Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Can't get to suggested links from searches (Google, Yahoo, etc.)


  • Please log in to reply
25 replies to this topic

#1 Kat

Kat

  • Members
  • 126 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 08 November 2009 - 01:19 AM

Two-year old Toshiba Satellite A205 laptop, belonging to a family member:

Since mid-September and following a particular failed automatic update (possibly Vista SP2), with Google as the homepage and running IE, only the hotlinks on the Google homepage are accessible. If a link is chosen from the Google homepage, any subsequent links also work fine. What doesn't work is a Google search, Yahoo search, etc......when search results are brought up, any attempt to go to the suggested link locks up the screen, and the only way out is through the Task Manager , using the Applications tab, "end task", etc.

With no apps open, the CPU usage is running 55-70%, but the only active items I can see are McSACore.exe (about 50 CPU usage) and System Idle Process (about 45). The Windows update log shows that updates began to fail on 9/21/09 (Vista SP2); however, that one was successful on 9/27. Some other update attempts have failed, then subsequently been successful; others have not been successful beginning 9/21/09. One of those is Outlook 07 junk email filter; however, the laptop's owner does not use Outlook, just webmail. Virus protection, spyware, and firewall is operating under "McAfee Security Center", and Windows Defender is operational. The Windows firewall is 'off'. I managed to download Ad-Aware; it refuses to update, but a full scan revealed 25 cookies. Also did a work-around and downloaded and ran AVG; numerous cookies were ID'd and either automatically placed in virus vault or 'healed'. One 'potentially dangerous' object was found under 'HKLM\software\classes\CpnMgr.CMV5". I was finally able to move it to the virus vault, but the search/link lockup problem remains. Can you help me fix this problem, please?

BC AdBot (Login to Remove)

 


#2 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:26 PM

Posted 08 November 2009 - 05:01 PM

Hello and welcome to Bleeping Computer.

Please subscribe to your topic so that you will be notified as soon as I post a reply, instead of you having to check the topic all of the time. This will allow you to get an email notification when I reply.

To subscribe, go to your topic, and at the top right hand corner by your first post, click the Options button and then click Track this topic. The bullet the immediate notification bubble. Then press submit.


Lets take a look with Malwarebytes

Please download Malwarebytes' Anti-Malware from here:
Malwarebytes
Please rename the file BEFORE downloading to zztoy.exe instead of mbam-setup.exe

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

Double Click zztoy.exe to install the application.
* Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select "Perform Full Scan", then click Scan.
* The scan may take some time to finish,so please be patient.
* When the scan is complete, click OK, then Show Results to view the results.
* Make sure that everything is checked, and click Remove Selected.
* When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
* The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
* Copy&Paste the entire MBAM report (even if it does not find anything) in your next reply

Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.


If Malwarebytes won't install or run

Some types of malware will disable MBAM and other security tools. If MBAM will not install, try renaming it. Right-click on the mbam-setup.exe file and change the .exe extension to .bat, .com, .pif, or .scr and then double-click on it to run.

If after installation, MBAM will not run, open the Malwarebytes' Anti-Malware folder in Program Files, right-click on mbam.exe and change the .exe as noted above. Then double-click on it to run.
Computer Pro

#3 Kat

Kat
  • Topic Starter

  • Members
  • 126 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 09 November 2009 - 12:49 AM

Hi Computer Pro,

Thanks so much for taking this one on. Here's the results of the Malwarebytes scan.

Malwarebytes' Anti-Malware 1.41
Database version: 3130
Windows 6.0.6002 Service Pack 2

11/8/2009 9:06:01 PM
mbam-log-2009-11-08 (21-06-01).txt

Scan type: Full Scan (C:\|)
Objects scanned: 263837
Time elapsed: 2 hour(s), 23 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#4 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:26 PM

Posted 10 November 2009 - 07:54 AM

Ok, lets try SAS:

Please run ATF and SAS:

Note.. SAS doesn't open the registry hives for other user accounts on the system, so scans should be done from each user account.

