Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Worm.win32.netsky infection


  • This topic is locked This topic is locked
7 replies to this topic

#1 atlaslog

atlaslog

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:10:52 AM

Posted 31 December 2009 - 04:37 AM

Originally, I was getting this message when booting the computer:

Spyware Alert!
Security Warning!
Worm.win32.Netsky detected on your machine.
the virus is destributed via the internet through e-mail and Active-x objects.
the worm has its own SMTP engine which means it gathers e-mails from your local compter and re-distributes itself.
In worst cases this worm can allow attachers to access your computer, stealing passwords and personal data.
Viruses can damage your confidential data and wonk on your computer.
Continue working in unportected mode is very dangerous.

Type: Virus
System affected: Windows, 200, NT, ME, XP, VISTA, 7
Security risk(0-5): 5
Recomendations: It is necessary to perform a full system scan.

There was also a green background with an infection message and an annoying pop up telling me to download some antivirus programs.

After doing some research, I've gotten rid of this message at startup, the background, and the pop up message. However, my Symantec antivirus is still finding this trojan.vundo and is completely incapable of removing it, and I'm still getting internet pop ups. I've also tried, among other things, smitfraudfix.exe, which didn't work at all, even if with system restore disabled. I couldn't download Malwarebytes Anti-Malware (everytime I tried, after installation, a message said I was missing files and it was unable to boot).

I've exhausted just about everything I've got, and any help would be much appreciated.

Attached Files



BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:10:52 AM

Posted 31 December 2009 - 12:59 PM

Hello! :(
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.

Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please copy and paste the contents of C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 atlaslog

atlaslog
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:10:52 AM

Posted 31 December 2009 - 02:32 PM

Thank you for the help. The background of the computer has partially reverted to the default I had before the infection (it's partially surrounded by a blue square). When I first booted the computer, two windows popped up saying that "yivezopo.dll" and "dowikabu.dll" were unable to be found. Also, the popups seemed to have disappeared, but the virus appears to still be on the computer: I keep getting redirected, when clicking on google links, to random spam links.
Here's the log:

ComboFix 09-12-31.01 - home office 12/31/2009 14:03:20.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.148 [GMT -5:00]
Running from: c:\documents and settings\home office\Desktop\ComboFix.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\oqnqso.exe
C:\uwlwfa.exe
C:\waxfhosk.exe
c:\windows\system32\404Fix.exe
c:\windows\system32\Agent.OMZ.Fix.exe
c:\windows\system32\bprfy.dll
c:\windows\system32\dowikabu.dll
c:\windows\system32\dumphive.exe
c:\windows\system32\flags.ini
c:\windows\system32\hewemaha.dll
c:\windows\system32\IEDFix.C.exe
c:\windows\system32\IEDFix.exe
c:\windows\system32\kbdsock.dll
c:\windows\system32\l96lf6.dll
c:\windows\system32\o4Patch.exe
c:\windows\system32\Process.exe
c:\windows\system32\runimuhu.dll
c:\windows\system32\SrchSTS.exe
c:\windows\system32\tmp.reg
c:\windows\system32\uses32.dat
c:\windows\system32\VACFix.exe
c:\windows\system32\VCCLSID.exe
c:\windows\system32\winsts.sys
c:\windows\system32\WS2Fix.exe
c:\windows\system32\yivezopo.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_6TO4
-------\Legacy_WINSTS
-------\Service_6to4
-------\Service_winsts


((((((((((((((((((((((((( Files Created from 2009-11-28 to 2009-12-31 )))))))))))))))))))))))))))))))
.

