Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Slow Laptop - suspect not malware


  • Please log in to reply
67 replies to this topic

#1 Stephen W

Stephen W

  • Members
  • 210 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, UK
  • Local time:10:39 AM

Posted 10 February 2013 - 10:41 AM

Hi. I've had my Laptop for a while and it used to be much faster. It now seems to take an age to start up and to open up programs. I suspect there is not Malware on the machine as I am pretty careful what I click on. Most likely it is too many start up programs. I would really appreciate if somebody can help me give the machine a check up and optimise its set up.

Thanks


Edited by Stephen W, 10 February 2013 - 10:42 AM.


BC AdBot (Login to Remove)

 


#2 InadequateInfirmity

InadequateInfirmity

    I Gots Me A Certified Edumication


  • Banned
  • 5,180 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:39 AM

Posted 10 February 2013 - 11:06 AM

Please download MINITOOLBOX and run it.
http://download.bleepingcomputer.com/farbar/MiniToolBox.exe

Checkmark following boxes:

Flush DNS
Report IE Proxy Settings
Report FF Proxy Settings
Reset Ie proxy Settins
Reset FF proxy settings
List content of Hosts
List IP configuration
List Winsock Entries
List last 10 Event Viewer log
List Installed Programs
List Users, Partitions and Memory size
List Devices (problems only)



Click Go and post the result. 

Download Adware Cleaner run it Click the delete button allow it to run and post the log it creates.

http://general-changelog-team.fr/fr/downloads/finish/20-outils-de-xplode/2-adwcleaner


Download the junkware removal tool save it to your desktop run it in safe mode post the log.
http://thisisudax.org/downloads/JRT.exe


Download Emsisoft Emergency Kit and save it to your desktop. Right-click on EmsisoftEmergencyKit.zip and select Extract All.... Leave all settings as they are and click Extract. You will now have a folder named EmsisoftEmergencyKit on your desktop.

Open the EmsisoftEmergencyKit
http://www.emsisoft.com/en/software/eek/download/
folder and double-click Start.exe.
A new window will open. Under "Run Directly:" click Emergency Kit Scanner.
When asked to run an online update, click Yes.
When the update is finished, click the Back to Security Status link in the left corner. On the main screen click the Scan Now button.
Select the Deep Scan option and click the SCAN button.
When the scan is finished click the Quarantine selected objects button. Note, this option is only available if malicious objects were detected during the scan.
Click the View Report button and in the Reports window double-click on the most recent log. Note, logs are named as follows: a2scan_<date>-<time>.txt.
Copy/paste the report contents in your next reply.



#3 Stephen W

Stephen W
  • Topic Starter

  • Members
  • 210 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, UK
  • Local time:10:39 AM

Posted 10 February 2013 - 12:00 PM

Minitoolbox Log:

 

MiniToolBox by Farbar  Version:10-01-2013
Ran by Stephen (administrator) on 10-02-2013 at 17:00:07
Running from "C:\Users\Stephen\Desktop"
Windows Vista ™ Home Premium Service Pack 2 (X86)
Boot Mode: Normal
***************************************************************************

========================= Flush DNS: ===================================

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.
========================= Hosts content: =================================

::1             localhost


========================= IP Configuration: ================================

 

# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration

 

Windows IP Configuration

   Host Name . . . . . . . . . . . . : StevesHP-Laptop
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : home

Ethernet adapter Bluetooth Network Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
   Physical Address. . . . . . . . . : 00-1E-37-06-7E-3F
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Wireless Network Connection:

   Connection-specific DNS Suffix  . : home
   Description . . . . . . . . . . . : Intel® PRO/Wireless 3945ABG Network Connection
   Physical Address. . . . . . . . . : 00-1C-BF-0E-1C-5B
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.1.76(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : 10 February 2013 16:51:45
   Lease Expires . . . . . . . . . . : 11 February 2013 16:51:42
   Default Gateway . . . . . . . . . : 192.168.1.254
   DHCP Server . . . . . . . . . . . : 192.168.1.254
   DNS Servers . . . . . . . . . . . : 8.8.8.8
                                       8.8.4.4
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Local Area Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : designrule.local
   Description . . . . . . . . . . . : Realtek RTL8168B/8111B Family PCI-E GBE NIC
   Physical Address. . . . . . . . . : 00-1B-24-C7-71-26
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 6:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : isatap.{EE9BEB3B-48A8-4928-84A4-79D90E8588F1}
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 10:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : isatap.designrule.local
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 12:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 02-00-54-55-4E-01
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2001:0:5ef5:79fd:34ec:34b6:3f57:feb3(Preferred)
   Link-local IPv6 Address . . . . . : fe80::34ec:34b6:3f57:feb3%12(Preferred)
   Default Gateway . . . . . . . . . : ::
   NetBIOS over Tcpip. . . . . . . . : Disabled

Tunnel adapter Local Area Connection* 15:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : home
   Description . . . . . . . . . . . : isatap.home
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
Server:  google-public-dns-a.google.com
Address:  8.8.8.8

Name:    google.com
Addresses:  2a00:1450:4009:805::1002
   173.194.34.163
   173.194.34.166
   173.194.34.164
   173.194.34.165
   173.194.34.174
   173.194.34.160
   173.194.34.169
   173.194.34.161
   173.194.34.162
   173.194.34.167
   173.194.34.168

 

Pinging google.com [173.194.34.163] with 32 bytes of data:

PING: transmit failed, error code 5.

PING: transmit failed, error code 5.

 

Ping statistics for 173.194.34.163:

    Packets: Sent = 2, Received = 0, Lost = 2 (100% loss),

Server:  google-public-dns-a.google.com
Address:  8.8.8.8

Name:    yahoo.com
Addresses:  206.190.36.45
   98.139.183.24
   98.138.253.109

 

Pinging yahoo.com [206.190.36.45] with 32 bytes of data:

PING: transmit failed, error code 5.

PING: transmit failed, error code 5.

 

Ping statistics for 206.190.36.45:

    Packets: Sent = 2, Received = 0, Lost = 2 (100% loss),

 

Pinging 127.0.0.1 with 32 bytes of data:

PING: transmit failed, error code 5.

PING: transmit failed, error code 5.

 

Ping statistics for 127.0.0.1:

    Packets: Sent = 2, Received = 0, Lost = 2 (100% loss),

===========================================================================
Interface List
 11 ...00 1e 37 06 7e 3f ...... Bluetooth Device (Personal Area Network)
  9 ...00 1c bf 0e 1c 5b ...... Intel® PRO/Wireless 3945ABG Network Connection
  8 ...00 1b 24 c7 71 26 ...... Realtek RTL8168B/8111B Family PCI-E GBE NIC
  1 ........................... Software Loopback Interface 1
 18 ...00 00 00 00 00 00 00 e0  isatap.{EE9BEB3B-48A8-4928-84A4-79D90E8588F1}
 15 ...00 00 00 00 00 00 00 e0  isatap.designrule.local
 12 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
 17 ...00 00 00 00 00 00 00 e0  isatap.home
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0    192.168.1.254     192.168.1.76     25
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      192.168.1.0    255.255.255.0         On-link      192.168.1.76    281
     192.168.1.76  255.255.255.255         On-link      192.168.1.76    281
    192.168.1.255  255.255.255.255         On-link      192.168.1.76    281
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link      192.168.1.76    281
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link      192.168.1.76    281
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
 12     18 ::/0                     On-link
  1    306 ::1/128                  On-link
 12     18 2001::/32                On-link
 12    266 2001:0:5ef5:79fd:34ec:34b6:3f57:feb3/128
                                    On-link
 12    266 fe80::/64                On-link
 12    266 fe80::34ec:34b6:3f57:feb3/128
                                    On-link
  1    306 ff00::/8                 On-link
 12    266 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\system32\NLAapi.dll [48128] (Microsoft Corporation)
Catalog5 02 C:\Windows\system32\napinsp.dll [50176] (Microsoft Corporation)
Catalog5 03 C:\Windows\system32\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 04 C:\Windows\system32\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 05 C:\Windows\System32\mswsock.dll [223232] (Microsoft Corporation)
Catalog5 06 C:\Windows\System32\winrnr.dll [19968] (Microsoft Corporation)
Catalog5 07 C:\Windows\system32\wshbth.dll [34304] (Microsoft Corporation)
Catalog5 08 C:\Program Files\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Catalog9 01 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 04 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 05 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 06 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 14 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 15 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 16 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 17 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 18 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 19 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 20 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 21 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 22 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 23 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 24 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 25 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 26 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 27 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 28 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 29 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 30 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 31 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (02/10/2013 04:51:42 PM) (Source: PostgreSQL) (User: )
Description: 2013-02-10 16:51:42 GMT FATAL:  bogus data in lock file "postmaster.pid": ""

