Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Tapi.nfo trojan dropper on laptop


  • This topic is locked This topic is locked
27 replies to this topic

#1 ajmcfadden

ajmcfadden

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:26 AM

Posted 06 September 2009 - 10:39 PM

Hi. I'm having a problem with my laptop. I am unable to download hijack this, ad-aware, trendhousecall, or even run windows defender. I keep getting this error on start up about unable to locate tapi.nfo file. My search engines constantly changes but stop after i managed to download firefox. It will let me run AVG. I did this in safemode and came up with some trojan horse in the documents and settings files. It said it moved them to vault and I deleted them from there. But I'm still having this error key and unable to run download any other spyware removal. Someone please help.
ajmcfadden

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,566 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:26 AM

Posted 06 September 2009 - 11:51 PM

Hello and welcome. I am moving this from XP to the Am I Infected forummas you are.
Can you run MBAM?
Next run MBAM (MalwareBytes):

NOTE: Before saving MBAM please rename it to zztoy.exe....now save it to your desktop.

Please download Malwarebytes Anti-Malware and save it to your desktop.

alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.


If no joy with MBAm try this instead of HiJack
If you cannot get DDS to work, please try this instead.

Please download RSIT by random/random and save it to your Desktop.
Note: You will need to run this tool while connected to the Internet so it can download HijackThis if it is not located on your system. If you get a warning from your firewall or other security programs regarding Rist attempting to contact the Internet, please allow the connection.
  • Close all applications and windows so that you have nothing open and are at your Desktop.
  • Double-click on RSIT.exe to start the program.
  • If using Windows Vista, be sure to Run As Administrator.
  • Click Continue after reading the disclaimer screen.
  • Leave the drop down box set to default: "List/folders created or modified in the last 1 month (30 days).
  • When the scan is complete, a text file named log.txt will automatically open in Notepad.
  • Save the log file to your desktop and copy/paste the contents into a new topic in the HijackThis Logs and Malware Removal forum, NOT here.
Important: Be sure to mention that you tried to follow the Prep Guide but were unable to get DDS to run.
If RSIT did not work, then reply back here.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 ajmcfadden

ajmcfadden
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:26 AM

Posted 07 September 2009 - 09:57 AM

ok i will try this all now and let you know if it works. I'm using my desktop now to get onto this website but will alternate back and forth. So it might take a few minutes to see if it works.

Thanks,
ajmcfadden
ajmcfadden

#4 ajmcfadden

ajmcfadden
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:26 AM

Posted 07 September 2009 - 11:08 AM

I have tried all of the above. I downloaded and it get to the update part, starts scanning and it disappears. Or either tell me that I can't run this. So what do i do now?
ajmcfadden

#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,566 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:26 AM

Posted 07 September 2009 - 02:09 PM

Hi are you running Vista. You may need to Right click the icon and select Run as Administrator.

Let's try another tool.
Please download Sophos Anti-rootkit & save it to your desktop.
alternate download link
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Be sure to print out and read the Sophos Anti-Rookit User Manual and Release Notes.
  • Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
  • Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
  • A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now".
  • Click Yes and allow the driver and its randomly named .tmp file (i.e. F.tmp) to load if asked.
  • If the scan did not start automatically, make sure the following are checked:
    • Running processes
    • Windows Registry
    • Local Hard Drives
  • Click Start scan.
  • Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
  • When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
  • Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
    • Files tagged as Removable: No are not marked for removal and cannot be removed.
    • Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
    • Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
  • Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
  • A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
  • After reboot, a dialog box displays the files you selected for removal and the action taken.
  • Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
  • When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
  • This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 ajmcfadden

ajmcfadden
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:26 AM

Posted 07 September 2009 - 03:59 PM

No im running windows xp. I did manage to get the sarscan to run. But it didnt locate any files for me to remove nor did i see anything suspicious. Maybe u can find something. Here's the log of what i did:

Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 9/7/2009 at 15:45:36 PM
Windows version 5.1 SP 3.0 Service Pack 3 build 2600 SM=0x100 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Hidden: registry item \HKEY_USERS\S-1-5-21-2259801076-1509051648-3144106631-1005\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc?bsession=32439329&bsession_str=session_id=32439329,user_id_pk1=740311,user_id_sos_id_pk2=1,one_time_token=6C641996EFFFA07FD2E3AFD0376D5AF3
Hidden: registry item \HKEY_USERS\S-1-5-21-2259801076-1509051648-3144106631-1005\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc?bsession=33490632&bsession_str=session_id=33490632,user_id_pk1=740311,user_id_sos_id_pk2=1,one_time_token=2BA83B2905F665A759CA7F5E88BCE7AA
Hidden: registry item \HKEY_USERS\S-1-5-21-2259801076-1509051648-3144106631-1005\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc?bsession=34245964&bsession_str=session_id=34245964,user_id_pk1=740311,user_id_sos_id_pk2=1,one_time_token=DC38CFEC23F255EA721AB237030D6D2E
Hidden: registry item \HKEY_USERS\S-1-5-21-2259801076-1509051648-3144106631-1005\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc?bsession=34291889&bsession_str=session_id=34291889,user_id_pk1=740311,user_id_sos_id_pk2=1,one_time_token=1CD3EF06FB1A4C5149B638AB0B39AEF0
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\Documents and Settings\Brenetta\My Documents\Downloads\Ad-AwareAE.exe
Hidden: file C:\Documents and Settings\Brenetta\My Documents\Downloads\zztoy.exe.exe
Hidden: file C:\Program Files\Malwarebytes' Anti-Malware\mbam-dor.exe
Hidden: file C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
Hidden: file C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
Hidden: file C:\dell\Utilities\Driver Reset Tool\Driver Reset.exe
Hidden: file C:\Program Files\MSN\MSNCoreFiles\Install\MSN9Components\Msncli.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\games\{24C8EE9E-CACE-4C60-8B1F-E2317BC2B510}.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\games\{24F30DB9-CBD0-420A-B39D-3BB5655E5334}.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\games\{542A04D2-5975-4FE3-9B47-8A708648CEA9}.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\games\{6BA84DD0-959B-47F3-A69E-908FA76FB07A}.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\games\{7034285D-DFC3-42E5-B957-93A2622BC737}.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\games\{8FDE0001-5FA4-45E6-8BD8-61EDEFE3EFDC}.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\games\{932A7BED-387F-440F-9C95-F77FC6A4B843}.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\games\{A8E7834D-5B28-4D4A-8B33-AB30A9A2CB9E}.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\games\{B661BAD0-C7B4-40A0-AA2E-64612316D766}.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\games\{BEF6363C-7A4A-421D-903C-24D785FF7B7B}.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\games\{E98B553D-C3DD-440C-AB4C-DA61E6AF72F4}.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\plugin\WildTangent\onplay.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\progfile\onplay.exe
Hidden: file C:\Program Files\Dell\Media Experience\Plugins\WildTangent\wtsetup.exe
Hidden: file C:\WINDOWS\system32\dllcache\sprb0401.dll
Hidden: file C:\WINDOWS\system32\dllcache\sprb040D.dll
Hidden: file C:\Documents and Settings\Brenetta\My Documents\Downloads\RSIT.exe
Hidden: file C:\Program Files\MUSICMATCH\MUSICMATCH Update\MMJB\mfc71u.dll
Hidden: file C:\Program Files\Corel\Corel Photo Album 6\mfc71.dll
Hidden: file C:\Program Files\Corel\Corel Photo Album 6\mfc71u.dll
Hidden: file C:\Program Files\Corel\Corel Photo Album 6\system\wmfdist95.exe
Hidden: file C:\Program Files\Yahoo!\Messenger\YPluginRegistry.dll
Hidden: file C:\Documents and Settings\Brenetta\My Documents\Downloads\sar_15_sfx.exe
Hidden: file C:\Documents and Settings\Brenetta\Local Settings\Application Data\Mozilla\Firefox\Profiles\domia670.default\Cache\A2F0955Ed01
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\031b9430763f63e0ddd1511186652ba0\BIT5.tmp
Hidden: file C:\i386\dpcdll.dll
Hidden: file C:\i386\MFC71.DLL
Hidden: file C:\i386\mfc71u.dll
Hidden: file C:\i386\xpsp2res.dll
Hidden: file C:\Program Files\McAfee\SpamKiller\MSKClnt.exe
Hidden: file C:\WINDOWS\system32\MRT.exe
