1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Solved Last One - Laptop same concerns

Discussion in 'Malware and Virus Removal Archive' started by mannclann, 2011/01/25.

  1. 2011/01/27
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    I strongly suggest, you uninstall System Mechanic Professional.

    Registry cleaners/optimizers are not recommended for several reasons:

    • Registry cleaners are extremely powerful applications that can damage the registry by using aggressive cleaning routines and cause your computer to become unbootable.

      The Windows registry is a central repository (database) for storing configuration data, user settings and machine-dependent settings, and options for the operating system. It contains information and settings for all hardware, software, users, and preferences. Whenever a user makes changes to settings, file associations, system policies, or installed software, the changes are reflected and stored in this repository. The registry is a crucial component because it is where Windows "remembers" all this information, how it works together, how Windows boots the system and what files it uses when it does. The registry is also a vulnerable subsystem, in that relatively small changes done incorrectly can render the system inoperable. For a more detailed explanation, read Understanding The Registry.
    • Not all registry cleaners are created equal. There are a number of them available but they do not all work entirely the same way. Each vendor uses different criteria as to what constitutes a "bad entry ". One cleaner may find entries on your system that will not cause problems when removed, another may not find the same entries, and still another may want to remove entries required for a program to work.
    • Not all registry cleaners create a backup of the registry before making changes. If the changes prevent the system from booting up, then there is no backup available to restore it in order to regain functionality. A backup of the registry is essential BEFORE making any changes to the registry.
    • Improperly removing registry entries can hamper malware disinfection and make the removal process more difficult if your computer becomes infected. For example, removing malware related registry entries before the infection is properly identified can contribute to system instability and even make the malware undetectable to removal tools.
    • The usefulness of cleaning the registry is highly overrated and can be dangerous. In most cases, using a cleaner to remove obsolete, invalid, and erroneous entries does not affect system performance but it can result in "unpredictable results ".
    Unless you have a particular problem that requires a registry edit to correct it, I would suggest you leave the registry alone. Using registry cleaning tools unnecessarily or incorrectly could lead to disastrous effects on your operating system such as preventing it from ever starting again. For routine use, the benefits to your computer are negligible while the potential risks are great.


    =================================================================

    Update your Java version here: http://www.java.com/en/download/installed.jsp

    Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

    Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

    Now, we need to remove old Java version and its remnants...

    Download JavaRa to your desktop and unzip it to its own folder
    • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
    • Accept any prompts.

    ============================================================

    Run OTL
    • Under the [color= "#0000FF"]Custom Scans/Fixes[/color] box at the bottom, paste in the following

      Code:
      :OTL
      O28 - HKLM ShellExecuteHooks: {AEB6717E-7E19-11d0-97EE-00C04FD91972} - Reg Error: Key error. File not found
      [2010/05/05 12:22:50 | 000,000,056 | -H-- | C] () -- C:\ProgramData\ezsidmv.dat
      @Alternate Data Stream - 268 bytes -> C:\ProgramData\Temp:2B11E0DF
      @Alternate Data Stream - 113 bytes -> C:\ProgramData\Temp:8CE646EE
      
      
      :Commands
      [purity]
      [emptytemp]
      [emptyflash]
      [Reboot]
      
    • Then click the [color= "#FF0000"]Run Fix[/color] button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • You will get a log that shows the results of the fix. Please post it.

    =============================================================

    Last scans....

    1. Download Security Check from HERE, and save it to your Desktop.
    • Double-click SecurityCheck.exe
    • Follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

      NOTE SecurityCheck may produce some false warning(s), so leave the results reading to me.


    2. Download Temp File Cleaner (TFC)
    • Double click on TFC.exe to run the program.
    • Click on Start button to begin cleaning process.
    • TFC will close all running programs, and it may ask you to restart computer.


    3. Please run a free online scan with the ESET Online Scanner

    • Disable your antivirus program
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • IMPORTANT! UN-check Remove found threats
    • Accept any security warnings from your browser.
    • Check Scan archives
    • Click Start
    • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    • When the scan completes, push List of found threats
    • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    • NOTE. If Eset won't find any threats, it won't produce any log.
     
  2. 2011/01/27
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    I strongly suggest, you uninstall System Mechanic Professional.

