Inactive 100 percent cpu usage !

Status
Not open for further replies.
I have the following configuration for my dell inspiron I1520 laptop-pc
Processor : Intel(R) Core(TM)2 Duo CPU T7250 @ 2.00GHz 2.00 GHz
3 GB RAM, 32 Bit operating system, WIndows Vista Home Premium.

Its now 2 months that I am suffering heavily due to this problem of 100pc cpu usage and heavily low performance speed of working
. I have tried killing svchost or other processes that show high percentages in 'processes' in 'task manager'. But to no avail. I was using avast antivirus software, then I have scanned my computer using all recommended anti-spywares/virus/fixes like malwarebytes, superantispyware, windows malicious software tool, emergency response tool to get rid of heavy troubles. Few of them detected viruses, spywares. I thought I was relieved. But NO.
I have even done defragmention, run Ccleaner and all possible minor tweaks known.
In some cases my computer showed signs of improvement by giving less CPU usage. But when I restarted my computer back, after around 10-15 minutes of usage computer is back to its 100 percentage.
Further I have not been finding any malicious softwares in any anti-malicious runners.

Finally I have now tried running Combofix (using the recommended procedures likeremoving my antivirus, etc,) it has again quaratinined some files. I am attaching my COMBOFIX LOG here for reference and analysis. Please Help.

Also, there is this - system volume information and recyler etc - which are visible folders in my all drives (C D etc ). I know these are just system folders which are generally hidden. But it occurs to me that there might be relation to its sudden visibilty in my pc, in each drive, when I never un-hid them.

Also I have uninstalled dell support centre seeing that PC doctor files in Combofix log for myself.


Please Please Help fellow geniuses... I am the first time user on this forum ...

Thanks !!









Here is my Combo fix log : ( I have also attached the word file)

