Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan Clicker.VMS Infection


  • This topic is locked This topic is locked
2 replies to this topic

#1 marklaker

marklaker

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:27 PM

Posted 06 January 2009 - 08:59 PM

On the morning of January 2nd I began receiving pop-ups from the Resident Shield function of my AVG 8.0 anti-virus software indicating my svchost.exe file was infected with what it labeled Trojan_Clicker.VMS. I continually selected either the the heal or move to vault options, but it kept returning. I eventually enabled my Spyware Doctor 6.0 software and initiated a scan. The results indicated I was infected with what it labeled Backdoor.Bifrose in the following locations:

HKEY_USERS\5-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\POLICIES\EXPLORER\Run, MSNMessenger = c:\svchost.exe
HKEY_USERS\5-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\POLICIES\EXPLORER\Run, MSNConvert = c:\svchost.exe
HKEY_USERS\5-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\POLICIES\EXPLORER\Run, MSNLoad = c:\svchost.exe
HKEY_USERS\5-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\POLICIES\EXPLORER\Run, MSNHost = c:\svchost.exe
HKEY_USERS\5-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\POLICIES\EXPLORER\Run, MSN = c:\svchost.exe

HKEY_USERS\DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\POLICIES\EXPLORER\Run, MSNMessenger = c:\svchost.exe
HKEY_USERS\DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\POLICIES\EXPLORER\Run, MSNConvert = c:\svchost.exe
HKEY_USERS\DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\POLICIES\EXPLORER\Run, MSNLoad = c:\svchost.exe
HKEY_USERS\DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\POLICIES\EXPLORER\Run, MSNHost = c:\svchost.exe
HKEY_USERS\DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\POLICIES\EXPLORER\Run, MSN = c:\svchost.exe

I tried to heal/quarantine with Spyware Doctor to no avail. I disabled Spyware Doctor, reenabled AVG 8.0 and continued to receive the Resident Shield alerts indicating my svchost.exe file was infected. At that point I posted my problem in your Am I infected? What do I do? forum. I was assisted by a very friendly/courteous individual with the moniker Rigel, but after three days of trying to help rid my PC of this demon he suggested I post to this forum for further assistance.

I'm running Microsoft XP Home Edition 2002 Service Pack 3. I have a Pentium 4 2.4 GHz with 1 GB RAM.

I would be very grateful if someone could help me with this infection.

Here is the DDS.txt log:

DDS (Version 1.1.0) - NTFSx86
Run by Home User at 19:17:46.00 on Tue 01/06/2009
Internet Explorer: 7.0.5730.11
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1023.578 [GMT -6:00]

AV: ThreatFire *On-access scanning disabled* (Updated)
AV: Spyware Doctor with AntiVirus *On-access scanning disabled* (Updated)
AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated)
FW: Norton Internet Worm Protection *disabled*

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\system32\CTsvcCDA.exe
F:\Program Files\Diskeeper\DkService.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\Program Files\Norton SystemWorks\Norton GoBack\GBPoll.exe
C:\WINDOWS\runservice.exe
F:\Program Files\Maxtor Backup\MaxBackServiceInt.exe
C:\PROGRA~1\NORTON~2\NORTON~2\NPROTECT.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\pctspk.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\PROGRA~1\NORTON~2\NORTON~2\SPEEDD~1\NOPDB.EXE
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\WINDOWS\System32\wltrysvc.exe
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\System32\MsPMSPSv.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\PROGRA~1\AVG\AVG8\avgemc.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
F:\Program Files\Maxtor OneTouch\utils\Onetouch.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\Program Files\Microsoft Hardware\Mouse\point32.exe
C:\Program Files\Maxtor\OneTouch Status\maxmenumgr.exe
C:\Program Files\Belkin Mouse 1.0\MOUSE32A.EXE
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Creative\SBLive\AudioHQ\AHQTbU.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Norton SystemWorks\Norton GoBack\GBTray.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\Common Files\Symantec Shared\Security Console\NSCSRVCE.EXE
C:\Program Files\Microsoft Office\Office10\WINWORD.EXE
C:\WINDOWS\System32\mshta.exe
C:\WINDOWS\System32\mshta.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Documents and Settings\Home User\Desktop\dds.scr

