Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Very nasty virus keeps coming back - No Matter What


  • This topic is locked This topic is locked
8 replies to this topic

#1 hhmorgan

hhmorgan

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:02:15 PM

Posted 13 August 2009 - 09:38 PM

I've been working on getting a very nasty virus off my WinXP Home Edition PC.

I initially could not get anything to run. The virus had done the following:
1) Disabled all antivirus software I could run (including Spybot Search & Destroy, MBAM, SuperAntiSpyware, Combofix, Avast to name a few)
2) Windows Update would not run - error message that it could not run in Safe Mode (I was logged in as Administrator in normal boot up)
3) Permissions were changed on many of my files by adding a new group and changing the normal administrator privileges.
4) Changed registry keys to always get safe mode enabled while logged in as Administrator thus not allowing many critical programs to run.

In any case - I was able to get the computer back to running but I still cannot find the virus because it is still lurking and reloads randomly (or seemingly randomly). I've run out of options so I'm posting here to get some help finding where this thing is actually hidden.

Last MBAM log before everything was back to normal (at least for a couple days)

Malwarebytes' Anti-Malware 1.39
Database version: 2516
Windows 5.1.2600 Service Pack 2

8/9/2009 11:33:00 PM
mbam-log-2009-08-09 (23-33-00).txt

Scan type: Quick Scan
Objects scanned: 144868
Time elapsed: 9 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 6
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\dpcupdater.dpcupdater (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\dpcupdater.dpcupdater.1 (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\wtlhelper.wtlhelper (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\wtlhelper.wtlhelper.1 (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Windows AntiVirus Pro (Rogue.WindowsAntiVirusPro) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\idstrf (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WINID (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\SYSTEM32\D.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\SYSTEM32\E.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\SYSTEM32\F.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

Can someone help me find this one once and for all!

Thanks in advance.

BC AdBot (Login to Remove)

 


m

#2 garmanma

garmanma

    Computer Masochist


  • Staff Emeritus
  • 27,809 posts
  • OFFLINE
  •  
  • Location:Cleveland, Ohio
  • Local time:03:15 PM

Posted 13 August 2009 - 09:45 PM

Please uninstall Mbam and download the newer version 1.40
Update it and run a full scan
------------------------------

Then run ATF and SAS


ATF
Please download ATF Cleaner by Atribune & save it to your desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

------------------------------------

SAS,may take a long time to scan
Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
------------------------------

Follow it up with a DR Web scan


Please download Dr.Web CureIt, the free version & save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
  • When complete, click Select All, then choose Cure > Move incurable.
    (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • Now put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and UNcheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
  • Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#3 hhmorgan

hhmorgan
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:02:15 PM

Posted 16 August 2009 - 11:36 AM

Ok - That Took a Very Long Time. Here's the logs.


MBAM Log:

Malwarebytes' Anti-Malware 1.40
Database version: 2618
Windows 5.1.2600 Service Pack 2

8/14/2009 12:24:56 AM
mbam-log-2009-08-14 (00-24-56).txt

Scan type: Full Scan (C:\|)
Objects scanned: 344519
Time elapsed: 1 hour(s), 30 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 9

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Program Files\Yahoo!\Yahoo! Desktop Search\filts800a_s.exe (Adware.BHO) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\ydhlk.exe.vir (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\RECYCLER\S-1-5-21-4790227634-6186841935-251134938-1911\svchost.exe.vir (Worm.P2P) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\SYSTEM32\netlogon.dll.vir (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2989\A0706714.exe (Worm.P2P) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2989\A0706725.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2989\A0706741.dll (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2991\A0707876.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2991\A0707877.dll (Adware.MyWeb) -> Quarantined and deleted successfully.


