Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Remove Windows Antivirus Pro


  • This topic is locked This topic is locked
24 replies to this topic

#1 hurliman

hurliman

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:12:38 AM

Posted 05 January 2010 - 01:36 AM

Hi BleepingComputer,

I contracted the Windows Antivirus Pro virus a few months ago and took some initial steps so that the popup window wouldn’t come up and I could at least run applications.

Initial steps: Using guides I found on the Internet I deleted the relevant processes that were running, as well as the Antivirus Pro files. I then manually deleted any files I found in an Associated Windows Antivirus Pro Files list that were in my program files, system32 folder, and registry.

Where I’m at now: I can install MBAM, but when I try to run it, it stops after a few seconds regardless of how/if I rename the .exe file. My search engine results redirect me the wrong information. I can’t make the Windows updates that are recommended in the bottom right corner. My computer randomly decides it needs to restart. When it does restart, it always reports a problem with pad.exe and asks to send an error report. I tried to run RootRepeal, but it stopped about 15 second into the scan. When I try to run it again, it says "Windows cannot access the specified device, path or file. You may not have the appropriate permissions to access the item."

After spending a lot of time in your forums, I think this is the category I should be in and am posting the recommended DDS report below:


DDS (Ver_09-12-01.01) - NTFSx86
Run by John Hurliman at 22:08:04.85 on Mon 01/04/2010
Internet Explorer: 7.0.5730.13
AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

============== Running Processes ===============


============== Pseudo HJT Report ===============

uSearch Bar = hxxp://www.google.com/ie
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = hxxp://www.toshibadirect.com/dpdstart
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
uURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg8\toolbar\IEToolbar.dll
uURLSearchHooks: H - No File
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\adobe acrobat 6.0\acrobat\activex\AcroIEHelper.dll
BHO: Gamevance: {0ed403e8-470a-4a8a-85a4-d7688cfe39a3} - c:\program files\gamevance\gamevancelib32.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg8\avgssie.dll
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: ICQSys (IE PlugIn): {76dc0b63-1533-4ba9-8be8-d59eb676fa02} - c:\windows\system32\dddesot.dll
BHO: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg8\toolbar\IEToolbar.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar.dll
BHO: AcroIEToolbarHelper Class: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\adobe\adobe acrobat 6.0\acrobat\AcroIEFavClient.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.4.4525.1752\swg.dll
BHO: Google Dictionary Compression sdch: {c84d72fe-e17d-4195-bb24-76c02e2e7c4e} - c:\program files\google\google toolbar\component\fastsearch_A8904FB862BD9564.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\adobe\adobe acrobat 6.0\acrobat\AcroIEFavClient.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar.dll
TB: AVG Security Toolbar: {ccc7a320-b3ca-4199-b1a6-9f516dd69829} - c:\program files\avg\avg8\toolbar\IEToolbar.dll
TB: {4E7BD74F-2B8D-469E-86BD-FD60BB9AAE3A} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [TOSCDSPD] c:\program files\toshiba\toscdspd\toscdspd.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [Monopod] c:\docume~1\johnhu~1\locals~1\temp\b.exe
mRun: [THotkey] c:\program files\toshiba\toshiba applet\thotkey.exe
mRun: [SkyTel] SkyTel.EXE
mRun: [NDSTray.exe] NDSTray.exe
mRun: [DDWMon] c:\program files\toshiba\toshiba direct disc writer\\ddwmon.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [ehTray] c:\windows\ehome\ehtray.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [AGRSMMSG] AGRSMMSG.exe
mRun: [TPSMain] TPSMain.exe
mRun: [PadTouch] c:\program files\toshiba\touch and launch\PadExe.exe
mRun: [TFncKy] TFncKy.exe
mRun: [Tvs] c:\program files\toshiba\tvs\TvsTray.exe
mRun: [SmoothView] c:\program files\toshiba\toshiba zooming utility\SmoothView.exe
mRun: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
mRun: [IntelZeroConfig] "c:\program files\intel\wireless\bin\ZCfgSvc.exe"
mRun: [IntelWireless] "c:\program files\intel\wireless\bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [CFSServ.exe] CFSServ.exe -NoClient
mRun: [HP Software Update] "c:\program files\hp\hp software update\HPWuSchd.exe"
mRun: [HP Component Manager] "c:\program files\hp\hpcoretech\hpcmpmgr.exe"
mRun: [MSKDetectorExe] c:\program files\mcafee\spamkiller\MSKDetct.exe /uninstall
mRun: [AdobeVersionCue] c:\program files\adobe\adobe version cue\controlpanel\VersionCueTray.exe
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
StartupFolder: c:\docume~1\johnhu~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office11\ONENOTEM.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\acroba~1.lnk - c:\program files\adobe\adobe acrobat 6.0\distillr\acrotray.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adobeg~1.lnk - c:\program files\common files\adobe\calibration\Adobe Gamma Loader.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\ramasst.lnk - c:\windows\system32\RAMASST.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {A3256902-51FA-45A0-8A97-FC1143C169D9} - hxxp://support.microsoft.com/mats/DiagWebControl.cab
DPF: {C7DEDA04-2FFF-4B81-AE66-0A0E0EF4AD2F} - hxxp://www.ritzpix.com/net/Uploader/LPUploader57.cab
DPF: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Filter: text/html - {27b3e86d-24a0-40cb-b0cf-c9b03a1befcf} - c:\windows\mark_32.dll
Filter: x-sdch - {B1759355-3EEC-4C1E-B0F1-B719FE26E377} - c:\program files\google\google toolbar\component\fastsearch_A8904FB862BD9564.dll
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - c:\program files\hp\hpcoretech\comp\hpuiprot.dll
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: avgrsstarter - avgrsstx.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\johnhu~1\applic~1\mozilla\firefox\profiles\7j4ffcuh.default\
FF - plugin: c:\program files\google\picasa3\npPicasa3.dll
FF - plugin: c:\program files\real\realarcade\plugins\mozilla\npracplug.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============