Note 2: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware, Free Home Edition

Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.
Computer Pro

#5 Kat

Kat
  • Topic Starter

  • Members
  • 126 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 10 November 2009 - 07:29 PM

Here you are, CP.

And question....can I possibly infect my own PC with this "troubled" laptop you are working on for me - I've been allowing it to network with mine from time to time as we work through the problems.

Thanks for stickin' with me.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 11/10/2009 at 02:11 PM
Application Version : 4.29.1004
Core Rules Database Version : 4256
Trace Rules Database Version: 2143
Scan type : Complete Scan
Total Scan Time : 01:29:51
Memory items scanned : 351
Memory threats detected : 0
Registry items scanned : 7467
Registry threats detected : 0
File items scanned : 151553
File threats detected : 6

Adware.Tracking Cookie
C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\Low\joe@at.atwola[1].txt
C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\Low\joe@collective-media[1].txt
C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\Low\joe@invitemedia[2].txt
C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\Low\joe@lucidmedia[2].txt
C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\Low\joe@media6degrees[1].txt
C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\Low\joe@revsci[2].txt

#6 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:26 PM

Posted 11 November 2009 - 06:15 PM

I am not sure if it could or not since I am not sure of the infection that we are dealing with. So lets run RootRepeal:

Please install RootRepeal

Go HERE, and download RootRepeal.zip to your Desktop.
Tutorial with images ,if needed >> L@@K
Unzip that to your Desktop and then click RootRepeal.exe to open the scanner.

*Open the folder and double-click on RootRepeal.exe to launch it. If using Vista, right-click and Run as Administrator...
* Click on the FILES tab, then click the Scan button.
* In the Select Drives, dialog Please select drives to scan: select all drives showing, then click OK.
* When the scan has completed, a list of files will be generated in the RootRepeal window.
* Click on the Save Report button and save it as rootrepeal.txt to your desktop or the same location where you ran the tool from.
* Open rootrepeal.txt in Notepad and copy/paste its contents in your next reply.
* Exit RootRepeal and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

Please note: If Rootrepeal fails to run, try this step: Click Settings - Options. Set the Disk Access slider to High


Note 2: If RootRepeal cannot complete a scan and results in a crash report, try repeating the scan in "Safe Mode".
Computer Pro

#7 Kat

Kat
  • Topic Starter

  • Members
  • 126 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 12 November 2009 - 06:22 PM

Last night I ran RootRepeal in Safe Mode which resulted in a crash report:

ROOTREPEAL CRASH REPORT

-------------------------

Windows Version: Windows Vista SP2

Exception Code: 0xc0000005

Exception Address: 0x0040ab12

Attempt to write to address: 0x00000004



This morning, I re-ran it, again in Safe Mode with the Disk Access slider set at high, and the scan hung at a certain point. Don't know how to do a cut/paste from the scan log, but can tell you that it began with "hiberfil.sys", then many "system volume information" files, followed by some .dll files, one temp file (sqlite). Then there were two "$avg" files with the status reporting as "Allocation size mismatch". (The AVG anti-virus app is loaded on this machine). Then two "\inf\.net" files, followed by a long list of files which began "windows\winsxs\catalogs\86....". The scan hung in this section, with "\Windows\winsxs\manifests" showing as the area being scanned. No crash report was generated; the computer just hung up at this point. There was also one other version of a "size mismatch" - - windows\ntbtlog.txt(API:814872,Raw:814748).

What next, O revered CPro?

Edited by Kat, 12 November 2009 - 06:23 PM.