Error: (02/10/2013 04:51:41 PM) (Source: PostgreSQL) (User: )
Description: 2013-02-10 16:51:41 FATAL:  bogus data in lock file "postmaster.pid": ""

Error: (02/07/2013 09:21:15 PM) (Source: PostgreSQL) (User: )
Description: 2013-02-07 21:21:15 GMT FATAL:  bogus data in lock file "postmaster.pid": ""

Error: (02/07/2013 09:20:52 PM) (Source: PostgreSQL) (User: )
Description: 2013-02-07 21:20:52 FATAL:  bogus data in lock file "postmaster.pid": ""

Error: (02/07/2013 07:07:07 PM) (Source: PostgreSQL) (User: )
Description: 2013-02-07 19:07:07 GMT FATAL:  bogus data in lock file "postmaster.pid": ""

Error: (02/07/2013 07:07:00 PM) (Source: PostgreSQL) (User: )
Description: 2013-02-07 19:07:00 FATAL:  bogus data in lock file "postmaster.pid": ""

Error: (02/06/2013 11:39:07 PM) (Source: Application Hang) (User: )
Description: The program TFC.exe version 3.1.9.0 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Problem Reports and Solutions control panel.
Process ID: 13c
Start Time: 01ce04b7f7b1355c
Termination Time: 3


System errors:
=============
Error: (02/10/2013 05:00:09 PM) (Source: DCOM) (User: STEVESHP-LAPTOP)
Description: application-specificLocalActivation{8BC3F05E-D86B-11D0-A075-00C04FB68820}STEVESHP-LAPTOPStephenS-1-5-21-4194727010-2999493683-235306716-1000LocalHost (Using LRPC)

Error: (02/10/2013 04:54:52 PM) (Source: Service Control Manager) (User: )
Description: AVGIDSEH

Error: (02/10/2013 04:53:32 PM) (Source: Service Control Manager) (User: )
Description: CyberLink Task Scheduler (CTS)CyberLink Background Capture Service (CBCS)%%1070

Error: (02/10/2013 04:53:11 PM) (Source: Service Control Manager) (User: )
Description: CyberLink Background Capture Service (CBCS)

Error: (02/10/2013 04:52:45 PM) (Source: Service Control Manager) (User: )
Description: ScRegSetValueExWFailureActions%%5

Error: (02/10/2013 04:52:45 PM) (Source: Service Control Manager) (User: )
Description: ScRegSetValueExWFailureActions%%5

Error: (02/10/2013 04:52:45 PM) (Source: Service Control Manager) (User: )
Description: Parallel port driver%%1058

Error: (02/07/2013 09:35:17 PM) (Source: Service Control Manager) (User: )
Description: ScRegSetValueExWFailureActions%%5

Error: (02/07/2013 09:24:37 PM) (Source: Service Control Manager) (User: )
Description: AVGIDSEH

Error: (02/07/2013 09:24:20 PM) (Source: Service Control Manager) (User: )
Description: CyberLink Task Scheduler (CTS)CyberLink Background Capture Service (CBCS)%%1070


Microsoft Office Sessions:
=========================

=========================== Installed Programs ============================


========================= Devices: ================================

Could not list devices.

