Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Possibly the "new rootkit variant." Time to kill it dead.


  • This topic is locked This topic is locked
4 replies to this topic

#1 Webdaddy

Webdaddy

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:San Antonio, TX
  • Local time:08:43 AM

Posted 25 August 2009 - 12:06 AM

Referred from here: http://www.bleepingcomputer.com/forums/t/251970/almost-rid-of-rootkitredirectexe-killer-infection/ ~ OB

Here is the log of my DDS scan:

DDS (Ver_09-07-30.01) - NTFSx86
Run by Webdaddy at 23:11:15.12 on Mon 08/24/2009
Internet Explorer: 8.0.6001.18702
AV: AVG Anti-Virus *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}

============== Running Processes ===============


============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com
uInternet Settings,ProxyOverride = *.local
uURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg8\toolbar\IEToolbar.dll
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
mURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg8\toolbar\IEToolbar.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: WsftpBrowserHelper Class: {601ed020-fb6c-11d3-87d8-0050da59922b} - c:\program files\ipswitch\ws_ftp pro\wsbho2k0.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.5.0_09\bin\ssv.dll
BHO: Adobe PDF Conversion Toolbar Helper: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
TB: AVG Security Toolbar: {ccc7a320-b3ca-4199-b1a6-9f516dd69829} - c:\program files\avg\avg8\toolbar\IEToolbar.dll
TB: {4064EA35-578D-4073-A834-C96D82CBCF40} - No File
TB: {A057A204-BACC-4D26-9990-79A187E2698E} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [H/PC Connection Agent] "c:\program files\microsoft activesync\wcescomm.exe"
uRun: [HostsMan] "c:\program files\hostsman\hm.exe" -s
mRun: [Logitech Utility] Logi_MwX.Exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [SunJavaUpdateSched] "c:\program files\java\jre1.5.0_09\bin\jusched.exe"
mRun: [NvMediaCenter] RunDLL32.exe NvMCTray.dll,NvTaskbarInit
mRun: [nwiz] nwiz.exe /install
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] c:\progra~1\sav\VPTray.exe
mRun: [Malwarebytes' Anti-Malware] "c:\program files\chippy\mbamgui.exe" /starttray
mExplorerRun: [Sidebar] c:\docume~1\webdad~1.gor\locals~1\temp\sidebar.exe
StartupFolder: c:\documents and settings\all users.windows\start menu\programs\startup\Monitor Apache Servers.lnk.disabled
StartupFolder: c:\documents and settings\all users.windows\start menu\programs\startup\Service Manager.lnk.disabled
IE: Append Link Target to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Append to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert Link Target to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~4\office11\EXCEL.EXE/3000
IE: Send to &Bluetooth Device... - c:\program files\iogear\bluetooth software\btsendto_ie_ctx.htm
IE: {CCA281CA-C863-46ef-9331-5C8D4460577F} - c:\program files\iogear\bluetooth software\btsendto_ie.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - c:\program files\yahoo!\messenger\YahooMessenger.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0009-ABCDEFFEDCBC} - c:\program files\java\jre1.5.0_09\bin\ssv.dll
IE: {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} - c:\progra~1\mi3aa1~1\INetRepl.dll
IE: {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} - c:\progra~1\mi3aa1~1\INetRepl.dll
IE: {5B7027AD-AA6D-40df-8F56-9560F277D2A5} - {0f420c1e-9ed6-4da5-8b91-eddde887a1dc} - c:\windows\system32\spool\drivers\w32x86\3\\Print602.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office11\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
Trusted Zone: google.com\www
Trusted Zone: mrbiggz.com\members
Trusted Zone: videobox.com\www
DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} - hxxp://download.microsoft.com/download/e/7/3/e7345c16-80aa-4488-ae10-9ac6be844f99/OGAControl.cab
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director7/sw.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/C/0/C/C0CBBA88-A6F2-48D9-9B0E-1719D1177202/LegitCheckControl.cab
DPF: {233C1507-6A77-46A4-9443-F871F945D258} - hxxp://fpdownload.macromedia.com/get/shockwave/cabs/director/sw.cab
DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} - hxxp://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} - c:\program files\yahoo!\common\yinsthelper.dll
DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} - hxxp://office.microsoft.com/officeupdate/content/opuc3.cab
DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} - hxxp://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
DPF: {6B75345B-AA36-438A-BBE6-4078B4C6984D} - hxxp://h20270.www2.hp.com/ediags/gmn2/install/HPProductDetection.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586.cab
DPF: {A8F2B9BD-A6A0-486A-9744-18920D898429} - hxxp://www.sibelius.com/download/software/win/ActiveXPlugin.cab
DPF: {AEF76437-F960-4EBC-97EA-7BBB4230CF38} - hxxps://oca.microsoft.com/en/secure/ocarpt.CAB
DPF: {C7DB51B4-BCF7-4923-8874-7F1A0DC92277} - hxxp://office.microsoft.com/officeupdate/content/opuc4.cab
DPF: {CAFEEFAC-0015-0000-0009-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586.cab
TCP: {3AA926E3-360C-411F-AE52-7D5F9BBFC491} = 192.168.1.1
TCP: {B51EAB17-BAE6-4FD4-BF86-99D59D7FC0FE} = 192.168.1.1,66.234.161.124
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - c:\program files\hp\hpcoretech\comp\hpuiprot.dll
Notify: NavLogon - c:\windows\system32\NavLogon.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
LSA: Authentication Packages = msv1_0 relog_ap
LSA: Notification Packages = scecli scecli scecli