SAS Log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/14/2009 at 02:56 AM

Application Version : 4.26.1006

Core Rules Database Version : 3952
Trace Rules Database Version: 1894

Scan type : Complete Scan
Total Scan Time : 02:22:13

Memory items scanned : 231
Memory threats detected : 0
Registry items scanned : 8562
Registry threats detected : 1
File items scanned : 47464
File threats detected : 4

Adware.IE Plugin Variant
HKU\S-1-5-21-1844237615-1708537768-854245398-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{01F44A8A-8C97-4325-A378-76E68DC4AB2E}

Trojan.ESDWindowsIE
C:\PROGRAM FILES\MM052202\WINDOWSIE.DLL

Unclassified.Unknown Origin/System
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2989\A0706722.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2989\A0706723.EXE

Trojan.Smitfraud Variant
C:\SYSTEM VOLUME INFORMATION\_RESTORE{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2990\A0706838.DLL


Dr WebCure It Log:

gtdownlr_134.ocx;c:\windows\system32;Adware.Gdown;Incurable.Deleted.;
vnc-4_1_2-x86_win32.exe\data005;C:\Documents and Settings\All Users\Documents\Downloads\WinVNC\vnc-4_1_2-x86_win32.exe;Program.RemoteAdmin.51;;
vnc-4_1_2-x86_win32.exe;C:\Documents and Settings\All Users\Documents\Downloads\WinVNC;Archive contains infected objects;Moved.;
TIZUPD.BIN\data002;C:\Documents and Settings\BRIE\Application Data\TIZUPD.BIN;Adware.MediaTicket.origin;;
TIZUPD.BIN\data003;C:\Documents and Settings\BRIE\Application Data\TIZUPD.BIN;Trojan.DownLoader.3219;;
TIZUPD.BIN;C:\Documents and Settings\BRIE\Application Data;Archive contains infected objects;Moved.;
cursorcafewrap_tb.exe/data002\data003;C:\Documents and Settings\BRIE\My Documents\cursorcafewrap_tb.exe/data002;Adware.Comet;;
data002;C:\Documents and Settings\BRIE\My Documents;Archive contains infected objects;;
cursorcafewrap_tb.exe;C:\Documents and Settings\BRIE\My Documents;Archive contains infected objects;Moved.;
cursorcafewrap_tb2.exe/data002\data003;C:\Documents and Settings\BRIE\My Documents\cursorcafewrap_tb2.exe/data002;Adware.Comet;;
data002;C:\Documents and Settings\BRIE\My Documents;Archive contains infected objects;;
cursorcafewrap_tb2.exe;C:\Documents and Settings\BRIE\My Documents;Archive contains infected objects;Moved.;
CursorManiaSetup2.0.3.26.exe;C:\Documents and Settings\BRIE\My Documents;Trojan.MulDrop.1326;Deleted.;
PUPPIES.EXE\data002;C:\Documents and Settings\BRIE\My Documents\PUPPIES.EXE;Adware.Comet;;
PUPPIES.EXE;C:\Documents and Settings\BRIE\My Documents;Archive contains infected objects;Moved.;
screen saver.exe\data002;C:\Documents and Settings\BRIE\My Documents\screen saver.exe;Adware.Comet;;
screen saver.exe;C:\Documents and Settings\BRIE\My Documents;Archive contains infected objects;Moved.;
SmileyCentralSetup2.0.3.20 hope it worls.exe;C:\Documents and Settings\BRIE\My Documents;Trojan.MulDrop.1326;Deleted.;
SmileyCentralSetup2.0.3.20.exe;C:\Documents and Settings\BRIE\My Documents;Trojan.MulDrop.1326;Deleted.;
SmileyCentralSetup2.0.3.26.exe;C:\Documents and Settings\BRIE\My Documents;Trojan.MulDrop.1326;Deleted.;
smileys!!.exe;C:\Documents and Settings\BRIE\My Documents;Trojan.MulDrop.1326;Deleted.;
TIZUPD.BIN\data002;C:\Documents and Settings\HMORGAN\Application Data\TIZUPD.BIN;Trojan.PurityAd.origin;;
TIZUPD.BIN\data003;C:\Documents and Settings\HMORGAN\Application Data\TIZUPD.BIN;Trojan.PurityAd;;
TIZUPD.BIN;C:\Documents and Settings\HMORGAN\Application Data;Archive contains infected objects;Moved.;
fixthis.exe\SDFix\apps\Process.exe;C:\Documents and Settings\HMORGAN\Desktop\fixthis.exe;Tool.Prockill;;
fixthis.exe;C:\Documents and Settings\HMORGAN\Desktop;Archive contains infected objects;Moved.;
AIM95.EXE\data034;C:\Program Files\AIM95\AIM95.EXE;Adware.Aws;;
AIM95.EXE;C:\Program Files\AIM95;Archive contains infected objects;Moved.;
WxBug.EXE;C:\Program Files\AIM95\Sysfiles;Adware.Aws;;
cursorcafe.exe\data003;C:\Program Files\CursorCafe\BIN\cursorcafe.exe;Adware.Comet;;
cursorcafe.exe;C:\Program Files\CursorCafe\BIN;Archive contains infected objects;Moved.;
