Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


low threat trojan virus detected by symantec in temp folder, can't seem to rid my windows 7 HP laptop of the root cause

  • This topic is locked This topic is locked
10 replies to this topic

#1 brookstonfowler


  • Members
  • 12 posts
  • Local time:03:18 PM

Posted 31 October 2009 - 01:13 AM

The virus that my Symantec antivirus was detecting had the format of DWHxxxx.tmp where x = digits or letters. I've followed the steps from my topic over in the other forum http://www.bleepingcomputer.com/forums/t/267002/low-threat-trojan-virus-detected-by-symantec-in-temp-folder-cant-seem-to-rid-my-windows-7-hp-laptop-of-the-root-cause/, and i haven't seen the virus being quaranined, so the root cause may have been removed. however, i'm not able to run rootrepeal (http://www.bleepingcomputer.com/forums/t/267002/low-threat-trojan-virus-detected-by-symantec-in-temp-folder-cant-seem-to-rid-my-windows-7-hp-laptop-of-the-root-cause/?p=1476539), so i was sent here. here is my dds scan:

DDS (Ver_09-10-26.01) - NTFSx86
Run by Nick at 2:02:28.43 on Sat 10/31/2009
Internet Explorer: 8.0.7600.16385 BrowserJavaVersion: 1.6.0_10
Microsoft Windows 7 Home Premium 6.1.7600.0.1252.1.1033.18.3007.1519 [GMT -4:00]

AV: Symantec AntiVirus *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *enabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: SUPERAntiSpyware *enabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}

============== Running Processes ===============

C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\svchost.exe -k HsfXAudioService
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\Apoint2K\Apoint.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Symantec AntiVirus\VPTray.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Apoint2K\ApMsgFwd.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k SDRSVC
C:\Program Files\Microsoft Office\Office12\EXCEL.EXE
C:\Program Files\Microsoft\Office Live\OfficeLiveSignIn.exe
C:\Program Files\Java\jre6\bin\javaw.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Notepad++\notepad++.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
mStart Page = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=81&bd=Pavilion&pf=laptop
uInternet Settings,ProxyOverride = *.local
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - No File
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Adobe PDF Conversion Toolbar Helper: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll
TB: {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - No File
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] c:\progra~1\symant~1\VPTray.exe
mRun: [KeyAccess] kass.exe
uPolicies-explorer: NoAddPrinter = 1 (0x1)
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: ConsentPromptBehaviorAdmin = 0 (0x0)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
mPolicies-system: PromptOnSecureDesktop = 0 (0x0)
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Append to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert link target to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert link target to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~3\office12\EXCEL.EXE/3000
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~3\office12\REFIEBAR.DLL
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: GoToAssist - c:\program files\citrix\gotoassist\570\G2AWinLogon.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\users\nick\appdata\roaming\mozilla\firefox\profiles\eeetzaqv.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - plugin: c:\program files\cambridgesoft\chemoffice2008\chem3d\npChem3DPlugin.dll
FF - plugin: c:\program files\cambridgesoft\chemoffice2008\chemdraw\NPCDP32.DLL
FF - plugin: c:\program files\google\picasa3\npPicasa3.dll
FF - plugin: c:\program files\microsoft\office live\npOLW.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdnu.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdnupdater2.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npViewpoint.dll
FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll
FF - plugin: c:\users\nick\appdata\local\google\update\\npGoogleOneClick8.dll
FF - plugin: c:\users\nick\appdata\roaming\mozilla\firefox\profiles\eeetzaqv.default\extensions\moveplayer@movenetworks.com\platform\winnt_x86-msvc\plugins\npmnqmp071302000002.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}

FF - user.js: network.protocol-handler.warn-external.dnupdate - falsec:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-10-12 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-10-12 74480]
R2 HsfXAudioService;HsfXAudioService;c:\windows\system32\svchost.exe -k HsfXAudioService [2009-7-13 20992]
R2 KeyAccess;KeyAccess;c:\windows\keyacc32.exe [2007-12-14 1024704]
R2 SavRoam;SavRoam;c:\program files\symantec antivirus\SavRoam.exe [2008-10-23 121744]
R2 wlidsvc;Windows Live ID Sign-in Assistant;c:\program files\common files\microsoft shared\windows live\WLIDSVC.EXE [2009-3-30 1533808]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-10-28 102448]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-10-12 7408]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2009-7-13 229888]
S3 gbridge;Gbridge Virtual Miniport;c:\windows\system32\drivers\gbridge.sys [2009-5-10 41216]
S3 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2008-6-21 24652]

