Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

hijackthis log - trojan.packed.nsanti


  • This topic is locked This topic is locked
5 replies to this topic

#1 Cacophonous

Cacophonous

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:05:21 AM

Posted 23 December 2009 - 02:28 PM

Hi guys.

My first post.

Symantec Endpoint Protection (SEP) 11.0.5002.xxx has been alerting us about trojan.packed.nsanti in either user temp folder and or SEP quarantine folder. I just del SEP Quarantine folder and recreated it.


Windows XP Pro SP3.

Ran CCleaner. Did manual temp file removal also.

Scanned with SEP 11, Superantispyware, Malwarebytes, Sybot S&D...

Here is a hijackthis log run in safe mode w/networking:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:09:29 PM, on 12/23/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16945)
Boot mode: Safe mode with network support

Running processes:
C:WINDOWSSystem32smss.exe
C:WINDOWSsystem32winlogon.exe
C:WINDOWSsystem32services.exe
C:WINDOWSsystem32lsass.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSsystem32svchost.exe
C:Program FilesCommon FilesSymantec SharedccSvcHst.exe
C:Program FilesSymantecSymantec Endpoint ProtectionRtvscan.exe
C:WINDOWSTIREMOTETISERVICEMONITOR.EXE
C:WINDOWSsystem32ctfmon.exe
C:Program FilesCitrixGoToAssist Express Customer209g2ax_service.exe
C:Program FilesCitrixGoToAssist Express Customer209g2ax_comm_customer.exe
C:Program FilesCitrixGoToAssist Express Customer209g2ax_system_customer.exe
C:Program FilesCitrixGoToAssist Express Customer209g2ax_user_customer.exe
C:Program FilesCitrixGoToAssist Express Customer209g2ax_host.exe
C:WINDOWSexplorer.exe
C:Program FileshijackthisHijackThis.exe