CursorCafeInst.dll;C:\Program Files\CursorCafe\installer\BIN;Adware.Comet;;
npCouponPrinter.dll;C:\Program Files\Mozilla Firefox\PLUGINS;Adware.Coupons.34;;
NANNYUP.EXE/data002/setup.cab\data006;C:\Program Files\Nanny\NANNYUP.EXE/data002/setup.cab;Modification of BackDoor.Generic.1253;;
setup.cab;C:\Program Files\Nanny;Container contains infected objects;;
data002;C:\Program Files\Nanny;Archive contains infected objects;;
NANNYUP.EXE;C:\Program Files\Nanny;Container contains infected objects;Moved.;
NPCLNTAX.DLL;C:\Program Files\Netscape\Netscape 6\Plugins;Adware.Zango;;
vncviewer.exe;C:\Program Files\RealVNC\VNC4;Program.RemoteAdmin.51;;
Install.exe.vir\kans.reg;C:\Qoobox\Quarantine\C\Install.exe.vir;Trojan.LowZones;;
Install.exe.vir\kansup.reg;C:\Qoobox\Quarantine\C\Install.exe.vir;Trojan.LowZones;;
Install.exe.vir;C:\Qoobox\Quarantine\C;Archive contains infected objects;Moved.;
ScreensaversInst.dll.vir;C:\Qoobox\Quarantine\C\Program Files\Screensavers.com\Installer\BIN;Adware.Comet;;
COUPON~1.OCX.vir;C:\Qoobox\Quarantine\C\WINDOWS;Adware.Coupons.34;;
DXVWHAFX.EXE.vir;C:\Qoobox\Quarantine\C\WINDOWS\SYSTEM32;Trojan.Qhost.45065;Deleted.;
DXVWIAWU.EXE.vir;C:\Qoobox\Quarantine\C\WINDOWS\SYSTEM32;Trojan.Qhost.45065;Deleted.;
Process.exe;C:\SDFix\apps;Tool.Prockill;;
A0706710.exe\kans.reg;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2989\A0706710.exe;Trojan.LowZones;;
A0706710.exe\kansup.reg;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2989\A0706710.exe;Trojan.LowZones;;
A0706710.exe;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2989;Archive contains infected objects;Moved.;
A0706711.dll;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2989;Adware.Comet;;
A0706715.ocx;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2989;Adware.Coupons.34;;
A0707879.EXE;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2991;Adware.Rebates;;
A0707880.exe;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2991;Adware.Rebates;;
A0707881.exe;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP2991;Adware.Rebates;;
A0710168.exe;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3002;Tool.Prockill;;
A0710235.DLL;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3002;Trojan.Spambot;Deleted.;
A0710312.exe;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3002;Tool.Prockill;;
A0710700.ocx;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Adware.Gdown;;
A0710701.exe\SDFix\apps\Process.exe;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710701.exe;Tool.Prockill;;
A0710701.exe;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Archive contains infected objects;Moved.;
A0710703.exe\data003;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710703.exe;Adware.Comet;;
A0710703.exe;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Archive contains infected objects;Moved.;
A0710704.EXE/data002/setup.cab\data006;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710704.EXE/data002/setup.cab;Modification of BackDoor.Generic.1253;;
setup.cab;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Container contains infected objects;;
data002;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Archive contains infected objects;;
A0710704.EXE;C:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Container contains infected objects;Moved.;
C2H3;C:\WINDOWS\SYSTEM32;Trojan.DownLoad.43975;Deleted.;
OleSvr.exe;C:\WINDOWS\SYSTEM32;Modification of BackDoor.Generic.1253;Moved.;
SvrOle.exe;C:\WINDOWS\SYSTEM32;Modification of BackDoor.Generic.1253;Moved.;
Install_AIM.exe\data041;H:\Downloads\aolim\Install_AIM.exe;Adware.Aws;;
Install_AIM.exe;H:\Downloads\aolim;Archive contains infected objects;Moved.;
backup-20041003-120432-484.dll;H:\Downloads\hijack\backups;Adware.Humpty;;
backup-20041003-124313-263.dll;H:\Downloads\hijack\backups;Adware.Humpty;;
backup-20041121-165800-422.dll;H:\Downloads\hijack\backups;Adware.Humpty;;
nanny2003.exe/data002/setup.cab\data029;H:\Downloads\nanny2003\nanny2003.exe/data002/setup.cab;Modification of BackDoor.Generic.1253;;
