Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Computer Acting Very Weird


  • Please log in to reply
20 replies to this topic

#1 OmShanti87

OmShanti87

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:54 PM

Posted 21 January 2010 - 08:56 AM

I've been having the same problem with my computer for a few days. It was probably caused by a virus from something I recently downloaded. I have Windows Vista Home Premium on a Toshiba Satellite A215 laptop. I first noticed something was wrong after playing a game, I exited the game and while the computer was loading everything back up, I wanted to open a document in Word 2007. It gave me an error message saying something to the effect of "you can't open this document because the program needed to open it isn't there." It did the same thing when I tried to open Word, along with a couple other programs. I managed to run Advanced System Care and I did a security analysis and it said I had 279 errors, it was like whatever was making things not work was just eating through things on the computer. Eventually I wasn't able to click anything, items on the Start Menu were disappearing, and when I went into My Computer, the Favorite Links list was empty. I turned the computer off and turned it back on, went into Safe Mode, shut it down again. It boots just fine and works fine for a while, but then weird things will start happening again, the icons in the system tray (battery indicator, internet) will start either disappearing or it will tell me that the battery is dead when it's not, or that I'm not connected to the internet. I've tried scanning with Advanced SystemCare, Avast, Malwarebytes' Anti-Malware, IObit Security 360, and Comodo System Cleaner. None of these programs has found anything that has helped solve the problem. However, I noticed a couple days ago that Game Spy Arcade had been installed on my computer and I didn't put it there. My computer has also crashed two or three times. Please help!

Edited by OmShanti87, 21 January 2010 - 09:00 AM.


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:54 PM

Posted 21 January 2010 - 02:58 PM

Hello ,I am moving this from Vista to the Am I Infected forum.
Let's just try this first

Run Rkill then quickly run MBAM (Malwarebytes)

RKill....

Please download Rkill by Grinler and save it to your desktop.Link 2
Link 3
Link 4
  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista, right-click on it and Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
  • If the tool does not run from any of the links provided, please let me know.
You will need to run the application again if rebooting the computer occurs along the way.


Post back the scan log if successful.
The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
[*]Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 OmShanti87

OmShanti87
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:54 PM

Posted 22 January 2010 - 03:22 PM

I ran the one from the initial link you gave, I had to run it twice because I didn't remember what the error message said the first time, something about it couldn't include pev.exe in the files or something, sorry for not being able to relay that information accurately. Unfortunately the second time the message didn't come up, but I ran MBAM anyway. It's possible that I didn't run MBAM completely before, I remember having to turn the computer off by holding the power button because the screen wouldn't come back on after I left it idle for a while.


Malwarebytes' Anti-Malware 1.44
Database version: 3615
Windows 6.0.6000
Internet Explorer 8.0.6001.18865

1/22/2010 2:49:17 AM
mbam-log-2010-01-22 (02-49-17).txt

Scan type: Full Scan (C:\|)
Objects scanned: 236322
Time elapsed: 3 hour(s), 12 minute(s), 26 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\TypeLib\{87255c51-cd7d-4506-b9ad-97606daf53f3} (Adware.Coupons) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{6e780f0b-bcd6-40cb-b2db-7af47ab4d4a4} (Adware.Coupons) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{a138be8b-f051-4802-9a3f-a750a6d862d4} (Adware.Coupons) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Windows\CouponPrinter.ocx (Adware.Coupons) -> Quarantined and deleted successfully.

I'm not sure if the problem is fixed, things seem to be running normally now, but I won't know until I leave the computer on for a while.

I have a quick question though: as you may have noticed, I have several virus/spyware programs. I was thinking about getting rid of the IObit program and just having Avast and MBAM, would those two be a good combination?