2009-12-31 09:03 . 2009-12-31 09:03 -------- d-----w- C:\_OTL
2009-12-31 08:52 . 2009-12-31 08:52 -------- d-----w- c:\documents and settings\home office\Application Data\Malwarebytes
2009-12-31 08:51 . 2009-12-30 19:55 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-31 08:51 . 2009-12-31 08:51 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-12-31 08:51 . 2009-12-30 19:54 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-31 08:51 . 2009-12-31 09:19 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-12-30 21:14 . 2009-12-31 19:17 773120 ----a-w- c:\windows\system32\drivers\tjcfbur.sys
2009-12-18 12:40 . 2009-12-18 12:40 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple
2009-12-12 19:00 . 2009-12-12 19:01 -------- d-----w- c:\program files\QuickTime
2009-12-12 19:00 . 2009-12-12 19:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2009-12-12 18:59 . 2009-12-12 18:59 -------- d-----w- c:\documents and settings\home office\Local Settings\Application Data\Apple
2009-12-12 18:59 . 2009-12-12 18:59 -------- d-----w- c:\program files\Apple Software Update
2009-12-12 18:59 . 2009-12-12 18:59 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2009-12-12 18:59 . 2009-12-12 18:59 -------- d-----w- c:\documents and settings\home office\Local Settings\Application Data\Apple Computer
2009-12-11 23:02 . 2009-12-11 23:02 -------- d-----w- c:\windows\system32\drivers\NSS
2009-12-11 23:02 . 2009-12-11 23:02 -------- d-----w- c:\program files\Norton Security Scan
2009-12-04 08:10 . 2009-12-28 20:06 79488 ----a-w- c:\documents and settings\home office\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-30 04:19 . 2009-09-11 20:42 -------- d-----w- c:\documents and settings\home office\Application Data\vlc
2009-12-11 23:02 . 2009-11-12 12:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2009-12-11 23:02 . 2009-11-12 12:00 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-11-25 23:29 . 2009-03-19 15:06 -------- d-----w- c:\program files\Common Files\Adobe
2009-11-12 12:00 . 2009-03-19 14:05 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2009-11-12 12:00 . 2009-11-12 12:00 -------- d-----w- c:\program files\NortonInstaller
2009-11-10 04:46 . 2009-05-25 22:41 -------- d-----w- c:\documents and settings\home office\Application Data\Ventrilo
2009-11-10 04:46 . 2009-04-18 02:04 -------- d-----w- c:\program files\AIM6
2009-11-05 00:15 . 2009-03-19 15:03 -------- d-----w- c:\documents and settings\All Users\Application Data\NOS
2009-11-03 23:54 . 2009-11-03 23:54 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2009-11-01 23:54 . 2009-11-01 23:54 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee Security Scan
2009-10-29 07:46 . 2006-03-04 03:33 832512 ----a-w- c:\windows\system32\wininet.dll
2009-10-29 07:46 . 2004-08-04 10:00 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-10-29 07:46 . 2004-08-04 10:00 17408 ------w- c:\windows\system32\corpol.dll
2009-10-28 03:12 . 2009-03-22 03:00 68256 ----a-w- c:\documents and settings\home office\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-21 05:38 . 2004-08-04 10:00 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38 . 2004-08-04 10:00 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-20 16:20 . 2004-08-04 10:00 265728 ----a-w- c:\windows\system32\drivers\http.sys
2009-10-13 10:30 . 2004-08-04 10:00 270336 ----a-w- c:\windows\system32\oakley.dll
2009-10-12 13:38 . 2004-08-04 10:00 149504 ----a-w- c:\windows\system32\rastls.dll
2009-10-12 13:38 . 2004-08-04 10:00 79872 ----a-w- c:\windows\system32\raschap.dll
2009-05-01 21:02 . 2009-05-01 21:02 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
2009-05-01 21:02 . 2009-05-01 21:02 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
1601-01-01 00:03 . 1601-01-01 00:03 39424 --sha-w- c:\windows\system32\guderasa.dll
1601-01-01 00:03 . 1601-01-01 00:03 45568 --sha-w- c:\windows\system32\pagifali.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Google Update"="c:\documents and settings\home office\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-03-28 133104]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2007-05-29 52840]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2007-10-08 125368]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-05-30 148888]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-10-03 35696]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-09-04 935288]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-05-26 413696]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Belkin F5D8053 N Wireless USB Adapter Utility.lnk - c:\program files\Belkin\F5D8053\Belkinwcui.exe [2007-9-17 1732608]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"RestrictRun"= 0 (0x0)

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NoSetActiveDesktop"= 1 (0x1)
"NoActiveDesktopChanges"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\AIM6\\aim6.exe"=
"c:\\Program Files\\Belkin\\F5D8053\\Belkinwcui.exe"=

R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [8/28/2009 6:21 AM 102448]
R3 rt2870;Ralink 802.11n USB Wireless LAN Card Driver;c:\windows\system32\drivers\rt2870.sys [7/28/2007 1:50 PM 517632]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [10/7/2007 8:48 PM 116664]

