Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Antivirus Pro 2010


  • This topic is locked This topic is locked
18 replies to this topic

#1 zse45tgb

zse45tgb

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:02:34 AM

Posted 11 February 2010 - 05:03 PM

Hello,
I seem to have been hit with Antivirus Pro 2010 and most likely more, but like your pinned posts say, one thing at a time.
Here is my system info:
Win XP Pro V.2002
Sevice Pack 3
760 MB Ram

Now to the meat of the problem...

After booting, a window appears from Antivirus Pro 2010 saying "please wait, downloading...", only one progress bar appears, but I know for a fact much more has happened because I had quit using this computer last year because of constant pop-up windows from Antivirus Pro 2010. I have tried to run 'root repeal' as well as 'dds.scr', but they fail to complete their scans. I have tried to DL 'MBAM' from Malwarebytes home page, but my browser refuses to connect. I can get to the DL page at Major Geeks, but the DL does not start automaticlly. When I click on the link to DL manually my browser will time out.
I have been using another computer and told a friend about my problem and he told me about 'combofix'. I went to your site and read the directions, and ended up here.
I am fortunate to have another computer and a flash drive, so if instructed to I can DL whatever is necessary and Copy and Paste to this machine. The one problem I have is that the other computer is a laptop with a bad screen, so I cannot use both together as I have only one monitor.

Thank you for your time,

Mike

BC AdBot (Login to Remove)

 


#2 zse45tgb

zse45tgb
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:02:34 AM

Posted 12 March 2010 - 03:11 PM

I know that I'm not supposed to 'bump' my posting, but it has been a month since I posted my problem, and there have been changes:

I did DL MBAM but when it was updating I got an error code "732 (12007, 0)"
The MBAM main screen comes up, but when I click 'scan' it only scans for about 3 seconds and closes.
I have run "rkill" and came up empty.
I have run "tdskiller" and it did eliminate 8 items on reboot, but I stll cannot get MBAM, RootRepeal, DDS, or GMER to run successfully.

Please Help,

Mike

#3 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,561 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:34 AM

Posted 12 March 2010 - 09:59 PM

Hello,sorry you got lost in the traffic.
Run this first..FixExe.reg

FixExe.reg
....click Run when the box opens

Try MBAM.
MBAM 732 error

This routine will confirm that Internet Explorer is set to the Online mode.
Click on START - RUN and Copy/Paste the following into the run line (On Vista you can use the Search line) and click OK

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v GlobalUserOffline /t REG_DWORD /d 0 /f

OR
1. Uninstall Malwarebytes' Anti-Malware using Add/Remove programs in the control panel.
2. Restart your computer (very important).
3. Download and run this utility. Mbam clean
4. It will ask to restart your computer (please allow it to).
5. After the computer restarts, install the latest version from here. http://www.malwarebytes.org/mbam-download.php
Note: You will need to reactivate the program using the license you were sent.
Note: If using Free version, ignore the part about putting in your license key and activating.
Launch the program and set the Protection and Registration.
Then go to the UPDATE tab if not done during installation and check for updates.
Restart the computer again and verify that MBAM is in the task tray and run a Quick Scan and post that log.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#4 zse45tgb

zse45tgb
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:02:34 AM

Posted 15 March 2010 - 03:19 PM

Hello boopme,
First, thank you for your reply.
I ran FixExe.reg and tried to run MBAM, but got an eror that I did not have the necessary permission to access so I uninstalled MBAM and tried to DL Mbam clean. I got the error message "Internet Explorer Cannot Display This Webpage".
I checked and copied the URL to paste here 'http://www.malwarebytes.org/mbam-clean.exe' I have checked my Internet Settings, and I am not going thru a proxy. I also do not believe that '.exe' is actually a domain, but I have been wrong before. If there is a different URL for the download I would be happy to try again. I don't know if a screen shot of my desktop will be of any help, but I have included one anyway.

Posted Image

Again Thank You,

Mike

#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,561 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:34 AM

Posted 15 March 2010 - 06:55 PM

Hi Mike. sorry you have such difficulties.. This is XP?
Disconnect the infected machine from the internet.

I want to try another scan,if it works I believe MBAM will work after it.

First re run RKill..

Let's also be sure we clean the Flash Drive
Please download Flash_Disinfector.exe by sUBs and save it to your desktop.
  • Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
  • The utility may ask you to insert your flash drive and/or other removable drives. Please do so and allow the utility to clean up those drives as well.
  • Hold down the Shift key when inserting the drive until Windows detects it to keep autorun.inf from executing if it is present.
  • Wait until it has finished scanning and then exit the program.
  • Reboot your computer when done.
Note: As part of its routine, Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive that was plugged in when you ran it. Do not delete this folder...it will help protect your drives from future infection by keeping the autorun file from being installed on the root drive and running other malicious files.

Next TFC..
Please download TFC by Old Timer and save it to your desktop.
alternate download link
Save any unsaved work. TFC will close ALL open programs including your browser!
Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.

