1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

[Active] virus or not?

Discussion in 'Spyware, Adware, Viruses and Malware Removal' started by andy.d, Jan 24, 2010.

  1. andy.d

    andy.d Established Techie7 Member

    could you please check this file for me. when i run AVG anti-virus it always leaves this file and i connot delete or move to my virus vault.please check because i am worried in case it is a virus or a spyware "C:\Windows\Temp\TMP0000000DED0A4B6CFC3404A5"; "The file is signed with a broken digital signature, issued by: Microsoft Corporation.";""
    thanks very much. andy.d
    Logfile of Trend Micro HijackThis v2.0.3 (BETA)
    Scan saved at 12:58:58, on 24/01/2010
    Platform: Windows Vista SP2 (WinNT 6.00.1906)
    MSIE: Internet Explorer v8.00 (8.00.6001.18882)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Windows\RtHDVCpl.exe
    C:\Program Files\eBay\eBay Toolbar2\eBayTBDaemon.exe
    C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe
    C:\Program Files\AVG\AVG9\avgtray.exe
    C:\Program Files\Windows Live\Messenger\msnmsgr.exe
    C:\Program Files\Registry Mechanic\RMTray.exe
    C:\Program Files\Windows Media Player\wmpnscfg.exe
    C:\Windows\system32\wbem\unsecapp.exe
    C:\Program Files\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Google\Google Toolbar\GoogleToolbarUser_32.exe
    C:\Program Files\Windows Live\Toolbar\wltuser.exe
    C:\Windows\system32\Macromed\Flash\FlashUtil10b.exe
    C:\Program Files\windows defender\MSASCui.exe
    C:\Program Files\HijackThis\TrendMicro\HiJackThis\HiJackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = Bing
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = Bing
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = Bing
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = Bing:
    R3 - URLSearchHook: AVG Security Toolbar BHO - {A3BC75A2-1F87-4686-AA43-5347D756017C} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    R3 - URLSearchHook: (no name) - *{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
    F2 - REG:system.ini: UserInit=C:\Windows\system32\Userinit.exe
    O1 - Hosts: ::1 localhost
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: eBay Toolbar Helper - {22D8E815-4A5E-4DFB-845E-AAB64207F5BD} - C:\Program Files\eBay\eBay Toolbar2\eBayTB.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
    O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O2 - BHO: AVG Security Toolbar BHO - {A3BC75A2-1F87-4686-AA43-5347D756017C} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.4.4525.1752\swg.dll
    O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
    O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O3 - Toolbar: AVG Security Toolbar - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    O3 - Toolbar: eBay Toolbar - {92085AD4-F48A-450D-BD93-B28CC7DF67CE} - C:\Program Files\eBay\eBay Toolbar2\eBayTB.dll
    O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
    O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
    O4 - HKLM\..\Run: [eBayToolbar] C:\Program Files\eBay\eBay Toolbar2\eBayTBDaemon.exe
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [Google Quick Search Box] "C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe" /autorun
    O4 - HKLM\..\Run: [AVG9_TRAY] C:\PROGRA~1\AVG\AVG9\avgtray.exe
    O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
    O4 - HKCU\..\Run: [RegistryMechanic] C:\Program Files\Registry Mechanic\RMTray.exe /H
    O4 - HKCU\..\Run: [PPAP] C:\ProgramData\PPLiveVA\Application\PPAP.exe
    O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
    O8 - Extra context menu item: eBay Search - res://C:\Program Files\eBay\eBay Toolbar2\eBayTb.dll/RCSearch.html
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
    O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
    O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
    O13 - Gopher Prefix:
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O16 - DPF: {EF0D1A14-1033-41A2-A589-240C01EDC078} (PPLive Lite Class) - http://dl.pplive.com/PluginSetup.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG9\avgpp.dll
    O20 - AppInit_DLLs: avgrsstx.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
    O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
    O23 - Service: AVG E-mail Scanner (avg9emc) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgemc.exe
    O23 - Service: AVG WatchDog (avg9wd) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgwdsvc.exe
    O23 - Service: AVG9IDSAgent (AVGIDSAgent) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe
    O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
    O23 - Service: Google Update Service (gupdate1ca22fbc78c82e9) (gupdate1ca22fbc78c82e9) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

    --
    End of file - 7375 bytesAdobe Reader 8.1.2
    ArcSoft PhotoImpression 4
    ArcSoft Software Suite
    ATI Uninstaller
    AVG 9.0
    BT Home Hub
    eBay Toolbar
    Google Chrome
    Google Earth
    Google Toolbar for Internet Explorer
    Google Toolbar for Internet Explorer
    Google Update Helper
    Google Updater
    HijackThis 2.0.2
    Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
    Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
    Junk Mail filter update
    Media Player Utilities 1.58
    Microsoft .NET Framework 3.5 SP1
    Microsoft .NET Framework 3.5 SP1
    Microsoft Choice Guard
    Microsoft Search Enhancement Pack
    Microsoft Silverlight
    Microsoft SQL Server 2005 Compact Edition [ENU]
    Microsoft Sync Framework Runtime Native v1.0 (x86)
    Microsoft Sync Framework Services Native v1.0 (x86)
    Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
    Microsoft Visual C++ 2005 Redistributable
    Microsoft Works
    Motorola Driver Installation 3.7.0
    MSVCRT
    MSXML 4.0 SP2 (KB936181)
    MSXML 4.0 SP2 (KB941833)
    MSXML 4.0 SP2 (KB954430)
    MSXML 4.0 SP2 (KB973688)
    Nero 7 Essentials
    PCI Soft Data Fax Modem with SmartCP
    RealPlayer
    Realtek High Definition Audio Driver
    Registry Mechanic 8.0
    Sony Ericsson Media Manager 1.2
    Sony Ericsson PC Suite 4.010.00
    Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
    Windows Live Call
    Windows Live Communications Platform
    Windows Live Essentials
    Windows Live Essentials
    Windows Live Family Safety
    Windows Live Mail
    Windows Live Messenger
    Windows Live Movie Maker
    Windows Live Photo Gallery
    Windows Live Sign-in Assistant
    Windows Live Sync
    Windows Live Toolbar
    Windows Live Upload Tool
    Windows Live Writer
     
  2. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    Print these instructions out.

    NOTE. If any of the programs listed below refuse to run, try renaming executive file to something else; for instance, rename hijackthis.exe to scanner.exe

    ***VERY IMPORTANT! Make sure, you update Superantispyware, and Malwarebytes before running the scans.***

    STEP 1. Download SUPERAntiSpyware Free for Home Users:
    SUPERAntiSpyware.com | Remove Malware | Remove Spyware - AntiMalware, AntiSpyware, AntiAdware!

    * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    * An icon will be created on your desktop. Double-click that icon to launch the program.
    * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: SUPERAntiSpyware.com - Database Definition Information.)
    * Close SUPERAntiSpyware.

    PHYSICALLY DISCONNECT FROM THE INTERNET

    Restart computer in Safe Mode.
    To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

    * Open SUPERAntiSpyware.
    * Click Scan your Computer... button.
    * Click Scanning Preferences/Control Center... button.
    * Under General and Startup tab, make sure, Start SUPERAntiSpyware when Windows starts option is UN-checked.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all others unchecked):

    • Close browsers before scanning.
    • Terminate memory threats before quarantining.

    * Click the Close button to leave the control center screen.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, choose Perform Complete Scan.
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click OK.
    * Make sure everything has a checkmark next to it and click Next.
    * A notification will appear that Quarantine and Removal is Complete. Click OK and then click the Finish button to return to the main menu.
    * If asked if you want to reboot, click Yes.
    * To retrieve the removal information after reboot, launch SUPERAntispyware again.

    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.

    * Click Close to exit the program.
    Post SUPERAntiSpyware log.

    RECONNECT TO THE INTERNET

    RESTART COMPUTER!

    STEP 2. Download Malwarebytes' Anti-Malware: Malwarebytes.org to your desktop.
    (Malwarebytes is free to use as a manual scanner. Payment is only required if you wish to have it run and update automatically which is not necessary for our purposes)

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform full scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    STEP 3. Download GMER: GMER - Rootkit Detector and Remover, by clicking on Download EXE button.
    Alternative downloads:
    - |MG| GMER 1.0.15.15281 Download
    - http://www.softpedia.com/get/Interne...ers/GMER.shtml
    Double click on downloaded .exe file, select Rootkit tab and click the Scan button.
    When scan is completed, click Save button, and save the results as gmer.log
    Warning ! Please, do not select the "Show all" checkbox during the scan.
    Post the log to your next reply.

    RESTART COMPUTER

    STEP 4.
    Post fresh HijackThis log.
    NOTE. If you're using Vista, or 7, right click on HijackThis, and click Run as Administrator
    Do NOT attempt to "fix" anything!