setup.cab;H:\Downloads\nanny2003;Container contains infected objects;;
data002;H:\Downloads\nanny2003;Archive contains infected objects;;
nanny2003.exe;H:\Downloads\nanny2003;Container contains infected objects;Moved.;
dolphine scren sava.exe\data065;H:\Downloads\QuickTime\dolphine scren sava.exe;Adware.SaveNow;;
dolphine scren sava.exe\data066;H:\Downloads\QuickTime\dolphine scren sava.exe;Adware.SaveNow;;
dolphine scren sava.exe\data067;H:\Downloads\QuickTime\dolphine scren sava.exe;Adware.SaveNow;;
dolphine scren sava.exe\data068;H:\Downloads\QuickTime\dolphine scren sava.exe;Adware.NewDotNet;;
dolphine scren sava.exe/data069\WhAgent.exe;H:\Downloads\QuickTime\dolphine scren sava.exe/data069;Adware.WebHancer;;
dolphine scren sava.exe/data069\whInstaller.exe;H:\Downloads\QuickTime\dolphine scren sava.exe/data069;Adware.WebHancer;;
dolphine scren sava.exe/data069\WhSurvey.exe;H:\Downloads\QuickTime\dolphine scren sava.exe/data069;Adware.WebHancer;;
dolphine scren sava.exe/data069\Webhdll.dll;H:\Downloads\QuickTime\dolphine scren sava.exe/data069;Adware.WebHancer;;
dolphine scren sava.exe/data069\whiehlpr.dll;H:\Downloads\QuickTime\dolphine scren sava.exe/data069;Adware.WebHancer;;
data069;H:\Downloads\QuickTime;Archive contains infected objects;;
dolphine scren sava.exe\data070;H:\Downloads\QuickTime\dolphine scren sava.exe;Program.ProxyOSS;;
dolphine scren sava.exe;H:\Downloads\QuickTime;Archive contains infected objects;Moved.;
fish screen sava.exe\data065;H:\Downloads\QuickTime\fish screen sava.exe;Adware.SaveNow;;
fish screen sava.exe\data066;H:\Downloads\QuickTime\fish screen sava.exe;Adware.SaveNow;;
fish screen sava.exe\data067;H:\Downloads\QuickTime\fish screen sava.exe;Adware.SaveNow;;
fish screen sava.exe\data068;H:\Downloads\QuickTime\fish screen sava.exe;Adware.NewDotNet;;
fish screen sava.exe/data069\WhAgent.exe;H:\Downloads\QuickTime\fish screen sava.exe/data069;Adware.WebHancer;;
fish screen sava.exe/data069\whInstaller.exe;H:\Downloads\QuickTime\fish screen sava.exe/data069;Adware.WebHancer;;
fish screen sava.exe/data069\WhSurvey.exe;H:\Downloads\QuickTime\fish screen sava.exe/data069;Adware.WebHancer;;
fish screen sava.exe/data069\Webhdll.dll;H:\Downloads\QuickTime\fish screen sava.exe/data069;Adware.WebHancer;;
fish screen sava.exe/data069\whiehlpr.dll;H:\Downloads\QuickTime\fish screen sava.exe/data069;Adware.WebHancer;;
data069;H:\Downloads\QuickTime;Archive contains infected objects;;
fish screen sava.exe\data070;H:\Downloads\QuickTime\fish screen sava.exe;Program.ProxyOSS;;
fish screen sava.exe;H:\Downloads\QuickTime;Archive contains infected objects;Moved.;
tfinstall.exe/data036\data064;H:\Downloads\Threatfire\tfinstall.exe/data036;Modification of SGWW.Simbioz.290;;
data036;H:\Downloads\Threatfire;Container contains infected objects;;
tfinstall.exe;H:\Downloads\Threatfire;Archive contains infected objects;Moved.;
A0710707.exe\data041;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710707.exe;Adware.Aws;;
A0710707.exe;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Archive contains infected objects;Moved.;
A0710708.exe/data002/setup.cab\data029;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710708.exe/data002/setup.cab;Modification of BackDoor.Generic.1253;;
setup.cab;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Container contains infected objects;;
data002;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Archive contains infected objects;;
A0710708.exe;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Container contains infected objects;Moved.;
A0710709.exe\data065;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710709.exe;Adware.SaveNow;;
A0710709.exe\data066;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710709.exe;Adware.SaveNow;;
A0710709.exe\data067;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710709.exe;Adware.SaveNow;;
A0710709.exe\data068;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710709.exe;Adware.NewDotNet;;
A0710709.exe/data069\WhAgent.exe;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710709.exe/data069;Adware.WebHancer;;