ComboFix 11-09-03.01 - mohit 03-09-2011 23:57:21.1.2 - x86 NETWORK
Running from: c:\users\mohit\Desktop\ComboFixfinal.exe
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\programdata\PCDr\5830\Downloads\07439fd5-7039-4014-b635-5bf088a1465b.dll
c:\programdata\PCDr\5830\Downloads\5dc4b59a-1f5d-427b-9110-b820c717226b.dll
c:\programdata\PCDr\5830\Downloads\8a6735b1-c078-4648-9416-b6bb29ec3dc1.dll
c:\programdata\PCDr\5830\Downloads\9f8591c3-5048-42f7-9553-387b30449f54.dll
c:\windows\system32\2d2ca2ce-704a-428c-8cbe-0736b29190aa.dll
.
.
((((((((((((((((((((((((( Files Created from 2011-08-03 to 2011-09-03 )))))))))))))))))))))))))))))))
.
.
2011-09-03 18:40 . 2011-09-03 18:42 -------- d-----w- c:\users\mohit\AppData\Local\temp
2011-09-03 18:40 . 2011-09-03 18:40 -------- d-----w- c:\users\Default\AppData\Local\temp
2011-08-25 17:40 . 2011-08-12 02:44 7152464 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{10366969-F9B9-4457-8917-CD267B907AE4}\mpengine.dll
2011-08-21 15:24 . 2008-01-02 03:44 1601536 ----a-w- c:\windows\system32\stlang.dll
2011-08-21 15:24 . 2008-01-02 03:44 4947968 ----a-w- c:\windows\system32\stacgui.cpl
2011-08-21 15:24 . 2008-01-02 03:44 102400 ----a-w- c:\windows\system32\stacsv.exe
2011-08-21 15:24 . 2008-01-02 03:44 647168 ----a-w- c:\windows\system32\aestecap.dll
2011-08-21 15:24 . 2008-01-02 03:44 131072 ----a-w- c:\windows\system32\aestacap.dll
2011-08-21 11:51 . 2011-08-21 11:51 -------- d-----w- c:\users\mohit\AppData\Roaming\MathematicaPlayer
2011-08-21 11:51 . 2011-08-21 11:51 -------- d-----w- c:\users\mohit\AppData\Local\MathematicaPlayer
2011-08-21 08:18 . 2011-08-21 08:18 -------- d-----w- c:\users\mohit\AppData\Roaming\Malwarebytes
2011-08-21 08:17 . 2011-08-21 08:17 -------- d-----w- c:\programdata\Malwarebytes
2011-08-10 20:12 . 2011-06-17 16:03 375808 ----a-w- c:\windows\system32\winsrv.dll
2011-08-10 20:11 . 2011-07-06 15:31 214016 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2011-08-10 20:11 . 2011-06-06 10:59 2409784 ----a-w- c:\program files\Windows Mail\OESpamFilter.dat
2011-08-10 20:10 . 2011-06-20 08:54 3602832 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-08-10 20:10 . 2011-06-20 08:54 3550096 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-08-10 20:10 . 2011-06-17 20:13 905104 ----a-w- c:\windows\system32\drivers\tcpip.sys
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-07-30 18:30 . 2011-07-30 18:30 161792 ----a-w- c:\windows\system32\msls31.dll
2011-07-30 18:30 . 2011-07-30 18:30 86528 ----a-w- c:\windows\system32\iesysprep.dll
2011-07-30 18:30 . 2011-07-30 18:30 76800 ----a-w- c:\windows\system32\SetIEInstalledDate.exe
2011-07-30 18:30 . 2011-07-30 18:30 74752 ----a-w- c:\windows\system32\RegisterIEPKEYs.exe
2011-07-30 18:30 . 2011-07-30 18:30 63488 ----a-w- c:\windows\system32\tdc.ocx
2011-07-30 18:30 . 2011-07-30 18:30 48640 ----a-w- c:\windows\system32\mshtmler.dll
2011-07-30 18:30 . 2011-07-30 18:30 367104 ----a-w- c:\windows\system32\html.iec
2011-07-30 18:30 . 2011-07-30 18:30 74752 ----a-w- c:\windows\system32\iesetup.dll
2011-07-30 18:30 . 2011-07-30 18:30 420864 ----a-w- c:\windows\system32\vbscript.dll
2011-07-30 18:30 . 2011-07-30 18:30 23552 ----a-w- c:\windows\system32\licmgr10.dll
2011-07-30 18:30 . 2011-07-30 18:30 152064 ----a-w- c:\windows\system32\wextract.exe
2011-07-30 18:30 . 2011-07-30 18:30 150528 ----a-w- c:\windows\system32\iexpress.exe
2011-07-30 18:30 . 2011-07-30 18:30 142848 ----a-w- c:\windows\system32\ieUnatt.exe
2011-07-30 18:30 . 2011-07-30 18:30 1427456 ----a-w- c:\windows\system32\inetcpl.cpl
2011-07-30 18:30 . 2011-07-30 18:30 35840 ----a-w- c:\windows\system32\imgutil.dll
2011-07-30 18:30 . 2011-07-30 18:30 11776 ----a-w- c:\windows\system32\mshta.exe
2011-07-30 18:30 . 2011-07-30 18:30 110592 ----a-w- c:\windows\system32\IEAdvpack.dll
2011-07-30 18:30 . 2011-07-30 18:30 101888 ----a-w- c:\windows\system32\admparse.dll
2011-07-30 15:16 . 2011-07-30 15:16 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IDMan"="c:\program files\Internet Download Manager\IDMan.exe" [2007-10-01 840704]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Bluetooth.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Bluetooth.lnk
backup=c:\windows\pss\Bluetooth.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Digital Line Detect.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Digital Line Detect.lnk
backup=c:\windows\pss\Digital Line Detect.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^QuickSet.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\QuickSet.lnk
backup=c:\windows\pss\QuickSet.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NokiaMServer]
c:\program files\Common Files\Nokia\MPlatform\NokiaMServer [X]
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-10-14 19:34 39792 ----a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DELL Webcam Manager]
2007-07-27 08:43 118784 ------w- c:\program files\Dell\Dell Webcam Manager\DellWMgr.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ehTray.exe]
2008-01-19 07:33 125952 ----a-w- c:\windows\ehome\ehtray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\GrooveMonitor]
2008-10-25 06:14 31072 ----a-w- c:\program files\Microsoft Office\Office12\GrooveMonitor.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IDMan]
2007-10-01 16:15 840704 ----a-w- c:\program files\Internet Download Manager\IDMan.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Messenger (Yahoo!)]
2011-06-16 02:25 6276408 ----a-w- c:\progra~1\Yahoo!\MESSEN~1\YahooMessenger.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NokiaMusic FastStart]
2009-07-22 13:46 2331936 ----a-w- c:\program files\Nokia\Nokia Music\NokiaMusic.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
2007-10-04 15:54 8497696 ----a-w- c:\windows\System32\nvcpl.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NVHotkey]
2007-10-04 15:54 86016 ----a-w- c:\windows\System32\nvhotkey.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvMediaCenter]
2007-10-04 15:54 81920 ----a-w- c:\windows\System32\nvmctray.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvSvc]
2007-10-04 15:54 86016 ----a-w- c:\windows\System32\nvsvc.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\OEM02Mon.exe]
