Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

all virus programs disabled


  • Please log in to reply
11 replies to this topic

#1 will41

will41

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 07 August 2009 - 11:09 AM

hi everyone i have a virus of some sort. i have been working on this for the last three days,and nothing has worked.
when i try to malware bytes after installing it and updating it it starts the process counts 1 2 3 and shuts down if try to lanch it again it says cannot access device path or file
i have tried remaming it tried it in safe mode nothing works.
downloaded nortons antivirus it will not start up,spy bot search n destroy does the same
so now im looking for some help on what i should try next thanks will

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:06:54 AM

Posted 07 August 2009 - 12:52 PM

Hello let's try Fatdcuk's fix.

Please navigate to the MBAM folder located in the Program Files directory.

Locate MBAM.exe and rename it to winlogon.exe

Once renamed double click on the file to open MBAM and select Quick Scan

At the end of the scan click Remove Selected and then reboot.


Post the scan log. The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.


We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive.
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 will41

will41
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 07 August 2009 - 01:30 PM

when i try to rename mbam on a fresh install of malware bytes to winlog it start the process 1 2 3 and shuts down,if i try to relaunch it it say access denied cant find device, file etc
downloaded rootrepeal install it when it starts the scan it says itializing and it freezes up and i have to reboot,

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:06:54 AM

Posted 07 August 2009 - 01:42 PM

Hello ,,two things one I failed to mention try renaming the ROOTREPEAL icon then run it.
[/b]: Vista users ,, right click on desktop icon and select "Run as Administrator."

Un and reinstall MBAM
NOTE: Before saving MBAM please rename it to zztoy.exe....now save it to your desktop.

EDIT if still no joy,, Run Sophos below then run MBAM..

Please download Sophos Anti-rootkit & save it to your desktop.
alternate download link
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Be sure to print out and read the Sophos Anti-Rookit User Manual and Release Notes.
  • Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
  • Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
  • A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now".
  • Click Yes and allow the driver and its randomly named .tmp file (i.e. F.tmp) to load if asked.
  • If the scan did not start automatically, make sure the following are checked:
    • Running processes
    • Windows Registry
    • Local Hard Drives
  • Click Start scan.
  • Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
  • When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
  • Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
    • Files tagged as Removable: No are not marked for removal and cannot be removed.
    • Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
    • Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
  • Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
  • A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
  • After reboot, a dialog box displays the files you selected for removal and the action taken.
  • Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
  • When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
  • This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.

Edited by boopme, 07 August 2009 - 01:47 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 will41

will41
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 07 August 2009 - 02:39 PM

renaming mbam to zztoy.exe did not work also renamed rootrepeal still frozeup my computer
how do i add my sophos log to my reply
also tried renaming mbam.exe to mbam.bat same results time elapsed counts up to 3 seconds and it shuts down
my sophos log did show anything that i could remove

Edited by will41, 07 August 2009 - 02:50 PM.


#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:06:54 AM

Posted 07 August 2009 - 02:55 PM

go to Start > Run and type or copy/paste: %temp%\sarscan.log
•This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\<username>\Local Settings\Temp\.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 will41

will41
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 07 August 2009 - 03:06 PM

here a nother thing i have noticed when i uninstall malware bytes it uninstalls everything except the file i renamed and i have to boot up in safe mode to delete it