    Registry cleaners/optimizers are not recommended for several reasons:

    • Registry cleaners are extremely powerful applications that can damage the registry by using aggressive cleaning routines and cause your computer to become unbootable.

      The Windows registry is a central repository (database) for storing configuration data, user settings and machine-dependent settings, and options for the operating system. It contains information and settings for all hardware, software, users, and preferences. Whenever a user makes changes to settings, file associations, system policies, or installed software, the changes are reflected and stored in this repository. The registry is a crucial component because it is where Windows "remembers" all this information, how it works together, how Windows boots the system and what files it uses when it does. The registry is also a vulnerable subsystem, in that relatively small changes done incorrectly can render the system inoperable. For a more detailed explanation, read Understanding The Registry.
    • Not all registry cleaners are created equal. There are a number of them available but they do not all work entirely the same way. Each vendor uses different criteria as to what constitutes a "bad entry ". One cleaner may find entries on your system that will not cause problems when removed, another may not find the same entries, and still another may want to remove entries required for a program to work.
    • Not all registry cleaners create a backup of the registry before making changes. If the changes prevent the system from booting up, then there is no backup available to restore it in order to regain functionality. A backup of the registry is essential BEFORE making any changes to the registry.
    • Improperly removing registry entries can hamper malware disinfection and make the removal process more difficult if your computer becomes infected. For example, removing malware related registry entries before the infection is properly identified can contribute to system instability and even make the malware undetectable to removal tools.
    • The usefulness of cleaning the registry is highly overrated and can be dangerous. In most cases, using a cleaner to remove obsolete, invalid, and erroneous entries does not affect system performance but it can result in "unpredictable results ".
    Unless you have a particular problem that requires a registry edit to correct it, I would suggest you leave the registry alone. Using registry cleaning tools unnecessarily or incorrectly could lead to disastrous effects on your operating system such as preventing it from ever starting again. For routine use, the benefits to your computer are negligible while the potential risks are great.


    =================================================================

    Update your Java version here: http://www.java.com/en/download/installed.jsp

    Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

    Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

    Now, we need to remove old Java version and its remnants...

    Download JavaRa to your desktop and unzip it to its own folder
    • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
    • Accept any prompts.

    ============================================================

    Run OTL
    • Under the [color= "#0000FF"]Custom Scans/Fixes[/color] box at the bottom, paste in the following

      Code:
      :OTL
      O28 - HKLM ShellExecuteHooks: {AEB6717E-7E19-11d0-97EE-00C04FD91972} - Reg Error: Key error. File not found
      [2010/05/05 12:22:50 | 000,000,056 | -H-- | C] () -- C:\ProgramData\ezsidmv.dat
      @Alternate Data Stream - 268 bytes -> C:\ProgramData\Temp:2B11E0DF
      @Alternate Data Stream - 113 bytes -> C:\ProgramData\Temp:8CE646EE
      
      
      :Commands
      [purity]
      [emptytemp]
      [emptyflash]
      [Reboot]
      
    • Then click the [color= "#FF0000"]Run Fix[/color] button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • You will get a log that shows the results of the fix. Please post it.

    =============================================================

    Last scans....

    1. Download Security Check from HERE, and save it to your Desktop.
    • Double-click SecurityCheck.exe
    • Follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

      NOTE SecurityCheck may produce some false warning(s), so leave the results reading to me.


    2. Download Temp File Cleaner (TFC)
    • Double click on TFC.exe to run the program.
    • Click on Start button to begin cleaning process.
    • TFC will close all running programs, and it may ask you to restart computer.


    3. Please run a free online scan with the ESET Online Scanner

    • Disable your antivirus program
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • IMPORTANT! UN-check Remove found threats
    • Accept any security warnings from your browser.
    • Check Scan archives
    • Click Start
    • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    • When the scan completes, push List of found threats
    • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    • NOTE. If Eset won't find any threats, it won't produce any log.
     

  3. to hide this advert.