#8 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:26 PM

Posted 13 November 2009 - 06:57 PM

lets try Sophos:

Please download Sophos Anti-rootkit& save it to your desktop.
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Credits to DaChew
Be sure to print out and read the User Manualand Release Notes
• Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
• Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
• A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now". Click Yes.
• Make sure the following are checked:
o Running processes
o Windows Registry
o Local Hard Drives

• Click Start scan.
• Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
• When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
• Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
o Files tagged as Removable: No are not marked for removal and cannot be removed.
o Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
o Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
• Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
• A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
• After reboot, a dialog box displays the files you selected for removal and the action taken.
• Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
• When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
• This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\<username>\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
• Disconnect from the Internet or physically unplug you Internet cable connection.
• Clean out your temporary files.
• Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
• Temporarily disable your anti-virus and real-time anti-spyware protection.
• After starting the scan, do not use the computer until the scan has completed.
• When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.
Computer Pro

#9 Kat

Kat
  • Topic Starter

  • Members
  • 126 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 15 November 2009 - 10:26 PM

Greetings, CP, with thanks to DaChew,

Sophos found 86 hidden items but found none of them worthy of zapping. I apologize for failing to delete temp files prior to the scan.
One query failed - \HKEY_LOCAL_MACHINE\Software|Microsoft\windowsNT\currentVersion\perflib\009. The message was “You may not have access rights to the whole registry. Incorrect function”.

Does this have any meaning: When searching for a certain file using Vista’s search function, I encountered an incidence of almost 100 files which were reported on 9-27-09 as “Setup Information” and “PreCompiled Setup Information” types, some with the .pnf extension and many without an extension. The Windows Update history shows a failed attempt at installing Vista SP2 on 9/21 and again on 9/22; however, on 9/27, the same date as those 100 files were logged, Vista SP2 was successfully installed. It was after that date the problems I described in my initial post began. I kept a log of that search.

The Task Manager is still reporting CPU usage around 60% with no apps running, and McSACore.exe (McAfee’s ‘Site Manager’) is still showing 49-50 under “CPU”.

Sigh….I was hoping to give you scan results with some significant items to chew upon!

Gratefully,
~Kat

#10 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:26 PM

Posted 15 November 2009 - 10:30 PM

• When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
• This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\<username>\Local Settings\Temp\.


Could you please post the log?
Computer Pro

#11 Kat

Kat
  • Topic Starter

  • Members
  • 126 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 15 November 2009 - 10:55 PM

Oh my, do I feel stoooopid...I thought since no recommended actions were suggested by Sophos after the scan that you didn't want to see the log. And then I had to figure out how to find it using Vista, Windows XP'r that I am. :thumbsup:

Here you go....

Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 11/15/2009 at 13:41:02 PM
User "Joe" on computer "JOE-PC"
Windows version 6.0 SP 2.0 Service Pack 2 build 6002 SM=0x300 PT=0x1 Win32
Info: Starting process scan.
Stopped logging on 11/15/2009 at 13:41:42 PM


Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 11/15/2009 at 13:41:58 PM
User "Joe" on computer "JOE-PC"
Windows version 6.0 SP 2.0 Service Pack 2 build 6002 SM=0x300 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Warning: Failed to query live registry key \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\009.
You may not have access rights to the whole registry.
Incorrect function.
Stopped logging on 11/15/2009 at 14:03:52 PM


Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 11/15/2009 at 14:40:03 PM
User "Joe" on computer "JOE-PC"
Windows version 6.0 SP 2.0 Service Pack 2 build 6002 SM=0x300 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Warning: Failed to query live registry key \HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\009.
You may not have access rights to the whole registry.
Incorrect function.
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\Program Files\InstallShield Installation Information\{FEDD27A0-B306-45EF-BF58-B527406B42C8}\ISSetup.dll
Hidden: file C:\WORKSSETUP\MSWORKS\Common\MSShared\WkShared\MSTH3GE.DLL
Hidden: file C:\Program Files\Adobe\Reader 8.0\Reader\plug_ins\ImageViewer\SVGCore.DLL
Hidden: file C:\Program Files\Adobe\Adobe Help Viewer\1.0\ahv.exe
Hidden: file C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcrst.dll
Hidden: file C:\Users\Joe\Desktop\RootRepeal\RootRepeal.exe
Hidden: file C:\sa200f3v250\2258d250.exe
Hidden: file C:\sa200f3v250\wwhtm34i.dll
Hidden: file C:\Program Files\InstallShield Installation Information\{9FE35071-CAB2-4E79-93E7-BFC6A2DC5C5D}\ISSetup.dll
Hidden: file C:\Program Files\InstallShield Installation Information\{12B3A009-A080-4619-9A2A-C6DB151D8D67}\ISSetup.dll
Hidden: file C:\Program Files\InstallShield Installation Information\{617C36FD-0CBE-4600-84B2-441CEB12FADF}\ISSetup.dll
Hidden: file C:\Program Files\InstallShield Installation Information\{78C6A78A-8B03-48C8-A47C-78BA1FCA2307}\ISSetup.dll
Hidden: file C:\Program Files\InstallShield Installation Information\{DB780B85-B4B5-4864-A49C-9B706B169C93}\ISSetup.dll
Hidden: file C:\Program Files\Google\Picasa3\Picasa3i18n.dll
Hidden: file C:\Program Files\Google\Picasa3\Uninstall.exe
Hidden: file C:\Windows\System32\DriverStore\FileRepository\hdart.inf_bc3a8213\RtHDVCpl.exe
Hidden: file C:\Program Files\TOSHIBA Games\uninstall.exe
Hidden: file C:\Program Files\TOSHIBA Games\Bejeweled 2 Deluxe\bass.dll
Hidden: file C:\Program Files\TOSHIBA Games\Bejeweled 2 Deluxe\Uninstall.exe
Hidden: file C:\Program Files\TOSHIBA Games\Blackhawk Striker 2\Uninstall.exe
Hidden: file C:\Program Files\TOSHIBA Games\FATE\Fate.exe
Hidden: file C:\Program Files\TOSHIBA Games\Virtual Villagers - A New Home\fmod.dll
Hidden: file C:\Program Files\TOSHIBA Games\FATE\fmod.dll
Hidden: file C:\Program Files\TOSHIBA Games\FATE\Uninstall.exe
Hidden: file C:\Program Files\TOSHIBA Games\Mah Jong Quest\Uninstall.exe
Hidden: file C:\Program Files\TOSHIBA Games\Mystery P.I. - The Lottery Ticket\bass.dll
Hidden: file C:\Program Files\TOSHIBA Games\Mystery P.I. - The Lottery Ticket\Uninstall.exe
Hidden: file C:\Program Files\TOSHIBA Games\Polar Golfer\fmod.dll
Hidden: file C:\Program Files\TOSHIBA Games\Penguins!\fmod.dll
Hidden: file C:\Program Files\TOSHIBA Games\Penguins!\Uninstall.exe
Hidden: file C:\Program Files\TOSHIBA Games\Polar Bowler\Uninstall.exe
Hidden: file C:\Program Files\TOSHIBA Games\Polar Golfer\Uninstall.exe
Hidden: file C:\Program Files\TOSHIBA Games\Sea Life Safari\fmod.dll
Hidden: file C:\Program Files\TOSHIBA Games\Sea Life Safari\SeaLifeSafari.exe
Hidden: file C:\Program Files\TOSHIBA Games\Sea Life Safari\Uninstall.exe
Hidden: file C:\Program Files\TOSHIBA Games\TOSHIBA Game Console\Uninstall.exe
Hidden: file C:\Program Files\TOSHIBA Games\Virtual Villagers - A New Home\Uninstall.exe
Hidden: file C:\temp.tvap\ISSetup.dll
Hidden: file C:\Program Files\Toshiba\FlashCards\BlackPng.dll
Hidden: file C:\Windows\System32\cselect.exe
Hidden: file C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Core\1587d0b80517d46def2b0757d5a775dd\System.Core.ni.dll
Hidden: file C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Data.Linq\2691e9103e50954a788f4ef5f53cb49e\System.Data.Linq.ni.dll
Hidden: file C:\Windows\winsxs\x86_microsoft-windows-networkexplorer_31bf3856ad364e35_6.0.6000.16386_none_3e1b9f1648f54ac5\networkexplorer.dll
Hidden: file C:\Users\Joe\Desktop\ATF-Cleaner.exe
