Spybot doesn't find anything.
Spybot doesn't find anything.
Glad to hear
Still problems?
Microsoft MVP Consumer Security 2008-2011
Member of ASAP and UNITE since 2006
Nope! Thanks for having the patience to help impatient people like me!
Then let's clean a bit leftovers.
We need first to disable TeaTimer that it doesn't interfere with fixes. You can re-enable it when you're clean again:
1. Run Spybot-S&D in Advanced Mode.
2. If it is not already set to do this Go to the Mode menu select "Advanced Mode"
3. On the left hand side, Click on Tools
4. Then click on the Resident Icon in the List
5. Uncheck "Resident TeaTimer" and OK any prompts.
6. Restart your computer.
Open notepad and copy/paste the text in the codebox below into it:
Save this as "CFScript"Code:Registry:: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows] "AppInit_DLLS"="avgrsstx.dll"
Then drag the CFScript into ComboFix.exe as you see in the screenshot below.
This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log.
Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.
Microsoft MVP Consumer Security 2008-2011
Member of ASAP and UNITE since 2006
After Combofix tried to reboot the computer for the first time, I got the blue screen that said failed to boot properly. I then selected Boot Normally (default), Combofix restarted itself and a message box saying Windows has recovered from an unexpected shutdown:
Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.0.6001.2.1.0.256.1
Locale ID: 1033
Additional information about the problem:
BCCode: 93
BCP1: 0000052C
BCP2: 00000000
BCP3: 00000000
BCP4: 00000000
OS Version: 6_0_6001
Service Pack: 1_0
Product: 256_1
Files that help describe the problem:
C:\Windows\Minidump\Mini120308-01.dmp
C:\Users\MySweetBunny\AppData\Local\Temp\WER-53539-0.sysdata.xml
C:\Users\MySweetBunny\AppData\Local\Temp\WER45C6.tmp.version.txt
--------------------------------------------------------------------------
It still managed to make a log:
ComboFix 08-12-01.03 - MySweetBunny 2008-12-03 6:28:38.2 - NTFSx86
Microsoft® Windows Vista™ Ultimate 6.0.6001.1.1252.1.1033.18.1409 [GMT -6:00]
Running from: c:\users\MySweetBunny\Desktop\ComboFix.exe
Command switches used :: c:\users\MySweetBunny\Desktop\CFScript.txt
* Created a new restore point
.
((((((((((((((((((((((((( Files Created from 2008-11-03 to 2008-12-03 )))))))))))))))))))))))))))))))
.
2008-11-30 10:54 . 2008-11-30 10:55 <DIR> d-------- C:\rsit
2008-11-29 21:56 . 2008-11-29 21:56 <DIR> d-------- c:\users\MySweetBunny\AppData\Roaming\Malwarebytes
2008-11-29 21:56 . 2008-11-29 21:56 <DIR> d-------- c:\users\All Users\Malwarebytes
2008-11-29 21:56 . 2008-11-29 21:56 <DIR> d-------- c:\programdata\Malwarebytes
2008-11-29 21:56 . 2008-11-29 21:56 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
2008-11-29 21:56 . 2008-10-22 16:10 38,496 --a------ c:\windows\System32\drivers\mbamswissarmy.sys
2008-11-29 21:56 . 2008-10-22 16:10 15,504 --a------ c:\windows\System32\drivers\mbam.sys
2008-11-27 07:10 . 2008-10-20 23:25 1,645,568 --a------ c:\windows\System32\connect.dll
2008-11-27 07:10 . 2008-08-27 21:40 712,704 --a------ c:\windows\System32\WindowsCodecs.dll
2008-11-27 07:10 . 2008-08-27 21:40 425,472 --a------ c:\windows\System32\PhotoMetadataHandler.dll
2008-11-27 07:10 . 2008-08-27 21:40 347,136 --a------ c:\windows\System32\WindowsCodecsExt.dll
2008-11-27 07:10 . 2008-10-21 21:57 241,152 --a------ c:\windows\System32\PortableDeviceApi.dll
2008-11-26 08:26 . 2008-11-26 08:26 <DIR> d-------- c:\program files\Trend Micro
2008-11-24 23:57 . 2008-11-27 13:03 <DIR> d--h----- C:\$AVG8.VAULT$
2008-11-17 14:05 . 2008-10-16 15:13 1,809,944 --a------ c:\windows\System32\wuaueng.dll
2008-11-17 14:05 . 2008-10-16 14:56 1,524,736 --a------ c:\windows\System32\wucltux.dll
2008-11-17 14:05 . 2008-10-16 15:12 561,688 --a------ c:\windows\System32\wuapi.dll
