Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

antispywarepro popup


  • This topic is locked This topic is locked
2 replies to this topic

#1 aksh87

aksh87

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:02:48 PM

Posted 20 October 2009 - 09:01 AM

my computer is installed with avg antivirus. The computer prompted that "windows has detected spyware infection... it is recommended to use special spyware tools to prevent data loss. windows will now download install the most up to date antispyware for you". It them automatically installed the antispywarepro 2009. I have removed the program from control panel bt still the pop ups don't go.
Please help me remove this problem


ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/10/20 18:22
Program Version: Version 1.3.5.0
Windows Version: Windows XP Media Center Edition SP2
==================================================

Drivers
-------------------
Name: dump_iaStor.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_iaStor.sys
Address: 0xEC5AD000 Size: 876544 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB8629000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\System Volume Information\_restore{3A579F61-82CF-4117-919A-DB7B394CD5BC}\RP14\A0002880.cfg
Status: Visible to the Windows API, but not on disk.

Path: c:\documents and settings\aksh chauhan\local settings\temp\etilqs_sz1u2f4c4fpbu5mrxccm
Status: Allocation size mismatch (API: 8192, Raw: 0)

Path: c:\documents and settings\aksh chauhan\local settings\temp\etilqs_yx7nr0zwexcrkdeshhxw
Status: Allocation size mismatch (API: 32768, Raw: 0)

Path: C:\Documents and Settings\aksh chauhan\Local Settings\Application Data\Google\Chrome\User Data\Local State
Status: Could not get file information (Error 0xc0000008)

Stealth Objects
-------------------
Object: Hidden Module [Name: restorer64_a.exe]
Process: restorer64_a.exe (PID: 3756) Address: 0x04000000 Size: 61440

Object: Hidden Module [Name: restorer64_a.exe]
Process: restorer64_a.exe (PID: 3832) Address: 0x04000000 Size: 61440

Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 3940) Address: 0x01000000 Size: 20480

Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 4060) Address: 0x01000000 Size: 20480

Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 3748) Address: 0x01000000 Size: 20480

Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 352) Address: 0x01000000 Size: 20480

Hidden Services
-------------------
Service Name: turcfvqf
Image Path: %SystemRoot%\system32\svchost.exe -k netsvcs

Service Name: zakyekcsq
Image Path: %SystemRoot%\system32\svchost.exe -k netsvcs

==EOF==

Attached Files



BC AdBot (Login to Remove)

 


#2 Blade81

Blade81

    Bleepin' Rocker


  • Malware Response Team
  • 6,465 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Finland
  • Local time:12:18 PM

Posted 29 October 2009 - 11:47 AM

Hi,

Sorry for delayed response. Forums have been really busy. If you still need help with this post a fresh dds log, please.

Microsoft Windows Insider MVP 2016-2017

Microsoft MVP Consumer Security 2008-2015
UNITE member since 2006
unite_blue.png

Provided malware removal related instructions are meant to be used in the correspondent user's case only. If you have similar symptoms create own topic instead of following instructions given to some other, please.


#3 Blade81

Blade81

    Bleepin' Rocker


  • Malware Response Team
  • 6,465 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Finland
  • Local time:12:18 PM

Posted 06 November 2009 - 06:01 PM

Due to inactivity, this thread will now be closed. If you need this topic reopened, please contact a Staff member. Include the address of this thread in your request. This applies only to the original topic starter. Should you have a new issue, please start a New Topic.

Microsoft Windows Insider MVP 2016-2017

Microsoft MVP Consumer Security 2008-2015
UNITE member since 2006
unite_blue.png

Provided malware removal related instructions are meant to be used in the correspondent user's case only. If you have similar symptoms create own topic instead of following instructions given to some other, please.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users