TechSpot

Renamed: search redirect

By jgrewal
Jul 4, 2011
  1. Hi, I am having a similar problem to many people on this forum where my google search results get redirected. I followed the 7-step malware removal guide and ran all the programs as listed. Here are the files asked for. Please help. Thanks!

    mbam log:

    Malwarebytes' Anti-Malware 1.51.0.1200
    www.malwarebytes.org

    Database version: 7015

    Windows 5.1.2600 Service Pack 3
    Internet Explorer 6.0.2900.5512

    7/3/2011 10:42:26 PM
    mbam-log-2011-07-03 (22-42-26).txt

    Scan type: Quick scan
    Objects scanned: 152059
    Time elapsed: 13 minute(s), 7 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 1
    Registry Keys Infected: 5
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 6

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    c:\WINDOWS\system32\antiwpa.dll (PUP.Wpakill) -> Delete on reboot.

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Antiwpa (PUP.Wpakill) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\NtWqIVLZEWZU (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\R4B1ZAOPF5 (Trojan.FakeAlert.SA) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\W1WIWQ1NPG (Trojan.FakeAlert.SA) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\ (Hijack.Zones) -> Quarantined and deleted successfully.

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    c:\WINDOWS\system32\antiwpa.dll (PUP.Wpakill) -> Delete on reboot.
    c:\RECYCLER\s-1-5-21-1993962763-1935655697-1177238915-1004\Dc5.exe (Adware.Hotbar) -> Quarantined and deleted successfully.
    c:\WINDOWS\system32\antiwpa.dll48019 (PUP.Wpakill) -> Quarantined and deleted successfully.
    c:\documents and settings\narinderisking!\local settings\Temp\Jch.exe (Trojan.FraudPack) -> Quarantined and deleted successfully.
    c:\documents and settings\narinderisking!\local settings\Temp\Jck.exe (Trojan.FraudPack) -> Quarantined and deleted successfully.
    c:\documents and settings\narinderisking!\local settings\Temp\removewga.exe (PUP.RemoveWGA) -> Quarantined and deleted successfully.

