Page 1 of 3 123 LastLast
Results 1 to 10 of 26

Thread: can't enable automatic updates..

  1. #1
    Junior Member
    Join Date
    Oct 2008
    Posts
    17

    Default can't enable automatic updates..

    hi!! i'm new to this community and i need urs help very badly..
    recently, my sys was infected by Virtumonde malware and Nod32 detected and deleted it(i think the real prob started from there) ..since then i was not able to enable automatic updates...even if i enable them they have no effect ..
    i saw some of the community threads and understood that this was a destruction trail left behind by Virtumonde malware...
    can any1 fix this prob?? please..

    this is my HijackThis log file (if u need it) :

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:03:03 PM, on 10/2/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\ESET\ESET Smart Security\ekrn.exe
    C:\WINDOWS\system32\VTTimer.exe
    C:\WINDOWS\system32\VTtrayp.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\DU Meter\DUMeter.exe
    C:\Program Files\ESET\ESET Smart Security\egui.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\WINDOWS\system32\Rundll32.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\VIA\RAID\raid_tool.exe
    H:\Vista Inspirat 2\RocketDock\RocketDock.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    g:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
    O4 - HKLM\..\Run: [VTTrayp] VTtrayp.exe
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [DU Meter] C:\Program Files\DU Meter\DUMeter.exe
    O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
    O4 - HKLM\..\Run: [58481eae] rundll32.exe "C:\WINDOWS\system32\flmmtelo.dll",b
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [BM5b7b2d32] Rundll32.exe "C:\WINDOWS\system32\vrwwwlyw.dll",s
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
    O4 - Startup: RocketDock.lnk = H:\Vista Inspirat 2\RocketDock\RocketDock.exe
    O4 - Global Startup: VIA RAID TOOL.lnk = C:\Program Files\VIA\RAID\raid_tool.exe
    O8 - Extra context menu item: &Download All with FlashGet - g:\Program Files\FlashGet\jc_all.htm
    O8 - Extra context menu item: &Download with FlashGet - g:\Program Files\FlashGet\jc_link.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - g:\Program Files\FlashGet\FlashGet.exe
    O9 - Extra 'Tools' menuitem: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - g:\Program Files\FlashGet\FlashGet.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsu...?1223009094218
    O17 - HKLM\System\CCS\Services\Tcpip\..\{8D2FBEEC-67B0-41B0-AA9B-EEA32046BCD3}: NameServer = 218.248.240.181 218.248.240.23
    O20 - AppInit_DLLs: lewvbt.dll
    O23 - Service: Eset HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET Smart Security\EHttpSrv.exe
    O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET Smart Security\ekrn.exe
    O23 - Service: TuneUp Drive Defrag Service (TuneUp.Defrag) - TuneUp Software GmbH - C:\WINDOWS\System32\TuneUpDefragService.exe

    --
    End of file - 4079 bytes

  2. #2
    Emeritus-Security Expert
    Join Date
    Nov 2005
    Location
    Florida's SpaceCoast
    Posts
    15,208

    Default

    Hello sayanwader

    Welcome to Safer Networking.

    Please read Before You Post
    That said, All advice given by anyone volunteering here, is taken at own risk.
    While best efforts are made to assist in removing infections safely, unexpected stuff can happen.



    You are still very much infected with the Vundo Trojan and its preventing you from updating your system.


    Open HijackThis > Do a System Scan Only, close your browser and all open windows including this one, the only program or window you should have open is HijackThis, check the following entries and click on Fix Checked.

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =

    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [58481eae] rundll32.exe "C:\WINDOWS\system32\flmmtelo.dll",b
    O4 - HKLM\..\Run: [BM5b7b2d32] Rundll32.exe "C:\WINDOWS\system32\vrwwwlyw.dll",s

    O20 - AppInit_DLLs: lewvbt.dll





    Please download Malwarebytes' Anti-Malware from Here or Here

    Double Click mbam-setup.exe to install the application.
    • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select "Perform Quick Scan", then click Scan.
    • The scan may take some time to finish,so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.<-- Don't forget this
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Copy and Paste the entire report in your next reply along with a New Hijackthis log.
    Microsoft MVP Consumer Security 2007-2008-2009-2010-2011-2012-2013-2014

    ERROR MESSAGE 386
    No KeyBoard Detected
    Press F1 To Continue

    Just a reminder that threads will be closed if no reply in 3 days.

  3. #3
    Junior Member
    Join Date
    Oct 2008
    Posts
    17

    Default

    thanks for ur reply pal..
    but i cannot find the lines that u've give me, instead i found

    O4 - HKLM\..\Run: [BM5b7b2d32] Rundll32.exe "C:\WINDOWS\system32\qbpudnlt.dll",s
    O4 - HKLM\..\Run: [58481eae] rundll32.exe "C:\WINDOWS\system32\wryxvheg.dll",b

    the letters in bold r the only difference..shall i proceed with ur steps?

  4. #4
    Emeritus-Security Expert
    Join Date
    Nov 2005
    Location
    Florida's SpaceCoast
    Posts
    15,208

    Default

    Yes, please do, these files change names faster than you change your socks
    Microsoft MVP Consumer Security 2007-2008-2009-2010-2011-2012-2013-2014

    ERROR MESSAGE 386
    No KeyBoard Detected
    Press F1 To Continue

    Just a reminder that threads will be closed if no reply in 3 days.