R1 - HKCUSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.ftss.com
R0 - HKCUSoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.ftss.com
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.ftss.com
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLMSoftwareMicrosoftInternet ExplorerMain,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCUSoftwareMicrosoftInternet Connection Wizard,ShellNext = http://www.ftss.com/
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEHelperShim.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:PROGRA~1SPYBOT~1SDHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:Program FilesCommon FilesMicrosoft SharedWindows LiveWindowsLiveLogin.dll
O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll
O2 - BHO: SmartSelect - {F4971EE7-DAA0-4053-9964-665D8EE6A077} - C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll
O4 - HKLM..Run: [igfxtray] C:WINDOWSsystem32igfxtray.exe
O4 - HKLM..Run: [igfxhkcmd] C:WINDOWSsystem32hkcmd.exe
O4 - HKLM..Run: [igfxpers] C:WINDOWSsystem32igfxpers.exe
O4 - HKLM..Run: [Track-It! Workstation Manager Service Monitor] C:WINDOWSTIREMOTETIServiceMonitor.exe
O4 - HKLM..Run: [ccApp] "C:Program FilesCommon FilesSymantec SharedccApp.exe"
O4 - HKCU..Run: [ctfmon.exe] C:WINDOWSsystem32ctfmon.exe
O4 - HKCU..Run: [msnmsgr] "C:Program FilesWindows LiveMessengermsnmsgr.exe" /background
O4 - HKCU..Run: [SUPERAntiSpyware] C:Program FilesSUPERAntiSpywareSUPERAntiSpyware.exe
O4 - HKUSS-1-5-18..RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
O4 - HKUSS-1-5-18..RunOnce: [] (User 'SYSTEM')
O4 - HKUS.DEFAULT..RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
O6 - HKCUSoftwarePoliciesMicrosoftInternet ExplorerControl Panel present
O8 - Extra context menu item: Append Link Target to Existing PDF - res://C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Append to Existing PDF - res://C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert Link Target to Adobe PDF - res://C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:PROGRA~1MICROS~2Office12EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:PROGRA~1MICROS~2Office12REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:PROGRA~1SPYBOT~1SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:PROGRA~1SPYBOT~1SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:Program FilesMessengermsmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:Program FilesMessengermsmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.ftss.com
O15 - Trusted Zone: http://dms.ftss.com
O15 - Trusted Zone: http://esource.ftss.com
O15 - Trusted Zone: http://helpdesk.ftss.com
O15 - Trusted Zone: http://hr.ftss.com
O15 - Trusted Zone: http://matrix.ftss.com
O15 - Trusted Zone: http://rms.ftss.com
O15 - Trusted Zone: http://share.ftss.com
O15 - Trusted Zone: http://webmail.ftss.com
O15 - Trusted Zone: http://wireless.ftss.com
O15 - Trusted Zone: http://www.ftss.com
O15 - Trusted Zone: http://www.icrashtech.com
O15 - Trusted Zone: http://*.zeta
O15 - ESC Trusted Zone: http://*.delta
O15 - ESC Trusted Zone: http://lamda.ftssnet.ftss.com
O15 - ESC Trusted Zone: http://*.lamda
O15 - ESC Trusted Zone: http://*.delta (HKLM)
O15 - ESC Trusted Zone: http://lamda.ftssnet.ftss.com (HKLM)
O15 - ESC Trusted Zone: http://*.lamda (HKLM)
O15 - ESC Trusted IP range: http://192.9.200.196
O15 - ESC Trusted IP range: http://192.9.200.196 (HKLM)
O16 - DPF: {0a454840-7232-11d5-b63d-00c04faedb18} -
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1239197018703
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1239197007640
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab
O17 - HKLMSystemCCSServicesTcpipParameters: Domain = ftssnet.ftss.com
O17 - HKLMSoftware..Telephony: DomainName = ftssnet.ftss.com
O17 - HKLMSystemCS1ServicesTcpipParameters: Domain = ftssnet.ftss.com
O17 - HKLMSystemCS2ServicesTcpipParameters: Domain = ftssnet.ftss.com
O20 - Winlogon Notify: !SASWinLogon - C:Program FilesSUPERAntiSpywareSASWINLO.dll
O20 - Winlogon Notify: GoToAssist Express Customer - C:Program FilesCitrixGoToAssist Express Customer209g2ax_winlogon.dll
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:Program FilesCommon FilesSymantec SharedccSvcHst.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:Program FilesCommon FilesSymantec SharedccSvcHst.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:Program FilesCommon FilesMacrovision SharedFLEXnet PublisherFNPLicensingService.exe
O23 - Service: GoToAssist Express Customer - Citrix Online, a division of Citrix Systems, Inc. - C:Program FilesCitrixGoToAssist Express Customer209g2ax_service.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:PROGRA~1SymantecLIVEUP~1LUCOMS~1.EXE
O23 - Service: Numara Remote Control Helper ver. 9.21 (2008338) (NetOp Host for NT Service) - Danware Data A/S - C:Program FilesNumara SoftwareRemoteHostNHOSTSVC.EXE
O23 - Service: Symantec Management Client (SmcService) - Symantec Corporation - C:Program FilesSymantecSymantec Endpoint ProtectionSmc.exe
O23 - Service: Symantec Endpoint Protection (Symantec AntiVirus) - Symantec Corporation - C:Program FilesSymantecSymantec Endpoint ProtectionRtvscan.exe
O23 - Service: Track-It! Workstation Manager (TIRmtSvc) - Numara Software, Inc. - C:WINDOWSTIREMOTETIRemoteService.exe

--
End of file - 8624 bytes

Any help is appreciated...

I just ran hijackthis on a normal boot:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:34:44 PM, on 12/23/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16945)
Boot mode: Normal

Running processes:
C:WINDOWSSystem32smss.exe
C:WINDOWSsystem32winlogon.exe
C:WINDOWSsystem32services.exe
C:WINDOWSsystem32lsass.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSSystem32svchost.exe
C:WINDOWSsystem32svchost.exe
C:Program FilesSymantecSymantec Endpoint ProtectionSmc.exe
C:Program FilesCommon FilesSymantec SharedccSvcHst.exe
C:WINDOWSsystem32spoolsv.exe
C:Program FilesCommon FilesMicrosoft SharedVS7DEBUGmdm.exe
C:WINDOWSsystem32svchost.exe
C:Program FilesSymantecSymantec Endpoint ProtectionRtvscan.exe
C:WINDOWSTIREMOTETIRemoteService.exe
C:WINDOWSsystem32winlogon.exe
C:Program FilesCitrixGoToAssist Express Customer209g2ax_processfactory.exe
C:WINDOWSsystem32rdpclip.exe
C:WINDOWSExplorer.EXE
C:Program FilesSymantecSymantec Endpoint ProtectionSmcGui.exe
C:WINDOWSTIREMOTETIServiceMonitor.exe
C:Program FilesCommon FilesSymantec SharedccApp.exe
C:Program FilesWindows LiveMessengermsnmsgr.exe
C:WINDOWSsystem32ctfmon.exe
C:Program FileshijackthisHijackThis.exe

