Ir para conteúdo

POWERED BY:

Arquivado

Este tópico foi arquivado e está fechado para novas respostas.

maya2

[Resolvido!] minha net esta lerda parece que é virus

Recommended Posts

oi gente eu sou nova por aqui e preciso da ajuda de você's minha net ficou lerda no dia 31 de março depois que eu passei o avast e o adware eu ñ sei se isso tem algo a ver pois eu já tinha eles no pc minha net esta lerda e ñ posso baixar mais nada esta parevendo discada eu ñ sei direito usar esse programa HijackThis mais eu abri o programa e fui no botão escrito

" Do a system scan only " e veio este resultado:

 

C:\Windows\system32\taskeng.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Program Files\Azureus\Azureus.exe

C:\HijackThis\HiJackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.crawler.com/search/dispatcher.a...&tbid=60341

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

R3 - URLSearchHook: CUOLSearchHook Object - {1FE8243E-0A3A-41B9-B9CE-EFFEE51974D3} - C:\PROGRA~1\COMMON~1\uol\URLSEA~1\UOLSEA~1.DLL

F2 - REG:system.ini: UserInit=C:\Windows\system32\userinit.exe,userinit.exe

O1 - Hosts: ::1 localhost

O2 - BHO: (no name) - {1CB20BF0-BBAE-40A7-93F4-6435FF3D0411} - C:\PROGRA~1\Crawler\Toolbar\ctbr.dll (file missing)

O3 - Toolbar: Barra de Ferramentas &Crawler - {4B3803EA-5230-4DC3-A7FC-33638F3D3542} - C:\PROGRA~1\Crawler\Toolbar\ctbr.dll (file missing)

O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe

O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide

O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE

O8 - Extra context menu item: &Download all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202

O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201

O8 - Extra context menu item: &Download selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203

O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204

O8 - Extra context menu item: Download ALL with IDA - C:\Program Files\IDA\idaieall.htm

O8 - Extra context menu item: Download with IDA - C:\Program Files\IDA\idaie.htm

O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe

O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe

O13 - Gopher Prefix:

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flas...ent/swflash.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{0E356637-99A1-40B8-AE5E-C9D1A6509C14}: NameServer = 200.222.25.129,200.222.25.130

O18 - Protocol: tbr - {4D25FB7A-8902-4291-960E-9ADA051CFBBF} - C:\PROGRA~1\Crawler\Toolbar\ctbr.dll (file missing)

O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe

O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe

O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe

O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe

O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe

O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe

O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe

O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe

 

--

End of file - 4188 bytes

 

 

Alguem pode me ajudar já passei tanto antivirus no pc e nada resolveu, obrigada

Compartilhar este post


Link para o post
Compartilhar em outros sites

Bom Dia! maya2

 

<@> Baixe: < ToolBar S&D >

<@> Salve-o no Disco Local-C,em uma pasta própria.

<@> Reinicie o computador,em Modo de Segurança. <-- Importante!

<@> Execute o programa,e à seguir,aperte o "p" --> Enter --> Ok.

<@> Digite o dois! ( 2 ) --> Aperte Enter --> Aguarde!

<@> Terminando,poste o relatório. ( C:\ToolBar SD\TB_1.txt )

<><><><><><><><><><>

<@> Vá a este link,e baixe: < Malwarebytes >

<@> Atualize o programa!

<@> Escolha o escaneamento Completo!

<@> Desabilite programas de proteção,ao executar o malwarebytes.

<@> Procure enviar os ítens detectados para a quarentena,clicando em Remover itens.

<@> Para maiores detalhes: < Link >

<@> Poste,os relatórios: mbam-log-2009-xx-xx (00-00-00).txt + HijackThis,atualizado.

<><><><><><><><><><>

<@> Baixe: < DDS > ( ...by sUBs )

<@> Salve-o no desktop!

<@> Desabilite seus programas de proteção: antivírus,antimalware,antispyware ou firewall.

<@> Estando desconectado,execute a ferramenta! --> Duplo clique em dds.scr.

<@> Aguarde o término do scan,até obtermos o relatório. ( DDS.txt ) <--

<@> Surgirá,também,uma nova janela: "D.D.S - Optional_Scan" --> Clique em Sim.

<@> O Bloco de Notas irá abrir,com outro relatório. ( Attach.txt ) <--

<@> Ps: Caso o relatório seja incompreensível,renomeie o executável para DDS.exe e repita o scan.

<@> Outra janela,finalmente,abrir-se-à! --> Clique em OK.

<@> Salve os relatórios: DDS.txt + Attach.txt <-- Poste-os!

 

Abraços!

Compartilhar este post


Link para o post
Compartilhar em outros sites

Oi DigRam obrigada pela ajuda o relatorio do ToolBar foi:

 

-----------\\ ToolBar S&D 1.2.8 XP/Vista

 

Microsoft® Windows Vista™ Starter ( v6.0.6001 ) Service Pack 1

X86-based PC ( Multiprocessor Free : Intel® Celeron® CPU 2.80GHz )

BIOS : Award Modular BIOS v6.00PG

USER : kelow ( Administrator )

BOOT : Fail-safe boot

Antivirus : avast! antivirus 4.8.1290 [VPS 081122-0] 4.8.1290 (Activated)

C:\ (Local Disk) - NTFS - Total:74 Go (Free:32 Go)

D:\ (CD or DVD)

E:\ (CD or DVD)

 

"C:\ToolBar SD" ( MAJ : 21-12-2008|20:47 )

Option : [2] ( 24/04/2009|18:05 )

 

[ UAC => 1 ]

C:\Windows\iun6002.exe

C:\Program Files\Mozilla Firefox\searchplugins\crawlersrch.xml

 

-----------\\ REMOVIDOS

 

Deletado! - C:\Program Files\AskTBar\bar

Deletado! - C:\Program Files\Crawler\firefox

Deletado! - C:\Program Files\Crawler\Toolbar

Deletado! - C:\Program Files\MyGlobalSearch\bar

Deletado! - C:\Program Files\VMNToolbar\tbuninstall.exe

Deletado! - C:\Program Files\VMNToolbar\uninstall.exe

Deletado! - C:\Windows\iun6002.exe

Deletado! - C:\Program Files\Mozilla Firefox\searchplugins\crawlersrch.xml

Deletado! - C:\Program Files\AskTBar

Deletado! - C:\Program Files\Crawler

Deletado! - C:\Program Files\MyGlobalSearch

Deletado! - C:\Program Files\VMNToolbar

 

-----------\\ Procura por Arquivos / Ficheiros ...

 

 

-----------\\ [..\Internet Explorer\Main]

 

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]

"Local Page"="C:\\Windows\\system32\\blank.htm"

"Search Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"

"Start Page"="http://www.google.com"

"Search Bar"="http://www.crawler.com/search/dispatcher.aspx?tp=aus&qkw=%s&tbid=60341"

"Url"="http://go.microsoft.com/fwlink/?LinkId=75724"

"Url"="http://go.microsoft.com/fwlink/?LinkId=75723"

 

[HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main]

"Start Page"="http://www.msn.com/"

"Default_Page_URL"="http://go.microsoft.com/fwlink/?LinkId=69157"

"Default_Search_URL"="http://go.microsoft.com/fwlink/?LinkId=54896"

"Search Page"="http://go.microsoft.com/fwlink/?LinkId=54896"

 

 

--------------------\\ Procurando por outras infecções

 

--------------------\\ Cracks & Keygens ..

 

C:\Users\kelow\AppData\Local\Temp\crack

C:\Users\kelow\AppData\Local\Temp\crack\leia-me.txt

C:\Users\kelow\AppData\Roaming\Azureus\torrents\! Crack Photo Pos Pro [mininova].torrent

C:\Users\kelow\Desktop\Programas\crack

C:\Users\kelow\Desktop\Programas\Super.Video.Splitter.v5.4.+.Crack.by.multibrasil.blogspot.com.rar

C:\Users\kelow\Desktop\Programas\crack\leia-me.txt

C:\Users\kelow\Desktop\Programas\crack\videosplitter.exe

C:\Users\kelow\Desktop\Programas\programas\crack

C:\Users\kelow\Desktop\Programas\programas\crack\leia-me.txt

C:\Users\kelow\Desktop\Programas\programas\crack\videosplitter.exe

 

 

[ UAC => 1 ]

 

 

1 - "C:\ToolBar SD\TB_1.txt" - 24/04/2009|18:08 - Option : [2]

 

-----------\\ Verificação completa em 18:08:26,68

 

 

<><><><><><><><><><>

 

o relatorio do malwarebytes foi :

 

Malwarebytes' Anti-Malware 1.36

Versão do banco de dados: 2036

Windows 6.0.6001 Service Pack 1

 

24/04/2009 20:05:04

mbam-log-2009-04-24 (20-04-48).txt

 

Tipo de Verificação: Completa (C:\|)

Objetos verificados: 164335

Tempo decorrido: 1 hour(s), 23 minute(s), 32 second(s)

 

Processos da Memória infectados: 0

Módulos de Memória Infectados: 0

Chaves do Registro infectadas: 6

Valores do Registro infectados: 1

Ítens do Registro infectados: 3

Pastas infectadas: 0

Arquivos infectados: 0

 

Processos da Memória infectados:

(Nenhum ítem malicioso foi detectado)

 

Módulos de Memória Infectados:

(Nenhum ítem malicioso foi detectado)

 

Chaves do Registro infectadas:

HKEY_CLASSES_ROOT\Interface\{37b85a2a-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken.

HKEY_CLASSES_ROOT\Interface\{37b85a2c-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{37b85a21-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{37b85a2b-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{37b85a2b-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken.

 

Valores do Registro infectados:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> No action taken.

 

Ítens do Registro infectados:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

 

Pastas infectadas:

(Nenhum ítem malicioso foi detectado)

 

Arquivos infectados:

(Nenhum ítem malicioso foi detectado)

 

<><><><><><><><><><>

 

O resultado do HijackThis atualizado:

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 20:32:01, on 24/04/2009

Platform: Windows Vista SP1 (WinNT 6.00.1905)

MSIE: Internet Explorer v7.00 (7.00.6001.18226)

Boot mode: Normal

 

Running processes:

C:\Windows\system32\Dwm.exe

C:\Windows\Explorer.EXE

C:\Windows\system32\taskeng.exe

C:\Program Files\Alwil Software\Avast4\ashDisp.exe

C:\Windows\System32\mobsync.exe

C:\Windows\system32\prevhost.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\HijackThis\HiJackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.crawler.com/search/dispatcher.a...&tbid=60341

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

R3 - URLSearchHook: CUOLSearchHook Object - {1FE8243E-0A3A-41B9-B9CE-EFFEE51974D3} - C:\PROGRA~1\COMMON~1\uol\URLSEA~1\UOLSEA~1.DLL

F2 - REG:system.ini: UserInit=C:\Windows\system32\userinit.exe,userinit.exe,

O1 - Hosts: ::1 localhost

O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe

O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide

O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE

O8 - Extra context menu item: &Download all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202

O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201

O8 - Extra context menu item: &Download selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203

O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204

O8 - Extra context menu item: Download ALL with IDA - C:\Program Files\IDA\idaieall.htm

O8 - Extra context menu item: Download with IDA - C:\Program Files\IDA\idaie.htm

O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe

O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe

O9 - Extra button: (no name) - cmdmapping - (no file) (HKCU)

O13 - Gopher Prefix:

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flas...ent/swflash.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{0E356637-99A1-40B8-AE5E-C9D1A6509C14}: NameServer = 200.222.25.129,200.222.25.130

O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe

O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe

O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe

O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe

O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe

O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe

O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe

O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe

 

--

End of file - 3908 bytes

 

<><><><><><><><><><>

 

 

os relatórios do DDS.txt + Attach.txt :

 

 

DDS (Ver_09-03-16.01) - NTFSx86

Run by kelow at 20:42:32,40 on 24/04/2009

Internet Explorer: 7.0.6001.18000

Microsoft® Windows Vista™ Starter 6.0.6001.1.1252.55.1046.18.479.103 [GMT -3:00]

 

AV: avast! antivirus 4.8.1290 [VPS 081122-0] *On-access scanning enabled* (Updated)

 

============== Running Processes ===============

 

C:\Windows\system32\wininit.exe

C:\Windows\system32\lsm.exe

C:\Windows\system32\svchost.exe -k DcomLaunch

C:\Windows\system32\svchost.exe -k rpcss

C:\Windows\System32\svchost.exe -k secsvcs

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted

C:\Windows\system32\svchost.exe -k netsvcs

C:\Windows\system32\SLsvc.exe

C:\Windows\system32\svchost.exe -k LocalService

C:\Windows\system32\svchost.exe -k NetworkService

C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe

C:\Program Files\Alwil Software\Avast4\ashServ.exe

C:\Windows\system32\Dwm.exe

C:\Windows\Explorer.EXE

C:\Windows\System32\spoolsv.exe

C:\Windows\system32\taskeng.exe

C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork

C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe

C:\Windows\system32\svchost.exe -k imgsvc

C:\Windows\System32\svchost.exe -k WerSvcGroup

C:\Windows\system32\SearchIndexer.exe

C:\Program Files\Alwil Software\Avast4\ashDisp.exe

C:\Windows\System32\mobsync.exe

C:\Windows\system32\taskeng.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Windows\system32\conime.exe

C:\Users\kelow\Desktop\dds.scr

C:\Windows\system32\wbem\wmiprvse.exe

 

============== Pseudo HJT Report ===============

 

uStart Page = hxxp://www.google.com

uSearch Bar = hxxp://www.crawler.com/search/dispatcher.aspx?tp=aus&qkw=%s&tbid=60341

mWindow Title =

uURLSearchHooks: CUOLSearchHook Object: {1fe8243e-0a3a-41b9-b9ce-effee51974d3} - c:\progra~1\common~1\uol\urlsea~1\UOLSEA~1.DLL

mURLSearchHooks: CUOLSearchHook Object: {1fe8243e-0a3a-41b9-b9ce-effee51974d3} - c:\progra~1\common~1\uol\urlsea~1\UOLSEA~1.DLL

mWinlogon: Userinit=c:\windows\system32\userinit.exe,userinit.exe,

TB: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No File

TB: IDA Bar: {c70e30c7-140a-4166-a2e8-43557e62b41a} - c:\program files\ida\idabar.dll

TB: {4E7BD74F-2B8D-469E-8DA9-FD60BB9AAE33} - No File

TB: Megaupload Toolbar: {4e7bd74f-2b8d-469e-ccb0-b130eedbe97c} - c:\progra~1\megaup~1\MEGAUP~1.DLL

TB: {4B3803EA-5230-4DC3-A7FC-33638F3D3542} - No File

mRun: [avast!] c:\progra~1\alwils~1\avast4\ashDisp.exe

mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide

StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office\OSA9.EXE

uPolicies-explorer: NoDFSTab = 1 (0x1)

mPolicies-system: EnableUIADesktopToggle = 0 (0x0)

dPolicies-explorer: NoDFSTab = 1 (0x1)

IE: &Download all by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/202

IE: &Download by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/201

IE: &Download selected by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/203

IE: &Grab video by Orbit - c:\program files\orbitdownloader\orbitmxt.dll/204

IE: Download ALL with IDA - c:\program files\ida\idaieall.htm

IE: Download with IDA - c:\program files\ida\idaie.htm

IE: {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - c:\program files\ida\ida.exe

DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/flashplayer/current/swflash.cab

TCP: {0E356637-99A1-40B8-AE5E-C9D1A6509C14} = 200.222.25.129,200.222.25.130

 

================= FIREFOX ===================

 

FF - ProfilePath - c:\users\kelow\appdata\roaming\mozilla\firefox\profiles\qkf5eeja.default\

FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=

FF - prefs.js: browser.search.selectedEngine - Crawler Search

FF - prefs.js: browser.startup.homepage -

FF - prefs.js: keyword.URL - hxxp://www.crawler.com/search/dispatcher.aspx?tp=aus&tbid=60076&qkw=

FF - component: c:\users\kelow\appdata\roaming\mozilla\firefox\profiles\qkf5eeja.default\extensions\{87f8774f-b485-47e2-a755-a40a8a5e886d}\components\GbMzhCef.dll

FF - plugin: c:\program files\mozilla firefox\plugins\NPMyGlSh.dll

 

---- FIREFOX POLICIES ----

c:\program files\mozilla firefox\greprefs\all.js - pref("ui.allow_platform_file_picker", true);

c:\program files\mozilla firefox\greprefs\all.js - pref("network.cookie.p3plevel", 1); // 0=low, 1=medium, 2=high, 3=custom

c:\program files\mozilla firefox\greprefs\all.js - pref("network.enablePad", false); // Allow client to do proxy autodiscovery

c:\program files\mozilla firefox\defaults\pref\firefox-l10n.js - pref("browser.fixup.alternate.suffix", ".com.br");

c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.urlbar.hideGoButton", false);

c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.default", "chrome://branding/content/searchconfig.properties");

c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.custom", "chrome://branding/content/searchconfig.properties");

c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("signon.prefillForms", true);

c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.remoteLookups", false);

c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.updateURL", "http://sb.google.com/safebrowsing/update?client={moz:client}&appver={moz:version}&");

c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.lookupURL", "http://sb.google.com/safebrowsing/lookup?sourceid=firefox-antiphish&features=TrustRank&client={moz:client}&appver={moz:version}&");

c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.reportURL", "http://sb.google.com/safebrowsing/report?");

 

============= SERVICES / DRIVERS ===============

 

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2008-4-4 114768]

R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2008-4-4 20560]

R2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2007-7-28 51792]

S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2006-11-2 167936]

 

=============== Created Last 30 ================

 

2009-04-24 18:29 <DIR> --d----- c:\users\kelow\appdata\roaming\Malwarebytes

2009-04-24 18:29 15,504 a------- c:\windows\system32\drivers\mbam.sys

2009-04-24 18:29 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys

2009-04-24 18:29 <DIR> --d----- c:\programdata\Malwarebytes

2009-04-24 18:29 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware

2009-04-24 18:29 <DIR> --d----- c:\progra~2\Malwarebytes

2009-04-24 18:04 <DIR> --d----- C:\ToolBar SD

2009-04-24 17:53 <DIR> --d----- C:\ToolBarSD

2009-04-22 18:24 <DIR> --d----- C:\HijackThis

2009-04-16 18:44 4,429 a------- c:\windows\system32\BIN_STRSBW.SPT

2009-04-15 19:25 <DIR> --d----- c:\program files\Trend Micro

2009-04-15 19:04 <DIR> --d----- C:\MSNCleaner

2009-04-14 16:51 376,832 a------- c:\windows\system32\winhttp.dll

2009-04-14 16:51 562,176 a------- c:\windows\system32\msdtcprx.dll

2009-04-14 16:51 38,912 a------- c:\windows\system32\xolehlp.dll

2009-04-14 16:47 551,424 a------- c:\windows\system32\rpcss.dll

2009-04-14 16:47 3,599,328 a------- c:\windows\system32\ntkrnlpa.exe

2009-04-14 16:47 3,547,632 a------- c:\windows\system32\ntoskrnl.exe

2009-04-14 16:47 666,624 a------- c:\windows\system32\printfilterpipelinesvc.exe

2009-04-14 16:47 183,296 a------- c:\windows\system32\sdohlp.dll

2009-04-14 16:47 98,304 a------- c:\windows\system32\iasrecst.dll

2009-04-14 16:47 44,032 a------- c:\windows\system32\iasdatastore.dll

2009-04-14 16:47 26,112 a------- c:\windows\system32\printfilterpipelineprxy.dll

2009-04-14 16:47 54,784 a------- c:\windows\system32\iasads.dll

2009-04-14 16:47 17,408 a------- c:\windows\system32\iashost.exe

2009-04-14 16:45 1,255,936 a------- c:\windows\system32\lsasrv.dll

2009-04-14 16:45 72,704 a------- c:\windows\system32\secur32.dll

2009-04-14 16:45 24,064 a------- c:\windows\system32\amxread.dll

2009-04-14 16:45 13,824 a------- c:\windows\system32\apilogen.dll

2009-04-14 16:43 827,392 a------- c:\windows\system32\wininet.dll

2009-04-14 16:43 389,632 a------- c:\windows\system32\html.iec

2009-04-14 16:43 26,624 a------- c:\windows\system32\ieUnatt.exe

2009-04-14 16:43 78,336 a------- c:\windows\system32\ieencode.dll

2009-04-14 16:43 1,383,424 a------- c:\windows\system32\mshtml.tlb

2009-03-27 16:52 <DIR> --d----- c:\programdata\WindowsSearch

 

==================== Find3M ====================

 

2009-03-17 00:38 40,960 a------- c:\windows\apppatch\apihex86.dll

2009-02-28 14:39 632,354 a------- c:\windows\system32\prfh0416.dat

2009-02-28 14:39 120,882 a------- c:\windows\system32\prfc0416.dat

2009-02-15 16:16 12,208 a--sh--- c:\windows\system32\KGyGaAvL.sys

2009-02-15 16:14 3,082 a------- c:\windows\system32\affv208325p1now.sys

2009-02-09 00:10 2,033,152 a------- c:\windows\system32\win32k.sys

2008-10-13 18:11 174 a--sh--- c:\program files\desktop.ini

2008-10-13 18:05 86,016 a------- c:\windows\inf\infstrng.dat

2008-10-13 18:05 86,016 a------- c:\windows\inf\infstor.dat

2008-10-13 18:05 51,200 a------- c:\windows\inf\infpub.dat

2008-10-13 17:52 665,600 a------- c:\windows\inf\drvindex.dat

2007-07-24 00:07 87,608 a------- c:\users\kelow\appdata\roaming\ezpinst.exe

2007-07-24 00:07 47,360 a------- c:\users\kelow\appdata\roaming\pcouffin.sys

2006-11-05 22:30 318,818 a------- c:\windows\inf\perflib\0416\perfi.dat

2006-11-05 22:30 318,818 a------- c:\windows\inf\perflib\0416\perfh.dat

2006-11-05 22:30 37,412 a------- c:\windows\inf\perflib\0416\perfd.dat

2006-11-05 22:30 37,412 a------- c:\windows\inf\perflib\0416\perfc.dat

2006-11-02 06:20 287,440 a------- c:\windows\inf\perflib\0000\perfi.dat

2006-11-02 06:20 287,440 a------- c:\windows\inf\perflib\0000\perfh.dat

2006-11-02 06:20 30,674 a------- c:\windows\inf\perflib\0000\perfd.dat

2006-11-02 06:20 30,674 a------- c:\windows\inf\perflib\0000\perfc.dat

2001-09-10 08:10 61,440 a------- c:\windows\inf\i386\onetUSD.dll

1998-05-12 04:01 8,944 a------- c:\windows\inf\i386\usbscan.sys

 

============= FINISH: 20:46:54,76 ===============

 

 

 

UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.

IF REQUESTED, ZIP IT UP & ATTACH IT

 

DDS (Ver_09-03-16.01)

 

Microsoft® Windows Vista™ Starter

Boot Device: \Device\HarddiskVolume1

Install Date: 15/05/2007 22:04:15

System Uptime: 24/04/2009 20:09:50 (0 hours ago)

 

Motherboard: | | P4M800Pro-8237

Processor: Intel® Celeron® CPU 2.80GHz | Socket 775 | 2800/133mhz

 

==== Disk Partitions =========================

 

C: is FIXED (NTFS) - 75 GiB total, 32,056 GiB free.

D: is CDROM ()

E: is CDROM ()

 

==== Disabled Device Manager Items =============

 

Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318}

Description: Adaptador do Microsoft 6to4

Device ID: ROOT\*6TO4MP\0005

Manufacturer: Microsoft

Name: 6TO4 Adapter

PNP Device ID: ROOT\*6TO4MP\0005

Service: tunnel

 

Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318}

Description: Adaptador do Microsoft 6to4

Device ID: ROOT\*6TO4MP\0101

Manufacturer: Microsoft

Name: 6TO4 Adapter

PNP Device ID: ROOT\*6TO4MP\0101

Service: tunnel

 

Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318}

Description: Adaptador do Microsoft 6to4

Device ID: ROOT\*6TO4MP\0106

Manufacturer: Microsoft

Name: 6TO4 Adapter

PNP Device ID: ROOT\*6TO4MP\0106

Service: tunnel

 

Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318}

Description: Adaptador do Microsoft 6to4

Device ID: ROOT\*6TO4MP\0109

Manufacturer: Microsoft

Name: 6TO4 Adapter

PNP Device ID: ROOT\*6TO4MP\0109

Service: tunnel

 

Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318}

Description: Adaptador do Microsoft 6to4

Device ID: ROOT\*6TO4MP\0122

Manufacturer: Microsoft

Name: 6TO4 Adapter

PNP Device ID: ROOT\*6TO4MP\0122

Service: tunnel

 

Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318}

Description: Adaptador do Microsoft 6to4

Device ID: ROOT\*6TO4MP\0128

Manufacturer: Microsoft

Name: 6TO4 Adapter

PNP Device ID: ROOT\*6TO4MP\0128

Service: tunnel

 

Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318}

Description: Adaptador do Microsoft 6to4

Device ID: ROOT\*6TO4MP\0156

Manufacturer: Microsoft

Name: 6TO4 Adapter

PNP Device ID: ROOT\*6TO4MP\0156

Service: tunnel

 

Class GUID: {4d36e96d-e325-11ce-bfc1-08002be10318}

Description: Fax Modem de Dados Motorola SM56

Device ID: PCI\VEN_1057&DEV_3052&SUBSYS_30201057&REV_04\3&13C0B0C5&0&58

Manufacturer: Motorola Inc

Name: Fax Modem de Dados Motorola SM56

PNP Device ID: PCI\VEN_1057&DEV_3052&SUBSYS_30201057&REV_04\3&13C0B0C5&0&58

Service: Modem

 

==== System Restore Points ===================

 

 

==== Installed Programs ======================

 

Adobe Flash Player 10 ActiveX

Adobe Flash Player 10 Plugin

Arial Audio Converter version 2.3.94

Artista Mágico Disney

Atheros Wireless LAN

aTube Catcher 1.0

avast! Antivirus

Azureus Vuze

BSPlayer

Collage Maker 2.03

ConvertXtoDVD 2.1.14.223

Creative Painter

DVD Decrypter (Remove Only)

FastStone Image Viewer 2.6

FileZilla Client 3.0.8.1

Foxit Reader

Internet Download Accelerator version 5.2

Jigsaws Galore

Macromedia Fireworks MX 2004

Magic Jigsaw

Malwarebytes' Anti-Malware

Megaupload Toolbar

Microsoft Office 2000 Premium

Mozilla Firefox (2.0.0.14)

Nero 7 Essentials

Orbit

PaperPort 7.02

Photo Collage 2.0

Platform

PowerDVD

Sons do Microsoft Office

TUGZip 3.4

Ultra RM Converter 3.5.0411

Ultra Video Splitter 5.4.0104

VIA Platform Device Manager

Visioneer 4800 USB

Webetiser Advent Calendar / Adventskalender 2004

WinAVI VideoConverter

Windows Live installer

Windows Live Messenger

WYSIWYG Web Builder 5.5

Xara3D6

 

==== End Of File ===========================

 

 

Espero ter feito tudo certo ,abraço e obrigada mais uma vez.

Compartilhar este post


Link para o post
Compartilhar em outros sites

Boa Noite! maya2

 

<@> Faça um escaneamento,online,em Eset.

<@> Utilize o navegador Internet Explorer.

<@> Marque a caixa: "SIM,aceito as condições de uso" --> Iniciar.

<@> Marque a caixa: "YES, I accept the Terms of Use" --> Start.

<@> Aceite a instalação do ActiveX e,ao terminar,salve e poste o relatório. ( C:\Arquivos de programas\EsetOnlineScanner\log )

 

Abraços!

Compartilhar este post


Link para o post
Compartilhar em outros sites

Boa noite DigRam ñ foi possivel fazer o que você falou por que apareceu essa mensagem:

 

Error: cannot initialize OnlineScanner :A dministrator rights required.

 

abraço

Compartilhar este post


Link para o post
Compartilhar em outros sites
Boa noite DigRam ñ foi possivel fazer o que você falou por que apareceu essa mensagem:

 

Error: cannot initialize OnlineScanner :A dministrator rights required.

 

abraço

<><><><><><><><><>

Opa! maya2

 

<!> Para o êxito do scan,voçê deverá estar logada com atributos administrativos. <-- Verifique!

<><><><><><><><><>

<@> Baixe: < About:Buster >

<@> Descompacte a ferramenta,para o seu Desktop!

<@> Desconectada,e com as proteções residente de antispywares e antivírus,desabilitadas,rode a ferramenta.

<@> Dê um duplo clique em aboutbuster.exe --> Clique OK --> Start --> OK.

<@> Aguarde o término do scan,e salve o relatório. <-- Poste este relatório!

<@> Poste: Relatório do A:B + HijackThis,atualizado.

<><><><><><><><><>

<@> Estando logada,com atributos administrativos,repita o scan em Eset.

 

Abraços!

Compartilhar este post


Link para o post
Compartilhar em outros sites

Oi DigRam tudo bom, aqui esta o resultado do AboutBuster:

 

AboutBuster 6.03

Scan started on [26/04/2009] at [20:18:22]

-------------------------------------------------------------

Internet Explorer Instances Terminated!

HomeSearch Service stopped if present

-------------------------------------------------------------

No Ads Found!

-------------------------------------------------------------

Error Removing ! : C:\Windows\system32\aswBoot.exe

-------------------------------------------------------------

Scan was COMPLETED SUCCESSFULLY at 20:20:38

 

___________________________________________________

 

 

o resultado do HijackThis :

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 20:26:54, on 26/04/2009

Platform: Windows Vista SP1 (WinNT 6.00.1905)

MSIE: Internet Explorer v7.00 (7.00.6001.18226)

Boot mode: Normal

 

Running processes:

C:\Windows\system32\taskeng.exe

C:\Windows\system32\Dwm.exe

C:\Program Files\Alwil Software\Avast4\ashDisp.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Windows\Explorer.exe

C:\HijackThis\HiJackThis.exe

 

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

R3 - URLSearchHook: CUOLSearchHook Object - {1FE8243E-0A3A-41B9-B9CE-EFFEE51974D3} - C:\PROGRA~1\COMMON~1\uol\URLSEA~1\UOLSEA~1.DLL

F2 - REG:system.ini: UserInit=C:\Windows\system32\userinit.exe,userinit.exe,

O1 - Hosts: ::1 localhost

O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe

O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide

O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE

O8 - Extra context menu item: &Download all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202

O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201

O8 - Extra context menu item: &Download selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203

O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204

O8 - Extra context menu item: Download ALL with IDA - C:\Program Files\IDA\idaieall.htm

O8 - Extra context menu item: Download with IDA - C:\Program Files\IDA\idaie.htm

O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe

O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe

O9 - Extra button: (no name) - cmdmapping - (no file) (HKCU)

O13 - Gopher Prefix:

O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flas...ent/swflash.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{0E356637-99A1-40B8-AE5E-C9D1A6509C14}: NameServer = 200.222.25.129,200.222.25.130

O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe

O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe

O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe

O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe

O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe

O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe

O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe

O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe

 

--

End of file - 3481 bytes

 

 

 

o Eset ñ comsigo mesmo, beijosssss

Compartilhar este post


Link para o post
Compartilhar em outros sites

Bom Dia! maya2

 

<!> Caso esteja tudo ok,com a sua Net,pode abortar o uso do ComboFix.

<><><><><><><><><><><><>

<@> Baixe: < desktopicon.png > ( ...by sUBs )

<@> Salve-o no desktop!

<@> Desabilite as proteções residente de: antivírus,antispywares e firewall. ( Menos o do Windows! )

<@> Feche todas as janelas e execute a ferramenta!

<@> Na solicitação: "Negação de garantia de software" --> Clique em Sim!

<@> Não possuindo o "Console de Recuperação",aceite optar pela instalação do mesmo!

 

<!> Caso aconteça a notificação de: Aplicativo Win32 inválido,delete a ferramenta e faça,novamente,o download.

<!> Salve-a no desktop,renomeada como: Kombo.exe

<!> Ps: Nomeie durante o salvamento,e não após salvá-la!

<!> Ps: Surgindo alguma mensagem de erro,rode o ComboFix.exe em "Modo de Segurança". <-- Link!

<!> Ps: Para completar as remoções,talvez haja necessidade da ferramenta reiniciar o computador. <-- Aguarde!

<!> Ps: Evite executar,voluntariamente,esta ferramenta!

<!> Ps: Para evitar problemas,siga todas as recomendações propostas.

<!> Ps: O ComboFix é uma ferramenta que pode danificar o sistema. Utilize-o,somente,sob supervisão profissional.

<@> Abrir-se-á a janela Auto Scan. --> Aguarde!

<@> Àfim de completar as remoções,o ComboFix poderá reiniciar o computador.

<@> Se houver necessidade,digite a opção para continuar! --> ( 1 ) --> Aperte Enter! --> Aguarde a conclusão!

<@> Durante o scan,evite manusear o mouse ou teclado! <-- Importante!

<@> Para parar ou sair do ComboFix,tecle "N" ou "2" --> Aperte Enter!

<><><><><><><><><><><><>

<@> Terminando,poste os relatórios: C:\ComboFix\ComboFix.txt + HijackThis,atualizado.

 

Abraços!

Compartilhar este post


Link para o post
Compartilhar em outros sites

Oi DigRam tõ te dando um trabalhão né? eu fiz o que você falou por que ñ sei meu pc continua lerdo será que eu vou ter que formatar ? espero que ñ aqui esta os resultados ,beijos :

 

ComboFix :

 

ComboFix 09-04-27.02 - kelow 27/04/2009 18:15.1 - NTFSx86

Microsoft® Windows Vista™ Starter 6.0.6001.1.1252.55.1046.18.479.120 [GMT -3:00]

Executando de: c:\users\kelow\Desktop\ComboFix.exe

* Criado um novo ponto de restauro

.