  5. #5
    Junior Member
    Join Date
    Oct 2008
    Posts
    17

    Default

    oh!!
    i've done what u said..
    here's my mbam-log

    Malwarebytes' Anti-Malware 1.28
    Database version: 1227
    Windows 5.1.2600 Service Pack 2

    10/4/2008 5:36:02 PM
    mbam-log-2008-10-04 (17-36-02).txt

    Scan type: Quick Scan
    Objects scanned: 38777
    Time elapsed: 3 minute(s), 36 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 5
    Registry Keys Infected: 13
    Registry Values Infected: 1
    Registry Data Items Infected: 3
    Folders Infected: 0
    Files Infected: 28

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    C:\WINDOWS\system32\kkltrrpf.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\qoMgeeed.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\sifbxa.dll (Trojan.Vundo) -> Delete on reboot.
    C:\WINDOWS\system32\ewemgubo.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\kellyh.dll (Trojan.Vundo.H) -> Delete on reboot.

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5f07cd60-9855-487c-9331-c2d85d39c2c6} (Trojan.Vundo.H) -> Delete on reboot.
    HKEY_CLASSES_ROOT\CLSID\{5f07cd60-9855-487c-9331-c2d85d39c2c6} (Trojan.Vundo.H) -> Delete on reboot.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9eb35cbd-7ebe-42b0-bd05-5ec1cd0a1336} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{9eb35cbd-7ebe-42b0-bd05-5ec1cd0a1336} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Bifrost (Backdoor.Bifrose) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Bifrost (Backdoor.Bifrose) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IProxyProvider (Trojan.Vundo) -> Quarantined and deleted successfully.


    and my HijackThis log

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 5:39:01 PM, on 10/4/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\VTTimer.exe
    C:\WINDOWS\system32\VTtrayp.exe
    C:\Program Files\DU Meter\DUMeter.exe
    C:\Program Files\ESET\ESET Smart Security\egui.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\VIA\RAID\raid_tool.exe
    H:\Vista Inspirat 2\RocketDock\RocketDock.exe
    C:\Program Files\ESET\ESET Smart Security\ekrn.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\mspaint.exe
    G:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: (no name) - {018B27FF-E05F-4CB5-8763-540CB3FD457A} - (no file)
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - H:\Real Player\rpbrowserrecordplugin.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O2 - BHO: FlashGet GetFlash Class - {F156768E-81EF-470C-9057-481BA8380DBA} - g:\Program Files\FlashGet\getflash.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
    O4 - HKLM\..\Run: [VTTrayp] VTtrayp.exe
    O4 - HKLM\..\Run: [DU Meter] C:\Program Files\DU Meter\DUMeter.exe
    O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
    O4 - Startup: RocketDock.lnk = H:\Vista Inspirat 2\RocketDock\RocketDock.exe
    O4 - Global Startup: VIA RAID TOOL.lnk = C:\Program Files\VIA\RAID\raid_tool.exe
    O8 - Extra context menu item: &Download All with FlashGet - G:\Program


    am i clean from Voundo now?

  6. #6
    Junior Member
    Join Date
    Oct 2008
    Posts
    17

    Default

    and i also got this Error message at statup

    Error loading C:\WINDOWS\system32\jlalqlyh.dll
    The specefied module could not be found.

  7. #7
    Emeritus-Security Expert
    Join Date
    Nov 2005
    Location
    Florida's SpaceCoast
    Posts
    15,208

    Default

    Good Morning,

    The error your getting is because a file used by the Vundo trojan was deleted and the infection is looking for it, not to worry as it will be gone when we're done.

    I need to see the ENTIRE malwarebytes log and the ENTIRE HJT log, you only posted partial logs
    Microsoft MVP Consumer Security 2007-2008-2009-2010-2011-2012-2013-2014

    ERROR MESSAGE 386
    No KeyBoard Detected
    Press F1 To Continue

    Just a reminder that threads will be closed if no reply in 3 days.

  8. #8
    Junior Member
    Join Date
    Oct 2008
    Posts
    17

    Default

    sorry pal...

    Hijack this log :

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:21:22 AM, on 10/5/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\ESET\ESET Smart Security\ekrn.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\VTTimer.exe
    C:\WINDOWS\system32\VTtrayp.exe
    C:\Program Files\DU Meter\DUMeter.exe
    C:\Program Files\ESET\ESET Smart Security\egui.exe
    C:\Program Files\VIA\RAID\raid_tool.exe
    H:\Vista Inspirat 2\RocketDock\RocketDock.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    G:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: (no name) - {018B27FF-E05F-4CB5-8763-540CB3FD457A} - (no file)
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - H:\Real Player\rpbrowserrecordplugin.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O2 - BHO: FlashGet GetFlash Class - {F156768E-81EF-470C-9057-481BA8380DBA} - g:\Program Files\FlashGet\getflash.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - G:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
    O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
    O4 - HKLM\..\Run: [VTTrayp] VTtrayp.exe
    O4 - HKLM\..\Run: [DU Meter] C:\Program Files\DU Meter\DUMeter.exe
    O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
    O4 - HKCU\..\Run: [Veoh] "G:\Program Files\Veoh Networks\Veoh\VeohClient.exe" /VeohHide
    O4 - Startup: RocketDock.lnk = H:\Vista Inspirat 2\RocketDock\RocketDock.exe
    O4 - Global Startup: VIA RAID TOOL.lnk = C:\Program Files\VIA\RAID\raid_tool.exe
    O8 - Extra context menu item: &Download All with FlashGet - G:\Program Files\FlashGet\jc_all.htm
    O8 - Extra context menu item: &Download with FlashGet - G:\Program Files\FlashGet\jc_link.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - g:\Program Files\FlashGet\FlashGet.exe
    O9 - Extra 'Tools' menuitem: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - g:\Program Files\FlashGet\FlashGet.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsu...?1223009094218
    O17 - HKLM\System\CCS\Services\Tcpip\..\{8D2FBEEC-67B0-41B0-AA9B-EEA32046BCD3}: NameServer = 218.248.240.181 218.248.240.23
    O20 - Winlogon Notify: fccyvSKc - C:\WINDOWS\
    O23 - Service: Eset HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET Smart Security\EHttpSrv.exe
    O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET Smart Security\ekrn.exe
    O23 - Service: TuneUp Drive Defrag Service (TuneUp.Defrag) - TuneUp Software GmbH - C:\WINDOWS\System32\TuneUpDefragService.exe