    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  3. andy.d

    andy.d Established Techie7 Member

    SUPERAntiSpyware Scan Log
    SUPERAntiSpyware.com | Remove Malware | Remove Spyware - AntiMalware, AntiSpyware, AntiAdware!

    Generated 01/31/2010 at 01:37 PM

    Application Version : 4.33.1000

    Core Rules Database Version : 4446
    Trace Rules Database Version: 1978

    Scan type : Complete Scan
    Total Scan Time : 00:44:26

    Memory items scanned : 272
    Memory threats detected : 0
    Registry items scanned : 6385
    Registry threats detected : 127
    File items scanned : 30342
    File threats detected : 307

    Adware.MyWebSearch
    HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D}
    HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA1-A523-4961-B6BB-170DE4475CCA}
    HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA9-A523-4961-B6BB-170DE4475CCA}
    HKU\S-1-5-21-3799323236-594776956-3386141147-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D}
    HKU\S-1-5-21-3799323236-594776956-3386141147-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA1-A523-4961-B6BB-170DE4475CCA}
    HKU\S-1-5-21-3799323236-594776956-3386141147-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA9-A523-4961-B6BB-170DE4475CCA}
    HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D}
    HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA1-A523-4961-B6BB-170DE4475CCA}
    HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA9-A523-4961-B6BB-170DE4475CCA}

    Adware.Tracking Cookie
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@imrworldwide[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@surveymonkey.122.2o7[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@adviva[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@247realmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@specificclick[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@atdmt[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@mediaplex[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@adtech[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@content.yieldmanager[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@doubleclick[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@advertising[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@apmebf[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@wsclick.infospace[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@ad.yieldmanager[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@bs.serving-sys[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@adbrite[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@tacoda[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@ipcmedia.122.2o7[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@at.atwola[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@questionmarket[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@serving-sys[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@adserver.adtechus[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@serving-sys[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@atdmt[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@tradedoubler[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@apmebf[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@content.yieldmanager[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@content.yieldmanager[3].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@adviva[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@at.atwola[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@super.kitnmedia[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@cdn5.specificclick[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@247realmedia[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@ad.yieldmanager[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@adtech[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@advertising[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@bs.serving-sys[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@doubleclick[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@fastclick[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@imrworldwide[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@lfstmedia[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@mediaplex[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@msnportal.112.2o7[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@questionmarket[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@revsci[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@socialmedia[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@specificclick[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@tacoda[2].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@virginmedia[1].txt
    C:\Users\Andy\AppData\Local\Temp\Low\Cookies\andy@www.virginmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@specificclick[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@www.mediasoftwareapps[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@smileycentral[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@www.googleadservices[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@mywebsearch[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@windowsmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\andy@www.windowsmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.footballmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@specificclick[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@specificclick[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@specificclick[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.pushtrack[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tracking.oxdevelopment[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tribalddb.122.2o7[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@122.2o7[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tribalfusion[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.football.virginmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@msnportal.112.2o7[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ad.zanox[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.adap[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@readersdigest.122.2o7[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@serving-sys[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@serving-sys[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@royalmail.112.2o7[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@playgames.virginmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.clicksafe.lloydstsb[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tracking.dc-storm[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.burstnet[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@visitorcounterstds[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ehg-autotrader.hitbox[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6wjlocndjoao.stats.esomniture[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@serving-sys[6].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@serving-sys[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@serving-sys[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@click.tvprocessing[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6waloalajslp.stats.esomniture[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@stat.onestat[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@medicalmayhem.xpdmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@msnaccountservices.112.2o7[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@track.adform[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@dc.tremormedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@jibjab.112.2o7[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@adserve.tescofinance[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@statsadv.dada[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@clickaider[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@atdmt[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.pointroll[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@wsclick.infospace[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@azjmp[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@mail.virginmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia[10].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@syndication1.viraladnetwork[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tradedoubler[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia[11].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@server.lon.liveperson[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@server.lon.liveperson[6].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@server.lon.liveperson[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@server.lon.liveperson[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tradedoubler[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@a.websponsors[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@a.websponsors[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@mediaplex[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tradedoubler[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@smartadserver[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@fls.doubleclick[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ipt.advertserve[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@advertising[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@advertising[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.telegraph.co[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ehg-bbc.hitbox[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.lockedonmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.ad4game[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@apmebf[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@content.yieldmanager[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@advertising[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@advertising[6].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@advertising[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@advertising[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@stat.dealtime[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@content.yieldmanager[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@content.yieldmanager[6].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6wflokjcjmfq.stats.esomniture[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.ozonemedia.co[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@gostarmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@doubleclick[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@content.yieldmanager[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@content.yieldmanager[7].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@adtech[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@247realmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.warmnetworks[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia[6].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@content.yieldmanager[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@emediate[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@adviva[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6wfkywiajcbo.stats.esomniture[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@adviva[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@beta-test.kitnmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.gamesbannernet[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.googleadservices[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.googleadservices[6].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.virginmedia[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.virginmedia[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.virginmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.virginmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.itrafficads[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ad1.emediate[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.googleadservices[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@lockedonmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@dynamic.media.adrevolver[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@adviva[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@doubleclick[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tripod[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia[7].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@fastclick[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.googleadservices[8].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@advancedsearch.virginmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@adviva[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia[9].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia[8].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.googleadservices[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.googleadservices[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.googleadservices[9].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6wmkoknczgep.stats.esomniture[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@track.easyaffiliate.co[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.audience2media[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@at.atwola[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@socialmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@statcounter[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@adlegend01[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@clickbank[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@lfstmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@lfstmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@media.mtvnservices[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@nmgtracker[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6wdmykgdjmco.stats.esomniture[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@media6degrees[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@eu-traffic[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@mediametrics.mpsa[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@insightexpressai[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@media.causes[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@search.virginmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@paypal.112.2o7[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@audience2media[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@statse.webtrendslive[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@r.unicornmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@bs.serving-sys[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ehg-logantod.hitbox[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ad.yieldmanager[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ad.yieldmanager[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ad.yieldmanager[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ad.yieldmanager[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@super.kitnmedia[6].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@super.kitnmedia[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@super.kitnmedia[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@super.kitnmedia[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@super.kitnmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@super.kitnmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.burstbeacon[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@overture[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ad.uk.doubleclick[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@bs.serving-sys[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@bs.serving-sys[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tracking.summitmedia.co[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@statse.webtrendslive[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@we7.adbureau[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6wjk4qncpwkq.stats.esomniture[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@bs.serving-sys[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6wjnyglcjckp.stats.esomniture[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.linktrack66[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@amazonms.122.2o7[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@super.kitnmedia[8].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@super.kitnmedia[7].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@allyours.virginmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@account.live[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@track.webtrekk[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.backads[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@www.inteletrack[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6wjnyopcjkep.stats.esomniture[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@cdn5.specificclick[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@mysso.virginmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@linksynergy[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ehg-wssuk.hitbox[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6wnkownc5agp.stats.esomniture[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@movies.virginmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@112.2o7[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ad1.adtitan[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@adbrite[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@adfarm1.adition[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@admse013.adbureau[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.audxch[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.foodbuzz[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.smowtion[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@ads.uknetguide.co[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@adserver.adtechus[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@adxpose[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@btstraffic[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@burstnet[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@casalemedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@chitika[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@dmtracker[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6wfkiokcpocp.stats.esomniture[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6whkiokcjilq.stats.esomniture[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@e-2dj6wjl4wpcpego.stats.esomniture[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@eas.apm.emediate[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@excite-uk.ads.trackset[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@handpickedmedia.co[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@imrworldwide[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@invitemedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@kontera[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@media.adrevolver[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@mediaplex[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@movieguide.virginmedia[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@my.virginmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@precisionclick[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@premiumtv.122.2o7[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@questionmarket[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@questionmarket[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@revsci[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@revsci[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@revsci[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@revsci[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@revsci[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@revsci[6].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@server.iad.liveperson[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@server.lon.liveperson[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@stats.paypal[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@stats.zyyne[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tacoda[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tacoda[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tacoda[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tacoda[4].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tacoda[5].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tacoda[7].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@tacoda[8].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@trinitymirror.112.2o7[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@uk.at.atwola[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@vc-mvt-pixel-80.ak-networks[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@viacom.adbureau[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia.112.2o7[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia[2].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@virginmedia[3].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@webtracking.touchclarity[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@xiti[1].txt
    C:\Users\Andy\AppData\Roaming\Microsoft\Windows\Cookies\Low\andy@zedo[2].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@mywebsearch[2].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@apmebf[1].txt