  4. 2011/01/27
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    All processes killed
    ========== OTL ==========
    Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\\{AEB6717E-7E19-11d0-97EE-00C04FD91972} deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{AEB6717E-7E19-11d0-97EE-00C04FD91972}\ not found.
    C:\ProgramData\ezsidmv.dat moved successfully.
    ADS C:\ProgramData\Temp:2B11E0DF deleted successfully.
    ADS C:\ProgramData\Temp:8CE646EE deleted successfully.
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Guest
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->FireFox cache emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    User: Rick
    ->Temp folder emptied: 177429 bytes
    ->Temporary Internet Files folder emptied: 939754 bytes
    ->Java cache emptied: 2027 bytes
    ->FireFox cache emptied: 56471535 bytes
    ->Google Chrome cache emptied: 0 bytes
    ->Flash cache emptied: 456 bytes

    User: Stacey
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->FireFox cache emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 1100336 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 56.00 mb


    [EMPTYFLASH]

    User: All Users

    User: Default
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Flash cache emptied: 0 bytes

    User: Guest
    ->Flash cache emptied: 0 bytes

    User: Public

    User: Rick
    ->Flash cache emptied: 0 bytes

    User: Stacey
    ->Flash cache emptied: 0 bytes

    Total Flash Files Cleaned = 0.00 mb


    OTL by OldTimer - Version 3.2.20.6 log created on 01272011_211610

    Files\Folders moved on Reboot...
    File\Folder C:\Windows\temp\fb_876.lck not found!

    Registry entries deleted on Reboot...


    Results of screen317's Security Check version 0.99.7
    Windows Vista Service Pack 2 (UAC is enabled)
    Internet Explorer 8
    ``````````````````````````````
    Antivirus/Firewall Check:

    Windows Firewall Enabled!
    Norton Internet Security
    iolo technologies' System Mechanic Professional
    WMI entry may not exist for antivirus; attempting automatic update.
    ```````````````````````````````
    Anti-malware/Other Utilities Check:

    Malwarebytes' Anti-Malware
    CCleaner
    Java(TM) 6 Update 23
    Java(TM) 6 Update 7
    Out of date Java installed!
    Adobe Flash Player 10.1.102.64
    Adobe Reader 9.4.1
    Korean Fonts Support For Adobe Reader 9
    Out of date Adobe Reader installed!
    ````````````````````````````````
    Process Check:
    objlist.exe by Laurent

    Common Files Authentium AntiVirus5 vsedsps.exe
    Common Files Authentium AntiVirus5 vseamps.exe
    iolo Common Lib ioloServiceManager.exe
    iolo System Mechanic Professional System Shield ioloSSTray.exe
    ``````````End of Log````````````
     
  5. 2011/01/27
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Uninstall Java(TM) 6 Update 7 .

    Update Adobe Reader

    You can download it from http://www.adobe.com/products/acrobat/readstep2.html
    After installing the latest Adobe Reader, uninstall all previous versions.
    Note. If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

    Alternatively, you can uninstall Adobe Reader (33.5 MB), download and install Foxit PDF Reader(3.5MB) from HERE.
    It's a much smaller file to download and uses a lot less resources than Adobe Reader.
    Note: When installing FoxitReader, make sure to UN-check any pre-checked toolbar, or other garbage.
     
  6. 2011/01/28
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    I did not see that version of Java to delete. Adobe reader has been updated.
     
  7. 2011/01/28
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    That's fine.

    I'll wait for Eset scan log.
     
  8. 2011/01/29
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    WOW!

