maya2 0 Denunciar post Postado Abril 23, 2009 oi gente eu sou nova por aqui e preciso da ajuda de você's minha net ficou lerda no dia 31 de março depois que eu passei o avast e o adware eu ñ sei se isso tem algo a ver pois eu já tinha eles no pc minha net esta lerda e ñ posso baixar mais nada esta parevendo discada eu ñ sei direito usar esse programa HijackThis mais eu abri o programa e fui no botão escrito " Do a system scan only " e veio este resultado: C:\Windows\system32\taskeng.exe C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Azureus\Azureus.exe C:\HijackThis\HiJackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.crawler.com/search/dispatcher.a...&tbid=60341 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: CUOLSearchHook Object - {1FE8243E-0A3A-41B9-B9CE-EFFEE51974D3} - C:\PROGRA~1\COMMON~1\uol\URLSEA~1\UOLSEA~1.DLL F2 - REG:system.ini: UserInit=C:\Windows\system32\userinit.exe,userinit.exe O1 - Hosts: ::1 localhost O2 - BHO: (no name) - {1CB20BF0-BBAE-40A7-93F4-6435FF3D0411} - C:\PROGRA~1\Crawler\Toolbar\ctbr.dll (file missing) O3 - Toolbar: Barra de Ferramentas &Crawler - {4B3803EA-5230-4DC3-A7FC-33638F3D3542} - C:\PROGRA~1\Crawler\Toolbar\ctbr.dll (file missing) O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE O8 - Extra context menu item: &Download all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202 O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201 O8 - Extra context menu item: &Download selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203 O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204 O8 - Extra context menu item: Download ALL with IDA - C:\Program Files\IDA\idaieall.htm O8 - Extra context menu item: Download with IDA - C:\Program Files\IDA\idaie.htm O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe O13 - Gopher Prefix: O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flas...ent/swflash.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{0E356637-99A1-40B8-AE5E-C9D1A6509C14}: NameServer = 200.222.25.129,200.222.25.130 O18 - Protocol: tbr - {4D25FB7A-8902-4291-960E-9ADA051CFBBF} - C:\PROGRA~1\Crawler\Toolbar\ctbr.dll (file missing) O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe -- End of file - 4188 bytes Alguem pode me ajudar já passei tanto antivirus no pc e nada resolveu, obrigada Compartilhar este post Link para o post Compartilhar em outros sites
DigRam 144 Denunciar post Postado Abril 24, 2009 Bom Dia! maya2 <@> Baixe: < ToolBar S&D > <@> Salve-o no Disco Local-C,em uma pasta própria. <@> Reinicie o computador,em Modo de Segurança. <-- Importante! <@> Execute o programa,e à seguir,aperte o "p" --> Enter --> Ok. <@> Digite o dois! ( 2 ) --> Aperte Enter --> Aguarde! <@> Terminando,poste o relatório. ( C:\ToolBar SD\TB_1.txt ) <><><><><><><><><><> <@> Vá a este link,e baixe: < Malwarebytes > <@> Atualize o programa! <@> Escolha o escaneamento Completo! <@> Desabilite programas de proteção,ao executar o malwarebytes. <@> Procure enviar os ítens detectados para a quarentena,clicando em Remover itens. <@> Para maiores detalhes: < Link > <@> Poste,os relatórios: mbam-log-2009-xx-xx (00-00-00).txt + HijackThis,atualizado. <><><><><><><><><><> <@> Baixe: < DDS > ( ...by sUBs ) <@> Salve-o no desktop! <@> Desabilite seus programas de proteção: antivírus,antimalware,antispyware ou firewall. <@> Estando desconectado,execute a ferramenta! --> Duplo clique em dds.scr. <@> Aguarde o término do scan,até obtermos o relatório. ( DDS.txt ) <-- <@> Surgirá,também,uma nova janela: "D.D.S - Optional_Scan" --> Clique em Sim. <@> O Bloco de Notas irá abrir,com outro relatório. ( Attach.txt ) <-- <@> Ps: Caso o relatório seja incompreensível,renomeie o executável para DDS.exe e repita o scan. <@> Outra janela,finalmente,abrir-se-à! --> Clique em OK. <@> Salve os relatórios: DDS.txt + Attach.txt <-- Poste-os! Abraços! Compartilhar este post Link para o post Compartilhar em outros sites
maya2 0 Denunciar post Postado Abril 24, 2009 Oi DigRam obrigada pela ajuda o relatorio do ToolBar foi: -----------\\ ToolBar S&D 1.2.8 XP/Vista Microsoft® Windows Vista™ Starter ( v6.0.6001 ) Service Pack 1 X86-based PC ( Multiprocessor Free : Intel® Celeron® CPU 2.80GHz ) BIOS : Award Modular BIOS v6.00PG USER : kelow ( Administrator ) BOOT : Fail-safe boot Antivirus : avast! antivirus 4.8.1290 [VPS 081122-0] 4.8.1290 (Activated) C:\ (Local Disk) - NTFS - Total:74 Go (Free:32 Go) D:\ (CD or DVD) E:\ (CD or DVD) "C:\ToolBar SD" ( MAJ : 21-12-2008|20:47 ) Option : [2] ( 24/04/2009|18:05 ) [ UAC => 1 ] C:\Windows\iun6002.exe C:\Program Files\Mozilla Firefox\searchplugins\crawlersrch.xml -----------\\ REMOVIDOS Deletado! - C:\Program Files\AskTBar\bar Deletado! - C:\Program Files\Crawler\firefox Deletado! - C:\Program Files\Crawler\Toolbar Deletado! - C:\Program Files\MyGlobalSearch\bar Deletado! - C:\Program Files\VMNToolbar\tbuninstall.exe Deletado! - C:\Program Files\VMNToolbar\uninstall.exe Deletado! - C:\Windows\iun6002.exe Deletado! - C:\Program Files\Mozilla Firefox\searchplugins\crawlersrch.xml Deletado! - C:\Program Files\AskTBar Deletado! - C:\Program Files\Crawler Deletado! - C:\Program Files\MyGlobalSearch Deletado! - C:\Program Files\VMNToolbar -----------\\ Procura por Arquivos / Ficheiros ... -----------\\ [..\Internet Explorer\Main] [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main] "Local Page"="C:\\Windows\\system32\\blank.htm" "Search Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch" "Start Page"="http://www.google.com" "Search Bar"="http://www.crawler.com/search/dispatcher.aspx?tp=aus&qkw=%s&tbid=60341" "Url"="http://go.microsoft.com/fwlink/?LinkId=75724" "Url"="http://go.microsoft.com/fwlink/?LinkId=75723" [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main] "Start Page"="http://www.msn.com/" "Default_Page_URL"="http://go.microsoft.com/fwlink/?LinkId=69157" "Default_Search_URL"="http://go.microsoft.com/fwlink/?LinkId=54896" "Search Page"="http://go.microsoft.com/fwlink/?LinkId=54896" --------------------\\ Procurando por outras infecções --------------------\\ Cracks & Keygens .. C:\Users\kelow\AppData\Local\Temp\crack C:\Users\kelow\AppData\Local\Temp\crack\leia-me.txt C:\Users\kelow\AppData\Roaming\Azureus\torrents\! Crack Photo Pos Pro [mininova].torrent C:\Users\kelow\Desktop\Programas\crack C:\Users\kelow\Desktop\Programas\Super.Video.Splitter.v5.4.+.Crack.by.multibrasil.blogspot.com.rar C:\Users\kelow\Desktop\Programas\crack\leia-me.txt C:\Users\kelow\Desktop\Programas\crack\videosplitter.exe C:\Users\kelow\Desktop\Programas\programas\crack C:\Users\kelow\Desktop\Programas\programas\crack\leia-me.txt C:\Users\kelow\Desktop\Programas\programas\crack\videosplitter.exe [ UAC => 1 ] 1 - "C:\ToolBar SD\TB_1.txt" - 24/04/2009|18:08 - Option : [2] -----------\\ Verificação completa em 18:08:26,68 <><><><><><><><><><> o relatorio do malwarebytes foi : Malwarebytes' Anti-Malware 1.36 Versão do banco de dados: 2036 Windows 6.0.6001 Service Pack 1 24/04/2009 20:05:04 mbam-log-2009-04-24 (20-04-48).txt Tipo de Verificação: Completa (C:\|) Objetos verificados: 164335 Tempo decorrido: 1 hour(s), 23 minute(s), 32 second(s) Processos da Memória infectados: 0 Módulos de Memória Infectados: 0 Chaves do Registro infectadas: 6 Valores do Registro infectados: 1 Ítens do Registro infectados: 3 Pastas infectadas: 0 Arquivos infectados: 0 Processos da Memória infectados: (Nenhum ítem malicioso foi detectado) Módulos de Memória Infectados: (Nenhum ítem malicioso foi detectado) Chaves do Registro infectadas: HKEY_CLASSES_ROOT\Interface\{37b85a2a-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken. HKEY_CLASSES_ROOT\Interface\{37b85a2c-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{37b85a21-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{37b85a2b-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{37b85a2b-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken. Valores do Registro infectados: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken. Ítens do Registro infectados: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken. Pastas infectadas: (Nenhum ítem malicioso foi detectado) Arquivos infectados: (Nenhum ítem malicioso foi detectado) <><><><><><><><><><> O resultado do HijackThis atualizado: Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 20:32:01, on 24/04/2009 Platform: Windows Vista SP1 (WinNT 6.00.1905) MSIE: Internet Explorer v7.00 (7.00.6001.18226) Boot mode: Normal Running processes: C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Windows\system32\taskeng.exe C:\Program Files\Alwil Software\Avast4\ashDisp.exe C:\Windows\System32\mobsync.exe C:\Windows\system32\prevhost.exe C:\Program Files\Mozilla Firefox\firefox.exe C:\HijackThis\HiJackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.crawler.com/search/dispatcher.a...&tbid=60341 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: CUOLSearchHook Object - {1FE8243E-0A3A-41B9-B9CE-EFFEE51974D3} - C:\PROGRA~1\COMMON~1\uol\URLSEA~1\UOLSEA~1.DLL F2 - REG:system.ini: UserInit=C:\Windows\system32\userinit.exe,userinit.exe, O1 - Hosts: ::1 localhost O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE O8 - Extra context menu item: &Download all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202 O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201 O8 - Extra context menu item: &Download selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203 O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204 O8 - Extra context menu item: Download ALL with IDA - C:\Program Files\IDA\idaieall.htm O8 - Extra context menu item: Download with IDA - C:\Program Files\IDA\idaie.htm O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe O9 - Extra button: (no name) - cmdmapping - (no file) (HKCU) O13 - Gopher Prefix: O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flas...ent/swflash.