=============== Created Last 30 ================

2009-10-29 15:28:19 0 d-----w- c:\users\nick\appdata\roaming\Dropbox
2009-10-29 02:48:24 0 d-----w- c:\program files\SnagitPortable
2009-10-28 18:47:17 805 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2009-10-28 18:47:17 123952 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2009-10-28 18:47:17 10563 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2009-10-27 20:29:15 0 d-----w- c:\users\nick\DoctorWeb
2009-10-25 04:07:57 126528 ----a-w- c:\windows\system32\oscdimg.exe
2009-10-24 21:06:56 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_09_00.Wdf
2009-10-23 09:28:56 0 d-----w- c:\windows\Panther
2009-10-23 09:15:08 0 d--h--w- C:\$WINDOWS.~Q
2009-10-23 08:57:12 0 d--h--w- C:\$INPLACE.~TR
2009-10-23 07:30:55 257024 ----a-w- c:\windows\system32\msv1_0.dll
2009-10-23 07:04:56 34816 ----a-w- c:\windows\system32\msasn1.dll
2009-10-23 07:04:50 728648 ----a-w- c:\windows\system32\drivers\dxgkrnl.sys
2009-10-23 07:04:50 1320960 ----a-w- c:\windows\system32\CertEnroll.dll
2009-10-23 07:04:49 71168 ----a-w- c:\windows\system32\fontsub.dll
2009-10-23 07:04:49 507568 ----a-w- c:\windows\system32\winload.exe
2009-10-23 07:04:49 442920 ----a-w- c:\windows\system32\winresume.exe
2009-10-23 07:04:49 293888 ----a-w- c:\windows\system32\atmfd.dll
2009-10-23 07:04:49 2613248 ----a-w- c:\windows\explorer.exe
2009-10-23 07:04:49 108544 ----a-w- c:\windows\system32\t2embed.dll
2009-10-23 07:04:48 12625408 ----a-w- c:\windows\system32\wmploc.DLL
2009-10-23 06:53:02 717892 ----a-w- c:\windows\system32\PerfStringBackup.INI
2009-10-23 06:51:12 0 d-----w- c:\windows\system32\wbem\Performance
2009-10-23 06:48:45 20 --sh--w- c:\users\nick\ntuser.ini
2009-10-23 06:48:27 0 d-sh--w- C:\Recovery
2009-10-23 06:29:16 21316 ----a-w- c:\windows\system32\emptyregdb.dat
2009-10-23 05:34:47 0 ---ha-w- c:\windows\system32\drivers\Msft_Kernel_Apfiltr_01005.Wdf
2009-10-23 05:34:42 0 d-----w- c:\program files\Apoint2K
2009-10-23 05:34:17 873310 ----a-w- c:\windows\system32\oem14.inf
2009-10-23 05:33:55 0 d-----w- c:\program files\CONEXANT
2009-10-23 05:33:35 9504 ---ha-w- c:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2009-10-23 05:33:35 9504 ---ha-w- c:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2009-10-23 05:33:23 797216 ----a-w- c:\windows\system32\nvcplui.exe
2009-10-23 05:33:23 420384 ----a-w- c:\windows\system32\nvcpl.cpl
2009-10-23 05:33:23 307200 ----a-w- c:\windows\system32\nvexpbar.dll
2009-10-23 05:33:23 1108512 ----a-w- c:\windows\system32\nvcpluir.dll
2009-10-23 02:43:09 1890 ----a-w- c:\windows\diagwrn.xml
2009-10-23 02:43:09 1890 ----a-w- c:\windows\diagerr.xml
2009-10-22 23:17:36 0 d-----w- c:\users\nick\appdata\roaming\GetRightToGo
2009-10-22 19:21:28 0 d-----w- c:\programdata\SUPERAntiSpyware.com
2009-10-22 19:21:20 0 d-----w- c:\users\nick\appdata\roaming\SUPERAntiSpyware.com
2009-10-22 19:21:20 0 d-----w- c:\program files\SUPERAntiSpyware
2009-10-22 19:20:43 0 d-----w- c:\program files\common files\Wise Installation Wizard
2009-10-22 16:22:01 98816 ----a-w- c:\windows\sed.exe
2009-10-22 16:22:01 236544 ----a-w- c:\windows\PEV.exe
2009-10-22 16:22:01 161792 ----a-w- c:\windows\SWREG.exe
2009-10-21 16:42:43 0 d-----w- c:\users\nick\appdata\roaming\Malwarebytes
2009-10-21 16:42:35 0 d-----w- c:\programdata\Malwarebytes
2009-10-21 04:07:27 0 d-----w- c:\program files\AVG
2009-10-21 04:07:23 0 d-----w- c:\programdata\avg9
2009-10-19 19:01:07 0 d-----w- c:\programdata\Spybot - Search & Destroy
2009-10-19 18:15:00 0 d--h--w- c:\windows\PIF
2009-10-19 17:15:36 0 d-----w- c:\program files\TeaTimer (Spybot - Search & Destroy)
2009-10-19 17:15:36 0 d-----w- c:\program files\SDHelper (Spybot - Search & Destroy)
2009-10-19 17:15:35 0 d-----w- c:\program files\Misc. Support Library (Spybot - Search & Destroy)
2009-10-19 17:15:35 0 d-----w- c:\program files\File Scanner Library (Spybot - Search & Destroy)
2009-10-18 19:06:14 4 ----a-w- c:\users\nick\appdata\roaming\mclip.dat
2009-10-18 19:06:14 388 ----a-w- c:\users\nick\appdata\roaming\hexplorer.dat
2009-10-17 03:26:25 195440 ------w- c:\windows\system32\MpSigStub.exe
2009-10-16 07:13:19 0 d-----w- c:\programdata\AIM
2009-10-16 07:13:02 0 d-----w- c:\program files\AIM
2009-10-16 07:12:55 0 d-----w- c:\program files\common files\Software Update Utility
2009-10-16 03:40:52 107 ----a-w- c:\windows\Gbridge.INI
2009-10-16 03:10:43 0 d-----w- c:\users\nick\appdata\roaming\Gbridge
2009-10-16 03:09:19 0 d-----w- c:\program files\Gbridge LLC
2009-10-14 16:27:45 0 d-----w- c:\program files\Zards software
2009-10-09 19:54:05 103720 ----a-w- c:\users\nick\GoToAssistDownloadHelper.exe
2009-10-09 17:46:05 598288 ----a-w- c:\windows\system32\temp.006
2009-10-09 17:46:05 22288 ----a-w- c:\windows\system32\temp.00B
2009-10-09 17:46:05 17920 ----a-w- c:\windows\system32\temp.009
2009-10-09 17:46:05 164112 ----a-w- c:\windows\system32\temp.007
2009-10-09 17:46:05 147728 ----a-w- c:\windows\system32\temp.008
2009-10-09 17:46:05 1409024 ----a-w- c:\windows\system32\temp.00A
2009-10-06 15:37:44 0 d-----w- c:\program files\common files\SafeNet Sentinel
2009-10-06 15:37:41 0 d-----w- c:\program files\Gene Codes
2009-10-06 15:22:36 0 d-----w- c:\program files\Sassafras K2