--- Other Services/Drivers In Memory ---

*Deregistered* - tjcfbur

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
getPlusHelper REG_MULTI_SZ getPlusHelper
.
Contents of the 'Scheduled Tasks' folder

2009-12-18 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]

2009-12-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1482476501-1801674531-725345543-1003Core.job
- c:\documents and settings\home office\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-03-28 22:04]

2009-12-31 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1482476501-1801674531-725345543-1003UA.job
- c:\documents and settings\home office\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-03-28 22:04]

2009-12-29 c:\windows\Tasks\Norton Security Scan for home office.job
- c:\program files\Norton Security Scan\Norton Security Scan\Engine\2.7.0.52\Nss.exe [2009-12-11 23:02]

2009-12-23 c:\windows\Tasks\SmartDefrag.job
- c:\program files\IObit\IObit SmartDefrag\IObit SmartDefrag.exe [2009-08-12 13:22]
.
.
------- Supplementary Scan -------
.
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: {B8643B1C-5EE3-48AD-BC9A-687EA7B44733} = 193.104.110.38,4.2.2.1,192.168.2.1
TCP: {D7D5F9DF-AC22-407A-8FD9-EBAFC24DA5B0} = 193.104.110.38,4.2.2.1
FF - ProfilePath - c:\documents and settings\home office\Application Data\Mozilla\Firefox\Profiles\4e6cdj8n.default\
FF - plugin: c:\documents and settings\home office\Local Settings\Application Data\Google\Update\1.2.183.13\npGoogleOneClick8.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
FF - user.js: browser.cache.memory.capacity - 16000
FF - user.js: browser.chrome.favicons - fales
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: content.max.tokenizing.time - 3000000
FF - user.js: content.maxtextrun - 4095
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 1000000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 1000000
FF - user.js: dom.disable_window_status_change - true
FF - user.js: network.http.max-connections - 48
FF - user.js: network.http.max-connections-per-server - 16
FF - user.js: network.http.max-persistent-connections-per-proxy - 16
FF - user.js: network.http.max-persistent-connections-per-server - 8
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.firstrequest - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 1000
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0
.
- - - - ORPHANS REMOVED - - - -

BHO-{ad0b2135-c6bc-4cfa-8b74-cadf8a756c87} - hewemaha.dll
HKLM-Run-hisahugeli - yivezopo.dll
HKLM-Run-laroyojav - c:\windows\system32\dowikabu.dll
SharedTaskScheduler-{97be9a82-4009-4887-8307-a29e7e78bf94} - c:\windows\system32\dowikabu.dll
SSODL-suriregis-{97be9a82-4009-4887-8307-a29e7e78bf94} - c:\windows\system32\dowikabu.dll



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-31 14:16
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x822E6841]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf857cf28
\Driver\ACPI -> ACPI.sys @ 0xf84efcb8
\Driver\atapi -> atapi.sys @ 0xf835b852
IoDeviceObjectType -> DeleteProcedure -> ntoskrnl.exe @ 0x805e668e
ParseProcedure -> ntoskrnl.exe @ 0x8057b6b1
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntoskrnl.exe @ 0x805e668e
ParseProcedure -> ntoskrnl.exe @ 0x8057b6b1
NDIS: -> SendCompleteHandler -> 0x0
PacketIndicateHandler -> 0x0
SendHandler -> 0x0
user & kernel MBR OK

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\tjcfbur]

.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(900)
c:\windows\system32\WININET.dll

- - - - - - - > 'lsass.exe'(960)
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(1328)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\mshtml.dll
c:\windows\IME\SPGRMR.DLL
c:\program files\Common Files\Microsoft Shared\INK\SKCHUI.DLL
c:\windows\system32\WPDShServiceObj.dll
c:\program files\ArcSoft\PhotoImpression 5\share\pihook.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\windows\system32\wscntfy.exe
c:\documents and settings\home office\Local Settings\Application Data\Google\Update\1.2.183.13\GoogleCrashHandler.exe
.
**************************************************************************
.
Completion time: 2009-12-31 14:26:05 - machine was rebooted
ComboFix-quarantined-files.txt 2009-12-31 19:25

Pre-Run: 134,039,519,232 bytes free
Post-Run: 133,940,482,048 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 3D05C68C8518422F0715F19C79EF3487

Edited by atlaslog, 31 December 2009 - 03:13 PM.