R1 - HKCUSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.ftss.com
R0 - HKCUSoftwareMicrosoftInternet ExplorerMain,Start Page = http://www.ftss.com
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://www.ftss.com
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLMSoftwareMicrosoftInternet ExplorerMain,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCUSoftwareMicrosoftInternet Connection Wizard,ShellNext = http://www.ftss.com/
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEHelperShim.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:PROGRA~1SPYBOT~1SDHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:Program FilesCommon FilesMicrosoft SharedWindows LiveWindowsLiveLogin.dll
O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll
O2 - BHO: SmartSelect - {F4971EE7-DAA0-4053-9964-665D8EE6A077} - C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll
O4 - HKLM..Run: [igfxtray] C:WINDOWSsystem32igfxtray.exe
O4 - HKLM..Run: [igfxhkcmd] C:WINDOWSsystem32hkcmd.exe
O4 - HKLM..Run: [igfxpers] C:WINDOWSsystem32igfxpers.exe
O4 - HKLM..Run: [Track-It! Workstation Manager Service Monitor] C:WINDOWSTIREMOTETIServiceMonitor.exe
O4 - HKLM..Run: [ccApp] "C:Program FilesCommon FilesSymantec SharedccApp.exe"
O4 - HKCU..Run: [msnmsgr] "C:Program FilesWindows LiveMessengermsnmsgr.exe" /background
O4 - HKCU..Run: [ctfmon.exe] C:WINDOWSsystem32ctfmon.exe
O4 - HKUSS-1-5-18..RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
O4 - HKUSS-1-5-18..RunOnce: [] (User 'SYSTEM')
O4 - HKUS.DEFAULT..RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
O6 - HKCUSoftwarePoliciesMicrosoftInternet ExplorerControl Panel present
O8 - Extra context menu item: Append Link Target to Existing PDF - res://C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Append to Existing PDF - res://C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert Link Target to Adobe PDF - res://C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert to Adobe PDF - res://C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:PROGRA~1MICROS~2Office12EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:PROGRA~1MICROS~2Office12REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:PROGRA~1SPYBOT~1SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:PROGRA~1SPYBOT~1SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:Program FilesMessengermsmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:Program FilesMessengermsmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.ftss.com
O15 - Trusted Zone: http://dms.ftss.com
O15 - Trusted Zone: http://esource.ftss.com
O15 - Trusted Zone: http://helpdesk.ftss.com
O15 - Trusted Zone: http://hr.ftss.com
O15 - Trusted Zone: http://matrix.ftss.com
O15 - Trusted Zone: http://rms.ftss.com
O15 - Trusted Zone: http://share.ftss.com
O15 - Trusted Zone: http://webmail.ftss.com
O15 - Trusted Zone: http://wireless.ftss.com
O15 - Trusted Zone: http://www.ftss.com
O15 - Trusted Zone: http://www.icrashtech.com
O15 - Trusted Zone: http://*.zeta
O15 - ESC Trusted Zone: http://*.delta
O15 - ESC Trusted Zone: http://lamda.ftssnet.ftss.com
O15 - ESC Trusted Zone: http://*.lamda
O15 - ESC Trusted Zone: http://*.delta (HKLM)
O15 - ESC Trusted Zone: http://lamda.ftssnet.ftss.com (HKLM)
O15 - ESC Trusted Zone: http://*.lamda (HKLM)
O15 - ESC Trusted IP range: http://192.9.200.196
O15 - ESC Trusted IP range: http://192.9.200.196 (HKLM)
O16 - DPF: {0a454840-7232-11d5-b63d-00c04faedb18} -
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1239197018703
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1239197007640
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab
O17 - HKLMSystemCCSServicesTcpipParameters: Domain = ftssnet.ftss.com
O17 - HKLMSoftware..Telephony: DomainName = ftssnet.ftss.com
O17 - HKLMSystemCS1ServicesTcpipParameters: Domain = ftssnet.ftss.com
O17 - HKLMSystemCS2ServicesTcpipParameters: Domain = ftssnet.ftss.com
O20 - Winlogon Notify: !SASWinLogon - C:Program FilesSUPERAntiSpywareSASWINLO.dll
O20 - Winlogon Notify: GoToAssist Express Customer - C:Program FilesCitrixGoToAssist Express Customer209g2ax_winlogon.dll
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:Program FilesCommon FilesSymantec SharedccSvcHst.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:Program FilesCommon FilesSymantec SharedccSvcHst.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:Program FilesCommon FilesMacrovision SharedFLEXnet PublisherFNPLicensingService.exe
O23 - Service: GoToAssist Express Customer - Citrix Online, a division of Citrix Systems, Inc. - C:Program FilesCitrixGoToAssist Express Customer209g2ax_service.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:PROGRA~1SymantecLIVEUP~1LUCOMS~1.EXE
O23 - Service: Numara Remote Control Helper ver. 9.21 (2008338) (NetOp Host for NT Service) - Danware Data A/S - C:Program FilesNumara SoftwareRemoteHostNHOSTSVC.EXE
O23 - Service: Symantec Management Client (SmcService) - Symantec Corporation - C:Program FilesSymantecSymantec Endpoint ProtectionSmc.exe
O23 - Service: Symantec Endpoint Protection (Symantec AntiVirus) - Symantec Corporation - C:Program FilesSymantecSymantec Endpoint ProtectionRtvscan.exe
O23 - Service: Track-It! Workstation Manager (TIRmtSvc) - Numara Software, Inc. - C:WINDOWSTIREMOTETIRemoteService.exe

