Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Vundo?


  • This topic is locked This topic is locked
18 replies to this topic

#1 KHL3

KHL3

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:28 PM

Posted 18 April 2009 - 01:26 PM

Hi, I'm new here but I think I'm posting this correctly....

My computer is infected with what seems to be various trojans. I was hit by a vundo trojan several weeks ago, and while I thought I had gotten rid of it with Malwarebites and Spybot, but I still had some doubleclick, zedo etc infections that I couldn't get rid of. Yesterday I tried to open something using Adobe Acrobat and was again infected with a trojan or trojans, making my computer almost inoperable with DRIVER_IRQL_NOT_LESS_OR_EQUAL BSODs. Superantispyware found and removed several rootkit programs, but I can tell I'm still infected with something. I'm just guessing that I have Vundo like I did before, and Spywaredoctor (the free version) says my computer is infected with a ad-dropper trojan.

I really don't know much about this sort of thing, so I'd be grateful for any help.

Here is my DDS log:


DDS (Ver_09-03-16.01) - NTFSx86
Run by Internet at 13:51:31.15 on Sat 04/18/2009
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.503.62 [GMT -4:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
svchost.exe
svchost.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Dell\NICCONFIGSVC\NICCONFIGSVC.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
svchost.exe
C:\Program Files\Intel\Wireless\Bin\ZcfgSvc.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\Program Files\Java\j2re1.4.2_03\bin\jusched.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
C:\Program Files\Apoint\Apoint.exe
C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Spyware Doctor\pctsTray.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\DellSupport\DSAgnt.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Apoint\Apntex.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Internet\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.gvsu.edu/
uSearch Page = hxxp://www.google.com
uDefault_Page_URL = hxxp://www.dell4me.com/myway
uWindow Title = Microsoft Internet Explorer provided by AT&T WorldNet Service
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uInternet Connection Wizard,ShellNext = hxxp://www.dell4me.com/myway
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
mSearchAssistant = hxxp://www.google.com/ie
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 6.0\reader\activex\AcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
EB: Real.com: {fe54fa40-d68c-11d2-98fa-00c0f0318afe} - c:\windows\system32\Shdocvw.dll
uRun: [DellSupport] "c:\program files\dellsupport\DSAgnt.exe" /startup
uRun: [Aim6]
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRunOnce: [SpybotDeletingD9614] cmd /c del "c:\windows\wt\webdriver.dll"
uRunOnce: [SpybotDeletingB5283] command /c del "c:\windows\wt\webdriver.dll"
mRun: [ehTray] c:\windows\ehome\ehtray.exe
mRun: [Dell QuickSet] c:\program files\dell\quickset\quickset.exe
mRun: [SunJavaUpdateSched] c:\program files\java\j2re1.4.2_03\bin\jusched.exe
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [IntelWireless] c:\program files\intel\wireless\bin\ifrmewrk.exe /tf Intel PROSet/Wireless
mRun: [DVDLauncher] "c:\program files\cyberlink\powerdvd\DVDLauncher.exe"
mRun: [Apoint] c:\program files\apoint\Apoint.exe
mRun: [Acronis Scheduler2 Service] "c:\program files\common files\acronis\schedule2\schedhlp.exe"
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [ISTray] "c:\program files\spyware doctor\pctsTray.exe"
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [MSConfig] c:\windows\pchealth\helpctr\binaries\MSConfig.exe /auto
mRunOnce: [SpybotSnD] "c:\program files\spybot - search & destroy\SpybotSD.exe" /autocheck
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\dlbcserv.lnk - c:\program files\dell photo printer 720\dlbcserv.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office10\OSA.EXE
dPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {08B0E5C0-4FCB-11CF-AAA5-00401C608501}
IE: {B205A35E-1FC4-4CE3-818B-899DBBB3388C} - {552781AF-37E4-4FEE-920A-CED9E648EADD} - c:\program files\common files\microsoft shared\encarta search bar\ENCSBAR.DLL
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {B1E2B96C-12FE-45E2-BEF1-44A219113CDD} - hxxp://www.superadblocker.com/activex/sabspx.cab
DPF: {CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: igfxcui - igfxdev.dll
Notify: IntelWireless - c:\program files\intel\wireless\bin\LgNotify.dll
Notify: pmnlkiHX - pmnlkiHX.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
LSA: Authentication Packages = msv1_0 relog_ap c:\windows\system32\qoMdCVlj

============= SERVICES / DRIVERS ===============

R0 d346bus;d346bus;c:\windows\system32\drivers\d346bus.sys [2007-5-25 156800]
R0 d346prt;d346prt;c:\windows\system32\drivers\d346prt.sys [2007-5-25 5248]
R0 IKFileSec;File Security Driver;c:\windows\system32\drivers\ikfilesec.sys [2009-3-23 40840]
R1 IKSysFlt;System Filter Driver;c:\windows\system32\drivers\iksysflt.sys [2009-3-23 66952]
R1 IKSysSec;System Security Driver;c:\windows\system32\drivers\iksyssec.sys [2009-3-23 81288]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2008-8-19 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2008-8-19 55024]
R2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2008-8-19 7408]
S4 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2009-1-7 356920]
S4 sdCoreService;PC Tools Security Service;c:\program files\spyware doctor\pctsSvc.exe [2009-1-7 1079176]

=============== Created Last 30 ================

2009-04-18 13:29 <DIR> --d----- c:\program files\Trend Micro
2009-04-18 13:27 317,514 a------- C:\HiJackThis.zip
2009-04-18 13:26 <DIR> --d----- C:\Hijackthis
2009-04-18 00:41 43 a------- c:\windows\system32\ovfsthodlcngrnvputtuceofidxbtlxgfqgdkt.dat
2009-04-16 13:27 112,645 a------- c:\windows\system32\ovfsthbqaarboosdijjeyeamwgxqdwmmmkpojf.dat
2009-04-16 13:27 18,944 a------- c:\windows\system32\ovfsthxvukqhtpabgyfhafgbqursjptjrvelsm.dll
2009-04-16 13:27 18,432 a------- c:\windows\system32\ovfsthphttiqctktuuoxwjkeeaaouolmmlfomm.dll
2009-04-16 13:27 60,928 a------- c:\windows\system32\ovfsthrroysnlpcfriyscicwnitacwyaaxmvoo.dll
2009-04-15 22:34 283,648 -------- c:\windows\system32\dllcache\pdh.dll
2009-04-15 22:34 60,416 -------- c:\windows\system32\dllcache\colbact.dll
2009-04-15 22:34 35,328 -------- c:\windows\system32\dllcache\sc.exe
2009-04-15 22:34 473,088 -------- c:\windows\system32\dllcache\fastprox.dll
2009-04-15 22:34 453,120 -------- c:\windows\system32\dllcache\wmiprvsd.dll
2009-04-15 22:34 399,360 -------- c:\windows\system32\dllcache\rpcss.dll
2009-04-15 22:34 227,840 -------- c:\windows\system32\dllcache\wmiprvse.exe
2009-04-15 22:34 110,592 -------- c:\windows\system32\dllcache\services.exe
2009-04-15 22:34 616,960 -------- c:\windows\system32\dllcache\advapi32.dll
2009-04-15 22:34 714,752 -------- c:\windows\system32\dllcache\ntdll.dll
2009-04-15 22:33 1,193,414 -------- c:\windows\system32\dllcache\sysmain.sdb
2009-04-15 22:33 215,552 -------- c:\windows\system32\dllcache\wordpad.exe
2009-03-23 06:21 81,288 a------- c:\windows\system32\drivers\iksyssec.sys
2009-03-23 06:21 66,952 a------- c:\windows\system32\drivers\iksysflt.sys
2009-03-23 06:21 40,840 a------- c:\windows\system32\drivers\ikfilesec.sys
2009-03-23 06:21 29,576 a------- c:\windows\system32\drivers\kcom.sys

==================== Find3M ====================

2009-04-18 12:01 7,206 a------- c:\docume~1\internet\applic~1\wklnhst.dat
2009-03-26 16:49 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-03-26 16:49 15,504 a------- c:\windows\system32\drivers\mbam.sys
2009-03-21 10:18 986,112 -------- c:\windows\system32\dllcache\kernel32.dll
2009-03-07 20:57 43,520 a------- c:\windows\system32\CmdLineExt03.dll
2009-03-06 10:44 283,648 a------- c:\windows\system32\pdh.dll
2009-03-02 20:18 826,368 a------- c:\windows\system32\wininet.dll
2009-03-02 20:18 826,368 a------- c:\windows\system32\dllcache\wininet.dll
2009-02-28 00:54 636,072 -------- c:\windows\system32\dllcache\iexplore.exe
2009-02-26 23:49 348,160 a------- c:\windows\system32\msvcr71.dll
2009-02-20 06:20 70,656 -------- c:\windows\system32\dllcache\ie4uinit.exe
2009-02-20 06:20 13,824 -------- c:\windows\system32\dllcache\ieudinit.exe
2009-02-20 01:14 161,792 -------- c:\windows\system32\dllcache\ieakui.dll
2009-02-09 06:20 723,456 a------- c:\windows\system32\lsasrv.dll
2009-02-09 06:20 399,360 a------- c:\windows\system32\rpcss.dll
2009-02-09 06:20 723,456 -------- c:\windows\system32\dllcache\lsasrv.dll
2009-02-09 06:20 714,752 a------- c:\windows\system32\ntdll.dll
2009-02-09 06:20 616,960 a------- c:\windows\system32\advapi32.dll
2009-02-09 06:19 1,846,272 a------- c:\windows\system32\win32k.sys
2009-02-09 06:19 1,846,272 -------- c:\windows\system32\dllcache\win32k.sys
2009-02-06 13:24 2,180,480 a------- c:\windows\system32\ntoskrnl.exe
2009-02-06 13:24 2,180,480 -------- c:\windows\system32\dllcache\ntoskrnl.exe
2009-02-06 13:22 2,136,064 -------- c:\windows\system32\dllcache\ntkrnlmp.exe
2009-02-06 13:14 110,592 a------- c:\windows\system32\services.exe
2009-02-06 12:54 35,328 a------- c:\windows\system32\sc.exe
2009-02-06 12:49 2,057,728 a------- c:\windows\system32\ntkrnlpa.exe
2009-02-06 12:49 2,057,728 -------- c:\windows\system32\dllcache\ntkrnlpa.exe
2009-02-06 12:49 2,015,744 -------- c:\windows\system32\dllcache\ntkrpamp.exe
2009-02-03 16:08 55,808 a------- c:\windows\system32\secur32.dll
2009-02-03 16:08 55,808 -------- c:\windows\system32\dllcache\secur32.dll
2007-08-22 22:05 1,475 a------- c:\program files\Windows Explorer.lnk
2006-02-27 20:57 56 ---shr-- c:\windows\system32\20AA8B96E1.sys
2006-02-27 20:57 3,766 a--sh--- c:\windows\system32\KGyGaAvL.sys

============= FINISH: 13:52:44.35 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:11:28 AM

Posted 19 April 2009 - 11:50 AM

Hello! :thumbup2:
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.



Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 KHL3

KHL3
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:28 PM

Posted 20 April 2009 - 11:49 AM

Thank you for your help, Sam.

Here's the log:

ComboFix 09-04-20.02 - Internet 04/20/2009 12:34.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.503.248 [GMT -4:00]
Running from: c:\documents and settings\Internet\Desktop\ComboFix.exe
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Kimberly\Application Data\Microsoft\SystemCertificates\Request
c:\windows\system32\bszip.dll
c:\windows\system32\ovfsthbqaarboosdijjeyeamwgxqdwmmmkpojf.dat
c:\windows\system32\ovfsthodlcngrnvputtuceofidxbtlxgfqgdkt.dat
c:\windows\system32\ovfsthphttiqctktuuoxwjkeeaaouolmmlfomm.dll
c:\windows\system32\ovfsthrroysnlpcfriyscicwnitacwyaaxmvoo.dll
c:\windows\system32\ovfsthxvukqhtpabgyfhafgbqursjptjrvelsm.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_FAD
-------\Legacy_MSSECURITY1.209.4



((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DellSupport"="c:\program files\DellSupport\DSAgnt.exe" [2007-03-15 460784]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-10 15360]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2008-09-16 1833296]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"SpybotDeletingD9614"="del" [X]
"SpybotDeletingB5283"="command" [X]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray"="c:\windows\ehome\ehtray.exe" [2005-09-29 67584]
"Dell QuickSet"="c:\program files\Dell\QuickSet\quickset.exe" [2005-09-01 684032]
"SunJavaUpdateSched"="c:\program files\Java\j2re1.4.2_03\bin\jusched.exe" [2003-11-19 32881]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2005-06-10 81920]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [2004-10-30 385024]
"DVDLauncher"="c:\program files\CyberLink\PowerDVD\DVDLauncher.exe" [2005-02-23 53248]
"Apoint"="c:\program files\Apoint\Apoint.exe" [2004-09-13 155648]
"Acronis Scheduler2 Service"="c:\program files\Common Files\Acronis\Schedule2\schedhlp.exe" [2005-11-28 118784]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-02-27 198160]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2005-12-14 98304]
"ISTray"="c:\program files\Spyware Doctor\pctsTray.exe" [2008-08-25 1168264]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-07-20 94208]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-07-20 114688]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-07-20 77824]
"MSConfig"="c:\windows\PCHealth\HelpCtr\Binaries\MSConfig.exe" [2004-08-10 158208]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"SpybotSnD"="c:\program files\Spybot - Search & Destroy\SpybotSD.exe" [2008-07-07 4891472]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2005-12-14 24576]
dlbcserv.lnk - c:\program files\Dell Photo Printer 720\dlbcserv.exe [2007-8-19 315392]
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NoSetActiveDesktop"= 1 (0x1)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-01-05 01:03 356352 ----a-w c:\program files\SUPERAntiSpyware\SASWINLO.DLL

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\IntelWireless]
2004-09-07 22:08 110592 ----a-w c:\program files\Intel\Wireless\Bin\LgNotify.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^QuickBooks Update Agent.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\QuickBooks Update Agent.lnk
backup=c:\windows\pss\QuickBooks Update Agent.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"sdCoreService"=2 (0x2)
"sdAuxService"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\Common Files\\AOL\\1136167439\\ee\\aolsoftware.exe"=
"c:\\Program Files\\Common Files\\AOL\\1136167439\\ee\\aim6.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\America Online 9.0\\waol.exe"=
"c:\\WINDOWS\\system32\\dplaysvr.exe"=
"c:\\Documents and Settings\\Kimberly\\Desktop\\[AOE II\\age2_x1.exe"=
"c:\\Program Files\\AIM6\\aim6.exe"=
"c:\\UnrealTournament\\System\\UnrealTournament.exe"=
"c:\\Documents and Settings\\Kimberly\\Desktop\\[AOE II\\Age Of Empres II expansion\\empires2.exe"=
"c:\\Documents and Settings\\Kimberly\\Desktop\\[AOE II\\Age Of Empres II expansion\\age2_x1.exe"=
"c:\\Program Files\\Microsoft Games\\Age of Empires II\\EMPIRES2.ICD"=
"c:\\Program Files\\Microsoft Games\\Age of Empires II\\age2_x1\\age2_x1.icd"=
"c:\\WINDOWS\\system32\\LEXPPS.EXE"=
"c:\\Program Files\\Microsoft Games\\Age of Empires III\\age3.exe"=
"c:\\WINDOWS\\system32\\spoolsv.exe"=

R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2008-08-20 7408]
R4 sdAuxService;PC Tools Auxiliary Service;c:\program files\Spyware Doctor\pctsAuxs.exe [2008-06-13 356920]
S0 d346bus;d346bus;c:\windows\system32\DRIVERS\d346bus.sys [2004-03-13 156800]
S0 d346prt;d346prt;c:\windows\System32\Drivers\d346prt.sys [2004-03-13 5248]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2008-08-20 8944]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.sys [2008-08-20 55024]


[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\D]
\Shell\AutoRun\command - D:\autorun.exe
\Shell\directx\command - d:\directx9\dxsetup.exe
\Shell\setup\command - D:\setup.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\E]
\Shell\AutoRun\command - E:\SETUP.EXE

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{361ac05d-0e0d-11da-9aa9-806d6172696f}]
\Shell\AutoRun\command - E:\setup.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{b328f052-9555-11db-834f-001422e52d3d}]
\Shell\AutoRun\command - F:\LaunchU3.exe
.
Contents of the 'Scheduled Tasks' folder

2009-01-31 c:\windows\Tasks\Spybot - Search & Destroy - Scheduled Task.job
- c:\program files\Spybot - Search & Destroy\SpybotSD.exe [2009-01-10 14:42]
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-Aim6 - (no file)
Notify-pmnlkiHX - pmnlkiHX.dll


.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.gvsu.edu/
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uInternet Connection Wizard,ShellNext = hxxp://www.dell4me.com/myway
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-04-20 12:39
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(840)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\program files\Intel\Wireless\Bin\LgNotify.dll

- - - - - - - > 'lsass.exe'(896)
c:\windows\system32\relog_ap.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Intel\Wireless\Bin\EvtEng.exe
c:\program files\Intel\Wireless\Bin\S24EvMon.exe
c:\program files\Intel\Wireless\Bin\WLKEEPER.exe
c:\windows\system32\LEXBCES.EXE
c:\windows\system32\LEXPPS.EXE
c:\program files\Common Files\Acronis\Schedule2\schedul2.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\windows\ehome\ehrecvr.exe
c:\windows\ehome\ehSched.exe
c:\program files\Dell\NicConfigSvc\NicConfigSvc.exe
c:\program files\Intel\Wireless\Bin\RegSrvc.exe
c:\windows\system32\wdfmgr.exe
c:\windows\ehome\mcrdsvc.exe
c:\windows\system32\dllhost.exe
c:\program files\Intel\Wireless\Bin\ZCfgSvc.exe
c:\windows\system32\wscntfy.exe
c:\windows\system32\igfxsrvc.exe
c:\windows\ehome\ehmsas.exe
c:\program files\Apoint\ApntEx.exe
.
**************************************************************************
.
Completion time: 2009-04-20 12:43 - machine was rebooted
ComboFix-quarantined-files.txt 2009-04-20 16:43

Pre-Run: 25,115,000,832 bytes free
Post-Run: 26,371,268,608 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Windows XP Media Center Edition" /noexecute=optin /fastdetect

Current=2 Default=2 Failed=3 LastKnownGood=4 Sets=1,2,3,4
172 --- E O F --- 2009-04-16 07:03

#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:11:28 AM

Posted 20 April 2009 - 02:29 PM

Flush your system restore, this will delete any restore points that you have but it will also make sure that any malware hiding in system restore will be booted off.

Turn off System Restore:
  • On the Desktop, right-click My Computer.
  • Click Properties.
  • Click the System Restore tab.
  • Check Turn off System Restore.
  • Click Apply, and then click OK.
Restart your computer, turn it back on and create a restore point.

Create a restore point:
  • On the Desktop, right-click My Computer.
  • Click Properties.
  • Click the System Restore tab.
  • UN-Check Turn off System Restore.
  • Click Apply, and then click OK.
====================


Now let's run a full scan with Malwarebytes. This will take a while, so best to start it running and then come back in an hour or so to check.
  • Open Malwarebytes and select the Update tab.
  • Click on the Check for Updates button and allow the program to download the latest updates.
  • Once you have the latest updates, select the Scanner tab.
  • Select "Perform full scan" and click the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

Edited by Buckeye_Sam, 20 April 2009 - 02:29 PM.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 KHL3

KHL3
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:28 PM

Posted 20 April 2009 - 07:22 PM

Ok.
I have run malwarebytes before recently, this stuff is new/keeps coming back.


Malwarebytes' Anti-Malware 1.36
Database version: 2016
Windows 5.1.2600 Service Pack 2

4/20/2009 8:13:43 PM
mbam-log-2009-04-20 (20-13-43).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 157949
Time elapsed: 37 minute(s), 50 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Qoobox\Quarantine\C\WINDOWS\system32\ovfsthphttiqctktuuoxwjkeeaaouolmmlfomm.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\ovfsthxvukqhtpabgyfhafgbqursjptjrvelsm.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.

#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:11:28 AM

Posted 21 April 2009 - 03:14 PM

Those files are quarantined by Combofix, so they're not really new.
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

  • Posted Image

How is your computer behaving now?
Are you getting any indication that you are still infected?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#7 KHL3

KHL3
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:28 PM

Posted 23 April 2009 - 10:34 AM

Those files are quarantined by Combofix, so they're not really new.

  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK
  • Posted Image
How is your computer behaving now?
Are you getting any indication that you are still infected?


Sorry for the delay, I'm happy to say that my computer works pretty well now, and I can start up windows in normal rather than diagnostic mode now. I'm not getting anymore outside indications my computer is infected, no popups or anything like that, but Spyware Doctor tells me that I am still infected with FakeAlert Trojan, an Adware.Websearch_Toolbar, and some kind of generic trojan. I'd rather not have to pay the money for the full version of Spyware Doctor since I'm broke, but I suppose I might have to if there's no other way of getting this stuff off of here.

And thank you again for your help.

Edited by KHL3, 23 April 2009 - 03:28 PM.


#8 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:11:28 AM

Posted 23 April 2009 - 05:53 PM

Can you post the exact info from the infections that Spyware Doctor is detecting?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#9 KHL3

KHL3
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:28 PM

Posted 23 April 2009 - 06:41 PM

Unfortunately I can't, since I can't copy and paste, and for each infection it lists, it lists about a dozen HKEY registries. This is one of them:

HKEY_LOCAL_MACHINE\SYSTEM\Controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4, NextInstance


And then there is about another 2 dozen HKEYs listed for that infection.

#10 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:11:28 AM

Posted 24 April 2009 - 10:01 AM

That particular entry is no threat at all. But I can give you a script to run to remove all of it from your registry if you want to post it all here.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#11 KHL3

KHL3
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:28 PM

Posted 27 April 2009 - 03:47 PM

Ok, I thought that my computer might be alright, but now I am getting pop-up adds again, so it must be a problem with these registries. This is the full read-out Spyware Doctor gives me when I scan.


Trojan.FakeAlert

Registry Values

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4, NextInstance

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, Service

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, Legacy

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, ConfigFlags

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, Class

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, ClassGUID

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, DeviceDesc

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer, NoActiveDesktopChanges

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer, NoSetActiveDesktop


Registry Keys


HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\1.209.4


Registry Value to be Repaired

HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlongon, Userinit

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile, DoNotAllowExceptions




Adware_Websearch_Toolbar
Registry Values

HKEY_USERS\S-1-5-21-84100915-2889600617-3524387958-1006\Software\MyWaySA\SearchAssistantDE, Id

HKEY_USERS\S-1-5-21-84100915-2889600617-3524387958-1006\Software\MyWaySA\SearchAssistantDE, ConfigDateStamp

HKEY_USERS\S-1-5-21-84100915-2889600617-3524387958-1006\Software\MyWaySA\SearchAssistantDE, ABS

HKEY_USERS\S-1-5-21-84100915-2889600617-3524387958-1006\Software\MyWaySA\SearchAssistantDE, DES

HKEY_USERS\S-1-5-21-84100915-2889600617-3524387958-1006\Software\MyWaySA\SearchAssistantDE, eintl

HKEY_USERS\S-1-5-21-84100915-2889600617-3524387958-1006\Software\MyWaySA\SearchAssistantDE, fs

Registry Keys

HKEY_USERS\S-1-5-21-84100915-2889600617-3524387958-1006\Software\MyWaySA\SearchAssistantDE

HKEY_USERS\S-1-5-21-84100915-2889600617-3524387958-1006\Software\MyWaySA



Trojan Generic

Registry Key

HKEY_USERS\S-1-5-21-84100915-2889600617-3524387958-1006\Software\Wget


Thank you for any help.

#12 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:11:28 AM

Posted 27 April 2009 - 05:43 PM

If you are getting popups again then you've got more issues than what's shown here.

Open Notepad, and copy everything in the code box below and paste it into a new notepad file. Change the "Save As Type" to "All Files". Save it as fixme.reg on your Desktop. Make sure there is NO blank line above "REGEDIT4"!

REGEDIT4

[-HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4]
[HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 
"NoActiveDesktopChanges"=-
"NoSetActiveDesktop"=-
[-HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4]
[-HKEY_USERS\S-1-5-21-84100915-2889600617-3524387958-1006\Software\MyWaySA]
[-HKEY_USERS\S-1-5-21-84100915-2889600617-3524387958-1006\Software\Wget]
Locate fixme.reg on your Desktop and double-click on it. When it asks if you want to merge with the registry, click YES.


Reboot your computer.
Now run Spyware Doctor again and let me know what comes up.


Also run a new scan with Malwarebytes and post that log as well.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#13 KHL3

KHL3
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:28 PM

Posted 28 April 2009 - 09:22 AM

I suppose the pop-ups could have just been from the sites I was visiting, but Spyware Doctor said the adware infection could cause pop-ups, so I thought that was causing it. Anyway, the code fix has completely wiped out the Adware_Websearch_Toolbar and the Generic Trojan, so that's good. As for the Trojan.Fake.Alert, Spyware Doctor still flags it in its scan, but the registry values

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer, NoActiveDesktopChanges
and
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer, NoSetActiveDesktop
are gone. The rest of it still shows up, so this is what the readout looks like:

Trojan.FakeAlert

Registry Values

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4, NextInstance

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, Service

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, Legacy

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, ConfigFlags

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, Class

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, ClassGUID

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000, DeviceDesc

Registry Keys


HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\0000

HKEY_LOCAL_MACHINE\System\controlset003\ENUM\ROOT\LEGACY_MSSECURITY1.209.4\1.209.4


Registry Value to be Repaired

HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlongon, Userinit

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile, DoNotAllowExceptions


Malwarebites doesn't find anything.


Malwarebytes' Anti-Malware 1.36
Database version: 2016
Windows 5.1.2600 Service Pack 2

4/28/2009 10:20:18 AM
mbam-log-2009-04-28 (10-20-18).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 156472
Time elapsed: 1 hour(s), 7 minute(s), 9 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#14 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:11:28 AM

Posted 28 April 2009 - 04:40 PM

Download and scan with the free 15 day trial of Counterspy
Save the report when it's finished:
  • Once Counterspy has done scanning,the 'Scan Results' box will appear.
  • Click on 'View Results'.
  • Under (Recommended Action),using the drop down menus at the side of each entry found,set EVERYTHING to Remove.
  • Then click on Take Action.
  • Once everything has been removed,click on View Details.
  • Copy and Paste those details into your next reply here.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#15 KHL3

KHL3
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:28 PM

Posted 28 April 2009 - 11:07 PM

Counterspy did not find anything on deep scan. Do you think it is possible that Spyware Doctor is simply giving me some sort of false positive?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users