============== Pseudo HJT Report ===============

uSearch Bar = hxxp://www.google.com/ie
uSearchMigratedDefaultURL = hxxp://search.live.com/results.aspx?q={searchTerms}&src={referrer:source?}
uStart Page = hxxp://www.yahoo.com/
uInternet Connection Wizard,ShellNext = iexplore
mWinlogon: Userinit=c:\windows\system32\userinit.exe
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
BHO: NoExplorer - No File
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\program files\real\realplayer\rpbrowserrecordplugin.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg8\avgssie.dll
BHO: PCTools Site Guard: {5c8b2a36-3db1-42a4-a3cb-d426709bbfeb} - c:\program files\common files\microsoft shared\themes\blank
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.5.0_10\bin\ssv.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar3.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\2.0.301.7164\swg.dll
BHO: {b56a7d7d-6927-48c8-a975-17df180c71ac} - PCTools Browser Monitor
BHO: {d6170ec0-3ca8-4939-913e-479f4f4e07bc} - c:\program files\common files\microsoft shared\themes\blank
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar3.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
TB: {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - No File
TB: {4982D40A-C53B-4615-B15B-B5B5E98D167C} - No File
TB: {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No File
TB: {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - No File
TB: {C4069E3A-68F1-403E-B40E-20066696354B} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [MaxtorOneTouch] f:\program files\maxtor onetouch\utils\Onetouch.exe
mRun: [Symantec PIF AlertEng] "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\pifsvc.exe" /a /m "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\AlertEng.dll"
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [POINTER] c:\program files\microsoft hardware\mouse\point32.exe
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [mxomssmenu] "c:\program files\maxtor\onetouch status\maxmenumgr.exe"
mRun: [Media Codec Update Service] f:\program files\essentials codec pack\update.exe -silent
mRun: [LWBMOUSE] c:\program files\belkin mouse 1.0\MOUSE32A.EXE
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [AudioHQU] c:\program files\creative\sblive\audiohq\AHQTbU.exe
dRun: [Symantec NetDriver Warning] c:\progra~1\symnet~1\SNDWarn.exe
dExplorerRun: [Msn] c:\svchost.exe
dExplorerRun: [MsnHost] c:\svchost.exe
dExplorerRun: [MsnLoad] c:\svchost.exe
dExplorerRun: [MsnConvert] c:\svchost.exe
dExplorerRun: [MsnMessendger] c:\svchost.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\norton~1.lnk - c:\program files\norton systemworks\norton goback\GBTray.exe
uPolicies-explorer: NoViewOnDrive = 0 (0x0)
uPolicies-explorer: NoStartMenuMyMusic = 1 (0x1)
mPolicies-explorer: <NO NAME> =
IE: {5E638779-1818-4754-A595-EF1C63B87A56} - c:\program files\norton systemworks\norton cleanup\WCQuick.lnk
IE: {AFC3FA82-AD07-45cd-8B57-983435B9899E}
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE}
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0010-ABCDEFFEDCBC} - c:\program files\java\jre1.5.0_10\bin\ssv.dll
IE: {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - {A1EDC4A1-940F-48E0-8DFD-E38F1D501021}
LSP: c:\program files\common files\pc tools\lsp\PCTLsp.dll
Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
AppInit_DLLs: avgrsstx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

============= SERVICES / DRIVERS ===============

R0 AVG Anti-Rootkit;AVG Anti-Rootkit;c:\windows\system32\drivers\avgarkt.sys [2007-1-31 5632]
R0 BsStor;B.H.A Storage Helper Driver;c:\windows\system32\drivers\BsStor.sys [2004-1-16 9344]
R0 TfFsMon;TfFsMon;c:\windows\system32\drivers\TfFsMon.sys [2008-8-17 51520]
R0 TfSysMon;TfSysMon;c:\windows\system32\drivers\TfSysMon.sys [2008-8-17 38208]
R1 AvgArCln;Avg Anti-Rootkit Clean Driver;c:\windows\system32\drivers\AvgArCln.sys [2009-1-2 3968]
R1 AvgLdx86;AVG AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2008-5-20 97928]
R1 AvgMfx86;AVG On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2008-5-20 26824]
R1 kid_sys;Kensington Input Devices Class filter driver;c:\windows\system32\drivers\KID_SYS.sys [2005-8-7 11920]
R1 pctfw2;pctfw2;c:\windows\system32\drivers\pctfw2.sys [2008-6-8 160792]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2008-12-22 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2008-12-22 55024]
R4 avg8emc;AVG8 E-mail Scanner;c:\progra~1\avg\avg8\avgemc.exe [2008-7-3 875288]
R4 avg8wd;AVG8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2008-7-3 231704]
R4 AvgTdiX;AVG8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2008-5-20 76040]
R4 BCMNTIO;BCMNTIO;f:\progra~1\checkit\diagno~1\BCMNTIO.sys [2006-10-1 3744]
R4 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\CCEVTMGR.EXE [2006-1-11 191848]
R4 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\CCSETMGR.EXE [2006-1-11 169320]
R4 IOPort;IOPort;c:\windows\system32\drivers\IOPORT.SYS [1998-11-27 6144]
R4 LicCtrlService;LicCtrl Service;c:\windows\Runservice.exe [2003-7-13 2560]
R4 MAPMEM;MAPMEM;f:\progra~1\checkit\diagno~1\MAPMEM.sys [2006-10-1 3904]
R4 NProtectService;Norton UnErase Protection;c:\progra~1\norton~2\norton~2\NPROTECT.EXE [2005-11-3 95832]
R4 Symantec Core LC;Symantec Core LC;c:\program files\common files\symantec shared\ccpd-lc\symlcsvc.exe [2006-6-24 1251720]
S3 adxapie;adxapie;\??\c:\docume~1\homeus~1\locals~1\temp\adxapie.sys --> c:\docume~1\homeus~1\locals~1\temp\adxapie.sys [?]
S3 IKFileSec;File Security Driver;c:\windows\system32\drivers\ikfilesec.sys [2008-5-25 40840]
S3 IKSysFlt;System Filter Driver;c:\windows\system32\drivers\iksysflt.sys [2008-5-25 66952]
S3 IKSysSec;System Security Driver;c:\windows\system32\drivers\iksyssec.sys [2008-5-25 81288]
S3 ntxpusb;Gravis USB device driver;c:\windows\system32\drivers\ntxpusb.sys [2005-8-7 266432]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2008-12-22 7408]
S3 sdAuxService;PC Tools Auxiliary Service;f:\program files\spyware doctor\pctsAuxs.exe [2008-5-25 356920]
S3 sdCoreService;PC Tools Security Service;f:\program files\spyware doctor\pctsSvc.exe [2008-5-25 1079176]
S3 TfNetMon;TfNetMon;c:\windows\system32\drivers\TfNetMon.sys [2008-8-17 33088]
S3 USBCamera;Icatch(IV) Still Camera Device;c:\windows\system32\drivers\bulk533.sys --> c:\windows\system32\drivers\Bulk533.sys [?]
S4 Ca533av;Icatch(IV) Video Camera Device;c:\windows\system32\drivers\ca533av.sys --> c:\windows\system32\drivers\Ca533av.sys [?]
S4 nvtvSND;nVidia WDM TVAudio Crossbar;c:\windows\system32\drivers\nvtvsnd.sys --> c:\windows\system32\drivers\nvtvsnd.sys [?]
S4 ThreatFire;ThreatFire;g:\program files\threatfire\tfservice.exe service --> g:\program files\threatfire\TFService.exe service [?]