========================= Memory info: ===================================

Percentage of memory in use: 51%
Total physical RAM: 2045.68 MB
Available physical RAM: 1001.34 MB
Total Pagefile: 4338.38 MB
Available Pagefile: 3045.24 MB
Total Virtual: 2047.88 MB
Available Virtual: 1947.88 MB

========================= Partitions: =====================================

1 Drive c: (OS) (Fixed) (Total:225.36 GB) (Free:130.22 GB) NTFS
2 Drive d: (DATA) (Fixed) (Total:232.88 GB) (Free:27.38 GB) NTFS
3 Drive e: (HP_RECOVERY) (Fixed) (Total:7.52 GB) (Free:2.24 GB) NTFS

========================= Users: ========================================

**** End of log ****



#4 Stephen W

Stephen W
  • Topic Starter

  • Members
  • 210 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, UK
  • Local time:10:39 AM

Posted 10 February 2013 - 12:16 PM

I'm not sure what is going on with adware cleaner. It said it needs to reboot to remove files but then does not reboot. If I reboot manually it does not give me the adware cleaner log so I suspect it still does not finish running. Any ideas?



#5 Stephen W

Stephen W
  • Topic Starter

  • Members
  • 210 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, UK
  • Local time:10:39 AM

Posted 10 February 2013 - 12:30 PM

Hmm - something odd here - JRT wont run - its comes up with 7-Zip: Internal error, code 105

 

Also, after I tried running adware cleaner and then rebooted, I got an adobe installer come up - I OK'd it to download and install an update, but I noticed when it appeared to be downloading, my Wireless connection had not yet turned to the connected symbol. Do you think thats anything of concern?



#6 InadequateInfirmity

InadequateInfirmity

    I Gots Me A Certified Edumication


  • Banned
  • 5,180 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:39 AM

Posted 10 February 2013 - 12:48 PM

For now skip those two and run the Emisoft kit.

 

Also see below.

 

Download tdss killer

http://support.kaspersky.com/downloads/utils/tdsskiller.exe


Right Click it Run As Admin . Click on Change parameters Select TDLFS file system

Hit the Scan button Post the LOG In your next reply

Do not change the default options on scan results



Update and do a quick scan with Malwarebytes remove all that it finds and reboot.
http://www.filehippo.com/download_malwarebytes_anti_malware/download/ecf14848530d11a2f09a94b92a69fcfa/

Post the log here,


Update do a quick scan with Superantispyware remove all this finds reboot.
http://www.superantispyware.com/downloadfile.html?productid=SUPERANTISPYWAREFREE
post the log here.




Run a scan with Eset. You will need to disable your antivirus during this scan.
http://www.eset.com/us/online-scanner/
Make sure remove found threats and scan archives is checked.
When the scan finish list found threats save to clipboard copy to notepad Post the log here.



#7 InadequateInfirmity

InadequateInfirmity

    I Gots Me A Certified Edumication


  • Banned
  • 5,180 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:39 AM

Posted 10 February 2013 - 12:49 PM

You also forgot to tick installed programs with the minitool box please re-run MTB and tick installed programs post the log.



#8 Stephen W

Stephen W
  • Topic Starter

  • Members
  • 210 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, UK
  • Local time:10:39 AM

Posted 10 February 2013 - 01:30 PM

OK - I deleted JRT and re-downloaded it, then it ran OK - here is the log:

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 4.6.2 (02.02.2013:2)
OS: Windows Vista ™ Home Premium x86
Ran by Stephen on 10/02/2013 at 17:51:43.68
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 


~~~ Services

 

~~~ Registry Values

 

~~~ Registry Keys

 

~~~ Files

 

~~~ Folders

 

~~~ Event Viewer Logs were cleared

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 10/02/2013 at 18:04:05.75
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



#9 Stephen W

Stephen W
  • Topic Starter

  • Members
  • 210 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, UK
  • Local time:10:39 AM

Posted 10 February 2013 - 01:34 PM

You also forgot to tick installed programs with the minitool box please re-run MTB and tick installed programs post the log.