2008-11-17 14:05 . 2008-10-16 14:08 162,064 --a------ c:\windows\System32\wuwebv.dll
2008-11-17 14:05 . 2008-10-16 14:55 83,456 --a------ c:\windows\System32\wudriver.dll
2008-11-17 14:05 . 2008-10-16 15:09 51,224 --a------ c:\windows\System32\wuauclt.exe
2008-11-17 14:05 . 2008-10-16 15:09 43,544 --a------ c:\windows\System32\wups2.dll
2008-11-17 14:05 . 2008-10-16 15:08 34,328 --a------ c:\windows\System32\wups.dll
2008-11-17 14:05 . 2008-10-16 13:56 31,232 --a------ c:\windows\System32\wuapp.exe
2008-11-13 19:52 . 2008-11-13 19:52 192 --a------ c:\windows\cdplayer.ini
2008-11-13 07:28 . 2008-12-03 06:34 32,536 --a------ c:\users\All Users\nvModes.dat
2008-11-13 07:28 . 2008-12-03 06:34 32,536 --a------ c:\programdata\nvModes.dat
2008-11-11 15:24 . 2008-09-09 21:40 1,334,272 --a------ c:\windows\System32\msxml6.dll
2008-11-11 15:24 . 2008-09-04 23:14 1,191,936 --a------ c:\windows\System32\msxml3.dll
2008-11-11 15:24 . 2008-08-26 19:05 212,480 --a------ c:\windows\System32\drivers\mrxsmb10.sys
2008-11-06 19:51 . 2008-11-06 19:51 <DIR> d-------- C:\PFiles
2008-11-03 01:02 . 2008-12-03 06:23 <DIR> d-------- c:\windows\System32\drivers\Avg
2008-11-03 01:02 . 2008-11-03 01:02 97,928 --a------ c:\windows\System32\drivers\avgldx86.sys
2008-11-03 01:02 . 2008-11-03 01:02 69,128 --a------ c:\windows\System32\drivers\avgwfpx.sys
2008-11-03 01:02 . 2008-11-03 01:02 10,520 --a------ c:\windows\System32\avgrsstx.dll
2008-11-03 01:01 . 2008-11-03 01:01 <DIR> d-------- c:\program files\AVG
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-11-30 15:58 --------- d-----w c:\program files\Eusing Free Registry Cleaner
2008-11-23 02:37 --------- d-----w c:\program files\Spybot - Search & Destroy
2008-11-19 14:16 --------- d-----w c:\users\MySweetBunny\AppData\Roaming\SPORE
2008-11-16 12:34 --------- d-----w c:\programdata\NVIDIA
2008-11-15 14:43 --------- d-----w c:\program files\DivX
2008-11-15 12:30 --------- d-----w c:\program files\Rhapsody
2008-11-13 13:30 --------- d-----w c:\program files\Common Files\Wise Installation Wizard
2008-11-13 13:30 --------- d-----w c:\program files\AGEIA Technologies
2008-11-11 23:00 --------- d--h--w c:\program files\InstallShield Installation Information
2008-11-03 07:01 --------- d-----w c:\programdata\avg8
2008-11-03 03:31 --------- d-----w c:\program files\CONEXANT
2008-11-03 03:28 --------- d-----w c:\programdata\Ulead Systems
2008-11-03 03:28 --------- d-----w c:\program files\InterVideo
2008-11-03 03:28 --------- d-----w c:\program files\Common Files\Ulead Systems
2008-11-03 03:19 --------- d-----w c:\program files\Toshiba
2008-11-03 03:15 --------- d-----w c:\program files\Windows Live
2008-11-03 00:49 --------- d-----w c:\program files\Microsoft Works
2008-11-03 00:42 --------- d-----w c:\program files\Common Files\logishrd
2008-11-03 00:41 --------- d-----w c:\programdata\Logishrd
2008-11-03 00:34 --------- d-----w c:\programdata\Microsoft Help
2008-10-22 18:42 7,610,144 ----a-w c:\windows\system32\drivers\nvlddmkm.sys
2008-10-22 18:42 4,160 ----a-w c:\windows\system32\drivers\nvBridge.kmd
2008-10-21 13:01 --------- d-----w c:\programdata\SecTaskMan
2008-10-20 22:00 57,688 ----a-w c:\users\MySweetBunny\AppData\Roaming\nvModes.dat
2008-10-20 12:43 --------- d-----w c:\program files\Microsoft Games
2008-10-19 21:20 --------- d-----w c:\users\MySweetBunny\AppData\Roaming\Uniblue
2008-10-16 08:10 --------- d-----w c:\program files\Windows Mail
2008-10-13 16:35 --------- d-----w c:\program files\CycloDSEvolution Tools
2008-10-12 11:26 --------- d-----w c:\program files\RogueSynapse
2008-10-10 01:38 --------- d-----w c:\program files\Yahoo!
2008-06-18 19:15 174 --sha-w c:\program files\desktop.ini
2007-05-12 23:20 262,144 ----a-w c:\programdata\ntuser.dat
2008-08-26 20:49 2,713 --sh--w c:\windows\System32\barijatu.exe
.