--
End of file - 8714 bytes

Here is an example of a SEP alert.
Weird it seems to flag it from quarantine?

Message from:
Server name: HADES
Server IP: 192.9.200.240

At least one security risk found:

Risk name: Trojan.Packed.NsAnti
File path: c:Documents and SettingsAll UsersApplication DataSymantecSRTSPQuarantineAPQECFD.tmp
Event time: 2009-12-23 04:00:04 GMT
Database insert time: 2009-12-23 19:29:27 GMT
User: administrator
Computer: produccion
IP Address: 192.168.x.x
Domain: Default
Server: HADES
Client Group: My Company
Action taken on risk: Details pending

Merged posts. ~ OB

Edited by Orange Blossom, 25 December 2009 - 03:47 AM.


BC AdBot (Login to Remove)

 


#2 Cacophonous

Cacophonous
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:05:21 AM

Posted 04 January 2010 - 03:01 PM

bump

#3 syler

syler

  • Malware Response Team
  • 8,150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Warrington, UK
  • Local time:11:21 AM

Posted 04 January 2010 - 06:47 PM

Hello,

My name is Syler and I will be helping you to solve your Malware issues. If you have since resolved your issues I would appreciate if you
would let me no so I can close this topic, if you still need help please let me no what issues you are still having, in your next reply.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and
we are trying our best to keep up.

  • Download random's system information tool (RSIT) by random/random from here and save it to your desktop.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Once it has finished, two logs will open. Please post the contents of both log.txt (<<will be maximized) and info.txt (<<will be minimized)

  • Please download GMER from one of the following locations, and save it to your desktop:
    • Main Mirror
      This version will download a randomly named file (Recommended)
    • Zip Mirror
      This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs, as this process may crash your computer.
  • Temporarily disable any real-time active protection so your security program drivers will not conflict with gmer's driver.
  • Double click on Gmer to run it.
  • Allow the gmer.sys driver to load if asked.
  • You may see a rootkit warning window, If you do, click No.
  • Untick the following boxes on the right side of the Gmer screen.
    Sections
    IAT/EAT
    Files
    Show All
  • Click on Posted Image and wait for the scan to finish.
  • If you see a rootkit warning window, click OK.
  • Push Posted Image and save the logfile to your desktop.
  • Copy and Paste the contents of that file in your next post.


Then please post back here with the following:
  • log.txt
  • info.txt
  • Gmer log
Thanks

unite.jpg


#4 Cacophonous

Cacophonous
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:05:21 AM

Posted 05 January 2010 - 01:29 PM

Syler - thanks.

I will do this as soon as I can coordinate with the end-user.

#5 syler

syler

  • Malware Response Team
  • 8,150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Warrington, UK
  • Local time:11:21 AM

Posted 05 January 2010 - 06:23 PM

Ok no problem :(

unite.jpg


#6 syler

syler

  • Malware Response Team
  • 8,150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Warrington, UK
  • Local time:11:21 AM

Posted 10 January 2010 - 02:53 AM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending me a PM
with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.

unite.jpg





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users