    Adware.MyWebSearch/FunWebProducts
    HKLM\SOFTWARE\Fun Web Products
    HKLM\SOFTWARE\Fun Web Products#JpegConversionLib
    HKLM\SOFTWARE\Fun Web Products\ScreenSaver
    HKLM\SOFTWARE\Fun Web Products\ScreenSaver#ImagesDir
    HKLM\SOFTWARE\Fun Web Products\Settings
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#BuddyTextNone.numActive
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#BuddyTextNone.0
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#BuddyFreqNone
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#BuddyTextUninstalled.numActive
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#BuddyTextUninstalled.0
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#BuddyFreqUninstalled
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#MSN.numActive
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#MSN.numActive2
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#MSN.1
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#MSN.2
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#MSN.3
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#MSN.4
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#MSN.5
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#MSN.6
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#MSN.7
    HKLM\SOFTWARE\Fun Web Products\Settings\Promos#MSN.8
    HKU\S-1-5-21-3799323236-594776956-3386141147-1000\SOFTWARE\FunWebProducts
    HKLM\SOFTWARE\FunWebProducts
    HKLM\SOFTWARE\FunWebProducts\Installer
    HKLM\SOFTWARE\FunWebProducts\Installer#Dir
    HKLM\SOFTWARE\FunWebProducts\Installer#CurInstall
    HKLM\SOFTWARE\FunWebProducts\Installer#sr
    HKLM\SOFTWARE\FunWebProducts\Installer#pl
    HKU\.DEFAULT\SOFTWARE\MyWebSearch
    HKU\S-1-5-21-3799323236-594776956-3386141147-1000\SOFTWARE\MyWebSearch
    HKU\S-1-5-18\SOFTWARE\MyWebSearch
    HKLM\SOFTWARE\MyWebSearch
    HKLM\SOFTWARE\MyWebSearch\bar
    HKLM\SOFTWARE\MyWebSearch\bar#pid
    HKLM\SOFTWARE\MyWebSearch\bar#fwp
    HKLM\SOFTWARE\MyWebSearch\bar#mwsask
    HKLM\SOFTWARE\MyWebSearch\bar#tiec
    HKLM\SOFTWARE\MyWebSearch\bar#Dir
    HKLM\SOFTWARE\MyWebSearch\bar#PluginPath
    HKLM\SOFTWARE\MyWebSearch\bar#UninstallString
    HKLM\SOFTWARE\MyWebSearch\bar#Id
    HKLM\SOFTWARE\MyWebSearch\bar#CurInstall
    HKLM\SOFTWARE\MyWebSearch\bar#SettingsDir
    HKLM\SOFTWARE\MyWebSearch\bar#sr
    HKLM\SOFTWARE\MyWebSearch\bar#pl
    HKLM\SOFTWARE\MyWebSearch\bar#HistoryDir
    HKLM\SOFTWARE\MyWebSearch\SearchAssistant
    HKLM\SOFTWARE\MyWebSearch\SearchAssistant#pid
    HKLM\SOFTWARE\MyWebSearch\SearchAssistant#fwp
    HKLM\SOFTWARE\MyWebSearch\SearchAssistant#mwsask
    HKLM\SOFTWARE\MyWebSearch\SearchAssistant#Dir
    HKLM\SOFTWARE\MyWebSearch\SearchAssistant#esh
    HKLM\SOFTWARE\MyWebSearch\SearchAssistant#lsp
    HKLM\SOFTWARE\MyWebSearch\SearchAssistant#Id
    HKLM\SOFTWARE\MyWebSearch\SearchAssistant#CurInstall
    HKLM\SOFTWARE\MyWebSearch\SearchAssistant#sr
    HKLM\SOFTWARE\MyWebSearch\SearchAssistant#pl
    HKLM\SOFTWARE\MyWebSearch\SkinTools
    HKLM\SOFTWARE\MyWebSearch\SkinTools#PlayerPath
    HKCR\CLSID\{147A976F-EEE1-4377-8EA7-4716E4CDD239}
    HKCR\CLSID\{147A976F-EEE1-4377-8EA7-4716E4CDD239}\TreatAs
    HKCR\CLSID\{A4730EBE-43A6-443e-9776-36915D323AD3}
    HKCR\CLSID\{A4730EBE-43A6-443e-9776-36915D323AD3}\TreatAs
    HKCR\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}
    HKCR\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}\1.0
    HKCR\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}\1.0\0
    HKCR\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}\1.0\0\win32
    HKCR\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}\1.0\FLAGS
    HKCR\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}\1.0\HELPDIR
    HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}
    HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid
    HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid32
    HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib
    HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib#Version
    HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}
    HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid
    HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\ProxyStubClsid32
    HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib
    HKCR\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}\TypeLib#Version
    HKCR\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}
    HKCR\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}\ProxyStubClsid
    HKCR\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}\ProxyStubClsid32
    HKCR\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}\TypeLib
    HKCR\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}\TypeLib#Version
    HKLM\Software\FocusInteractive
    HKLM\Software\FocusInteractive\bar
    HKLM\Software\FocusInteractive\bar\Switches
    HKLM\Software\FocusInteractive\bar\Switches#incmail.exe
    HKLM\Software\FocusInteractive\bar\Switches#msimn.exe
    HKLM\Software\FocusInteractive\bar\Switches#msn.exe
    HKLM\Software\FocusInteractive\bar\Switches#outlook.exe
    HKLM\Software\FocusInteractive\bar\Switches#waol.exe
    HKLM\Software\FocusInteractive\bar\Switches#aim.exe
    HKLM\Software\FocusInteractive\bar\Switches#icq.exe
    HKLM\Software\FocusInteractive\bar\Switches#icqlite.exe
    HKLM\Software\FocusInteractive\bar\Switches#msmsgs.exe
    HKLM\Software\FocusInteractive\bar\Switches#msnmsgr.exe
    HKLM\Software\FocusInteractive\bar\Switches#ypager.exe
    HKLM\Software\FocusInteractive\bar\Switches#mwsSrcAs.dll
    HKLM\Software\FocusInteractive\bar\Switches#ps
    HKLM\Software\FocusInteractive\bar\Switches#ok
    HKLM\Software\FocusInteractive\bar\Switches#od
    HKLM\Software\FocusInteractive\bar\Switches#nk
    HKLM\Software\FocusInteractive\bar\Switches#nd
    HKLM\Software\FocusInteractive\bar\Switches#b2.exe
    HKLM\Software\FocusInteractive\bar\Switches#aolsoftware.exe
    HKLM\Software\FocusInteractive\bar\Switches#googletalk.exe
    HKLM\Software\FocusInteractive\bar\Switches#ypagerj.exe
    HKLM\Software\FocusInteractive\bar\Switches#yahoomessenger.exe
    HKLM\Software\FocusInteractive\bar\Switches#winmail.exe.mui
    HKLM\Software\FocusInteractive\bar\Switches#winmail.exe
    HKLM\Software\FocusInteractive\bar\Switches#au
    HKLM\Software\FocusInteractive\Email-IM
    HKLM\Software\FocusInteractive\Email-IM\0
    HKLM\Software\FocusInteractive\Email-IM\0#Toolbar
    HKLM\Software\FocusInteractive\Email-IM\0#AppName
    HKLM\Software\FocusInteractive\Outlook
    C:\Program Files\MyWebSearch\bar\History
    C:\Program Files\MyWebSearch\bar\Settings\s_pid.dat
    C:\Program Files\MyWebSearch\bar\Settings
    C:\Program Files\MyWebSearch\bar
    C:\Program Files\MyWebSearch
    C:\Program Files\FunWebProducts\ScreenSaver\Images
    C:\Program Files\FunWebProducts\ScreenSaver
    C:\Program Files\FunWebProducts Malwarebytes' Anti-Malware 1.44
    Database version: 3667
    Windows 6.0.6002 Service Pack 2
    Internet Explorer 8.0.6001.18882

    31/01/2010 16:03:08
    mbam-log-2010-01-31 (16-03-08).txt

    Scan type: Full Scan (C:\|D:\|)
    Objects scanned: 248075
    Time elapsed: 1 hour(s), 28 minute(s), 30 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 19
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 2