Hidden: file C:\Windows\System32\sysprep\MakeLink.exe
Hidden: file C:\Program Files\Yahoo!\Common\unyt_wrap.exe
Hidden: file C:\Windows\winsxs\x86_microsoft-windows-ie-antiphishfilter_31bf3856ad364e35_6.0.6000.16397_none_f95184b96edab0ad\ieapfltr.dat
Hidden: file C:\WORKSSETUP\install.exe
Hidden: file C:\Program Files\InstallShield Installation Information\{7095FD27-37F0-4750-9DE8-D37DC0043706}\ISSetup.dll
Hidden: file C:\Program Files\InstallShield Installation Information\{7095FD27-37F0-4750-9DE8-D37DC0043706}\_ISSetup.dll
Hidden: file C:\Program Files\InstallShield Installation Information\{6C5F3BDC-0A1B-4436-A696-5939629D5C31}\ISSetup.dll
Hidden: file C:\ProgramData\{174892B1-CBE7-44F5-86FF-AB555EFD73A3}\Microsoft Office Activation Assistant.exe
Hidden: file C:\WORKSSETUP\MSWORKS\PFiles\MSWorks\lnchtour.exe
Hidden: file C:\Program Files\InstallShield Installation Information\{D14E3D40-2004-11D3-BFBF-00A0248F3321}\ISSetup.dll
Hidden: file C:\Program Files\Common Files\microsoft shared\Works Shared\MSSP3GE.DLL
Hidden: file C:\Program Files\Microsoft Works\lnchtour.exe
Hidden: file C:\Program Files\TurboTax\Deluxe 2007\32bit\MSXML3.EXE
Hidden: file C:\Program Files\TurboTax\Deluxe 2007\32bit\TTXCTBTI.EXE
Hidden: file C:\Program Files\Common Files\AnswerWorks 4.0\awTPort.dll
Hidden: file C:\Program Files\Common Files\AnswerWorks 4.0\LtSpynEn30.dll
Hidden: file C:\Users\Joe\AppData\Local\Temp\{EC17C5DB-85FC-4C7D-92C7-267C57D60989}\ISSetup.dll
Hidden: file C:\Program Files\TurboTax\Deluxe 2008\ttaximp.dll
Hidden: file C:\Windows\winsxs\x86_microsoft-windows-naturallanguage6_31bf3856ad364e35_6.0.6000.16710_none_9be9c78e2d9d5d54\NlsLexicons0021.dll
Hidden: file C:\Windows\winsxs\x86_microsoft-windows-naturallanguage6_31bf3856ad364e35_6.0.6001.22211_none_9e5aa34943e0a766\NlsLexicons0003.dll
Hidden: file C:\Windows\System32\GPhotos.scr
Hidden: file C:\Windows\winsxs\x86_microsoft-windows-t..nkrecognition.pt-br_31bf3856ad364e35_6.0.6001.18000_none_c9a8f40d7e700657\mshwptb.dll
Hidden: file C:\Windows\winsxs\x86_microsoft-windows-accessibilitycpl_31bf3856ad364e35_6.0.6001.18000_none_595dc0d353db907b\accessibilitycpl.dll
Hidden: file C:\Windows\System32\ssBranded.scr
Hidden: file C:\Windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.21022.8_none_bcb86ed6ac711f91\msvcm90.dll
Hidden: file C:\Program Files\Microsoft Office\Office12\CRYPTOPP.DLL
Hidden: file C:\ProgramData\HP\Installer\Temp\dpinst_x32\dpinst.exe
Hidden: file C:\Windows\Installer\$PatchCache$\Managed\00002119030000000000000000F01FEC\12.0.6215\OART.DLL
Hidden: file C:\Program Files\Yahoo!\SoftwareUpdate\Uninst_AutoUpdater.exe
Hidden: file C:\Windows\System32\Macromed\Flash\uninstall_activeX.exe
Hidden: file C:\Program Files\Common Files\AnswerWorks 5.0\LtSpynEn30.dll
Hidden: file C:\Program Files\Common Files\AnswerWorks 5.0\VFisSDK25.dll
Hidden: file C:\Windows\winsxs\x86_wpf-xamlviewer_31bf3856ad364e35_6.0.6001.18096_none_55b2fef17d307612\XamlViewer_v0300.exe
Hidden: file C:\Program Files\TOSHIBA Games\TOSHIBA Game Console\WTDownloader.exe
Hidden: file C:\Program Files\Yahoo!\Common\unyt.exe
Hidden: file C:\Windows\winsxs\x86_microsoft-windows-s..ent-sku-homepremium_31bf3856ad364e35_6.0.6001.18000_none_3ba55afaf9844481\Security-Licensing-SLC-Component-SKU-HomePremium-RETAIL1-ul-oob.xrm-ms
Hidden: file C:\Program Files\Windows Media Player\wmplayer.exe
Hidden: file C:\Windows\winsxs\msil_system.serviceprocess_b03f5f7f11d50a3a_6.0.6002.18005_none_54d960417ce67122\System.ServiceProcess.dll
Hidden: file C:\Windows\winsxs\x86_microsoft-windows-rmcast_31bf3856ad364e35_6.0.6002.18005_none_5669453d850ccabc\rmcast.sys
Hidden: file C:\Windows\winsxs\x86_microsoft-windows-r..t-managementconsole_31bf3856ad364e35_6.0.6002.18005_none_f4442f949850c43c\ntmsmgr.dll
Hidden: file C:\Windows\System32\scavenge.dll
Hidden: file C:\Windows\System32\RMActivate_isv.exe
Stopped logging on 11/15/2009 at 17:00:58 PM