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:54 PM

Posted 22 January 2010 - 04:13 PM

Hello, I would keep Avast ,MBAm and SAS below..
b]Next run ATF and SAS:[/b] If you cannot access Safe Mode,run in normal ,but let me know.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 OmShanti87

OmShanti87
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:54 PM

Posted 24 January 2010 - 09:45 AM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/23/2010 at 02:43 PM

Application Version : 4.33.1000

Core Rules Database Version : 4510
Trace Rules Database Version: 2322

Scan type : Complete Scan
Total Scan Time : 01:37:20

Memory items scanned : 270
Memory threats detected : 0
Registry items scanned : 8138
Registry threats detected : 0
File items scanned : 125824
File threats detected : 99

Adware.Tracking Cookie
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@a.websponsors[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad.yieldmanager[10].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad.yieldmanager[11].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad.yieldmanager[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad.yieldmanager[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad.yieldmanager[3].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad.yieldmanager[4].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad.yieldmanager[5].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad.yieldmanager[6].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad.yieldmanager[7].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad.yieldmanager[8].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad.yieldmanager[9].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad3.clickhype[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ad3.clickhype[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@adfi.adbureau[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.ad4game[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.admanage[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.digitalmedianet[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.lucidmedia[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.nebuadserving[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.sumotorrent[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.us.e-planning[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.vlaze[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.vuze[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.vuze[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.vuze[3].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.vuze[4].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.vuze[5].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.vuze[6].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.vuze[8].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.vuze[9].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.widgetbucks[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@ads.xapads[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@adserver.adreactor[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@adserver.adreactor[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@adserver.adreactor[3].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@adserver.adreactor[4].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@adserver.adreactor[5].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@adserver.adreactor[6].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@adserver.adtechus[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@bs.serving-sys[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@bs.serving-sys[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@bs.serving-sys[3].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@cgm.adbureau[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@collective-media[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@collective-media[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@collective-media[3].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@collective-media[4].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@collective-media[5].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@content.yieldmanager[10].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@content.yieldmanager[11].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@content.yieldmanager[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@content.yieldmanager[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@content.yieldmanager[3].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@content.yieldmanager[4].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@content.yieldmanager[5].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@content.yieldmanager[6].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@content.yieldmanager[7].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@content.yieldmanager[8].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@content.yieldmanager[9].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@counter.inkfrog[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@dc.tremormedia[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@eas.apm.emediate[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@imediablast[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@invitemedia[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@invitemedia[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@invitemedia[3].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@invitemedia[4].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@lucidmedia[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@mazebanner456[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@media.ntsserve[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@media6degrees[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@media6degrees[3].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@more-banners[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@precisionclick[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@redhousebanner[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@richmedia.yahoo[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@richmedia.yahoo[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@servedby.adglobalmedia[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@serving-sys[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@serving-sys[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@serving-sys[3].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@specificmedia[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@statcounter[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@vcstats[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@www.pro-advertise[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@xiti[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@xiti[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@xiti[3].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@yadro[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@yadro[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@yadro[3].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@yadro[4].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@yadro[6].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@yadro[7].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\ashley@yellowlinebanner[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\Low\ashley@advertising[2].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\Low\ashley@apmebf[1].txt
C:\Users\Ashley\AppData\Roaming\Microsoft\Windows\Cookies\Low\ashley@iacas.adbureau[1].txt

wow, my computer is running SO much better, it logged in almost instantly and I can't remember the last time it did that. It's not taking forever to load things either, the drive I use for readyboost isn't flashing all the time either. Is the ATF Cleaner something I should be using on a regular basis? That alone cleared up over 2 million megs (i think i was reading it right, but the number was over 2 million either way). I'm not sure if I should keep Windows Advanced SystemCare either...although that would leave me without a tuneup program. What would you recommend for a tuneup program?

after using the computer today, it started to do the same thing it was doing before i tried to fix it it took longer for it to happen, probably because initially is was online doing homework and not downloading anything. now...i did download something and avast blocked the malware that was in it, but while watching a streaming video the battery indicator changed to an x, what it would do if the battery was dead, but my laptop is always plugged in. the computer was also very slow at this point, i had to turn it off manually again. what should i do now?

Edited by OmShanti87, 24 January 2010 - 04:32 PM.


#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:54 PM

Posted 24 January 2010 - 04:55 PM

Ok, thanks .. Looks good now. If there are no further issues then...
Now you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been backed up, renamed and saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista and Windows 7 users can refer to these links: Create a New Restore Point in Vista or Windows 7 and Disk Cleanup in Vista.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 OmShanti87

OmShanti87
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:54 PM

Posted 24 January 2010 - 05:55 PM

the initial problem is still there, the computer runs better, but when i was using it earlier today it started to get really slow again like it did before and i had to turn it off manually. i might have reinfected it by using it again, should i just repeat the process you told me to?