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6fd31ed6-7c94-4bbc-8e95-f927f4d3a949} (Adware.180Solutions) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2b96d5cc-c5b5-49a5-a69d-cc0a30f9028c} (Adware.Minibug) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{25560540-9571-4d7b-9389-0f166788785a} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3dc201fb-e9c9-499c-a11f-23c360d7c3f8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{98d9753d-d73b-42d5-8c85-4469cda897ab} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9ff05104-b030-46fc-94b8-81276e4e27df} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b64f4a7c-97c9-11da-8bde-f66bad1e3f3a} (Rogue.WinAntiVirus) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{14ceeaff-96dd-4101-ae37-d5ecdc23c3f6} (Adware.ALOT) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59c7fc09-1c83-4648-b3e6-003d2bbc7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68af847f-6e91-45dd-9b68-d6a12c30e5d7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170b96c-28d4-4626-8358-27e6caeef907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d1a71fa0-ff48-48dd-9b6d-7a13a3e42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ddb1968e-ead6-40fd-8dae-ff14757f60c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{f138d901-86f0-4383-99b6-9cdd406036da} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\Windows\Temp\TMP000000015112C39F8CACC3DA (Adware.MyWebSearch) -> Quarantined and deleted successfully.
    C:\Windows\Temp\cd1e9076-bfe9-4cab-aa48-0aa0f9901bf8.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 19:45:31, on 31/01/2010
    Platform: Windows Vista SP2 (WinNT 6.00.1906)
    MSIE: Internet Explorer v8.00 (8.00.6001.18882)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Windows\RtHDVCpl.exe
    C:\Program Files\eBay\eBay Toolbar2\eBayTBDaemon.exe
    C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe
    C:\Program Files\AVG\AVG9\avgtray.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Windows Live\Messenger\msnmsgr.exe
    C:\Program Files\Registry Mechanic\RMTray.exe
    C:\Program Files\Windows Media Player\wmpnscfg.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\AVG\AVG9\Identity Protection\agent\bin\avgidsmonitor.exe
    C:\Program Files\Google\Google Toolbar\GoogleToolbarUser_32.exe
    C:\Program Files\Windows Live\Toolbar\wltuser.exe
    C:\Windows\system32\wbem\unsecapp.exe
    C:\Program Files\Windows NT\Accessories\wordpad.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = Bing
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = Bing
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = Bing
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = Bing:
    R3 - URLSearchHook: AVG Security Toolbar BHO - {A3BC75A2-1F87-4686-AA43-5347D756017C} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    R3 - URLSearchHook: (no name) - *{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
    F2 - REG:system.ini: UserInit=C:\Windows\system32\Userinit.exe
    O1 - Hosts: ::1 localhost
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: eBay Toolbar Helper - {22D8E815-4A5E-4DFB-845E-AAB64207F5BD} - C:\Program Files\eBay\eBay Toolbar2\eBayTB.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
    O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O2 - BHO: AVG Security Toolbar BHO - {A3BC75A2-1F87-4686-AA43-5347D756017C} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.4723.1820\swg.dll
    O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
    O3 - Toolbar: eBay Toolbar - {92085AD4-F48A-450D-BD93-B28CC7DF67CE} - C:\Program Files\eBay\eBay Toolbar2\eBayTB.dll
    O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
    O3 - Toolbar: AVG Security Toolbar - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
    O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
    O4 - HKLM\..\Run: [eBayToolbar] C:\Program Files\eBay\eBay Toolbar2\eBayTBDaemon.exe
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [Google Quick Search Box] "C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe" /autorun
    O4 - HKLM\..\Run: [AVG9_TRAY] C:\PROGRA~1\AVG\AVG9\avgtray.exe
    O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
    O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
    O4 - HKCU\..\Run: [RegistryMechanic] C:\Program Files\Registry Mechanic\RMTray.exe /H
    O4 - HKCU\..\Run: [PPAP] C:\ProgramData\PPLiveVA\Application\PPAP.exe
    O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
    O8 - Extra context menu item: eBay Search - res://C:\Program Files\eBay\eBay Toolbar2\eBayTb.dll/RCSearch.html
    O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
    O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
    O13 - Gopher Prefix:
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O16 - DPF: {EF0D1A14-1033-41A2-A589-240C01EDC078} (PPLive Lite Class) - http://dl.pplive.com/PluginSetup.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG9\avgpp.dll
    O20 - AppInit_DLLs: avgrsstx.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
    O23 - Service: AVG E-mail Scanner (avg9emc) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgemc.exe
    O23 - Service: AVG WatchDog (avg9wd) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgwdsvc.exe
    O23 - Service: AVG9IDSAgent (AVGIDSAgent) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe
    O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
    O23 - Service: Google Update Service (gupdate1ca22fbc78c82e9) (gupdate1ca22fbc78c82e9) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

    --
    End of file - 7762 bytes I downloaded GMER but it would not do a full rootkit scan the computer would either shut down or it would stop responding and windows would close the program I have uninstalled it and reinstalled it from two different websites but it still does not run correctly?
     
  4. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    Please download ComboFix from Here or Here to your Desktop.


    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**

    • Please, never rename Combofix unless instructed.
    • Close any open browsers.
    • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    NOTE 1. If Combofix asks you to install Recovery Console, please allow it.
    NOTE 2. If Combofix asks you to update the program, always do so.


    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    • Double click on combofix.exe & follow the prompts.
    • When finished, it will produce a report for you.
    • Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.

    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

    Make sure, you re-enable your security programs, when you're done with Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  5. andy.d

    andy.d Established Techie7 Member

    ComboFix 10-02-07.06 - Andy 08/02/2010 7:02.1.2 - x86
    Microsoft® Windows Vista™ Home Basic 6.0.6002.2.1252.44.1033.18.447.145 [GMT 0:00]
    Running from: c:\users\Andy\Desktop\ComboFix.exe
    SP: AVG Anti-Spyware *disabled* (Outdated) {48F2E28D-ED66-4646-9C11-B3055B0AF604}
    SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\$recycle.bin\S-1-5-21-1464675949-3727266427-3448334303-500
    c:\$recycle.bin\S-1-5-21-2365545147-1999384947-2466353664-500
    c:\users\Andy\AppData\Roaming\.#
    c:\users\Andy\AppData\Roaming\.#\MBX@1060@372908.###
    c:\users\Andy\AppData\Roaming\.#\MBX@1060@372938.###
    c:\users\Andy\AppData\Roaming\.#\MBX@1060@372968.###
    c:\users\Andy\AppData\Roaming\.#\MBX@15FC@1CC2908.###
    c:\users\Andy\AppData\Roaming\.#\MBX@15FC@1CC2938.###
    c:\users\Andy\AppData\Roaming\.#\MBX@15FC@1CC2968.###
    c:\windows\Downloaded Program Files\Install.inf

    .
    ((((((((((((((((((((((((( Files Created from 2010-01-08 to 2010-02-08 )))))))))))))))))))))))))))))))
    .

    2010-02-08 07:18 . 2010-02-08 07:18 -------- d-----w- c:\users\Default\AppData\Local\temp
    2010-02-03 19:50 . 2010-02-03 19:51 -------- d-----w- c:\users\Andy\AppData\Local\MigWiz
    2010-01-31 16:41 . 2010-01-31 16:41 93056 ----a-w- C:\kwddrpob.sys
    2010-01-31 14:16 . 2010-01-31 14:16 -------- d-----w- c:\users\Andy\AppData\Roaming\Malwarebytes
    2010-01-31 14:16 . 2010-01-07 16:07 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2010-01-31 14:16 . 2010-01-31 14:16 -------- d-----w- c:\programdata\Malwarebytes
    2010-01-31 14:16 . 2010-01-07 16:07 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2010-01-31 14:16 . 2010-02-03 21:02 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2010-01-31 12:13 . 2010-01-31 12:13 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
    2010-01-31 12:08 . 2010-02-03 21:02 -------- d-----w- c:\program files\SUPERAntiSpyware
    2010-01-31 12:08 . 2010-01-31 12:08 -------- d-----w- c:\users\Andy\AppData\Roaming\SUPERAntiSpyware.com
    2010-01-31 12:04 . 2010-01-31 12:04 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
    2010-01-24 12:58 . 2010-01-24 12:58 -------- d-----w- c:\users\Andy\New Folder
    2010-01-23 11:09 . 2010-01-23 11:10 1401344 ----a-w- c:\users\Andy\HijackThis.msi
    2010-01-22 08:26 . 2010-01-02 06:32 71680 ----a-w- c:\windows\system32\iesetup.dll
    2010-01-14 03:02 . 2010-01-14 03:05 -------- d-----w- C:\25306413324511dfb1623f43506d
    2010-01-13 07:40 . 2009-10-19 13:38 156672 ----a-w- c:\windows\system32\t2embed.dll
    2010-01-13 07:40 . 2009-10-19 13:35 72704 ----a-w- c:\windows\system32\fontsub.dll