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\ip\sprb0401.dll
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\ip\sprb040d.dll
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\ipevldpc.dll
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\ipseldpc.dll
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\isdpc.dll
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\isendpc.dll
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\knperdpc.dll
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\knprodpc.dll
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\kperdpc.dll
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\kprodpc.dll
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\c268348752498f57ff1128ae6a23c4f1\wgatray.exe
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\msncli.exe
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\pcl5eres.dll
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\pcl5ures.dll
Hidden: file C:\Program Files\Adobe\Reader 8.0\Reader\plug_ins3d\drvDX9.x3d
Hidden: file C:\System Volume Information\_restore{46DE8921-1D39-44D2-A9E9-64119261F211}\RP4\A0005073.old
Hidden: file C:\System Volume Information\_restore{46DE8921-1D39-44D2-A9E9-64119261F211}\RP2\A0004036.exe
Hidden: file C:\WINDOWS\system32\scecli.dll
Hidden: file C:\Documents and Settings\All Users\Application Data\Microsoft\Windows Defender\Definition Updates\{B34514A0-53FF-4FFA-BBED-0FDD94BE4693}\mpasdlta.vdm
Hidden: file C:\Documents and Settings\Brenetta\Local Settings\Temporary Internet Files\Content.IE5\SR2ZA5IX\.html%253Fpid%253D21053988%2526gtid%253D3%2526profile_id%253D54849142%2526profile_name%253Dkoolazzazngurl%2526user_id%253D54849142%2526username%253Dkoolazzazngurl
Hidden: file C:\WINDOWS\system32\dllcache\mshtml.tlb
Hidden: file C:\WINDOWS\system32\ieapfltr.dat
Hidden: file C:\WINDOWS\system32\mshtml.tlb
Hidden: file C:\Documents and Settings\All Users\Application Data\Kodak\EasyShareSetup\QUICK\QuickTimeInstaller.exe
Hidden: file C:\Program Files\Kodak\Kodak EasyShare software\bin\mfc71u.dll
Hidden: file C:\Program Files\Kodak\Kodak EasyShare software\bin\mfc71.dll
Hidden: file C:\Documents and Settings\Brenetta\Application Data\U3\0000060505021608\DD04466A-60E7-47ae-BE4D-5A0BD67D9F7E\Exec\0000060505021608u3_demo_v3.exe
Hidden: file C:\Documents and Settings\Brenetta\Application Data\Macromedia\Flash Player\www.macromedia.com\bin\fpupdateax\fpupdateax.exe
Hidden: file C:\WINDOWS\system32\Macromed\Flash\uninstall_activeX.exe
Hidden: file C:\WINDOWS\$NtServicePackUninstall$\xpsp2res.dll
Hidden: file C:\WINDOWS\$NtServicePackUninstall$\sprb040d.dll
Hidden: file C:\WINDOWS\$NtServicePackUninstall$\sprb0401.dll
Hidden: file C:\WINDOWS\$NtServicePackUninstall$\xpsp2res.dll.001
Hidden: file C:\WINDOWS\$NtServicePackUninstall$\xpsp2res.dll.009
Hidden: file C:\WINDOWS\system32\wbem\wmiprvse.exe
Hidden: file C:\WINDOWS\ServicePackFiles\i386\isdpc.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\kperdpc.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\msncli.exe
Hidden: file C:\WINDOWS\ServicePackFiles\i386\ipevldpc.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\kprodpc.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\ipseldpc.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\pcl5eres.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\knperdpc.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\pcl5ures.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\knprodpc.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\isendpc.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\sprb040d.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\sprb0401.dll
Hidden: file C:\WINDOWS\system32\mui\0401\xpsp2res.dll
Hidden: file C:\WINDOWS\system32\mui\040D\xpsp2res.dll
Hidden: file C:\WINDOWS\system32\dpcdll.dll
Hidden: file C:\WINDOWS\system32\dllcache\dpcdll.dll
Hidden: file C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\6MXJ8ED9\AAAAAIAAwAAAAAAqKhQWCMBAAAAAAAAAAAAAJYE6SQxAAAAwOCtuioAAABgoiFSAAAAAHAHcPsqAAAAGALgtysAAAA=,,http%3A%2F%2Fwww.hwbar.com%2Fad%2Fheader[1].html,%7BCLICKURL%7D
Hidden: file C:\Program Files\Windows Defender\MsMpEng.exe
Stopped logging on 9/7/2009 at 16:34:54 PM
ajmcfadden