=============== Created Last 30 ================

2010-01-04 02:01:10 0 d-----w- c:\docume~1\johnhu~1\applic~1\AdobeAUM
2009-12-31 05:06:39 0 ----a-w- c:\docume~1\johnhu~1\applic~1\wklnhst.dat

==================== Find3M ====================

2009-10-29 07:46:59 832512 ----a-w- c:\windows\system32\wininet.dll
2009-10-29 07:46:52 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-10-29 07:46:50 17408 ------w- c:\windows\system32\corpol.dll
2009-10-21 05:38:36 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38:36 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-13 10:30:16 270336 ----a-w- c:\windows\system32\oakley.dll
2009-10-12 13:38:19 149504 ----a-w- c:\windows\system32\rastls.dll
2009-10-12 13:38:18 79872 ----a-w- c:\windows\system32\raschap.dll
2007-09-23 01:17:17 774144 -c--a-w- c:\program files\RngInterstitial.dll
2008-12-19 14:47:18 32768 -csha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008121920081220\index.dat

============= FINISH: 22:08:53.59 ===============

Thanks in advance for you help!

John

Attached Files



BC AdBot (Login to Remove)

 


#2 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:38 AM

Posted 07 January 2010 - 11:56 AM

Hello hurliman :( Welcome to the BC HijackThis Log and Analysis forum. I will be assisting you in cleaning up your system.


I ask that you refrain from running tools other than those we suggest while we are cleaning up your computer. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.



In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond the your topic and facilitate the cleaning of your machine.

After 5 days if a topic is not replied to we assume it has been abandoned and it is closed.


If you have any CD emulation software, such as DAEMON Tools or Alcohol please uninstall them prior to the GMER scan. These can be reinstalled once any malware removal efforts are completed.


Download GMER Rootkit Scanner from here to your desktop.
  • Double click the exe file.
  • If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO, then use the following settings for a more complete scan.


    Posted Image
    Click the image to enlarge it


  • In the right panel, you will see several boxes that have been checked. Uncheck the following ...
    • Sections
    • IAT/EAT
    • Drives/Partition other than Systemdrive (typically C:\)
    • Show All (don't miss this one)
  • Then click the Scan button & wait for it to finish.
  • Once done click on the [Save..] button, and in the File name area, type in "Gmer.txt" or it will save as a .log file which cannot be uploaded to your post.
Save it where you can easily find it, such as your desktop, and post it in reply.

**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries










Please do not post any logs as an attachment unless asked to do so.





Thanks,



thewall
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#3 hurliman

hurliman
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:12:38 AM

Posted 08 January 2010 - 01:57 PM

thewall,

Thanks so much for responding and offering your help.

I've downloaded the GMER Rootkit Scanner as requested, but when it finished the scan (at least I assume it's finished) the application windows just disappears and I don't have a chance to save the file. I tried to run it again, but it gave me the "Windows cannot access..." error.

I then downloaded another copy of GMER RS and went through the scan, but the same thing happened.

Should I try a third time and maybe stop the scan before it finishes and try to save the file? Please advise.

Thanks,

hurliman

#4 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:38 AM

Posted 08 January 2010 - 02:27 PM

Try running the following first and then try it with the instructions I have below.


RKill by Grinler

Link #1
Link #2
Link #3

  • Download Link #1.
  • Save it to your Desktop.
  • Double click the RKill desktop icon.
    If you are using Vista please right click and run as Admin!
  • A black screen will briefly flash indicating a successful run.
  • If this does not occur please delete that application and download Link #2.
  • Continue process until the tool runs.
  • If the tool does not run from any of the links tell me about it.





Try disabling your AVG(link below) and uncheck the two below along with the others you unchecked before running it.

* Registry
* Files




http://www.bleepingcomputer.com/forums/t/114351/how-to-temporarily-disable-your-anti-virus-firewall-and-anti-malware-programs/
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#5 hurliman

hurliman
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:12:38 AM

Posted 12 January 2010 - 08:52 AM

All three of the RKill links ran and made my screen "blink," but none of them allowed me to successfully run GMER to completion. I tried disabling AVG and running GMER, but that didn't seem to help. Sometimes it would run and just disappear, not allowing me to save it. Sometimes it would run and then eventually the screen would go black and everything would lock up. One time it literally scanned for around 12 hours before locking up (sometimes it's quicker - 2.5 hours - sometimes the computer slows to a crawl).

Unchecking "registry" and "files" allowed me to run it through to completion, but having become very familiar with the scan report information, I knew it wasn't a full report. Therefore, I finally just allowed the scan to proceed until all the "usual" information was there and then I just stopped the scan and saved the report.

Below is the log. Hope this helps!

