-
I followed your suggestions, and chose to install avira.
After installing Avira I ran the suggested First Scan. Nothing was detected, as there were no updates.
I rebooted with wireless connection inserted, and updated virus database and ran a full scan.
:veryredfacedsmiley: The scan detected quite a few infections.
I have run DDS and GMER again, and together with the AV log, will post these in the following posts. Later this evening (here) I will run some more tests and see if I have any further issues.
-
I followed your suggestions, and chose to install avira.
After installing Avira I ran the suggested First Scan. Nothing was detected, as there were no updates.
I rebooted with wireless connection inserted, and updated virus database and ran a full scan.
:veryredfacedsmiley: The scan detected quite a few infections.
I have run DDS and GMER again, and together with the AV log, will post these in the following posts.
The svchost issue, grabbing 98% of cpu, still exists. Later this evening (here) I will run some more tests and see if I have any further issues.
-
DDS
DDS (Ver_10-12-12.02) - NTFSx86
Run by Robert Prinsen at 18:01:34.00 on 20/01/2011
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.447.138 [GMT 0:00]
AV: AntiVir Desktop *Enabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
============== Running Processes ===============
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\ACS.exe
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
svchost.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\System32\svchost.exe -k eapsvcs
C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Linksys\Wireless-G Notebook Adapter\NICServ.exe
C:\Program Files\NetScaler\NetScaler Secure Remote Access\nsverctl.exe
C:\WINDOWS\System32\dmadmin.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe
C:\WINDOWS\system32\TPSMain.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\Program Files\TOSHIBA\PadTouch\PadExe.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Desktop\dds.scr
============== Pseudo HJT Report ===============
uInternet Settings,ProxyOverride = 127.0.0.1;*.local
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
TB: {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No File
TB: RadioBar Toolbar: {5b291e6c-9a74-4034-971b-a4b007a0b315} -
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [DriverUpdaterPro] c:\program files\ixi tools\driver updater pro\DriverUpdaterPro.exe -t
mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [AGRSMMSG] AGRSMMSG.exe
mRun: [THotkey] c:\program files\toshiba\toshiba applet\thotkey.exe
mRun: [TPSMain] TPSMain.exe
mRun: [NDSTray.exe] NDSTray.exe
mRun: [SmoothView] c:\program files\toshiba\toshiba zooming utility\SmoothView.exe
mRun: [PadTouch] "c:\program files\toshiba\padtouch\PadExe.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - c:\windows\system32\msjava.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
DPF: {04897B74-BBBE-46E5-9550-5C487F39C2E4} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_OutBound_mail.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {8C244272-1DC1-4CE7-9C6C-FABCA09EB543} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_Desktop_Integration.cab
DPF: {93A85BE8-6137-4E48-BBC8-E78E27035DB0} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_HI_Client.cab
DPF: {CAFEEFAC-0014-0002-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
Hosts: 192.168.1.65 POETJE
============= SERVICES / DRIVERS ===============
R0 atiide;atiide;c:\windows\system32\drivers\atiide.sys [2004-8-24 5632]
R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2011-1-19 11608]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2011-1-19 135336]
R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2011-1-19 267944]
R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2011-1-19 61960]
R2 ns80503;ns80503;c:\windows\system32\ns80503.sys [2009-2-18 42296]
R2 nsverctl;NetScaler SSL VPN Version Control;c:\program files\netscaler\netscaler secure remote access\nsverctl.exe [2009-2-18 53248]
R3 Net6IM;Net6;c:\windows\system32\drivers\net6im51.sys [2009-2-18 43640]
R3 WPC54GSv1;Linksys Wireless Notebook Adapter WPC54GSv1 Driver;c:\windows\system32\drivers\WPC54GSv1.SYS [2006-11-30 610816]
S3 cpuz132;cpuz132;\??\c:\docume~1\robert~1.tos\locals~1\temp\cpuz132\cpuz132_x32.sys --> c:\docume~1\robert~1.tos\locals~1\temp\cpuz132\cpuz132_x32.sys [?]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;\??\c:\program files\common files\symantec shared\eengine\eraserutilrebootdrv.sys --> c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [?]
=============== Created Last 30 ================
2011-01-19 21:18:11 -------- d-----w- c:\docume~1\robert~1.tos\applic~1\Avira
2011-01-19 21:06:50 61960 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2011-01-19 21:06:45 -------- d-----w- c:\program files\Avira
2011-01-19 21:06:45 -------- d-----w- c:\docume~1\alluse~1\applic~1\Avira
2011-01-16 21:30:00 -------- d-----w- c:\program files\ESET
2011-01-16 19:48:23 -------- d-----w- C:\KeepDeletedItems
2011-01-16 16:11:24 -------- d-----w- c:\docume~1\robert~1.tos\applic~1\Malwarebytes
2011-01-16 16:11:14 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-01-16 16:11:13 -------- d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2011-01-16 16:11:10 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-01-16 16:11:10 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-01-09 04:16:30 -------- d-----w- c:\windows\system32\wbem\repository\FS
2011-01-09 04:16:30 -------- d-----w- c:\windows\system32\wbem\Repository
2011-01-09 03:38:07 -------- d-----w- c:\docume~1\alluse~1\applic~1\gCkNc07000
==================== Find3M ====================
2010-11-29 17:38:30 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
2010-11-29 17:38:30 69632 ----a-w- c:\windows\system32\QuickTime.qts
=================== ROOTKIT ====================
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: TOSHIBA_MK8032GAX rev.AD002D -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-3
device: opened successfully
user: MBR read successfully
Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8532B555]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x853317b0]; MOV EAX, [0x8533182c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E37C5] -> \Device\Harddisk0\DR0[0x85341030]
3 CLASSPNP[0xF7808FD7] -> nt!IofCallDriver[0x804E37C5] -> \Device\00000085[0x85375F18]
5 ACPI[0xF775F620] -> nt!IofCallDriver[0x804E37C5] -> [0x85376B58]
\Driver\atapi[0x8537FAA8] -> IRP_MJ_CREATE -> 0x8532B555
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV SI, 0x7be; MOV CL, 0x4; CMP [SI], CH; JL 0x2d; JNZ 0x3b; }
detected disk devices:
\Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskTOSHIBA_MK8032GAX_______________________AD002D__#5&1c50b25f&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
\Driver\atapi DriverStartIo -> 0x8532B39B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !
============= FINISH: 18:03:43.35 ===============
-
Attach.txt
UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT
DDS (Ver_10-12-12.02)
Microsoft Windows XP Professional
Boot Device: \Device\HarddiskVolume1
Install Date: 30/12/2008 13:45:01
System Uptime: 20/01/2011 17:54:08 (1 hours ago)
Motherboard: TOSHIBA | | Portable PC
Processor: Intel(R) Celeron(R) CPU 2.80GHz | mFCPGA | 2800/133mhz
==== Disk Partitions =========================
C: is FIXED (NTFS) - 75 GiB total, 37.252 GiB free.
D: is CDROM ()
==== Disabled Device Manager Items =============
==== System Restore Points ===================
No restore point in system.
==== Installed Programs ======================
Adobe Flash Player 10 ActiveX
Adobe Reader 9.3
Apple Application Support
Apple Mobile Device Support
Apple Software Update
Atheros Client Utility
Atheros Wireless LAN MiniPCI card Driver
ATI - Software Uninstall Utility
ATI Control Panel
ATI Display Driver
Avira AntiVir Personal - Free Antivirus
BitTorrent
Bonjour
BT Broadband Help
CD/DVD Drive Acoustic Silencer
Citrix Access Gateway Enterprise Edition
EPSON PhotoQuicker3.5
EPSON Print CD
EPSON PRINT Image Framer Tool2.1
EPSON Printer Software
ERUNT 1.1j
ESET Online Scanner v3
ESPR800 Referene Guide
ESPR800 Software Guide
FastStone Image Viewer 3.6
GearDrvs
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
Hotfix for Windows Media Format 11 SDK (KB929399)
Hotfix for Windows Media Player 11 (KB939683)
Hotfix for Windows XP (KB915800-v4)
Hotfix for Windows XP (KB952287)
Hotfix for Windows XP (KB954550-v5)
Hotfix for Windows XP (KB961118)
Hotfix for Windows XP (KB970653-v3)
Hotfix for Windows XP (KB976098-v2)
InterVideo WinDVD for Toshiba
iTunes
Java 2 Runtime Environment, SE v1.4.2_05
Macromedia Flash Player
Malwarebytes' Anti-Malware
Microsoft .NET Framework 1.1
Microsoft .NET Framework 1.1 Security Update (KB953297)
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft .NET Framework 3.5 SP1
Microsoft Base Smart Card Cryptographic Service Provider Package
Microsoft Compression Client Pack 1.0 for Windows XP
Microsoft Internationalized Domain Names Mitigation APIs
Microsoft Kernel-Mode Driver Framework Feature Pack 1.5
Microsoft National Language Support Downlevel APIs
Microsoft Office Professional Edition 2003
Microsoft Silverlight
Microsoft User-Mode Driver Framework Feature Pack 1.0
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
MobTime Cell Phone Manager V6.6.5
Motorola Driver Installation 3.2.0
Odyssey SDK
PCI 1620 Cardbus Controller and Software
PCI1620 Ultramedia Controller
PIF DESIGNER2.1
QuickTime
Realtek AC'97 Audio
REALTEK Gigabit and Fast Ethernet NIC Driver
ScanToWeb
Security Update for Step By Step Interactive Training (KB923723)
Security Update for Windows Internet Explorer 7 (KB938127-v2)
Security Update for Windows Internet Explorer 7 (KB938127)
Security Update for Windows Internet Explorer 7 (KB956390)
Security Update for Windows Internet Explorer 7 (KB958215)
Security Update for Windows Internet Explorer 7 (KB960714)
Security Update for Windows Internet Explorer 7 (KB961260)
Security Update for Windows Internet Explorer 7 (KB963027)
Security Update for Windows Internet Explorer 7 (KB969897)
Security Update for Windows Internet Explorer 7 (KB972260)
Security Update for Windows Internet Explorer 7 (KB974455)
Security Update for Windows Media Player (KB911564)
Security Update for Windows Media Player (KB952069)
Security Update for Windows Media Player (KB954155)
Security Update for Windows Media Player (KB968816)
Security Update for Windows Media Player (KB973540)
Security Update for Windows Media Player 11 (KB954154)
Security Update for Windows Media Player 6.4 (KB925398)
Security Update for Windows Media Player 9 (KB936782)
Security Update for Windows XP (KB923561)
Security Update for Windows XP (KB938464-v2)
Security Update for Windows XP (KB938464)
Security Update for Windows XP (KB941569)
Security Update for Windows XP (KB946648)
Security Update for Windows XP (KB950762)
Security Update for Windows XP (KB950974)
Security Update for Windows XP (KB951066)
Security Update for Windows XP (KB951376-v2)
Security Update for Windows XP (KB951698)
Security Update for Windows XP (KB951748)
Security Update for Windows XP (KB952004)
Security Update for Windows XP (KB952954)
Security Update for Windows XP (KB954211)
Security Update for Windows XP (KB954459)
Security Update for Windows XP (KB954600)
Security Update for Windows XP (KB955069)
Security Update for Windows XP (KB956391)
Security Update for Windows XP (KB956572)
Security Update for Windows XP (KB956744)
Security Update for Windows XP (KB956802)
Security Update for Windows XP (KB956803)
Security Update for Windows XP (KB956841)
Security Update for Windows XP (KB956844)
Security Update for Windows XP (KB957095)
Security Update for Windows XP (KB957097)
Security Update for Windows XP (KB958215)
Security Update for Windows XP (KB958644)
Security Update for Windows XP (KB958687)
Security Update for Windows XP (KB958690)
Security Update for Windows XP (KB958869)
Security Update for Windows XP (KB959426)
Security Update for Windows XP (KB960225)
Security Update for Windows XP (KB960714)
Security Update for Windows XP (KB960715)
Security Update for Windows XP (KB960803)
Security Update for Windows XP (KB960859)