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\webdad~2.gor\mozilla\firefox\profiles\yqulrmdk.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - plugin: c:\progra~1\yahoo!\common\npyaxmpb.dll
FF - plugin: c:\program files\google\update\1.2.183.7\npGoogleOneClick8.dll
FF - plugin: c:\program files\java\jre1.5.0_09\bin\NPJava11.dll
FF - plugin: c:\program files\java\jre1.5.0_09\bin\NPJava12.dll
FF - plugin: c:\program files\java\jre1.5.0_09\bin\NPJava13.dll
FF - plugin: c:\program files\java\jre1.5.0_09\bin\NPJava14.dll
FF - plugin: c:\program files\java\jre1.5.0_09\bin\NPJava32.dll
FF - plugin: c:\program files\java\jre1.5.0_09\bin\NPJPI150_09.dll
FF - plugin: c:\program files\java\jre1.5.0_09\bin\NPOJI610.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npunagi2.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\

============= SERVICES / DRIVERS ===============


============== File Associations ===============

scrfile="%1" %*

=============== Created Last 30 ================

2009-08-24 16:50 --d----- c:\docume~1\webdad~2.gor\SUPERAntiSpyware.com
2009-08-24 13:16 38,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-08-24 13:16 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-08-24 13:16 --d----- c:\program files\Malwarebytes' Anti-Malware
2009-08-24 13:05 --d----- c:\docume~1\webdad~2.gor\Malwarebytes
2009-08-24 11:28 --d----- c:\docume~1\webdad~2.gor\Blumentals
2009-08-23 21:29 --d----- c:\program files\Trend Micro
2009-08-23 19:34 --d----- c:\docume~1\webdad~2.gor\abelhadigital.com
2009-08-23 19:34 --d----- c:\docume~1\alluse~1.win\applic~1\abelhadigital.com
2009-08-23 19:34 --d----- c:\program files\HostsMan
2009-08-23 15:57 --d----- c:\docume~1\webdad~2.gor\BWMonitor
2009-08-23 11:43 1,089,593 -c------ c:\windows\system32\dllcache\ntprint.cat
2009-08-22 19:48 597,504 -c------ c:\windows\system32\dllcache\printfilterpipelinesvc.exe
2009-08-22 19:48 575,488 -c------ c:\windows\system32\dllcache\xpsshhdr.dll
2009-08-22 19:48 89,088 -c------ c:\windows\system32\dllcache\filterpipelineprintproc.dll
2009-08-22 19:48 1,676,288 -c------ c:\windows\system32\dllcache\xpssvcs.dll
2009-08-22 19:48 --d----- C:\260284042c6f5d55d7b6821d04da40
2009-08-16 22:40 --d----- c:\program files\Spybot - Search & Destroy
2009-08-16 16:07 110,952 a------- c:\windows\system32\drivers\SYMEVENT.SYS
2009-08-16 16:07 48,768 a------- c:\windows\system32\S32EVNT1.DLL
2009-08-16 16:07 8,014 a------- c:\windows\system32\drivers\SYMEVENT.CAT
2009-08-16 16:07 805 a------- c:\windows\system32\drivers\SYMEVENT.INF
2009-08-16 16:06 --d----- c:\windows\system32\CBA
2009-08-16 15:31 --d----- c:\program files\SAV
2009-08-16 09:23 --d----- c:\windows\setup.pss
2009-08-16 09:23 --d----- c:\windows\setupupd
2009-08-15 11:40 --d----- c:\windows\SxsCaPendDel
2009-08-15 08:41 --d----- c:\docume~1\alluse~1.win\applic~1\SUPERAntiSpyware.com
2009-08-15 08:40 --d----- c:\program files\SUPERAntiSpyware
2009-08-12 16:23 --d----- c:\docume~1\alluse~1.win\applic~1\PrevxCSI
2009-08-12 16:23 71 a------- c:\windows\wininit.ini
2009-08-12 14:21 0 a------- c:\windows\vpc32.INI
2009-08-12 14:06 --d----- c:\program files\Symantec
2009-08-12 14:06 --d----- c:\docume~1\alluse~1.win\applic~1\Symantec
2009-08-12 11:23 1,846 a------- c:\windows\system32\tmp.reg
2009-08-10 07:37 626,960 a----r-- c:\windows\system32\hpvaut32.dll
2009-08-10 07:37 487,424 a----r-- c:\windows\system32\hpvcp70.dll
2009-08-10 07:37 344,064 a----r-- c:\windows\system32\hpvcr70.dll
2009-08-10 07:37 44,544 a----r-- c:\windows\system32\MSXML4a.dll
2009-08-10 06:32 92,464 a------- c:\windows\system32\drivers\SBREDrv.sys
2009-08-10 06:32 65,320 a------- c:\windows\system32\sbbd.exe
2009-08-10 06:30 --d----- C:\VIPRERESCUE
2009-08-10 02:17 --d----- c:\program files\Sophos
2009-08-07 21:04 --d----- c:\program files\ZD Soft
2009-08-05 13:37 --d----- c:\program files\HJSplit
2009-08-04 20:08 294,912 a------- c:\windows\system\MSH263.DRV
2009-08-04 20:08 47,616 a------- c:\windows\system\IYUV_32.DLL
2009-08-04 20:00 131,072 a------- c:\windows\system\SP5X_32.DLL
2009-08-03 08:30 --d----- c:\program files\3GR Tech
2009-08-03 01:33 --d----- c:\program files\MASPware
2009-07-30 11:45 2,463,976 a------- c:\windows\system32\NPSWF32.dll
2009-07-30 11:45 190,696 a------- c:\windows\system32\NPSWF32_FlashUtil.exe
2009-07-30 11:38 8,576 a------- c:\windows\system32\drivers\VCdRom.sys