((((((((((((((((((((((((((((( snapshot@2008-11-27_ 7.07.01.49 )))))))))))))))))))))))))))))))))))))))))
.
- 2008-11-27 13:03:03 1,572,864 --sha-w c:\windows\ServiceProfiles\LocalService\ntuser.dat
+ 2008-12-03 12:34:28 1,572,864 --sha-w c:\windows\ServiceProfiles\LocalService\ntuser.dat
- 2008-11-27 13:03:03 1,572,864 --sha-w c:\windows\ServiceProfiles\NetworkService\ntuser.dat
+ 2008-12-03 12:34:28 1,572,864 --sha-w c:\windows\ServiceProfiles\NetworkService\ntuser.dat
- 2008-11-27 11:50:24 16,384 --sha-w c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
+ 2008-11-28 09:00:24 16,384 --sha-w c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- 2008-11-27 11:50:24 32,768 --sha-w c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
+ 2008-11-28 09:00:24 32,768 --sha-w c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
- 2008-11-27 11:50:24 32,768 --sha-w c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
+ 2008-11-28 09:00:24 32,768 --sha-w c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
- 2008-11-27 12:58:05 262,144 ----a-w c:\windows\System32\config\systemprofile\ntuser.dat
+ 2008-12-03 12:28:19 262,144 ----a-w c:\windows\System32\config\systemprofile\ntuser.dat
+ 2008-10-05 03:16:26 235,936 ----a-r c:\windows\System32\Macromed\Flash\FlashUtil10a.exe
- 2008-09-07 10:05:05 74,649 ----a-w c:\windows\System32\Macromed\Flash\uninstall_activeX.exe
+ 2008-12-02 13:04:43 88,590 ----a-w c:\windows\System32\Macromed\Flash\uninstall_activeX.exe
- 2008-11-27 12:47:56 101,350 ----a-w c:\windows\System32\perfc009.dat
+ 2008-12-03 12:26:51 101,350 ----a-w c:\windows\System32\perfc009.dat
- 2008-11-27 12:47:57 595,684 ----a-w c:\windows\System32\perfh009.dat
+ 2008-12-03 12:26:51 595,684 ----a-w c:\windows\System32\perfh009.dat
- 2008-11-24 17:41:24 6,553,600 ----a-w c:\windows\System32\SMI\Store\Machine\schema.dat
+ 2008-11-28 09:06:38 6,553,600 ----a-w c:\windows\System32\SMI\Store\Machine\schema.dat
- 2008-11-27 12:43:37 15,178 ----a-w c:\windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-522854213-1344089828-1915909241-1000_UserData.bin
+ 2008-12-03 12:23:39 15,698 ----a-w c:\windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-522854213-1344089828-1915909241-1000_UserData.bin
- 2008-11-27 12:43:37 66,738 ----a-w c:\windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin
+ 2008-12-03 12:23:39 66,856 ----a-w c:\windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin
- 2008-11-26 14:20:45 68,140 ----a-w c:\windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin
+ 2008-12-03 12:23:37 68,488 ----a-w c:\windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin
- 2008-11-17 20:06:06 159,320,031 ----a-w c:\windows\winsxs\ManifestCache\6.0.6001.18000_001c50b5_blobs.bin
+ 2008-11-27 13:10:02 161,979,562 ----a-w c:\windows\winsxs\ManifestCache\6.0.6001.18000_001c50b5_blobs.bin
+ 2008-10-21 05:16:20 1,645,568 ----a-w c:\windows\winsxs\x86_microsoft-windows-getconnectedwizards_31bf3856ad364e35_6.0.6000.16766_none_62ed735b99bf2599\connect.dll
+ 2008-10-21 05:06:53 1,645,568 ----a-w c:\windows\winsxs\x86_microsoft-windows-getconnectedwizards_31bf3856ad364e35_6.0.6000.20940_none_6386b028b2d1f29e\connect.dll
+ 2008-10-21 05:25:17 1,645,568 ----a-w c:\windows\winsxs\x86_microsoft-windows-getconnectedwizards_31bf3856ad364e35_6.0.6001.18159_none_64e182cb96dae69e\connect.dll
+ 2008-10-21 05:21:42 1,645,568 ----a-w c:\windows\winsxs\x86_microsoft-windows-getconnectedwizards_31bf3856ad364e35_6.0.6001.22291_none_6537dd96b0202b74\connect.dll