Security Update for Windows XP (KB961371)
Security Update for Windows XP (KB961373)
Security Update for Windows XP (KB961501)
Security Update for Windows XP (KB968537)
Security Update for Windows XP (KB969059)
Security Update for Windows XP (KB969898)
Security Update for Windows XP (KB969947)
Security Update for Windows XP (KB970238)
Security Update for Windows XP (KB971486)
Security Update for Windows XP (KB971557)
Security Update for Windows XP (KB971633)
Security Update for Windows XP (KB971657)
Security Update for Windows XP (KB971961)
Security Update for Windows XP (KB973346)
Security Update for Windows XP (KB973354)
Security Update for Windows XP (KB973507)
Security Update for Windows XP (KB973525)
Security Update for Windows XP (KB973869)
Security Update for Windows XP (KB974112)
Security Update for Windows XP (KB974571)
Security Update for Windows XP (KB975025)
Security Update for Windows XP (KB975467)
SMSC IrCC V5.1.3600.3 SP1
SRS WOW XT Plug-In for Windows Media Player for Toshiba version 1.0.2
Synaptics Pointing Device Driver
TOSHIBA ConfigFree
TOSHIBA Console
TOSHIBA Controls
TOSHIBA Hotkey Utility for Display Devices
TOSHIBA Manuals
TOSHIBA PC Diagnostic Tool
TOSHIBA Power Saver
TOSHIBA Software Modem
TOSHIBA Utilities
TOSHIBA Zooming Utility
Touch and Launch
Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
Update for Windows Internet Explorer 7 (KB976749)
Update for Windows XP (KB943729)
Update for Windows XP (KB951978)
Update for Windows XP (KB955839)
Update for Windows XP (KB967715)
Update for Windows XP (KB968389)
Update for Windows XP (KB973687)
Update for Windows XP (KB973815)
WebFldrs XP
Windows Genuine Advantage Notifications (KB905474)
Windows Internet Explorer 7
Windows Media Format 11 runtime
Windows Media Player 11
Windows XP Service Pack 3
WinZip
Wireless-G Notebook Adapter
==== Event Viewer Messages From Past Week ========
19/01/2011 21:04:54, error: SideBySide [59] - Resolve Partial Assembly failed for Microsoft.VC90.CRT. Reference error message: The referenced assembly is not installed on your system. .
19/01/2011 21:04:54, error: SideBySide [59] - Generate Activation Context failed for C:\DOCUME~1\ROBERT~1.TOS\LOCALS~1\Temp\RarSFX0\redist.dll. Reference error message: The operation completed successfully. .
19/01/2011 21:04:54, error: SideBySide [32] - Dependent Assembly Microsoft.VC90.CRT could not be found and Last Error was The referenced assembly is not installed on your system.
19/01/2011 18:11:24, error: Service Control Manager [7034] - The Workstation service terminated unexpectedly. It has done this 1 time(s).
19/01/2011 18:11:24, error: Service Control Manager [7034] - The Network Location Awareness (NLA) service terminated unexpectedly. It has done this 1 time(s).
19/01/2011 18:11:24, error: Service Control Manager [7034] - The Network Connections service terminated unexpectedly. It has done this 1 time(s).
19/01/2011 18:11:24, error: Service Control Manager [7031] - The Network Access Protection Agent service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.
19/01/2011 18:11:24, error: Service Control Manager [7031] - The Help and Support service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 100 milliseconds: Restart the service.
19/01/2011 18:11:24, error: Service Control Manager [7031] - The Health Key and Certificate Management Service service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.
16/01/2011 17:47:37, error: sr [1] - The System Restore filter encountered the unexpected error '0xC0000001' while processing the file '' on the volume 'HarddiskVolume1'. It has stopped monitoring the volume.
16/01/2011 17:47:20, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: PCIIde
16/01/2011 14:43:20, error: atapi [9] - The device, \Device\Ide\IdePort0, did not respond within the timeout period.
16/01/2011 14:02:48, error: Service Control Manager [7034] - The Logical Disk Manager service terminated unexpectedly. It has done this 1 time(s).
16/01/2011 14:02:48, error: Service Control Manager [7034] - The Fast User Switching Compatibility service terminated unexpectedly. It has done this 1 time(s).
16/01/2011 14:02:48, error: Service Control Manager [7034] - The DHCP Client service terminated unexpectedly. It has done this 1 time(s).
16/01/2011 14:02:48, error: Service Control Manager [7034] - The Cryptographic Services service terminated unexpectedly. It has done this 1 time(s).
16/01/2011 14:02:48, error: Service Control Manager [7034] - The COM+ Event System service terminated unexpectedly. It has done this 1 time(s).
16/01/2011 12:02:51, error: Service Control Manager [7023] - The Windows Firewall/Internet Connection Sharing (ICS) service terminated with the following error: Access is denied.
16/01/2011 00:31:33, error: NIC1394 [5002] - 1394 Net Adapter #2 : Has determined that the adapter is not functioning properly.
15/01/2011 23:33:49, error: PSched [14103] - QoS [Adapter {61CDDA0E-D1FC-411D-B3E0-88E0DAB67413}]: The netcard driver failed the query for OID_GEN_LINK_SPEED.
15/01/2011 16:28:34, error: Service Control Manager [7023] - The COM Host service terminated with the following error: Catastrophic failure
15/01/2011 12:00:37, error: PSched [14103] - QoS [Adapter {0EB55893-35F8-43E6-8E4A-EA153AFA1B29}]: The netcard driver failed the query for OID_GEN_LINK_SPEED.