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{0E356637-99A1-40B8-AE5E-C9D1A6509C14}: NameServer = 200.222.25.129,200.222.25.130 O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe -- End of file - 3908 bytes <><><><><><><><><><> os relatórios do DDS.txt + Attach.txt : DDS (Ver_09-03-16.01) - NTFSx86 Run by kelow at 20:42:32,40 on 24/04/2009 Internet Explorer: 7.0.6001.18000 Microsoft® Windows Vista™ Starter 6.0.6001.1.1252.55.1046.18.479.103 [GMT -3:00] AV: avast! antivirus 4.8.1290 [VPS 081122-0] *On-access scanning enabled* (Updated) ============== Running Processes =============== C:\Windows\system32\wininit.exe C:\Windows\system32\lsm.exe C:\Windows\system32\svchost.exe -k DcomLaunch C:\Windows\system32\svchost.exe -k rpcss C:\Windows\System32\svchost.exe -k secsvcs C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted C:\Windows\system32\svchost.exe -k netsvcs C:\Windows\system32\SLsvc.exe C:\Windows\system32\svchost.exe -k LocalService C:\Windows\system32\svchost.exe -k NetworkService C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe C:\Program Files\Alwil Software\Avast4\ashServ.exe C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Windows\System32\spoolsv.exe C:\Windows\system32\taskeng.exe C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe C:\Windows\system32\svchost.exe -k imgsvc C:\Windows\System32\svchost.exe -k WerSvcGroup C:\Windows\system32\SearchIndexer.exe C:\Program Files\Alwil Software\Avast4\ashDisp.exe C:\Windows\System32\mobsync.exe C:\Windows\system32\taskeng.exe C:\Program Files\Mozilla Firefox\firefox.exe C:\Windows\system32\conime.exe C:\Users\kelow\Desktop\dds.scr C:\Windows\system32\wbem\wmiprvse.exe ============== Pseudo HJT Report =============== uStart Page = hxxp://www.google.com uSearch Bar = hxxp://www.crawler.com/search/dispatcher.aspx?tp=aus&qkw=%s&tbid=60341 mWindow Title = uURLSearchHooks: CUOLSearchHook Object: {1fe8243e-0a3a-41b9-b9ce-effee51974d3} - c:\progra~1\common~1\uol\urlsea~1\UOLSEA~1.DLL mURLSearchHooks: CUOLSearchHook Object: {1fe8243e-0a3a-41b9-b9ce-effee51974d3} - c:\progra~1\common~1\uol\urlsea~1\UOLSEA~1.DLL mWinlogon: Userinit=c:\windows\system32\userinit.exe,userinit.exe, TB: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No File TB: IDA Bar: {c70e30c7-140a-4166-a2e8-43557e62b41a} - c:\program files\ida\idabar.dll TB: {4E7BD74F-2B8D-469E-8DA9-FD60BB9AAE33} - No File TB: Megaupload Toolbar: {4e7bd74f-2b8d-469e-ccb0-b130eedbe97c} - c:\progra~1\megaup~1\MEGAUP~1.DLL TB: {4B3803EA-5230-4DC3-A7FC-33638F3D3542} - No File mRun: [avast!] c:\progra~1\alwils~1\avast4\ashDisp.exe mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office\OSA9.EXE uPolicies-explorer: NoDFSTab = 1 (0x1) mPolicies-system: EnableUIADesktopToggle = 0 (0x0) dPolicies-explorer: NoDFSTab = 1 (0x1) IE: &Download all by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/202 IE: &Download by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/201 IE: &Download selected by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/203 IE: &Grab video by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/204 IE: Download ALL with IDA - c:\program files\ida\idaieall.htm IE: Download with IDA - c:\program files\ida\idaie.htm IE: {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - c:\program files\ida\ida.exe DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/flashplayer/current/swflash.cab TCP: {0E356637-99A1-40B8-AE5E-C9D1A6509C14} = 200.222.25.129,200.222.25.130 ================= FIREFOX =================== FF - ProfilePath - c:\users\kelow\appdata\roaming\mozilla\firefox\profiles\qkf5eeja.default\ FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q= FF - prefs.js: browser.search.selectedEngine - Crawler Search FF - prefs.js: browser.startup.homepage - FF - prefs.js: keyword.URL - hxxp://www.crawler.com/search/dispatcher.aspx?tp=aus&tbid=60076&qkw= FF - component: c:\users\kelow\appdata\roaming\mozilla\firefox\profiles\qkf5eeja.default\extensions\{87f8774f-b485-47e2-a755-a40a8a5e886d}\components\GbMzhCef.dll FF - plugin: c:\program files\mozilla firefox\plugins\NPMyGlSh.dll ---- FIREFOX POLICIES ---- c:\program files\mozilla firefox\greprefs\all.js - pref("ui.allow_platform_file_picker", true); c:\program files\mozilla firefox\greprefs\all.js - pref("network.cookie.p3plevel", 1); // 0=low, 1=medium, 2=high, 3=custom c:\program files\mozilla firefox\greprefs\all.js - pref("network.enablePad", false); // Allow client to do proxy autodiscovery c:\program files\mozilla firefox\defaults\pref\firefox-l10n.js - pref("browser.fixup.alternate.suffix", ".com.br"); c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.urlbar.hideGoButton", false); c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.default", "chrome://branding/content/searchconfig.properties"); c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.custom", "chrome://branding/content/searchconfig.properties"); c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("signon.prefillForms", true); c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.remoteLookups", false); c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.updateURL", "http://sb.google.com/safebrowsing/update?client={moz:client}&appver={moz:version}&"); c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.lookupURL", "http://sb.google.com/safebrowsing/lookup?sourceid=firefox-antiphish&features=TrustRank&client={moz:client}&appver={moz:version}&"); c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.reportURL", "http://sb.google.com/safebrowsing/report?"); ============= SERVICES / DRIVERS =============== R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2008-4-4 114768] R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2008-4-4 20560] R2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2007-7-28 51792] S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2006-11-2 167936] =============== Created Last 30 ================ 2009-04-24 18:29 <DIR> --d----- c:\users\kelow\appdata\roaming\Malwarebytes 2009-04-24 18:29 15,504 a------- c:\windows\system32\drivers\mbam.sys 2009-04-24 18:29 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys 2009-04-24 18:29 <DIR> --d----- c:\programdata\Malwarebytes 2009-04-24 18:29 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware 2009-04-24 18:29 <DIR> --d----- c:\progra~2\Malwarebytes 2009-04-24 18:04 <DIR> --d----- C:\ToolBar SD 2009-04-24 17:53 <DIR> --d----- C:\ToolBarSD 2009-04-22 18:24 <DIR> --d----- C:\HijackThis 2009-04-16 18:44 4,429 a------- c:\windows\system32\BIN_STRSBW.SPT 2009-04-15 19:25 <DIR> --d----- c:\program files\Trend Micro 2009-04-15 19:04 <DIR> --d----- C:\MSNCleaner 2009-04-14 16:51 376,832 a------- c:\windows\system32\winhttp.dll 2009-04-14 16:51 562,176 a------- c:\windows\system32\msdtcprx.dll 2009-04-14 16:51 38,912 a------- c:\windows\system32\xolehlp.dll 2009-04-14 16:47 551,424 a------- c:\windows\system32\rpcss.dll 2009-04-14 16:47 3,599,328 a------- c:\windows\system32\ntkrnlpa.exe 2009-04-14 16:47 3,547,632 a------- c:\windows\system32\ntoskrnl.exe 2009-04-14 16:47 666,624 a------- c:\windows\system32\printfilterpipelinesvc.exe 2009-04-14 16:47 183,296 a------- c:\windows\system32\sdohlp.dll 2009-04-14 16:47 98,304 a------- c:\windows\system32\iasrecst.dll 2009-04-14 16:47 44,032 a------- c:\windows\system32\iasdatastore.dll 2009-04-14 16:47 26,112 a------- c:\windows\system32\printfilterpipelineprxy.dll 2009-04-14 16:47 54,784 a------- c:\windows\system32\iasads.dll 2009-04-14 16:47 17,408 a------- c:\windows\system32\iashost.exe 2009-04-14 16:45 1,255,936 a------- c:\windows\system32\lsasrv.dll 2009-04-14 16:45 72,704 a------- c:\windows\system32\secur32.dll 2009-04-14 16:45 24,064 a------- c:\windows\system32\amxread.dll 2009-04-14 16:45 13,824 a------- c:\windows\system32\apilogen.dll 2009-04-14 16:43 827,392 a------- c:\windows\system32\wininet.dll 2009-04-14 16:43 389,632 a------- c:\windows\system32\html.iec 2009-04-14 16:43 26,624 a------- c:\windows\system32\ieUnatt.exe 2009-04-14 16:43 78,336 a------- c:\windows\system32\ieencode.dll 2009-04-14 16:43 1,383,424 a------- c:\windows\system32\mshtml.tlb 2009-03-27 16:52 <DIR> --d----- c:\programdata\WindowsSearch ==================== Find3M ==================== 2009-03-17 00:38 40,960 a------- c:\windows\apppatch\apihex86.dll 2009-02-28 14:39 632,354 a------- c:\windows\system32\prfh0416.dat 2009-02-28 14:39 120,882 a------- c:\windows\system32\prfc0416.dat 2009-02-15 16:16 12,208 a--sh--- c:\windows\system32\KGyGaAvL.sys 2009-02-15 16:14 3,082 a------- c:\windows\system32\affv208325p1now.sys 2009-02-09 00:10 2,033,152 a------- c:\windows\system32\win32k.sys 2008-10-13 18:11 174 a--sh--- c:\program files\desktop.ini 2008-10-13 18:05 86,016 a------- c:\windows\inf\infstrng.dat 2008-10-13 18:05 86,016 a------- c:\windows\inf\infstor.dat 2008-10-13 18:05 51,200 a------- c:\windows\inf\infpub.dat 2008-10-13 17:52 665,600 a------- c:\windows\inf\drvindex.dat 2007-07-24 00:07 87,608 a------- c:\users\kelow\appdata\roaming\ezpinst.exe 