the Windows directory. Do you think those (meta4.exe, MOTA113.exe, x2.64.exe, and x.264.exe) are malicious files?

Thanks.

Here is the log:

# AdwCleaner v2.105 - Logfile created 01/09/2013 at 22:48:53
# Updated 08/01/2013 by Xplode
# Operating system : Microsoft Windows XP Service Pack 3 (32 bits)
# User : Preferred Customer - COMPUTER3
# Boot Mode : Normal
# Running from : C:\Documents and Settings\Preferred Customer\Desktop\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****

Folder Deleted : C:\Documents and Settings\All Users\Application Data\boost_interprocess

***** [Registry] *****

Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\Softonic
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1
Key Deleted : HKLM\Software\MetaStream
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\ViewpointMediaPlayer
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\webHancer Agent
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@viewpoint.com/VMP
Key Deleted : HKLM\Software\TENCENT

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18702

[OK] Registry is clean.

-\\ Opera v [Unable to get version]

File : C:\Documents and Settings\Preferred Customer\Application Data\Opera\Opera\operaprefs.ini

Deleted : application/x-veohversion4-plugin=,0
Deleted : application/x-veohtvplugin=,0
Deleted : application/x-webplayervideoplugin=,0
Deleted : application/x-veohversion4-plugin=6,,C:\sharea\veoh\Plugins\noreg\NPVeohVersion.dll,NPVeohVersion4 p[...]
Deleted : application/x-veohtvplugin=6,,,,veoh,|
Deleted : application/x-webplayervideoplugin=6,,C:\Program Files\Veoh Networks\VeohWebPlayer\npWebPlayerVideoP[...]

*************************

AdwCleaner[S1].txt - [2135 octets] - [09/01/2013 22:48:53]

########## EOF - C:\AdwCleaner[S1].txt - [2195 octets] ##########

#6 nasdaq

nasdaq

  • Malware Response Team
  • 39,191 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:01 AM

Posted 10 January 2013 - 11:34 AM

Nothing wrong with these files.

http://www.winpatrol.com/db/plus2009/mota113.html?mota113.exe&1

If any of them were causing problems you would know.


If it's not broken do not fix it...

===

Rkill still bluescreens though. Is this a malware issue?
I do not think so. No need to run it since all is well.

===

If all is well:

Time for some housekeeping

The following will implement some cleanup procedures as well as reset System Restore points:

Click Start > Run and copy/paste the following bold text into the Run box and click OK:

ComboFix /Uninstall
===

To remove AdwCleaner.

Please double click on AdwCleaner.exe to run the tool.
Click on Uninstall.
Confirm with Yes.

If you decide to keep the AdwCleaner tool make sure delete your version and download the latest before running it.

Delete the other tools we used.
You can Keep the DDS tool as most forum will ask to see a log before suggesting a fix.

Surf Safely, and Think Prevention!
===

#7 thelaw

thelaw
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:02:01 AM

Posted 11 January 2013 - 02:35 AM

Okay. Thanks for the assistance you have given me. Much appreciated.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users