#12 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:26 PM

Posted 16 November 2009 - 07:11 PM

Ok, lets run Dr. Web:

Please download Dr. Web the free version & save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr. Web Cureit as follows:
• Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
• Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
• The Express scan will automatically begin.
(This is a short scan of files currently running in memory, boot sectors, and targeted folders).
• If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
• If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
• When complete, click Select All, then choose Cure > Move incurable.
(This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
• Now put a check next to Complete scan to scan all local disks and removable media.
• In the top menu, click Settings > Change settings, and UNcheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
• Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
• When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
• Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
• In the top menu, click file and choose save report list.
• Save the DrWeb.csv report to your desktop.
• Exit Dr.Web Cureit when done.
• Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
• After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)
Computer Pro

#13 Kat

Kat
  • Topic Starter

  • Members
  • 126 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 18 November 2009 - 02:18 PM

Express scan took approx 7 hours to complete, no viruses found.
Complete scan took approx 12 hours to complete, no viruses found.
(No log to post for your review).

In Safe Mode and with McAfee Security shut down during the scans, Task Manager reported a reduction in CPU use to approx 25%.

Sigh......

Express scan took approx 7 hours to complete, no viruses found.
Complete scan took approx 12 hours to complete, no viruses found.
(No log to post for your review).

In Safe Mode and with McAfee Security shut down during the scans, Task Manager reported a reduction in CPU use to approx 25%.

Sigh......

Edited by Kat, 18 November 2009 - 02:19 PM.


#14 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:26 PM

Posted 18 November 2009 - 04:43 PM

This could possibly be McAfee's fault. It is not know to perform that well
Computer Pro

#15 Kat

Kat
  • Topic Starter

  • Members
  • 126 posts
  • OFFLINE
  •  
  • Local time:01:26 PM

Posted 18 November 2009 - 05:31 PM

Are we done with our scans, then?

I'm about to disable the "Site Advisor" portion of McAfee Security and see what happens. Also, the machine's owner is so mad at McAfee that he is telling me to delete the entire program and load what I use on my own PC....AdAware, Spybot, Spyware Blaster and AVG....but (and a huge 'but'), it appears AVG is removing its free version. Do you know of another good free AV? I'm sold on AVG and am willing to pay for it myself. Perhaps this is off-topic; sorry, if so. And thank you so much for guiding me through all the scans.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users