==================== Find3M ====================

2009-08-07 09:00 162,816 a------- c:\windows\system32\fmod.dll
2009-07-19 16:28 47,360 a------- c:\windows\system32\drivers\pcouffin.sys
2009-07-13 23:43 286,208 a------- c:\windows\system32\wmpdxm.dll
2009-07-03 12:09 915,456 a------- c:\windows\system32\wininet.dll
2009-06-22 01:46 13,184 a------- c:\windows\system32\scncap.dll
2009-06-16 09:36 119,808 a------- c:\windows\system32\t2embed.dll
2009-06-16 09:36 81,920 a------- c:\windows\system32\fontsub.dll
2009-06-03 14:09 1,291,264 a------- c:\windows\system32\quartz.dll

============= FINISH: 23:11:46.39 ===============

The following is the RootRepeal log:

ROOTREPEAL AD, 2007-2009
==================================================
Scan Start Time: 2009/08/24 23:16
Program Version: Version 1.3.3.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: A.tmp
Image Path: C:\WINDOWS\system32\A.tmp
Address: 0xF79EB000 Size: 6144 File Visible: No Signed: -
Status: -

Name: axmacmde.sys
Image Path: C:\DOCUME~1\WEBDAD~1.GOR\LOCALS~1\Temp\axmacmde.sys
Address: 0xB4B6B000 Size: 83584 File Visible: No Signed: -
Status: -

Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB9223000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79D5000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB6EA9000 Size: 49152 File Visible: No Signed: -
Status: -

Name: SASKUTIL.sys
Image Path: C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys
Address: 0xB9379000 Size: 151552 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\WINDOWS\$hf_mig$\{29F8DDC1-9487-49b8-B27E-3E0C3C1298FF}
Status: Locked to the Windows API!

SSDT
-------------------
#: 012 Function Name: NtAlertResumeThread
Status: Hooked by "" at address 0x8a574eb8

#: 013 Function Name: NtAlertThread
Status: Hooked by "" at address 0x8a38c008

#: 017 Function Name: NtAllocateVirtualMemory
Status: Hooked by "" at address 0x8a3c51a0

#: 043 Function Name: NtCreateMutant
Status: Hooked by "" at address 0x8a3d3170

#: 053 Function Name: NtCreateThread
Status: Hooked by "" at address 0x8a3dca90

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xb96ed350

#: 083 Function Name: NtFreeVirtualMemory
Status: Hooked by "" at address 0x8a38afd0