 

Thats odd too - I was sure that I ticked installed programs but ran it again just in case. The result was the same - it had the installed programs header in the log but nothing below it...



#10 Stephen W

Stephen W
  • Topic Starter

  • Members
  • 210 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, UK
  • Local time:10:39 AM

Posted 10 February 2013 - 02:20 PM

Bit concerned there is something more wrong with my machine now as I have another problem.

 

When running TDSS killer, it comes up with a warning: Can't initialize log, then: Can't load driver.

It does however scan and finds no threats. The log/report is empty.



#11 Stephen W

Stephen W
  • Topic Starter

  • Members
  • 210 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, UK
  • Local time:10:39 AM

Posted 10 February 2013 - 04:29 PM

Here is the MBAM log:

 

Malwarebytes Anti-Malware (PRO) 1.70.0.1100
www.malwarebytes.org

Database version: v2013.02.10.07

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
Stephen :: STEVESHP-LAPTOP [administrator]

Protection: Enabled

10/02/2013 19:41:13
mbam-log-2013-02-10 (19-41-13).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 272070
Time elapsed: 1 hour(s), 46 minute(s), 58 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)



#12 Stephen W

Stephen W
  • Topic Starter

  • Members
  • 210 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, UK
  • Local time:10:39 AM

Posted 10 February 2013 - 04:36 PM

I noticed something a bit strange. Whilst Emsisoft Energency Kit was scanning it took a long while scanning files in a Temporary Internet Files folder with 'C:\Users\Stephen\Local Settings'. If I try to access the Local Settings folder it won't let me do so. It says Access Denied.

The thing is, my Temporary Internet Files are set to be stored in C:\Users\Stephen\AppData\Local\Microsoft\Windows.......



#13 Stephen W

Stephen W
  • Topic Starter

  • Members
  • 210 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, UK
  • Local time:10:39 AM

Posted 10 February 2013 - 06:26 PM

Emisoft kit found nothing



#14 Stephen W

Stephen W
  • Topic Starter

  • Members
  • 210 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, UK
  • Local time:10:39 AM

Posted 10 February 2013 - 06:36 PM

Here is the Super Antispyware log:

 

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/10/2013 at 11:35 PM

Application Version : 5.6.1014

Core Rules Database Version : 9991
Trace Rules Database Version: 7803

Scan type       : Quick Scan
Total Scan Time : 00:07:32

Operating System Information
Windows Vista Home Premium 32-bit, Service Pack 2 (Build 6.00.6002)
UAC Off - Administrator

Memory items scanned      : 682
Memory threats detected   : 0
Registry items scanned    : 30810
Registry threats detected : 0
File items scanned        : 7473
File threats detected     : 117