==== End Of File ===========================
-
AV Log
Avira AntiVir Personal
Report file date: 19 January 2011 21:22
Scanning for 2384044 virus strains and unwanted programs.
The program is running as an unrestricted full version.
Online services are available:
Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : TOSHA60RPP
Version information:
BUILD.DAT : 10.0.0.609 31824 Bytes 13/12/2010 09:43:00
AVSCAN.EXE : 10.0.3.5 435368 Bytes 13/12/2010 08:39:56
AVSCAN.DLL : 10.0.3.0 46440 Bytes 01/04/2010 12:57:04
LUKE.DLL : 10.0.3.2 104296 Bytes 13/12/2010 08:40:06
LUKERES.DLL : 10.0.0.1 12648 Bytes 10/02/2010 23:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 06/11/2009 09:05:36
VBASE001.VDF : 7.11.0.0 13342208 Bytes 14/12/2010 21:19:55
VBASE002.VDF : 7.11.0.1 2048 Bytes 14/12/2010 21:19:56
VBASE003.VDF : 7.11.0.2 2048 Bytes 14/12/2010 21:19:56
VBASE004.VDF : 7.11.0.3 2048 Bytes 14/12/2010 21:19:56
VBASE005.VDF : 7.11.0.4 2048 Bytes 14/12/2010 21:19:56
VBASE006.VDF : 7.11.0.5 2048 Bytes 14/12/2010 21:19:56
VBASE007.VDF : 7.11.0.6 2048 Bytes 14/12/2010 21:19:56
VBASE008.VDF : 7.11.0.7 2048 Bytes 14/12/2010 21:19:57
VBASE009.VDF : 7.11.0.8 2048 Bytes 14/12/2010 21:19:57
VBASE010.VDF : 7.11.0.9 2048 Bytes 14/12/2010 21:19:57
VBASE011.VDF : 7.11.0.10 2048 Bytes 14/12/2010 21:19:57
VBASE012.VDF : 7.11.0.11 2048 Bytes 14/12/2010 21:19:57
VBASE013.VDF : 7.11.0.52 128000 Bytes 16/12/2010 21:19:58
VBASE014.VDF : 7.11.0.91 226816 Bytes 20/12/2010 21:19:59
VBASE015.VDF : 7.11.0.122 136192 Bytes 21/12/2010 21:20:00
VBASE016.VDF : 7.11.0.156 122880 Bytes 24/12/2010 21:20:00
VBASE017.VDF : 7.11.0.185 146944 Bytes 27/12/2010 21:20:01
VBASE018.VDF : 7.11.0.228 132608 Bytes 30/12/2010 21:20:02
VBASE019.VDF : 7.11.1.5 148480 Bytes 03/01/2011 21:20:03
VBASE020.VDF : 7.11.1.37 156672 Bytes 07/01/2011 21:20:03
VBASE021.VDF : 7.11.1.65 140800 Bytes 10/01/2011 21:20:04
VBASE022.VDF : 7.11.1.87 225280 Bytes 11/01/2011 21:20:05
VBASE023.VDF : 7.11.1.124 125440 Bytes 14/01/2011 21:20:06
VBASE024.VDF : 7.11.1.155 132096 Bytes 17/01/2011 21:20:07
VBASE025.VDF : 7.11.1.156 2048 Bytes 17/01/2011 21:20:07
VBASE026.VDF : 7.11.1.157 2048 Bytes 17/01/2011 21:20:07
VBASE027.VDF : 7.11.1.158 2048 Bytes 17/01/2011 21:20:07
VBASE028.VDF : 7.11.1.159 2048 Bytes 17/01/2011 21:20:07
VBASE029.VDF : 7.11.1.160 2048 Bytes 17/01/2011 21:20:07
VBASE030.VDF : 7.11.1.161 2048 Bytes 17/01/2011 21:20:07
VBASE031.VDF : 7.11.1.182 111104 Bytes 19/01/2011 21:20:08
Engineversion : 8.2.4.148
AEVDF.DLL : 8.1.2.1 106868 Bytes 13/12/2010 08:39:51
AESCRIPT.DLL : 8.1.3.52 1282426 Bytes 19/01/2011 21:20:21
AESCN.DLL : 8.1.7.2 127349 Bytes 13/12/2010 08:39:50
AESBX.DLL : 8.1.3.2 254324 Bytes 13/12/2010 08:39:50
AERDL.DLL : 8.1.9.2 635252 Bytes 13/12/2010 08:39:50
AEPACK.DLL : 8.2.4.7 512375 Bytes 19/01/2011 21:20:19
AEOFFICE.DLL : 8.1.1.15 205178 Bytes 19/01/2011 21:20:18
AEHEUR.DLL : 8.1.2.66 3166582 Bytes 19/01/2011 21:20:17
AEHELP.DLL : 8.1.16.0 246136 Bytes 13/12/2010 08:39:42
AEGEN.DLL : 8.1.5.1 397683 Bytes 19/01/2011 21:20:10
AEEMU.DLL : 8.1.3.0 393589 Bytes 13/12/2010 08:39:42
AECORE.DLL : 8.1.19.0 196984 Bytes 13/12/2010 08:39:41
AEBB.DLL : 8.1.1.0 53618 Bytes 13/12/2010 08:39:41
AVWINLL.DLL : 10.0.0.0 19304 Bytes 13/12/2010 08:39:56
AVPREF.DLL : 10.0.0.0 44904 Bytes 13/12/2010 08:39:54
AVREP.DLL : 10.0.0.8 62209 Bytes 17/06/2010 14:27:13
AVREG.DLL : 10.0.3.2 53096 Bytes 13/12/2010 08:39:54
AVSCPLR.DLL : 10.0.3.2 84328 Bytes 13/12/2010 08:39:56
AVARKT.DLL : 10.0.22.6 231784 Bytes 13/12/2010 08:39:52
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 13/12/2010 08:39:53
SQLITE3.DLL : 3.6.19.0 355688 Bytes 17/06/2010 14:27:22
AVSMTP.DLL : 10.0.0.17 63848 Bytes 13/12/2010 08:39:56
NETNT.DLL : 10.0.0.0 11624 Bytes 17/06/2010 14:27:21
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 28/01/2010 13:10:20
RCTEXT.DLL : 10.0.58.0 97128 Bytes 13/12/2010 08:40:20
Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\Program Files\Avira\AntiVir Desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium
Start of the scan: 19 January 2011 21:22
Starting search for hidden objects.
c:\program files\synaptics\syntp\syntplpr.exe
c:\program files\synaptics\syntp\syntplpr.exe
[NOTE] The process is not visible.