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-01-10 18:04:40
Windows 5.1.2600 Service Pack 3
Running: y2e5yntd.exe; Driver: C:\DOCUME~1\JOHNHU~1\LOCALS~1\Temp\pwroiuoc.sys


---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Tcpip \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
---- Processes - GMER 1.0.15 ----

Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\WINDOWS\system32\spoolsv.exe [196] 0x35670000
Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\Program Files\MySQL\MySQL Server 5.0\bin\mysqld-nt.exe [268] 0x35670000
Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\Program Files\Java\jre6\bin\jqs.exe [760] 0x35670000
Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [1224] 0x35670000
Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [1264] 0x35670000
Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [1332] 0x35670000
Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [1752] 0x35670000
Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\Program Files\TOSHIBA\ConfigFree\CFXFER.exe [1928] 0x35670000
Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\PROGRA~1\AVG\AVG8\avgnsx.exe [2032] 0x35670000
Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\WINDOWS\ehome\mcrdsvc.exe [2280] 0x35670000
Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\Program Files\TOSHIBA\ConfigFree\CFSServ.exe [2480] 0x35670000
Library \\?\globalroot\Device\__max++>\EF85ADFA.x86.dll (*** hidden *** ) @ C:\WINDOWS\System32\alg.exe [3888] 0x35670000

---- Files - GMER 1.0.15 ----

ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP667\A0089507.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP668\A0089549.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP669\A0089588.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP670\A0089625.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP671\A0090625.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP672\A0090682.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP674\A0090716.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP675\A0090756.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP676\A0090817.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP677\A0090853.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP678\A0090905.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP679\A0091905.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP680\A0091944.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP681\A0091986.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP682\A0092121.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP682\A0092071.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP682\A0092088.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP683\A0092152.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP685\A0094221.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP685\A0094237.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP685\A0095237.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP685\A0095254.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP685\A0095285.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP686\A0095315.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP688\A0096317.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP689\A0096379.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP690\A0096436.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP691\A0097436.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP692\A0097490.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP693\A0097528.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP693\A0097541.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP694\A0097576.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP695\A0097633.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP696\A0097666.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP696\A0098666.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP696\A0099666.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP697\A0099694.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP697\A0099711.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP697\A0099724.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP697\A0099728.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP697\A0099732.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP697\A0100732.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP697\A0101732.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP697\A0102732.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP697\A0103732.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP698\A0103766.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP698\A0104766.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP698\A0105766.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP699\A0106766.sys:1 8704 bytes executable
ADS C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP699\A0107766.sys:1 8704 bytes executable

---- EOF - GMER 1.0.15 ----

#6 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:38 AM

Posted 12 January 2010 - 09:59 AM

You got enough to be helpful, good job.


Please save this file to your desktop. Double-click on it to run a scan. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please open it with notepad and post the contents here.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#7 hurliman

hurliman
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:12:38 AM

Posted 13 January 2010 - 09:26 AM

I ran the app last night, and when I woke up it looked like the computer had restarted (which the virus, I assume, causes it to do sometimes). Below is the .txt file that was left. If it looks like the process is incomplete, let me know and I can try to rerun it. Thanks!

Running from: C:\Documents and Settings\John Hurliman\Desktop\Win32kDiag.exe

Log file at : C:\Documents and Settings\John Hurliman\Desktop\Win32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...



Found mount point : C:\WINDOWS\pchealth\helpctr\Config\CheckPoint\CheckPoint

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\System\DFS\DFS

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\Downloaded

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\07a96de176867bc25b7dc839d22b07e2\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\0dd0244816ffb4b094c1caba4c3b1178\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\355f788b6de8a3ec79e9aa172e6317f1\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\6913c676e5d33978934caa46c49fdc75\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\aa23f1c18895fd721870de4beeed4ad5\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\b7f0b2892b21211a5630518d058f48d9\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\c1835c8cb0bb13f938a8a983ca5edea4\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\d48a3b967ba5709df048e8f2a49cf8a6\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\e50981864c541bdea07741b88d379a52\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Temp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\My Documents\My Music\My Yahoo! Music\My Yahoo! Music

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\NetHood\NetHood

Mount point destination : \Device\__max++>\^

Cannot access: C:\WINDOWS\system32\eventlog.dll

[1] 2004-08-10 05:00:00 55808 C:\WINDOWS\$NtServicePackUninstall$\eventlog.dll (Microsoft Corporation)

[1] 2008-04-13 17:11:53 56320 C:\WINDOWS\ServicePackFiles\i386\eventlog.dll (Microsoft Corporation)

[1] 2008-04-13 17:11:53 61952 C:\WINDOWS\system32\eventlog.dll ()

[2] 2008-04-13 17:11:53 56320 C:\WINDOWS\system32\logevent.dll (Microsoft Corporation)



Cannot access: C:\WINDOWS\system32\MRT.exe

[1] 2009-08-28 14:38:20 24689600 C:\WINDOWS\system32\MRT.exe ()



Cannot access: C:\WINDOWS\system32\msiexec.exe

[1] 2004-08-10 05:00:00 77312 C:\WINDOWS\$MSI31Uninstall_KB893803v2$\msiexec.exe (Microsoft Corporation)

[1] 2005-05-04 14:45:36 78848 C:\WINDOWS\$NtServicePackUninstall$\msiexec.exe (Microsoft Corporation)

[1] 2008-04-13 17:12:28 78848 C:\WINDOWS\ServicePackFiles\i386\msiexec.exe (Microsoft Corporation)

[1] 2008-04-13 17:12:28 78848 C:\WINDOWS\system32\msiexec.exe ()



Cannot access: C:\WINDOWS\system32\wbem\SET10.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET10.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET11.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET11.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET12.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET12.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET127.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET127.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET13.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET13.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET14.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET14.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET15.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET15.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET16.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET16.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET17.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET17.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET18.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET18.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET19.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET19.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET1A.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET1A.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET1B.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET1B.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET1C.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET1C.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET1D.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET1D.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET1E.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET1E.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET1F.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET1F.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET20.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET20.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET21.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET21.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET22.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET22.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET23.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET23.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET24.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET24.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET25.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET25.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET26.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET26.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET27.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET27.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET28.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET28.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET29.tmp

[1] 2009-02-06 03:10:02 227840 C:\WINDOWS\system32\wbem\SET29.tmp ()



Cannot access: C:\WINDOWS\system32\wbem\SET297.tmp

#8 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:38 AM

Posted 13 January 2010 - 12:08 PM

That's OK, I believe you got enough.