2007-07-24 00:07 47,360 a------- c:\users\kelow\appdata\roaming\pcouffin.sys 2006-11-05 22:30 318,818 a------- c:\windows\inf\perflib\0416\perfi.dat 2006-11-05 22:30 318,818 a------- c:\windows\inf\perflib\0416\perfh.dat 2006-11-05 22:30 37,412 a------- c:\windows\inf\perflib\0416\perfd.dat 2006-11-05 22:30 37,412 a------- c:\windows\inf\perflib\0416\perfc.dat 2006-11-02 06:20 287,440 a------- c:\windows\inf\perflib\0000\perfi.dat 2006-11-02 06:20 287,440 a------- c:\windows\inf\perflib\0000\perfh.dat 2006-11-02 06:20 30,674 a------- c:\windows\inf\perflib\0000\perfd.dat 2006-11-02 06:20 30,674 a------- c:\windows\inf\perflib\0000\perfc.dat 2001-09-10 08:10 61,440 a------- c:\windows\inf\i386\onetUSD.dll 1998-05-12 04:01 8,944 a------- c:\windows\inf\i386\usbscan.sys ============= FINISH: 20:46:54,76 =============== UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG. IF REQUESTED, ZIP IT UP & ATTACH IT DDS (Ver_09-03-16.01) Microsoft® Windows Vista™ Starter Boot Device: \Device\HarddiskVolume1 Install Date: 15/05/2007 22:04:15 System Uptime: 24/04/2009 20:09:50 (0 hours ago) Motherboard: | | P4M800Pro-8237 Processor: Intel® Celeron® CPU 2.80GHz | Socket 775 | 2800/133mhz ==== Disk Partitions ========================= C: is FIXED (NTFS) - 75 GiB total, 32,056 GiB free. D: is CDROM () E: is CDROM () ==== Disabled Device Manager Items ============= Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318} Description: Adaptador do Microsoft 6to4 Device ID: ROOT\*6TO4MP\0005 Manufacturer: Microsoft Name: 6TO4 Adapter PNP Device ID: ROOT\*6TO4MP\0005 Service: tunnel Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318} Description: Adaptador do Microsoft 6to4 Device ID: ROOT\*6TO4MP\0101 Manufacturer: Microsoft Name: 6TO4 Adapter PNP Device ID: ROOT\*6TO4MP\0101 Service: tunnel Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318} Description: Adaptador do Microsoft 6to4 Device ID: ROOT\*6TO4MP\0106 Manufacturer: Microsoft Name: 6TO4 Adapter PNP Device ID: ROOT\*6TO4MP\0106 Service: tunnel Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318} Description: Adaptador do Microsoft 6to4 Device ID: ROOT\*6TO4MP\0109 Manufacturer: Microsoft Name: 6TO4 Adapter PNP Device ID: ROOT\*6TO4MP\0109 Service: tunnel Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318} Description: Adaptador do Microsoft 6to4 Device ID: ROOT\*6TO4MP\0122 Manufacturer: Microsoft Name: 6TO4 Adapter PNP Device ID: ROOT\*6TO4MP\0122 Service: tunnel Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318} Description: Adaptador do Microsoft 6to4 Device ID: ROOT\*6TO4MP\0128 Manufacturer: Microsoft Name: 6TO4 Adapter PNP Device ID: ROOT\*6TO4MP\0128 Service: tunnel Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318} Description: Adaptador do Microsoft 6to4 Device ID: ROOT\*6TO4MP\0156 Manufacturer: Microsoft Name: 6TO4 Adapter PNP Device ID: ROOT\*6TO4MP\0156 Service: tunnel Class GUID: {4d36e96d-e325-11ce-bfc1-08002be10318} Description: Fax Modem de Dados Motorola SM56 Device ID: PCI\VEN_1057&DEV_3052&SUBSYS_30201057&REV_04\3&13C0B0C5&0&58 Manufacturer: Motorola Inc Name: Fax Modem de Dados Motorola SM56 PNP Device ID: PCI\VEN_1057&DEV_3052&SUBSYS_30201057&REV_04\3&13C0B0C5&0&58 Service: Modem ==== System Restore Points =================== ==== Installed Programs ====================== Adobe Flash Player 10 ActiveX Adobe Flash Player 10 Plugin Arial Audio Converter version 2.3.94 Artista Mágico Disney Atheros Wireless LAN aTube Catcher 1.0 avast! Antivirus Azureus Vuze BSPlayer Collage Maker 2.03 ConvertXtoDVD 2.1.14.223 Creative Painter DVD Decrypter (Remove Only) FastStone Image Viewer 2.6 FileZilla Client 3.0.8.1 Foxit Reader Internet Download Accelerator version 5.2 Jigsaws Galore Macromedia Fireworks MX 2004 Magic Jigsaw Malwarebytes' Anti-Malware Megaupload Toolbar Microsoft Office 2000 Premium Mozilla Firefox (2.0.0.14) Nero 7 Essentials Orbit PaperPort 7.02 Photo Collage 2.0 Platform PowerDVD Sons do Microsoft Office TUGZip 3.4 Ultra RM Converter 3.5.0411 Ultra Video Splitter 5.4.0104 VIA Platform Device Manager Visioneer 4800 USB Webetiser Advent Calendar / Adventskalender 2004 WinAVI VideoConverter Windows Live installer Windows Live Messenger WYSIWYG Web Builder 5.5 Xara3D6 ==== End Of File =========================== Espero ter feito tudo certo ,abraço e obrigada mais uma vez. Compartilhar este post Link para o post Compartilhar em outros sites
DigRam 144 Denunciar post Postado Abril 25, 2009 Boa Noite! maya2 <@> Faça um escaneamento,online,em Eset. <@> Utilize o navegador Internet Explorer. <@> Marque a caixa: "SIM,aceito as condições de uso" --> Iniciar. <@> Marque a caixa: "YES, I accept the Terms of Use" --> Start. <@> Aceite a instalação do ActiveX e,ao terminar,salve e poste o relatório. ( C:\Arquivos de programas\EsetOnlineScanner\log ) Abraços! Compartilhar este post Link para o post Compartilhar em outros sites
maya2 0 Denunciar post Postado Abril 25, 2009 Boa noite DigRam ñ foi possivel fazer o que você falou por que apareceu essa mensagem: Error: cannot initialize OnlineScanner :A dministrator rights required. abraço Compartilhar este post Link para o post Compartilhar em outros sites
DigRam 144 Denunciar post Postado Abril 25, 2009 Boa noite DigRam ñ foi possivel fazer o que você falou por que apareceu essa mensagem: Error: cannot initialize OnlineScanner :A dministrator rights required. abraço <><><><><><><><><> Opa! maya2 <!> Para o êxito do scan,voçê deverá estar logada com atributos administrativos. <-- Verifique! <><><><><><><><><> <@> Baixe: < About:Buster > <@> Descompacte a ferramenta,para o seu Desktop! <@> Desconectada,e com as proteções residente de antispywares e antivírus,desabilitadas,rode a ferramenta. <@> Dê um duplo clique em aboutbuster.exe --> Clique OK --> Start --> OK. <@> Aguarde o término do scan,e salve o relatório. <-- Poste este relatório! <@> Poste: Relatório do A:B + HijackThis,atualizado. <><><><><><><><><> <@> Estando logada,com atributos administrativos,repita o scan em Eset. Abraços! Compartilhar este post Link para o post Compartilhar em outros sites
maya2 0 Denunciar post Postado Abril 27, 2009 Oi DigRam tudo bom, aqui esta o resultado do AboutBuster: AboutBuster 6.03 Scan started on [26/04/2009] at [20:18:22] ------------------------------------------------------------- Internet Explorer Instances Terminated! HomeSearch Service stopped if present ------------------------------------------------------------- No Ads Found! ------------------------------------------------------------- Error Removing ! : C:\Windows\system32\aswBoot.exe ------------------------------------------------------------- Scan was COMPLETED SUCCESSFULLY at 20:20:38 ___________________________________________________ o resultado do HijackThis : Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 20:26:54, on 26/04/2009 Platform: Windows Vista SP1 (WinNT 6.00.1905) MSIE: Internet Explorer v7.00 (7.00.6001.18226) Boot mode: Normal Running processes: C:\Windows\system32\taskeng.exe C:\Windows\system32\Dwm.exe C:\Program Files\Alwil Software\Avast4\ashDisp.exe C:\Program Files\Mozilla Firefox\firefox.exe C:\Windows\Explorer.exe C:\HijackThis\HiJackThis.exe R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: CUOLSearchHook Object - {1FE8243E-0A3A-41B9-B9CE-EFFEE51974D3} - C:\PROGRA~1\COMMON~1\uol\URLSEA~1\UOLSEA~1.DLL F2 - REG:system.ini: UserInit=C:\Windows\system32\userinit.exe,userinit.exe, O1 - Hosts: ::1 localhost O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE O8 - Extra context menu item: &Download all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202 O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201 O8 - Extra context menu item: &Download selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203 O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204 O8 - Extra context menu item: Download ALL with IDA - C:\Program Files\IDA\idaieall.htm O8 - Extra context menu item: Download with IDA - C:\Program Files\IDA\idaie.htm O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe O9 - Extra button: (no name) - cmdmapping - (no file) (HKCU) O13 - Gopher Prefix: O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flas...ent/swflash.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{0E356637-99A1-40B8-AE5E-C9D1A6509C14}: NameServer = 200.222.25.129,200.222.25.130 O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe -- End of file - 3481 bytes o Eset ñ comsigo mesmo, beijosssss Compartilhar este post Link para o post Compartilhar em outros sites
DigRam 144 Denunciar post Postado Abril 27, 2009 Bom Dia! maya2 <!> Caso esteja tudo ok,com a sua Net,pode abortar o uso do ComboFix. <><><><><><><><><><><><> <@> Baixe: < > ( ...by sUBs ) <@> Salve-o no desktop! <@> Desabilite as proteções residente de: antivírus,antispywares e firewall. ( Menos o do Windows! ) <@> Feche todas as janelas e execute a ferramenta! <@> Na solicitação: "Negação de garantia de software" --> Clique em Sim! <@> Não possuindo o "Console de Recuperação",aceite optar pela instalação do mesmo! <!> Caso aconteça a notificação de: Aplicativo Win32 inválido,delete a ferramenta e faça,novamente,o download.<!> Salve-a no desktop,renomeada como: Kombo.exe <!> Ps: Nomeie durante o salvamento,e não após salvá-la! <!> Ps: Surgindo alguma mensagem de erro,rode o ComboFix.exe em "Modo de Segurança". <-- Link! <!> Ps: Para completar as remoções,talvez haja necessidade da ferramenta reiniciar o computador. <-- Aguarde! <!> Ps: Evite executar,voluntariamente,esta ferramenta! <!> Ps: Para evitar problemas,siga todas as recomendações propostas. <!> Ps: O ComboFix é uma ferramenta que pode danificar o sistema. Utilize-o,somente,sob supervisão profissional. <@> Abrir-se-á a janela Auto Scan. --> Aguarde! <@> Àfim de completar as remoções,o ComboFix poderá reiniciar o computador. <@> Se houver necessidade,digite a opção para continuar! --> ( 1 ) --> Aperte Enter! --> Aguarde a conclusão! <@> Durante o scan,evite manusear o mouse ou teclado! <-- Importante! <@> Para parar ou sair do ComboFix,tecle "N" ou "2" --> Aperte Enter! <><><><><><><><><><><><> <@> Terminando,poste os relatórios: C:\ComboFix\ComboFix.txt + HijackThis,atualizado. Abraços! Compartilhar este post Link para o post Compartilhar em outros sites