+ 2008-08-28 03:24:50 425,472 ----a-w c:\windows\winsxs\x86_microsoft-windows-photometadatahandler_31bf3856ad364e35_6.0.6000.16740_none_c85de4f0e87e1001\PhotoMetadataHandler.dll
+ 2008-08-28 03:21:23 425,472 ----a-w c:\windows\winsxs\x86_microsoft-windows-photometadatahandler_31bf3856ad364e35_6.0.6000.20905_none_c917c4c40176bbe1\PhotoMetadataHandler.dll
+ 2008-08-28 03:40:09 425,472 ----a-w c:\windows\winsxs\x86_microsoft-windows-photometadatahandler_31bf3856ad364e35_6.0.6001.18131_none_ca4ff3cce59b9e58\PhotoMetadataHandler.dll
+ 2008-08-28 03:37:44 425,472 ----a-w c:\windows\winsxs\x86_microsoft-windows-photometadatahandler_31bf3856ad364e35_6.0.6001.22253_none_cac5f153fec7a8b2\PhotoMetadataHandler.dll
+ 2008-08-28 03:24:51 712,192 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodec_31bf3856ad364e35_6.0.6000.16740_none_94703b0aa417f9f5\WindowsCodecs.dll
+ 2008-08-28 03:22:04 712,704 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodec_31bf3856ad364e35_6.0.6000.20905_none_952a1addbd10a5d5\WindowsCodecs.dll
+ 2008-08-28 03:40:11 712,704 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodec_31bf3856ad364e35_6.0.6001.18131_none_966249e6a135884c\WindowsCodecs.dll
+ 2008-08-28 03:37:46 712,704 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodec_31bf3856ad364e35_6.0.6001.22253_none_96d8476dba6192a6\WindowsCodecs.dll
+ 2008-08-28 03:24:51 347,136 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodecext_31bf3856ad364e35_6.0.6000.16740_none_91804ffcbb9f565c\WindowsCodecsExt.dll
+ 2008-08-28 03:22:04 347,648 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodecext_31bf3856ad364e35_6.0.6000.20905_none_923a2fcfd498023c\WindowsCodecsExt.dll
+ 2008-08-28 03:40:11 347,136 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodecext_31bf3856ad364e35_6.0.6001.18131_none_93725ed8b8bce4b3\WindowsCodecsExt.dll
+ 2008-08-28 03:37:46 347,648 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodecext_31bf3856ad364e35_6.0.6001.22253_none_93e85c5fd1e8ef0d\WindowsCodecsExt.dll
+ 2008-10-22 03:43:51 241,152 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.16767_none_48e0ac03ef0db56a\PortableDeviceApi.dll
+ 2008-10-22 03:43:51 95,232 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.16767_none_48e0ac03ef0db56a\PortableDeviceClassExtension.dll
+ 2008-10-22 03:43:51 160,768 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.16767_none_48e0ac03ef0db56a\PortableDeviceTypes.dll
+ 2008-10-22 03:39:42 241,152 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.20941_none_4979e8d10820826f\PortableDeviceApi.dll
+ 2008-10-22 03:39:42 95,232 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.20941_none_4979e8d10820826f\PortableDeviceClassExtension.dll
+ 2008-10-22 03:39:42 160,768 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.20941_none_4979e8d10820826f\PortableDeviceTypes.dll
+ 2008-10-22 03:57:30 241,152 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.18160_none_4abfe8a3ec3a94fa\PortableDeviceApi.dll
+ 2008-01-19 07:36:07 94,720 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.18160_none_4abfe8a3ec3a94fa\PortableDeviceClassExtension.dll
+ 2008-01-19 07:36:07 160,768 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.18160_none_4abfe8a3ec3a94fa\PortableDeviceTypes.dll
+ 2008-10-22 03:34:55 241,152 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.22292_none_4b2b163f056ebb45\PortableDeviceApi.dll
+ 2008-10-22 03:34:55 94,720 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.22292_none_4b2b163f056ebb45\PortableDeviceClassExtension.dll
+ 2008-10-22 03:34:55 160,768 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.22292_none_4b2b163f056ebb45\PortableDeviceTypes.dll
.