    --
    End of file - 4612 bytes


    Malwarebytes' Anti-Malware log (after running for the first time)

    Malwarebytes' Anti-Malware 1.28
    Database version: 1227
    Windows 5.1.2600 Service Pack 2

    10/4/2008 5:36:02 PM
    mbam-log-2008-10-04 (17-36-02).txt

    Scan type: Quick Scan
    Objects scanned: 38777
    Time elapsed: 3 minute(s), 36 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 5
    Registry Keys Infected: 13
    Registry Values Infected: 1
    Registry Data Items Infected: 3
    Folders Infected: 0
    Files Infected: 28

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    C:\WINDOWS\system32\kkltrrpf.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\qoMgeeed.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\sifbxa.dll (Trojan.Vundo) -> Delete on reboot.
    C:\WINDOWS\system32\ewemgubo.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\kellyh.dll (Trojan.Vundo.H) -> Delete on reboot.

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5f07cd60-9855-487c-9331-c2d85d39c2c6} (Trojan.Vundo.H) -> Delete on reboot.
    HKEY_CLASSES_ROOT\CLSID\{5f07cd60-9855-487c-9331-c2d85d39c2c6} (Trojan.Vundo.H) -> Delete on reboot.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9eb35cbd-7ebe-42b0-bd05-5ec1cd0a1336} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\CLSID\{9eb35cbd-7ebe-42b0-bd05-5ec1cd0a1336} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Bifrost (Backdoor.Bifrose) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Bifrost (Backdoor.Bifrose) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IProxyProvider (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bm5b7b2d32 (Trojan.Agent) -> Delete on reboot.

    Registry Data Items Infected:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\qomgeeed -> Quarantined and deleted successfully.
    HKEY_CLASSES_ROOT\regfile\shell\open\command\ (Broken.OpenCommand) -> Bad: ("regedit.exe" "%1") Good: (regedit.exe "%1") -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\qomgeeed -> Delete on reboot.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\WINDOWS\system32\qoMgeeed.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\deeegMoq.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\deeegMoq.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\kellyh.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\gdyennkk.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\kknneydg.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\kkltrrpf.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\fprrtlkk.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\koxdoodg.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\gdoodxok.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\wryxvheg.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\gehvxyrw.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\sifbxa.dll (Trojan.Vundo) -> Delete on reboot.
    C:\WINDOWS\system32\ewemgubo.dll (Trojan.Vundo.H) -> Delete on reboot.
    C:\WINDOWS\system32\qbpudnlt.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\cnxowpyi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\eccwwnql.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\lipqed.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\bothhebr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\E9SHUVK9\nd82m0[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\QV2FY5CJ\upd105320[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
    C:\disconn.bat (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\jlalqlyh.dll (Trojan.Agent) -> Delete on reboot.
    C:\Documents and Settings\Administrator\Application Data\addon.dat (Malware.Trace) -> Quarantined and deleted successfully.
    C:\WINDOWS\pskt.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\BM5b7b2d32.xml (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\WINDOWS\BM5b7b2d32.txt (Trojan.Vundo) -> Quarantined and deleted successfully.


    Malwarebytes' Anti-Malware log (after the second scan):

    Malwarebytes' Anti-Malware 1.28
    Database version: 1227
    Windows 5.1.2600 Service Pack 2

    10/5/2008 10:31:12 AM
    mbam-log-2008-10-05 (10-31-12).txt

    Scan type: Quick Scan
    Objects scanned: 38549
    Time elapsed: 6 minute(s), 44 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)

  9. #9
    Emeritus-Security Expert
    Join Date
    Nov 2005
    Location
    Florida's SpaceCoast
    Posts
    15,208

    Default

    Thanks for the new logs,

    Remove this with HJT
    O20 - Winlogon Notify: fccyvSKc - C:\WINDOWS\



    Please download ATF Cleaner by Atribune to your desktop.
    • This program is for XP and Windows 2000 only
    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.
    Your system may start up slower after running ATF Cleaner, this is expected but will be back to normal after the first or second boot up
    Please note: If you use online banking or are registered online with any other organizations, ensure you have memorized password and other personal information as removing cookies will temporarily disable the auto-login facility.




    Download ComboFix from Here or Here to your Desktop.

    In the event you already have Combofix, this is a new version that I need you to download.
    It must be saved directly to your desktop.



    1. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    • Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan.
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    • Remember to re enable the protection again afterwards before connecting to the net



    2. Close any open browsers and make sure you are disconnected from the net. Unplug the cable if need be before running combofix.
    • IF you have not already done so Combofix will disconnect your machine from the Internet when it starts.
    • If there is no internet connection when Combofix has completely finished then restart your computer to restore back the connections.


    3. Now double click on combofix.exe & follow the prompts.
    When finished, it will produce a report for you.
    Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review

    Note: Do not mouseclick combofix's window while it's running. That may cause it to stall or freeze.
    Microsoft MVP Consumer Security 2007-2008-2009-2010-2011-2012-2013-2014

    ERROR MESSAGE 386
    No KeyBoard Detected
    Press F1 To Continue

    Just a reminder that threads will be closed if no reply in 3 days.