    C:\ProgramData\iolo\System Shield\Quarantined\EBOOKS1.ZIP.INFECTED multiple threats
    C:\ProgramData\iolo\System Shield\Quarantined\EBOOKS3.ZIP.INFECTED probably a variant of Win32/PSW.LdPinch.KNRLSYV trojan
    C:\ProgramData\iolo\System Shield\Quarantined\EBOOKS4.ZIP.INFECTED multiple threats
    C:\ProgramData\iolo\System Shield\Quarantined\INDEXCA767PYS.HTM(1).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEXCA767PYS.HTM.INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEXCAMRS365.PHP(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEXCAMRS365.PHP.INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[10].HTM.INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[11].HTM(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[11].HTM(2).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[11].HTM.INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[1].HTM(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[1].HTM(2).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[1].HTM(3).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[1].HTM(4).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[1].HTM.INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[1].PHP(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[1].PHP.INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[2].HTM(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[2].HTM(2).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[2].HTM(3).INFECTED HTML/Iframe.gen trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[2].HTM(4).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[2].HTM(5).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[2].HTM.INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[4].HTM(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[4].HTM(2).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[4].HTM(3).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[4].HTM.INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[5].HTM(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[5].HTM(2).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[5].HTM.INFECTED HTML/Iframe.gen trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM(1).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM(10).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM(11).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM(2).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM(3).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM(4).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM(5).INFECTED HTML/Iframe.gen trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM(6).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM(7).INFECTED HTML/ScrInject.B.Gen virus
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM(8).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM(9).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[6].HTM.INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[7].HTM(1).INFECTED HTML/Iframe.gen trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[7].HTM.INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\ProgramData\iolo\System Shield\Quarantined\INDEX[9].HTM.INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\ProgramData\iolo\System Shield\Quarantined\JAR_CACHE2117016277990101736.TMP.INFECTED multiple threats
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPTCA09KE43.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPTCA8IVAQG.JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPTCA8IVAQG.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPTCA8S8Q9D.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPTCA9QEX68.JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPTCA9QEX68.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPTCAHGGIQE.JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPTCAHGGIQE.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPTCALO2QJH.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPTCAQOCP73.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPTCAXJX1O3.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPT[10].JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPT[10].JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPT[11].JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPT[11].JS(2).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPT[11].JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPT[2].JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPT[2].JS(2).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPT[2].JS(3).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\ProgramData\iolo\System Shield\Quarantined\SCRIPT[2].JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Rick Stuff\Misc\xbadaBookDumpA.zip probably a variant of Win32/Bifrose.EGABMFG trojan
    C:\Rick Stuff\Misc\xbadaBookDumpA\xbadaBookDumpA\local\eorpackage\ypscraper.zip probably a variant of Win32/Bifrose.EGABMFG trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\EBOOKS1.ZIP.INFECTED multiple threats
    C:\Users\All Users\iolo\System Shield\Quarantined\EBOOKS3.ZIP.INFECTED probably a variant of Win32/PSW.LdPinch.KNRLSYV trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\EBOOKS4.ZIP.INFECTED multiple threats
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEXCA767PYS.HTM(1).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEXCA767PYS.HTM.INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEXCAMRS365.PHP(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEXCAMRS365.PHP.INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[10].HTM.INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[11].HTM(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[11].HTM(2).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[11].HTM.INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[1].HTM(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[1].HTM(2).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[1].HTM(3).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[1].HTM(4).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[1].HTM.INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[1].PHP(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[1].PHP.INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[2].HTM(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[2].HTM(2).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[2].HTM(3).INFECTED HTML/Iframe.gen trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[2].HTM(4).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[2].HTM(5).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[2].HTM.INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[4].HTM(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[4].HTM(2).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[4].HTM(3).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[4].HTM.INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[5].HTM(1).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[5].HTM(2).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[5].HTM.INFECTED HTML/Iframe.gen trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM(1).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM(10).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM(11).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM(2).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM(3).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM(4).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM(5).INFECTED HTML/Iframe.gen trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM(6).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM(7).INFECTED HTML/ScrInject.B.Gen virus
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM(8).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM(9).INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[6].HTM.INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[7].HTM(1).INFECTED HTML/Iframe.gen trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[7].HTM.INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\INDEX[9].HTM.INFECTED JS/TrojanDownloader.Gumblar.O trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\JAR_CACHE2117016277990101736.TMP.INFECTED multiple threats
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPTCA09KE43.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPTCA8IVAQG.JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPTCA8IVAQG.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPTCA8S8Q9D.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPTCA9QEX68.JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPTCA9QEX68.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPTCAHGGIQE.JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPTCAHGGIQE.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPTCALO2QJH.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPTCAQOCP73.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPTCAXJX1O3.JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPT[10].JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPT[10].JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPT[11].JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPT[11].JS(2).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPT[11].JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPT[2].JS(1).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPT[2].JS(2).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPT[2].JS(3).INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\All Users\iolo\System Shield\Quarantined\SCRIPT[2].JS.INFECTED JS/TrojanDownloader.HackLoad.AF trojan
    C:\Users\Rick\Desktop\HSS-1.49-install-webroot-225-conduit.exe a variant of Win32/HotSpotShield application
    C:\Users\Rick\Desktop\HSS-1.49-install-webroot-225-conduit[1].exe a variant of Win32/HotSpotShield application
     
  9. 2011/01/29
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Well, no big deal there.
    Most file are located in iolo quarantine folder (safe).