A0710709.exe/data069\whInstaller.exe;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710709.exe/data069;Adware.WebHancer;;
A0710709.exe/data069\WhSurvey.exe;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710709.exe/data069;Adware.WebHancer;;
A0710709.exe/data069\Webhdll.dll;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710709.exe/data069;Adware.WebHancer;;
A0710709.exe/data069\whiehlpr.dll;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710709.exe/data069;Adware.WebHancer;;
data069;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Archive contains infected objects;;
A0710709.exe\data070;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710709.exe;Program.ProxyOSS;;
A0710709.exe;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Archive contains infected objects;Moved.;
A0710710.exe\data065;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710710.exe;Adware.SaveNow;;
A0710710.exe\data066;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710710.exe;Adware.SaveNow;;
A0710710.exe\data067;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710710.exe;Adware.SaveNow;;
A0710710.exe\data068;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710710.exe;Adware.NewDotNet;;
A0710710.exe/data069\WhAgent.exe;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710710.exe/data069;Adware.WebHancer;;
A0710710.exe/data069\whInstaller.exe;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710710.exe/data069;Adware.WebHancer;;
A0710710.exe/data069\WhSurvey.exe;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710710.exe/data069;Adware.WebHancer;;
A0710710.exe/data069\Webhdll.dll;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710710.exe/data069;Adware.WebHancer;;
A0710710.exe/data069\whiehlpr.dll;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710710.exe/data069;Adware.WebHancer;;
data069;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Archive contains infected objects;;
A0710710.exe\data070;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009\A0710710.exe;Program.ProxyOSS;;
A0710710.exe;H:\System Volume Information\_restore{0FF6464F-1EAB-4F6F-BE96-2B2090264E1C}\RP3009;Archive contains infected objects;Moved.;
tizupd.bin\data002;I:\Chelsie Document folder\Application Data\tizupd.bin;Trojan.PurityAd.origin;;
tizupd.bin\data003;I:\Chelsie Document folder\Application Data\tizupd.bin;Trojan.PurityAd;;
tizupd.bin;I:\Chelsie Document folder\Application Data;Archive contains infected objects;Moved.;
FILE0002.CHK;I:\Found Files\FOUND.003;Trojan.PWS.Favorit;Deleted.;
FILE0042.CHK\cd_clint.dll;I:\Found Files\FOUND.003\FILE0042.CHK;Adware.Cydoor;;
FILE0042.CHK\cd_htm.dll;I:\Found Files\FOUND.003\FILE0042.CHK;Adware.Cydoor;;
FILE0042.CHK;I:\Found Files\FOUND.003;Archive contains infected objects;Moved.;
FILE0043.CHK\data001;I:\Found Files\FOUND.003\FILE0043.CHK;Trojan.PWS.Favorit;;
FILE0043.CHK;I:\Found Files\FOUND.003;Container contains infected objects;Moved.;
FILE0044.CHK;I:\Found Files\FOUND.003;Adware.NewDotNet;;
FILE0047.CHK\dlder.exe;I:\Found Files\FOUND.003\FILE0047.CHK;BackDoor.Grokster;;
FILE0047.CHK;I:\Found Files\FOUND.003;Archive contains infected objects;Moved.;
FILE0049.CHK\bdedetect1.dll;I:\Found Files\FOUND.003\FILE0049.CHK;Win32.HLLM.Limar;;
FILE0049.CHK;I:\Found Files\FOUND.003;Archive contains infected objects;Moved.;
FILE0022.CHK;I:\Found Files\FOUND.004;Adware.NewDotNet;;
FILE0023.CHK;I:\Found Files\FOUND.004;Trojan.PWS.Favorit;Deleted.;
FILE0029.CHK;I:\Found Files\FOUND.004;Adware.Cydoor;;
FILE0051.CHK\data001;I:\Found Files\FOUND.004\FILE0051.CHK;Trojan.PWS.Favorit;;
FILE0051.CHK;I:\Found Files\FOUND.004;Container contains infected objects;Moved.;
FILE0052.CHK;I:\Found Files\FOUND.004;Adware.NewDotNet;;
FILE0055.CHK\dlder.exe;I:\Found Files\FOUND.004\FILE0055.CHK;BackDoor.Grokster;;
FILE0055.CHK;I:\Found Files\FOUND.004;Archive contains infected objects;Moved.;
FILE0057.CHK\bdedetect1.dll;I:\Found Files\FOUND.004\FILE0057.CHK;Win32.HLLM.Limar;;
FILE0057.CHK;I:\Found Files\FOUND.004;Archive contains infected objects;Moved.;