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-02-05 17:21 . 2009-12-06 23:07 -------- d-----w- c:\programdata\AVG Security Toolbar
    2010-02-05 13:07 . 2008-01-12 15:18 -------- d-----w- c:\program files\Google
    2010-02-02 19:09 . 2009-03-27 10:28 680 ----a-w- c:\users\Andy\AppData\Local\d3d9caps.dat
    2010-01-31 12:52 . 2010-01-31 12:17 52224 ----a-w- c:\users\Andy\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
    2010-01-31 12:52 . 2010-01-31 12:16 117760 ----a-w- c:\users\Andy\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
    2010-01-31 12:09 . 2010-01-31 12:09 5120 ----a-r- c:\users\Andy\AppData\Roaming\Microsoft\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF16.exe
    2010-01-31 12:09 . 2010-01-31 12:09 65024 ----a-r- c:\users\Andy\AppData\Roaming\Microsoft\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF15.exe
    2010-01-31 12:09 . 2010-01-31 12:09 18944 ----a-r- c:\users\Andy\AppData\Roaming\Microsoft\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF13.exe
    2010-01-29 23:51 . 2010-01-29 23:52 509552 ----a-w- c:\programdata\Google\Google Toolbar\Update\gtb82E3.tmp.exe
    2010-01-24 11:33 . 2010-01-24 11:33 388096 ----a-r- c:\users\Andy\AppData\Roaming\Microsoft\Installer\{0761C9A8-8F3A-4216-B4A7-B7AFBF24A24A}\HiJackThis.exe
    2010-01-23 07:44 . 2009-10-08 23:13 -------- d-----w- c:\program files\Microsoft Silverlight
    2010-01-16 23:19 . 2010-01-16 22:56 1260800 ----a-w- c:\programdata\avg9\update\backup\avgfrw.exe
    2010-01-16 23:19 . 2010-01-16 22:56 3777280 ----a-w- c:\programdata\avg9\update\backup\setup.exe
    2010-01-16 22:40 . 2009-12-11 09:50 3967768 ----a-w- c:\programdata\avg9\update\backup\avgcorex.dll
    2010-01-16 21:25 . 2009-11-22 18:03 439816 ----a-w- c:\users\Andy\AppData\Roaming\Real\Update\setup3.09\setup.exe
    2010-01-16 21:22 . 2010-01-16 21:21 17245680 ----a-w- c:\users\Andy\AppData\Roaming\Real\Update\setup3.09\rp\RealPlayerSPGold.exe
    2010-01-16 21:21 . 2010-01-16 21:21 8405312 ----a-w- c:\users\Andy\AppData\Roaming\Real\Update\setup3.09\gtb\GOOGLE_TOOLBAR\GoogleToolbarInstaller.exe
    2010-01-16 21:21 . 2010-01-16 21:21 149000 ----a-w- c:\users\Andy\AppData\Roaming\Real\Update\setup3.09\chr_helper\LaunchHelper.exe
    2010-01-16 21:21 . 2010-01-16 21:21 10309448 ----a-w- c:\users\Andy\AppData\Roaming\Real\Update\setup3.09\chr\ChromeInstaller.exe
    2010-01-16 21:19 . 2010-01-16 21:19 79368 ----a-w- c:\users\Andy\AppData\Roaming\Real\Update\setup3.09\RUP\vista.exe
    2010-01-16 21:18 . 2010-01-16 21:18 64000 ----a-w- c:\users\Andy\AppData\Roaming\Real\Update\setup3.09\RUP\inst_config\gcapi_dll.dll
    2010-01-16 21:18 . 2010-01-16 21:18 52288 ----a-w- c:\users\Andy\AppData\Roaming\Real\Update\setup3.09\RUP\inst_config\gtapi.dll
    2010-01-16 21:18 . 2010-01-16 21:18 50688 ----a-w- c:\users\Andy\AppData\Roaming\Real\Update\setup3.09\RUP\inst_config\fftbapi.dll
    2010-01-16 21:18 . 2010-01-16 21:18 118784 ----a-w- c:\users\Andy\AppData\Roaming\Real\Update\setup3.09\RUP\inst_config\compat.dll
    2010-01-14 11:12 . 2009-10-03 06:51 181120 ------w- c:\windows\system32\MpSigStub.exe
    2010-01-14 03:05 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
    2010-01-02 06:38 . 2010-01-22 08:27 916480 ----a-w- c:\windows\system32\wininet.dll
    2010-01-02 06:32 . 2010-01-22 08:27 109056 ----a-w- c:\windows\system32\iesysprep.dll
    2010-01-02 04:57 . 2010-01-22 08:27 133632 ----a-w- c:\windows\system32\ieUnatt.exe
    2009-12-22 12:14 . 2009-05-05 18:22 360584 ----a-w- c:\windows\system32\drivers\avgtdix.sys
    2009-12-22 12:10 . 2009-05-05 18:23 12464 ----a-w- c:\windows\system32\avgrsstx.dll
    2009-12-22 12:10 . 2009-05-05 18:22 28424 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
    2009-12-22 10:46 . 2009-12-06 23:07 25608 ----a-w- c:\windows\system32\drivers\AVGIDSvx.sys
    2009-12-22 10:09 . 2009-05-05 18:22 333192 ----a-w- c:\windows\system32\drivers\avgldx86.sys
    2009-12-22 09:51 . 2009-05-05 18:23 161800 ----a-w- c:\windows\system32\drivers\avgrkx86.sys
    2009-12-13 16:38 . 2007-09-25 21:00 262 ----a-w- c:\users\Andy\AppData\Roaming\wklnhst.dat
    2009-12-11 18:34 . 2009-12-06 16:36 -------- d-----w- c:\programdata\PPLive
    2009-11-24 07:10 . 2009-11-24 07:10 484976 ----a-w- c:\programdata\Google\Google Toolbar\Update\gtb1F9C.tmp.exe
    2009-11-22 10:47 . 2009-11-22 10:10 1078 ----a-r- c:\users\Andy\AppData\Roaming\Microsoft\Installer\{5BBFB0E4-2250-49C3-A8A3-65BE2197D13B}\_FA205A559251987AB9357F.exe
    2009-11-22 10:47 . 2009-11-22 10:10 1078 ----a-r- c:\users\Andy\AppData\Roaming\Microsoft\Installer\{5BBFB0E4-2250-49C3-A8A3-65BE2197D13B}\_DD2FDB8D9E139140E2027C.exe
    2009-11-22 10:47 . 2009-11-22 10:10 7406 ----a-r- c:\users\Andy\AppData\Roaming\Microsoft\Installer\{5BBFB0E4-2250-49C3-A8A3-65BE2197D13B}\_0691A533ED67E57CCCE101.exe
    2009-11-18 15:18 . 2009-11-05 13:03 3775256 ----a-w- c:\programdata\TEMP\AVG\setup.exe
    2009-11-17 20:40 . 2006-11-02 10:25 665600 ----a-w- c:\windows\inf\drvindex.dat
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
    "{A3BC75A2-1F87-4686-AA43-5347D756017C}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

    [HKEY_CLASSES_ROOT\clsid\{a3bc75a2-1f87-4686-aa43-5347d756017c}]

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C}]
    2009-11-25 13:02 1230080 ----a-w- c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

    [HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
    "{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

    [HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2009-07-26 3883856]
    "swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-01-27 39408]
    "RegistryMechanic"="c:\program files\Registry Mechanic\RMTray.exe" [2008-07-03 812952]
    "WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
    "RtHDVCpl"="RtHDVCpl.exe" [2007-02-07 4374528]
    "eBayToolbar"="c:\program files\eBay\eBay Toolbar2\eBayTBDaemon.exe" [2009-03-25 632048]
    "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 39792]
    "Google Quick Search Box"="c:\program files\Google\Quick Search Box\GoogleQuickSearchBox.exe" [2009-09-10 122368]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "EnableLUA"= 0 (0x0)
    "EnableUIADesktopToggle"= 0 (0x0)

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2009-09-03 14:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=c:\windows\System32\avgrsstx.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "aux"=wdmaud.drv

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
    @="Service"

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
    "AntiVirusOverride"=dword:00000001
    "VistaSp2"=hex(b):e3,a8,3b,5e,ed,07,ca,01