maya2 0 Denunciar post Postado Abril 27, 2009 Oi DigRam tõ te dando um trabalhão né? eu fiz o que você falou por que ñ sei meu pc continua lerdo será que eu vou ter que formatar ? espero que ñ aqui esta os resultados ,beijos : ComboFix : ComboFix 09-04-27.02 - kelow 27/04/2009 18:15.1 - NTFSx86 Microsoft® Windows Vista™ Starter 6.0.6001.1.1252.55.1046.18.479.120 [GMT -3:00] Executando de: c:\users\kelow\Desktop\ComboFix.exe * Criado um novo ponto de restauro . ADS - Windows: deleted 48 bytes in 1 streams. ((((((((((((((((((((((((((((((((((((( Outras Exclusões ))))))))))))))))))))))))))))))))))))))))))))))))))) . c:\users\kelow\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Videos.url c:\users\kelow\FAVORI~1\Videos.url c:\users\kelow\Favorites\Videos.url c:\windows\system32\simdataconf.dll . (((((((((((((((( Arquivos/Ficheiros criados de 2009-05-27 to 2009-4-27 )))))))))))))))))))))))))))) . 2009-04-25 21:52 . 2009-04-25 21:52 -------- d-----w c:\users\Lois\AppData\Local\Mozilla 2009-04-25 21:52 . 2009-04-25 21:52 -------- d-----r c:\users\Lois\Searches 2009-04-25 21:52 . 2009-04-25 21:52 -------- d-----r c:\users\Lois\Contacts 2009-04-25 21:52 . 2009-04-25 21:52 -------- d-----w c:\users\Lois\AppData\Local\VirtualStore 2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\users\kelow\AppData\Roaming\Malwarebytes 2009-04-24 21:29 . 2009-04-06 18:32 15504 ----a-w c:\windows\system32\drivers\mbam.sys 2009-04-24 21:29 . 2009-04-06 18:32 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys 2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\programdata\Malwarebytes 2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\users\All Users\Malwarebytes 2009-04-24 21:29 . 2009-04-24 23:05 -------- d-----w c:\program files\Malwarebytes' Anti-Malware 2009-04-24 21:04 . 2009-04-24 21:08 -------- d-----w C:\ToolBar SD 2009-04-24 20:53 . 2009-04-24 20:54 -------- d-----w C:\ToolBarSD 2009-04-22 21:24 . 2009-04-26 23:26 -------- d-----w C:\HijackThis 2009-04-15 22:25 . 2009-04-15 22:25 -------- d-----w c:\program files\Trend Micro 2009-04-15 22:04 . 2009-04-15 22:06 -------- d-----w C:\MSNCleaner 2009-04-14 19:51 . 2008-12-06 04:42 376832 ----a-w c:\windows\system32\winhttp.dll 2009-04-14 19:51 . 2008-06-06 03:27 562176 ----a-w c:\windows\system32\msdtcprx.dll 2009-04-14 19:51 . 2008-06-06 03:27 38912 ----a-w c:\windows\system32\xolehlp.dll 2009-04-14 19:47 . 2009-03-03 04:39 551424 ----a-w c:\windows\system32\rpcss.dll 2009-04-14 19:47 . 2009-03-03 04:46 3599328 ----a-w c:\windows\system32\ntkrnlpa.exe 2009-04-14 19:47 . 2009-03-03 04:46 3547632 ----a-w c:\windows\system32\ntoskrnl.exe 2009-04-14 19:47 . 2009-03-03 03:04 666624 ----a-w c:\windows\system32\printfilterpipelinesvc.exe 2009-04-14 19:47 . 2009-03-03 04:39 26112 ----a-w c:\windows\system32\printfilterpipelineprxy.dll 2009-04-14 19:47 . 2009-03-03 04:39 183296 ----a-w c:\windows\system32\sdohlp.dll 2009-04-14 19:47 . 2009-03-03 04:37 98304 ----a-w c:\windows\system32\iasrecst.dll 2009-04-14 19:47 . 2009-03-03 04:37 44032 ----a-w c:\windows\system32\iasdatastore.dll 2009-04-14 19:47 . 2009-03-03 04:37 54784 ----a-w c:\windows\system32\iasads.dll 2009-04-14 19:47 . 2009-03-03 02:38 17408 ----a-w c:\windows\system32\iashost.exe 2009-04-14 19:45 . 2009-02-13 08:49 1255936 ----a-w c:\windows\system32\lsasrv.dll 2009-04-14 19:45 . 2009-02-13 08:49 72704 ----a-w c:\windows\system32\secur32.dll 2009-04-14 19:45 . 2009-03-17 03:38 13824 ----a-w c:\windows\system32\apilogen.dll 2009-04-14 19:45 . 2009-03-17 03:38 24064 ----a-w c:\windows\system32\amxread.dll 2009-04-14 19:43 . 2009-03-03 04:40 827392 ----a-w c:\windows\system32\wininet.dll 2009-04-14 19:43 . 2009-03-03 02:28 26624 ----a-w c:\windows\system32\ieUnatt.exe 2009-04-14 19:43 . 2009-03-03 04:37 78336 ----a-w c:\windows\system32\ieencode.dll . ((((((((((((((((((((((((((((((((((((( Relatório Find3M )))))))))))))))))))))))))))))))))))))))))))))))))))) . 2009-04-27 21:08 . 2007-05-16 01:13 2032 ----a-w c:\users\kelow\AppData\Local\d3d9caps.dat 2009-04-26 23:39 . 2009-04-25 21:51 680 ----a-w c:\users\Lois\AppData\Local\d3d9caps.dat 2009-04-16 21:47 . 2008-12-10 14:34 -------- d-----w c:\program files\Common Files\Macromedia 2009-04-16 21:47 . 2007-05-16 11:52 -------- d--h--w c:\program files\InstallShield Installation Information 2009-04-16 21:44 . 2007-07-24 02:38 -------- d-----w c:\program files\DivX 2009-04-16 21:43 . 2007-07-24 02:40 -------- d-----w c:\program files\BearShare 2009-04-16 00:15 . 2008-12-10 11:31 -------- d-----w c:\program files\IDA 2009-04-16 00:15 . 2008-08-30 19:43 -------- d-----w c:\program files\Orbitdownloader 2009-04-15 13:25 . 2006-11-02 11:18 -------- d-----w c:\program files\Windows Mail 2009-04-13 20:23 . 2008-12-19 19:49 -------- d-----w c:\program files\WYSIWYG.Web.Builder.v5.5.2.Cracked 2009-04-11 03:21 . 2008-02-12 22:48 -------- d-----w c:\program files\Azureus 2009-03-17 03:38 . 2009-04-14 19:45 40960 ----a-w c:\windows\AppPatch\apihex86.dll 2009-02-28 17:39 . 2006-11-06 01:33 632354 ----a-w c:\windows\system32\prfh0416.dat 2009-02-28 17:39 . 2006-11-06 01:33 120882 ----a-w c:\windows\system32\prfc0416.dat 2009-02-15 19:16 . 2009-02-15 19:16 12208 --sha-w c:\windows\system32\KGyGaAvL.sys 2009-02-15 19:14 . 2008-02-10 17:36 3082 ----a-w c:\windows\system32\affv208325p1now.sys 2009-02-09 03:10 . 2009-03-11 19:26 2033152 ----a-w c:\windows\system32\win32k.sys 2009-02-05 22:06 . 2007-07-29 02:01 51792 ----a-w c:\windows\system32\drivers\aswMonFlt.sys 2008-10-13 21:11 . 2006-11-02 12:50 174 --sha-w c:\program files\desktop.ini 2008-04-07 09:25 . 2008-08-31 15:32 67696 ----a-w c:\program files\mozilla firefox\components\jar50.dll 2008-04-07 09:25 . 2008-08-31 15:32 54376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll 2008-04-07 09:25 . 2008-08-31 15:32 34952 ----a-w c:\program files\mozilla firefox\components\myspell.dll 2008-04-07 09:25 . 2008-08-31 15:32 46720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll 2008-04-07 09:25 . 2008-08-31 15:32 172144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll . (((((((((((((((((((((((((( Pontos de Carregamento do Registro ))))))))))))))))))))))))))))))))))))))) . . *Nota* entradas vazias e legítimas por defeito não são mostradas. REGEDIT4 [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system] "EnableLUA"= 0 (0x0) "EnableUIADesktopToggle"= 0 (0x0) [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer] "NoDFSTab"= 1 (0x1) [HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer] "NoDFSTab"= 1 (0x1) [HKEY_LOCAL_MACHINE\software\microsoft\security center] "AntiVirusOverride"=dword:00000001 "FirewallOverride"=dword:00000001 [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc] "AntiVirusOverride"=dword:00000001 [HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules] "TCP Query User{9111B6E0-61FA-4F1A-BA3C-EE3FAB0C3F67}c:\\program files\\bearshare\\bearshare.exe"= UDP:c:\program files\bearshare\bearshare.exe:BearShare "UDP Query User{2D96DA3A-C920-4132-8700-DF7FFFF19638}c:\\program files\\bearshare\\bearshare.exe"= TCP:c:\program files\bearshare\bearshare.exe:BearShare "TCP Query User{524519EF-BF7B-49B9-8889-0A14FD3876F7}c:\\program files\\orbitdownloader\\orbitnet.exe"= UDP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader "UDP Query User{0E5B2CED-79EE-4D88-B291-D64BBF1B9D16}c:\\program files\\orbitdownloader\\orbitnet.exe"= TCP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader "TCP Query User{6D1FB056-3C84-4AC0-B3E2-0E8DBE36D7E7}c:\\program files\\orbitdownloader\\orbitnet.exe"= UDP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader "UDP Query User{77C67769-9C0E-4851-B259-3263507C66F7}c:\\program files\\orbitdownloader\\orbitnet.exe"= TCP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader "TCP Query User{0F5E2FEE-4418-4712-AB8B-61271E14CBE0}c:\\program files\\orbitdownloader\\orbitdm.exe"= UDP:c:\program files\orbitdownloader\orbitdm.exe:Orbit Downloader "UDP Query User{CCD1203E-A9DC-4020-A1BD-628874DA26A2}c:\\program files\\orbitdownloader\\orbitdm.exe"= TCP:c:\program files\orbitdownloader\orbitdm.exe:Orbit Downloader "{C4875B03-AA7B-4CA4-A67D-5E93A2753EC3}"= UDP:57487:bearshare "TCP Query User{960AA96E-FD89-4A54-9865-8E12839BF61E}c:\\program files\\bearshare\\bearshare.exe"= UDP:c:\program files\bearshare\bearshare.exe:BearShare "UDP Query User{F61213C1-3592-4117-AC39-0E2B244BB330}c:\\program files\\bearshare\\bearshare.exe"= TCP:c:\program files\bearshare\bearshare.exe:BearShare "{25AE9187-C40C-40DE-8F2D-617C58C2539A}"= UDP:26384:BitComet 26384 TCP "{AAF49D9C-8A47-4FF3-83E5-A4E800FA5383}"= TCP:26384:BitComet 