What Next?

#4 hhmorgan

hhmorgan
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:02:15 PM

Posted 16 August 2009 - 01:01 PM

Ok - That Took a Very Long Time. Here's the logs.


:thumbsup:
Also - Here's a Rootrepeal Log also -

ROOTREPEAL AD, 2007-2009
==================================================
Scan Start Time: 2009/08/16 13:56
Program Version: Version 1.3.3.0
Windows Version: Windows XP SP2
==================================================

Hidden/Locked Files
-------------------
Path: C:\found.000\dir0000.chk
Status: Invisible to the Windows API!

Path: C:\found.000\dir0001.chk
Status: Invisible to the Windows API!

Path: C:\found.000\FILE0000.CHK
Status: Visible to the Windows API, but not on disk.

Path: C:\found.000\FILE0001.CHK
Status: Visible to the Windows API, but not on disk.

Path: C:\found.000\FILE0002.CHK
Status: Visible to the Windows API, but not on disk.

Path: C:\found.000\FILE0003.CHK
Status: Visible to the Windows API, but not on disk.

Path: C:\found.000\FILE0004.CHK
Status: Visible to the Windows API, but not on disk.

Path: C:\found.000\FILE0005.CHK
Status: Visible to the Windows API, but not on disk.

Path: C:\WINDOWS\$HF_MIG$\{29F8DDC1-9487-49b8-B27E-3E0C3C1298FF}
Status: Locked to the Windows API!

Path: C:\WINDOWS\SYSTEM32\dotelcab.dll
Status: Locked to the Windows API!

Path: C:\WINDOWS\SYSTEM32\3dipmin32.dll
Status: Locked to the Windows API!

Path: C:\WINDOWS\SYSTEM32\v32icdev.dll
Status: Locked to the Windows API!

Path: C:\WINDOWS\SYSTEM32\webekmak.dll
Status: Locked to the Windows API!

Path: C:\WINDOWS\SYSTEM32\winaxcab.exe
Status: Locked to the Windows API!

Path: C:\WINDOWS\SYSTEM32\IPVEXVOX.DLL
Status: Locked to the Windows API!

Path: \\?\C:\found.000\dir0000.chk\*
Status: Could not enumerate files with the Windows API (0x00000003)!