  10. #10
    Junior Member
    Join Date
    Oct 2008
    Posts
    17

    Lightbulb

    here's [bComboFix[/b] log :

    ComboFix 08-10-04.07 - Administrator 2008-10-05 21:12:18.1 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.609 [GMT -7:00]
    Running from: C:\Documents and Settings\Administrator\Desktop\ComboFix.exe
    * Created a new restore point

    WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
    .
    /wow section - STAGE 41
    grep: (standard input): Not enough space
    grep: (standard input): Not enough space
    The system cannot find the file temp00.
    grep: (standard input): Not enough space

    /wow section - STAGE 47
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.
    The process cannot access the file because it is being used by another process.


    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\WINDOWS\system32\_000110_.tmp.dll
    C:\WINDOWS\system32\cwtwjsxy.dll
    C:\WINDOWS\system32\dootbvqg.dll
    C:\WINDOWS\system32\fctebo.dll
    C:\WINDOWS\system32\lewvbt.dll
    C:\WINDOWS\system32\oletmmlf.ini
    C:\WINDOWS\system32\prxfnsdc.dll
    C:\WINDOWS\system32\vrwwwlyw.dll

    .
    ((((((((((((((((((((((((( Files Created from 2008-09-06 to 2008-10-06 )))))))))))))))))))))))))))))))
    .