    attach:
    .
    UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
    IF REQUESTED, ZIP IT UP & ATTACH IT
    .
    DDS (Ver_2011-06-23.01)
    .
    Microsoft Windows XP Home Edition
    Boot Device: \Device\HarddiskVolume1
    Install Date: 5/7/2005 11:24:05 AM
    System Uptime: 7/3/2011 11:05:39 PM (0 hours ago)
    .
    Motherboard: TOSHIBA | | ECU00
    Processor: Intel(R) Pentium(R) M processor 1.73GHz | U1 | 1728/mhz
    .
    ==== Disk Partitions =========================
    .
    C: is FIXED (NTFS) - 93 GiB total, 41.761 GiB free.
    D: is CDROM ()
    .
    ==== Disabled Device Manager Items =============
    .
    Class GUID: {4D36E97E-E325-11CE-BFC1-08002BE10318}
    Description: Ethernet Controller
    Device ID: PCI\VEN_11AB&DEV_4351&SUBSYS_FF001179&REV_10\4&111A1FD8&0&00E0
    Manufacturer:
    Name: Ethernet Controller
    PNP Device ID: PCI\VEN_11AB&DEV_4351&SUBSYS_FF001179&REV_10\4&111A1FD8&0&00E0
    Service:
    .
    ==== System Restore Points ===================
    .
    RP1: 6/29/2011 1:03:00 PM - System Checkpoint
    RP2: 7/1/2011 2:29:53 PM - System Checkpoint
    .
    ==== Installed Programs ======================
    .
    ĀµTorrent
    Adobe AIR
    Adobe Flash Player 10 Plugin
    Adobe Reader X (10.0.1)
    ALPS Touch Pad Driver
    Atheros Client Utility
    Atheros Wireless LAN MiniPCI card Driver
    BearShare
    DVD-RAM Driver
    Image Resizer Powertoy for Windows XP
    Intel(R) Graphics Media Accelerator Driver
    Java Auto Updater
    Java(TM) 6 Update 22
    LiveUpdate 3.3 (Symantec Corporation)
    Magical Jelly Bean KeyFinder
    Malwarebytes' Anti-Malware version 1.51.0.1200
    McAfee Security Scan Plus
    Microsoft Office Professional Edition 2003
    Mozilla Firefox (3.6.18)
    PageRage 1.10.01
    Realtek AC'97 Audio
    SD Secure Module
    SMSC IrCC V5.1.3600.5 SP2
    Spyware Doctor 5.5
    Symantec Endpoint Protection
    System Requirements Lab for Intel
    Texas Instruments PCIxx21/x515 drivers.
    TIxx21/x515
    TOSHIBA Hotkey Utility
    TOSHIBA Power Saver Driver
    TOSHIBA SD Memory Card Format
    TOSHIBA Software Modem
    TouchPad On/Off Utility
    Utility Common Driver
    VLC media player 1.1.6
    WebFldrs XP
    WinRAR 4.00 beta 5 (32-bit)
    .
    ==== Event Viewer Messages From Past Week ========
    .
    7/3/2011 11:14:07 PM, error: Service Control Manager [7034] - The PC Tools Security Service service terminated unexpectedly. It has done this 1 time(s).
    7/3/2011 10:55:02 PM, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: AFD eeCtrl Fips intelppm IPSec MRxSmb NetBIOS NetBT RasAcd Rdbss SPBBCDrv SRTSP SRTSPX SrvcEKIOMngr SrvcSSIOMngr SYMTDI Tcpip TPwSav WPS
    7/3/2011 10:55:02 PM, error: Service Control Manager [7001] - The TCP/IP NetBIOS Helper service depends on the AFD service which failed to start because of the following error: A device attached to the system is not functioning.
    7/3/2011 10:55:02 PM, error: Service Control Manager [7001] - The IPSEC Services service depends on the IPSEC driver service which failed to start because of the following error: A device attached to the system is not functioning.
    7/3/2011 10:55:02 PM, error: Service Control Manager [7001] - The DNS Client service depends on the TCP/IP Protocol Driver service which failed to start because of the following error: A device attached to the system is not functioning.
    7/3/2011 10:55:02 PM, error: Service Control Manager [7001] - The DHCP Client service depends on the NetBios over Tcpip service which failed to start because of the following error: A device attached to the system is not functioning.
    7/3/2011 10:54:56 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service netman with arguments "" in order to run the server: {BA126AE5-2166-11D1-B1D0-00805FC1270E}
    7/3/2011 10:54:46 PM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service EventSystem with arguments "" in order to run the server: {1BE1F766-5536-11D1-B726-00C04FB926AF}
    7/3/2011 10:48:17 PM, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: IntelIde
    7/3/2011 10:47:13 PM, error: sr [1] - The System Restore filter encountered the unexpected error '0xC0000001' while processing the file '' on the volume 'HarddiskVolume1'. It has stopped monitoring the volume.
    7/3/2011 10:46:57 PM, error: Dhcp [1002] - The IP address lease 192.168.0.107 for the Network Card with network address 0012F0A5466E has been denied by the DHCP server 192.168.0.1 (The DHCP Server sent a DHCPNACK message).
    7/2/2011 3:15:37 PM, error: Dhcp [1002] - The IP address lease 192.168.0.107 for the Network Card with network address 0012F0A5466E has been denied by the DHCP server 0.0.0.0 (The DHCP Server sent a DHCPNACK message).
    6/28/2011 12:06:30 PM, error: Dhcp [1002] - The IP address lease 192.168.0.121 for the Network Card with network address 0012F0A5466E has been denied by the DHCP server 192.168.0.1 (The DHCP Server sent a DHCPNACK message).
    .
    ==== End Of File ===========================

    dds:

    .
    DDS (Ver_2011-06-23.01) - NTFSx86
    Internet Explorer: 6.0.2900.5512 BrowserJavaVersion: 1.6.0_22
    Run by NARINDERISKING! at 23:41:59 on 2011-07-03
    Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.502.187 [GMT -4:00]
    .
    AV: Spyware Doctor with AntiVirus *Disabled/Updated* {D3C23B96-C9DC-477F-8EF1-69AF17A6EFF6}
    AV: Symantec Endpoint Protection *Disabled/Updated* {FB06448E-52B8-493A-90F3-E43226D3305C}
    FW: Symantec Endpoint Protection *Disabled*
    .
    ============== Running Processes ===============
    .
    C:\WINDOWS\system32\svchost -k DcomLaunch
    C:\WINDOWS\system32\svchost -k rpcss
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    C:\Program Files\Symantec\Symantec Endpoint Protection\Smc.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\ACS.exe
    C:\WINDOWS\system32\svchost.exe -k NetworkService
    C:\WINDOWS\system32\svchost.exe -k LocalService
    C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\DVDRAMSV.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\Program Files\Symantec\Symantec Endpoint Protection\Rtvscan.exe
    C:\WINDOWS\System32\alg.exe
    C:\Program Files\Symantec\Symantec Endpoint Protection\SmcGui.exe
    C:\Program Files\Atheros\ACU.exe
    C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\Program Files\Apoint2K\Apoint.exe
    C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
    C:\WINDOWS\System32\svchost.exe -k HTTPFilter
    C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
    C:\Program Files\Common Files\Java\Java Update\jusched.exe
    C:\WINDOWS\system32\igfxtray.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\WINDOWS\system32\igfxpers.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\Program Files\Apoint2K\Apntex.exe
    C:\Program Files\McAfee Security Scan\2.0.181\SSScheduler.exe
    C:\WINDOWS\system32\RAMASST.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Mozilla Firefox\plugin-container.exe
    C:\WINDOWS\system32\wbem\wmiprvse.exe
    .
    ============== Pseudo HJT Report ===============
    .
    BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
    BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
    BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    BHO: Yontoo Layers: {fd72061e-9fde-484d-a58a-0bab4151cad8} - c:\program files\pagerage\YontooIEClient.dll
    mRun: [ACU] "c:\program files\atheros\ACU.exe" -nogui
    mRun: [CeEKEY] c:\program files\toshiba\e-key\CeEKey.exe
    mRun: [<NO NAME>]
    mRun: [AGRSMMSG] AGRSMMSG.exe
    mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
    mRun: [TPNF] c:\program files\toshiba\touchpad\TPTray.exe
    mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 10.0\reader\Reader_sl.exe"
    mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
    mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
    mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
    mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
    mRun: [Persistence] c:\windows\system32\igfxpers.exe
    mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
    mRun: [DivX Download Manager] "c:\program files\divx\divx plus web player\DDmService.exe" start
    mRun: [Rjivugunepoz] rundll32.exe "c:\windows\egepoxul.dll",Startup
    StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\mcafee~1.lnk - c:\program files\mcafee security scan\2.0.181\SSScheduler.exe
    StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\ramasst.lnk - c:\windows\system32\RAMASST.exe
    IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
    DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1296406284125
    DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
    DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
    DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
    TCP: DhcpNameServer = 192.168.0.1
    TCP: Interfaces\{F78BF77A-1DC3-47DB-B561-BAD24FC4D50F} : DhcpNameServer = 192.168.0.1
    Notify: igfxcui - igfxdev.dll
    .
    ================= FIREFOX ===================
    .
    FF - ProfilePath - c:\documents and settings\narinderisking!\application data\mozilla\firefox\profiles\pc2n9y2l.default\
    FF - prefs.js: browser.startup.homepage - google.ca
    FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
    FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
    FF - Ext: Java Console: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}
    FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff
    FF - Ext: Yontoo Layers: plugin@yontoo.com - %profile%\extensions\plugin@yontoo.com
    .
    ============= SERVICES / DRIVERS ===============
    .
    R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\ccSvcHst.exe [2010-12-2 108392]
    R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\ccSvcHst.exe [2010-12-2 108392]
    R2 Symantec AntiVirus;Symantec Endpoint Protection;c:\program files\symantec\symantec endpoint protection\Rtvscan.exe [2010-12-2 1832072]
    R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2011-5-9 105592]
    R3 IKFileSec;File Security Driver;c:\windows\system32\drivers\ikfilesec.sys [2011-1-30 42376]
    R3 IKSysFlt;System Filter Driver;c:\windows\system32\drivers\iksysflt.sys [2011-1-30 66952]
    R3 IKSysSec;System Security Driver;c:\windows\system32\drivers\iksyssec.sys [2011-1-30 81288]
    R3 NAVENG;NAVENG;c:\progra~1\common~1\symant~1\virusd~1\20110703.003\NAVENG.SYS [2011-7-3 86008]
    R3 NAVEX15;NAVEX15;c:\progra~1\common~1\symant~1\virusd~1\20110703.003\NAVEX15.SYS [2011-7-3 1542392]
    S2 AutoExNT;AutoExNT;c:\windows\system32\Autoexnt.exe [2011-1-30 5904]
    S3 COH_Mon;COH_Mon;c:\windows\system32\drivers\COH_Mon.sys [2010-12-2 23888]
    S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2011-7-3 39984]
    S3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\mcafee security scan\2.0.181\McCHSvc.exe [2010-1-15 227232]
    S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2011-1-30 337800]
    S3 sdCoreService;PC Tools Security Service;c:\program files\spyware doctor\pctsSvc.exe [2011-1-30 1017224]
    .
    =============== Created Last 30 ================
    .
    2011-07-04 03:08:30 -------- d-----w- c:\documents and settings\narinderisking!\local settings\application data\{B86602C5-E08C-4D2F-B4C7-C1271A22DDD2}
    2011-07-04 02:56:18 60416 ------w- c:\windows\system32\antiwpa.dll
    2011-07-04 02:24:58 -------- d-----w- c:\documents and settings\narinderisking!\application data\Malwarebytes
    2011-07-04 02:23:45 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2011-07-04 02:23:37 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes
    2011-07-04 02:23:20 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
    2011-07-04 02:23:10 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2011-07-04 01:53:44 -------- d-----w- c:\documents and settings\narinderisking!\local settings\application data\{9F145CAB-67B1-4CD3-96A3-BC3A9F09B10C}
    2011-07-03 03:52:49 -------- d-----w- c:\documents and settings\narinderisking!\local settings\application data\{A9430086-9373-4A53-9850-D91C13DD3AC6}
    2011-07-02 19:17:49 -------- d-----w- c:\documents and settings\narinderisking!\local settings\application data\{A018262D-2246-4209-88AE-0D5DE5BD9E37}
    2011-07-01 18:12:25 -------- d-----w- c:\documents and settings\narinderisking!\local settings\application data\{6588F36B-33C8-4CBD-B297-A0BF1BD4DFA8}
    2011-07-01 04:05:25 -------- d-----w- c:\documents and settings\narinderisking!\local settings\application data\{E3F0DD41-9F57-4D97-A00C-C509ADAB6599}
    2011-06-29 17:03:30 -------- d-----w- c:\documents and settings\narinderisking!\local settings\application data\{9DCC41F6-0C9E-4A97-90ED-830D918B9AE7}
    2011-06-29 05:49:59 118784 --sha-r- c:\windows\system32\msgsm32D.dll
    2011-06-29 05:49:57 118784 --sha-r- c:\windows\system32\dgsetupu.dll
    2011-06-29 05:49:57 118784 --sha-r- c:\windows\system32\devmgra.dll
    2011-06-29 05:49:50 0 ----a-w- c:\windows\Qgadifukinemerok.bin
    2011-06-29 05:49:49 -------- d-----w- c:\program files\PageRage
    2011-06-29 05:49:31 -------- d-----w- c:\documents and settings\narinderisking!\local settings\application data\{A4D3FBDA-6390-4106-9530-735F6C62BB71}
    2011-06-29 05:49:25 -------- d-----w- c:\documents and settings\all users\application data\Tarma Installer
    .
    ==================== Find3M ====================
    .
    2011-06-21 21:46:10 167936 ----a-w- c:\windows\system32\drivers\wpshelper.sys
    .
    ============= FINISH: 23:42:34.42 ===============
     