#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:10:52 AM

Posted 31 December 2009 - 10:28 PM

Copy and paste ALL the following text in the Quote box below into Notepad.
Click on File(in the menu at the top)>Save as../Save as Type: 'All Files' /File name: CFScript to your desktop.

File::
c:\windows\system32\guderasa.dll
c:\windows\system32\pagifali.dll

MBR::
Prior to running Combofix.exe you should disable your antivirus program.

Now drag then drop the CFScript file onto ComboFix.exe as seen in the image below.

Posted Image

This will start ComboFix again.
After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply.


=====================



Download Kenco.exe to your desktop
  • Close all windows and run the program
  • It wont take long to run. Post the log it gives you ( it will also be saved in the same place as Kenco.exe

=====================



Please update Malwarebytes and run a full scan.
  • Open Malwarebytes and select the Update tab.
  • Click on the Check for Updates button and allow the program to download the latest updates.
  • Once you have the latest updates, select the Scanner tab.
  • Select "Perform full scan" and click the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 atlaslog

atlaslog
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:10:52 AM

Posted 01 January 2010 - 12:42 AM

Thanks. Things appear to be working alright now. Here's the new ComboFix log:
ComboFix 09-12-31.06 - home office 12/31/2009 23:26:15.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.150 [GMT -5:00]
Running from: c:\documents and settings\home office\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\home office\Desktop\CFScript.txt
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}

FILE ::
"c:\windows\system32\guderasa.dll"
"c:\windows\system32\pagifali.dll"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\guderasa.dll
c:\windows\system32\pagifali.dll

Infected copy of c:\windows\system32\DRIVERS\atapi.sys was found and disinfected
Restored copy from - Kitty ate it :(
.
((((((((((((((((((((((((( Files Created from 2009-12-01 to 2010-01-01 )))))))))))))))))))))))))))))))
.

2009-12-31 09:03 . 2009-12-31 09:03 -------- d-----w- C:\_OTL
2009-12-31 08:52 . 2009-12-31 08:52 -------- d-----w- c:\documents and settings\home office\Application Data\Malwarebytes
2009-12-31 08:51 . 2009-12-30 19:55 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-31 08:51 . 2009-12-31 08:51 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-12-31 08:51 . 2009-12-30 19:54 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-31 08:51 . 2010-01-01 03:45 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-12-30 21:14 . 2010-01-01 04:51 773120 ----a-w- c:\windows\system32\drivers\tjcfbur.sys
2009-12-18 12:40 . 2009-12-18 12:40 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple
2009-12-12 19:00 . 2009-12-12 19:01 -------- d-----w- c:\program files\QuickTime
2009-12-12 19:00 . 2009-12-12 19:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2009-12-12 18:59 . 2009-12-12 18:59 -------- d-----w- c:\documents and settings\home office\Local Settings\Application Data\Apple
2009-12-12 18:59 . 2009-12-12 18:59 -------- d-----w- c:\program files\Apple Software Update
2009-12-12 18:59 . 2009-12-12 18:59 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2009-12-12 18:59 . 2009-12-12 18:59 -------- d-----w- c:\documents and settings\home office\Local Settings\Application Data\Apple Computer
2009-12-11 23:02 . 2009-12-11 23:02 -------- d-----w- c:\windows\system32\drivers\NSS
2009-12-11 23:02 . 2009-12-11 23:02 -------- d-----w- c:\program files\Norton Security Scan
2009-12-04 08:10 . 2009-12-28 20:06 79488 ----a-w- c:\documents and settings\home office\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-31 20:44 . 2004-08-04 10:00 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
2009-12-30 04:19 . 2009-09-11 20:42 -------- d-----w- c:\documents and settings\home office\Application Data\vlc
2009-12-11 23:02 . 2009-11-12 12:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2009-12-11 23:02 . 2009-11-12 12:00 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-11-25 23:29 . 2009-03-19 15:06 -------- d-----w- c:\program files\Common Files\Adobe
2009-11-12 12:00 . 2009-03-19 14:05 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2009-11-12 12:00 . 2009-11-12 12:00 -------- d-----w- c:\program files\NortonInstaller
2009-11-10 04:46 . 2009-05-25 22:41 -------- d-----w- c:\documents and settings\home office\Application Data\Ventrilo
2009-11-10 04:46 . 2009-04-18 02:04 -------- d-----w- c:\program files\AIM6
2009-11-05 00:15 . 2009-03-19 15:03 -------- d-----w- c:\documents and settings\All Users\Application Data\NOS
2009-11-03 23:54 . 2009-11-03 23:54 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2009-10-29 07:46 . 2006-03-04 03:33 832512 ------w- c:\windows\system32\wininet.dll
2009-10-29 07:46 . 2004-08-04 10:00 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-10-29 07:46 . 2004-08-04 10:00 17408 ------w- c:\windows\system32\corpol.dll
2009-10-28 03:12 . 2009-03-22 03:00 68256 ----a-w- c:\documents and settings\home office\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-21 05:38 . 2004-08-04 10:00 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38 . 2004-08-04 10:00 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-20 16:20 . 2004-08-04 10:00 265728 ----a-w- c:\windows\system32\drivers\http.sys
2009-10-13 10:30 . 2004-08-04 10:00 270336 ----a-w- c:\windows\system32\oakley.dll
2009-10-12 13:38 . 2004-08-04 10:00 149504 ----a-w- c:\windows\system32\rastls.dll
2009-10-12 13:38 . 2004-08-04 10:00 79872 ----a-w- c:\windows\system32\raschap.dll
2009-05-01 21:02 . 2009-05-01 21:02 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll
2009-05-01 21:02 . 2009-05-01 21:02 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Google Update"="c:\documents and settings\home office\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-03-28 133104]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2007-05-29 52840]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2007-10-08 125368]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-05-30 148888]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-10-03 35696]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-09-04 935288]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-05-26 413696]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Belkin F5D8053 N Wireless USB Adapter Utility.lnk - c:\program files\Belkin\F5D8053\Belkinwcui.exe [2007-9-17 1732608]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"RestrictRun"= 0 (0x0)