    2008-10-05 11:24 . 2008-10-05 11:24 19 --a------ C:\disconn.bat
    2008-10-04 17:30 . 2008-10-04 17:30 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
    2008-10-04 17:30 . 2008-10-04 17:30 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Malwarebytes
    2008-10-04 17:30 . 2008-09-10 00:08 38,528 --a------ C:\WINDOWS\system32\drivers\mbamswissarmy.sys
    2008-10-04 17:30 . 2008-09-10 00:08 17,200 --a------ C:\WINDOWS\system32\drivers\mbam.sys
    2008-10-04 15:29 . 2008-10-04 15:29 <DIR> d-------- C:\Program Files\Lonely Cat Games
    2008-10-02 21:36 . 2008-07-18 22:10 45,768 --a------ C:\WINDOWS\system32\wups2.dll
    2008-10-02 21:36 . 2008-07-18 22:10 33,992 --a------ C:\WINDOWS\system32\wucltui.dll.mui
    2008-10-02 21:36 . 2008-07-18 22:09 25,800 --a------ C:\WINDOWS\system32\wuaucpl.cpl.mui
    2008-10-02 21:36 . 2008-07-18 22:09 25,800 --a------ C:\WINDOWS\system32\wuapi.dll.mui
    2008-10-02 21:36 . 2008-07-18 22:08 20,680 --a------ C:\WINDOWS\system32\wuaueng.dll.mui
    2008-10-02 15:12 . 2008-10-02 15:13 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Winamp
    2008-10-02 11:30 . 2008-10-02 11:30 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\TuneUp Software
    2008-10-02 11:30 . 2008-10-02 11:30 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\TuneUp Software
    2008-10-02 11:30 . 2008-10-02 11:30 307,968 --a------ C:\WINDOWS\system32\TuneUpDefragService.exe
    2008-10-02 11:30 . 2008-02-27 13:15 28,416 --a------ C:\WINDOWS\system32\uxtuneup.dll
    2008-10-02 11:29 . 2008-10-02 11:29 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
    2008-10-02 10:13 . 2008-10-05 15:59 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\OpenOffice.org2
    2008-10-01 22:45 . 2008-10-01 22:45 <DIR> d-------- C:\Documents and Settings\sayan sajith
    2008-10-01 22:31 . 2004-08-03 18:07 221,184 --a------ C:\WINDOWS\system32\wmpns.dll
    2008-10-01 22:27 . 2008-10-01 22:27 11 --a------ C:\shutpc.bat
    2008-10-01 22:26 . 2008-10-01 22:26 26 --a------ C:\conn.bat
    2008-10-01 17:48 . 2008-10-01 17:48 <DIR> d-------- C:\VundoFix Backups
    2008-10-01 14:47 . 2008-10-01 15:29 <DIR> d-------- C:\Program Files\Enigma Software Group
    2008-10-01 14:33 . 2008-10-01 14:44 <DIR> d-------- C:\Program Files\SpyZooka
    2008-10-01 14:32 . 2008-10-01 14:32 <DIR> d-------- C:\Program Files\Common Files\Download Manager
    2008-10-01 13:56 . 2008-10-01 23:23 <DIR> d-------- C:\Program Files\OpenOffice.org 2.4
    2008-10-01 10:41 . 2008-10-01 10:41 24,250 --a------ C:\WINDOWS\Aware40.mch
    2008-10-01 10:40 . 2008-10-01 10:41 <DIR> d-------- C:\WINDOWS\A4W_DATA
    2008-10-01 10:40 . 2008-10-01 10:40 35 --a------ C:\WINDOWS\A4W.INI
    2008-10-01 10:38 . 2008-10-01 10:39 <DIR> d-------- C:\Program Files\Pals e-Dictionary
    2008-09-30 21:40 . 2008-10-04 17:58 <DIR> d-------- C:\WINDOWS\Downloaded Installations
    2008-09-30 21:09 . 2008-10-05 07:29 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\uTorrent
    2008-09-30 21:03 . 2008-09-30 21:03 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Thinking Minds Budiling Bytes
    2008-09-30 19:27 . 2008-10-01 16:44 <DIR> d-a------ C:\Documents and Settings\All Users\Application Data\TEMP
    2008-09-30 19:14 . 2008-10-02 20:42 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\vlc
    2008-09-30 17:26 . 2008-09-30 17:26 <DIR> d--h----- C:\WINDOWS\system32\GroupPolicy
    2008-09-30 17:01 . 2004-08-04 00:56 159,232 --a------ C:\WINDOWS\system32\ptpusd.dll
    2008-09-30 17:01 . 2004-08-03 22:58 15,104 --a------ C:\WINDOWS\system32\drivers\usbscan.sys
    2008-09-30 17:01 . 2004-08-03 22:58 15,104 --a--c--- C:\WINDOWS\system32\dllcache\usbscan.sys
    2008-09-30 17:01 . 2001-08-17 22:36 5,632 --a------ C:\WINDOWS\system32\ptpusb.dll
    2008-09-30 16:48 . 2008-06-10 02:32 73,728 --a------ C:\WINDOWS\system32\javacpl.cpl
    2008-09-30 16:46 . 2008-09-30 16:46 <DIR> d-------- C:\Program Files\NOS
    2008-09-30 16:46 . 2008-10-01 13:53 <DIR> d-------- C:\Program Files\Java
    2008-09-30 16:46 . 2008-09-30 16:46 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\NOS
    2008-09-30 16:44 . 2008-09-30 16:45 <DIR> d-------- C:\WINDOWS\system32\Adobe
    2008-09-30 16:44 . 2008-09-30 16:44 <DIR> d-------- C:\Program Files\Common Files\Java
    2008-09-30 16:26 . 2008-09-30 16:26 <DIR> d-------- C:\Program Files\%temp&
    2008-09-30 16:26 . 2008-01-07 14:29 352 --ah----- C:\WINDOWS\nod32fixtemdono.reg
    2008-09-30 16:25 . 2008-09-30 16:25 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\ESET
    2008-09-30 16:23 . 2008-09-30 16:23 <DIR> d-------- C:\Program Files\ESET
    2008-09-30 16:23 . 2008-09-30 16:23 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\ESET
    2008-09-30 16:04 . 2008-09-30 16:04 <DIR> d-------- C:\Program Files\TweakNow RegCleaner Std
    2008-09-30 15:58 . 2008-09-30 15:58 0 --a------ C:\WINDOWS\nsreg.dat
    2008-09-30 15:54 . 2008-09-30 15:54 <DIR> d---s---- C:\Documents and Settings\Administrator\UserData
    2008-09-30 15:53 . 2008-09-30 15:53 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Yahoo! Companion
    2008-09-30 15:53 . 2008-09-30 15:54 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Yahoo!
    2008-09-30 15:51 . 2004-07-30 01:15 28,160 --a------ C:\WINDOWS\system32\tuscaenc.dll
    2008-09-30 15:48 . 2008-09-30 15:48 53,248 --a------ C:\WINDOWS\system32\suppdll.dll
    2008-09-30 15:48 . 2008-09-30 15:48 35,363 --a------ C:\WINDOWS\system32\windrvNT.sys