    Before we go any further I need some clarification about your security programs.
    I see:
    - Norton
    - Authentium AntiVirus5
    - iolo System Shield

    What's the story there?
     
  10. 2011/01/29
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    The only one installed right now as far as I know (nothing else shows in control panel) is Norton.
     
  11. 2011/01/29
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Run OTL
    • Under the [color= "#0000FF"]Custom Scans/Fixes[/color] box at the bottom, paste in the following

      Code:
      :OTL
      PRC - [2010/01/19 17:46:54 | 000,117,288 | R--- | M] (Authentium, Inc) -- C:\Program Files\Common Files\Authentium\AntiVirus5\vsedsps.exe
      PRC - [2010/01/19 17:46:48 | 000,121,384 | R--- | M] (Authentium, Inc) -- C:\Program Files\Common Files\Authentium\AntiVirus5\vseamps.exe
      SRV - [2010/01/19 17:46:56 | 000,158,248 | ---- | M] (Authentium, Inc) [On_Demand | Stopped] -- C:\Program Files\Common Files\Authentium\AntiVirus5\vseqrts.exe -- (vseqrts)
      SRV - [2010/01/19 17:46:54 | 000,117,288 | R--- | M] (Authentium, Inc) [Auto | Running] -- C:\Program Files\Common Files\Authentium\AntiVirus5\vsedsps.exe -- (vsedsps)
      SRV - [2010/01/19 17:46:48 | 000,121,384 | R--- | M] (Authentium, Inc) [Auto | Running] -- C:\Program Files\Common Files\Authentium\AntiVirus5\vseamps.exe -- (vseamps)
      DRV - [2010/01/19 17:53:46 | 000,127,016 | R--- | M] (Authentium, Inc) [Kernel | Auto | Running] -- C:\Windows\System32\drivers\amp.sys -- (AMP)
      DRV - [2010/01/19 17:53:44 | 001,118,248 | R--- | M] (Authentium, Inc) [Kernel | Auto | Running] -- C:\Windows\System32\drivers\ampse.sys -- (AMPSE)
      PRC - [2010/12/02 15:17:50 | 000,724,664 | ---- | M] (iolo technologies, LLC) -- C:\Program Files\iolo\Common\Lib\ioloServiceManager.exe
      PRC - [2010/07/06 14:44:02 | 000,789,680 | ---- | M] () -- C:\Program Files\iolo\System Mechanic Professional\System Shield\ioloSSTray.exe
      SRV - [2010/12/02 15:17:50 | 000,724,664 | ---- | M] (iolo technologies, LLC) [Auto | Running] -- C:\Program Files\iolo\Common\Lib\ioloServiceManager.exe -- (ioloSystemService)
      SRV - [2010/12/02 15:17:50 | 000,724,664 | ---- | M] (iolo technologies, LLC) [Auto | Running] -- C:\Program Files\iolo\Common\Lib\ioloServiceManager.exe -- (ioloFileInfoList)
      DRV - [2006/07/24 17:51:34 | 000,009,341 | ---- | M] (iolo technologies, LLC (based on original work by Bo Brantén)) [Kernel | System | Running] -- C:\Windows\System32\drivers\filedisk.sys -- (FileDisk)
      O4 - HKLM..\Run: [iolo Startup] C:\Program Files\iolo\Common\Lib\ioloLManager.exe (iolo technologies, LLC)
      O10 - Protocol_Catalog9\Catalog_Entries\000000000001 - C:\Windows\System32\iavlsp.dll (iolo technologies, LLC)
      O10 - Protocol_Catalog9\Catalog_Entries\000000000002 - C:\Windows\System32\iavlsp.dll (iolo technologies, LLC)
      O10 - Protocol_Catalog9\Catalog_Entries\000000000013 - C:\Windows\System32\iavlsp.dll (iolo technologies, LLC)
      [2011/01/27 19:01:41 | 000,000,448 | ---- | M] () -- C:\Windows\System32\iolo.ini
      [2010/05/31 21:36:42 | 000,000,000 | ---D | M] -- C:\Users\Rick\AppData\Roaming\iolo
      C:\ProgramData\iolo
      C:\Rick Stuff\Misc\xbadaBookDumpA.zip 
      C:\Rick Stuff\Misc\xbadaBookDumpA\xbadaBookDumpA\local\eorpackage\ypscraper.zip
      C:\Users\All Users\iolo
      C:\Users\Rick\Desktop\HSS-1.49-install-webroot-225-conduit.exe 
      C:\Users\Rick\Desktop\HSS-1.49-install-webroot-225-conduit[1].exe
      