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NoSetActiveDesktop"= 1 (0x1)
"NoActiveDesktopChanges"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\AIM6\\aim6.exe"=
"c:\\Program Files\\Belkin\\F5D8053\\Belkinwcui.exe"=

R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [8/28/2009 6:21 AM 102448]
R3 rt2870;Ralink 802.11n USB Wireless LAN Card Driver;c:\windows\system32\drivers\rt2870.sys [7/28/2007 1:50 PM 517632]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [10/7/2007 8:48 PM 116664]

--- Other Services/Drivers In Memory ---

*Deregistered* - tjcfbur

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
getPlusHelper REG_MULTI_SZ getPlusHelper
.
Contents of the 'Scheduled Tasks' folder

2009-12-18 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]

2009-12-31 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1482476501-1801674531-725345543-1003Core.job
- c:\documents and settings\home office\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-03-28 22:04]

2010-01-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1482476501-1801674531-725345543-1003UA.job
- c:\documents and settings\home office\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-03-28 22:04]

2009-12-31 c:\windows\Tasks\Norton Security Scan for home office.job
- c:\program files\Norton Security Scan\Norton Security Scan\Engine\2.7.0.52\Nss.exe [2009-12-11 23:02]
.
.
------- Supplementary Scan -------
.
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: {B8643B1C-5EE3-48AD-BC9A-687EA7B44733} = 193.104.110.38,4.2.2.1,192.168.2.1
TCP: {D7D5F9DF-AC22-407A-8FD9-EBAFC24DA5B0} = 193.104.110.38,4.2.2.1
FF - ProfilePath - c:\documents and settings\home office\Application Data\Mozilla\Firefox\Profiles\4e6cdj8n.default\
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
FF - user.js: browser.cache.memory.capacity - 16000
FF - user.js: browser.chrome.favicons - fales
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: content.max.tokenizing.time - 3000000
FF - user.js: content.maxtextrun - 4095
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 1000000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 1000000
FF - user.js: dom.disable_window_status_change - true
FF - user.js: network.http.max-connections - 48
FF - user.js: network.http.max-connections-per-server - 16
FF - user.js: network.http.max-persistent-connections-per-proxy - 16
FF - user.js: network.http.max-persistent-connections-per-server - 8
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.firstrequest - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 1000
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-31 23:51
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\tjcfbur]