The scan of running processes will be started
Scan process 'rsmsink.exe' - '34' Module(s) have been scanned
Scan process 'msdtc.exe' - '46' Module(s) have been scanned
Scan process 'dllhost.exe' - '66' Module(s) have been scanned
Scan process 'dllhost.exe' - '51' Module(s) have been scanned
Scan process 'vssvc.exe' - '54' Module(s) have been scanned
Scan process 'avscan.exe' - '76' Module(s) have been scanned
Scan process 'avcenter.exe' - '66' Module(s) have been scanned
Scan process 'taskmgr.exe' - '43' Module(s) have been scanned
Scan process 'ctfmon.exe' - '32' Module(s) have been scanned
Scan process 'TPSBattM.exe' - '30' Module(s) have been scanned
Scan process 'avgnt.exe' - '52' Module(s) have been scanned
Scan process 'iTunesHelper.exe' - '67' Module(s) have been scanned
Scan process 'PadExe.exe' - '44' Module(s) have been scanned
Scan process 'SmoothView.exe' - '25' Module(s) have been scanned
Scan process 'NDSTray.exe' - '72' Module(s) have been scanned
Scan process 'TPSMain.exe' - '42' Module(s) have been scanned
Scan process 'thotkey.exe' - '45' Module(s) have been scanned
Scan process 'AGRSMMSG.exe' - '25' Module(s) have been scanned
Scan process 'SynTPEnh.exe' - '33' Module(s) have been scanned
Scan process 'SynTPLpr.exe' - '28' Module(s) have been scanned
Scan process 'Explorer.EXE' - '110' Module(s) have been scanned
Scan process 'dmadmin.exe' - '33' Module(s) have been scanned
Scan process 'nsverctl.exe' - '27' Module(s) have been scanned
Scan process 'NICServ.exe' - '31' Module(s) have been scanned
Scan process 'avshadow.exe' - '33' Module(s) have been scanned
Scan process 'MDM.EXE' - '27' Module(s) have been scanned
Scan process 'iPodService.exe' - '36' Module(s) have been scanned
Scan process 'svchost.exe' - '40' Module(s) have been scanned
Scan process 'svchost.exe' - '40' Module(s) have been scanned
Scan process 'CFSvcs.exe' - '44' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '39' Module(s) have been scanned
Scan process 'avguard.exe' - '61' Module(s) have been scanned
Scan process 'alg.exe' - '39' Module(s) have been scanned
Scan process 'svchost.exe' - '36' Module(s) have been scanned
Scan process 'sched.exe' - '50' Module(s) have been scanned
Scan process 'spoolsv.exe' - '62' Module(s) have been scanned
Scan process 'svchost.exe' - '47' Module(s) have been scanned
Scan process 'svchost.exe' - '38' Module(s) have been scanned
Scan process 'ACS.exe' - '35' Module(s) have been scanned
Scan process 'svchost.exe' - '170' Module(s) have been scanned
Scan process 'svchost.exe' - '45' Module(s) have been scanned
Scan process 'svchost.exe' - '56' Module(s) have been scanned
Scan process 'lsass.exe' - '64' Module(s) have been scanned
Scan process 'services.exe' - '43' Module(s) have been scanned
Scan process 'winlogon.exe' - '73' Module(s) have been scanned
Scan process 'csrss.exe' - '14' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned
Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Starting to scan executable files (registry).
The registry was scanned ( '1668' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\B.jar-5835e3c9-3c0f8f6c.zip
[0] Archive type: ZIP
[DETECTION] Is the TR/ClassLoader.AR Trojan
--> mp1/p2/C.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.BW Java virus
--> mp1/p2/M.class
[DETECTION] Is the TR/ClassLoader.AR Trojan
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\blhuymaldvjue.jar-59d68fc8-3ff81520.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
--> a66d578f084.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
--> ab16db71cdc.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FH Java virus
--> ae28546890f.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FJ Java virus
--> af439f03798.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FK Java virus
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\brxsgtywiwcnk4.jar-d70c546-37b48ee0.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
--> a66d578f084.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
--> ab16db71cdc.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FH Java virus
--> ae28546890f.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FJ Java virus
--> af439f03798.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FK Java virus
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\cofrbofvfqcma3.jar-63286ab-4e9f9f35.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/OpenConnect.AI Java virus
--> bpac/purok.class
[DETECTION] Contains recognition pattern of the JAVA/OpenConnect.AI Java virus
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\cvgnhngobrdngq5.jar-64d63f84-1b9f5224.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/OpenConnect.CF Java virus
--> bpac/a.class
[DETECTION] Contains recognition pattern of the JAVA/OpenConnect.CF Java virus
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\des.jar-3f4a90d1-5e6e400a.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/Agent.BH Java virus
--> dev/s/AdgredY.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.BH Java virus
--> dev/s/DyesyasZ.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.GS Java virus
--> dev/s/LoaderX.class
[DETECTION] Contains recognition pattern of the JAVA/ClassLoader.BO Java virus
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ilirhzcvyqcrfme.jar-153eafeb-3812f852.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
--> a66d578f084.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
--> ab16db71cdc.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FH Java virus
--> ae28546890f.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FJ Java virus
--> af439f03798.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FK Java virus
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\j.jar-c0e2cd6-4800da7d.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/Dldr.Agent.W Java virus
--> CustomClass.class
[DETECTION] Contains recognition pattern of the JAVA/Rowindal.I Java virus
--> evilPolicy.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.SW exploit
--> dostuff.class
[DETECTION] Contains recognition pattern of the JAVA/Dldr.Agent.W Java virus
--> mosdef.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.WA exploit
--> SiteError.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0094.B exploit
--> xmo.ser
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-0094.A exploit
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmaudio.jar-306ea40d-4b27d295.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.GC exploit
--> vmain.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.GC exploit