Here's the next thing:


Click on Start>Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK. When it's finished, there will be another log called Win32kDiag.txt on your desktop. Please open it with notepad and post the contents here.

"%userprofile%\desktop\win32kdiag.exe" -f -r
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#9 hurliman

hurliman
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:12:38 AM

Posted 13 January 2010 - 11:19 PM

I finally made it through a process without locking up, shutting down, etc.! :( Below is the file info:

Running from: C:\Documents and Settings\John Hurliman\desktop\win32kdiag.exe

Log file at : C:\Documents and Settings\John Hurliman\Desktop\Win32kDiag.txt

Removing all found mount points.

Attempting to reset file permissions.

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...



Found mount point : C:\WINDOWS\pchealth\helpctr\Config\CheckPoint\CheckPoint

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\helpctr\Config\CheckPoint\CheckPoint

Found mount point : C:\WINDOWS\pchealth\helpctr\System\DFS\DFS

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\helpctr\System\DFS\DFS

Found mount point : C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\Downloaded

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\Downloaded

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\07a96de176867bc25b7dc839d22b07e2\backup\backup

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\Download\07a96de176867bc25b7dc839d22b07e2\backup\backup

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\0dd0244816ffb4b094c1caba4c3b1178\backup\backup

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\Download\0dd0244816ffb4b094c1caba4c3b1178\backup\backup

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\355f788b6de8a3ec79e9aa172e6317f1\backup\backup

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\Download\355f788b6de8a3ec79e9aa172e6317f1\backup\backup

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\6913c676e5d33978934caa46c49fdc75\backup\backup

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\Download\6913c676e5d33978934caa46c49fdc75\backup\backup

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\aa23f1c18895fd721870de4beeed4ad5\backup\backup

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\Download\aa23f1c18895fd721870de4beeed4ad5\backup\backup

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\b7f0b2892b21211a5630518d058f48d9\backup\backup

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\Download\b7f0b2892b21211a5630518d058f48d9\backup\backup

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\c1835c8cb0bb13f938a8a983ca5edea4\backup\backup

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\Download\c1835c8cb0bb13f938a8a983ca5edea4\backup\backup

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\d48a3b967ba5709df048e8f2a49cf8a6\backup\backup

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\Download\d48a3b967ba5709df048e8f2a49cf8a6\backup\backup

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\e50981864c541bdea07741b88d379a52\backup\backup

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\Download\e50981864c541bdea07741b88d379a52\backup\backup

Found mount point : C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Temp

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Temp

Found mount point : C:\WINDOWS\system32\config\systemprofile\My Documents\My Music\My Yahoo! Music\My Yahoo! Music

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\My Documents\My Music\My Yahoo! Music\My Yahoo! Music

Found mount point : C:\WINDOWS\system32\config\systemprofile\NetHood\NetHood

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\NetHood\NetHood

Cannot access: C:\WINDOWS\system32\eventlog.dll

Attempting to restore permissions of : C:\WINDOWS\system32\eventlog.dll

[1] 2004-08-10 05:00:00 55808 C:\WINDOWS\$NtServicePackUninstall$\eventlog.dll (Microsoft Corporation)

[1] 2008-04-13 17:11:53 56320 C:\WINDOWS\ServicePackFiles\i386\eventlog.dll (Microsoft Corporation)

[1] 2008-04-13 17:11:53 61952 C:\WINDOWS\system32\eventlog.dll ()

[2] 2008-04-13 17:11:53 56320 C:\WINDOWS\system32\logevent.dll (Microsoft Corporation)