#: 089 Function Name: NtImpersonateAnonymousToken
Status: Hooked by "" at address 0x8a3abef8

#: 091 Function Name: NtImpersonateThread
Status: Hooked by "" at address 0x8a387bf8

#: 108 Function Name: NtMapViewOfSection
Status: Hooked by "" at address 0x8a38a0d8

#: 114 Function Name: NtOpenEvent
Status: Hooked by "" at address 0x8a37f700

#: 123 Function Name: NtOpenProcessToken
Status: Hooked by "" at address 0x8a38af60

#: 129 Function Name: NtOpenThreadToken
Status: Hooked by "" at address 0x8a38af98

#: 177 Function Name: NtQueryValueKey
Status: Hooked by "" at address 0x8a378368

#: 206 Function Name: NtResumeThread
Status: Hooked by "" at address 0x8a38acc0

#: 213 Function Name: NtSetContextThread
Status: Hooked by "" at address 0x8a38a008

#: 228 Function Name: NtSetInformationProcess
Status: Hooked by "" at address 0x8a38af28

#: 229 Function Name: NtSetInformationThread
Status: Hooked by "" at address 0x8a388290

#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xb96ed580

#: 253 Function Name: NtSuspendProcess
Status: Hooked by "" at address 0x8a379260

#: 254 Function Name: NtSuspendThread
Status: Hooked by "" at address 0x8a40fbf8

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "" at address 0x8a38aef0

#: 258 Function Name: NtTerminateThread
Status: Hooked by "" at address 0x8a3df830

#: 267 Function Name: NtUnmapViewOfSection
Status: Hooked by "" at address 0x8a391348

#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "" at address 0x8a3c50d0

==EOF==

Attached Files


Edited by Orange Blossom, 25 August 2009 - 02:21 AM.


BC AdBot (Login to Remove)

 


#2 Webdaddy

Webdaddy
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:San Antonio, TX
  • Local time:08:43 AM

Posted 28 August 2009 - 09:26 PM

After reading the description of the "AntiSpy Protector 2009" rootkit infection I am certain this is what I remember briefly appearing on my screen!

===========

Hello

While we understand your frustration at having to wait, please note that Bleeping Computer deals with several hundred requests for assistance such as yours on a daily basis. As a result, our backlog is quite large as are other comparable sites that help others with malware issues. Although our HJT Team members work on hundreds of requests each day, they are all volunteers who work logs when they can and are able to do so. No one is paid by Bleeping Computer for their assistance to our members.

Further, our malware removal staff is comprised of team members with various levels of skill and expertise to deal with thousands of malware variants, some more complex than others. Although we try to take DDS/HJT logs in order (starting with the oldest), it is often the skill level of the particular helper and sometimes the operating system that dictates which logs get selected first. Some infections are more complicated than others and require a higher skill level to remove. Without that skill level attempted removal could result in disastrous results. In other instances, the helper may not be familiar with the operating system that you are using, since they use another. In either case, neither of us want someone to assist you who is not familiar with your issue and attempt to fix it.

We ask that once you have posted your log and are waiting, please DO NOT "bump" your thread or make further replies until it has been responded to by a member of the HJT Team. The reason we ask this or do not respond to your requests is because that would remove you from the active queue that Techs and Staff have access to. The malware staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response, there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

That is why I have made an edit to your last post, instead of a reply. Please do not multiple post here, as that only pushes you further down the queue and causes confusion to the staff.

Please be patient. It may take a while to get a response but your log will be reviewed and answered as soon as possible.

Thank you for understanding.

Orange Blossom ~ forum moderator

Edited by Orange Blossom, 04 September 2009 - 12:52 PM.


#3 Webdaddy

Webdaddy
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:San Antonio, TX
  • Local time:08:43 AM

Posted 06 September 2009 - 11:18 PM

Hello, Ms. Orange Blossom!

Thank you for your reply.

My "bump" wasn't an attemp to ellict a quicker response; just an honest effort to provide more information.

I absolutely understand that the staff and volunteers at bleepingcomputers.com is overwhelmed at this time so I've chosen to reduce your workload and fix the problem myself.

For my unique situation, VIPRE Rescue proved to be the most effective at finding and eliminating the rootkit files and registry entries, while Malwarebytes was able to detect and eliminate the hijacker file.

Good luck to you, the fine people at bleepingcomputer.com and to anyone suffering with these nasty infections!

#4 thcbytes

thcbytes

  • Malware Response Team
  • 14,790 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:43 AM

Posted 07 September 2009 - 06:13 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!

http://donatelife.net/register-now/

#5 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:08:43 AM

Posted 20 September 2009 - 04:22 PM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users