26384 UDP "TCP Query User{F7D2CFD3-DAE8-4A4C-A6F6-AFC6EF8F32ED}c:\\program files\\bitcomet\\bitcomet.exe"= UDP:c:\program files\bitcomet\bitcomet.exe:BitComet - a BitTorrent Client "UDP Query User{D6913133-65A8-4529-B466-58BB1D482B89}c:\\program files\\bitcomet\\bitcomet.exe"= TCP:c:\program files\bitcomet\bitcomet.exe:BitComet - a BitTorrent Client "{0C8D9895-E5D5-4997-8A90-6C433E12A0F6}"= TCP:6347:bearshare1 "{E525BBF9-8E5E-4718-8210-0F2A280A322D}"= Disabled:UDP:49155:shareaza1 "{454CF4EA-0AF5-4E1B-ABC1-4EFA1D471F3C}"= UDP:c:\program files\DNA\btdna.exe:DNA "{5BC93113-0EEE-4439-99E0-757B2FA8C2DC}"= TCP:c:\program files\DNA\btdna.exe:DNA "{D2DDB2E4-C321-43DA-A515-DC122DD61603}"= UDP:c:\program files\BitTorrent\bittorrent.exe:BitTorrent "{A7812BD5-0490-470E-97B5-E7DFD76E99FE}"= TCP:c:\program files\BitTorrent\bittorrent.exe:BitTorrent "TCP Query User{36F7F528-96BA-46B7-BFE9-0C28C3776761}c:\\users\\kelow\\program files\\dna\\btdna.exe"= UDP:c:\users\kelow\program files\dna\btdna.exe:btdna.exe "UDP Query User{0158F188-6ADA-4505-9554-E020A05BDA90}c:\\users\\kelow\\program files\\dna\\btdna.exe"= TCP:c:\users\kelow\program files\dna\btdna.exe:btdna.exe "{C998C340-34BA-4436-BFD9-3214E67E0521}"= UDP:6885:azureus "TCP Query User{6CD3A550-3317-4F2D-A281-BA062AE00D31}c:\\program files\\internet explorer\\iexplore.exe"= UDP:c:\program files\internet explorer\iexplore.exe:Internet Explorer "UDP Query User{8ABEE96C-2D69-483F-86CB-ADA2512C88CF}c:\\program files\\internet explorer\\iexplore.exe"= TCP:c:\program files\internet explorer\iexplore.exe:Internet Explorer "{2EB75AD1-4935-48CC-8AD9-786D47E69B16}"= UDP:6883:azureus "TCP Query User{B9B6B949-0488-412C-9D43-B52A7B41B2B6}c:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= Disabled:UDP:c:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza "UDP Query User{9F7C78C3-475D-41C4-9408-57DD9374144B}c:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= Disabled:TCP:c:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza "{82DDD077-BE0B-401E-9A15-71A84FD586D6}"= UDP:c:\users\kelow\Desktop\VDownloader.exe:VDownloader "{E2840104-86A2-4DEF-91A0-8A5D81A1E3E5}"= TCP:c:\users\kelow\Desktop\VDownloader.exe:VDownloader "TCP Query User{627B8B9B-ED0F-48EA-85BA-CB8659CB0F35}c:\\program files\\nero\\nero 7\\nero showtime\\showtime.exe"= UDP:c:\program files\nero\nero 7\nero showtime\showtime.exe:Nero ShowTime Essentials "UDP Query User{E16FD3D6-7C99-48E9-BCA9-448CC7AD4428}c:\\program files\\nero\\nero 7\\nero showtime\\showtime.exe"= TCP:c:\program files\nero\nero 7\nero showtime\showtime.exe:Nero ShowTime Essentials "TCP Query User{A9D71AFD-C9AE-4593-ADDB-E61F35475160}c:\\program files\\ares\\ares.exe"= UDP:c:\program files\ares\ares.exe:Ares p2p for windows "UDP Query User{49D02A80-50F5-4974-AE8F-B7DDA2500153}c:\\program files\\ares\\ares.exe"= TCP:c:\program files\ares\ares.exe:Ares p2p for windows "{88BA0F56-AC23-4942-8F20-702D02451C96}"= c:\program files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone) "TCP Query User{A90CA7E6-A1F6-4221-A641-144947793BA1}c:\\program files\\azureus\\azureus.exe"= UDP:c:\program files\azureus\azureus.exe:Azureus "UDP Query User{68E0BEA7-B7DB-4DE2-A027-AE95BDC6ED0C}c:\\program files\\azureus\\azureus.exe"= TCP:c:\program files\azureus\azureus.exe:Azureus "{9C255BE3-B5B0-40C5-AD09-AA2036369ECC}"= UDP:c:\program files\Mozilla Firefox\firefox.exe:Mozilla Firefox "{01F0A01C-E076-4420-9286-5AE99E3093E8}"= TCP:c:\program files\Mozilla Firefox\firefox.exe:Mozilla Firefox "TCP Query User{EBDC8018-9E0F-405B-9718-8FF002B3D459}c:\\program files\\mirc\\mirc.exe"= UDP:c:\program files\mirc\mirc.exe:mIRC "UDP Query User{9E79CA84-F5DF-4C3B-9E90-C3C1E1606A07}c:\\program files\\mirc\\mirc.exe"= TCP:c:\program files\mirc\mirc.exe:mIRC "TCP Query User{05F04037-A599-48EE-9CD7-E2FFBAB7D617}c:\\program files\\dap\\dap.exe"= UDP:c:\program files\dap\dap.exe:Download Accelerator Plus (DAP) "UDP Query User{9BB2BB40-3FFA-4C7E-B050-365A75A1CD97}c:\\program files\\dap\\dap.exe"= TCP:c:\program files\dap\dap.exe:Download Accelerator Plus (DAP) "{D98823A2-EF58-4AE1-8341-B5336364357A}"= UDP:6881:azureus "TCP Query User{24219510-B782-4DED-8F79-904D0BF8CB2F}c:\\program files\\filezilla ftp client\\filezilla.exe"= UDP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client "UDP Query User{5301F8B8-5830-4865-A724-9F4E32D55883}c:\\program files\\filezilla ftp client\\filezilla.exe"= TCP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client "TCP Query User{BEF14530-FB5D-4603-9D7D-70BB00E083BA}c:\\program files\\shareaza\\shareaza.exe"= Disabled:UDP:c:\program files\shareaza\shareaza.exe:Shareaza Ultimate File Sharing "UDP Query User{47B4991B-714F-43C5-AF7E-9ADA7503A706}c:\\program files\\shareaza\\shareaza.exe"= Disabled:TCP:c:\program files\shareaza\shareaza.exe:Shareaza Ultimate File Sharing "TCP Query User{15FDD6A4-2FF2-48A1-B323-047E57847FD5}c:\\program files\\azureus\\azureus.exe"= UDP:c:\program files\azureus\azureus.exe:Azureus "UDP Query User{60B68D20-88FE-45A5-AA8E-81D20D996635}c:\\program files\\azureus\\azureus.exe"= TCP:c:\program files\azureus\azureus.exe:Azureus "{867290A1-9295-4E98-B09B-006C3B9ED1D7}"= UDP:c:\users\kelow\Desktop\Programas\VDownloader.exe:VDownloader "{6A0339E7-9160-4578-8F4A-12BCC35B67D4}"= TCP:c:\users\kelow\Desktop\Programas\VDownloader.exe:VDownloader "TCP Query User{B03C713E-BFAD-4CE4-B659-4ABF5632EFE3}c:\\program files\\filezilla ftp client\\filezilla.exe"= UDP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client "UDP Query User{5C94D225-2F3C-4D2A-A33E-CFC9987BDA9C}c:\\program files\\filezilla ftp client\\filezilla.exe"= TCP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client "{94DBADC9-26F1-410E-B0EF-EB1D0A798244}"= UDP:c:\program files\DsNET Corp\aTube Catcher 1.0\yct.exe:aTube Catcher "{912FE133-C6CF-4777-B8D0-504B9F453339}"= TCP:c:\program files\DsNET Corp\aTube Catcher 1.0\yct.exe:aTube Catcher "{AE65C5E1-C888-4628-B428-80A5BD679073}"= UDP:c:\users\kelow\Desktop\Programas\Vidownloader\VDownloader.exe:VDownloader "{57D22DF4-544B-4E09-A419-F957045401E7}"= TCP:c:\users\kelow\Desktop\Programas\Vidownloader\VDownloader.exe:VDownloader "{FD7CE07B-1404-4C89-B744-8216A8E293BB}"= UDP:c:\program files\Malwarebytes' Anti-Malware\mbam.exe:Malwarebytes' Anti-Malware "{335BE7F0-5331-45E8-98CE-19F2409CF53F}"= TCP:c:\program files\Malwarebytes' Anti-Malware\mbam.exe:Malwarebytes' Anti-Malware "TCP Query User{A2745A60-9FDD-4F16-B444-725FF8641871}c:\\program files\\mirc\\mirc.exe"= Disabled:UDP:c:\program files\mirc\mirc.exe:mIRC "UDP Query User{E3A44E4F-BAD8-4FA5-AD38-C5F7CD593019}c:\\program files\\mirc\\mirc.exe"= Disabled:TCP:c:\program files\mirc\mirc.exe:mIRC "TCP Query User{D486ABFB-F3A8-4DE1-A776-615CAF0F07B4}c:\\mirc\\mirc.exe"= Disabled:UDP:c:\mirc\mirc.exe:mIRC "UDP Query User{3E0696F4-AEED-4B82-B76F-D6074AACBD84}c:\\mirc\\mirc.exe"= Disabled:TCP:c:\mirc\mirc.exe:mIRC "TCP Query User{F6DBF0F8-6770-4E55-9565-7411CB329B1D}c:\\users\\kelow\\desktop\\programas\\mirc.exe"= Disabled:UDP:c:\users\kelow\desktop\programas\mirc.exe:mirc.exe "UDP Query User{0613EB7E-8E00-47F7-8242-FE2EE6C7B17B}c:\\users\\kelow\\desktop\\programas\\mirc.exe"= Disabled:TCP:c:\users\kelow\desktop\programas\mirc.exe:mirc.exe "{AE2A1E8A-3177-4218-8962-21E91A2D8155}"= UDP:c:\users\kelow\Desktop\dds.scr:dds "{A849525C-E551-4A99-8B37-9FFFF813F804}"= TCP:c:\users\kelow\Desktop\dds.scr:dds [HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile\AuthorizedApplications\List] "c:\\Program Files\\Orbitdownloader\\orbitdm.exe"= c:\program files\Orbitdownloader\orbitdm.exe:*:Enabled:Orbit "c:\\Program Files\\Orbitdownloader\\orbitnet.exe"= c:\program files\Orbitdownloader\orbitnet.exe:*:Enabled:Orbit R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\DRIVERS\b57nd60x.sys [2006-11-02 167936] S2 aswMonFlt;aswMonFlt;c:\windows\system32\DRIVERS\aswMonFlt.sys [2009-02-05 51792] [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost] LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c7452b84-0348-11dc-a68e-806e6f6e6963}] \shell\AutoRun\command - d:\autorun\Demo32.exe . . ------- Scan Suplementar ------- . mWindow Title = IE: &Download all by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/202 IE: &Download by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/201 IE: &Download selected by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/203 IE: &Grab video by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/204 IE: Download ALL with IDA - c:\program files\IDA\idaieall.htm IE: Download with IDA - c:\program files\IDA\idaie.htm TCP: {0E356637-99A1-40B8-AE5E-C9D1A6509C14} = 200.222.25.129,200.222.25.130 FF - ProfilePath - c:\users\kelow\AppData\Roaming\Mozilla\Firefox\Profiles\qkf5eeja.default\ FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q= FF - prefs.js: browser.search.selectedEngine - Crawler Search FF - prefs.js: browser.startup.homepage - FF - prefs.js: keyword.URL - hxxp://www.crawler.com/search/dispatcher.aspx?tp=aus&tbid=60076&qkw= FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll FF - component: c:\users\kelow\AppData\Roaming\Mozilla\Firefox\Profiles\qkf5eeja.default\extensions\{87F8774F-B485-47E2-A755-A40A8A5E886D}\components\GbMzhCef.dll ---- FIREFOX POLICIES ---- c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.allow_platform_file_picker", true); c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.cookie.p3plevel", 1); // 0=low, 1=medium, 2=high, 