============== File Associations ===============

inffile=c:\program files\common files\microsoft shared\themes\blank

=============== Created Last 30 ================

2009-01-05 21:05 578,560 ac------ c:\windows\system32\dllcache\user32.dll
2009-01-05 21:01 <DIR> --d----- c:\windows\ERUNT
2009-01-05 20:23 <DIR> --d----- C:\SDFix
2009-01-03 18:43 <DIR> --d----- C:\fsaua.data
2009-01-03 17:39 3,405,561 a------- c:\windows\{00000000-00000000-00000009-00001102-00000002-80651102}.BAK
2009-01-03 13:20 2,538,872 a------- c:\program files\mbam-setup.exe
2009-01-03 13:07 <DIR> --d----- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2009-01-03 13:06 <DIR> --d----- c:\program files\SUPERAntiSpyware
2009-01-03 13:05 5,824,544 a------- c:\program files\SUPERAntiSpyware.exe
2009-01-03 13:04 50,688 a------- c:\program files\ATF-Cleaner.exe
2009-01-03 10:29 <DIR> --d----- c:\docume~1\homeus~1\applic~1\SUPERAntiSpyware.com
2009-01-03 10:27 <DIR> --d----- c:\program files\common files\Wise Installation Wizard
2009-01-03 00:19 <DIR> --d----- c:\docume~1\homeus~1\applic~1\Malwarebytes
2009-01-03 00:19 15,504 a------- c:\windows\system32\drivers\mbam.sys
2009-01-03 00:19 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-01-03 00:19 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-01-02 18:14 3,968 a------- c:\windows\system32\drivers\AvgArCln.sys
2009-01-02 15:13 333,824 -c------ c:\windows\system32\dllcache\srv.sys
2009-01-02 15:12 1,846,400 -c------ c:\windows\system32\dllcache\win32k.sys
2009-01-02 15:11 2,145,280 -c------ c:\windows\system32\dllcache\ntkrnlmp.exe
2009-01-02 15:11 2,189,184 -c------ c:\windows\system32\dllcache\ntoskrnl.exe
2009-01-02 15:11 2,023,936 -c------ c:\windows\system32\dllcache\ntkrpamp.exe
2009-01-02 15:11 2,066,048 -c------ c:\windows\system32\dllcache\ntkrnlpa.exe
2009-01-02 15:10 455,296 -c------ c:\windows\system32\dllcache\mrxsmb.sys
2009-01-02 15:10 337,408 -c------ c:\windows\system32\dllcache\netapi32.dll
2009-01-02 15:09 1,106,944 -c------ c:\windows\system32\dllcache\msxml3.dll
2009-01-02 14:41 <DIR> --d----- c:\windows\system32\scripting
2009-01-02 14:41 <DIR> --d----- c:\windows\l2schemas
2009-01-02 14:41 <DIR> --d----- c:\windows\system32\en
2009-01-01 22:52 8,098 a------- C:\bt.bat
2009-01-01 22:52 208 a------- C:\testfile.bat
2008-12-15 18:01 54,156 a---h--- c:\windows\QTFont.qfn
2008-12-15 18:01 1,409 a------- c:\windows\QTFont.for

==================== Find3M ====================

2009-01-06 18:20 11,121 a--sh--- c:\windows\system32\mmf.sys
2009-01-02 14:48 76,487 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2008-12-24 18:43 138,384 a------- c:\windows\system32\drivers\PnkBstrK.sys
2008-12-24 18:43 187,536 a------- c:\windows\system32\PnkBstrB.exe
2008-12-23 17:06 70,968 a------- c:\windows\system32\PnkBstrA.exe
2008-10-23 06:36 286,720 a------- c:\windows\system32\gdi32.dll
2008-10-16 14:38 826,368 a------- c:\windows\system32\wininet.dll
2007-09-22 14:41 106,432 a------- c:\docume~1\homeus~1\applic~1\GDIPFONTCACHEV1.DAT
2006-05-13 16:55 1 a------- c:\documents and settings\home user\SI.bin
2002-12-11 02:27 73,728 a--sh--- c:\windows\registeredpackages\{dd90d410-1823-43eb-9a16-a2331bf08799}$backup$\system\wmplayer.exe
2007-12-09 18:17 848 a--sh--- c:\windows\system32\KGyGaAvL.sys

============= FINISH: 19:19:30.22 ===============



Mark

Attached Files



BC AdBot (Login to Remove)

 


#2 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:03:27 PM

Posted 20 January 2009 - 09:39 AM

Welcome to the BleepingComputer Forums.

Since it has been a few days since you scanned your computer with HijackThis, we will need a new HijackThis log. If you have not already downloaded Random's System Information Tool (RSIT), please download Random's System Information Tool (RSIT) by random/random which includes a HijackThis log and save it to your desktop. If you have RSIT already on your computer, please run it again.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Please post the contents of log.txt.
Thank you for your patience.

Please see Preparation Guide for use before posting about your potential Malware problem.

If you have already posted this log at another forum or if you decide to seek help at another forum, please let us know. There is a shortage of helpers and taking the time of two volunteer helpers means that someone else may not be helped.

Please post your HijackThis log as a reply to this thread and not as an attachment. I am always leery of opening attachments so I always request that HijackThis logs are to be posted as a reply to the thread. I do not think that you are attaching anything scary but others may do so.

While we are working on your HijackThis log, please:
  • Reply to this thread; do not start another!
  • Do not make any changes on your computer during the cleaning process or download/add programs on your computer unless instructed to do so.
  • Do not run any other tool until instructed to do so!
  • Let me know if any of the links do not work or if any of the tools do not work.
  • Tell me about problems or symptoms that occur during the fix.
  • Do not run any other programs or open any other windows while doing a fix.
  • Ask any questions that you have regarding the fix(es), the infection(s), the performance of your computer, etc.
Thanks.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#3 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:03:27 PM

Posted 02 February 2009 - 07:52 AM

This subject is now closed. If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you. Include the address of this thread in your request. If you should have a new issue, please start a new topic. This applies only to the original topic starter. Everyone else please begin a New Topic.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users