-- Snapshot reset to current date --
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\UEAFOverlay]
@="{F2F31467-B1AC-4df0-AE79-FD5FA085E22B}"
[HKEY_CLASSES_ROOT\CLSID\{F2F31467-B1AC-4df0-AE79-FD5FA085E22B}]
2006-12-03 18:03 2854912 --a------ c:\program files\Protector Suite QL\farchns.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\UEAFOverlayOpen]
@="{A3E208F7-0E3A-4182-A7A6-B169D5D691AA}"
[HKEY_CLASSES_ROOT\CLSID\{A3E208F7-0E3A-4182-A7A6-B169D5D691AA}]
2006-12-03 18:03 2854912 --a------ c:\program files\Protector Suite QL\farchns.dll
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"EA Core"="c:\program files\Electronic Arts\EADM\Core.exe" [2008-07-21 2752512]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2008-11-27 1261336]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-10-22 13675040]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-10-22 92704]
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"DisableCAD"= 1 (0x1)
"EnableUIADesktopToggle"= 0 (0x0)
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\psfus]
2006-12-03 17:50 90112 c:\windows\System32\psqlpwd.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=avgrsstx.dll
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Notification Packages REG_MULTI_SZ scecli psqlpwd
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
backup=c:\windows\pss\Adobe Reader Speed Launch.lnk.CommonStartup
backupExtension=.CommonStartup
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^ymetray.lnk]
backup=c:\windows\pss\ymetray.lnk.CommonStartup
backupExtension=.CommonStartup
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\00TCrdMain]
--a------ 2006-12-15 17:59 530552 c:\program files\Toshiba\FlashCards\TCrdMain.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HSON]
--a------ 2006-12-07 18:49 55416 c:\program files\Toshiba\TBS\HSON.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PINGER]
--a------ 2006-07-20 14:45 151552 c:\toshiba\IVP\ISM\pinger.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SmoothView]
--a------ 2006-12-11 19:45 448632 c:\program files\Toshiba\SmoothView\SmoothView.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TPwrMain]
--a------ 2006-12-20 01:16 411768 c:\program files\Toshiba\Power Saver\TPwrMain.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\updateMgr]
-ra------ 2006-03-30 15:45 313472 c:\program files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Windows Defender]
--a------ 2008-01-19 01:38 1008184 c:\program files\Windows Defender\MSASCui.exe
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"UpdatesDisableNotify"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
"AntiSpywareOverride"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-522854213-1344089828-1915909241-1000]
"EnableNotificationsRef"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
"{24433AC1-4A33-4813-95CD-5E93ACE2457C}"= UDP:c:\program files\Common Files\McAfee\MNA\McNASvc.exe:McAfee Network Agent
"{4C376BCA-BDCF-46A9-AA0E-D5FEAFFC6A3B}"= UDP:c:\program files\Yahoo!\Yahoo! Music Jukebox\YahooMusicEngine.exe:Yahoo! Music Jukebox
"{06B53753-3FEE-44AD-A1DF-9A77DCDC9FBE}"= TCP:c:\program files\Yahoo!\Yahoo! Music Jukebox\YahooMusicEngine.exe:Yahoo! Music Jukebox
"{834D088C-B39E-4191-8CEB-5B9AEEDD716A}"= UDP:c:\program files\Microsoft Office\Office12\ONENOTE.EXE:Microsoft Office OneNote
"{9B3BAC9F-1CEA-43C4-97A8-9EE86F9F5D7F}"= TCP:c:\program files\Microsoft Office\Office12\ONENOTE.EXE:Microsoft Office OneNote
"TCP Query User{215A4379-103F-4718-A62C-CC24EC976F94}c:\\program files\\warcraft iii\\war3.exe"= UDP:c:\program files\warcraft iii\war3.exe:Warcraft III
"UDP Query User{1094E7CB-7547-44F0-8321-2AB93BBAF4E0}c:\\program files\\warcraft iii\\war3.exe"= TCP:c:\program files\warcraft iii\war3.exe:Warcraft III
"{EDDE538C-CB7E-46BD-B2A2-3F104892FDD0}"= UDP:c:\program files\Warcraft III\Warcraft III.exe:Warcraft III
"{BBB64935-7997-4206-941A-3FB63D6C2F0D}"= TCP:c:\program files\Warcraft III\Warcraft III.exe:Warcraft III