3=custom c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.enablePad", false); // Allow client to do proxy autodiscovery c:\program files\Mozilla Firefox\defaults\pref\firefox-l10n.js - pref("browser.fixup.alternate.suffix", ".com.br"); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.urlbar.hideGoButton", false); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.default", "chrome://branding/content/searchconfig.properties"); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.custom", "chrome://branding/content/searchconfig.properties"); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("signon.prefillForms", true); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.remoteLookups", false); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.updateURL", "http://sb.google.com/safebrowsing/update?client={moz:client}&appver={moz:version}&"); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.lookupURL", "http://sb.google.com/safebrowsing/lookup?sourceid=firefox-antiphish&features=TrustRank&client={moz:client}&appver={moz:version}&"); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.reportURL", "http://sb.google.com/safebrowsing/report?"); . ************************************************************************** catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2009-04-27 18:27 Windows 6.0.6001 Service Pack 1 NTFS Procurando processos ocultos ... Procurando entradas auto inicializáveis ocultas ... Procurando ficheiros/arquivos ocultos ... Varredura completada com sucesso arquivos/ficheiros ocultos: 0 ************************************************************************** . --------------------- LOCKED REGISTRY KEYS --------------------- [HKEY_USERS\S-1-5-21-937329819-1578037983-2621623099-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{ACF1504E-1CC6-789C-A5B4-6B8C7A88F60D}*] @Allowed: (Read) (RestrictedCode) "faancnfbphhk"=hex:66,61,6b,69,65,61,6d,70,63,67,70,62,00,ff "jaancnfbmimjnhfilpfm"=hex:61,61,00,00 "kaancnfbkpjjhllpbaagen"=hex:61,61,00,00 [HKEY_USERS\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 "MSCurrentCountry"=dword:00000016 [HKEY_USERS\SYSTEM\ControlSet002\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 "MSCurrentCountry"=dword:00000016 [HKEY_USERS\SYSTEM\ControlSet003\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 "MSCurrentCountry"=dword:00000016 . Tempo para conclusão: 2009-04-27 18:32 ComboFix-quarantined-files.txt 2009-04-27 21:32 Pré-execução: 34.665.934.848 bytes disponíveis Pós execução: 35.605.606.400 bytes disponíveis 247 --- E O F --- 2009-04-27 19:58 -------------------------------------------- HijackThis : Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 18:36:06, on 27/04/2009 Platform: Windows Vista SP1 (WinNT 6.00.1905) MSIE: Internet Explorer v7.00 (7.00.6001.18226) Boot mode: Normal Running processes: C:\Windows\system32\taskeng.exe C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\HijackThis\HiJackThis.exe R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: CUOLSearchHook Object - {1FE8243E-0A3A-41B9-B9CE-EFFEE51974D3} - C:\PROGRA~1\COMMON~1\uol\URLSEA~1\UOLSEA~1.DLL O1 - Hosts: ::1 localhost O8 - Extra context menu item: &Download all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202 O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201 O8 - Extra context menu item: &Download selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203 O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204 O8 - Extra context menu item: Download ALL with IDA - C:\Program Files\IDA\idaieall.htm O8 - Extra context menu item: Download with IDA - C:\Program Files\IDA\idaie.htm O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe O9 - Extra button: (no name) - cmdmapping - (no file) (HKCU) O13 - Gopher Prefix: O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flas...ent/swflash.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{0E356637-99A1-40B8-AE5E-C9D1A6509C14}: NameServer = 200.222.25.129,200.222.25.130 O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe -- End of file - 2811 bytes Compartilhar este post Link para o post Compartilhar em outros sites
DigRam 144 Denunciar post Postado Abril 28, 2009 Bom Dia! maya2 <@> Copie estas informações,entre os XXXXXXX....,para o Bloco de Notas. <@> Salve-as,no desktop,como: CFScript <-- Texto! XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX File:: d:\autorun\Demo32.exe Registry:: [-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c7452b84-0348-11dc-a68e-806e6f6e6963}] Regnull:: [HKEY_USERS\S-1-5-21-937329819-1578037983-2621623099-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{ACF1504E-1CC6-789C-A5B4-6B8C7A88F60D}*] XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX <@> Arraste o CFScript.txt,para o ícone do ComboFix. <@> Arraste-o,até que surja uma solicitação para executar o ComboFix.exe. <@> Terminando,poste: ComboFix.txt <><><><><><><><><><><> <@> Faça um scan online em: < Kaspersky > <@> Utilize para isso,o navegador Internet Explorer. <!> Acesse o site,e clique em: < > <@> Na próxima página,clique em: I Accept <@> Isto,para que se instale o controle ActiveX e,em seguida,atualize o banco de dados. <@> Na próxima página,clique em: My Computer e faça o scan. <@> Tenha paciência! <@> Aguarde a atualização da base de dados,e também do exame,que é demorado. <@> Terminando,salve e poste o relatório. <@> Clique em Save Report As... para salvar o log. ( Kaspersky_Online_Scanner_7_Report.txt ) <@> Salve o resultado como .txt,segundo a imagem abaixo: <@> Poste,também,HijackThis atualizado. Abraços! Compartilhar este post Link para o post Compartilhar em outros sites
maya2 0 Denunciar post Postado Abril 29, 2009 Oi DigRam ñ consegui usar o kaspersky estou tentando amanhã eu tento outra vez aqui esta o resultado do ComboFix.txt , beijos: ComboFix 09-04-27.02 - kelow 28/04/2009 19:39.1 - NTFSx86 Microsoft® Windows Vista™ Starter 6.0.6001.1.1252.55.1046.18.479.94 [GMT -3:00] Executando de: c:\users\kelow\Desktop\ComboFix.exe Comandos utilizados :: c:\users\kelow\Desktop\CFScript.txt * Criado um novo ponto de restauro FILE :: d:\autorun\Demo32.exe . ADS - Windows: deleted 48 bytes in 1 streams. ((((((((((((((((((((((((((((((((((((( Outras Exclusões ))))))))))))))))))))))))))))))))))))))))))))))))))) . c:\windows\system32\simdataconf.dll . (((((((((((((((( Arquivos/Ficheiros criados de 2009-05-28 to 2009-4-28 )))))))))))))))))))))))))))) . 2009-04-25 21:52 . 2009-04-28 22:22 -------- d-----w c:\users\Lois\AppData\Local\Mozilla 2009-04-25 21:52 . 2009-04-28 22:22 -------- d-----r c:\users\Lois\Searches 2009-04-25 21:52 . 2009-04-28 22:22 -------- d-----r c:\users\Lois\Contacts 2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\users\kelow\AppData\Roaming\Malwarebytes 2009-04-24 21:29 . 2009-04-06 18:32 15504 ----a-w c:\windows\system32\drivers\mbam.sys 2009-04-24 21:29 . 2009-04-06 18:32 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys 2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\programdata\Malwarebytes 2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\users\All Users\Malwarebytes 2009-04-24 21:29 . 2009-04-24 23:05 -------- d-----w c:\program files\Malwarebytes' Anti-Malware 2009-04-24 21:04 . 2009-04-24 21:08 -------- d-----w C:\ToolBar SD 2009-04-24 20:53 . 2009-04-24 20:54 -------- d-----w C:\ToolBarSD 2009-04-22 21:24 . 2009-04-27 21:35 -------- d-----w C:\HijackThis 2009-04-15 22:25 . 2009-04-15 22:25 -------- d-----w c:\program files\Trend Micro 2009-04-15 22:04 . 2009-04-15 22:06 -------- d-----w C:\MSNCleaner 2009-04-14 19:51 . 2008-12-06 04:42 376832 ----a-w c:\windows\system32\winhttp.dll 2009-04-14 19:51 . 2008-06-06 03:27 562176 ----a-w c:\windows\system32\msdtcprx.dll 2009-04-14 19:51 . 2008-06-06 03:27 38912 ----a-w c:\windows\system32\xolehlp.dll 2009-04-14 19:47 . 2009-03-03 04:39 551424 ----a-w c:\windows\system32\rpcss.dll 2009-04-14 19:47 . 2009-03-03 04:46 3599328 ----a-w c:\windows\system32\ntkrnlpa.exe 2009-04-14 19:47 . 2009-03-03 04:46 3547632 ----a-w c:\windows\system32\ntoskrnl.exe 2009-04-14 19:47 . 2009-03-03 03:04 666624 ----a-w c:\windows\system32\printfilterpipelinesvc.exe 2009-04-14 19:47 . 2009-03-03 04:39 26112 ----a-w c:\windows\system32\printfilterpipelineprxy.dll 2009-04-14 19:47 . 2009-03-03 04:39 183296 ----a-w c:\windows\system32\sdohlp.dll 2009-04-14 19:47 . 2009-03-03 04:37 98304 ----a-w c:\windows\system32\iasrecst.dll 2009-04-14 19:47 . 2009-03-03 04:37 44032 ----a-w c:\windows\system32\iasdatastore.dll 2009-04-14 19:47 . 2009-03-03 04:37 54784 ----a-w c:\windows\system32\iasads.dll 2009-04-14 19:47 . 2009-03-03 02:38 17408 ----a-w c:\windows\system32\iashost.exe 2009-04-14 19:45 . 2009-02-13 08:49 1255936 ----a-w c:\windows\system32\lsasrv.dll 2009-04-14 19:45 . 2009-02-13 08:49 72704 ----a-w c:\windows\system32\secur32.dll 2009-04-14 19:45 . 2009-03-17 03:38 13824 ----a-w c:\windows\system32\apilogen.dll 2009-04-14 19:45 . 2009-03-17 03:38 24064 ----a-w c:\windows\system32\amxread.dll 2009-04-14 19:43 . 2009-03-03 04:40 827392 ----a-w c:\windows\system32\wininet.dll 2009-04-14 19:43 . 2009-03-03 02:28 26624 ----a-w c:\windows\system32\ieUnatt.exe 2009-04-14 19:43 . 2009-03-03 04:37 78336 ----a-w c:\windows\system32\ieencode.dll . ((((((((((((((((((((((((((((((((((((( Relatório Find3M )))))))))))))))))))))))))))))))))))))))))))))))))))) . 2009-04-28 22:25 . 2007-05-16 01:13 2032 ----a-w c:\users\kelow\AppData\Local\d3d9caps.dat 2009-04-28 22:22 . 