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmseria.jar-2fd98af-5b96ed15.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.KM exploit
--> ________vload.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.KM exploit
--> vmain.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.ND exploit
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmsetfi.jar-681c415c-77749623.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.EH exploit
--> vmain.class
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.EH exploit
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\manluckybreak.jar-4f6929dd-28db29e6.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/ClassLoad.AF.2 Java virus
--> KAK/NED/NOD32.class
[DETECTION] Contains recognition pattern of the JAVA/ClassLoad.AF.2 Java virus
--> KAK/NED/sexxxy.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.25252 Java virus
--> KAK/NED/crime4u.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.9888 Java virus
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\smallrich.jar-5375884f-54c2a55f.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/Agent.M.3 Java virus
--> seopack.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.M.3 Java virus
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\yqhvcsgljoilx.jar-59e908ab-7415d730.zip
[0] Archive type: ZIP
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
--> a66d578f084.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
--> ab16db71cdc.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FH Java virus
--> ae28546890f.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FJ Java virus
--> af439f03798.class
[DETECTION] Contains recognition pattern of the JAVA/Agent.FK Java virus
Beginning disinfection:
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\yqhvcsgljoilx.jar-59e908ab-7415d730.zip
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
[NOTE] The file was moved to the quarantine directory under the name '4f137743.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\smallrich.jar-5375884f-54c2a55f.zip
[DETECTION] Contains recognition pattern of the JAVA/Agent.M.3 Java virus
[NOTE] The file was moved to the quarantine directory under the name '578358e0.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\manluckybreak.jar-4f6929dd-28db29e6.zip
[DETECTION] Contains recognition pattern of the JAVA/ClassLoad.AF.2 Java virus
[NOTE] The file was moved to the quarantine directory under the name '05e1021c.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmsetfi.jar-681c415c-77749623.zip
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.EH exploit
[NOTE] The file was moved to the quarantine directory under the name '63d74dc3.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmseria.jar-2fd98af-5b96ed15.zip
[DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.ND exploit
[NOTE] The file was moved to the quarantine directory under the name '265360fd.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmaudio.jar-306ea40d-4b27d295.zip
[DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.GC exploit
[NOTE] The file was moved to the quarantine directory under the name '5948529c.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\j.jar-c0e2cd6-4800da7d.zip
[DETECTION] Contains recognition pattern of the JAVA/Dldr.Agent.W Java virus
[NOTE] The file was moved to the quarantine directory under the name '15f57e9e.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ilirhzcvyqcrfme.jar-153eafeb-3812f852.zip
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
[NOTE] The file was moved to the quarantine directory under the name '69ec3e90.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\des.jar-3f4a90d1-5e6e400a.zip
[DETECTION] Contains recognition pattern of the JAVA/Agent.BH Java virus
[NOTE] The file was moved to the quarantine directory under the name '44bc11da.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\cvgnhngobrdngq5.jar-64d63f84-1b9f5224.zip
[DETECTION] Contains recognition pattern of the JAVA/OpenConnect.CF Java virus
[NOTE] The file was moved to the quarantine directory under the name '5de02a51.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\cofrbofvfqcma3.jar-63286ab-4e9f9f35.zip
[DETECTION] Contains recognition pattern of the JAVA/OpenConnect.AI Java virus
[NOTE] The file was moved to the quarantine directory under the name '31bf066a.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\brxsgtywiwcnk4.jar-d70c546-37b48ee0.zip
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
[NOTE] The file was moved to the quarantine directory under the name '40343ff8.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\blhuymaldvjue.jar-59d68fc8-3ff81520.zip
[DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
[NOTE] The file was moved to the quarantine directory under the name '4e1e0f25.qua'.
C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\B.jar-5835e3c9-3c0f8f6c.zip
[DETECTION] Is the TR/ClassLoader.AR Trojan
[NOTE] The file was moved to the quarantine directory under the name '0b097639.qua'.
End of the scan: 20 January 2011 06:17
Used time: 7:04:18 Hour(s)
The scan has been done completely.
16108 Scanned directories
4006367 Files were scanned
48 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
14 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
4006319 Files not concerned
34756 Archives were scanned
0 Warnings
14 Notes
495887 Objects were scanned with rootkit scan
1 Hidden objects were found
-
It looks like what Avira found and cleaned were some infected files in Java's cache. I'll be having you update to the latest Java and cleaning out Java's cache in future posts.
IMPORTANT I notice there are signs of one or more P2P (Person to Person) File Sharing Programs on your computer.
BitTorrent
I'd like you to read the Guidelines for P2P Programs where we explain why it's not a good idea to have them.
Also available here.
My recommendation is you go to Control Panel > Add/Remove Programs and uninstall the programs listed above (in red).
Step # 1: Download and Run ComboFix
Download ComboFix from any of the links below. You must rename it to Pluuf.exe before saving it. Save it to your Desktop.
Link 1
Link 2
--------------------------------------------------------------------
*Ensure you have disabled all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
Double click on Pluuf.exe & follow the prompts.
- When finished, it will produce a report for you.
- Please include C:\ComboFix.txt in your next reply so we can continue cleaning the system.
Note:
Do not mouseclick combofix's window while it's running. That may cause it to stall
Last edited by km2357; 2011-01-20 at 20:20.