    R0 AVGIDSErHrvtx;AVG9IDSErHr;c:\windows\System32\drivers\AVGIDSvx.sys [06/12/2009 23:07 25608]
    R0 AvgRkx86;avgrkx86.sys;c:\windows\System32\drivers\avgrkx86.sys [05/05/2009 18:23 161800]
    R1 AvgLdx86;AVG AVI Loader Driver x86;c:\windows\System32\drivers\avgldx86.sys [05/05/2009 18:22 333192]
    R1 AvgTdiX;AVG8 Network Redirector;c:\windows\System32\drivers\avgtdix.sys [05/05/2009 18:22 360584]
    R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [05/01/2010 07:56 9968]
    R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [05/01/2010 07:56 74480]
    R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [05/01/2010 07:56 7408]
    S2 gupdate1ca22fbc78c82e9;Google Update Service (gupdate1ca22fbc78c82e9);c:\program files\Google\Update\GoogleUpdate.exe [22/08/2009 07:40 133104]
    S3 AVGIDSDrivervtx;AVG9IDSDriver;c:\program files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_Vista\AVGIDSDriver.sys [06/12/2009 23:06 122376]
    S3 AVGIDSFiltervtx;AVG9IDSFilter;c:\program files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_Vista\AVGIDSFilter.sys [06/12/2009 23:06 30216]
    S3 AVGIDSShimvtx;AVG9IDSShim;c:\program files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_Vista\AVGIDSShim.sys [06/12/2009 23:06 27800]
    S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [29/03/2008 14:56 21504]
    S3 fssfltr;FssFltr;c:\windows\System32\drivers\fssfltr.sys [08/10/2009 23:10 54632]
    S3 fsssvc;Windows Live Family Safety Service;c:\program files\Windows Live\Family Safety\fsssvc.exe [05/08/2009 21:48 704864]
    S3 s0017bus;Sony Ericsson Device 0017 driver (WDM);c:\windows\System32\drivers\s0017bus.sys [30/10/2008 15:30 90536]
    S3 s0017mdfl;Sony Ericsson Device 0017 USB WMC Modem Filter;c:\windows\System32\drivers\s0017mdfl.sys [30/10/2008 15:30 15016]
    S3 s0017mdm;Sony Ericsson Device 0017 USB WMC Modem Driver;c:\windows\System32\drivers\s0017mdm.sys [30/10/2008 15:30 122152]
    S3 s0017mgmt;Sony Ericsson Device 0017 USB WMC Device Management Drivers (WDM);c:\windows\System32\drivers\s0017mgmt.sys [30/10/2008 15:30 115496]
    S3 s0017nd5;Sony Ericsson Device 0017 USB Ethernet Emulation SEMC0017 (NDIS);c:\windows\System32\drivers\s0017nd5.sys [30/10/2008 15:30 25768]
    S3 s0017obex;Sony Ericsson Device 0017 USB WMC OBEX Interface;c:\windows\System32\drivers\s0017obex.sys [30/10/2008 15:30 111912]
    S3 s0017unic;Sony Ericsson Device 0017 USB Ethernet Emulation SEMC0017 (WDM);c:\windows\System32\drivers\s0017unic.sys [30/10/2008 15:30 117672]
    S3 s1018bus;Sony Ericsson Device 1018 driver (WDM);c:\windows\System32\drivers\s1018bus.sys [30/10/2008 15:30 90408]
    S3 s1018mdfl;Sony Ericsson Device 1018 USB WMC Modem Filter;c:\windows\System32\drivers\s1018mdfl.sys [30/10/2008 15:30 15016]
    S3 s1018mdm;Sony Ericsson Device 1018 USB WMC Modem Driver;c:\windows\System32\drivers\s1018mdm.sys [30/10/2008 15:30 122024]
    S3 s1018mgmt;Sony Ericsson Device 1018 USB WMC Device Management Drivers (WDM);c:\windows\System32\drivers\s1018mgmt.sys [30/10/2008 15:30 115368]
    S3 s1018nd5;Sony Ericsson Device 1018 USB Ethernet Emulation (NDIS);c:\windows\System32\drivers\s1018nd5.sys [30/10/2008 15:30 25768]
    S3 s1018obex;Sony Ericsson Device 1018 USB WMC OBEX Interface;c:\windows\System32\drivers\s1018obex.sys [30/10/2008 15:30 111784]
    S3 s1018unic;Sony Ericsson Device 1018 USB Ethernet Emulation (WDM);c:\windows\System32\drivers\s1018unic.sys [30/10/2008 15:30 117544]
    S3 VST_DPV;VST_DPV;c:\windows\System32\drivers\VSTDPV3.SYS [02/11/2006 10:25 987648]
    S3 VSTHWBS2;VSTHWBS2;c:\windows\System32\drivers\VSTBS23.SYS [02/11/2006 10:25 251904]
    S4 avg9emc;AVG E-mail Scanner;c:\program files\AVG\AVG9\avgemc.exe [22/12/2009 10:10 906520]
    S4 avg9wd;AVG WatchDog;c:\program files\AVG\AVG9\avgwdsvc.exe [22/12/2009 11:47 285392]
    S4 AVGIDSAgent;AVG9IDSAgent;c:\program files\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe [22/12/2009 10:42 5832712]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc
    LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
    vvdsvc REG_MULTI_SZ vvdsvc
    .
    Contents of the 'Scheduled Tasks' folder

    2010-02-07 c:\windows\Tasks\Google Software Updater.job
    - c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2008-01-12 07:35]

    2010-02-07 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2009-08-22 07:39]

    2010-02-08 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2009-08-22 07:39]
    .
    .
    ------- Supplementary Scan -------
    .
    IE: eBay Search - c:\program files\eBay\eBay Toolbar2\eBayTb.dll/RCSearch.html
    DPF: {EF0D1A14-1033-41A2-A589-240C01EDC078} - hxxp://dl.pplive.com/PluginSetup.cab
    .
    .
    ------- File Associations -------
    .
    vbefile\shell\open2\command="%SystemRoot%\System32\CScript.exe" "%1" %*
    vbsfile\shell\open2\command="%SystemRoot%\System32\CScript.exe" "%1" %*
    jsefile\shell\open2\command=c:\windows\System32\CScript.exe "%1" %*
    .
    - - - - ORPHANS REMOVED - - - -

    HKCU-Run-PPAP - c:\programdata\PPLiveVA\Application\PPAP.exe
    ActiveSetup-ccc-core-static - msiexec



    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, GMER - Rootkit Detector and Remover
    Rootkit scan 2010-02-08 07:20
    Windows 6.0.6002 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0004\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20) Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:28:47, on 08/02/2010
    Platform: Windows Vista SP2 (WinNT 6.00.1906)
    MSIE: Internet Explorer v8.00 (8.00.6001.18882)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Windows\RtHDVCpl.exe
    C:\Program Files\eBay\eBay Toolbar2\eBayTBDaemon.exe
    C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe
    C:\Program Files\Windows Live\Messenger\msnmsgr.exe
    C:\Program Files\Registry Mechanic\RMTray.exe
    C:\Program Files\Windows Media Player\wmpnscfg.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Windows\system32\wbem\unsecapp.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Google\Google Toolbar\GoogleToolbarUser_32.exe
    C:\Program Files\Windows Live\Toolbar\wltuser.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = Bing
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = Bing
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = Bing:
    R3 - URLSearchHook: AVG Security Toolbar BHO - {A3BC75A2-1F87-4686-AA43-5347D756017C} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    R3 - URLSearchHook: (no name) - *{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
    O1 - Hosts: ::1 localhost
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: eBay Toolbar Helper - {22D8E815-4A5E-4DFB-845E-AAB64207F5BD} - C:\Program Files\eBay\eBay Toolbar2\eBayTB.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
    O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O2 - BHO: AVG Security Toolbar BHO - {A3BC75A2-1F87-4686-AA43-5347D756017C} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.4723.1820\swg.dll
    O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
    O3 - Toolbar: eBay Toolbar - {92085AD4-F48A-450D-BD93-B28CC7DF67CE} - C:\Program Files\eBay\eBay Toolbar2\eBayTB.dll
    O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
    O3 - Toolbar: AVG Security Toolbar - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
    O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
    O4 - HKLM\..\Run: [eBayToolbar] C:\Program Files\eBay\eBay Toolbar2\eBayTBDaemon.exe
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [Google Quick Search Box] "C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe" /autorun
    O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
    O4 - HKCU\..\Run: [RegistryMechanic] C:\Program Files\Registry Mechanic\RMTray.exe /H
    O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O8 - Extra context menu item: eBay Search - res://C:\Program Files\eBay\eBay Toolbar2\eBayTb.dll/RCSearch.html
    O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
    O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O16 - DPF: {EF0D1A14-1033-41A2-A589-240C01EDC078} (PPLive Lite Class) - http://dl.pplive.com/PluginSetup.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG9\avgpp.dll
    O20 - AppInit_DLLs: C:\Windows\System32\avgrsstx.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
    O23 - Service: AVG E-mail Scanner (avg9emc) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgemc.exe
    O23 - Service: AVG WatchDog (avg9wd) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgwdsvc.exe
    O23 - Service: AVG9IDSAgent (AVGIDSAgent) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe
    O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
    O23 - Service: Google Update Service (gupdate1ca22fbc78c82e9) (gupdate1ca22fbc78c82e9) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

    --
    End of file - 6745 bytes
    sorry it took long to post info had a few computer problems. do i have to delete superanti-virus and anti malware and combo fix when the problems have been sorted or will they be ok along side AVG 9.0 internet security, thanks
     
  6. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    We'll uninstall Combofix in a moment.
    You keep Super and 'Bytes and you run occasional scans.


    1. Please open Notepad
    • Click Start , then Run
    • Type notepad .exe in the Run Box.


    2. Now copy/paste the entire content of the codebox below into the Notepad window:

    Code:
    File::
    C:\kwddrpob.sys
    
    
    Folder::
    
    Driver::
    
    Registry::
    
    RegLockDel::
    
    

    3. Save the above as CFScript.txt

    4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

    [​IMG]


    5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
    • Combofix.txt
    • A new HijackThis log.
     
  7. andy.d

    andy.d Established Techie7 Member

    ComboFix 10-02-08.02 - Andy 08/02/2010 23:29:52.3.2 - x86
    Microsoft® Windows Vista™ Home Basic 6.0.6002.2.1252.44.1033.18.447.117 [GMT 0:00]
    Running from: c:\users\Andy\Desktop\ComboFix.exe
    Command switches used :: c:\users\Andy\Desktop\CFScript.txt
    SP: AVG Anti-Spyware *disabled* (Outdated) {48F2E28D-ED66-4646-9C11-B3055B0AF604}
    SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

    FILE ::
    "C:\kwddrpob.sys"
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\kwddrpob.sys

    .
    ((((((((((((((((((((((((( Files Created from 2010-01-08 to 2010-02-08 )))))))))))))))))))))))))))))))
    .

    2010-02-08 23:47 . 2010-02-08 23:47 -------- d-----w- c:\users\Public\AppData\Local\temp
    2010-02-08 23:47 . 2010-02-08 23:47 -------- d-----w- c:\users\Default\AppData\Local\temp
    2010-02-08 23:23 . 2010-02-08 23:23 12568 ----a-w- c:\windows\system32\drivers\PROCEXP113.SYS
    2010-02-08 23:22 . 2010-02-08 23:24 -------- d-----w- C:\32788R22FWJFW
    2010-02-03 19:50 . 2010-02-03 19:51 -------- d-----w- c:\users\Andy\AppData\Local\MigWiz
    2010-01-31 14:16 . 2010-01-31 14:16 -------- d-----w- c:\users\Andy\AppData\Roaming\Malwarebytes
    2010-01-31 14:16 . 2010-01-07 16:07 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2010-01-31 14:16 . 2010-01-31 14:16 -------- d-----w- c:\programdata\Malwarebytes
    2010-01-31 14:16 . 2010-01-07 16:07 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2010-01-31 14:16 . 2010-02-03 21:02 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2010-01-31 12:13 . 2010-01-31 12:13 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
    2010-01-31 12:08 . 2010-02-03 21:02 -------- d-----w- c:\program files\SUPERAntiSpyware
    2010-01-31 12:08 . 2010-01-31 12:08 -------- d-----w- c:\users\Andy\AppData\Roaming\SUPERAntiSpyware.com
    2010-01-31 12:04 . 2010-01-31 12:04 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
    2010-01-24 12:58 . 2010-01-24 12:58 -------- d-----w- c:\users\Andy\New Folder
    2010-01-23 11:09 . 2010-01-23 11:10 1401344 ----a-w- c:\users\Andy\HijackThis.msi
    2010-01-22 08:26 . 2010-01-02 06:32 71680 ----a-w- c:\windows\system32\iesetup.dll
    2010-01-14 03:02 . 2010-01-14 03:05 -------- d-----w- C:\25306413324511dfb1623f43506d
    2010-01-13 07:40 . 2009-10-19 13:38 156672 ----a-w- c:\windows\system32\t2embed.dll
    2010-01-13 07:40 . 2009-10-19 13:35 72704 ----a-w- c:\windows\system32\fontsub.dll

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-02-08 07:49 . 2009-12-06 23:07 -------- d-----w- c:\programdata\AVG Security Toolbar
    2010-02-05 13:07 . 2008-01-12 15:18 -------- d-----w- c:\program files\Google
    2010-02-02 19:09 . 2009-03-27 10:28 680 ----a-w- c:\users\Andy\AppData\Local\d3d9caps.dat
    2010-01-23 07:44 . 2009-10-08 23:13 -------- d-----w- c:\program files\Microsoft Silverlight
    2010-01-14 11:12 . 2009-10-03 06:51 181120 ------w- c:\windows\system32\MpSigStub.exe
    2010-01-14 03:05 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
    2010-01-02 06:38 . 2010-01-22 08:27 916480 ----a-w- c:\windows\system32\wininet.dll
    2010-01-02 06:32 . 2010-01-22 08:27 109056 ----a-w- c:\windows\system32\iesysprep.dll
    2010-01-02 04:57 . 2010-01-22 08:27 133632 ----a-w- c:\windows\system32\ieUnatt.exe
    2009-12-22 12:14 . 2009-05-05 18:22 360584 ----a-w- c:\windows\system32\drivers\avgtdix.sys
    2009-12-22 12:10 . 2009-05-05 18:23 12464 ----a-w- c:\windows\system32\avgrsstx.dll
    2009-12-22 12:10 . 2009-05-05 18:22 28424 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
    2009-12-22 10:46 . 2009-12-06 23:07 25608 ----a-w- c:\windows\system32\drivers\AVGIDSvx.sys
    2009-12-22 10:09 . 2009-05-05 18:22 333192 ----a-w- c:\windows\system32\drivers\avgldx86.sys
    2009-12-22 09:51 . 2009-05-05 18:23 161800 ----a-w- c:\windows\system32\drivers\avgrkx86.sys
    2009-12-13 16:38 . 2007-09-25 21:00 262 ----a-w- c:\users\Andy\AppData\Roaming\wklnhst.dat
    2009-12-11 18:34 . 2009-12-06 16:36 -------- d-----w- c:\programdata\PPLive
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
    "{A3BC75A2-1F87-4686-AA43-5347D756017C}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

    [HKEY_CLASSES_ROOT\clsid\{a3bc75a2-1f87-4686-aa43-5347d756017c}]

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C}]
    2009-11-25 13:02 1230080 ----a-w- c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

    [HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
    "{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

    [HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2009-07-26 3883856]
    "swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-01-27 39408]
    "RegistryMechanic"="c:\program files\Registry Mechanic\RMTray.exe" [2008-07-03 812952]
    "WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
    "RtHDVCpl"="RtHDVCpl.exe" [2007-02-07 4374528]
    "eBayToolbar"="c:\program files\eBay\eBay Toolbar2\eBayTBDaemon.exe" [2009-03-25 632048]
    "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 39792]
    "Google Quick Search Box"="c:\program files\Google\Quick Search Box\GoogleQuickSearchBox.exe" [2009-09-10 122368]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "EnableUIADesktopToggle"= 0 (0x0)

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2009-09-03 14:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=c:\windows\System32\avgrsstx.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "aux"=wdmaud.drv

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
    @="Service"

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
    "VistaSp2"=hex(b):e3,a8,3b,5e,ed,07,ca,01

    R2 gupdate1ca22fbc78c82e9;Google Update Service (gupdate1ca22fbc78c82e9);c:\program files\Google\Update\GoogleUpdate.exe [2009-08-22 133104]
    R3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe [2008-01-19 21504]
    R3 fssfltr;fssfltr;c:\windows\system32\DRIVERS\fssfltr.sys [2009-08-05 54632]
    R3 fsssvc;Windows Live Family Safety Service;c:\program files\Windows Live\Family Safety\fsssvc.exe [2009-08-05 704864]
    R3 s0017bus;Sony Ericsson Device 0017 driver (WDM);c:\windows\system32\DRIVERS\s0017bus.sys [2008-05-27 90536]
    R3 s0017mdfl;Sony Ericsson Device 0017 USB WMC Modem Filter;c:\windows\system32\DRIVERS\s0017mdfl.sys [2008-05-27 15016]
    R3 s0017mdm;Sony Ericsson Device 0017 USB WMC Modem Driver;c:\windows\system32\DRIVERS\s0017mdm.sys [2008-05-27 122152]
    R3 s0017mgmt;Sony Ericsson Device 0017 USB WMC Device Management Drivers (WDM);c:\windows\system32\DRIVERS\s0017mgmt.sys [2008-05-27 115496]
    R3 s0017nd5;Sony Ericsson Device 0017 USB Ethernet Emulation SEMC0017 (NDIS);c:\windows\system32\DRIVERS\s0017nd5.sys [2008-05-27 25768]
    R3 s0017obex;Sony Ericsson Device 0017 USB WMC OBEX Interface;c:\windows\system32\DRIVERS\s0017obex.sys [2008-05-27 111912]
    R3 s0017unic;Sony Ericsson Device 0017 USB Ethernet Emulation SEMC0017 (WDM);c:\windows\system32\DRIVERS\s0017unic.sys [2008-05-27 117672]
    R3 s1018bus;Sony Ericsson Device 1018 driver (WDM);c:\windows\system32\DRIVERS\s1018bus.sys [2008-06-04 90408]
    R3 s1018mdfl;Sony Ericsson Device 1018 USB WMC Modem Filter;c:\windows\system32\DRIVERS\s1018mdfl.sys [2008-06-04 15016]
    R3 s1018mdm;Sony Ericsson Device 1018 USB WMC Modem Driver;c:\windows\system32\DRIVERS\s1018mdm.sys [2008-06-04 122024]
    R3 s1018mgmt;Sony Ericsson Device 1018 USB WMC Device Management Drivers (WDM);c:\windows\system32\DRIVERS\s1018mgmt.sys [2008-06-04 115368]
    R3 s1018nd5;Sony Ericsson Device 1018 USB Ethernet Emulation (NDIS);c:\windows\system32\DRIVERS\s1018nd5.sys [2008-06-04 25768]
    R3 s1018obex;Sony Ericsson Device 1018 USB WMC OBEX Interface;c:\windows\system32\DRIVERS\s1018obex.sys [2008-06-04 111784]
    R3 s1018unic;Sony Ericsson Device 1018 USB Ethernet Emulation (WDM);c:\windows\system32\DRIVERS\s1018unic.sys [2008-06-04 117544]
    R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2010-01-05 7408]
    R3 VST_DPV;VST_DPV;c:\windows\system32\DRIVERS\VSTDPV3.SYS [2006-11-02 987648]
    R3 VSTHWBS2;VSTHWBS2;c:\windows\system32\DRIVERS\VSTBS23.SYS [2006-11-02 251904]
    S0 AVGIDSErHrvtx;AVG9IDSErHr;c:\windows\System32\Drivers\AVGIDSvx.sys [2009-12-22 25608]
    S0 AvgRkx86;avgrkx86.sys;c:\windows\System32\Drivers\avgrkx86.sys [2009-12-22 161800]
    S1 AvgLdx86;AVG AVI Loader Driver x86;c:\windows\System32\Drivers\avgldx86.sys [2009-12-22 333192]
    S1 AvgTdiX;AVG8 Network Redirector;c:\windows\System32\Drivers\avgtdix.sys [2009-12-22 360584]
    S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-01-05 9968]
    S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.sys [2010-01-05 74480]
    S2 avg9emc;AVG E-mail Scanner;c:\program files\AVG\AVG9\avgemc.exe [2009-12-22 906520]
    S2 avg9wd;AVG WatchDog;c:\program files\AVG\AVG9\avgwdsvc.exe [2009-12-22 285392]
    S2 AVGIDSAgent;AVG9IDSAgent;c:\program files\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe AVGIDSAgent [x]
    S3 AVGIDSDrivervtx;AVG9IDSDriver;c:\program files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_Vista\AVGIDSDriver.sys [2009-12-22 122376]
    S3 AVGIDSFiltervtx;AVG9IDSFilter;c:\program files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_Vista\AVGIDSFilter.sys [2009-12-22 30216]
    S3 AVGIDSShimvtx;AVG9IDSShim;c:\program files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_Vista\AVGIDSShim.sys [2009-12-22 27800]