      :Files
      C:\Program Files\Common Files\Authentium
      C:\Program Files\iolo
      
      
      :Commands
      [purity]
      [emptytemp]
      [emptyflash]
      [Reboot]
      
    • Then click the [color= "#FF0000"]Run Fix[/color] button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • You will get a log that shows the results of the fix. Please post it.

    ===============================================================

    Your computer is clean :)

    1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

    Run OTL

    • Under the Custom Scans/Fixes box at the bottom, paste in the following:

    Code:
    :OTL
    :Commands
    [purity]
    [emptytemp]
    [EMPTYFLASH]
    [CLEARALLRESTOREPOINTS]
    [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • Post resulting log.

    2. Now, we'll remove all tools, we used during our cleaning process

    Clean up with OTL:

    • Double-click OTL.exe to start the program.
    • Close all other programs apart from OTL as this step will require a reboot
    • On the OTL main screen, press the CLEANUP button
    • Say Yes to the prompt and then allow the program to reboot your computer.

    If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

    3. Make sure, Windows Updates are current.

    4. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

    7. Run Temporary File Cleaner (TFC) weekly.

    8. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

    9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
    The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

    10. Run defrag at your convenience.

    11. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

    12. Please, let me know, how your computer is doing.
     
  12. 2011/01/29
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    ========== OTL ==========
    Process vsedsps.exe killed successfully!
    Process vseamps.exe killed successfully!
    Service vseqrts stopped successfully!
    Service vseqrts deleted successfully!
    C:\Program Files\Common Files\Authentium\AntiVirus5\vseqrts.exe moved successfully.
    Service vsedsps stopped successfully!
    Service vsedsps deleted successfully!
    C:\Program Files\Common Files\Authentium\AntiVirus5\vsedsps.exe moved successfully.
    Service vseamps stopped successfully!
    Service vseamps deleted successfully!
    C:\Program Files\Common Files\Authentium\AntiVirus5\vseamps.exe moved successfully.
    Error: Unable to stop service AMP!
    Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AMP deleted successfully.
    C:\Windows\System32\drivers\amp.sys moved successfully.
    Service AMPSE stopped successfully!
    Service AMPSE deleted successfully!
    C:\Windows\System32\drivers\ampse.sys moved successfully.
    Process ioloServiceManager.exe killed successfully!
    Process ioloSSTray.exe killed successfully!
    Service ioloSystemService stopped successfully!
    Service ioloSystemService deleted successfully!
    C:\Program Files\iolo\Common\Lib\ioloServiceManager.exe moved successfully.
    Service ioloFileInfoList stopped successfully!
    Service ioloFileInfoList deleted successfully!
    File C:\Program Files\iolo\Common\Lib\ioloServiceManager.exe not found.
    Service FileDisk stopped successfully!
    Service FileDisk deleted successfully!
    C:\Windows\System32\drivers\filedisk.sys moved successfully.
    Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\iolo Startup deleted successfully.
    C:\Program Files\iolo\Common\Lib\ioloLManager.exe moved successfully.
    Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001\ deleted successfully.
    C:\Windows\System32\iavlsp.dll moved successfully.
    Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002\ deleted successfully.
    File C:\Windows\System32\iavlsp.dll not found.
    Registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000013\ deleted successfully.
    File C:\Windows\System32\iavlsp.dll not found.
    C:\Windows\System32\iolo.ini moved successfully.
    C:\Users\Rick\AppData\Roaming\iolo\SafetyNet\Temp folder moved successfully.
    C:\Users\Rick\AppData\Roaming\iolo\SafetyNet\Manual folder moved successfully.
    C:\Users\Rick\AppData\Roaming\iolo\SafetyNet folder moved successfully.
    C:\Users\Rick\AppData\Roaming\iolo\Registry\Working folder moved successfully.
    C:\Users\Rick\AppData\Roaming\iolo\Registry\Last folder moved successfully.
    C:\Users\Rick\AppData\Roaming\iolo\Registry folder moved successfully.
    C:\Users\Rick\AppData\Roaming\iolo\Installers folder moved successfully.
    C:\Users\Rick\AppData\Roaming\iolo\Disabled Entries\All Users folder moved successfully.
    C:\Users\Rick\AppData\Roaming\iolo\Disabled Entries folder moved successfully.
    C:\Users\Rick\AppData\Roaming\iolo folder moved successfully.
    ========== FILES ==========
    C:\Program Files\Common Files\Authentium\AntiVirus5\ampse folder moved successfully.
    C:\Program Files\Common Files\Authentium\AntiVirus5\ampmf folder moved successfully.
    C:\Program Files\Common Files\Authentium\AntiVirus5 folder moved successfully.
    C:\Program Files\Common Files\Authentium folder moved successfully.
    C:\Program Files\iolo\System Mechanic Professional\WebUpdate folder moved successfully.
    C:\Program Files\iolo\System Mechanic Professional\System Shield\WebUpdate folder moved successfully.
    C:\Program Files\iolo\System Mechanic Professional\System Shield folder moved successfully.
    C:\Program Files\iolo\System Mechanic Professional\Search and Recover\WebUpdate folder moved successfully.
    C:\Program Files\iolo\System Mechanic Professional\Search and Recover\Lib folder moved successfully.
    C:\Program Files\iolo\System Mechanic Professional\Search and Recover folder moved successfully.
    C:\Program Files\iolo\System Mechanic Professional\DriveScrubber\WebUpdate folder moved successfully.
    C:\Program Files\iolo\System Mechanic Professional\DriveScrubber folder moved successfully.
    Folder move failed. C:\Program Files\iolo\System Mechanic Professional scheduled to be moved on reboot.
    C:\Program Files\iolo\Common\System Shield folder moved successfully.
    C:\Program Files\iolo\Common\Lib folder moved successfully.
    C:\Program Files\iolo\Common folder moved successfully.
    Folder move failed. C:\Program Files\iolo scheduled to be moved on reboot.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\: LSP stack updated.