==================== Find3M ====================

2009-10-23 05:35:03 0 ---ha-w- c:\windows\system32\drivers\Msft_Kernel_HpqKbFiltr_01005.Wdf
2009-10-02 21:46:43 162760 ----a-w- c:\users\nick\appdata\roaming\nvModes.dat
2009-08-18 03:33:52 1193832 ----a-w- c:\windows\system32\FM20.DLL
2009-08-03 19:07:42 403816 ----a-w- c:\windows\system32\OGACheckControl.dll
2009-08-03 19:07:42 322928 ----a-w- c:\windows\system32\OGAAddin.dll
2009-08-03 19:07:42 230768 ----a-w- c:\windows\system32\OGAEXEC.exe
2009-07-14 04:56:42 31548 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2009-07-14 04:56:42 31548 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2009-07-14 04:56:42 291294 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2009-07-14 04:56:42 291294 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2009-07-14 04:41:57 174 --sha-w- c:\program files\desktop.ini
2009-07-14 00:34:40 291294 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2009-07-14 00:34:40 291294 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2009-07-14 00:34:38 31548 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2009-07-14 00:34:38 31548 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2009-06-10 21:26:35 9633792 --sha-r- c:\windows\fonts\StaticCache.dat
2009-01-29 03:16:28 22 --sha-w- c:\windows\sminst\HPCD.sys
2009-07-14 01:14:45 396800 --sha-w- c:\windows\winsxs\x86_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7600.16385_none_f12e83abb108c86c\WinMail.exe

============= FINISH: 2:03:31.95 ===============


Attached Files

Edited by brookstonfowler, 31 October 2009 - 01:15 AM.

BC AdBot (Login to Remove)


#2 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:07:18 PM

Posted 06 November 2009 - 06:37 PM

Hi brookstonfowler,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.