Cannot access: C:\WINDOWS\system32\MRT.exe

Attempting to restore permissions of : C:\WINDOWS\system32\MRT.exe

Cannot access: C:\WINDOWS\system32\msiexec.exe

Attempting to restore permissions of : C:\WINDOWS\system32\msiexec.exe

Cannot access: C:\WINDOWS\system32\wbem\SET10.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET10.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET11.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET11.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET12.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET12.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET127.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET127.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET13.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET13.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET14.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET14.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET15.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET15.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET16.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET16.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET17.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET17.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET18.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET18.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET19.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET19.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET1A.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET1A.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET1B.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET1B.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET1C.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET1C.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET1D.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET1D.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET1E.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET1E.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET1F.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET1F.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET20.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET20.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET21.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET21.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET22.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET22.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET23.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET23.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET24.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET24.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET25.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET25.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET26.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET26.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET27.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET27.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET28.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET28.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET29.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET29.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET297.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET297.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET2A.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET2A.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET2B.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET2B.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET2C.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET2C.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET2D.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET2D.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET2E.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET2E.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET2F.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET2F.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET2F7.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET2F7.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET30.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET30.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET31.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET31.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET32.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET32.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET33.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET33.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET34.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET34.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET35.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET35.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET36.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET36.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET37.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET37.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET38.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET38.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET39.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET39.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET39E9.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET39E9.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET3A.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET3A.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET3B.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET3B.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET3C.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET3C.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET3D.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET3D.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET3E.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET3E.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET3F.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET3F.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET40.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET40.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET41.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET41.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET42.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET42.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET43.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET43.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET44.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET44.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET45.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET45.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET46.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET46.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET47.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET47.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET48.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET48.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET49.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET49.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET4A.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET4A.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET4B.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET4B.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET4C.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET4C.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET4D.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET4D.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET4E.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET4E.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET4F.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET4F.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET50.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET50.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET51.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET51.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET52.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET52.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET53.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET53.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET54.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET54.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET55.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET55.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET56.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET56.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET57.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET57.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET58.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET58.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET59.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET59.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET5A.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET5A.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET5B.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET5B.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET5C.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET5C.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET5D.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET5D.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET5E.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET5E.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET5F.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET5F.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET60.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET60.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET61.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET61.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET62.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET62.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET63.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET63.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET64.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET64.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET65.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET65.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET66.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET66.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET67.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET67.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET68.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET68.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET69.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET69.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET6A.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET6A.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET6B.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET6B.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET6C.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET6C.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET6D.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET6D.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET6E.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET6E.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET6F.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET6F.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET70.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET70.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET71.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET71.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET72.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET72.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET73.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET73.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET74.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET74.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET75.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET75.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET76.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET76.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET77.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET77.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET78.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET78.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET79.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET79.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET7A.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET7A.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET7B.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET7B.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET7C.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET7C.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET7D.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET7D.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET7E.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET7E.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET7F.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET7F.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET80.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET80.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET81.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET81.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET82.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET82.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET83.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET83.tmp

Cannot access: C:\WINDOWS\system32\wbem\SET90.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SET90.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETA.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETA.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETAA.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETAA.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETB.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETB.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETC.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETC.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETCA.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETCA.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETCC.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETCC.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETCE.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETCE.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETD.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETD.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETE.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETE.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETE4.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETE4.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETF.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETF.tmp

Cannot access: C:\WINDOWS\system32\wbem\SETF6.tmp

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\SETF6.tmp

Cannot access: C:\WINDOWS\system32\wbem\wmiprvse.exe

Attempting to restore permissions of : C:\WINDOWS\system32\wbem\wmiprvse.exe

Found mount point : C:\WINDOWS\Temp\Google Toolbar\Google Toolbar

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\Temp\Google Toolbar\Google Toolbar



Finished!

#10 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:38 AM

Posted 13 January 2010 - 11:31 PM

You're doing good, we're making progress.




Step #1

:
  • Click on the Start button, then click on Run...
  • In the empty "Open:" box provided, type cmd and press Enter
    • This will launch a Command Prompt window (looks like DOS).
  • Copy the entire blue text below to the clipboard by highlighting all of it and pressing Ctrl+C (or after highlighting, right-click and select Copy).
    copy C:\WINDOWS\ServicePackFiles\i386\eventlog.dll C:\ /y
  • In the Command Prompt window, paste the copied text by right-clicking and selecting Paste.
  • Press Enter.When successfully, you should get this message within the Command Prompt: "1 file(s) copied"
    NOTE: If you didn't get this message, stop and tell me first. Executing The Avenger script (step #2) won't work if the file copy was not successful.
  • Exit the Command Prompt window.


Step #2

Please disable your AV-program, instructions can be found here
  • Download The Avenger by Swandog46 from here.
  • Unzip/extract it to a folder on your desktop.
  • Double click on avenger.exe to run The Avenger.
  • Click OK.
  • Make sure that the box next to Scan for rootkits has a tick in it and that the box next to Automatically disable any rootkits found does not have a tick in it.
  • Copy all of the text in the below code box to the clipboard by highlighting it and then pressing Ctrl+C.
    Files to move:
    C:\eventlog.dll | C:\WINDOWS\system32\eventlog.dll
  • In the avenger window, click the Paste Script from Clipboard, Posted Image button.
  • Click the Execute button.
  • You will be asked Are you sure you want to execute the current script?.
  • Click Yes.
  • You will now be asked First step completed --- The Avenger has been successfully set up to run on next boot. Reboot now?.
  • Click Yes.
  • Your PC will now be rebooted.
  • Note: If the above script contains Drivers to delete: or Drivers to disable:, then The Avenger will require two reboots to complete its operation.
  • After your PC has completed the necessary reboots, a log should automatically open. If it does not automatically open, then the log can be found at %systemdrive%\avenger.txt (typically C:\avenger.txt).

If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#11 hurliman

hurliman
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:12:38 AM

Posted 14 January 2010 - 09:54 AM

Those steps all worked great. I assume you want me to post the avenger log.