here is my log
Sophos Anti-Rootkit Version 1.3.1 (data 1.08) © 2006 Sophos Plc
Started logging on 8/7/2009 at 15:12:31
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\Windows NT\CurrentVersion\Windows\load
Hidden: registry item \HKEY_USERS\S-1-5-21-1715567821-1580436667-725345543-500\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.com%2Fhserver%2Fpassback%2Fccid%3D2458%2Frandom%3D124597%2Fpageid%3D480639127%2Farea%3Dpb_al_lo_full%2Faamsz%3Drectangle,;ord=1203909930
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows Defender\MP Scheduled Scan:$TXF_DATA
Hidden: file F:\Windows:$TXF_DATA
Hidden: file F:\Windows\System32:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows\DiskDiagnostic:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows\Media Center:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows\MUI:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows\PLA:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows\PLA\System:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows\SideShow:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows Defender:$TXF_DATA
Hidden: file F:\Windows\winsxs:$TXF_DATA
Hidden: file F:\Windows\winsxs\Catalogs:$TXF_DATA
Hidden: file F:\Windows\winsxs\Manifests:$TXF_DATA
Hidden: file F:\Windows\winsxs\Temp:$TXF_DATA
Hidden: file F:\Windows\winsxs\Temp\PendingRenames:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows\SideShow\SessionAgent:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows\SideShow\SystemDataProviders:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows\Media Center\mcupdate:$TXF_DATA
Hidden: file F:\Windows\System32\Tasks\Microsoft\Windows\MUI\LPRemove:$TXF_DATA
Hidden: file F:\Windows\winsxs\Manifests\x86_microsoft.vc80.atl_1fc8b3b9a1e18e3b_8.0.50727.762_none_11ecb0ab9b2caf3c.manifest:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.atl_1fc8b3b9a1e18e3b_8.0.50727.762_none_11ecb0ab9b2caf3c\ATL80.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.atl_1fc8b3b9a1e18e3b_8.0.50727.762_none_11ecb0ab9b2caf3c:$TXF_DATA
Hidden: file F:\Windows\winsxs\Catalogs\a951d53950c367acc37622f0dd619a954df5de2c4ec40296e6636605aa33714a.cat:$TXF_DATA
Hidden: file F:\Windows\winsxs\Manifests\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.762_none_10b2f55f9bffb8f8.manifest:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.762_none_10b2f55f9bffb8f8\msvcr80.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.762_none_10b2f55f9bffb8f8\msvcp80.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.762_none_10b2f55f9bffb8f8\msvcm80.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\Catalogs\88b03fe13d2710ad787d5d96cd0e5cbeda3a61c2a0a2bdc0c0984a48365242e2.cat:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.762_none_10b2f55f9bffb8f8:$TXF_DATA
Hidden: file F:\Windows\winsxs\Manifests\x86_microsoft.vc80.mfc_1fc8b3b9a1e18e3b_8.0.50727.762_none_0c178a139ee2a7ed.manifest:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfc_1fc8b3b9a1e18e3b_8.0.50727.762_none_0c178a139ee2a7ed\mfcm80.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfc_1fc8b3b9a1e18e3b_8.0.50727.762_none_0c178a139ee2a7ed\mfc80u.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfc_1fc8b3b9a1e18e3b_8.0.50727.762_none_0c178a139ee2a7ed\mfc80.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfc_1fc8b3b9a1e18e3b_8.0.50727.762_none_0c178a139ee2a7ed\mfcm80u.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\Catalogs\2d3cb7907b1336ea5889a2b731d5e97ad40903a4efd2287c1c117bc30f208f46.cat:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfc_1fc8b3b9a1e18e3b_8.0.50727.762_none_0c178a139ee2a7ed:$TXF_DATA
Hidden: file F:\Windows\winsxs\Manifests\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_43efccf17831d131.manifest:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_43efccf17831d131\mfc80CHS.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_43efccf17831d131\mfc80CHT.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_43efccf17831d131\mfc80ESP.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_43efccf17831d131\mfc80ENU.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_43efccf17831d131\mfc80DEU.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_43efccf17831d131\mfc80FRA.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_43efccf17831d131\mfc80ITA.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_43efccf17831d131\mfc80JPN.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_43efccf17831d131\mfc80KOR.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\Catalogs\26340819d2ef86080d9001c6f2737d70fd6602ddf4b86b6c26b326ef81cc3342.cat:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_43efccf17831d131:$TXF_DATA
Hidden: file F:\Windows\winsxs\Manifests\x86_microsoft.vc80.openmp_1fc8b3b9a1e18e3b_8.0.50727.762_none_7b33aa7d218504d2.manifest:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.openmp_1fc8b3b9a1e18e3b_8.0.50727.762_none_7b33aa7d218504d2\vcomp.dll:$TXF_DATA
Hidden: file F:\Windows\winsxs\Catalogs\a2492fa83366394b7c17fa6c9650ce5688b887d0ad0ad79743a3422debf4d997.cat:$TXF_DATA
Hidden: file F:\Windows\winsxs\x86_microsoft.vc80.openmp_1fc8b3b9a1e18e3b_8.0.50727.762_none_7b33aa7d218504d2:$TXF_DATA
Hidden: file F:\Windows\winsxs\Manifests\x86_policy.8.0.microsoft.vc80.atl_1fc8b3b9a1e18e3b_8.0.50727.762_none_8e053e8c6967ba9d.manifest:$TXF_DATA
Hidden: file F:\Windows\winsxs\Catalogs\f7bf65ca621d8ad32ead1500a08827be239d0f49d83dc20dabf57d2eb17adbd7.cat:$TXF_DATA
Hidden: file F:\Windows\winsxs\Manifests\x86_policy.8.0.microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.762_none_9193a620671dde41.manifest:$TXF_DATA
Hidden: file F:\Windows\winsxs\Catalogs\dd72f7ab2def5f75f58d01b24643b308750c38685daaed50bcddf61c18460dee.cat:$TXF_DATA
Hidden: file F:\Windows\winsxs\Manifests\x86_policy.8.0.microsoft.vc80.mfc_1fc8b3b9a1e18e3b_8.0.50727.762_none_8a14c0566bec5b24.manifest:$TXF_DATA
Hidden: file F:\Windows\winsxs\Catalogs\91ca50cec42075fff02b366323bf3b45d2053b24544bd12b622b65621bd0edd5.cat:$TXF_DATA
Hidden: file F:\Windows\winsxs\Manifests\x86_policy.8.0.microsoft.vc80.mfcloc_1fc8b3b9a1e18e3b_8.0.50727.762_none_8dd7dea5d5a7a18a.manifest:$TXF_DATA
Hidden: file F:\Windows\winsxs\Catalogs\d14225a52543aa5a9605b00dd7574812bf89c605ebc73a9730e1e386bfc965f8.cat:$TXF_DATA
Hidden: file F:\Windows\winsxs\Manifests\x86_policy.8.0.microsoft.vc80.openmp_1fc8b3b9a1e18e3b_8.0.50727.762_none_abac38a907ee8801.manifest:$TXF_DATA
Hidden: file F:\Windows\winsxs\Catalogs\b3beb16c28db357e654a6b132f59cd48cb95cee949d7b97587f8f02f233f3ce1.cat:$TXF_DATA
Stopped logging on 8/7/2009 at 15:24:01