Can you try and run Gmer, a similar program to RootRepeal

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
Posted Image
m0le is a proud member of UNITE

#3 brookstonfowler

  • Topic Starter

  • Members
  • 12 posts
  • Local time:03:18 PM

Posted 06 November 2009 - 10:01 PM

i'm still here! :(

gmer will run for a little bit but then crashes. if i try to start it again i get the blue screen of death and an automatic restart. did the same thing in safe mode.

in very related news, since i've posted in the HJT forum i have not had symantec antivirus detect any more viruses, and superantispyware only detects the common cookie, so it's possible that the previous steps have worked, but i'll roll with whatever you need me to do.

thanks again.

#4 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:07:18 PM

Posted 07 November 2009 - 05:19 AM

There's a possibility that rootkit programs won't run on Windows 7.

The log you posted looks absolutely fine but let's check with a couple of scans which should work on Microsoft's new baby.

Please empty the temp files/cookies/cache (IE8)

1. Open Internet Options by clicking the Start button Picture of the Start button, clicking Control
Panel, clicking Network and Internet, and then clicking Internet Options.
2. Click the Safety button, and then click Delete Browsing History.
3. Select the check box next to each category of information you want to delete.
4. Select the Preserve Favorites website data check box if you do not want to delete the
cookies and files associated with websites in your Favorites list.
5. Click Delete. This could take awhile if you have a lot of files and history.


Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.

Please also run an online scan. If you have Internet Explorer as your main browser then use BitDefender below. Let me know if you aren't.

Please run a BitDefender Online Scan
  • Click I Agree to agree to the EULA.
  • Allow the ActiveX control to install when prompted.
  • Click Click here to scan to begin the scan.
  • Please refrain from using the computer until the scan is finished. This might take a while to run, but it is important that nothing else is running while you scan.
  • When the scan is finished, click on Click here to export the scan results.
  • Save the report to your desktop so you can post it in your next reply.
Thanks :(
Posted Image
m0le is a proud member of UNITE

#5 brookstonfowler

  • Topic Starter

  • Members
  • 12 posts
  • Local time:03:18 PM

Posted 07 November 2009 - 03:20 PM

here is the the MWB log:

Malwarebytes' Anti-Malware 1.41
Database version: 3118
Windows 6.1.7600

11/7/2009 3:19:01 PM
mbam-log-2009-11-07 (15-19-01).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 346687
Time elapsed: 1 hour(s), 27 minute(s), 36 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

i use firefox exclusively for online content. i only use IE for viewing offline stuff for programming purposes, so i didn't run the bitdefender.

#6 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:07:18 PM

Posted 07 November 2009 - 04:11 PM

Let's give you a different online scanner to run then :(

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
Thanks :(
Posted Image
m0le is a proud member of UNITE

#7 brookstonfowler

  • Topic Starter

  • Members
  • 12 posts
  • Local time:03:18 PM

Posted 07 November 2009 - 07:48 PM

ESET did not detect any threats, so I assume that the previous steps that I took from the direction I received in the other forum worked.

I appreciate your time (especially on a Saturday), and your very quick replies! If you need me to do anything else, though, I'm still game. Don't want to pull an antibiotic resistance effect on my lappy.

#8 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:07:18 PM

Posted 08 November 2009 - 04:39 AM

Don't want to pull an antibiotic resistance effect on my lappy.


I think we can call this topic completed and your PC clean. Please read and action anything in the final instructions below

You're clean. Good stuff! :(

Let's do some clearing up

Please make sure you turn on the Java Automatic Update Feature

Then you will not have to remember to update it when Java introduces a new version.
Java is updated very frequently, and the old versions are malware magnets.

Note: This feature is available only on Windows XP, 2003, 2000 (SP2 or higher) and set by default for these operating systems.

Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.

Here's some advice on how you can keep your PC clean

Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.

Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.

Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.

Finally, here's a treasure trove of antivirus, antimalware and antispyware resources

That's it brookstonfowler, happy surfing!


Posted Image
m0le is a proud member of UNITE

#9 brookstonfowler

  • Topic Starter

  • Members
  • 12 posts
  • Local time:03:18 PM

Posted 08 November 2009 - 11:13 AM

I think we can call this topic completed and your PC clean.

glad to hear it!

again, thanks for your time.

#10 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:07:18 PM

Posted 08 November 2009 - 02:45 PM

You're welcome :(
Posted Image
m0le is a proud member of UNITE

#11 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:07:18 PM

Posted 14 November 2009 - 05:59 AM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. :(

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users