-
I followed your instructions. I removed bittorrent, which I installed some six months ago, but never got working. Maybe just as well.
I re-downloaded combofix and renamed it pluuf.exe before saving, and also deleted the original download. I ran it and followed all instructions. The next few posts will have the GMER which I ran earlier and the combofix log.
Google is still re-routing, svchost is quiet thusfar.
-
GMER
GMER 1.0.15.15530 - http://www.gmer.net
Rootkit quick scan 2011-01-20 18:18:51
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdePort0 TOSHIBA_MK8032GAX rev.AD002D
Running: gmer.exe; Driver: C:\DOCUME~1\ROBERT~1.TOS\LOCALS~1\Temp\uwldrkow.sys
---- Disk sectors - GMER 1.0.15 ----
Disk \Device\Harddisk0\DR0 sector 62: rootkit-like behavior;
Disk \Device\Harddisk0\DR0 sector 63: rootkit-like behavior;
---- Devices - GMER 1.0.15 ----
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort0 8532B39B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort1 8532B39B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP1T0L0-e 8532B39B
Device \Driver\Tcpip \Device\Ip ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
Device \Driver\Tcpip \Device\Tcp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
Device \Driver\Tcpip \Device\Udp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
Device \Driver\Tcpip \Device\RawIp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
Device \Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskTOSHIBA_MK8032GAX_______________________AD002D__#5&1c50b25f&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
---- EOF - GMER 1.0.15 ----
GMER 1.0.15.15530 - http://www.gmer.net
Rootkit scan 2011-01-20 21:51:59
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdePort0 TOSHIBA_MK8032GAX rev.AD002D
Running: gmer.exe; Driver: C:\DOCUME~1\ROBERT~1.TOS\LOCALS~1\Temp\uwldrkow.sys
---- System - GMER 1.0.15 ----
SSDT EF86FB76 ZwCreateKey
SSDT EF86FB6C ZwCreateThread
SSDT EF86FB7B ZwDeleteKey
SSDT EF86FB85 ZwDeleteValueKey
SSDT EF86FB8A ZwLoadKey
SSDT EF86FB58 ZwOpenProcess
SSDT EF86FB5D ZwOpenThread
SSDT EF86FB94 ZwReplaceKey
SSDT EF86FB8F ZwRestoreKey
SSDT EF86FB80 ZwSetValueKey
---- Kernel code sections - GMER 1.0.15 ----
init C:\WINDOWS\system32\drivers\ALCXSENS.SYS entry point in "init" section [0xEB450900]
.text tcpip.sys!ARPRcv + 1D69 B6F6A41E 5 Bytes JMP EF8D52E0 \??\C:\WINDOWS\system32\ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
? C:\DOCUME~1\ROBERT~1.TOS\LOCALS~1\Temp\mbr.sys The system cannot find the file specified. !
---- User code sections - GMER 1.0.15 ----
.text C:\WINDOWS\Explorer.EXE[2044] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00C2000A
.text C:\WINDOWS\Explorer.EXE[2044] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00CC000A
.text C:\WINDOWS\Explorer.EXE[2044] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00B7000C
.text C:\WINDOWS\System32\svchost.exe[3660] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00CB000A
.text C:\WINDOWS\System32\svchost.exe[3660] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00CC000A
.text C:\WINDOWS\System32\svchost.exe[3660] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00CA000C
.text C:\WINDOWS\System32\svchost.exe[3660] ole32.dll!CoCreateInstance 7750057E 5 Bytes JMP 00E1000A
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00D5000A
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00D6000A
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00D4000C
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E1DF4B9 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E351FF7 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E351F78 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E351FBC C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E351F04 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E351F3E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E352032 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E2017EA C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3680] ole32.dll!OleLoadFromStream 77529C85 5 Bytes JMP 3E3521F4 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
---- Devices - GMER 1.0.15 ----
Device \Driver\Tcpip \Device\Ip ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
Device \Driver\Tcpip \Device\Tcp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort0 8532B39B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort1 8532B39B
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP1T0L0-e 8532B39B
Device \Driver\Tcpip \Device\Udp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
Device \Driver\Tcpip \Device\RawIp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
Device \Driver\Tcpip \Device\IPMULTICAST ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
Device \Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskTOSHIBA_MK8032GAX_______________________AD002D__#5&1c50b25f&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
---- Disk sectors - GMER 1.0.15 ----
Disk \Device\Harddisk0\DR0 sector 62: rootkit-like behavior;
Disk \Device\Harddisk0\DR0 sector 63: rootkit-like behavior;
---- EOF - GMER 1.0.15 ----
-
ComboFix 11-01-19.04 - Robert Prinsen 20/01/2011 22:51:16.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.447.136 [GMT 0:00]
Running from: c:\documents and settings\Robert Prinsen.TOSHA60RPP\Desktop\Pluuf.exe
AV: AntiVir Desktop *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
.
((((((((((((((((((((((((( Files Created from 2010-12-20 to 2011-01-20 )))))))))))))))))))))))))))))))
.