.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(1736)
c:\windows\system32\WININET.dll
c:\windows\system32\IEFRAME.dll
c:\progra~1\COMMON~1\MICROS~1\WEBCOM~1\10\OWC10.DLL
c:\progra~1\COMMON~1\MICROS~1\WEBCOM~1\11\OWC11.DLL
c:\windows\system32\mshtml.dll
c:\windows\IME\SPGRMR.DLL
c:\program files\Common Files\Microsoft Shared\INK\SKCHUI.DLL
c:\windows\system32\WPDShServiceObj.dll
c:\program files\ArcSoft\PhotoImpression 5\share\pihook.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\windows\system32\wscntfy.exe
c:\documents and settings\home office\Local Settings\Application Data\Google\Update\1.2.183.13\GoogleCrashHandler.exe
.
**************************************************************************
.
Completion time: 2009-12-31 23:56:02 - machine was rebooted
ComboFix-quarantined-files.txt 2010-01-01 04:55
ComboFix2.txt 2009-12-31 19:26

Pre-Run: 133,850,218,496 bytes free
Post-Run: 133,823,885,312 bytes free

- - End Of File - - 69C313A536153E6DE6C47D0225B88469



The Kenco log:
Kenco by jpshortstuff (31.12.09.1)
Log created at 00:09 on 01/01/2010 (home office)

========== Task Unlocker ==========

========== KencoScan ==========

========== C:\WINDOWS\Tasks ==========
AppleSoftwareUpdate.job -> [18:59 12/12/2009] 284 bytes
GoogleUpdateTaskUserS-1-5-21-1482476501-1801674531-725345543-1003Core.job -> [22:05 29/06/2009] 950 bytes
GoogleUpdateTaskUserS-1-5-21-1482476501-1801674531-725345543-1003UA.job -> [22:05 29/06/2009] 1002 bytes
Norton Security Scan for home office.job -> [12:00 12/11/2009] 570 bytes

-=E.O.F=-


The MBAM log:
Malwarebytes' Anti-Malware 1.43
Database version: 3466
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

1/1/2010 12:34:19 AM
mbam-log-2010-01-01 (00-34-19).txt

Scan type: Full Scan (A:\|C:\|D:\|E:\|)
Objects scanned: 153338
Time elapsed: 23 minute(s), 21 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 16

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{b8643b1c-5ee3-48ad-bc9a-687ea7b44733}\NameServer (Trojan.DNSChanger) -> Data: 193.104.110.38,4.2.2.1,192.168.2.1 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{d7d5f9df-ac22-407a-8fd9-ebafc24da5b0}\NameServer (Trojan.DNSChanger) -> Data: 193.104.110.38,4.2.2.1 -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Qoobox\Quarantine\C\uwlwfa.exe.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\waxfhosk.exe.vir (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\bprfy.dll.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\dowikabu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\guderasa.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\hewemaha.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\kbdsock.dll.vir (Spyware.Passwords) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\l96lf6.dll.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\pagifali.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\runimuhu.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\winsts.sys.vir (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\yivezopo.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B14F086B-20C3-4E6B-A232-AF478F7EE87A}\RP1\A0000056.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{B14F086B-20C3-4E6B-A232-AF478F7EE87A}\RP1\A0000057.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\12312009_040328\C_WINDOWS\system32\winlogon86.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\_OTL\MovedFiles\12312009_040328\C_WINDOWS\system32\winupdate86.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:10:52 AM

Posted 01 January 2010 - 01:03 PM

Your log looks good to me. As long as everything is behaving properly here are some final steps and recommendations for you.


We need to remove Combofix now that we're done with it.
  • Click Start -> Run
  • Now type Combofix /uninstall in the runbox and click OK

==================



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - You should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:( :(
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#7 atlaslog

atlaslog
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:10:52 AM

Posted 01 January 2010 - 07:36 PM

Thank you so much man! The last time I got an infection like this it nearly killed my computer. Now it's running better than ever!

#8 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:10:52 AM

Posted 02 January 2010 - 09:33 AM

I'm glad I could help you out! :(

Now that your malware problem appears to be resolved, this topic will be closed.
If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you.
Include the address of this topic in your request.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users