    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc
    LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
    vvdsvc REG_MULTI_SZ vvdsvc
    .
    Contents of the 'Scheduled Tasks' folder

    2010-02-08 c:\windows\Tasks\Google Software Updater.job
    - c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2008-01-12 07:35]

    2010-02-08 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2009-08-22 07:39]

    2010-02-08 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2009-08-22 07:39]
    .
    .
    ------- Supplementary Scan -------
    .
    IE: eBay Search - c:\program files\eBay\eBay Toolbar2\eBayTb.dll/RCSearch.html
    DPF: {EF0D1A14-1033-41A2-A589-240C01EDC078} - hxxp://dl.pplive.com/PluginSetup.cab
    .

    **************************************************************************
    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files:

    **************************************************************************
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0004\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0005\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0006\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0007\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000
    .
    Completion time: 2010-02-09 00:08:24
    ComboFix-quarantined-files.txt 2010-02-09 00:08
    ComboFix2.txt 2010-02-08 07:29

    Pre-Run: 70,057,074,688 bytes free
    Post-Run: 70,082,187,264 bytes free

    - - End Of File - - 2EBEBBE8E26CC23CA53F070890EBADB4
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 18:46:24, on 09/02/2010
    Platform: Windows Vista SP2 (WinNT 6.00.1906)
    MSIE: Internet Explorer v8.00 (8.00.6001.18882)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Windows\RtHDVCpl.exe
    C:\Program Files\eBay\eBay Toolbar2\eBayTBDaemon.exe
    C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe
    C:\Program Files\Windows Live\Messenger\msnmsgr.exe
    C:\Program Files\Registry Mechanic\RMTray.exe
    C:\Program Files\Windows Media Player\wmpnscfg.exe
    C:\Windows\system32\wbem\unsecapp.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Windows\system32\taskeng.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Google\Google Toolbar\GoogleToolbarUser_32.exe
    C:\Program Files\Windows Live\Toolbar\wltuser.exe
    C:\Windows\system32\Macromed\Flash\FlashUtil10b.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = Bing
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = Bing
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = Hotmail, News, Sport, Music, Movies, Money, Cars, Shopping, Windows Live from MSN UK
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = Bing:
    R3 - URLSearchHook: AVG Security Toolbar BHO - {A3BC75A2-1F87-4686-AA43-5347D756017C} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    R3 - URLSearchHook: (no name) - *{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
    O1 - Hosts: ::1 localhost
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: eBay Toolbar Helper - {22D8E815-4A5E-4DFB-845E-AAB64207F5BD} - C:\Program Files\eBay\eBay Toolbar2\eBayTB.dll
    O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
    O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
    O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
    O2 - BHO: AVG Security Toolbar BHO - {A3BC75A2-1F87-4686-AA43-5347D756017C} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.4723.1820\swg.dll
    O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
    O3 - Toolbar: eBay Toolbar - {92085AD4-F48A-450D-BD93-B28CC7DF67CE} - C:\Program Files\eBay\eBay Toolbar2\eBayTB.dll
    O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
    O3 - Toolbar: AVG Security Toolbar - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - C:\Program Files\AVG\AVG9\Toolbar\IEToolbar.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
    O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
    O4 - HKLM\..\Run: [eBayToolbar] C:\Program Files\eBay\eBay Toolbar2\eBayTBDaemon.exe
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\Run: [Google Quick Search Box] "C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe" /autorun
    O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
    O4 - HKCU\..\Run: [RegistryMechanic] C:\Program Files\Registry Mechanic\RMTray.exe /H
    O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O8 - Extra context menu item: eBay Search - res://C:\Program Files\eBay\eBay Toolbar2\eBayTb.dll/RCSearch.html
    O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
    O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
    O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    O16 - DPF: {EF0D1A14-1033-41A2-A589-240C01EDC078} (PPLive Lite Class) - http://dl.pplive.com/PluginSetup.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG9\avgpp.dll
    O20 - AppInit_DLLs: C:\Windows\System32\avgrsstx.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
    O23 - Service: AVG E-mail Scanner (avg9emc) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgemc.exe
    O23 - Service: AVG WatchDog (avg9wd) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgwdsvc.exe
    O23 - Service: AVG9IDSAgent (AVGIDSAgent) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe
    O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
    O23 - Service: Google Update Service (gupdate1ca22fbc78c82e9) (gupdate1ca22fbc78c82e9) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

    --
    End of file - 6831 bytes
     
  8. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    Uninstall Combofix:
    Go Start > Run [Vista users, go Start>"Start search"]
    Type in:
    Combofix /Uninstall
    Note the space between the "Combofix" and the "/Uninstall"
    Click OK (Vista users - press Enter).
    Restart computer.


    1. Download Temp File Cleaner (TFC)
    Double click on TFC.exe to run the program.
    Click on Start button to begin cleaning process.
    TFC will close all running programs, and it may ask you to restart computer.


    2. Go to Kaspersky website and perform an online antivirus scan.

    1. Disable your active antivirus program.
    2. Read through the requirements and privacy statement and click on Accept button.
    3. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
    4. When the downloads have finished, click on Settings.
    5. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:


    • Spyware, Adware, Dialers, and other potentially dangerous programs
      [*] Archives
      [*] Mail databases

    6. Click on My Computer under Scan.
    7. Once the scan is complete, it will display the results. Click on View Scan Report.
    8. You will see a list of infected items there. Click on Save Report As....
    9. Save this report to a convenient place. Change the Files of type to Text file (.txt before clicking on the Save button. Then post it here.

    Post fresh HijackThis log as well.
     
  9. andy.d

    andy.d Established Techie7 Member

    hi the kapersky online scanner tells me to run the browser as administrator unsure how to do this please help thanks
     
  10. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    Close your browser. Right click on your browser icon and click "Run As Administrator".
     
  11. andy.d

    andy.d Established Techie7 Member

    hi I cannot get kapersky to run i have disabled AVG, Windows defender and superantivirus and i am running as administrator:taz:
     
  12. broni

    broni Malware Annihilator Techie7 Moderator Head Security

    Please run a free online scan with the ESET Online Scanner


    • Disable your antivirus program
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • When asked, allow the ActiveX control to install
    • Click Start
    • Make sure that the options Remove found threats and the option Scan unwanted applications is checked
    • Click Scan (This scan can take several hours, so please be patient)
    • Once the scan is completed, you may close the window
    • Use Notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt
    • Copy and paste that log as a reply to this topic