2007-07-29 02:01 -------- d-----w c:\program files\Alwil Software 2009-04-16 21:47 . 2008-12-10 14:34 -------- d-----w c:\program files\Common Files\Macromedia 2009-04-16 21:47 . 2007-05-16 11:52 -------- d--h--w c:\program files\InstallShield Installation Information 2009-04-16 21:44 . 2007-07-24 02:38 -------- d-----w c:\program files\DivX 2009-04-16 21:43 . 2007-07-24 02:40 -------- d-----w c:\program files\BearShare 2009-04-16 00:15 . 2008-12-10 11:31 -------- d-----w c:\program files\IDA 2009-04-16 00:15 . 2008-08-30 19:43 -------- d-----w c:\program files\Orbitdownloader 2009-04-15 13:25 . 2006-11-02 11:18 -------- d-----w c:\program files\Windows Mail 2009-04-13 20:23 . 2008-12-19 19:49 -------- d-----w c:\program files\WYSIWYG.Web.Builder.v5.5.2.Cracked 2009-04-11 03:21 . 2008-02-12 22:48 -------- d-----w c:\program files\Azureus 2009-03-17 03:38 . 2009-04-14 19:45 40960 ----a-w c:\windows\AppPatch\apihex86.dll 2009-02-28 17:39 . 2006-11-06 01:33 632354 ----a-w c:\windows\system32\prfh0416.dat 2009-02-28 17:39 . 2006-11-06 01:33 120882 ----a-w c:\windows\system32\prfc0416.dat 2009-02-15 19:16 . 2009-02-15 19:16 12208 --sha-w c:\windows\system32\KGyGaAvL.sys 2009-02-15 19:14 . 2008-02-10 17:36 3082 ----a-w c:\windows\system32\affv208325p1now.sys 2009-02-09 03:10 . 2009-03-11 19:26 2033152 ----a-w c:\windows\system32\win32k.sys 2009-02-05 22:06 . 2007-07-29 02:01 51792 ----a-w c:\windows\system32\drivers\aswMonFlt.sys 2008-10-13 21:11 . 2006-11-02 12:50 174 --sha-w c:\program files\desktop.ini 2008-04-07 09:25 . 2008-08-31 15:32 67696 ----a-w c:\program files\mozilla firefox\components\jar50.dll 2008-04-07 09:25 . 2008-08-31 15:32 54376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll 2008-04-07 09:25 . 2008-08-31 15:32 34952 ----a-w c:\program files\mozilla firefox\components\myspell.dll 2008-04-07 09:25 . 2008-08-31 15:32 46720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll 2008-04-07 09:25 . 2008-08-31 15:32 172144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll . (((((((((((((((((((((((((( Pontos de Carregamento do Registro ))))))))))))))))))))))))))))))))))))))) . . *Nota* entradas vazias e legítimas por defeito não são mostradas. REGEDIT4 [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system] "EnableLUA"= 0 (0x0) "EnableUIADesktopToggle"= 0 (0x0) [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer] "NoDFSTab"= 1 (0x1) [HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer] "NoDFSTab"= 1 (0x1) [HKEY_LOCAL_MACHINE\software\microsoft\security center] "AntiVirusOverride"=dword:00000001 "FirewallOverride"=dword:00000001 [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc] "AntiVirusOverride"=dword:00000001 [HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules] "TCP Query User{9111B6E0-61FA-4F1A-BA3C-EE3FAB0C3F67}c:\\program files\\bearshare\\bearshare.exe"= UDP:c:\program files\bearshare\bearshare.exe:BearShare "UDP Query User{2D96DA3A-C920-4132-8700-DF7FFFF19638}c:\\program files\\bearshare\\bearshare.exe"= TCP:c:\program files\bearshare\bearshare.exe:BearShare "TCP Query User{524519EF-BF7B-49B9-8889-0A14FD3876F7}c:\\program files\\orbitdownloader\\orbitnet.exe"= UDP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader "UDP Query User{0E5B2CED-79EE-4D88-B291-D64BBF1B9D16}c:\\program files\\orbitdownloader\\orbitnet.exe"= TCP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader "TCP Query User{6D1FB056-3C84-4AC0-B3E2-0E8DBE36D7E7}c:\\program files\\orbitdownloader\\orbitnet.exe"= UDP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader "UDP Query User{77C67769-9C0E-4851-B259-3263507C66F7}c:\\program files\\orbitdownloader\\orbitnet.exe"= TCP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader "TCP Query User{0F5E2FEE-4418-4712-AB8B-61271E14CBE0}c:\\program files\\orbitdownloader\\orbitdm.exe"= UDP:c:\program files\orbitdownloader\orbitdm.exe:Orbit Downloader "UDP Query User{CCD1203E-A9DC-4020-A1BD-628874DA26A2}c:\\program files\\orbitdownloader\\orbitdm.exe"= TCP:c:\program files\orbitdownloader\orbitdm.exe:Orbit Downloader "{C4875B03-AA7B-4CA4-A67D-5E93A2753EC3}"= UDP:57487:bearshare "TCP Query User{960AA96E-FD89-4A54-9865-8E12839BF61E}c:\\program files\\bearshare\\bearshare.exe"= UDP:c:\program files\bearshare\bearshare.exe:BearShare "UDP Query User{F61213C1-3592-4117-AC39-0E2B244BB330}c:\\program files\\bearshare\\bearshare.exe"= TCP:c:\program files\bearshare\bearshare.exe:BearShare "{25AE9187-C40C-40DE-8F2D-617C58C2539A}"= UDP:26384:BitComet 26384 TCP "{AAF49D9C-8A47-4FF3-83E5-A4E800FA5383}"= TCP:26384:BitComet 26384 UDP "TCP Query User{F7D2CFD3-DAE8-4A4C-A6F6-AFC6EF8F32ED}c:\\program files\\bitcomet\\bitcomet.exe"= UDP:c:\program files\bitcomet\bitcomet.exe:BitComet - a BitTorrent Client "UDP Query User{D6913133-65A8-4529-B466-58BB1D482B89}c:\\program files\\bitcomet\\bitcomet.exe"= TCP:c:\program files\bitcomet\bitcomet.exe:BitComet - a BitTorrent Client "{0C8D9895-E5D5-4997-8A90-6C433E12A0F6}"= TCP:6347:bearshare1 "{E525BBF9-8E5E-4718-8210-0F2A280A322D}"= Disabled:UDP:49155:shareaza1 "{454CF4EA-0AF5-4E1B-ABC1-4EFA1D471F3C}"= UDP:c:\program files\DNA\btdna.exe:DNA "{5BC93113-0EEE-4439-99E0-757B2FA8C2DC}"= TCP:c:\program files\DNA\btdna.exe:DNA "{D2DDB2E4-C321-43DA-A515-DC122DD61603}"= UDP:c:\program files\BitTorrent\bittorrent.exe:BitTorrent "{A7812BD5-0490-470E-97B5-E7DFD76E99FE}"= TCP:c:\program files\BitTorrent\bittorrent.exe:BitTorrent "TCP Query User{36F7F528-96BA-46B7-BFE9-0C28C3776761}c:\\users\\kelow\\program files\\dna\\btdna.exe"= UDP:c:\users\kelow\program files\dna\btdna.exe:btdna.exe "UDP Query User{0158F188-6ADA-4505-9554-E020A05BDA90}c:\\users\\kelow\\program files\\dna\\btdna.exe"= TCP:c:\users\kelow\program files\dna\btdna.exe:btdna.exe "{C998C340-34BA-4436-BFD9-3214E67E0521}"= UDP:6885:azureus "TCP Query User{6CD3A550-3317-4F2D-A281-BA062AE00D31}c:\\program files\\internet explorer\\iexplore.exe"= UDP:c:\program files\internet explorer\iexplore.exe:Internet Explorer "UDP Query User{8ABEE96C-2D69-483F-86CB-ADA2512C88CF}c:\\program files\\internet explorer\\iexplore.exe"= TCP:c:\program files\internet explorer\iexplore.exe:Internet Explorer "{2EB75AD1-4935-48CC-8AD9-786D47E69B16}"= UDP:6883:azureus "TCP Query User{B9B6B949-0488-412C-9D43-B52A7B41B2B6}c:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= Disabled:UDP:c:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza "UDP Query User{9F7C78C3-475D-41C4-9408-57DD9374144B}c:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= Disabled:TCP:c:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza "{82DDD077-BE0B-401E-9A15-71A84FD586D6}"= UDP:c:\users\kelow\Desktop\VDownloader.exe:VDownloader "{E2840104-86A2-4DEF-91A0-8A5D81A1E3E5}"= TCP:c:\users\kelow\Desktop\VDownloader.exe:VDownloader "TCP Query User{627B8B9B-ED0F-48EA-85BA-CB8659CB0F35}c:\\program files\\nero\\nero 7\\nero showtime\\showtime.exe"= UDP:c:\program files\nero\nero 7\nero showtime\showtime.exe:Nero ShowTime Essentials "UDP Query User{E16FD3D6-7C99-48E9-BCA9-448CC7AD4428}c:\\program files\\nero\\nero 7\\nero showtime\\showtime.exe"= TCP:c:\program files\nero\nero 7\nero showtime\showtime.exe:Nero ShowTime Essentials "TCP Query User{A9D71AFD-C9AE-4593-ADDB-E61F35475160}c:\\program files\\ares\\ares.exe"= UDP:c:\program files\ares\ares.exe:Ares p2p for windows "UDP Query User{49D02A80-50F5-4974-AE8F-B7DDA2500153}c:\\program files\\ares\\ares.exe"= TCP:c:\program files\ares\ares.exe:Ares p2p for windows "{88BA0F56-AC23-4942-8F20-702D02451C96}"= c:\program files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone) "TCP Query User{A90CA7E6-A1F6-4221-A641-144947793BA1}c:\\program files\\azureus\\azureus.exe"= UDP:c:\program files\azureus\azureus.exe:Azureus "UDP Query User{68E0BEA7-B7DB-4DE2-A027-AE95BDC6ED0C}c:\\program files\\azureus\\azureus.exe"= TCP:c:\program files\azureus\azureus.exe:Azureus "{9C255BE3-B5B0-40C5-AD09-AA2036369ECC}"= UDP:c:\program files\Mozilla Firefox\firefox.exe:Mozilla Firefox "{01F0A01C-E076-4420-9286-5AE99E3093E8}"= TCP:c:\program files\Mozilla Firefox\firefox.exe:Mozilla Firefox "TCP Query User{EBDC8018-9E0F-405B-9718-8FF002B3D459}c:\\program files\\mirc\\mirc.exe"= UDP:c:\program files\mirc\mirc.exe:mIRC "UDP Query User{9E79CA84-F5DF-4C3B-9E90-C3C1E1606A07}c:\\program files\\mirc\\mirc.exe"= TCP:c:\program files\mirc\mirc.exe:mIRC "TCP Query User{05F04037-A599-48EE-9CD7-E2FFBAB7D617}c:\\program files\\dap\\dap.exe"= UDP:c:\program files\dap\dap.exe:Download Accelerator Plus (DAP) "UDP Query User{9BB2BB40-3FFA-4C7E-B050-365A75A1CD97}c:\\program files\\dap\\dap.exe"= TCP:c:\program files\dap\dap.exe:Download Accelerator Plus (DAP) "{D98823A2-EF58-4AE1-8341-B5336364357A}"= UDP:6881:azureus "TCP Query User{24219510-B782-4DED-8F79-904D0BF8CB2F}c:\\program files\\filezilla ftp client\\filezilla.exe"= UDP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client "UDP Query User{5301F8B8-5830-4865-A724-9F4E32D55883}c:\\program files\\filezilla ftp client\\filezilla.exe"= TCP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client "TCP Query User{BEF14530-FB5D-4603-9D7D-70BB00E083BA}c:\\program files\\shareaza\\shareaza.exe"= Disabled:UDP:c:\program files\shareaza\shareaza.exe:Shareaza Ultimate File Sharing "UDP Query User{47B4991B-714F-43C5-AF7E-9ADA7503A706}c:\\program files\\shareaza\\shareaza.exe"= Disabled:TCP:c:\program files\shareaza\shareaza.exe:Shareaza Ultimate File Sharing "TCP Query