2011-01-19 21:18 . 2011-01-19 21:18 -------- d-----w- c:\documents and settings\Robert Prinsen.TOSHA60RPP\Application Data\Avira
2011-01-19 21:06 . 2010-12-13 08:40 61960 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2011-01-19 21:06 . 2010-12-13 08:40 135096 ----a-w- c:\windows\system32\drivers\avipbb.sys
2011-01-19 21:06 . 2010-06-17 14:27 45416 ----a-w- c:\windows\system32\drivers\avgntdd.sys
2011-01-19 21:06 . 2010-06-17 14:27 22360 ----a-w- c:\windows\system32\drivers\avgntmgr.sys
2011-01-19 21:06 . 2011-01-19 21:06 -------- d-----w- c:\program files\Avira
2011-01-19 21:06 . 2011-01-19 21:06 -------- d-----w- c:\documents and settings\All Users\Application Data\Avira
2011-01-16 21:30 . 2011-01-16 21:30 -------- d-----w- c:\program files\ESET
2011-01-16 19:48 . 2011-01-16 19:48 -------- d-----w- C:\KeepDeletedItems
2011-01-16 16:11 . 2011-01-16 16:11 -------- d-----w- c:\documents and settings\Robert Prinsen.TOSHA60RPP\Application Data\Malwarebytes
2011-01-16 16:11 . 2010-12-20 18:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-01-16 16:11 . 2011-01-16 16:11 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-01-16 16:11 . 2011-01-16 16:11 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-01-16 16:11 . 2010-12-20 18:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-01-16 13:37 . 2011-01-16 13:37 -------- d-----w- c:\program files\ERUNT
2011-01-12 23:09 . 2011-01-12 23:10 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2011-01-12 20:38 . 2011-01-12 20:38 -------- d-----w- c:\documents and settings\Robert\Application Data\Apple Computer
2011-01-12 20:38 . 2011-01-12 20:38 -------- d-----w- c:\documents and settings\Robert\Local Settings\Application Data\Apple Computer
2011-01-09 04:16 . 2011-01-09 04:16 -------- d-----w- c:\windows\system32\wbem\Repository
2011-01-09 03:38 . 2011-01-09 04:16 -------- d-----w- c:\documents and settings\All Users\Application Data\gCkNc07000
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-11-29 17:38 . 2010-11-29 17:38 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
2010-11-29 17:38 . 2010-11-29 17:38 69632 ----a-w- c:\windows\system32\QuickTime.qts
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPLpr"="c:\program files\Synaptics\SynTP\SynTPLpr.exe" [2004-04-22 98304]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2004-04-22 507904]
"AGRSMMSG"="AGRSMMSG.exe" [2004-02-20 88363]
"THotkey"="c:\program files\Toshiba\Toshiba Applet\thotkey.exe" [2004-08-16 430080]
"TPSMain"="TPSMain.exe" [2004-08-11 266240]
"NDSTray.exe"="NDSTray.exe" [BU]
"SmoothView"="c:\program files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe" [2004-04-27 118784]
"PadTouch"="c:\program files\TOSHIBA\PadTouch\PadExe.exe" [2004-02-12 1019904]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-12-22 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-12-11 948672]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-11-29 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-12-13 421160]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2010-12-13 281768]
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
R0 atiide;atiide;c:\windows\system32\drivers\atiide.sys [24/08/2004 09:52 5632]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [19/01/2011 21:06 135336]
R2 ns80503;ns80503;c:\windows\system32\ns80503.sys [18/02/2009 23:50 42296]
R2 nsverctl;NetScaler SSL VPN Version Control;c:\program files\NetScaler\NetScaler Secure Remote Access\nsverctl.exe [18/02/2009 23:50 53248]
R3 Net6IM;Net6;c:\windows\system32\drivers\net6im51.sys [18/02/2009 23:50 43640]
R3 WPC54GSv1;Linksys Wireless Notebook Adapter WPC54GSv1 Driver;c:\windows\system32\drivers\WPC54GSv1.SYS [30/11/2006 22:54 610816]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;\??\c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys --> c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [?]
.
Contents of the 'Scheduled Tasks' folder
.
.
------- Supplementary Scan -------
.
uInternet Settings,ProxyOverride = 127.0.0.1;*.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
DPF: {04897B74-BBBE-46E5-9550-5C487F39C2E4} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_OutBound_mail.cab
DPF: {8C244272-1DC1-4CE7-9C6C-FABCA09EB543} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_Desktop_Integration.cab
DPF: {93A85BE8-6137-4E48-BBC8-E78E27035DB0} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_HI_Client.cab
.
- - - - ORPHANS REMOVED - - - -
WebBrowser-{5B291E6C-9A74-4034-971B-A4B007A0B315} - (no file)
HKCU-Run-DriverUpdaterPro - c:\program files\iXi Tools\Driver Updater Pro\DriverUpdaterPro.exe
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-01-20 23:11
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: TOSHIBA_MK8032GAX rev.AD002D -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-3
device: opened successfully
user: MBR read successfully
Disk trace:
called modules: ntoskrnl.exe catchme.sys CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8532C555]<<
c:\docume~1\ROBERT~1.TOS\LOCALS~1\Temp\catchme.sys
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x853327b0]; MOV EAX, [0x8533282c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E37C5] -> \Device\Harddisk0\DR0[0x85375030]
3 CLASSPNP[0xF7808FD7] -> nt!IofCallDriver[0x804E37C5] -> \Device\00000086[0x85390F18]
5 ACPI[0xF775F620] -> nt!IofCallDriver[0x804E37C5] -> [0x853427F8]
\Driver\atapi[0x85369F38] -> IRP_MJ_CREATE -> 0x8532C555
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV SI, 0x7be; MOV CL, 0x4; CMP [SI], CH; JL 0x2d; JNZ 0x3b; }
detected disk devices:
\Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskTOSHIBA_MK8032GAX_______________________AD002D__#5&1c50b25f&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
\Driver\atapi DriverStartIo -> 0x8532C39B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
- - - - - - - > 'winlogon.exe'(688)
c:\windows\system32\WININET.dll
c:\windows\system32\Ati2evxx.dll
- - - - - - - > 'lsass.exe'(748)
c:\windows\system32\WININET.dll
.
Completion time: 2011-01-20 23:17:01
ComboFix-quarantined-files.txt 2011-01-20 23:16
Pre-Run: 39,864,868,864 bytes free
Post-Run: 40,400,457,728 bytes free
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
- - End Of File - - F55A53EE277088A6BB40D5E8FFCFBE72
-
svchost is still coming in and hogging the cpu.
One other problem I had with IExplorer has disappeared, and that is, it would not start properly, and I needed to register, which it could not do. That happened after a microsoft upgrade, after which I disabled the auto updates.
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules