|
Here it is. Please follow the instructions CAREFULLY. QUOTE PLEASE TAKE NOTE THAT THIS FIX IS ONLY INTENDED FOR THIS COMPUTER. DOING SO WILL ONLY DO MORE DAMAGE THAN GOOD. I SHALL TAKE NO RESPONSIBILITY FOR ANY DATA LOST WHATSOEVER THAT MAY OCCUR. THANKS Follow these steps to display hidden files and folders. - Open Folder Options by clicking the Start button
, clicking Control Panel, clicking Appearance and Personalization, and then clicking Folder Options. - Click the View tab.
- Under Advanced settings, click Show hidden files and folders
- Click OK. (Remember to Hide files and folders once done)
Please go to one of the below sites to scan the following files: Virus Total (Recommended)jotti.orgVirScanclick on Browse, and upload the following file for analysis: C:\Windows\geoiplist.rar C:\Windows\unrar.exe C:\Windows\loader2.exe_okThen click Submit. Allow the file to be scanned, and then please copy and paste the results link(for Virus Total) here for me to see. If it says already scanned -- click "reanalyze now" Please post the results in your next reply. ===================================================Run OTL.exe- Copy/paste the following text written inside of the code box into the Custom Scans/Fixes box located at the bottom of OTL
CODE :OTL DRV:64bit: - [2009-05-14 15:49:56 | 000,121,152 | ---- | M] (ESET) [Kernel | Auto | Running] -- C:\Windows\SysNative\drivers\epfwwfpr.sys -- (epfwwfpr) DRV:64bit: - [2009-05-14 15:47:16 | 000,134,024 | ---- | M] (ESET) [Kernel | System | Running] -- C:\Windows\SysNative\drivers\ehdrv.sys -- (ehdrv) DRV:64bit: - [2009-05-14 15:41:14 | 000,142,776 | ---- | M] (ESET) [File_System | Auto | Running] -- C:\Windows\SysNative\drivers\eamon.sys -- (eamon) O3:64bit: - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found. O3 - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found. O4 - HKLM..\Run: [tray_ico] File not found O4 - HKLM..\Run: [tray_ico2] File not found O4 - HKLM..\Run: [tray_ico3] File not found O4 - HKLM..\Run: [tray_ico4] File not found O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_20) O16 - DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_20) O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_20) O33 - MountPoints2\{2ac6b661-90be-11df-854c-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{2ac6b661-90be-11df-854c-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{2ac6b670-90be-11df-854c-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{2ac6b670-90be-11df-854c-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{2ac6b68a-90be-11df-854c-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{2ac6b68a-90be-11df-854c-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{44cbd2a8-b1ff-11e0-bd46-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{44cbd2a8-b1ff-11e0-bd46-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{44cbd2c5-b1ff-11e0-bd46-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{44cbd2c5-b1ff-11e0-bd46-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{5b11be41-f4ef-11de-9468-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{5b11be41-f4ef-11de-9468-002622788aa7}\Shell\AutoRun\command - "" = F:\setup_vmc_lite.exe /checkApplicationPresence O33 - MountPoints2\{5b11be4d-f4ef-11de-9468-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{5b11be4d-f4ef-11de-9468-002622788aa7}\Shell\AutoRun\command - "" = F:\setup_vmc_lite.exe /checkApplicationPresence O33 - MountPoints2\{5b11be4f-f4ef-11de-9468-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{5b11be4f-f4ef-11de-9468-002622788aa7}\Shell\AutoRun\command - "" = F:\setup_vmc_lite.exe /checkApplicationPresence O33 - MountPoints2\{6ed98391-7b9f-11e0-b47b-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{6ed98391-7b9f-11e0-b47b-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{6ed98394-7b9f-11e0-b47b-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{6ed98394-7b9f-11e0-b47b-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{8024f3f7-099c-11e0-9c3d-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{8024f3f7-099c-11e0-9c3d-002622788aa7}\Shell\AutoRun\command - "" = G:\LaunchU3.exe -a O33 - MountPoints2\{93e00a3e-d231-11df-be5b-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{93e00a3e-d231-11df-be5b-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{98f3b5db-4a37-11e0-b3ba-001e101f7f74}\Shell - "" = AutoRun O33 - MountPoints2\{98f3b5db-4a37-11e0-b3ba-001e101f7f74}\Shell\AutoRun\command - "" = H:\LaunchU3.exe -a O33 - MountPoints2\{a6c79fc6-a477-11df-bed5-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{a6c79fc6-a477-11df-bed5-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{c667bd71-6001-11e0-b312-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{c667bd71-6001-11e0-b312-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{d0c02023-bffc-11df-9b86-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{d0c02023-bffc-11df-9b86-002622788aa7}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{fe5ab63d-b5b2-11df-9aa5-002622788aa7}\Shell - "" = AutoRun O33 - MountPoints2\{fe5ab63d-b5b2-11df-9aa5-002622788aa7}\Shell\AutoRun\command - "" = G:\AutoRun.exe O33 - MountPoints2\{fe5ab654-b5b2-11df-9aa5-001e101f1838}\Shell - "" = AutoRun O33 - MountPoints2\{fe5ab654-b5b2-11df-9aa5-001e101f1838}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\{fe5ab693-b5b2-11df-9aa5-001e101f1838}\Shell - "" = AutoRun O33 - MountPoints2\{fe5ab693-b5b2-11df-9aa5-001e101f1838}\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\F\Shell - "" = AutoRun O33 - MountPoints2\F\Shell\AutoRun\command - "" = F:\AutoRun.exe -- [2009-08-24 02:42:34 | 000,143,360 | R--- | M] (Huawei Technologies Co., Ltd.) O33 - MountPoints2\G\Shell - "" = AutoRun O33 - MountPoints2\G\Shell\AutoRun\command - "" = G:\AutoRun.exe [2011-07-11 09:40:19 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{60619A2F-D25F-4E17-99CC-21291F48D4E6} [2011-07-09 22:41:50 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{E61D9E84-8E6E-4FDC-9CB4-2EA3490B86A5} [2011-07-08 22:07:42 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{84CC0FAD-C599-4AF1-B0AA-945FF8471D0E} [2011-07-08 09:40:29 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{7899900F-67C7-481B-9BB8-FCEAB6F0DCCA} [2011-07-07 07:30:35 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{970E717B-29E0-430E-9CF1-0606FC755402} [2011-07-06 08:21:48 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{E6CC7D60-3297-413B-986E-F321729B9F66} [2011-07-04 21:49:19 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{C331D310-3A09-4D5A-869A-B1EEF98C8791} [2011-07-03 21:37:10 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{60C5A4CE-2D59-4BC9-B9CE-24F2383DD33C} [2011-07-03 19:55:48 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{E42823CD-E578-48AF-B742-D92E866C0F4D} [2011-07-02 23:29:32 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{B20C60C1-C44A-49FD-98B7-718C104870DF} [2011-07-02 22:38:41 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{C907D749-08D1-4059-A2F9-C700E4905C08} [2011-07-01 18:10:29 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{D714009D-2EFD-4FD3-92AF-78CBE03F8FE3} [2011-07-01 08:30:21 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{B55F37DD-9B9D-4337-A77C-0B6152726A0C} [2011-06-30 19:33:42 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{488EAF2D-8B20-4FB7-BDD3-02DFDC2CF313} [2011-06-30 16:41:59 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{E1382485-ADDE-4704-B911-F99034642C38} [2011-06-30 11:25:26 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{0EEF99B5-DEF5-45D3-BAD6-9DD5BD1B06EE} [2011-06-30 11:18:47 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{9B9527A6-984F-46CA-A8E5-E4E7B8297887} [2011-06-30 09:37:41 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{B51ABEC6-A2B5-4985-AD40-55A98B512F9E} [2011-06-28 22:08:49 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{D264CA36-81B0-47CA-B8C1-74F54BC6CB7E} [2011-06-28 09:41:25 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{37963DE1-53B6-44E0-A9AD-64C9D0FDDCB9} [2011-06-27 22:23:40 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{7A938D57-EBE7-4E42-B6F0-C2521A069DBA} [2011-06-24 20:00:09 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{39A00FE4-2BED-40F5-B5C4-9C7DCC512951} [2011-06-24 11:40:26 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{F3DDB496-92B2-42D5-9972-86C913816979} [2011-06-23 21:30:22 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{75DDD531-093F-4EB7-A106-D6C00E0EB6FC} [2011-06-22 21:50:30 | 000,000,000 | ---D | C] -- C:\Users\user\AppData\Local\{2C2D1D52-AFFD-4751-A5CB-CDDF02F615DC}
:Reg [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] "C:\Windows\update.1\svchost.exe" =- "C:\Windows\services32.exe" =- "C:\Windows\update.tray-8-0-lnk\svchost.exe" =- "C:\Windows\update.tray-8-0\svchost.exe" =- "C:\Windows\update.tray-2-0-lnk\svchost.exe" =- "C:\Windows\update.tray-2-0\svchost.exe" =- "C:\Windows\update.2\svchost.exe" =- "C:\Windows\update.1\svchost.exe" =- "C:\Windows\services32.exe" =- "C:\Windows\update.tray-8-0-lnk\svchost.exe" =- "C:\Windows\update.tray-8-0\svchost.exe" =- "C:\Windows\update.tray-2-0-lnk\svchost.exe" =- "C:\Windows\update.tray-2-0\svchost.exe" =- "C:\Windows\update.2\svchost.exe" =-
:Files C:\Windows\update.1 C:\Windows\update.2 C:\Windows\services32.exe C:\Windows\update.tray-8-0-lnk C:\Windows\update.tray-8-0 C:\Windows\update.tray-2-0-lnk C:\Windows\update.tray-2-0
:Commands [EMPTYFLASH] [EMPTYTEMP] [RESETHOSTS] [CLEARALLRESTOREPOINTS]
- Then click the Run Fix button at the top
- Let the program run unhindered, reboot when it is done
- Then post Fix OTL log as well as a new OTL log by rerunning it after reboot without custom scans script and( don't check the boxes beside LOP Check or Purity this time )
===================================================On your next reply please post :File scanner log Fix OTL log Fresh OTL log
Let me know if you have any problems in performing with the steps above or any questions you may have. This post has been edited by BlueWind: Jul 23 2011, 11:32 AM
|