    2008-09-30 15:46 . 2008-10-05 18:45 2,764 --a------ C:\WINDOWS\system32\$$$mclip.cfg
    2008-09-30 15:43 . 2008-09-30 15:43 <DIR> d-------- C:\Program Files\Jiao System, Ltd.VCDCutter
    2008-09-30 15:43 . 2008-09-30 15:46 564 --a------ C:\WINDOWS\system\cdplayer.dat
    2008-09-30 15:38 . 2008-09-30 15:38 <DIR> d-------- C:\Program Files\VstPlugins
    2008-09-30 15:38 . 2008-09-30 15:38 <DIR> d-------- C:\Program Files\ASIO4ALL v2
    2008-09-30 15:38 . 2002-07-07 15:14 1,294,336 --a------ C:\WINDOWS\system32\vorbis.acm
    2008-09-30 15:38 . 2006-06-20 01:56 225,280 --a------ C:\WINDOWS\system32\rewire.dll
    2008-09-30 15:37 . 2008-09-30 15:37 <DIR> d-------- C:\Program Files\Outsim
    2008-09-30 15:37 . 2008-09-30 23:00 <DIR> d-------- C:\Program Files\Image-Line
    2008-09-30 15:35 . 2008-09-30 15:36 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Yahoo!
    2008-09-30 15:32 . 2008-09-30 15:35 <DIR> d-------- C:\Program Files\Yahoo!
    2008-09-30 15:27 . 2008-09-30 15:27 <DIR> d-------- C:\Program Files\Google
    2008-09-30 15:25 . 2008-09-30 15:25 <DIR> d-------- C:\Program Files\SlySoft
    2008-09-30 15:21 . 2000-05-22 22:58 608,448 --a------ C:\WINDOWS\system32\comctl32.ocx
    2008-09-30 15:18 . 2008-09-30 15:18 <DIR> d-------- C:\Program Files\Common Files\xing shared
    2008-09-30 15:18 . 2008-09-30 15:18 <DIR> d-------- C:\Program Files\Common Files\Real
    2008-09-30 15:18 . 2008-09-30 15:18 499,712 --a------ C:\WINDOWS\system32\msvcp71.dll
    2008-09-30 15:18 . 2008-09-30 15:18 348,160 --a------ C:\WINDOWS\system32\msvcr71.dll
    2008-09-30 15:12 . 2007-03-07 13:27 4,245,008 --a------ C:\WINDOWS\system32\qtp-mt334.dll
    2008-09-30 15:12 . 2007-03-07 13:27 247,824 --a------ C:\WINDOWS\system32\prgiso.dll
    2008-09-30 15:12 . 2007-03-07 13:27 38,448 --a------ C:\WINDOWS\system32\drivers\hotcore3.sys
    2008-09-30 15:12 . 2007-03-07 13:27 13,840 --a------ C:\WINDOWS\system32\wnaspi32.dll
    2008-09-30 15:10 . 2008-09-30 15:10 <DIR> d-------- C:\Program Files\DU Meter
    2008-09-30 15:10 . 2008-09-30 15:10 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Hagel Technologies
    2008-09-30 14:56 . 2008-09-30 14:56 2,359,350 --a------ C:\WINDOWS\BricoPack Wallpaper.bmp
    2008-09-30 14:56 . 2008-09-30 14:56 55,466 --a------ C:\WINDOWS\BricoPackUninst.cmd
    2008-09-30 14:55 . 2008-09-30 14:55 <DIR> d-------- C:\WINDOWS\BricoPacks
    2008-09-30 14:55 . 2008-09-30 14:56 4,590 --a------ C:\WINDOWS\BricoPackFoldersDelete.cmd
    2008-09-30 14:54 . 2008-09-30 14:54 <DIR> d-------- C:\Program Files\BearShare
    2008-09-30 14:54 . 2008-09-30 14:54 <DIR> d-------- C:\DOWNLOADS
    2008-09-30 14:54 . 2008-09-30 14:54 <DIR> d-------- C:\!Temp
    2008-09-30 14:48 . 2008-09-30 14:48 <DIR> d-------- C:\POD
    2008-09-30 14:48 . 2008-09-30 14:48 <DIR> d-------- C:\Documents and Settings\Administrator\WINDOWS
    2008-09-30 14:48 . 1996-11-05 16:19 247,648 --a------ C:\WINDOWS\UNINST16.EXE
    2008-09-30 14:48 . 1995-07-13 18:43 26,768 --a------ C:\WINDOWS\system\CTL3D.DLL
    2008-09-30 14:48 . 2008-10-05 14:12 208 --a------ C:\WINDOWS\POD.INI
    2008-09-30 14:48 . 2008-09-30 14:48 8 --a------ C:\WINDOWS\Q.TRD
    2008-09-30 14:48 . 2008-09-30 14:48 0 --a------ C:\WINDOWS\PROTOCOL.INI
    2008-09-30 14:43 . 2008-09-30 14:43 <DIR> d-------- C:\WINDOWS\OPTIONS
    2008-09-30 14:43 . 2008-09-30 14:43 <DIR> d-------- C:\Program Files\Realtek Sound Manager
    2008-09-30 14:43 . 2008-09-30 14:43 <DIR> d-------- C:\Program Files\AvRack
    2008-09-30 14:42 . 2008-09-30 14:44 <DIR> d-------- C:\Program Files\VIA
    2008-09-30 14:42 . 2008-10-04 17:59 <DIR> d--h----- C:\Program Files\InstallShield Installation Information
    2008-09-30 14:42 . 2008-09-30 14:42 <DIR> d-------- C:\Program Files\AMD
    2008-09-30 14:42 . 2005-03-07 19:50 3,453,824 -ra------ C:\WINDOWS\system32\vtdisp.dll
    2008-09-30 14:41 . 2008-09-30 14:43 <DIR> d-------- C:\Program Files\Common Files\InstallShield
    2008-09-30 14:41 . 2004-08-03 23:08 26,496 --a--c--- C:\WINDOWS\system32\dllcache\usbstor.sys
    2008-09-30 14:40 . 2004-10-05 16:54 306,688 --a------ C:\WINDOWS\IsUninst.exe
    2008-09-30 14:35 . 2008-09-30 14:35 <DIR> d-------- C:\Program Files\VideoLAN
    2008-09-30 14:17 . 2008-09-30 14:17 <DIR> d-------- C:\Program Files\Common Files\Adobe
    2008-09-30 14:17 . 2008-09-30 14:17 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\AdobeUM
    2008-09-30 14:16 . 2008-09-30 14:16 <DIR> d-------- C:\Program Files\Common Files\SWF Studio
    2008-09-30 14:05 . 2008-09-30 14:05 <DIR> d---s---- C:\WINDOWS\system32\Microsoft
    2008-09-30 14:05 . 2008-10-02 11:37 <DIR> d--hs---- C:\Documents and Settings\LocalService
    2008-09-30 14:05 . 2008-10-04 17:36 <DIR> d-------- C:\Documents and Settings\Administrator
    2008-09-30 14:04 . 2008-10-02 11:37 <DIR> d--hs---- C:\Documents and Settings\NetworkService
    2008-09-30 14:04 . 2008-09-30 14:04 8,192 --a------ C:\WINDOWS\REGLOCS.OLD
    2008-09-30 14:01 . 2004-08-03 18:07 10,129,408 --a--c--- C:\WINDOWS\system32\dllcache\hwxkor.dll
    2008-09-30 14:00 . 2008-09-30 14:00 <DIR> d-------- C:\WINDOWS\system32\xircom
    2008-09-30 14:00 . 2008-09-30 14:00 <DIR> d-------- C:\Program Files\microsoft frontpage
    2008-09-28 15:05 . 1997-01-15 00:00 71,680 --a------ C:\WINDOWS\ST5UNST.EXE
    2008-09-28 15:05 . 1997-01-15 00:00 29,696 --a------ C:\WINDOWS\system32\VB5StKit.dll