ADS - Windows: deleted 48 bytes in 1 streams.

 

((((((((((((((((((((((((((((((((((((( Outras Exclusões )))))))))))))))))))))))))))))))))))))))))))))))))))

.

 

c:\users\kelow\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Videos.url

c:\users\kelow\FAVORI~1\Videos.url

c:\users\kelow\Favorites\Videos.url

c:\windows\system32\simdataconf.dll

 

.

(((((((((((((((( Arquivos/Ficheiros criados de 2009-05-27 to 2009-4-27 ))))))))))))))))))))))))))))

.

 

2009-04-25 21:52 . 2009-04-25 21:52 -------- d-----w c:\users\Lois\AppData\Local\Mozilla

2009-04-25 21:52 . 2009-04-25 21:52 -------- d-----r c:\users\Lois\Searches

2009-04-25 21:52 . 2009-04-25 21:52 -------- d-----r c:\users\Lois\Contacts

2009-04-25 21:52 . 2009-04-25 21:52 -------- d-----w c:\users\Lois\AppData\Local\VirtualStore

2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\users\kelow\AppData\Roaming\Malwarebytes

2009-04-24 21:29 . 2009-04-06 18:32 15504 ----a-w c:\windows\system32\drivers\mbam.sys

2009-04-24 21:29 . 2009-04-06 18:32 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys

2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\programdata\Malwarebytes

2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\users\All Users\Malwarebytes

2009-04-24 21:29 . 2009-04-24 23:05 -------- d-----w c:\program files\Malwarebytes' Anti-Malware

2009-04-24 21:04 . 2009-04-24 21:08 -------- d-----w C:\ToolBar SD

2009-04-24 20:53 . 2009-04-24 20:54 -------- d-----w C:\ToolBarSD

2009-04-22 21:24 . 2009-04-26 23:26 -------- d-----w C:\HijackThis

2009-04-15 22:25 . 2009-04-15 22:25 -------- d-----w c:\program files\Trend Micro

2009-04-15 22:04 . 2009-04-15 22:06 -------- d-----w C:\MSNCleaner

2009-04-14 19:51 . 2008-12-06 04:42 376832 ----a-w c:\windows\system32\winhttp.dll

2009-04-14 19:51 . 2008-06-06 03:27 562176 ----a-w c:\windows\system32\msdtcprx.dll

2009-04-14 19:51 . 2008-06-06 03:27 38912 ----a-w c:\windows\system32\xolehlp.dll

2009-04-14 19:47 . 2009-03-03 04:39 551424 ----a-w c:\windows\system32\rpcss.dll

2009-04-14 19:47 . 2009-03-03 04:46 3599328 ----a-w c:\windows\system32\ntkrnlpa.exe

2009-04-14 19:47 . 2009-03-03 04:46 3547632 ----a-w c:\windows\system32\ntoskrnl.exe

2009-04-14 19:47 . 2009-03-03 03:04 666624 ----a-w c:\windows\system32\printfilterpipelinesvc.exe

2009-04-14 19:47 . 2009-03-03 04:39 26112 ----a-w c:\windows\system32\printfilterpipelineprxy.dll

2009-04-14 19:47 . 2009-03-03 04:39 183296 ----a-w c:\windows\system32\sdohlp.dll

2009-04-14 19:47 . 2009-03-03 04:37 98304 ----a-w c:\windows\system32\iasrecst.dll

2009-04-14 19:47 . 2009-03-03 04:37 44032 ----a-w c:\windows\system32\iasdatastore.dll

2009-04-14 19:47 . 2009-03-03 04:37 54784 ----a-w c:\windows\system32\iasads.dll

2009-04-14 19:47 . 2009-03-03 02:38 17408 ----a-w c:\windows\system32\iashost.exe

2009-04-14 19:45 . 2009-02-13 08:49 1255936 ----a-w c:\windows\system32\lsasrv.dll

2009-04-14 19:45 . 2009-02-13 08:49 72704 ----a-w c:\windows\system32\secur32.dll

2009-04-14 19:45 . 2009-03-17 03:38 13824 ----a-w c:\windows\system32\apilogen.dll

2009-04-14 19:45 . 2009-03-17 03:38 24064 ----a-w c:\windows\system32\amxread.dll

2009-04-14 19:43 . 2009-03-03 04:40 827392 ----a-w c:\windows\system32\wininet.dll

2009-04-14 19:43 . 2009-03-03 02:28 26624 ----a-w c:\windows\system32\ieUnatt.exe

2009-04-14 19:43 . 2009-03-03 04:37 78336 ----a-w c:\windows\system32\ieencode.dll

 

.

((((((((((((((((((((((((((((((((((((( Relatório Find3M ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-04-27 21:08 . 2007-05-16 01:13 2032 ----a-w c:\users\kelow\AppData\Local\d3d9caps.dat

2009-04-26 23:39 . 2009-04-25 21:51 680 ----a-w c:\users\Lois\AppData\Local\d3d9caps.dat

2009-04-16 21:47 . 2008-12-10 14:34 -------- d-----w c:\program files\Common Files\Macromedia

2009-04-16 21:47 . 2007-05-16 11:52 -------- d--h--w c:\program files\InstallShield Installation Information

2009-04-16 21:44 . 2007-07-24 02:38 -------- d-----w c:\program files\DivX

2009-04-16 21:43 . 2007-07-24 02:40 -------- d-----w c:\program files\BearShare

2009-04-16 00:15 . 2008-12-10 11:31 -------- d-----w c:\program files\IDA

2009-04-16 00:15 . 2008-08-30 19:43 -------- d-----w c:\program files\Orbitdownloader

2009-04-15 13:25 . 2006-11-02 11:18 -------- d-----w c:\program files\Windows Mail

2009-04-13 20:23 . 2008-12-19 19:49 -------- d-----w c:\program files\WYSIWYG.Web.Builder.v5.5.2.Cracked

2009-04-11 03:21 . 2008-02-12 22:48 -------- d-----w c:\program files\Azureus

2009-03-17 03:38 . 2009-04-14 19:45 40960 ----a-w c:\windows\AppPatch\apihex86.dll

2009-02-28 17:39 . 2006-11-06 01:33 632354 ----a-w c:\windows\system32\prfh0416.dat

2009-02-28 17:39 . 2006-11-06 01:33 120882 ----a-w c:\windows\system32\prfc0416.dat

2009-02-15 19:16 . 2009-02-15 19:16 12208 --sha-w c:\windows\system32\KGyGaAvL.sys

2009-02-15 19:14 . 2008-02-10 17:36 3082 ----a-w c:\windows\system32\affv208325p1now.sys

2009-02-09 03:10 . 2009-03-11 19:26 2033152 ----a-w c:\windows\system32\win32k.sys

2009-02-05 22:06 . 2007-07-29 02:01 51792 ----a-w c:\windows\system32\drivers\aswMonFlt.sys

2008-10-13 21:11 . 2006-11-02 12:50 174 --sha-w c:\program files\desktop.ini

2008-04-07 09:25 . 2008-08-31 15:32 67696 ----a-w c:\program files\mozilla firefox\components\jar50.dll

2008-04-07 09:25 . 2008-08-31 15:32 54376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll

2008-04-07 09:25 . 2008-08-31 15:32 34952 ----a-w c:\program files\mozilla firefox\components\myspell.dll

2008-04-07 09:25 . 2008-08-31 15:32 46720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll

2008-04-07 09:25 . 2008-08-31 15:32 172144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll

.

 

(((((((((((((((((((((((((( Pontos de Carregamento do Registro )))))))))))))))))))))))))))))))))))))))

.

.

*Nota* entradas vazias e legítimas por defeito não são mostradas.

REGEDIT4

 

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"EnableLUA"= 0 (0x0)

"EnableUIADesktopToggle"= 0 (0x0)

 

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]

"NoDFSTab"= 1 (0x1)

 

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]

"NoDFSTab"= 1 (0x1)

 

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

"FirewallOverride"=dword:00000001

 

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]

"AntiVirusOverride"=dword:00000001

 

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]

"TCP Query User{9111B6E0-61FA-4F1A-BA3C-EE3FAB0C3F67}c:\\program files\\bearshare\\bearshare.exe"= UDP:c:\program files\bearshare\bearshare.exe:BearShare

"UDP Query User{2D96DA3A-C920-4132-8700-DF7FFFF19638}c:\\program files\\bearshare\\bearshare.exe"= TCP:c:\program files\bearshare\bearshare.exe:BearShare

"TCP Query User{524519EF-BF7B-49B9-8889-0A14FD3876F7}c:\\program files\\orbitdownloader\\orbitnet.exe"= UDP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader

"UDP Query User{0E5B2CED-79EE-4D88-B291-D64BBF1B9D16}c:\\program files\\orbitdownloader\\orbitnet.exe"= TCP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader

"TCP Query User{6D1FB056-3C84-4AC0-B3E2-0E8DBE36D7E7}c:\\program files\\orbitdownloader\\orbitnet.exe"= UDP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader

"UDP Query User{77C67769-9C0E-4851-B259-3263507C66F7}c:\\program files\\orbitdownloader\\orbitnet.exe"= TCP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader

"TCP Query User{0F5E2FEE-4418-4712-AB8B-61271E14CBE0}c:\\program files\\orbitdownloader\\orbitdm.exe"= UDP:c:\program files\orbitdownloader\orbitdm.exe:Orbit Downloader

"UDP Query User{CCD1203E-A9DC-4020-A1BD-628874DA26A2}c:\\program files\\orbitdownloader\\orbitdm.exe"= TCP:c:\program files\orbitdownloader\orbitdm.exe:Orbit Downloader

"{C4875B03-AA7B-4CA4-A67D-5E93A2753EC3}"= UDP:57487:bearshare

"TCP Query User{960AA96E-FD89-4A54-9865-8E12839BF61E}c:\\program files\\bearshare\\bearshare.exe"= UDP:c:\program files\bearshare\bearshare.exe:BearShare

"UDP Query User{F61213C1-3592-4117-AC39-0E2B244BB330}c:\\program files\\bearshare\\bearshare.exe"= TCP:c:\program files\bearshare\bearshare.exe:BearShare

"{25AE9187-C40C-40DE-8F2D-617C58C2539A}"= UDP:26384:BitComet 26384 TCP

"{AAF49D9C-8A47-4FF3-83E5-A4E800FA5383}"= TCP:26384:BitComet 26384 UDP

"TCP Query User{F7D2CFD3-DAE8-4A4C-A6F6-AFC6EF8F32ED}c:\\program files\\bitcomet\\bitcomet.exe"= UDP:c:\program files\bitcomet\bitcomet.exe:BitComet - a BitTorrent Client

"UDP Query User{D6913133-65A8-4529-B466-58BB1D482B89}c:\\program files\\bitcomet\\bitcomet.exe"= TCP:c:\program files\bitcomet\bitcomet.exe:BitComet - a BitTorrent Client

"{0C8D9895-E5D5-4997-8A90-6C433E12A0F6}"= TCP:6347:bearshare1

"{E525BBF9-8E5E-4718-8210-0F2A280A322D}"= Disabled:UDP:49155:shareaza1

"{454CF4EA-0AF5-4E1B-ABC1-4EFA1D471F3C}"= UDP:c:\program files\DNA\btdna.exe:DNA

"{5BC93113-0EEE-4439-99E0-757B2FA8C2DC}"= TCP:c:\program files\DNA\btdna.exe:DNA

"{D2DDB2E4-C321-43DA-A515-DC122DD61603}"= UDP:c:\program files\BitTorrent\bittorrent.exe:BitTorrent

"{A7812BD5-0490-470E-97B5-E7DFD76E99FE}"= TCP:c:\program files\BitTorrent\bittorrent.exe:BitTorrent

"TCP Query User{36F7F528-96BA-46B7-BFE9-0C28C3776761}c:\\users\\kelow\\program files\\dna\\btdna.exe"= UDP:c:\users\kelow\program files\dna\btdna.exe:btdna.exe

"UDP Query User{0158F188-6ADA-4505-9554-E020A05BDA90}c:\\users\\kelow\\program files\\dna\\btdna.exe"= TCP:c:\users\kelow\program files\dna\btdna.exe:btdna.exe

"{C998C340-34BA-4436-BFD9-3214E67E0521}"= UDP:6885:azureus

"TCP Query User{6CD3A550-3317-4F2D-A281-BA062AE00D31}c:\\program files\\internet explorer\\iexplore.exe"= UDP:c:\program files\internet explorer\iexplore.exe:Internet Explorer

"UDP Query User{8ABEE96C-2D69-483F-86CB-ADA2512C88CF}c:\\program files\\internet explorer\\iexplore.exe"= TCP:c:\program files\internet explorer\iexplore.exe:Internet Explorer

"{2EB75AD1-4935-48CC-8AD9-786D47E69B16}"= UDP:6883:azureus

"TCP Query User{B9B6B949-0488-412C-9D43-B52A7B41B2B6}c:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= Disabled:UDP:c:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza

"UDP Query User{9F7C78C3-475D-41C4-9408-57DD9374144B}c:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= Disabled:TCP:c:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza

"{82DDD077-BE0B-401E-9A15-71A84FD586D6}"= UDP:c:\users\kelow\Desktop\VDownloader.exe:VDownloader

"{E2840104-86A2-4DEF-91A0-8A5D81A1E3E5}"= TCP:c:\users\kelow\Desktop\VDownloader.exe:VDownloader

"TCP Query User{627B8B9B-ED0F-48EA-85BA-CB8659CB0F35}c:\\program files\\nero\\nero 7\\nero showtime\\showtime.exe"= UDP:c:\program files\nero\nero 7\nero showtime\showtime.exe:Nero ShowTime Essentials

"UDP Query User{E16FD3D6-7C99-48E9-BCA9-448CC7AD4428}c:\\program files\\nero\\nero 7\\nero showtime\\showtime.exe"= TCP:c:\program files\nero\nero 7\nero showtime\showtime.exe:Nero ShowTime Essentials

"TCP Query User{A9D71AFD-C9AE-4593-ADDB-E61F35475160}c:\\program files\\ares\\ares.exe"= UDP:c:\program files\ares\ares.exe:Ares p2p for windows

"UDP Query User{49D02A80-50F5-4974-AE8F-B7DDA2500153}c:\\program files\\ares\\ares.exe"= TCP:c:\program files\ares\ares.exe:Ares p2p for windows

"{88BA0F56-AC23-4942-8F20-702D02451C96}"= c:\program files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone)

"TCP Query User{A90CA7E6-A1F6-4221-A641-144947793BA1}c:\\program files\\azureus\\azureus.exe"= UDP:c:\program files\azureus\azureus.exe:Azureus

"UDP Query User{68E0BEA7-B7DB-4DE2-A027-AE95BDC6ED0C}c:\\program files\\azureus\\azureus.exe"= TCP:c:\program files\azureus\azureus.exe:Azureus

"{9C255BE3-B5B0-40C5-AD09-AA2036369ECC}"= UDP:c:\program files\Mozilla Firefox\firefox.exe:Mozilla Firefox

"{01F0A01C-E076-4420-9286-5AE99E3093E8}"= TCP:c:\program files\Mozilla Firefox\firefox.exe:Mozilla Firefox

"TCP Query User{EBDC8018-9E0F-405B-9718-8FF002B3D459}c:\\program files\\mirc\\mirc.exe"= UDP:c:\program files\mirc\mirc.exe:mIRC

"UDP Query User{9E79CA84-F5DF-4C3B-9E90-C3C1E1606A07}c:\\program files\\mirc\\mirc.exe"= TCP:c:\program files\mirc\mirc.exe:mIRC

"TCP Query User{05F04037-A599-48EE-9CD7-E2FFBAB7D617}c:\\program files\\dap\\dap.exe"= UDP:c:\program files\dap\dap.exe:Download Accelerator Plus (DAP)

"UDP Query User{9BB2BB40-3FFA-4C7E-B050-365A75A1CD97}c:\\program files\\dap\\dap.exe"= TCP:c:\program files\dap\dap.exe:Download Accelerator Plus (DAP)

"{D98823A2-EF58-4AE1-8341-B5336364357A}"= UDP:6881:azureus

"TCP Query User{24219510-B782-4DED-8F79-904D0BF8CB2F}c:\\program files\\filezilla ftp client\\filezilla.exe"= UDP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client

"UDP Query User{5301F8B8-5830-4865-A724-9F4E32D55883}c:\\program files\\filezilla ftp client\\filezilla.exe"= TCP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client

"TCP Query User{BEF14530-FB5D-4603-9D7D-70BB00E083BA}c:\\program files\\shareaza\\shareaza.exe"= Disabled:UDP:c:\program files\shareaza\shareaza.exe:Shareaza Ultimate File Sharing

"UDP Query User{47B4991B-714F-43C5-AF7E-9ADA7503A706}c:\\program files\\shareaza\\shareaza.exe"= Disabled:TCP:c:\program files\shareaza\shareaza.exe:Shareaza Ultimate File Sharing

"TCP Query User{15FDD6A4-2FF2-48A1-B323-047E57847FD5}c:\\program files\\azureus\\azureus.exe"= UDP:c:\program files\azureus\azureus.exe:Azureus

"UDP Query User{60B68D20-88FE-45A5-AA8E-81D20D996635}c:\\program files\\azureus\\azureus.exe"= TCP:c:\program files\azureus\azureus.exe:Azureus

"{867290A1-9295-4E98-B09B-006C3B9ED1D7}"= UDP:c:\users\kelow\Desktop\Programas\VDownloader.exe:VDownloader

"{6A0339E7-9160-4578-8F4A-12BCC35B67D4}"= TCP:c:\users\kelow\Desktop\Programas\VDownloader.exe:VDownloader

"TCP Query User{B03C713E-BFAD-4CE4-B659-4ABF5632EFE3}c:\\program files\\filezilla ftp client\\filezilla.exe"= UDP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client

"UDP Query User{5C94D225-2F3C-4D2A-A33E-CFC9987BDA9C}c:\\program files\\filezilla ftp client\\filezilla.exe"= TCP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client

"{94DBADC9-26F1-410E-B0EF-EB1D0A798244}"= UDP:c:\program files\DsNET Corp\aTube Catcher 1.0\yct.exe:aTube Catcher

"{912FE133-C6CF-4777-B8D0-504B9F453339}"= TCP:c:\program files\DsNET Corp\aTube Catcher 1.0\yct.exe:aTube Catcher

"{AE65C5E1-C888-4628-B428-80A5BD679073}"= UDP:c:\users\kelow\Desktop\Programas\Vidownloader\VDownloader.exe:VDownloader

"{57D22DF4-544B-4E09-A419-F957045401E7}"= TCP:c:\users\kelow\Desktop\Programas\Vidownloader\VDownloader.exe:VDownloader

"{FD7CE07B-1404-4C89-B744-8216A8E293BB}"= UDP:c:\program files\Malwarebytes' Anti-Malware\mbam.exe:Malwarebytes' Anti-Malware

"{335BE7F0-5331-45E8-98CE-19F2409CF53F}"= TCP:c:\program files\Malwarebytes' Anti-Malware\mbam.exe:Malwarebytes' Anti-Malware

"TCP Query User{A2745A60-9FDD-4F16-B444-725FF8641871}c:\\program files\\mirc\\mirc.exe"= Disabled:UDP:c:\program files\mirc\mirc.exe:mIRC

"UDP Query User{E3A44E4F-BAD8-4FA5-AD38-C5F7CD593019}c:\\program files\\mirc\\mirc.exe"= Disabled:TCP:c:\program files\mirc\mirc.exe:mIRC

"TCP Query User{D486ABFB-F3A8-4DE1-A776-615CAF0F07B4}c:\\mirc\\mirc.exe"= Disabled:UDP:c:\mirc\mirc.exe:mIRC

"UDP Query User{3E0696F4-AEED-4B82-B76F-D6074AACBD84}c:\\mirc\\mirc.exe"= Disabled:TCP:c:\mirc\mirc.exe:mIRC

"TCP Query User{F6DBF0F8-6770-4E55-9565-7411CB329B1D}c:\\users\\kelow\\desktop\\programas\\mirc.exe"= Disabled:UDP:c:\users\kelow\desktop\programas\mirc.exe:mirc.exe

"UDP Query User{0613EB7E-8E00-47F7-8242-FE2EE6C7B17B}c:\\users\\kelow\\desktop\\programas\\mirc.exe"= Disabled:TCP:c:\users\kelow\desktop\programas\mirc.exe:mirc.exe

"{AE2A1E8A-3177-4218-8962-21E91A2D8155}"= UDP:c:\users\kelow\Desktop\dds.scr:dds

"{A849525C-E551-4A99-8B37-9FFFF813F804}"= TCP:c:\users\kelow\Desktop\dds.scr:dds

 

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile\AuthorizedApplications\List]

"c:\\Program Files\\Orbitdownloader\\orbitdm.exe"= c:\program files\Orbitdownloader\orbitdm.exe:*:Enabled:Orbit

"c:\\Program Files\\Orbitdownloader\\orbitnet.exe"= c:\program files\Orbitdownloader\orbitnet.exe:*:Enabled:Orbit

 

R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\DRIVERS\b57nd60x.sys [2006-11-02 167936]

S2 aswMonFlt;aswMonFlt;c:\windows\system32\DRIVERS\aswMonFlt.sys [2009-02-05 51792]

 

 

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]

LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc

 

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c7452b84-0348-11dc-a68e-806e6f6e6963}]

\shell\AutoRun\command - d:\autorun\Demo32.exe

.

.

------- Scan Suplementar -------

.

mWindow Title =

IE: &Download all by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/202

IE: &Download by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/201

IE: &Download selected by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/203

IE: &Grab video by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/204

IE: Download ALL with IDA - c:\program files\IDA\idaieall.htm

IE: Download with IDA - c:\program files\IDA\idaie.htm

TCP: {0E356637-99A1-40B8-AE5E-C9D1A6509C14} = 200.222.25.129,200.222.25.130

FF - ProfilePath - c:\users\kelow\AppData\Roaming\Mozilla\Firefox\Profiles\qkf5eeja.default\

FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=

FF - prefs.js: browser.search.selectedEngine - Crawler Search

FF - prefs.js: browser.startup.homepage -

FF - prefs.js: keyword.URL - hxxp://www.crawler.com/search/dispatcher.aspx?tp=aus&tbid=60076&qkw=

FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll

FF - component: c:\users\kelow\AppData\Roaming\Mozilla\Firefox\Profiles\qkf5eeja.default\extensions\{87F8774F-B485-47E2-A755-A40A8A5E886D}\components\GbMzhCef.dll

 

---- FIREFOX POLICIES ----

c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.allow_platform_file_picker", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.cookie.p3plevel", 1); // 0=low, 1=medium, 2=high, 3=custom

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.enablePad", false); // Allow client to do proxy autodiscovery

c:\program files\Mozilla Firefox\defaults\pref\firefox-l10n.js - pref("browser.fixup.alternate.suffix", ".com.br");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.urlbar.hideGoButton", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.default", "chrome://branding/content/searchconfig.properties");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.custom", "chrome://branding/content/searchconfig.properties");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("signon.prefillForms", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.remoteLookups", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.updateURL", "http://sb.google.com/safebrowsing/update?client={moz:client}&appver={moz:version}&");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.lookupURL", "http://sb.google.com/safebrowsing/lookup?sourceid=firefox-antiphish&features=TrustRank&client={moz:client}&appver={moz:version}&");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.reportURL", "http://sb.google.com/safebrowsing/report?");

.

 

**************************************************************************

 

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-04-27 18:27

Windows 6.0.6001 Service Pack 1 NTFS

 

Procurando processos ocultos ...

 

Procurando entradas auto inicializáveis ocultas ...

 

Procurando ficheiros/arquivos ocultos ...

 

Varredura completada com sucesso

arquivos/ficheiros ocultos: 0

 

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

 

[HKEY_USERS\S-1-5-21-937329819-1578037983-2621623099-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{ACF1504E-1CC6-789C-A5B4-6B8C7A88F60D}*]

@Allowed: (Read) (RestrictedCode)

"faancnfbphhk"=hex:66,61,6b,69,65,61,6d,70,63,67,70,62,00,ff

"jaancnfbmimjnhfilpfm"=hex:61,61,00,00

"kaancnfbkpjjhllpbaagen"=hex:61,61,00,00

 

[HKEY_USERS\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

"MSCurrentCountry"=dword:00000016

 

[HKEY_USERS\SYSTEM\ControlSet002\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

"MSCurrentCountry"=dword:00000016

 

[HKEY_USERS\SYSTEM\ControlSet003\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

"MSCurrentCountry"=dword:00000016

.

Tempo para conclusão: 2009-04-27 18:32

ComboFix-quarantined-files.txt 2009-04-27 21:32

 

Pré-execução: 34.665.934.848 bytes disponíveis

Pós execução: 35.605.606.400 bytes disponíveis

 

247 --- E O F --- 2009-04-27 19:58

 

--------------------------------------------

HijackThis :

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 18:36:06, on 27/04/2009

Platform: Windows Vista SP1 (WinNT 6.00.1905)

MSIE: Internet Explorer v7.00 (7.00.6001.18226)

Boot mode: Normal

 

Running processes:

C:\Windows\system32\taskeng.exe

C:\Windows\system32\Dwm.exe

C:\Windows\Explorer.EXE

C:\HijackThis\HiJackThis.exe

 

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

R3 - URLSearchHook: CUOLSearchHook Object - {1FE8243E-0A3A-41B9-B9CE-EFFEE51974D3} - C:\PROGRA~1\COMMON~1\uol\URLSEA~1\UOLSEA~1.DLL

O1 - Hosts: ::1 localhost

O8 - Extra context menu item: &Download all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202

O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201

O8 - Extra context menu item: &Download selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203

O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204

O8 - Extra context menu item: Download ALL with IDA - C:\Program Files\IDA\idaieall.htm

O8 - Extra context menu item: Download with IDA - C:\Program Files\IDA\idaie.htm

O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe

O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe

O9 - Extra button: (no name) - cmdmapping - (no file) (HKCU)

O13 - Gopher Prefix:

O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flas...ent/swflash.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{0E356637-99A1-40B8-AE5E-C9D1A6509C14}: NameServer = 200.222.25.129,200.222.25.130

O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe

O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe

O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe

O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe

 

--

End of file - 2811 bytes

Compartilhar este post


Link para o post
Compartilhar em outros sites

Bom Dia! maya2

 

<@> Copie estas informações,entre os XXXXXXX....,para o Bloco de Notas.

<@> Salve-as,no desktop,como: CFScript <-- Texto!

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

File::

d:\autorun\Demo32.exe

Registry::

[-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{c7452b84-0348-11dc-a68e-806e6f6e6963}]

Regnull::

[HKEY_USERS\S-1-5-21-937329819-1578037983-2621623099-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{ACF1504E-1CC6-789C-A5B4-6B8C7A88F60D}*]

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

<@> Arraste o CFScript.txt,para o ícone do ComboFix.

<@> Arraste-o,até que surja uma solicitação para executar o ComboFix.exe.

<@> Terminando,poste: ComboFix.txt

<><><><><><><><><><><>

<@> Faça um scan online em: < Kaspersky >

<@> Utilize para isso,o navegador Internet Explorer.

 

<!> Acesse o site,e clique em: < kasperdx9.jpg >

 

<@> Na próxima página,clique em: I Accept

<@> Isto,para que se instale o controle ActiveX e,em seguida,atualize o banco de dados.

<@> Na próxima página,clique em: My Computer e faça o scan.

<@> Tenha paciência!

<@> Aguarde a atualização da base de dados,e também do exame,que é demorado.

<@> Terminando,salve e poste o relatório.

<@> Clique em Save Report As... para salvar o log. ( Kaspersky_Online_Scanner_7_Report.txt )

<@> Salve o resultado como .txt,segundo a imagem abaixo:

 

Kas-Savetxt.gif

 

<@> Poste,também,HijackThis atualizado.

 

Abraços!

Compartilhar este post


Link para o post
Compartilhar em outros sites

Oi DigRam ñ consegui usar o kaspersky estou tentando amanhã eu tento outra vez aqui esta o resultado do

ComboFix.txt , beijos:

 

ComboFix 09-04-27.02 - kelow 28/04/2009 19:39.1 - NTFSx86

Microsoft® Windows Vista™ Starter 6.0.6001.1.1252.55.1046.18.479.94 [GMT -3:00]

Executando de: c:\users\kelow\Desktop\ComboFix.exe

Comandos utilizados :: c:\users\kelow\Desktop\CFScript.txt

* Criado um novo ponto de restauro

 

FILE ::

d:\autorun\Demo32.exe

.

ADS - Windows: deleted 48 bytes in 1 streams.

 

((((((((((((((((((((((((((((((((((((( Outras Exclusões )))))))))))))))))))))))))))))))))))))))))))))))))))

.

 

c:\windows\system32\simdataconf.dll

 

.

(((((((((((((((( Arquivos/Ficheiros criados de 2009-05-28 to 2009-4-28 ))))))))))))))))))))))))))))

.

 

2009-04-25 21:52 . 2009-04-28 22:22 -------- d-----w c:\users\Lois\AppData\Local\Mozilla

2009-04-25 21:52 . 2009-04-28 22:22 -------- d-----r c:\users\Lois\Searches

2009-04-25 21:52 . 2009-04-28 22:22 -------- d-----r c:\users\Lois\Contacts

2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\users\kelow\AppData\Roaming\Malwarebytes

2009-04-24 21:29 . 2009-04-06 18:32 15504 ----a-w c:\windows\system32\drivers\mbam.sys

2009-04-24 21:29 . 2009-04-06 18:32 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys

2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\programdata\Malwarebytes

2009-04-24 21:29 . 2009-04-24 21:29 -------- d-----w c:\users\All Users\Malwarebytes

2009-04-24 21:29 . 2009-04-24 23:05 -------- d-----w c:\program files\Malwarebytes' Anti-Malware

2009-04-24 21:04 . 2009-04-24 21:08 -------- d-----w C:\ToolBar SD

2009-04-24 20:53 . 2009-04-24 20:54 -------- d-----w C:\ToolBarSD

2009-04-22 21:24 . 2009-04-27 21:35 -------- d-----w C:\HijackThis

2009-04-15 22:25 . 2009-04-15 22:25 -------- d-----w c:\program files\Trend Micro

2009-04-15 22:04 . 2009-04-15 22:06 -------- d-----w C:\MSNCleaner

2009-04-14 19:51 . 2008-12-06 04:42 376832 ----a-w c:\windows\system32\winhttp.dll

2009-04-14 19:51 . 2008-06-06 03:27 562176 ----a-w c:\windows\system32\msdtcprx.dll

2009-04-14 19:51 . 2008-06-06 03:27 38912 ----a-w c:\windows\system32\xolehlp.dll

2009-04-14 19:47 . 2009-03-03 04:39 551424 ----a-w c:\windows\system32\rpcss.dll

2009-04-14 19:47 . 2009-03-03 04:46 3599328 ----a-w c:\windows\system32\ntkrnlpa.exe

2009-04-14 19:47 . 2009-03-03 04:46 3547632 ----a-w c:\windows\system32\ntoskrnl.exe

2009-04-14 19:47 . 2009-03-03 03:04 666624 ----a-w c:\windows\system32\printfilterpipelinesvc.exe

2009-04-14 19:47 . 2009-03-03 04:39 26112 ----a-w c:\windows\system32\printfilterpipelineprxy.dll

2009-04-14 19:47 . 2009-03-03 04:39 183296 ----a-w c:\windows\system32\sdohlp.dll

2009-04-14 19:47 . 2009-03-03 04:37 98304 ----a-w c:\windows\system32\iasrecst.dll

2009-04-14 19:47 . 2009-03-03 04:37 44032 ----a-w c:\windows\system32\iasdatastore.dll

2009-04-14 19:47 . 2009-03-03 04:37 54784 ----a-w c:\windows\system32\iasads.dll

2009-04-14 19:47 . 2009-03-03 02:38 17408 ----a-w c:\windows\system32\iashost.exe

2009-04-14 19:45 . 2009-02-13 08:49 1255936 ----a-w c:\windows\system32\lsasrv.dll

2009-04-14 19:45 . 2009-02-13 08:49 72704 ----a-w c:\windows\system32\secur32.dll

2009-04-14 19:45 . 2009-03-17 03:38 13824 ----a-w c:\windows\system32\apilogen.dll

2009-04-14 19:45 . 2009-03-17 03:38 24064 ----a-w c:\windows\system32\amxread.dll

2009-04-14 19:43 . 2009-03-03 04:40 827392 ----a-w c:\windows\system32\wininet.dll

2009-04-14 19:43 . 2009-03-03 02:28 26624 ----a-w c:\windows\system32\ieUnatt.exe

2009-04-14 19:43 . 2009-03-03 04:37 78336 ----a-w c:\windows\system32\ieencode.dll

 

.