2007-12-03 05:58 36864 ----a-w- c:\windows\OEM02Mon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PCMService]
2007-12-21 02:58 184320 ------w- c:\program files\Dell\MediaDirect\PCMService.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Sidebar]
2009-04-11 06:28 1233920 ----a-w- c:\program files\Windows Sidebar\sidebar.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SigmatelSysTrayApp]
2008-01-02 03:44 405504 ----a-w- c:\program files\Sigmatel\C-Major Audio\WDM\sttray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SynTPEnh]
2007-04-28 00:35 857648 ----a-w- c:\program files\Synaptics\SynTP\SynTPEnh.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
.
R2 AESTFilters;Andrea ST Filters Service;c:\windows\system32\aestsrv.exe [2008-01-02 73728]
R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R2 gupdate1c9c0f79ce72960;Google Update Service (gupdate1c9c0f79ce72960);c:\program files\Google\Update\GoogleUpdate.exe [2009-04-19 133104]
R3 AuthWrapperSvc;AuthWrapperSvc;c:\program files\AspenTech\BPE\AuthWrapperSvc.exe [2001-02-16 73728]
R3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [2009-04-19 133104]
R3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [x]
R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504]
R3 zteusbser;ZTE USB Device for Legacy Serial Communication;c:\windows\system32\DRIVERS\ZTEUsbser.sys [2007-02-06 97920]
S0 hotcore3;hotcore3;c:\windows\system32\drivers\hotcore3.sys [2008-01-21 39472]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
bthsvcs REG_MULTI_SZ BthServ
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder
.
2011-08-25 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-04-19 14:03]
.
2011-08-25 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-04-19 14:03]
.
2011-08-21 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-317404959-1384834494-2645296150-1000.job
- c:\users\mohit\AppData\Local\Google\Update\GoogleUpdate.exe [2008-11-13 16:17]
.
2011-08-19 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-317404959-1384834494-2645296150-1000Core.job
- c:\users\mohit\AppData\Local\Google\Update\GoogleUpdate.exe [2008-11-13 16:17]
.
2011-08-25 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-317404959-1384834494-2645296150-1000UA.job
- c:\users\mohit\AppData\Local\Google\Update\GoogleUpdate.exe [2008-11-13 16:17]
.
2011-08-17 c:\windows\Tasks\PCDoctorBackgroundMonitorTask-Delay.job
- c:\program files\Dell Support Center\uaclauncher.exe [2011-05-16 22:16]
.
2011-08-17 c:\windows\Tasks\PCDoctorBackgroundMonitorTask.job
- c:\program files\Dell Support Center\uaclauncher.exe [2011-05-16 22:16]
.
2011-08-25 c:\windows\Tasks\SystemToolsDailyTest.job
- c:\program files\Dell Support Center\uaclauncher.exe [2011-05-16 22:16]
.
2010-12-16 c:\windows\Tasks\User_Feed_Synchronization-{A781208A-21F9-4670-A572-F909AF3DB299}.job
- c:\windows\system32\msfeedssync.exe [2011-07-30 18:30]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www1.ap.dell.com/content/default.aspx?c=in&l=en&s=gen
mStart Page = hxxp://www.yahoo.com/
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr9/*http://www.yahoo.com/ext/search/search.html
uInternet Settings,ProxyOverride = *.local
IE: &Download with &DAP - c:\program files\DAP\dapextie.htm
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Download &all with DAP - c:\program files\DAP\dapextie2.htm
IE: Download all links with IDM - c:\program files\Internet Download Manager\IEGetAll.htm
IE: Download FLV video content with IDM - c:\program files\Internet Download Manager\IEGetVL.htm
IE: Download with IDM - c:\program files\Internet Download Manager\IEExt.htm
Trusted Zone: internet
Trusted Zone: mcafee.com
TCP: DhcpNameServer = 192.168.1.1
Name-Space Handler: ftp\ZDA - {5BFA1DAF-5EDC-11D2-959E-00C00C02DA5E} - c:\progra~1\DAP\dapie.dll
Name-Space Handler: http\ZDA - {5BFA1DAF-5EDC-11D2-959E-00C00C02DA5E} - c:\progra~1\DAP\dapie.dll
.
- - - - ORPHANS REMOVED - - - -
.
BHO-{0579B4B1-0293-4d73-B02D-5EBB0BA0F0A2} - (no file)
MSConfigStartUp-Malwarebytes' Anti-Malware (reboot) - c:\program files\Malwarebytes' Anti-Malware\mbam.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-04 00:12
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-317404959-1384834494-2645296150-1000_Classes\CLSID\{153880e9-0431-43ab-8579-12d015d28489}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"Model"=dword:00000140
"Therad"=dword:0000001c
"MData"=hex(0):2b,8f,78,29,5a,0c,ce,ec,48,d4,68,e5,9f,6a,96,3e,ab,de,c5,81,26,
38,95,44,85,b1,12,f9,90,dd,23,a1,ff,b8,56,66,fb,f6,67,37,35,74,4a,cb,b3,6d,\
.
[HKEY_USERS\S-1-5-21-317404959-1384834494-2645296150-1000_Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"scansk"=hex(0):0c,7a,ed,c1,ed,df,19,6f,4e,c5,23,83,08,52,59,13,9c,78,c2,e9,2a,
c5,bf,9c,56,50,a8,c5,41,31,2e,ef,e6,10,f6,c8,aa,a4,89,8a,00,00,00,00,00,00,\
.
[HKEY_USERS\S-1-5-21-317404959-1384834494-2645296150-1000_Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC}]
@Denied: (Full) (Everyone)
"scansk"=hex(0):1c,81,6e,66,f1,f8,11,96,1e,c4,0b,24,a4,57,7d,f9,1e,d4,73,b2,6b,
64,80,d7,ae,43,ab,c5,a9,ff,62,bd,ae,9e,49,6f,8e,13,13,22,00,00,00,00,00,00,\
.
[HKEY_USERS\S-1-5-21-317404959-1384834494-2645296150-1000_Classes\CLSID\{b10d7bf4-b73a-4c44-928c-ad0951132238}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"Model"=dword:00000103
"Therad"=dword:0000001e
"MData"=hex(0):2b,8f,78,29,5a,0c,ce,ec,48,d4,68,e5,9f,6a,96,3e,ab,de,c5,81,26,
38,95,44,85,b1,12,f9,90,dd,23,a1,e8,78,58,ba,a6,a6,06,88,8a,66,bf,53,cd,a6,\
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:00000053
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0004\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0005\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0006\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0007\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0008\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0009\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0010\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0011\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2011-09-04 00:17:36
ComboFix-quarantined-files.txt 2011-09-03 18:47
.
Pre-Run: 16,052,527,104 bytes free
Post-Run: 15,998,169,088 bytes free
.
- - End Of File - - 355E86C91BF26142BFDBC4F0AE90AAC3
 