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-09-30 21:56 218,624 ----a-w C:\WINDOWS\system32\uxtheme.dll
    2008-07-19 05:10 94,920 ----a-w C:\WINDOWS\system32\cdm.dll
    2008-07-19 05:10 53,448 ----a-w C:\WINDOWS\system32\wuauclt.exe
    2008-07-19 05:10 36,552 ----a-w C:\WINDOWS\system32\wups.dll
    2008-07-19 05:09 563,912 ----a-w C:\WINDOWS\system32\wuapi.dll
    2008-07-19 05:09 325,832 ----a-w C:\WINDOWS\system32\wucltui.dll
    2008-07-19 05:09 1,811,656 ----a-w C:\WINDOWS\system32\wuaueng.dll
    2008-07-19 05:08 205,000 ----a-w C:\WINDOWS\system32\wuweb.dll
    .

    ------- Sigcheck -------

    2004-08-03 18:07 690176 3a5ee0514f56b1b775d7641cfba5ad37 C:\WINDOWS\system32\wininet.dll
    2004-08-03 18:07 690176 3a5ee0514f56b1b775d7641cfba5ad37 C:\WINDOWS\system32\dllcache\wininet.dll

    2004-08-03 18:07 974336 a5c1f2cf7c31874e66478910b43d6513 C:\WINDOWS\explorer.exe
    2004-08-03 18:07 974336 a5c1f2cf7c31874e66478910b43d6513 C:\WINDOWS\system32\dllcache\explorer.exe
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Yahoo! Pager"="C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" [2007-08-30 4670704]
    "Veoh"="G:\Program Files\Veoh Networks\Veoh\VeohClient.exe" [2008-09-26 3660848]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "DU Meter"="C:\Program Files\DU Meter\DUMeter.exe" [2006-11-27 1582616]
    "egui"="C:\Program Files\ESET\ESET Smart Security\egui.exe" [2008-04-23 1443072]
    "TkBellExe"="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" [2008-09-30 185896]
    "VTTimer"="VTTimer.exe" [2005-03-07 C:\WINDOWS\system32\VTTimer.exe]
    "VTTrayp"="VTtrayp.exe" [2005-01-10 C:\WINDOWS\system32\VTTrayp.exe]

    C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\
    RocketDock.lnk - H:\Vista Inspirat 2\RocketDock\RocketDock.exe [2007-03-18 630784]

    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
    VIA RAID TOOL.lnk - C:\Program Files\VIA\RAID\raid_tool.exe [2008-09-30 585728]

    [HKLM\~\startupfolder\C:^Documents and Settings^Administrator^Start Menu^Programs^Startup^OpenOffice.org 2.4.lnk]
    path=C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\OpenOffice.org 2.4.lnk
    backup=C:\WINDOWS\pss\OpenOffice.org 2.4.lnkStartup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KernelFaultCheck]
    C:\WINDOWS\system32\dumprep 0 -k [X]

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
    --a------ 2008-06-12 02:38 34672 G:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CloneCDTray]
    --a------ 2006-09-28 12:21 57344 C:\Program Files\SlySoft\CloneCD\CloneCDTray.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
    --a----t- 2008-09-30 20:58 133104 C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Update\GoogleUpdate.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\googletalk]
    --a------ 2007-01-01 14:22 3739648 C:\Program Files\Google\Google Talk\googletalk.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PWRISOVM.EXE]
    --a------ 2008-07-07 00:34 167936 H:\PowerISO\PWRISOVM.EXE

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
    --a------ 2008-06-10 04:27 144784 C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
    --a------ 2008-09-30 15:18 185896 C:\Program Files\Common Files\Real\Update_OB\realsched.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Veoh]
    --a------ 2008-09-26 19:14 3660848 G:\Program Files\Veoh Networks\Veoh\VeohClient.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager]
    --a------ 2007-08-30 17:43 4670704 C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
    "getPlus(R) Helper"=3 (0x3)

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
    "BM5b7b2d32"=Rundll32.exe "C:\WINDOWS\system32\prxfnsdc.dll",s

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "C:\\Program Files\\BearShare\\Bearshare.exe"=
    "C:\\Program Files\\Google\\Google Talk\\googletalk.exe"=
    "C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
    "C:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
    "G:\\Program Files\\FlashGet\\flashget.exe"=
    "G:\\Program Files\\uTorrent\\uTorrent.exe"=
    "G:\\Program Files\\Veoh Networks\\Veoh\\VeohClient.exe"=

    R0 hotcore3;hotcore3;C:\WINDOWS\system32\drivers\hotcore3.sys [2007-03-07 38448]
    R2 UxTuneUp;TuneUp Theme Extension;C:\WINDOWS\System32\svchost.exe [2004-08-03 14336]
    S3 TuneUp.Defrag;TuneUp Drive Defrag Service;C:\WINDOWS\System32\TuneUpDefragService.exe [2008-10-02 307968]
    S4 getPlus(R) Helper;getPlus(R) Helper;C:\Program Files\NOS\bin\getPlus_HelperSvc.exe [2008-08-29 33752]

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
    UxTuneUp

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{8540f86f-90b3-11dd-af32-000fea9f72b5}]
    \Shell\AutoRun\command - AutoRun\AutoStart.exe
    \Shell\Explore\Command - AutoRun\AutoStart.exe
    \Shell\Open\Command - AutoRun\AutoStart.exe

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{8540f870-90b3-11dd-af32-000fea9f72b5}]
    \Shell\AutoRun\command - AutoRun\AutoStart.exe
    \Shell\Explore\Command - AutoRun\AutoStart.exe
    \Shell\Open\Command - AutoRun\AutoStart.exe

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{9245485c-8f38-11dd-80c9-000fea9f72b5}]
    \Shell\AutoRun\command - AutoRun\AutoStart.exe
    \Shell\Explore\Command - AutoRun\AutoStart.exe
    \Shell\Open\Command - AutoRun\AutoStart.exe