Path: C:\found.000\dir0000.chk\07
Status: Invisible to the Windows API!

Path: \\?\C:\found.000\dir0001.chk\*
Status: Could not enumerate files with the Windows API (0x00000003)!


Path: C:\found.000\dir0001.chk\CRSWPP.LOG
Status: Invisible to the Windows API!

Path: c:\windows\system32\drivers\fidbox.dat
Status: Size mismatch (API: 223909920, Raw: 223907872)

Path: \\?\C:\found.000\dir0000.chk\07\*
Status: Could not enumerate files with the Windows API (0x00000003)!


Path: C:\found.000\dir0000.chk\07\50
Status: Invisible to the Windows API!

Path: C:\Program Files\MozyHome\Data\filter_raw.log
Status: Invisible to the Windows API!

Path: C:\Program Files\MozyHome\Data\filter_raw.log.1
Status: Visible to the Windows API, but not on disk.

Path: \\?\C:\found.000\dir0000.chk\07\50\*
Status: Could not enumerate files with the Windows API (0x00000003)!


Path: C:\found.000\dir0000.chk\07\50\11
Status: Invisible to the Windows API!

Path: \\?\C:\found.000\dir0000.chk\07\50\11\*
Status: Could not enumerate files with the Windows API (0x00000003)!


Path: C:\found.000\dir0000.chk\07\50\11\507501190.swf
Status: Invisible to the Windows API!

Path: \\?\C:\found.000\dir0000.chk\07\50\11\507501190.swf\*
Status: Could not enumerate files with the Windows API (0x00000003)!


Path: C:\found.000\dir0000.chk\07\50\11\507501190.swf\MultiStoryModule_msm.sol
Status: Invisible to the Windows API!

Path: D:\RECYCLER\NPROTECT
Status: Invisible to the Windows API!

Path: G:\RECYCLER\NPROTECT
Status: Invisible to the Windows API!

Path: H:\RECYCLER\NPROTECT
Status: Invisible to the Windows API!

Path: I:\RECYCLER\NPROTECT
Status: Invisible to the Windows API!

Path: J:\RECYCLER\NPROTECT
Status: Invisible to the Windows API!


Hope that helps get rid of this thing once and for all!!
Thanks in advance for the help.

Edited by hhmorgan, 16 August 2009 - 06:29 PM.


#5 hhmorgan

hhmorgan
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:02:15 PM

Posted 16 August 2009 - 06:37 PM

Garmanma - Are you there?

It took me a while to run full scan on my computer.

Hope to hear from you soon after reviewing the logs.

Edited by hhmorgan, 16 August 2009 - 06:53 PM.


#6 garmanma

garmanma

    Computer Masochist


  • Staff Emeritus
  • 27,809 posts
  • OFFLINE
  •  
  • Location:Cleveland, Ohio
  • Local time:03:15 PM

Posted 16 August 2009 - 07:40 PM

Dr Web sure found quite a bit
Is it running any better for you?

Please rescan with Dr. Web one more time and then a quick mbam scan
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#7 hhmorgan

hhmorgan
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:02:15 PM

Posted 16 August 2009 - 07:46 PM

Yes - Currently seems to be running better.

Dr WebCure It took 18hours to run a Complete Scan of all my drives. Can I run a quickscan or at least a complete scan on just the C: drive?

Also, here's a copy of Sopho's Rootkit - I see a couple hidden files that also showed up in the RootRepeal that I can't find data on via the web.


Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 8/16/2009 at 19:51:40 PM
User "hmorgan" on computer "HARLEYS-HOME"
Windows version 5.1 SP 2.0 Service Pack 2 build 2600 SM=0x300 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Stopped logging on 8/16/2009 at 19:51:51 PM


Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 8/16/2009 at 19:51:56 PM
User "hmorgan" on computer "HARLEYS-HOME"
Windows version 5.1 SP 2.0 Service Pack 2 build 2600 SM=0x300 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Hidden: registry item \HKEY_USERS\S-1-5-18\Printers\DevModes2\Epson Stylus COLOR 600 ESC/P 2
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Extensions\CmdMapping\{c95fe080-8f5d-11d2-a20b-00aa003c157a}
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\Microsoft Reference\Bookshelf\99
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012001121420011215
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\Windows NT\CurrentVersion\Devices\Epson Stylus COLOR 600 ESC/P 2
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Epson Stylus COLOR 600 ESC/P 2
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Netscape\Netscape Navigator\Suffixes\video/x-ivf
Hidden: registry item \HKEY_USERS\S-1-5-18\Software\Netscape\Netscape Navigator\Viewers\video/x-ivf
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\Temp\xxx\xxx.exe
Hidden: file C:\Documents and Settings\All Users\Documents\Dell Backup\Documents and Settings\Harley Morgan\My Documents\03_02_2002\RealMoney_com Hasbro's Still a

Has-Been_files\comment;cmty=merchantofvaluerm;ptile=2;sz=120x600;ord=044129_files\insiderinsights_120x600.gif
Hidden: file C:\Documents and Settings\All Users\Documents\Dell Backup\Documents and Settings\Harley Morgan\My Documents\03_02_2002\RealMoney_com Hasbro's Still a

Has-Been_files\comment;dcopt=ist;cmty=merchantofvaluerm;ptile=1;sz=468x60;ord=044129_files\rmpro2_468x60.gif
Hidden: file C:\XP\i386\AUTOFMT.EXE
Hidden: file C:\WINDOWS\SYSTEM32\3dipmin32.dll
Hidden: file C:\Documents and Settings\HMORGAN\Desktop\Virus Removal Tool\is-5E8GP\is-5E8GP.exe
Hidden: file C:\Documents and Settings\HMORGAN\Desktop\Virus Removal Tool1\is-E2T4C\is-E2T4C.exe
Hidden: file C:\Documents and Settings\HMORGAN\Local Settings\Temporary Internet

Files\Content.IE5\4GIA3QS8\page;net=ns;u=ns-27963187_1250428977,1134721d068b283,Miscellaneous,;;kw=;dcopt=ist;tile=1;ord1=617198;sz=728x90;contx=Miscellaneous;btg=;ord=%207913343545993412[1]
Hidden: file C:\Program Files\MozyHome\Data\filter_raw.log.1
Hidden: file C:\found.000\dir0000.chk\07\50\11\507501190.swf\MultiStoryModule_msm.sol
Hidden: file C:\found.000\dir0001.chk\CRSWPP.LOG
Hidden: file C:\WINDOWS\SYSTEM32\IPVEXVOX.DLL
Hidden: file C:\WINDOWS\SYSTEM32\v32icdev.dll
Hidden: file C:\WINDOWS\SYSTEM32\webekmak.dll
Hidden: file C:\WINDOWS\SYSTEM32\winaxcab.exe
Hidden: file C:\WINDOWS\SYSTEM32\dotelcab.dll
Info: Starting disk scan of D: (NTFS).
Info: Starting disk scan of G: (NTFS).

Info: Starting disk scan of H: (NTFS).
Hidden: file H:\Backups\i386_07_29_09_backup\I386\AUTOFMT.EXE
Info: Starting disk scan of I: (NTFS).
Info: Starting disk scan of J: (NTFS).

#8 garmanma

garmanma

    Computer Masochist


  • Staff Emeritus
  • 27,809 posts
  • OFFLINE
  •  
  • Location:Cleveland, Ohio
  • Local time:03:15 PM

Posted 17 August 2009 - 07:08 PM

Dr WebCure It took 18hours to run a Complete Scan of all my drives. Can I run a quickscan or at least a complete scan on just the C: drive?


I believe you would be better off submitting a HJT /DDS scan

Please read the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log". If you cannot complete a step, then skip it and continue with the next. In Step 6 there are instructions for downloading and running DDS which will create a Pseudo HJT Report as part of its log.

When you have done that, post your log in the HijackThis Logs and Malware Removal forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

The HJT team is very busy and it will take awhile to get to your post
Please be patient and good luck
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#9 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,446 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:02:15 PM

Posted 21 August 2009 - 01:21 AM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/t/250897/repeated-virus-load-no-matter-how-many-scans/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days, perhaps less, to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users