Attachments

  • ComboFix.txt
    17.1 KB · Views: 0
Welcome aboard
yahooo.gif


Please, observe following rules:
  • Read all of my instructions very carefully. Your mistakes during cleaning process may have very serious consequences, like unbootable computer.
  • If you're stuck, or you're not sure about certain step, always ask before doing anything else.
  • Please refrain from running tools or applying updates other than those I suggest.
  • Never run more than one scan at a time.
  • Keep updating me regarding your computer behavior, good, or bad.
  • The cleaning process, once started, has to be completed. Even if your computer appears to act better, it may still be infected. Once the computer is totally clean, I'll certainly let you know.
  • If you leave the topic without explanation in the middle of a cleaning process, you may not be eligible to receive any more help in malware removal forum.
  • I close my topics if you have not replied in 5 days. If you need more time, simply let me know. If I closed your topic and you need it to be reopened, simply PM me.

=================================================================

Never run Combofix on your own!

Please, complete all steps listed here: https://www.techspot.com/community/...lware-removal-preliminary-instructions.58138/
Make sure, you PASTE all logs. If some log exceeds 50,000 characters post limit, split it between couple of replies.
Attached logs won't be reviewed.
 
thanks

I will follow the steps mentioned.... and then will soon get back with log and performance detail...

thanks for the cooperation...
 
Status
Not open for further replies.
Back