    *Newly Created Service* - CATCHME
    *Newly Created Service* - PROCEXP90

    [HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{99DA742A-B779-C873-FF30-45979E1478C8}]
    C:\WINDOWS\system32\Bifrost\server.exe s
    .
    Contents of the 'Scheduled Tasks' folder

    2008-10-06 C:\WINDOWS\Tasks\1-Click Maintenance.job
    - G:\Program Files\TuneUp Utilities 2008\OneClickStarter.exe [2008-02-29 14:24]

    2008-10-05 C:\WINDOWS\Tasks\bear.job
    - C:\Program Files\BearShare\Bearshare.exe [2006-12-29 21:43]

    2008-10-05 C:\WINDOWS\Tasks\connect.job
    - C:\conn.bat [2008-10-01 22:26]

    2008-10-03 C:\WINDOWS\Tasks\discon.job
    - C:\disconn.bat [2008-10-05 11:24]

    2008-10-03 C:\WINDOWS\Tasks\shut.job
    - C:\shutpc.bat [2008-10-01 22:27]

    2008-10-05 C:\WINDOWS\Tasks\torr.job
    - G:\Program Files\uTorrent\uTorrent.exe [2008-09-30 21:09]

    2008-10-03 C:\WINDOWS\Tasks\veo.job
    - G:\Program Files\Veoh Networks\Veoh\VeohClient.exe [2008-09-26 19:14]
    .
    - - - - ORPHANS REMOVED - - - -

    BHO-{018B27FF-E05F-4CB5-8763-540CB3FD457A} - (no file)
    ShellExecuteHooks-{018B27FF-E05F-4CB5-8763-540CB3FD457A} - (no file)
    MSConfigStartUp-BM5b7b2d32 - C:\WINDOWS\system32\prxfnsdc.dll


    .
    ------- Supplementary Scan -------
    .
    FireFox -: Profile - C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\zeaqybug.default\
    FireFox -: prefs.js - STARTUP.HOMEPAGE -
    FF -: plugin - C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\zeaqybug.default\extensions\{CF40ACC5-E1BB-4aff-AC72-04C2F616BCA7}\plugins\np_gp.dll
    FF -: plugin - C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Update\1.2.131.11\npGoogleOneClick5.dll
    FF -: plugin - C:\Program Files\Mozilla Firefox\plugins\np_gp.dll
    FF -: plugin - C:\Program Files\Yahoo!\Shared\npYState.dll
    FF -: plugin - G:\Program Files\Adobe\Reader 9.0\Reader\browser\nppdf32.dll
    FF -: plugin - G:\Program Files\Veoh Networks\Veoh\Plugins\noreg\NPVeohVersion.dll
    FF -: plugin - H:\Real Player\Netscape6\nppl3260.dll
    FF -: plugin - H:\Real Player\Netscape6\nprjplug.dll
    FF -: plugin - H:\Real Player\Netscape6\nprpjplug.dll
    .

    **************************************************************************

    catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-10-05 21:13:15
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...


    C:\sccfg.sys 264 bytes

    scan completed successfully
    hidden files: 1

    **************************************************************************
    .
    Completion time: 2008-10-05 21:14:53
    ComboFix-quarantined-files.txt 2008-10-06 04:14:41

    Pre-Run: 2,015,256,576 bytes free
    Post-Run: 2,000,670,720 bytes free

    309


    and HijackThis log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 9:19:04 PM, on 10/5/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\VTTimer.exe
    C:\WINDOWS\system32\VTtrayp.exe
    C:\Program Files\DU Meter\DUMeter.exe
    C:\Program Files\ESET\ESET Smart Security\egui.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\VIA\RAID\raid_tool.exe
    H:\Vista Inspirat 2\RocketDock\RocketDock.exe
    C:\Program Files\ESET\ESET Smart Security\ekrn.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    G:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - H:\Real Player\rpbrowserrecordplugin.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O2 - BHO: FlashGet GetFlash Class - {F156768E-81EF-470C-9057-481BA8380DBA} - g:\Program Files\FlashGet\getflash.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - G:\Program Files\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll
    O4 - HKLM\..\Run: [VTTimer] VTTimer.exe
    O4 - HKLM\..\Run: [VTTrayp] VTtrayp.exe
    O4 - HKLM\..\Run: [DU Meter] C:\Program Files\DU Meter\DUMeter.exe
    O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
    O4 - HKCU\..\Run: [Veoh] "G:\Program Files\Veoh Networks\Veoh\VeohClient.exe" /VeohHide
    O4 - Startup: RocketDock.lnk = H:\Vista Inspirat 2\RocketDock\RocketDock.exe
    O4 - Global Startup: VIA RAID TOOL.lnk = C:\Program Files\VIA\RAID\raid_tool.exe
    O8 - Extra context menu item: &Download All with FlashGet - G:\Program Files\FlashGet\jc_all.htm
    O8 - Extra context menu item: &Download with FlashGet - G:\Program Files\FlashGet\jc_link.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - g:\Program Files\FlashGet\FlashGet.exe
    O9 - Extra 'Tools' menuitem: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - g:\Program Files\FlashGet\FlashGet.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsu...?1223009094218
    O17 - HKLM\System\CCS\Services\Tcpip\..\{8D2FBEEC-67B0-41B0-AA9B-EEA32046BCD3}: NameServer = 218.248.240.181 218.248.240.23
    O23 - Service: Eset HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET Smart Security\EHttpSrv.exe
    O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET Smart Security\ekrn.exe
    O23 - Service: TuneUp Drive Defrag Service (TuneUp.Defrag) - TuneUp Software GmbH - C:\WINDOWS\System32\TuneUpDefragService.exe

    --
    End of file - 4898 bytes

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •