Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Possible Virus Infection


  • Please log in to reply
22 replies to this topic

#1 innocntbystndr22

innocntbystndr22

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 17 July 2009 - 06:25 PM

Hello,

I started my computer up and my firewall was turned off. I managed to turn it on again but when I was using internet explorer I can't open any of the hyperlinks when I search Google for anything. Instead I'm redirected to a site called best web choices, I can't see an address anywhere. I've tried to run a system restore but when I am prompted to hit next to perform the restore nothing happens, almost as if the button is deactivated.

Thanks for your time,

InnocntBystndr

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,072 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:54 AM

Posted 17 July 2009 - 06:40 PM

Hello please run these next ..

Run ATF and SAS:

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 innocntbystndr22

innocntbystndr22
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 19 July 2009 - 06:17 PM

Alright, I did everything you told me to and here is my log....

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/19/2009 at 01:43 AM

Application Version : 4.26.1006

Core Rules Database Version : 4003
Trace Rules Database Version: 1943

Scan type : Complete Scan
Total Scan Time : 05:40:34

Memory items scanned : 230
Memory threats detected : 1
Registry items scanned : 5769
Registry threats detected : 5
File items scanned : 82309
File threats detected : 403

Trojan.Agent/Gen-SMSS[Fake]
C:\WINDOWS\SYSTEM32\DRIVERS\SMSS.EXE
C:\WINDOWS\SYSTEM32\DRIVERS\SMSS.EXE
C:\WINDOWS\Prefetch\SMSS.EXE-3A75E173.pf

Adware.Tracking Cookie
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@oasn04.247realmedia[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@bannersulike[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@doubleclick[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@burstnet[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www.burstnet[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.bridgetrack[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@d3.zedo[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.wsod[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@doubleclick[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh uwl@CA26TC2B.txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@casalemedia[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@zedo[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.pointroll[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@mediaplex[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh uwl@CAAKFU0V.txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@apmebf[11].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@112.2o7[11].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@realmedia[11].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@realmedia[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atdmt[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@112.2o7[10].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@112.2o7[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@112.2o7[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@112.2o7[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@112.2o7[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@112.2o7[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@112.2o7[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@112.2o7[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@112.2o7[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@112.2o7[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@247realmedia[10].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@247realmedia[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@247realmedia[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@247realmedia[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@247realmedia[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@247realmedia[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@247realmedia[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@247realmedia[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@247realmedia[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@247realmedia[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@2o7[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@a.websponsors[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@a1.interclick[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@a1.interclick[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@a1.interclick[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.103092804[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.iconadserver[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.yieldmanager[10].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.yieldmanager[11].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.yieldmanager[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.yieldmanager[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.yieldmanager[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.yieldmanager[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.yieldmanager[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.yieldmanager[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.yieldmanager[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.yieldmanager[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.yieldmanager[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ad.zanox[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adbrite[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adbrite[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adinterax[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adlegend[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adlegend[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adlegend[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@admarketplace[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adopt.euroclick[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adopt.specificclick[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adopt.specificclick[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adopt.specificclick[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adopt.specificclick[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adopt.specificclick[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adopt.specificclick[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adopt.specificclick[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adopt.specificclick[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adrevolver[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adrevolver[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adrevolver[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adrevolver[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adrevolver[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.ak.facebook[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.bridgetrack[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.bridgetrack[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.bridgetrack[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.bridgetrack[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.bridgetrack[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.clicksor[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.clicksor[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.gamersmedia[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.imarketservices[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.imarketservices[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.nba[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.nba[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.nba[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.nba[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.nba[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.pointroll[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.pointroll[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.pointroll[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.pointroll[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.sun[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.widgetbucks[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ads.widgetbucks[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adserver.adtechus[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@adserver.adtechus[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@advertising[10].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@advertising[11].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@advertising[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@advertising[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@advertising[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@advertising[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@advertising[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@advertising[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@advertising[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@advertising[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@advertising[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@apmebf[10].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@apmebf[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@apmebf[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@apmebf[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@apmebf[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@apmebf[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@apmebf[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@apmebf[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@apmebf[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@apmebf[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ar.atwola[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ar.atwola[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ar.atwola[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ar.atwola[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ar.atwola[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ar.atwola[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ar.atwola[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ar.atwola[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ar.atwola[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@at.atwola[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@at.atwola[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@at.atwola[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@at.atwola[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@at.atwola[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@at.atwola[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atdmt[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atdmt[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atdmt[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atdmt[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atdmt[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atdmt[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atdmt[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atdmt[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atwola[10].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atwola[11].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atwola[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atwola[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atwola[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atwola[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atwola[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atwola[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atwola[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atwola[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@atwola[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@bridge2.admarketplace[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@bs.serving-sys[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@bs.serving-sys[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@bs.serving-sys[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@bs.serving-sys[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@bs.serving-sys[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@bs.serving-sys[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@bs.serving-sys[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@burstnet[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@burstnet[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@burstnet[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@burstnet[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@casalemedia[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@casalemedia[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@casalemedia[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@casalemedia[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@casalemedia[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn.at.atwola[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn.at.atwola[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn.at.atwola[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn.at.atwola[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn.at.atwola[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn.at.atwola[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn.at.atwola[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn.at.atwola[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn.at.atwola[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn4.specificclick[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn4.specificclick[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cdn4.specificclick[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@cz3.clickzs[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@d3.zedo[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@doubleclick[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@doubleclick[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@doubleclick[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@doubleclick[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@doubleclick[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@doubleclick[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@doubleclick[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@dynamic.media.adrevolver[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@dynamic.media.adrevolver[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@easyadservice[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@easyadservice[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@ehg-hollywoodmedia.hitbox[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@euroclick[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@fastclick[10].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@fastclick[11].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@fastclick[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@fastclick[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@fastclick[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@fastclick[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@fastclick[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@fastclick[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@fastclick[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@fastclick[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@hitbox[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@hulu.112.2o7[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@imrworldwide[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@imrworldwide[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@imrworldwide[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@insightexpressai[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@insightexpressai[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@insightexpressai[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@insightexpressai[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@interclick[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@interclick[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@interclick[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@linksynergy[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media.adrevolver[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media.adrevolver[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media.adrevolver[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media.adrevolver[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media.adrevolver[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media.adrevolver[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media.adrevolver[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media6degrees[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media6degrees[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media6degrees[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media6degrees[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media6degrees[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media6degrees[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@media6degrees[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@mediaplex[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@mediaplex[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@mediaplex[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@mediaplex[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@mediaplex[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@mediaplex[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@more-banners[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@myroitracking[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@myroitracking[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@network.realmedia[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@network.realmedia[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@network.realmedia[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@optimize.indieclick[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@porn[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@questionmarket[10].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@questionmarket[11].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@questionmarket[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@questionmarket[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@questionmarket[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@questionmarket[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@questionmarket[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@questionmarket[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@questionmarket[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@questionmarket[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@questionmarket[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@realmedia[10].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@realmedia[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@realmedia[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@realmedia[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@realmedia[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@realmedia[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@realmedia[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@realmedia[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@realmedia[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@revsci[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@revsci[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@richmedia.yahoo[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@richmedia.yahoo[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@rotator.adjuggler[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@rotator.adjuggler[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@sales.liveperson[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@sales.liveperson[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@serving-sys[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@serving-sys[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@serving-sys[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@serving-sys[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@serving-sys[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@serving-sys[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@serving-sys[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificclick[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificclick[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificclick[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificclick[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificclick[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificclick[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificclick[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificclick[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificclick[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificmedia[10].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificmedia[11].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificmedia[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificmedia[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificmedia[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificmedia[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificmedia[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificmedia[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificmedia[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificmedia[8].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@specificmedia[9].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@sportingnews.122.2o7[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@stat.onestat[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@stat.onestat[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@stat.onestat[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@statcounter[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@statcounter[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@statcounter[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@statcounter[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@statcounter[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@statse.webtrendslive[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@statse.webtrendslive[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@statse.webtrendslive[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@tacoda[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@tacoda[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@tacoda[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@toplist[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@toplist[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@toplist[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@toplist[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@trafficmp[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@trafficmp[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@trafficmp[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@trafficmp[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@trafficmp[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@trafficmp[7].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@tribalfusion[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@tribalfusion[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@tribalfusion[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@tribalfusion[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@tsprotraffic[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www.burstbeacon[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www.burstbeacon[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www.burstbeacon[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www.burstbeacon[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www.burstbeacon[6].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www.burstnet[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www.burstnet[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www.burstnet[3].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www.burstnet[4].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www.burstnet[5].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www3.clickr[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www3.clickr[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@www7.addfreestats[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@zedo[1].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@zedo[2].txt
C:\Documents and Settings\Josh UWL\Cookies\josh_uwl@zedo[3].txt

Rogue.Component/Trace
HKLM\Software\Microsoft\58879DE0
HKLM\Software\Microsoft\58879DE0#58879de0
HKLM\Software\Microsoft\58879DE0#Version
HKLM\Software\Microsoft\58879DE0#58873060
HKLM\Software\Microsoft\58879DE0#58875985

Trojan.Agent/Gen
C:\WINDOWS\system32\lowsec\local.ds
C:\WINDOWS\system32\lowsec\user.ds
C:\WINDOWS\system32\lowsec

Adware.SysGuard/FakeAlert
C:\WINDOWS\SYSGUARD.EXE

Trojan.Agent/Gen-SDRA
C:\WINDOWS\SYSTEM32\SDRA64.EXE

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,072 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:54 AM

Posted 19 July 2009 - 11:06 PM

OK, good scan. run MBAM next post the log and tell me how it's running now.

Next run MBAM (MalwareBytes):

NOTE: Before saving MBAM please rename it to zztoy.exe....now save it to your desktop.

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 innocntbystndr22

innocntbystndr22
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 20 July 2009 - 05:10 PM

Hello,

I ran MBAM and did everything you asked with it, I had to restart my computer and I got a blue screen saying physical memory had to be dumped due to a threat to my computer, i restarted again and the same thing happened, so i started it in safe mode which worked, then I restarted again and it started up properly. It seems like my computer is running a little slower now. There was a process named QTTask.exe that was using about half of the virtual memory on my computer, I uninstalled quicktime and it went away after a restart. My computer is also having a difficult time connecting to the wireless network in my apartment, i've had to connect to a different network for this reply.

here is my MBAM log

Malwarebytes' Anti-Malware 1.39
Database version: 2468
Windows 5.1.2600 Service Pack 3

7/20/2009 4:42:25 PM
mbam-log-2009-07-20 (16-42-25).txt

Scan type: Quick Scan
Objects scanned: 95596
Time elapsed: 10 minute(s), 27 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 1
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\AvScan (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.Userinit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\drivers\smss.exe) Good: (Userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\Josh UWL\local settings\temp\f.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\str.sys (Rootkit.Agent) -> Delete on reboot.

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,072 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:54 AM

Posted 20 July 2009 - 07:38 PM

Hello, you have botnet and Rootkits on board .

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.


Let's see what show here..
Next Please install RootRepeal
Note: Vista users ,, right click on desktop icon and select "Run as Administrator."

Go HERE, and download RootRepeal.zip to your Desktop.
Tutorial with images ,if needed >> L@@K.
Unzip that,(7-zip tool if needed) and then click RootRepeal.exe to open the scanner.
Next click on the Report tab, now click on Scan. A Window will open asking what to include in the scan. Check all of the below and then click OK.

Drivers
Files
Processes
SSDT
Stealth Objects
Hidden Services


Now you'll be asked which drive to scan. Check C: and click OK again and the scan will start. Please be patient as the scan runs. When the scan has finished, click on Save Report.
Name the log RootRepeal.txt and save it to your Documents folder (it should automatically save it there).
Please copy and paste that into your next reply.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 innocntbystndr22

innocntbystndr22
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 26 July 2009 - 10:33 PM

I've been trying to download RootRepeal, but every time i try, it says the bandwidth has been exceeded on the site...any suggestions

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,072 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:54 AM

Posted 27 July 2009 - 09:31 AM

Hi ,if that is still busy try
http://ad13.geekstogo.com/RootRepeal.rar
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 innocntbystndr22

innocntbystndr22
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 27 July 2009 - 11:19 AM

I've downloaded the rootrepeal.rar file, but I can't unzip it. I've also downloaded the 7zip program but I can't seem to get it to unzip the file either. Maybe I'm using it wrong...the rootrepeal file doesn't seem to be recognized as a compressed file by my computer and appears as just a general file, when i try to activate it i'm prompted with a menu to select a program to run this file with. sorry this is taking so long.

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,072 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:54 AM

Posted 27 July 2009 - 11:44 AM

Hmmm Let's try another one.
Before performing a Anti rootkit scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.

Disconnect from the Internet or physically unplug you Internet cable connection.
Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
Temporarily disable your anti-virus and real-time anti-spyware protection.
After starting the scan, do not use the computer until the scan has completed.
When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.

Please navigate to the download page of Avira AntiRootkit and click on Download to save it to your Destop.
  • You should now find a file called: antivir_rootkit.zip on your Desktop.
  • Extract the file to your Desktop (you may then delete the zip file).
  • You should now have a folder with Setup.exe and some other files within it on your Desktop.
  • Double-click Setup.exe.
  • Click Next.
  • Highlight the radio button to acceppt the license agreement and then click Next.
  • Then click Next and Install to finalise the installation process.
  • Click Finish (you may now also delete the folder with the extracted files from the zip archive)
You successfully installed Avira AntiRootkit!
  • Please now navigate to Start > All Programs > Avira RootKit Detection. Then select: Avira RootKit Detection
  • Click OK when a message window pops up
  • Click Start scan and let it run
  • Click View report and copy the entire contents into your next reply.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 innocntbystndr22

innocntbystndr22
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 27 July 2009 - 11:55 AM

Alright, i wasn't sure what you wanted me to scan with so i just downloaded the folder, i unzipped the folder I downloaded for Avira AntiRootkit. I don't see a SetUp.exe file, when i open the unzipped folder the only thing in the folder is the actual avira rootkit tool, i tried to run that but i'm given a message saying "Application has failed to start because the application configuration is incorrect. Reinstalling the application may fix this problem".

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,072 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:54 AM

Posted 27 July 2009 - 12:18 PM

Ok, maybe there is still something else in the way.. Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Try Rootrepeal again.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 innocntbystndr22

innocntbystndr22
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 27 July 2009 - 01:52 PM

Okay, I was able to run the scan, and I've put the log below, I rebooted and I was able to get RootRepeal to work except when i select my C drive it says that it can't read the boot sector and it also says i should try to adjust the disk access level in options...would you like me to do this and if so what level should i put it at, it's currently running at Special Level.

#14 innocntbystndr22

innocntbystndr22
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 27 July 2009 - 01:54 PM

Sorry forgot the log...

Malwarebytes' Anti-Malware 1.39
Database version: 2512
Windows 5.1.2600 Service Pack 3

7/27/2009 12:42:08 PM
mbam-log-2009-07-27 (12-42-08).txt

Scan type: Quick Scan
Objects scanned: 94907
Time elapsed: 9 minute(s), 57 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
\\?\globalroot\systemroot\system32\geyekrnxwbvfwk.dll (Trojan.TDSS) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
\\?\globalroot\systemroot\system32\geyekrnxwbvfwk.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\str.sys (Rootkit.Agent) -> Delete on reboot.

#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,072 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:54 AM

Posted 27 July 2009 - 02:04 PM

Let's start with High.
lick Settings - Options
Set the Disk Access Level slider in the general tab to High
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users