User{15FDD6A4-2FF2-48A1-B323-047E57847FD5}c:\\program files\\azureus\\azureus.exe"= UDP:c:\program files\azureus\azureus.exe:Azureus "UDP Query User{60B68D20-88FE-45A5-AA8E-81D20D996635}c:\\program files\\azureus\\azureus.exe"= TCP:c:\program files\azureus\azureus.exe:Azureus "{867290A1-9295-4E98-B09B-006C3B9ED1D7}"= UDP:c:\users\kelow\Desktop\Programas\VDownloader.exe:VDownloader "{6A0339E7-9160-4578-8F4A-12BCC35B67D4}"= TCP:c:\users\kelow\Desktop\Programas\VDownloader.exe:VDownloader "TCP Query User{B03C713E-BFAD-4CE4-B659-4ABF5632EFE3}c:\\program files\\filezilla ftp client\\filezilla.exe"= UDP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client "UDP Query User{5C94D225-2F3C-4D2A-A33E-CFC9987BDA9C}c:\\program files\\filezilla ftp client\\filezilla.exe"= TCP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client "{94DBADC9-26F1-410E-B0EF-EB1D0A798244}"= UDP:c:\program files\DsNET Corp\aTube Catcher 1.0\yct.exe:aTube Catcher "{912FE133-C6CF-4777-B8D0-504B9F453339}"= TCP:c:\program files\DsNET Corp\aTube Catcher 1.0\yct.exe:aTube Catcher "{AE65C5E1-C888-4628-B428-80A5BD679073}"= UDP:c:\users\kelow\Desktop\Programas\Vidownloader\VDownloader.exe:VDownloader "{57D22DF4-544B-4E09-A419-F957045401E7}"= TCP:c:\users\kelow\Desktop\Programas\Vidownloader\VDownloader.exe:VDownloader "{FD7CE07B-1404-4C89-B744-8216A8E293BB}"= UDP:c:\program files\Malwarebytes' Anti-Malware\mbam.exe:Malwarebytes' Anti-Malware "{335BE7F0-5331-45E8-98CE-19F2409CF53F}"= TCP:c:\program files\Malwarebytes' Anti-Malware\mbam.exe:Malwarebytes' Anti-Malware "TCP Query User{A2745A60-9FDD-4F16-B444-725FF8641871}c:\\program files\\mirc\\mirc.exe"= Disabled:UDP:c:\program files\mirc\mirc.exe:mIRC "UDP Query User{E3A44E4F-BAD8-4FA5-AD38-C5F7CD593019}c:\\program files\\mirc\\mirc.exe"= Disabled:TCP:c:\program files\mirc\mirc.exe:mIRC "TCP Query User{D486ABFB-F3A8-4DE1-A776-615CAF0F07B4}c:\\mirc\\mirc.exe"= Disabled:UDP:c:\mirc\mirc.exe:mIRC "UDP Query User{3E0696F4-AEED-4B82-B76F-D6074AACBD84}c:\\mirc\\mirc.exe"= Disabled:TCP:c:\mirc\mirc.exe:mIRC "TCP Query User{F6DBF0F8-6770-4E55-9565-7411CB329B1D}c:\\users\\kelow\\desktop\\programas\\mirc.exe"= Disabled:UDP:c:\users\kelow\desktop\programas\mirc.exe:mirc.exe "UDP Query User{0613EB7E-8E00-47F7-8242-FE2EE6C7B17B}c:\\users\\kelow\\desktop\\programas\\mirc.exe"= Disabled:TCP:c:\users\kelow\desktop\programas\mirc.exe:mirc.exe "{AE2A1E8A-3177-4218-8962-21E91A2D8155}"= UDP:c:\users\kelow\Desktop\dds.scr:dds "{A849525C-E551-4A99-8B37-9FFFF813F804}"= TCP:c:\users\kelow\Desktop\dds.scr:dds [HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile\AuthorizedApplications\List] "c:\\Program Files\\Orbitdownloader\\orbitdm.exe"= c:\program files\Orbitdownloader\orbitdm.exe:*:Enabled:Orbit "c:\\Program Files\\Orbitdownloader\\orbitnet.exe"= c:\program files\Orbitdownloader\orbitnet.exe:*:Enabled:Orbit R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\DRIVERS\b57nd60x.sys [2006-11-02 167936] S2 aswMonFlt;aswMonFlt;c:\windows\system32\DRIVERS\aswMonFlt.sys [2009-02-05 51792] [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost] LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc . . ------- Scan Suplementar ------- . mWindow Title = IE: &Download all by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/202 IE: &Download by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/201 IE: &Download selected by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/203 IE: &Grab video by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/204 IE: Download ALL with IDA - c:\program files\IDA\idaieall.htm IE: Download with IDA - c:\program files\IDA\idaie.htm TCP: {0E356637-99A1-40B8-AE5E-C9D1A6509C14} = 200.222.25.129,200.222.25.130 FF - ProfilePath - c:\users\kelow\AppData\Roaming\Mozilla\Firefox\Profiles\qkf5eeja.default\ FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q= FF - prefs.js: browser.search.selectedEngine - Crawler Search FF - prefs.js: browser.startup.homepage - FF - prefs.js: keyword.URL - hxxp://www.crawler.com/search/dispatcher.aspx?tp=aus&tbid=60076&qkw= FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll FF - component: c:\users\kelow\AppData\Roaming\Mozilla\Firefox\Profiles\qkf5eeja.default\extensions\{87F8774F-B485-47E2-A755-A40A8A5E886D}\components\GbMzhCef.dll ---- FIREFOX POLICIES ---- c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.allow_platform_file_picker", true); c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.cookie.p3plevel", 1); // 0=low, 1=medium, 2=high, 3=custom c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.enablePad", false); // Allow client to do proxy autodiscovery c:\program files\Mozilla Firefox\defaults\pref\firefox-l10n.js - pref("browser.fixup.alternate.suffix", ".com.br"); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.urlbar.hideGoButton", false); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.default", "chrome://branding/content/searchconfig.properties"); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.custom", "chrome://branding/content/searchconfig.properties"); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("signon.prefillForms", true); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.remoteLookups", false); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.updateURL", "http://sb.google.com/safebrowsing/update?client={moz:client}&appver={moz:version}&"); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.lookupURL", "http://sb.google.com/safebrowsing/lookup?sourceid=firefox-antiphish&features=TrustRank&client={moz:client}&appver={moz:version}&"); c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.reportURL", "http://sb.google.com/safebrowsing/report?"); . ************************************************************************** catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2009-04-28 19:50 Windows 6.0.6001 Service Pack 1 NTFS Procurando processos ocultos ... Procurando entradas auto inicializáveis ocultas ... Procurando ficheiros/arquivos ocultos ... Varredura completada com sucesso arquivos/ficheiros ocultos: 0 ************************************************************************** . --------------------- LOCKED REGISTRY KEYS --------------------- [HKEY_USERS\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 "MSCurrentCountry"=dword:00000016 [HKEY_USERS\SYSTEM\ControlSet002\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 "MSCurrentCountry"=dword:00000016 [HKEY_USERS\SYSTEM\ControlSet003\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 "MSCurrentCountry"=dword:00000016 . Tempo para conclusão: 2009-04-28 19:55 ComboFix-quarantined-files.txt 2009-04-28 22:55 ComboFix2.txt 2009-04-27 21:32 Pré-execução: 37.870.927.872 bytes disponíveis Pós execução: 37.782.134.784 bytes disponíveis 240 --- E O F --- 2009-04-27 19:58 ____________________________________________________ resultado do HijackThis Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 20:03:55, on 28/04/2009 Platform: Windows Vista SP1 (WinNT 6.00.1905) MSIE: Internet Explorer v7.00 (7.00.6001.18226) Boot mode: Normal Running processes: C:\Windows\system32\taskeng.exe C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Program Files\Mozilla Firefox\firefox.exe C:\Windows\system32\SearchFilterHost.exe C:\HijackThis\HiJackThis.exe R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: CUOLSearchHook Object - {1FE8243E-0A3A-41B9-B9CE-EFFEE51974D3} - C:\PROGRA~1\COMMON~1\uol\URLSEA~1\UOLSEA~1.DLL O1 - Hosts: ::1 localhost O8 - Extra context menu item: &Download all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202 O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201 O8 - Extra context menu item: &Download selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203 O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204 O8 - Extra context menu item: Download ALL with IDA - C:\Program Files\IDA\idaieall.htm O8 - Extra context menu item: Download with IDA - C:\Program Files\IDA\idaie.htm O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe O9 - Extra button: (no name) - cmdmapping - (no file) (HKCU) O13 - Gopher Prefix: O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flas...ent/swflash.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{0E356637-99A1-40B8-AE5E-C9D1A6509C14}: NameServer = 200.222.25.129,200.222.25.130 O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe -- End of file - 2899 bytes Compartilhar este post Link para o post Compartilhar em outros sites
DigRam 144 Denunciar post Postado Abril 29, 2009 Bom Dia! maya2 Oi DigRam ñ consegui usar o kaspersky estou tentando amanhã eu tento outra vez aqui esta o resultado doComboFix.txt , beijos: <!> Tudo bem,estarei aguardando. Mas...houve alguma melhora,em sua conecção? Abraços! Compartilhar este post Link para o post Compartilhar em outros sites
maya2 0 Denunciar post Postado Maio 3, 2009 Oi DigRam desculpa a demora é que fiquei sem internet deu problema no provedor e o pc ficou malucão tive que formatar e chamar o rapaz para instalar a net outra vez, valeu pela ajuda desculpa aí qualquer coisa e quando eu tiver alguma duvida posti aqui outra vez abraço e beijossssss Compartilhar este post Link para o post Compartilhar em outros sites
DigRam 144 Denunciar post Postado Maio 3, 2009 PROBLEMA RESOLVIDO! Caso o autor necessite que o tópico seja reaberto basta enviar uma Mensagem Privada para um Moderador com um link para o tópico. Compartilhar este post Link para o post Compartilhar em outros sites