"{51497833-D061-4DE5-8F5D-CFE72B7481B8}"= UDP:c:\program files\Warcraft III\Frozen Throne.exe:Warcraft III - The Frozen Throne
"{41E3449C-5415-4CDB-8CF8-46E72AF4CD73}"= TCP:c:\program files\Warcraft III\Frozen Throne.exe:Warcraft III - The Frozen Throne
"{385D3138-883D-46A1-870D-062310DE70E4}"= UDP:c:\program files\Common Files\AOL\Loader\aolload.exe:AOL Loader
"{BD5FD5A2-CE32-4F5B-A820-0CA9A2428E74}"= TCP:c:\program files\Common Files\AOL\Loader\aolload.exe:AOL Loader
"TCP Query User{D45DCB1E-954A-4E05-91E1-54466C89027D}c:\\program files\\internet explorer\\iexplore.exe"= UDP:c:\program files\internet explorer\iexplore.exe:Internet Explorer
"UDP Query User{CB203017-6857-4924-A4CF-1936BBEDA04F}c:\\program files\\internet explorer\\iexplore.exe"= TCP:c:\program files\internet explorer\iexplore.exe:Internet Explorer
"{1044FF6C-0566-4364-9EAD-B4FE5AD1C0B1}"= UDP:c:\users\Public\World of Warcraft\WoW-2.2.0.7272-to-2.2.2.7318-enUS-downloader.exe:Blizzard Downloader
"{8AFDEBFF-72F0-449E-AC43-9F71357B5CA4}"= TCP:c:\users\Public\World of Warcraft\WoW-2.2.0.7272-to-2.2.2.7318-enUS-downloader.exe:Blizzard Downloader
"TCP Query User{09A750E8-0CD5-4BCD-B46F-AB70D3243FF9}c:\\program files\\microsoft games\\dungeon siege\\dungeonsiege.exe"= UDP:c:\program files\microsoft games\dungeon siege\dungeonsiege.exe:Dungeon Siege Game Executable
"UDP Query User{22C50DBA-6BCD-4B2F-9BD3-A1D138C25B84}c:\\program files\\microsoft games\\dungeon siege\\dungeonsiege.exe"= TCP:c:\program files\microsoft games\dungeon siege\dungeonsiege.exe:Dungeon Siege Game Executable
"{D66E58B8-D0AB-4A81-836F-371959BA4E36}"= UDP:c:\users\Public\World of Warcraft\BackgroundDownloader.exe:Blizzard Downloader
"{2F0D43A7-2BCE-4BB0-9548-A9A89D75628B}"= TCP:c:\users\Public\World of Warcraft\BackgroundDownloader.exe:Blizzard Downloader
"{BA80ABFE-C0C5-4998-AE8D-5B37198C6616}"= UDP:3724:Blizzard Downloader: 3724
"{5C847171-3D8E-498C-8C30-6F9466B35312}"= c:\program files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone)
"{915DA043-1705-4430-8206-DAF14654519A}"= UDP:c:\program files\Unreal Tournament 3\Binaries\UT3.exe:Unreal Tournament 3
"{023115A5-35E0-4717-BF80-8295669B4BB6}"= TCP:c:\program files\Unreal Tournament 3\Binaries\UT3.exe:Unreal Tournament 3
"{CEDB1986-6431-4F1E-BCDE-6B4B689E75C2}"= UDP:c:\program files\Diablo II\Diablo II.exe:Diablo II - Lord of Destruction
"{EC48C02A-0DFA-4340-9EDA-992B5F1415F7}"= TCP:c:\program files\Diablo II\Diablo II.exe:Diablo II - Lord of Destruction
"{FEEA2694-E6A8-4982-ACF8-FF5DB3919AB9}"= c:\program files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone)
"TCP Query User{2A8E0A2D-3112-4090-95E6-3AF552173AE8}c:\\program files\\electronic arts\\eadm\\core.exe"= UDP:c:\program files\electronic arts\eadm\core.exe:EA Download Manager
"UDP Query User{DB2C6395-07E1-414E-BA32-B05996098362}c:\\program files\\electronic arts\\eadm\\core.exe"= TCP:c:\program files\electronic arts\eadm\core.exe:EA Download Manager
"{BC051E9C-7A05-435E-ACE4-3E0E771A3235}"= UDP:c:\program files\Diablo II\Diablo II.exe:Diablo II - Lord of Destruction
"{909E6A5E-2403-4963-9E2D-DB1E2FBD87ED}"= TCP:c:\program files\Diablo II\Diablo II.exe:Diablo II - Lord of Destruction
"{10DF9718-7B7B-4AB0-9D18-18C34F5C73B0}"= c:\program files\AVG\AVG8\avgemc.exe:avgemc.exe
"{0C6A328F-13CF-42FF-81A5-04F20F00EF64}"= c:\program files\AVG\AVG8\avgupd.exe:avgupd.exe
"TCP Query User{C70EB7AE-2E3F-4B54-A95F-BB9B4CA23C84}c:\\users\\mysweetbunny\\appdata\\roaming\\macromedia\\flash player\\www.macromedia.com\\bin\\octoshape\\octoshape.exe"= UDP:c:\users\mysweetbunny\appdata\roaming\macromedia\flash player\http://www.macromedia.com\bin\octosh...:octoshape.exe
"UDP Query User{C3CFD078-12AC-4403-95BC-256F04F294C4}c:\\users\\mysweetbunny\\appdata\\roaming\\macromedia\\flash player\\www.macromedia.com\\bin\\octoshape\\octoshape.exe"= TCP:c:\users\mysweetbunny\appdata\roaming\macromedia\flash player\http://www.macromedia.com\bin\octosh...:octoshape.exe
"{DB332564-5F30-4D05-BA24-D8BA2B8FCA9A}"= UDP:c:\windows\explorer.exe:Explorer
"{1D025813-91A0-4D30-AE13-617F26972088}"= TCP:c:\windows\explorer.exe:Explorer
"{79750498-5B32-4498-AA3A-4C682458E5AA}"= UDP:c:\windows\explorer.exe:Explorer
"{964FD7A6-D8D8-41D1-AF89-9906319B235A}"= TCP:c:\windows\explorer.exe:Explorer
"{87E3F3FF-BA4E-496C-9259-84E20CCAE35F}"= UDP:c:\windows\System32\dwm.exe:Dwm
"{FE32EF8A-6BAF-427D-927A-590B4EB5EDA1}"= TCP:c:\windows\System32\dwm.exe:Dwm
"{9BF926F0-91FE-453A-A4DF-C112D31A8291}"= UDP:c:\windows\System32\LogonUI.exe:LogonUI
"{8E58035B-4F38-4156-8755-2FECBA39C564}"= TCP:c:\windows\System32\LogonUI.exe:LogonUI
"{41CFC8FF-9348-4673-8A33-BE8F453C2AF3}"= UDP:c:\windows\System32\wininit.exe:wininit
"{2ED6E9CE-7FED-4E19-81EA-1C78EF86A230}"= TCP:c:\windows\System32\wininit.exe:wininit
"{9A009F5E-75D5-46C8-BCCA-B9DB5B757401}"= UDP:c:\windows\System32\wininit.exe:wininit
"{C98C61CE-1B81-4DFA-8D97-94FA9A99B58E}"= TCP:c:\windows\System32\wininit.exe:wininit
"{50386947-031D-4406-9DEB-E056E944A695}"= UDP:c:\program files\AVG\AVG8\avgrsx.exe:avgrsx
"{E07582D9-9E52-4F58-B48B-778E684E7281}"= TCP:c:\program files\AVG\AVG8\avgrsx.exe:avgrsx
"{56F653CE-E784-4A2B-8D2D-3A60B5A4B52E}"= UDP:c:\unreal\System\Unreal.exe:Unreal
"{ECF67E69-67EB-479C-A397-A55E75190A4D}"= TCP:c:\unreal\System\Unreal.exe:Unreal
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile\AuthorizedApplications\List]
"c:\\TOSHIBA\\ivp\\NetInt\\Netint.exe"= c:\toshiba\ivp\NetInt\Netint.exe:*:Enabled:NIE - Toshiba Software Upgrades Engine
"c:\\TOSHIBA\\Ivp\\ISM\\pinger.exe"= c:\toshiba\Ivp\ISM\pinger.exe:*:Enabled:Toshiba Software Upgrades Pinger
R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\Drivers\avgldx86.sys [2008-11-03 97928]
R2 avg8emc;AVG Free8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [2008-11-03 875288]
R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [2008-11-03 231704]
R3 AvgWfpX;AVG Free8 Firewall Driver x86;c:\windows\system32\Drivers\avgwfpx.sys [2008-11-03 69128]
R3 BoiHwsetup;Access 32bits INT15 routine;c:\windows\system32\drivers\BoiHwSetup.sys [2006-10-12 7680]
R3 qkbfiltr;Keyboard Filter Driver;c:\windows\system32\DRIVERS\qkbfiltr.sys [2006-11-20 33792]
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{7070D8E0-650A-46b3-B03C-9497582E6A74}]
%SystemRoot%\system32\soundschemes.exe /AddRegistration
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{B3688A53-AB2A-4b1d-8CEF-8F93D8C51C24}]
%SystemRoot%\system32\soundschemes2.exe /AddRegistration
.
Contents of the 'Scheduled Tasks' folder
2008-12-03 c:\windows\Tasks\User_Feed_Synchronization-{CBFF64F7-E5DB-4768-BE6B-B5411FE092C3}.job
- c:\windows\system32\msfeedssync.exe [2008-01-19 01:33]
.
**************************************************************************
catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-12-03 06:34:31
Windows 6.0.6001 Service Pack 1 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
- - - - - - - > 'lsass.exe'(680)
c:\windows\system32\psqlpwd.dll
c:\program files\Protector Suite QL\homefus2.dll
c:\program files\Protector Suite QL\infra.dll
- - - - - - - > 'Explorer.exe'(3960)
c:\program files\Protector Suite QL\farchns.dll
c:\program files\Protector Suite QL\infra.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\System32\nvvsvc.exe
c:\windows\System32\audiodg.exe
c:\windows\System32\rundll32.exe
c:\program files\Protector Suite QL\upeksvr.exe
c:\program files\Lavasoft\Ad-Aware\aawservice.exe
c:\windows\System32\WerFault.exe
c:\program files\AVG\AVG8\avgtray.exe
c:\windows\System32\rundll32.exe
c:\combofix\hidec.exe
c:\program files\Toshiba\ConfigFree\CFSvcs.exe
c:\toshiba\IVP\swupdate\swupdtmr.exe
c:\windows\System32\TODDSrv.exe
c:\program files\Toshiba\Power Saver\TosCoSrv.exe
c:\windows\System32\drivers\XAudio.exe
c:\progra~1\AVG\AVG8\avgrsx.exe
c:\combofix\Catchme.tmp
.
**************************************************************************
.
Completion time: 2008-12-03 6:41:10 - machine was rebooted [MySweetBunny]
ComboFix-quarantined-files.txt 2008-12-03 12:39:52
ComboFix2.txt 2008-11-27 13:08:47
Pre-Run: 81,527,230,464 bytes free
Post-Run: 81,426,911,232 bytes free
314 --- E O F --- 2008-12-01 17:18:30
--------------------------------------------------------------------------
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:47:59 AM, on 12/3/2008
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal
Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Windows\System32\WerFault.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Electronic Arts\EADM\Core.exe
C:\Windows\Explorer.exe
C:\Windows\system32\notepad.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
O2 - BHO: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL
O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
O3 - Toolbar: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKCU\..\Run: [EA Core] C:\Program Files\Electronic Arts\EADM\Core.exe -silent
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O13 - Gopher Prefix:
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - http://a1540.g.akamai.net/7/1540/52/...x/qtplugin.cab
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O20 - AppInit_DLLs: avgrsstx.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe
O23 - Service: Swupdtmr - Unknown owner - c:\Toshiba\IVP\swupdate\swupdtmr.exe
O23 - Service: TOSHIBA Optical Disc Drive Service (TODDSrv) - TOSHIBA Corporation - C:\Windows\system32\TODDSrv.exe
O23 - Service: TOSHIBA Power Saver (TosCoSrv) - TOSHIBA Corporation - C:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe
--
End of file - 4453 bytes
That happens sometimes.
Looks like it worked like it should anyway.
Still some issues or are you ready for final instructions?
Microsoft MVP Consumer Security 2008-2011
Member of ASAP and UNITE since 2006
No issues, AVG ran an autoscan and moved the quarantined files Combofix found in the Qoobox directory to it's own quarantine folder.
Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
Please download JavaRa and unzip it to your desktop.
***Please close any instances of Internet Explorer before continuing!***
- Double-click on JavaRa.exe to start the program.
- From the drop-down menu, choose English and click on Select.
- JavaRa will open; click on Remove Older Versions to remove the older versions of Java installed on your computer.
- Click Yes when prompted. When JavaRa is done, a notice will appear that a logfile has been produced. Click OK.
- A logfile will pop up. Please save it to a convenient location.
Then download and install Java Runtime Environment (JRE) 6 Update 11.
Looking over your log, it seems you don't have any evidence of a third party firewall.
As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:
1) Comodo (Uncheck during installation "Install COMODO Antivirus (Recommended)"!, "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage")
2) Online Armor
3) PC Tools
4) Sunbelt/Kerio
5) ZoneAlarm (uncheck ZoneAlarm Spy Blocker during installation if you choose this one)
If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
Now lets uninstall ComboFix:
- Click START then RUN
- Now type Combofix /u in the runbox and click OK
Next we remove all used tools.
You can delete rsit and c:\rsit folder
Please download OTCleanIt and save it to desktop.
- Double-click OTCleanIt.exe.
- Click the CleanUp! button.
- Select Yes when the "Begin cleanup Process?" prompt appears.
- If you are prompted to Reboot during the cleanup, select Yes.
- The tool will delete itself once it finishes, if not delete it by yourself.
Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.
- Disable and Enable System Restore. - If you are using Windows Vista then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.
You can find instructions on how to enable and re-enable system restore here:
Windows Vista System Restore Guide
Re-enable system restore with instructions from tutorial above
- Make your Internet Explorer more secure - This can be done by following these simple instructions:
- From within Internet Explorer click on the Tools menu and then click on Options.
- Click once on the Security tab
- Click once on the Internet icon so it becomes highlighted.
- Click once on the Custom Level button.
- Change the Download signed ActiveX controls to Prompt
- Change the Download unsigned ActiveX controls to Disable
- Change the Initialize and script ActiveX controls not marked as safe to Disable
- Change the Installation of desktop items to Prompt
- Change the Launching programs and files in an IFRAME to Prompt
- Change the Navigate sub-frames across different domains to Prompt
- When all these settings have been made, click on the OK button.
- If it prompts you as to whether or not you want to save the settings, press the Yes button.
- Next press the Apply button and then the OK to exit the Internet Properties page.
Follow this list and your potential for being infected again will reduce dramatically.
- Update your AntiVirus Software and keep your other programs up-to-date Update your Antivirus programs and other security products regularly to avoid new threats that could infect your system.
You can use one of these sites to check if any updates are needed for your pc.
Secunia Software Inspector
F-secure Health Check- Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
- Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.
A tutorial on installing & using this product can be found here:
Using SpywareBlaster to protect your computer from Spyware and Malware
- Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Here are some additional utilities that will enhance your safety
- MVPS Hosts file <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
- Winpatrol <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
Using Winpatrol to protect your computer from malicious software
Stand Up and Be Counted ---> Malware Complaints <--- where you can make difference!
The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.
Also, please read this great article by Tony Klein So How Did I Get Infected In First Place
Happy surfing and stay clean!
Microsoft MVP Consumer Security 2008-2011
Member of ASAP and UNITE since 2006
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help.
Note: If it has been five days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.
If it has been less than five days since your last response and you need the thread re-opened, please send me or your helper a private message (pm). A valid, working link to the closed topic is required.
Microsoft MVP Consumer Security 2008-2011
Member of ASAP and UNITE since 2006