Adware.Tracking Cookie
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\O02NVSTM.txt [ /ad.yieldmanager.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\ZCZF75N8.txt [ /invitemedia.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\ENJIOXM5.txt [ /media6degrees.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\6M6AXQN2.txt [ /adtech.de ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\0FY29UZE.txt [ /revsci.net ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\PMC0256O.txt [ /imrworldwide.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\TBOR7XBP.txt [ /doubleclick.net ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\XVYCXPIA.txt [ /serving-sys.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\TQ7N006W.txt [ /www.googleadservices.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\MSOKN7X3.txt [ /kontera.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\IDNAFZXX.txt [ /bs.serving-sys.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\ALGXVGCC.txt [ /ad.360yield.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\HQZB27ZU.txt [ /atdmt.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\UMY41R73.txt [ /ads.pubmatic.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\PY5PVBAR.txt [ /statcounter.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\EVKINPX1.txt [ /amazon-adsystem.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\P5S4VS80.txt [ /advertising.com ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\3325XMG3.txt [ /archant.122.2o7.net ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\FLZ9JOS9.txt [ /specificclick.net ]
 C:\Users\Stephen\AppData\Roaming\Microsoft\Windows\Cookies\GWJ19RMV.txt [ /casalemedia.com ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@adinterax[2].txt [ Cookie:guest@adinterax.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@tradedoubler[2].txt [ Cookie:guest@tradedoubler.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@nextag.co[2].txt [ Cookie:guest@nextag.co.uk/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@revsci[1].txt [ Cookie:guest@revsci.net/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@ad1.adfarm1.adition[2].txt [ Cookie:guest@ad1.adfarm1.adition.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@doubleclick[1].txt [ Cookie:guest@doubleclick.net/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@media6degrees[2].txt [ Cookie:guest@media6degrees.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@imrworldwide[2].txt [ Cookie:guest@imrworldwide.com/cgi-bin ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@tracking.dc-storm[1].txt [ Cookie:guest@tracking.dc-storm.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@e-2dj6wjny-1icjmb.stats.esomniture[1].txt [ Cookie:guest@e-2dj6wjny-1icjmb.stats.esomniture.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@invitemedia[2].txt [ Cookie:guest@invitemedia.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@tui.db.advertising[2].txt [ Cookie:guest@tui.db.advertising.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@clickfuse[2].txt [ Cookie:guest@clickfuse.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@lucidmedia[1].txt [ Cookie:guest@lucidmedia.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@nextag[1].txt [ Cookie:guest@nextag.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@content.yieldmanager[1].txt [ Cookie:guest@content.yieldmanager.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@e-2dj6wjk4ojazkfo.stats.esomniture[1].txt [ Cookie:guest@e-2dj6wjk4ojazkfo.stats.esomniture.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@www.burstnet[1].txt [ Cookie:guest@www.burstnet.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@pubmatic[1].txt [ Cookie:guest@pubmatic.com/AdServer/AdClickTrackerServlet/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@firstchoice.db.advertising[2].txt [ Cookie:guest@firstchoice.db.advertising.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@mediaplex[2].txt [ Cookie:guest@mediaplex.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@debenhams.122.2o7[1].txt [ Cookie:guest@debenhams.122.2o7.net/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@adbrite[2].txt [ Cookie:guest@adbrite.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@uk.at.atwola[1].txt [ Cookie:guest@uk.at.atwola.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@adfarm1.adition[2].txt [ Cookie:guest@adfarm1.adition.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@casalemedia[2].txt [ Cookie:guest@casalemedia.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@tribalfusion[2].txt [ Cookie:guest@tribalfusion.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@content.yieldmanager[3].txt [ Cookie:guest@content.yieldmanager.com/ak/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@overture[1].txt [ Cookie:guest@overture.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@questionmarket[1].txt [ Cookie:guest@questionmarket.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@adserver.adtechus[1].txt [ Cookie:guest@adserver.adtechus.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@ru4[1].txt [ Cookie:guest@ru4.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@bs.serving-sys[1].txt [ Cookie:guest@bs.serving-sys.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@www.googleadservices[1].txt [ Cookie:guest@www.googleadservices.com/pagead/conversion/1069448525/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@mediabrandsww[1].txt [ Cookie:guest@mediabrandsww.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@at.atwola[2].txt [ Cookie:guest@at.atwola.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@advertising[2].txt [ Cookie:guest@advertising.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@adtech[1].txt [ Cookie:guest@adtech.de/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@in.getclicky[1].txt [ Cookie:guest@in.getclicky.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@adviva[1].txt [ Cookie:guest@adviva.net/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@www4.smartadserver[2].txt [ Cookie:guest@www4.smartadserver.com/ ]
 C:\USERS\GUEST\AppData\Roaming\Microsoft\Windows\Cookies\guest@tacoda.at.atwola[1].txt [ Cookie:guest@tacoda.at.atwola.com/ ]
 C:\USERS\GUEST\Cookies\guest@adinterax[2].txt [ Cookie:guest@adinterax.com/ ]
 C:\USERS\GUEST\Cookies\guest@tradedoubler[2].txt [ Cookie:guest@tradedoubler.com/ ]
 C:\USERS\GUEST\Cookies\guest@nextag.co[2].txt [ Cookie:guest@nextag.co.uk/ ]
 C:\USERS\GUEST\Cookies\guest@revsci[1].txt [ Cookie:guest@revsci.net/ ]
 C:\USERS\GUEST\Cookies\guest@ad1.adfarm1.adition[2].txt [ Cookie:guest@ad1.adfarm1.adition.com/ ]
 C:\USERS\GUEST\Cookies\guest@doubleclick[1].txt [ Cookie:guest@doubleclick.net/ ]
 C:\USERS\GUEST\Cookies\guest@media6degrees[2].txt [ Cookie:guest@media6degrees.com/ ]
 C:\USERS\GUEST\Cookies\guest@imrworldwide[2].txt [ Cookie:guest@imrworldwide.com/cgi-bin ]
 C:\USERS\GUEST\Cookies\guest@tracking.dc-storm[1].txt [ Cookie:guest@tracking.dc-storm.com/ ]
 C:\USERS\GUEST\Cookies\guest@e-2dj6wjny-1icjmb.stats.esomniture[1].txt [ Cookie:guest@e-2dj6wjny-1icjmb.stats.esomniture.com/ ]
 C:\USERS\GUEST\Cookies\guest@invitemedia[2].txt [ Cookie:guest@invitemedia.com/ ]
 C:\USERS\GUEST\Cookies\guest@tui.db.advertising[2].txt [ Cookie:guest@tui.db.advertising.com/ ]
 C:\USERS\GUEST\Cookies\guest@clickfuse[2].txt [ Cookie:guest@clickfuse.com/ ]
 C:\USERS\GUEST\Cookies\guest@lucidmedia[1].txt [ Cookie:guest@lucidmedia.com/ ]
 C:\USERS\GUEST\Cookies\guest@nextag[1].txt [ Cookie:guest@nextag.com/ ]
 C:\USERS\GUEST\Cookies\guest@content.yieldmanager[1].txt [ Cookie:guest@content.yieldmanager.com/ ]
 C:\USERS\GUEST\Cookies\guest@e-2dj6wjk4ojazkfo.stats.esomniture[1].txt [ Cookie:guest@e-2dj6wjk4ojazkfo.stats.esomniture.com/ ]
 C:\USERS\GUEST\Cookies\guest@www.burstnet[1].txt [ Cookie:guest@www.burstnet.com/ ]
 C:\USERS\GUEST\Cookies\guest@pubmatic[1].txt [ Cookie:guest@pubmatic.com/AdServer/AdClickTrackerServlet/ ]
 C:\USERS\GUEST\Cookies\guest@firstchoice.db.advertising[2].txt [ Cookie:guest@firstchoice.db.advertising.com/ ]
 C:\USERS\GUEST\Cookies\guest@mediaplex[2].txt [ Cookie:guest@mediaplex.com/ ]
 C:\USERS\GUEST\Cookies\guest@debenhams.122.2o7[1].txt [ Cookie:guest@debenhams.122.2o7.net/ ]
 C:\USERS\GUEST\Cookies\guest@adbrite[2].txt [ Cookie:guest@adbrite.com/ ]
 C:\USERS\GUEST\Cookies\guest@uk.at.atwola[1].txt [ Cookie:guest@uk.at.atwola.com/ ]
 C:\USERS\GUEST\Cookies\guest@adfarm1.adition[2].txt [ Cookie:guest@adfarm1.adition.com/ ]
 C:\USERS\GUEST\Cookies\guest@casalemedia[2].txt [ Cookie:guest@casalemedia.com/ ]
 C:\USERS\GUEST\Cookies\guest@tribalfusion[2].txt [ Cookie:guest@tribalfusion.com/ ]
 C:\USERS\GUEST\Cookies\guest@content.yieldmanager[3].txt [ Cookie:guest@content.yieldmanager.com/ak/ ]
 C:\USERS\GUEST\Cookies\guest@overture[1].txt [ Cookie:guest@overture.com/ ]
 C:\USERS\GUEST\Cookies\guest@questionmarket[1].txt [ Cookie:guest@questionmarket.com/ ]
 C:\USERS\GUEST\Cookies\guest@adserver.adtechus[1].txt [ Cookie:guest@adserver.adtechus.com/ ]
 C:\USERS\GUEST\Cookies\guest@ru4[1].txt [ Cookie:guest@ru4.com/ ]
 C:\USERS\GUEST\Cookies\guest@bs.serving-sys[1].txt [ Cookie:guest@bs.serving-sys.com/ ]
 C:\USERS\GUEST\Cookies\guest@www.googleadservices[1].txt [ Cookie:guest@www.googleadservices.com/pagead/conversion/1069448525/ ]
 C:\USERS\GUEST\Cookies\guest@mediabrandsww[1].txt [ Cookie:guest@mediabrandsww.com/ ]
 C:\USERS\GUEST\Cookies\guest@at.atwola[2].txt [ Cookie:guest@at.atwola.com/ ]
 C:\USERS\GUEST\Cookies\guest@advertising[2].txt [ Cookie:guest@advertising.com/ ]
 C:\USERS\GUEST\Cookies\guest@adtech[1].txt [ Cookie:guest@adtech.de/ ]
 C:\USERS\GUEST\Cookies\guest@in.getclicky[1].txt [ Cookie:guest@in.getclicky.com/ ]
 C:\USERS\GUEST\Cookies\guest@adviva[1].txt [ Cookie:guest@adviva.net/ ]
 C:\USERS\GUEST\Cookies\guest@www4.smartadserver[2].txt [ Cookie:guest@www4.smartadserver.com/ ]
 C:\USERS\GUEST\Cookies\guest@tacoda.at.atwola[1].txt [ Cookie:guest@tacoda.at.atwola.com/ ]
 C:\USERS\STEPHEN\Cookies\O02NVSTM.txt [ Cookie:stephen@ad.yieldmanager.com/ ]
 C:\USERS\STEPHEN\Cookies\ZCZF75N8.txt [ Cookie:stephen@invitemedia.com/ ]
 C:\USERS\STEPHEN\Cookies\ENJIOXM5.txt [ Cookie:stephen@media6degrees.com/ ]
 C:\USERS\STEPHEN\Cookies\6M6AXQN2.txt [ Cookie:stephen@adtech.de/ ]
 C:\USERS\STEPHEN\Cookies\0FY29UZE.txt [ Cookie:stephen@revsci.net/ ]
 C:\USERS\STEPHEN\Cookies\PMC0256O.txt [ Cookie:stephen@imrworldwide.com/cgi-bin ]
 C:\USERS\STEPHEN\Cookies\XVYCXPIA.txt [ Cookie:stephen@serving-sys.com/ ]
 C:\USERS\STEPHEN\Cookies\MSOKN7X3.txt [ Cookie:stephen@kontera.com/ ]
 C:\USERS\STEPHEN\Cookies\HQZB27ZU.txt [ Cookie:stephen@atdmt.com/ ]
 C:\USERS\STEPHEN\Cookies\PY5PVBAR.txt [ Cookie:stephen@statcounter.com/ ]
 C:\USERS\STEPHEN\Cookies\P5S4VS80.txt [ Cookie:stephen@advertising.com/ ]
 C:\USERS\STEPHEN\Cookies\3325XMG3.txt [ Cookie:stephen@archant.122.2o7.net/ ]
 C:\USERS\STEPHEN\Cookies\GWJ19RMV.txt [ Cookie:stephen@casalemedia.com/ ]



#15 InadequateInfirmity

InadequateInfirmity

    I Gots Me A Certified Edumication


  • Banned
  • 5,180 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:39 AM

Posted 11 February 2013 - 06:09 AM

How about the eset log ?






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users