  2. jgrewal

    jgrewal TS Rookie Topic Starter

    Sorry, I forgot the gmer log. Here it is:

    GMER 1.0.15.15640 - http://www.gmer.net
    Rootkit quick scan 2011-07-03 23:29:37
    Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 TOSHIBA_MK1031GAS rev.AA204A
    Running: 96lukdu7.exe; Driver: C:\DOCUME~1\NARIND~1\LOCALS~1\Temp\kwtirkod.sys


    ---- Devices - GMER 1.0.15 ----

    AttachedDevice \Driver\Tcpip \Device\Ip wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)
    AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
    AttachedDevice \Driver\Tcpip \Device\Tcp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)
    AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
    AttachedDevice \Driver\Tcpip \Device\Udp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)
    AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
    AttachedDevice \Driver\Tcpip \Device\RawIp wpsdrvnt.sys (Symantec CMC Firewall WPS/Symantec Corporation)
    AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

    ---- EOF - GMER 1.0.15 ----
     
  3. Bobbye

    Bobbye Helper on the Fringe Posts: 16,335   +36

    Note please: I have given this thread a more appropriate subject of Search Redirect.

    Edit: There is a strong indication that you are not running a legitimate copy of the operating system. Please run the following:

    Download CKScanner and save to your desktop.
    • Doubleclick CKScanner.exe and click Search For Files.
    • When the cursor hourglass disappears, click Save List To File.
    • A message box will verify that the file is saved.
    • Double-click the CKFiles.txt icon on your desktop and copy/paste the contents
      in your next reply.
     
  4. jgrewal

    jgrewal TS Rookie Topic Starter

    That is true - it is not a legitimate xp version. My computer crashed a while back and I could not find my original XP cd and key, so a friend of mine provided me with his cd for which I had to use an xp activation crack.


    CKScanner - Additional Security Risks - These are not necessarily bad
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\windows xp genuine forever 100%\instructions.txt
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\windows xp genuine forever 100%\microsoft genuine advantage diagnostic tool.exe
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\windows xp genuine forever 100%\wga.exe
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\windows xp genuine forever 100%\system32\1.reg
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\windows xp genuine forever 100%\system32\autoexnt.bat
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\windows xp genuine forever 100%\system32\autoexnt.exe
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\windows xp genuine forever 100%\system32\instexnt.exe
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\windows xp genuine forever 100%\system32\servmess.dll
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\xp sp3 [antiwpa] activator\readme.txt
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\xp sp3 [antiwpa] activator\xp sp3 [antiwpa] activator\antiwpa3.cmd
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\xp sp3 [antiwpa] activator\xp sp3 [antiwpa] activator\readme.txt
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\xp sp3 [antiwpa] activator\xp sp3 [antiwpa] activator\amd64\antiwpa.dll
    c:\documents and settings\narinderisking!\desktop\jassi - toshiba m50 drivers (important backup)\xp sp3 activation cracks\xp sp3 [antiwpa] activator\xp sp3 [antiwpa] activator\x86\antiwpa.dll
    c:\windows\system32\antiwpa.dll
    scanner sequence 3.JD.11.ABAPHA
    ----- EOF -----
     
  5. Bobbye

    Bobbye Helper on the Fringe Posts: 16,335   +36

    Since it is clear that the operating system has been pirated, I am withdrawing my support as we don't support piracy.

    Surely the thought must have occurred to you that the problems may be due to the fact that the OS is not legitimate?
     
Topic Status:
Not open for further replies.

Similar Topics

Add New Comment

You need to be a member to leave a comment. Join thousands of tech enthusiasts and participate.
TechSpot Account You may also...