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:54 PM

Posted 24 January 2010 - 06:06 PM

Yes

Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select FULL scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


Now we'll run Drweb-cureit

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download Dr.Web CureIt and save it to your desktop. DO NOT perform a scan yet.
alternate download link
Note: The file will be randomly named (i.e. 5mkuvc4z.exe).

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on the randomly named file to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and uncheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 OmShanti87

OmShanti87
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:54 PM

Posted 25 January 2010 - 07:02 PM

GEEZ! problem seems to be getting worse, I was in safe mode doing the scans, haven't found anything. Couldn't finish the scan with Dr. Web Cure It, when SAS scanned, it scanned over 200000 files, when Web Cure It scanned, it was about 150000 or so, and when I tried to start it again, everything was unresponsive (couldn't restart the computer, you could click something but it wouldn't open, all this while in safe mode). Things are running fine now but if I let the computer go idle and the screen turns off, it won't come back on when I move the mouse, I waited a few minutes and decided to turn it off. I didn't realize you had to save the log in Web Cure It so I don't have a log for that one. What should I do now?

Malwarebytes' Anti-Malware 1.44
Database version: 3630
Windows 6.0.6000 (Safe Mode)
Internet Explorer 8.0.6001.18865

1/25/2010 6:15:53 AM
mbam-log-2010-01-25 (06-15-53).txt

Scan type: Full Scan (C:\|)
Objects scanned: 241586
Time elapsed: 51 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)




SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/25/2010 at 07:55 AM

Application Version : 4.33.1000

Core Rules Database Version : 4511
Trace Rules Database Version: 2322

Scan type : Complete Scan
Total Scan Time : 01:36:43

Memory items scanned : 267
Memory threats detected : 0
Registry items scanned : 8139
Registry threats detected : 0
File items scanned : 125693
File threats detected : 0

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:54 PM

Posted 25 January 2010 - 11:10 PM

OK,
the Drweb log should be here

%USERPROFILE%\DoctorWeb\CureIt.log


Before we do any thing.
It appears there is a corrupt sytem file.
Try restoring to a date prior to this issue.
Restoring Windows Vista to a previous State
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 OmShanti87

OmShanti87
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:54 PM

Posted 26 January 2010 - 09:04 AM

i never have a distant restore point...the earliest is the 20th, but it might be better than nothing.

restored it, i remember things started happening shortly after i installed the comodo system cleaner...not sure if it's been caught or not. i'll do the scans again because the stuff it they removed it probably there again.

Edited by OmShanti87, 26 January 2010 - 10:47 AM.


#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:54 PM

Posted 26 January 2010 - 12:30 PM

Yes ,That's why I never clean them until I am done. better to be reinfected than unbootable I say.. Yes post the logs again.


Update before scans.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 OmShanti87

OmShanti87
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:54 PM

Posted 26 January 2010 - 12:43 PM

should i use cure it as well?

#14 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:54 PM

Posted 26 January 2010 - 12:58 PM

Yeah, may as well see what/if they all find. We want to be free and clear.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#15 OmShanti87

OmShanti87
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:54 PM

Posted 27 January 2010 - 05:56 PM

Malwarebytes' Anti-Malware 1.44
Database version: 3630
Windows 6.0.6000 (Safe Mode)
Internet Explorer 8.0.6001.18865

1/25/2010 6:15:53 AM
mbam-log-2010-01-25 (06-15-53).txt

Scan type: Full Scan (C:\|)
Objects scanned: 241586
Time elapsed: 51 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/26/2010 at 01:59 AM

Application Version : 4.33.1000

Core Rules Database Version : 4511
Trace Rules Database Version: 1978

Scan type : Complete Scan
Total Scan Time : 00:36:31

Memory items scanned : 269
Memory threats detected : 0
Registry items scanned : 8142
Registry threats detected : 0
File items scanned : 25910
File threats detected : 1

Trojan.Agent/Gen-Nullo[Short]
C:\WINDOWS\COUPONPRINTER.OCX

the log for cure it was too long to put in one post, it didn't find anything though. i found that when i came back to my computer after work, the login picture was changed to a default one. the computer is now loading almost constantly....




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users