Logfile of The Avenger Version 2.0, © by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

File move operation "C:\eventlog.dll|C:\WINDOWS\system32\eventlog.dll" completed successfully.

Completed script processing.

*******************

Finished! Terminate.

#12 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:38 AM

Posted 14 January 2010 - 10:40 AM

Yes, thanks for posting it. We are going to see if ComboFix will run now and let it take a look at your system.



Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Instruction can be found HERE
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:


Posted Image


Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#13 hurliman

hurliman
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:12:38 AM

Posted 14 January 2010 - 08:35 PM

Scan worked great. Below is the log that ComboFix provided:

ComboFix 10-01-14.02 - John Hurliman 01/14/2010 18:13:54.1.2 - x86
Running from: c:\documents and settings\John Hurliman\Desktop\ComboFix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\recycler\S-1-5-21-4028359202-722901303-932418291-500
c:\windows\Downloaded Program Files\MyWebEx
c:\windows\Downloaded Program Files\MyWebEx\419\atarm.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atas32.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atasanot.exe
c:\windows\Downloaded Program Files\MyWebEx\419\atasctrl.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atasnt40.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atcarmcl.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atdl2006.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atjpeg60.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atkbctl.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atlchat.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atmemmgr.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atnetext.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atpack.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atres.dll
c:\windows\Downloaded Program Files\MyWebEx\419\attp.dll
c:\windows\Downloaded Program Files\MyWebEx\419\atwbxui6.dll
c:\windows\Downloaded Program Files\MyWebEx\419\h264dec.dll
c:\windows\Downloaded Program Files\MyWebEx\419\h264enc.dll
c:\windows\Downloaded Program Files\MyWebEx\419\ieatgpc.dll
c:\windows\Downloaded Program Files\MyWebEx\419\mmssl32.dll
c:\windows\Downloaded Program Files\MyWebEx\419\msess.dll
c:\windows\Downloaded Program Files\MyWebEx\419\mticket.dll
c:\windows\Downloaded Program Files\MyWebEx\419\mutiltpd.dll
c:\windows\Downloaded Program Files\MyWebEx\419\mvc.dll
c:\windows\Downloaded Program Files\MyWebEx\419\mwm.ini
c:\windows\Downloaded Program Files\MyWebEx\419\mwmcliun.exe
c:\windows\Downloaded Program Files\MyWebEx\419\mwmproxy.dll
c:\windows\Downloaded Program Files\MyWebEx\419\mwmres.dll
c:\windows\Downloaded Program Files\MyWebEx\419\mwmtrace.txt
c:\windows\Downloaded Program Files\MyWebEx\419\mwmupd.exe
c:\windows\Downloaded Program Files\MyWebEx\419\ratrace.dll
c:\windows\Downloaded Program Files\MyWebEx\419\raurl.dll
c:\windows\Downloaded Program Files\MyWebEx\419\uilibres.dll
c:\windows\Downloaded Program Files\MyWebEx\419\wbxcrypt.dll
c:\windows\Downloaded Program Files\MyWebEx\419\webexmgr.dll
c:\windows\kb913800.exe
c:\windows\mark_32.dll
c:\windows\system32\bincd32.dat
c:\windows\system32\sonhelp.htm
c:\windows\system32\tapi.nfo

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_ANTIPPRO2009_100
-------\Legacy_{79007602-0CDB-4405-9DBF-1257BB3226ED}
-------\Legacy_{79007602-0CDB-4405-9DBF-1257BB3226EE}


((((((((((((((((((((((((( Files Created from 2009-12-15 to 2010-01-15 )))))))))))))))))))))))))))))))
.

2010-01-04 02:01 . 2010-01-04 02:01 -------- d-----w- c:\documents and settings\John Hurliman\Application Data\AdobeAUM
2009-12-24 05:35 . 2009-12-24 05:35 -------- d-----w- c:\documents and settings\John Hurliman\Local Settings\Application Data\Mozilla

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-01-14 14:28 . 2006-07-20 02:24 -------- d-----w- c:\program files\Microsoft Works
2010-01-07 06:16 . 2007-11-22 06:07 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-12-31 05:06 . 2009-12-31 05:06 0 ----a-w- c:\documents and settings\John Hurliman\Application Data\wklnhst.dat
2009-12-30 04:45 . 2010-01-04 16:46 2066200 ----a-w- c:\documents and settings\All Users\Application Data\avg8\update\backup\avgcorex.dll
2009-12-30 04:38 . 2009-12-30 04:38 152576 ----a-w- c:\documents and settings\John Hurliman\Application Data\Sun\Java\jre1.6.0_17\lzma.dll
2009-12-30 04:38 . 2009-11-15 17:51 79488 ----a-w- c:\documents and settings\John Hurliman\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
2009-12-25 02:21 . 2007-01-15 00:05 -------- d-----w- c:\program files\World of Warcraft
2009-11-21 15:51 . 2006-07-19 00:46 471552 ----a-w- c:\windows\AppPatch\aclayers.dll
2009-10-29 07:46 . 2006-07-19 00:48 832512 ----a-w- c:\windows\system32\wininet.dll
2009-10-29 07:46 . 2006-07-19 00:47 78336 ----a-w- c:\windows\system32\ieencode.dll
2009-10-29 07:46 . 2006-07-19 00:46 17408 ------w- c:\windows\system32\corpol.dll
2009-10-21 05:38 . 2006-07-19 00:47 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38 . 2006-07-19 00:47 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-20 16:20 . 2004-08-03 23:00 265728 ----a-w- c:\windows\system32\drivers\http.sys
2007-09-23 01:17 . 2007-09-23 01:17 774144 -c--a-w- c:\program files\RngInterstitial.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{A3BC75A2-1F87-4686-AA43-5347D756017C}"= "c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

[HKEY_CLASSES_ROOT\clsid\{a3bc75a2-1f87-4686-aa43-5347d756017c}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C}]
2009-11-25 20:01 1230080 ----a-w- c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\toscdspd.exe" [2004-12-30 65536]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-14 1695232]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-08-02 68856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CFSServ.exe"="CFSServ.exe -NoClient" [X]
"THotkey"="c:\program files\Toshiba\Toshiba Applet\thotkey.exe" [2006-08-02 364544]
"SkyTel"="SkyTel.EXE" [2006-05-16 2879488]
"NDSTray.exe"="NDSTray.exe" [BU]
"DDWMon"="c:\program files\TOSHIBA\TOSHIBA Direct Disc Writer\\ddwmon.exe" [2006-04-26 299008]
"RTHDCPL"="RTHDCPL.EXE" [2006-08-23 16050688]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2006-03-23 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2006-03-23 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2006-03-23 118784]
"ehTray"="c:\windows\ehome\ehtray.exe" [2005-08-05 64512]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-03-02 761948]
"AGRSMMSG"="AGRSMMSG.exe" [2006-03-18 89541]
"TPSMain"="TPSMain.exe" [2005-06-01 282624]
"PadTouch"="c:\program files\TOSHIBA\Touch and Launch\PadExe.exe" [2005-12-06 1077322]
"TFncKy"="TFncKy.exe" [BU]
"Tvs"="c:\program files\Toshiba\Tvs\TvsTray.exe" [2006-02-02 73728]
"SmoothView"="c:\program files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe" [2005-04-26 122880]
"Pinger"="c:\toshiba\ivp\ism\pinger.exe" [2005-03-18 151552]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [2006-07-03 802816]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [2006-07-03 700416]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-09-01 282624]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd.exe" [2003-08-05 49152]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2003-12-22 241664]
"MSKDetectorExe"="c:\program files\McAfee\SpamKiller\MSKDetct.exe" [2006-11-07 1121280]
"AdobeVersionCue"="c:\program files\Adobe\Adobe Version Cue\ControlPanel\VersionCueTray.exe" [2003-10-13 1732608]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-08-06 136600]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-12-30 2043160]

c:\documents and settings\John Hurliman\Start Menu\Programs\Startup\
Microsoft Office OneNote 2003 Quick Launch.lnk - c:\program files\Microsoft Office\OFFICE11\ONENOTEM.EXE [2007-4-19 64864]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Acrobat Assistant.lnk - c:\program files\Adobe\Adobe Acrobat 6.0\Distillr\acrotray.exe [2003-5-15 217193]
Adobe Gamma Loader.lnk - c:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2007-1-21 110592]
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-9-23 29696]
RAMASST.lnk - c:\windows\system32\RAMASST.exe [2006-7-19 155648]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2009-08-21 15:18 11952 ----a-w- c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\TOSHIBA\\ivp\\NetInt\\Netint.exe"=
"c:\\TOSHIBA\\Ivp\\ISM\\pinger.exe"= c:\\TOSHIBA\\IVP\\ISM\\pinger.exe
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\TOSHIBA\\ConfigFree\\CFXFER.exe"=
"c:\\Program Files\\Macromedia\\Dreamweaver MX 2004\\Dreamweaver.exe"=
"c:\\Program Files\\World of Warcraft\\BackgroundDownloader.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\SmartFTP Client\\SmartFTP.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-2.4.3-to-3.0.2-enUS-Win-Final-downloader.exe"=
"c:\\Program Files\\World of Warcraft\\Launcher.exe"=
"c:\\Program Files\\Curse\\CurseClient.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.1.1.9835-to-3.1.2.9901-enUS-downloader.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.1.3.9947-to-3.2.0.10192-enUS-downloader.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.0.10192-to-3.2.0.10314-enUS-downloader.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgnsx.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.0.10314-to-3.2.2.10482-enUS-downloader.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.2.10482-to-3.2.2.10505-enUS-downloader.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3724:TCP"= 3724:TCP:Blizzard Downloader: 3724

R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [x]
R3 IO_Memory;IO_Memory;c:\sysprep\Drivers\ioport.sys [x]
R3 rootrpeal;rootrpeal;c:\windows\system32\drivers\rootrpeal.sys [x]
R3 SVRPEDRV;SVRPEDRV;c:\sysprep\PEDrv.sys [x]
S1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\System32\Drivers\avgldx86.sys [2009-08-21 335240]
S1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\System32\Drivers\avgtdix.sys [2009-08-21 108552]
S2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [2009-08-21 297752]
S2 tdudf;TOSHIBA UDF File System Driver;c:\windows\system32\DRIVERS\tdudf.sys [2006-06-28 98816]