#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,566 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:26 AM

Posted 07 September 2009 - 06:41 PM

I see one file,Hidden: file C:\WINDOWS\system32\scecli.. It may have replaced trhe legit one. Let's try this ,if we stiil are blocked we will get an HJT log a different way.
Next run ATF and SAS:
Note.. SAS doesn't open the registry hives for other user accounts on the system, so scans should be done from each user account.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 ajmcfadden

ajmcfadden
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:26 AM

Posted 08 September 2009 - 05:01 PM

Ok. This is what's going on:

Ran ATF in Safemode. It did locate some spyware and removed them. Couldn't run SUPERAntispyware in safemode for some reason. It kept giving me an error. I rebooted (rundell tapi.nfo error popped back up). I than proceeded to run SUPERAntispyware in regular mode at 8am this morning. It was taking a long time so i thought i would leave it for today and it would be finished when i got home from work. Well, it was and is still running 10 hrs later! It is in the quarantining and removal stage. I can minimize it and click on other things. So it is not like it is frozen. Its just taking a long time to run.

I did try to cancel it but it saying "can't stop this process because it is trying to quarante and remove resident threats." Is this normal for it to run this long??????
ajmcfadden

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,566 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:26 AM

Posted 08 September 2009 - 07:26 PM

Well sometimes it is normal for SAS or DrWeb to take very long. Depends on the amount of files on the PC,the amount infected and the required fixes to the files. Working is a good sign...frozen is a bad one. give it a full day is needed. The only thing I hate about this is a Format and Reinstalll would have been faster. :thumbsup:

Edited by boopme, 08 September 2009 - 07:28 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 ajmcfadden

ajmcfadden
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:26 AM

Posted 08 September 2009 - 09:39 PM

It quit working at that spot. I've rebooted and tried to rerun it. But it keeps disappearing. I've tried to rerun all that you told me about but have been unsuccessful. The only thing i can run is AVG and ATF. What now?
ajmcfadden

#11 ajmcfadden

ajmcfadden
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:26 AM

Posted 08 September 2009 - 09:40 PM

Oh and i've tried to run them all in safemode but keep getting no permission to run file or can't install.
ajmcfadden

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,566 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:26 AM

Posted 08 September 2009 - 09:49 PM

Ok, sorry but you have the monster of rootkits. You need to get into thr HJT forum or format and reinstall. I can give you instructions for both.

As there are some new variants of rootkits in the wild right now that will require custom scripts to remove the infection, the process must be completed by HJT team member.

Failure to follow the proper removal process can and will cause serious damage to a machine. Recovery of the machine may be difficult, if not impossible.

Now ... Download this Utility and save it to your Desktop.
Double-click the Utility to run it and and let it finish.
When it states Finished! Press any key to exit, press any key to close the program.
It will save a .txt file to your desktop automatically. Double-click on the Win32kDiag.txt file that is located on your Desktop and post the entire contents of that log as part of the reply in the topic you will create below..

Next please go here HijackThis Logs and Virus/Trojan/Spyware/Malware Removal ,click New Topic,give it a relevant Title and post the Rootrepeal log and the above log.

Let me know how that went.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 ajmcfadden

ajmcfadden
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:26 AM

Posted 09 September 2009 - 08:23 PM

Hi. I must have a big bug on here for real. Now, I did manage to get this downloaded but when it start running, it is telling me "warning can not back up priviledges" and " can"t access c:\windows\system32\MRT.exe.
ajmcfadden

#14 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,566 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:26 AM

Posted 09 September 2009 - 08:50 PM

Go start run and paste in this line

"%userprofile%\desktop\win32kdiag.exe" -f -r

When it is finishes try to do post above again.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#15 ajmcfadden

ajmcfadden
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:26 AM

Posted 09 September 2009 - 08:57 PM

It says it can't find that file.
ajmcfadden




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users