((((((((((((((((((((((((((((((((((((( Relatório Find3M ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-04-28 22:25 . 2007-05-16 01:13 2032 ----a-w c:\users\kelow\AppData\Local\d3d9caps.dat

2009-04-28 22:22 . 2007-07-29 02:01 -------- d-----w c:\program files\Alwil Software

2009-04-16 21:47 . 2008-12-10 14:34 -------- d-----w c:\program files\Common Files\Macromedia

2009-04-16 21:47 . 2007-05-16 11:52 -------- d--h--w c:\program files\InstallShield Installation Information

2009-04-16 21:44 . 2007-07-24 02:38 -------- d-----w c:\program files\DivX

2009-04-16 21:43 . 2007-07-24 02:40 -------- d-----w c:\program files\BearShare

2009-04-16 00:15 . 2008-12-10 11:31 -------- d-----w c:\program files\IDA

2009-04-16 00:15 . 2008-08-30 19:43 -------- d-----w c:\program files\Orbitdownloader

2009-04-15 13:25 . 2006-11-02 11:18 -------- d-----w c:\program files\Windows Mail

2009-04-13 20:23 . 2008-12-19 19:49 -------- d-----w c:\program files\WYSIWYG.Web.Builder.v5.5.2.Cracked

2009-04-11 03:21 . 2008-02-12 22:48 -------- d-----w c:\program files\Azureus

2009-03-17 03:38 . 2009-04-14 19:45 40960 ----a-w c:\windows\AppPatch\apihex86.dll

2009-02-28 17:39 . 2006-11-06 01:33 632354 ----a-w c:\windows\system32\prfh0416.dat

2009-02-28 17:39 . 2006-11-06 01:33 120882 ----a-w c:\windows\system32\prfc0416.dat

2009-02-15 19:16 . 2009-02-15 19:16 12208 --sha-w c:\windows\system32\KGyGaAvL.sys

2009-02-15 19:14 . 2008-02-10 17:36 3082 ----a-w c:\windows\system32\affv208325p1now.sys

2009-02-09 03:10 . 2009-03-11 19:26 2033152 ----a-w c:\windows\system32\win32k.sys

2009-02-05 22:06 . 2007-07-29 02:01 51792 ----a-w c:\windows\system32\drivers\aswMonFlt.sys

2008-10-13 21:11 . 2006-11-02 12:50 174 --sha-w c:\program files\desktop.ini

2008-04-07 09:25 . 2008-08-31 15:32 67696 ----a-w c:\program files\mozilla firefox\components\jar50.dll

2008-04-07 09:25 . 2008-08-31 15:32 54376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll

2008-04-07 09:25 . 2008-08-31 15:32 34952 ----a-w c:\program files\mozilla firefox\components\myspell.dll

2008-04-07 09:25 . 2008-08-31 15:32 46720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll

2008-04-07 09:25 . 2008-08-31 15:32 172144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll

.

 

(((((((((((((((((((((((((( Pontos de Carregamento do Registro )))))))))))))))))))))))))))))))))))))))

.

.

*Nota* entradas vazias e legítimas por defeito não são mostradas.

REGEDIT4

 

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"EnableLUA"= 0 (0x0)

"EnableUIADesktopToggle"= 0 (0x0)

 

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]

"NoDFSTab"= 1 (0x1)

 

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]

"NoDFSTab"= 1 (0x1)

 

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

"FirewallOverride"=dword:00000001

 

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]

"AntiVirusOverride"=dword:00000001

 

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]

"TCP Query User{9111B6E0-61FA-4F1A-BA3C-EE3FAB0C3F67}c:\\program files\\bearshare\\bearshare.exe"= UDP:c:\program files\bearshare\bearshare.exe:BearShare

"UDP Query User{2D96DA3A-C920-4132-8700-DF7FFFF19638}c:\\program files\\bearshare\\bearshare.exe"= TCP:c:\program files\bearshare\bearshare.exe:BearShare

"TCP Query User{524519EF-BF7B-49B9-8889-0A14FD3876F7}c:\\program files\\orbitdownloader\\orbitnet.exe"= UDP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader

"UDP Query User{0E5B2CED-79EE-4D88-B291-D64BBF1B9D16}c:\\program files\\orbitdownloader\\orbitnet.exe"= TCP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader

"TCP Query User{6D1FB056-3C84-4AC0-B3E2-0E8DBE36D7E7}c:\\program files\\orbitdownloader\\orbitnet.exe"= UDP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader

"UDP Query User{77C67769-9C0E-4851-B259-3263507C66F7}c:\\program files\\orbitdownloader\\orbitnet.exe"= TCP:c:\program files\orbitdownloader\orbitnet.exe:P2P service of Orbit Downloader

"TCP Query User{0F5E2FEE-4418-4712-AB8B-61271E14CBE0}c:\\program files\\orbitdownloader\\orbitdm.exe"= UDP:c:\program files\orbitdownloader\orbitdm.exe:Orbit Downloader

"UDP Query User{CCD1203E-A9DC-4020-A1BD-628874DA26A2}c:\\program files\\orbitdownloader\\orbitdm.exe"= TCP:c:\program files\orbitdownloader\orbitdm.exe:Orbit Downloader

"{C4875B03-AA7B-4CA4-A67D-5E93A2753EC3}"= UDP:57487:bearshare

"TCP Query User{960AA96E-FD89-4A54-9865-8E12839BF61E}c:\\program files\\bearshare\\bearshare.exe"= UDP:c:\program files\bearshare\bearshare.exe:BearShare

"UDP Query User{F61213C1-3592-4117-AC39-0E2B244BB330}c:\\program files\\bearshare\\bearshare.exe"= TCP:c:\program files\bearshare\bearshare.exe:BearShare

"{25AE9187-C40C-40DE-8F2D-617C58C2539A}"= UDP:26384:BitComet 26384 TCP

"{AAF49D9C-8A47-4FF3-83E5-A4E800FA5383}"= TCP:26384:BitComet 26384 UDP

"TCP Query User{F7D2CFD3-DAE8-4A4C-A6F6-AFC6EF8F32ED}c:\\program files\\bitcomet\\bitcomet.exe"= UDP:c:\program files\bitcomet\bitcomet.exe:BitComet - a BitTorrent Client

"UDP Query User{D6913133-65A8-4529-B466-58BB1D482B89}c:\\program files\\bitcomet\\bitcomet.exe"= TCP:c:\program files\bitcomet\bitcomet.exe:BitComet - a BitTorrent Client

"{0C8D9895-E5D5-4997-8A90-6C433E12A0F6}"= TCP:6347:bearshare1

"{E525BBF9-8E5E-4718-8210-0F2A280A322D}"= Disabled:UDP:49155:shareaza1

"{454CF4EA-0AF5-4E1B-ABC1-4EFA1D471F3C}"= UDP:c:\program files\DNA\btdna.exe:DNA

"{5BC93113-0EEE-4439-99E0-757B2FA8C2DC}"= TCP:c:\program files\DNA\btdna.exe:DNA

"{D2DDB2E4-C321-43DA-A515-DC122DD61603}"= UDP:c:\program files\BitTorrent\bittorrent.exe:BitTorrent

"{A7812BD5-0490-470E-97B5-E7DFD76E99FE}"= TCP:c:\program files\BitTorrent\bittorrent.exe:BitTorrent

"TCP Query User{36F7F528-96BA-46B7-BFE9-0C28C3776761}c:\\users\\kelow\\program files\\dna\\btdna.exe"= UDP:c:\users\kelow\program files\dna\btdna.exe:btdna.exe

"UDP Query User{0158F188-6ADA-4505-9554-E020A05BDA90}c:\\users\\kelow\\program files\\dna\\btdna.exe"= TCP:c:\users\kelow\program files\dna\btdna.exe:btdna.exe

"{C998C340-34BA-4436-BFD9-3214E67E0521}"= UDP:6885:azureus

"TCP Query User{6CD3A550-3317-4F2D-A281-BA062AE00D31}c:\\program files\\internet explorer\\iexplore.exe"= UDP:c:\program files\internet explorer\iexplore.exe:Internet Explorer

"UDP Query User{8ABEE96C-2D69-483F-86CB-ADA2512C88CF}c:\\program files\\internet explorer\\iexplore.exe"= TCP:c:\program files\internet explorer\iexplore.exe:Internet Explorer

"{2EB75AD1-4935-48CC-8AD9-786D47E69B16}"= UDP:6883:azureus

"TCP Query User{B9B6B949-0488-412C-9D43-B52A7B41B2B6}c:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= Disabled:UDP:c:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza

"UDP Query User{9F7C78C3-475D-41C4-9408-57DD9374144B}c:\\program files\\shareaza applications\\shareaza\\shareaza.exe"= Disabled:TCP:c:\program files\shareaza applications\shareaza\shareaza.exe:Shareaza

"{82DDD077-BE0B-401E-9A15-71A84FD586D6}"= UDP:c:\users\kelow\Desktop\VDownloader.exe:VDownloader

"{E2840104-86A2-4DEF-91A0-8A5D81A1E3E5}"= TCP:c:\users\kelow\Desktop\VDownloader.exe:VDownloader

"TCP Query User{627B8B9B-ED0F-48EA-85BA-CB8659CB0F35}c:\\program files\\nero\\nero 7\\nero showtime\\showtime.exe"= UDP:c:\program files\nero\nero 7\nero showtime\showtime.exe:Nero ShowTime Essentials

"UDP Query User{E16FD3D6-7C99-48E9-BCA9-448CC7AD4428}c:\\program files\\nero\\nero 7\\nero showtime\\showtime.exe"= TCP:c:\program files\nero\nero 7\nero showtime\showtime.exe:Nero ShowTime Essentials

"TCP Query User{A9D71AFD-C9AE-4593-ADDB-E61F35475160}c:\\program files\\ares\\ares.exe"= UDP:c:\program files\ares\ares.exe:Ares p2p for windows

"UDP Query User{49D02A80-50F5-4974-AE8F-B7DDA2500153}c:\\program files\\ares\\ares.exe"= TCP:c:\program files\ares\ares.exe:Ares p2p for windows

"{88BA0F56-AC23-4942-8F20-702D02451C96}"= c:\program files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone)

"TCP Query User{A90CA7E6-A1F6-4221-A641-144947793BA1}c:\\program files\\azureus\\azureus.exe"= UDP:c:\program files\azureus\azureus.exe:Azureus

"UDP Query User{68E0BEA7-B7DB-4DE2-A027-AE95BDC6ED0C}c:\\program files\\azureus\\azureus.exe"= TCP:c:\program files\azureus\azureus.exe:Azureus

"{9C255BE3-B5B0-40C5-AD09-AA2036369ECC}"= UDP:c:\program files\Mozilla Firefox\firefox.exe:Mozilla Firefox

"{01F0A01C-E076-4420-9286-5AE99E3093E8}"= TCP:c:\program files\Mozilla Firefox\firefox.exe:Mozilla Firefox

"TCP Query User{EBDC8018-9E0F-405B-9718-8FF002B3D459}c:\\program files\\mirc\\mirc.exe"= UDP:c:\program files\mirc\mirc.exe:mIRC

"UDP Query User{9E79CA84-F5DF-4C3B-9E90-C3C1E1606A07}c:\\program files\\mirc\\mirc.exe"= TCP:c:\program files\mirc\mirc.exe:mIRC

"TCP Query User{05F04037-A599-48EE-9CD7-E2FFBAB7D617}c:\\program files\\dap\\dap.exe"= UDP:c:\program files\dap\dap.exe:Download Accelerator Plus (DAP)

"UDP Query User{9BB2BB40-3FFA-4C7E-B050-365A75A1CD97}c:\\program files\\dap\\dap.exe"= TCP:c:\program files\dap\dap.exe:Download Accelerator Plus (DAP)

"{D98823A2-EF58-4AE1-8341-B5336364357A}"= UDP:6881:azureus

"TCP Query User{24219510-B782-4DED-8F79-904D0BF8CB2F}c:\\program files\\filezilla ftp client\\filezilla.exe"= UDP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client

"UDP Query User{5301F8B8-5830-4865-A724-9F4E32D55883}c:\\program files\\filezilla ftp client\\filezilla.exe"= TCP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client

"TCP Query User{BEF14530-FB5D-4603-9D7D-70BB00E083BA}c:\\program files\\shareaza\\shareaza.exe"= Disabled:UDP:c:\program files\shareaza\shareaza.exe:Shareaza Ultimate File Sharing

"UDP Query User{47B4991B-714F-43C5-AF7E-9ADA7503A706}c:\\program files\\shareaza\\shareaza.exe"= Disabled:TCP:c:\program files\shareaza\shareaza.exe:Shareaza Ultimate File Sharing

"TCP Query User{15FDD6A4-2FF2-48A1-B323-047E57847FD5}c:\\program files\\azureus\\azureus.exe"= UDP:c:\program files\azureus\azureus.exe:Azureus

"UDP Query User{60B68D20-88FE-45A5-AA8E-81D20D996635}c:\\program files\\azureus\\azureus.exe"= TCP:c:\program files\azureus\azureus.exe:Azureus

"{867290A1-9295-4E98-B09B-006C3B9ED1D7}"= UDP:c:\users\kelow\Desktop\Programas\VDownloader.exe:VDownloader

"{6A0339E7-9160-4578-8F4A-12BCC35B67D4}"= TCP:c:\users\kelow\Desktop\Programas\VDownloader.exe:VDownloader

"TCP Query User{B03C713E-BFAD-4CE4-B659-4ABF5632EFE3}c:\\program files\\filezilla ftp client\\filezilla.exe"= UDP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client

"UDP Query User{5C94D225-2F3C-4D2A-A33E-CFC9987BDA9C}c:\\program files\\filezilla ftp client\\filezilla.exe"= TCP:c:\program files\filezilla ftp client\filezilla.exe:FileZilla FTP Client

"{94DBADC9-26F1-410E-B0EF-EB1D0A798244}"= UDP:c:\program files\DsNET Corp\aTube Catcher 1.0\yct.exe:aTube Catcher

"{912FE133-C6CF-4777-B8D0-504B9F453339}"= TCP:c:\program files\DsNET Corp\aTube Catcher 1.0\yct.exe:aTube Catcher

"{AE65C5E1-C888-4628-B428-80A5BD679073}"= UDP:c:\users\kelow\Desktop\Programas\Vidownloader\VDownloader.exe:VDownloader

"{57D22DF4-544B-4E09-A419-F957045401E7}"= TCP:c:\users\kelow\Desktop\Programas\Vidownloader\VDownloader.exe:VDownloader

"{FD7CE07B-1404-4C89-B744-8216A8E293BB}"= UDP:c:\program files\Malwarebytes' Anti-Malware\mbam.exe:Malwarebytes' Anti-Malware

"{335BE7F0-5331-45E8-98CE-19F2409CF53F}"= TCP:c:\program files\Malwarebytes' Anti-Malware\mbam.exe:Malwarebytes' Anti-Malware

"TCP Query User{A2745A60-9FDD-4F16-B444-725FF8641871}c:\\program files\\mirc\\mirc.exe"= Disabled:UDP:c:\program files\mirc\mirc.exe:mIRC

"UDP Query User{E3A44E4F-BAD8-4FA5-AD38-C5F7CD593019}c:\\program files\\mirc\\mirc.exe"= Disabled:TCP:c:\program files\mirc\mirc.exe:mIRC

"TCP Query User{D486ABFB-F3A8-4DE1-A776-615CAF0F07B4}c:\\mirc\\mirc.exe"= Disabled:UDP:c:\mirc\mirc.exe:mIRC

"UDP Query User{3E0696F4-AEED-4B82-B76F-D6074AACBD84}c:\\mirc\\mirc.exe"= Disabled:TCP:c:\mirc\mirc.exe:mIRC

"TCP Query User{F6DBF0F8-6770-4E55-9565-7411CB329B1D}c:\\users\\kelow\\desktop\\programas\\mirc.exe"= Disabled:UDP:c:\users\kelow\desktop\programas\mirc.exe:mirc.exe

"UDP Query User{0613EB7E-8E00-47F7-8242-FE2EE6C7B17B}c:\\users\\kelow\\desktop\\programas\\mirc.exe"= Disabled:TCP:c:\users\kelow\desktop\programas\mirc.exe:mirc.exe

"{AE2A1E8A-3177-4218-8962-21E91A2D8155}"= UDP:c:\users\kelow\Desktop\dds.scr:dds

"{A849525C-E551-4A99-8B37-9FFFF813F804}"= TCP:c:\users\kelow\Desktop\dds.scr:dds

 

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile\AuthorizedApplications\List]

"c:\\Program Files\\Orbitdownloader\\orbitdm.exe"= c:\program files\Orbitdownloader\orbitdm.exe:*:Enabled:Orbit

"c:\\Program Files\\Orbitdownloader\\orbitnet.exe"= c:\program files\Orbitdownloader\orbitnet.exe:*:Enabled:Orbit

 

R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\DRIVERS\b57nd60x.sys [2006-11-02 167936]

S2 aswMonFlt;aswMonFlt;c:\windows\system32\DRIVERS\aswMonFlt.sys [2009-02-05 51792]

 

 

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]

LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc

.

.

------- Scan Suplementar -------

.

mWindow Title =

IE: &Download all by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/202

IE: &Download by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/201

IE: &Download selected by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/203

IE: &Grab video by Orbit - c:\program files\Orbitdownloader\orbitmxt.dll/204

IE: Download ALL with IDA - c:\program files\IDA\idaieall.htm

IE: Download with IDA - c:\program files\IDA\idaie.htm

TCP: {0E356637-99A1-40B8-AE5E-C9D1A6509C14} = 200.222.25.129,200.222.25.130

FF - ProfilePath - c:\users\kelow\AppData\Roaming\Mozilla\Firefox\Profiles\qkf5eeja.default\

FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=

FF - prefs.js: browser.search.selectedEngine - Crawler Search

FF - prefs.js: browser.startup.homepage -

FF - prefs.js: keyword.URL - hxxp://www.crawler.com/search/dispatcher.aspx?tp=aus&tbid=60076&qkw=

FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll

FF - component: c:\users\kelow\AppData\Roaming\Mozilla\Firefox\Profiles\qkf5eeja.default\extensions\{87F8774F-B485-47E2-A755-A40A8A5E886D}\components\GbMzhCef.dll

 

---- FIREFOX POLICIES ----

c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.allow_platform_file_picker", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.cookie.p3plevel", 1); // 0=low, 1=medium, 2=high, 3=custom

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.enablePad", false); // Allow client to do proxy autodiscovery

c:\program files\Mozilla Firefox\defaults\pref\firefox-l10n.js - pref("browser.fixup.alternate.suffix", ".com.br");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.urlbar.hideGoButton", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.default", "chrome://branding/content/searchconfig.properties");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.search.param.Google.1.custom", "chrome://branding/content/searchconfig.properties");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("signon.prefillForms", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.remoteLookups", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.updateURL", "http://sb.google.com/safebrowsing/update?client={moz:client}&appver={moz:version}&");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.lookupURL", "http://sb.google.com/safebrowsing/lookup?sourceid=firefox-antiphish&features=TrustRank&client={moz:client}&appver={moz:version}&");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.safebrowsing.provider.0.reportURL", "http://sb.google.com/safebrowsing/report?");

.

 

**************************************************************************

 

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-04-28 19:50

Windows 6.0.6001 Service Pack 1 NTFS

 

Procurando processos ocultos ...

 

Procurando entradas auto inicializáveis ocultas ...

 

Procurando ficheiros/arquivos ocultos ...

 

Varredura completada com sucesso

arquivos/ficheiros ocultos: 0

 

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

 

[HKEY_USERS\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

"MSCurrentCountry"=dword:00000016

 

[HKEY_USERS\SYSTEM\ControlSet002\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

"MSCurrentCountry"=dword:00000016

 

[HKEY_USERS\SYSTEM\ControlSet003\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

"MSCurrentCountry"=dword:00000016

.

Tempo para conclusão: 2009-04-28 19:55

ComboFix-quarantined-files.txt 2009-04-28 22:55

ComboFix2.txt 2009-04-27 21:32

 

Pré-execução: 37.870.927.872 bytes disponíveis

Pós execução: 37.782.134.784 bytes disponíveis

 

240 --- E O F --- 2009-04-27 19:58

 

____________________________________________________

 

resultado do HijackThis

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 20:03:55, on 28/04/2009

Platform: Windows Vista SP1 (WinNT 6.00.1905)

MSIE: Internet Explorer v7.00 (7.00.6001.18226)

Boot mode: Normal

 

Running processes:

C:\Windows\system32\taskeng.exe

C:\Windows\system32\Dwm.exe

C:\Windows\Explorer.EXE

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Windows\system32\SearchFilterHost.exe

C:\HijackThis\HiJackThis.exe

 

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

R3 - URLSearchHook: CUOLSearchHook Object - {1FE8243E-0A3A-41B9-B9CE-EFFEE51974D3} - C:\PROGRA~1\COMMON~1\uol\URLSEA~1\UOLSEA~1.DLL

O1 - Hosts: ::1 localhost

O8 - Extra context menu item: &Download all by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/202

O8 - Extra context menu item: &Download by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/201

O8 - Extra context menu item: &Download selected by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/203

O8 - Extra context menu item: &Grab video by Orbit - res://C:\Program Files\Orbitdownloader\orbitmxt.dll/204

O8 - Extra context menu item: Download ALL with IDA - C:\Program Files\IDA\idaieall.htm

O8 - Extra context menu item: Download with IDA - C:\Program Files\IDA\idaie.htm

O9 - Extra button: Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe

O9 - Extra 'Tools' menuitem: &Internet Download Accelerator - {9819CC0E-9669-4D01-9CD7-2C66DA43AC6C} - C:\Program Files\IDA\ida.exe

O9 - Extra button: (no name) - cmdmapping - (no file) (HKCU)

O13 - Gopher Prefix:

O16 - DPF: {56762DEC-6B0D-4AB4-A8AD-989993B5D08B} (OnlineScanner Control) - http://www.eset.eu/buxus/docs/OnlineScanner.cab

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flas...ent/swflash.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{0E356637-99A1-40B8-AE5E-C9D1A6509C14}: NameServer = 200.222.25.129,200.222.25.130

O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe

O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe

O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe

O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe

 

--

End of file - 2899 bytes

Compartilhar este post


Link para o post
Compartilhar em outros sites

Bom Dia! maya2

 

Oi DigRam ñ consegui usar o kaspersky estou tentando amanhã eu tento outra vez aqui esta o resultado do

ComboFix.txt , beijos:

<!> Tudo bem,estarei aguardando. Mas...houve alguma melhora,em sua conecção?

 

Abraços!

Compartilhar este post


Link para o post
Compartilhar em outros sites

Oi DigRam desculpa a demora é que fiquei sem internet deu problema no provedor e o pc ficou malucão tive que formatar e chamar o rapaz para instalar a net outra vez, valeu pela ajuda desculpa aí qualquer coisa e quando eu tiver alguma duvida posti aqui outra vez abraço e beijossssss

Compartilhar este post


Link para o post
Compartilhar em outros sites

PROBLEMA RESOLVIDO!

 

Caso o autor necessite que o tópico seja reaberto basta enviar uma Mensagem Privada para um Moderador com um link para o tópico.

Compartilhar este post


Link para o post
Compartilhar em outros sites

×

Informação importante

Ao usar o fórum, você concorda com nossos Termos e condições.