.
Contents of the 'Scheduled Tasks' folder
.
.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = hxxp://www.toshibadirect.com/dpdstart
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
DPF: {C7DEDA04-2FFF-4B81-AE66-0A0E0EF4AD2F} - hxxp://www.ritzpix.com/net/Uploader/LPUploader57.cab
FF - ProfilePath - c:\documents and settings\John Hurliman\Application Data\Mozilla\Firefox\Profiles\7j4ffcuh.default\
FF - plugin: c:\program files\Google\Picasa3\npPicasa3.dll
FF - plugin: c:\program files\Real\RealArcade\Plugins\Mozilla\npracplug.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-14 18:21
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MySQL]
"ImagePath"="\"c:\program files\MySQL\MySQL Server 5.0\bin\mysqld-nt\" --defaults-file=\"c:\program files\MySQL\MySQL Server 5.0\my.ini\" MySQL"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2608)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\WPDShServiceObj.dll
c:\program files\ArcSoft\PhotoImpression 5\share\pihook.dll
c:\windows\system32\TPwrCfg.DLL
c:\windows\system32\TPwrReg.dll
c:\windows\system32\TPSTrace.DLL
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Intel\Wireless\Bin\EvtEng.exe
c:\program files\Intel\Wireless\Bin\S24EvMon.exe
c:\program files\TOSHIBA\ConfigFree\CFSvcs.exe
c:\windows\system32\DVDRAMSV.exe
c:\windows\eHome\ehRecvr.exe
c:\progra~1\AVG\AVG8\avgrsx.exe
c:\progra~1\AVG\AVG8\avgnsx.exe
c:\windows\eHome\ehSched.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\MySQL\MySQL Server 5.0\bin\mysqld-nt.exe
c:\program files\Intel\Wireless\Bin\RegSrvc.exe
c:\toshiba\IVP\swupdate\swupdtmr.exe
c:\program files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
c:\windows\system32\TODDSrv.exe
c:\windows\ehome\mcrdsvc.exe
c:\windows\system32\dllhost.exe
c:\program files\TOSHIBA\ConfigFree\NDSTray.exe
c:\program files\TOSHIBA\TOSHIBA Direct Disc Writer\ddwmon.exe
c:\windows\RTHDCPL.EXE
c:\windows\AGRSMMSG.exe
c:\windows\eHome\ehmsas.exe
c:\windows\system32\TPSMain.exe
c:\program files\Synaptics\SynTP\Toshiba.exe
c:\windows\system32\TPSBattM.exe
c:\program files\Intel\Wireless\Bin\Dot1XCfg.exe
c:\program files\HP\hpcoretech\comp\hptskmgr.exe
.
**************************************************************************
.
Completion time: 2010-01-14 18:29:21 - machine was rebooted
ComboFix-quarantined-files.txt 2010-01-15 01:29

Pre-Run: 1,434,005,504 bytes free
Post-Run: 1,366,298,624 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Windows XP Media Center Edition" /noexecute=optin /fastdetect

- - End Of File - - 3E1DE88AB11C5B75FF96E3045F31ADE7

#14 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:38 AM

Posted 14 January 2010 - 09:52 PM

I would hope by now the computer is running better. Lots of bad stuff on there we removed. Let's do the following scan to see if there is anything leftover and when you post it let know if you are having any more troubles.



It's important to run this online scan to search for any remnants. It can take some time, so please be patient and allow it to run it's full course:



Please do a scan with Kaspersky Online Scanner. Please note: Kaspersky requires Java Runtime Environment (JRE) be installed before scanning for malware, as ActiveX is no longer being used.)

If you are using Windows Vista, open your browser by right-clicking on its icon and select 'Run as administrator' to perform this scan.
  • Open the Kaspersky WebScanner
    page.
  • Click on the Posted Image button on the main page.
  • The program will launch and fill in the Information section on the left.
  • Read the "Requirements and Limitations" then press the Posted Image button.
  • The program will begin downloading the latest program and definition files. It may take a while so please be patient and let it finish.
  • Once the files have been downloaded, click on the Posted Image ...button.
    In the scan settings make sure the following are selected:
    • Detect malicious programs of the following categories:
      Viruses, Worms, Trojan Horses, Rootkits
      Spyware, Adware, Dialers and other potentially dangerous programs
    • Scan compound files (doesn't apply to the File scan area):
      Archives
      Mail databases
      By default the above items should already be checked.
    • Click the Posted Image button, if you made any changes.
  • Now under the Scan section on the left:

    Select My Computer
  • The program will now start and scan your system. This will run for a while, be patient and let it finish.
  • Once the scan is complete, click on View scan report
  • Now, click on the Save Report as button.
  • In the drop down box labeled Files of type change the type to Text file.
  • Save the file to your desktop.
  • Copy and paste that information in your next post.
You can refer to this animation by sundavis if needed.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#15 hurliman

hurliman
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:12:38 AM

Posted 15 January 2010 - 10:15 AM

Yeah, the computer is definitely running better now. Search engines don't redirect and things seem to be smoother overall. I haven't tried to download anything yet (e.g. iTunes), but will try that soon to see if it works. Thanks!

Below is the Kaspersky log.

--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0: scan report
Friday, January 15, 2010
Operating system: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Last database update: Friday, January 15, 2010 04:45:20
Records in database: 3314876
--------------------------------------------------------------------------------

Scan settings:
scan using the following database: extended
Scan archives: yes
Scan e-mail databases: yes

Scan area - My Computer:
C:\

Scan statistics:
Objects scanned: 122563
Threats found: 2
Infected objects found: 3
Suspicious objects found: 0
Scan duration: 02:32:36


File name / Threat / Threats count
C:\Qoobox\Quarantine\C\WINDOWS\system32\tapi.nfo.vir Infected: Trojan-Downloader.Win32.Small.amck 1
C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP703\A0110217.dll Infected: Backdoor.Win32.Agent.akmn 1
C:\System Volume Information\_restore{CD0BACDB-7BB8-4982-9127-7CA9CF228C78}\RP703\A0110265.nfo Infected: Trojan-Downloader.Win32.Small.amck 1

Selected area has been scanned.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users