#8 will41

will41
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 07 August 2009 - 07:17 PM

update this is what i did i have a dual boot system,the problem i been having was on xp so i booted up vista loaded malware and run a scan of my xp drive 2 rootkits found here is the first malware log

Malwarebytes' Anti-Malware 1.40
Database version: 2551
Windows 6.0.6000

8/7/2009 6:56:03 PM
mbam-log-2009-08-07 (18-55-58).txt

Scan type: Full Scan (D:\|E:\|)
Objects scanned: 228292
Time elapsed: 56 minute(s), 47 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
D:\Qoobox\Quarantine\C\WINDOWS\system32\netlogon.dll.vir (Rootkit.Agent) -> No action taken.
D:\WINDOWS\system32\netlogon.dll (Rootkit.Agent) -> No action taken.

then i rebooted started windows xp up installed malware again and now it will finally scan here is th log file from that scan


Malwarebytes' Anti-Malware 1.40
Database version: 2551
Windows 5.1.2600 Service Pack 3

8/7/2009 7:41:32 PM
mbam-log-2009-08-07 (19-41-24).txt

Scan type: Quick Scan
Objects scanned: 102918
Time elapsed: 4 minute(s), 6 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 5
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\ForceClassicControlPanel (Hijack.ControlPanelStyle) -> No action taken.

Registry Data Items Infected:
HKEY_CLASSES_ROOT\exefile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: ("%1" %*) Good: ("%1" %*) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Administrator\Application Data\uveh.exe (Trojan.FakeAlert) -> No action taken.

my question what do i need to do next thanks for all the help

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:06:54 AM

Posted 07 August 2009 - 07:31 PM

If this is your home PC you can set MBAm to ignore all these.
Slow progress but progress.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\ForceClassicControlPanel (Hijack.ControlPanelStyle) -> No action taken.
Indicates that the ability to change control panel display mode has been locked out .

Registry Data Items Infected:
HKEY_CLASSES_ROOT\exefile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: ("%1" %*) Good: ("%1" %*) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter)
Both malware and legit actions can cause and since there is no way to tell which is the cause we choose to help novice users assuming that expert users will understand what the detection(s) indicate and then use the ignore function to hide their custom modifications .

Quoted from MBAM foum.


Next run ATF and SAS:
Note.. SAS doesn't open the registry hives for other user accounts on the system, so scans should be done from each user account.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 will41

will41
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 07 August 2009 - 09:23 PM

here is my super antispyware log

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/07/2009 at 09:48 PM

Application Version : 4.27.1002

Core Rules Database Version : 4045
Trace Rules Database Version: 1985

Scan type : Complete Scan
Total Scan Time : 00:20:20

Memory items scanned : 240
Memory threats detected : 0
Registry items scanned : 7632
Registry threats detected : 8
File items scanned : 16955
File threats detected : 14

Adware.Tracking Cookie
C:\Documents and Settings\Administrator\Cookies\administrator@server.cpmstar[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@mediaplex[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@cdn4.specificclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@doubleclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@toplist[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@apmebf[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ad.m5prod[4].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.bleepingcomputer[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@server.cpmstar[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@bs.serving-sys[1].txt

Trojan.Unknown Origin
HKLM\SYSTEM\CurrentControlSet\Services\vkquwexg
HKLM\SYSTEM\CurrentControlSet\Services\vkquwexg#imagepath
HKLM\SYSTEM\CurrentControlSet\Services\vkquwexg#Group
HKLM\SYSTEM\CurrentControlSet\Services\vkquwexg#start
HKLM\SYSTEM\CurrentControlSet\Services\vkquwexg#type
HKLM\SYSTEM\CurrentControlSet\Services\vkquwexg#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\vkquwexg#ticepjbx
HKLM\SYSTEM\CurrentControlSet\Services\vkquwexg#bcaumijj
is there anything else i need to do at this point thanks for all your help

Edited by will41, 07 August 2009 - 09:58 PM.


#11 will41

will41
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:54 AM

Posted 08 August 2009 - 07:54 AM

i went ahead and created a new retore point hope that was ok everything seems to be working fine right now
all virus protection programs are up and running now thanks for all your help
if theres anything else i need to do just let me know thanks again

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,492 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:06:54 AM

Posted 08 August 2009 - 09:22 AM

You're most welcome, please take a moment to read quietman7's excellent prevention tips in post 17 here
Click>>Tips to protect yourself against malware and reduce the potential for re-infection:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users