    OTL by OldTimer - Version 3.2.20.6 log created on 01292011_101647

    Files\Folders moved on Reboot...
    C:\Program Files\iolo\System Mechanic Professional folder moved successfully.
    C:\Program Files\iolo folder moved successfully.

    Registry entries deleted on Reboot...
     
  13. 2011/01/29
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    All processes killed
    ========== OTL ==========
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Guest
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->FireFox cache emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    User: Rick
    ->Temp folder emptied: 16272183 bytes
    ->Temporary Internet Files folder emptied: 841886 bytes
    ->Java cache emptied: 0 bytes
    ->FireFox cache emptied: 68341409 bytes
    ->Google Chrome cache emptied: 0 bytes
    ->Flash cache emptied: 1354 bytes

    User: Stacey
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->FireFox cache emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 4267968 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 86.00 mb


    [EMPTYFLASH]

    User: All Users

    User: Default
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Flash cache emptied: 0 bytes

    User: Guest
    ->Flash cache emptied: 0 bytes

    User: Public

    User: Rick
    ->Flash cache emptied: 0 bytes

    User: Stacey
    ->Flash cache emptied: 0 bytes

    Total Flash Files Cleaned = 0.00 mb



    OTL by OldTimer - Version 3.2.20.6 log created on 01292011_112013

    Files\Folders moved on Reboot...

    Registry entries deleted on Reboot...
     
  14. 2011/01/29
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    I don't see from OTL log, system restore has been reset.
    Please, do it manually.
     
  15. 2011/01/30
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    I uninstalled my other antivirus and installed eset and it created a restore point.
     
  16. 2011/01/30
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Creating new restore point is not enough.
    We need to delete old restore points as well, so....
    Turn system restore off.
    Restart computer and turn system restore on.

    How is computer doing?
     
  17. 2011/02/02
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Are you still out there?
     
  18. 2011/02/07
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    The issue seems to be resolved.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.