Now do SAS
Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 zse45tgb

zse45tgb
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:02:34 AM

Posted 17 March 2010 - 01:10 PM

Hi boopme,
Yes, I am running XP Pro. One other rather important change I neglected to mention is the fact that the laptop with the bad screen has decided to spend its remaining days as a paper weight. My roommate has a laptop, but she is working out of town, and is only home on weekends, therefore I am still online with my infected machine.
OK, back to this coputer...
I did DL TFC and SUPERAntispywarewithout problem. I ran TFC, and it seems to have cleared up both of the Antivirus Pro 2010 windows (the download window on my desktop, and the intermittent fake alert window) and I also don't see Antivirus Pro 2010 rnning in my task bar. I also installed SUPERAntispyware, but cannot get it to run. I don't get any error, it just fails to open. I have the same problem with GMER. When I try to run dds.scr a DOS window opens and closes so quickly I can't read the message it contains. If I try to open RootRepeal or runscanner I get the mesage "Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item." I do have administrator privileges with my username.

Thank You Again For Your Time,

Mike

#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,561 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:34 AM

Posted 17 March 2010 - 02:08 PM

Oh this is so much fun.. :thumbsup:
let's see if wecan fix SAS first.
please download and run the following program to launch SUPERAntiSpyware:

RUNSAS.EXE

Now run RKill.... then SAS

Please download Rkill by Grinler and save it to your desktop.Link 2
Link 3
Link 4
  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista, right-click on it and Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
  • If the tool does not run from any of the links provided, please let me know.
You will need to run the application again if rebooting the computer occurs along the way as the malware programs will start again.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 zse45tgb

zse45tgb
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:02:34 AM

Posted 18 March 2010 - 01:30 PM

Hi boome,
I had to find an alternative method to get SUPERAntispyware to run, but it worked, and I got MBAM to run as well. They seem to compliment each other well. I believe I'm ready for step next.

Again, Thank you,

Mike

#9 zse45tgb

zse45tgb
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:02:34 AM

Posted 18 March 2010 - 01:38 PM

I forgot to ask if I should post the logs from SAS and MBAM.

Mike

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,561 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:34 AM

Posted 18 March 2010 - 02:15 PM

Yes if they found items,it helps to see what to do next.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 zse45tgb

zse45tgb
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:02:34 AM

Posted 18 March 2010 - 03:16 PM

Hello again,
I actually scanned with each more than once, and I'm hoping that you just want the latest scan logs. I am not sure quite how to post a log except to copy and paste, so here is the MBAM log:

Malwarebytes' Anti-Malware 1.44
Database version: 3879
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

3/17/2010 11:50:09 PM
mbam-log-2010-03-17 (23-50-09).txt

Scan type: Full Scan (C:\|D:\|E:\|H:\|)
Objects scanned: 408346
Time elapsed: 1 hour(s), 48 minute(s), 38 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{AF9B8530-7AB5-465F-A107-3ACB4FB06248}\RP531\A0027567.exe (Trojan.Orsam) -> Quarantined and deleted successfully.


And the SAS log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 03/17/2010 at 09:35 PM

Application Version : 4.34.1000

Core Rules Database Version : 4693
Trace Rules Database Version: 2505

Scan type : Complete Scan
Total Scan Time : 01:01:30

Memory items scanned : 419
Memory threats detected : 0
Registry items scanned : 5686
Registry threats detected : 0
File items scanned : 41326
File threats detected : 7

Adware.Vundo/Variant-X32[Header]
C:\SYSTEM VOLUME INFORMATION\_RESTORE{AF9B8530-7AB5-465F-A107-3ACB4FB06248}\RP531\A0027547.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{AF9B8530-7AB5-465F-A107-3ACB4FB06248}\RP531\A0027548.DLL

Trojan.Agent/Gen-Nullo[Short]
C:\SYSTEM VOLUME INFORMATION\_RESTORE{AF9B8530-7AB5-465F-A107-3ACB4FB06248}\RP531\A0027568.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{AF9B8530-7AB5-465F-A107-3ACB4FB06248}\RP531\A0027569.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{AF9B8530-7AB5-465F-A107-3ACB4FB06248}\RP531\A0027570.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{AF9B8530-7AB5-465F-A107-3ACB4FB06248}\RP531\A0027571.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{AF9B8530-7AB5-465F-A107-3ACB4FB06248}\RP531\A0027572.SYS


If you would like to see the initial scan logs just let me know.
This is actually enjoyable once progress is being made.

Thank you agin,

Mike

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,561 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:34 AM

Posted 18 March 2010 - 03:40 PM

Yes we are making good progress.. Another info stealer and some infections in system Restore we will clear last..
Do you do banking on here? We should run one more scan also. How is it running now?

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 zse45tgb

zse45tgb
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:02:34 AM

Posted 19 March 2010 - 01:52 AM

Hi,
Yes things are progessing nicely. :thumbsup: The computer is much snappier when booting as well as opening programs, and so far I can go anywhere on the internet I've tried. :flowers: I haven't done banking on this computer, but I don't want to rule it out since the laptop died. Below is the result of my ESET scan:

C:\ppulqkxa.txt Win32/Rootkit.Agent.NDR trojan cleaned by deleting - quarantined
C:\Documents and Settings\Tasha\Local Settings\Application Data\Microsoft\CD Burning\pw\CCN.zip probably a variant of Win32/Delf trojan deleted - quarantined
C:\Documents and Settings\Tasha\Local Settings\Application Data\Microsoft\CD Burning\pw\GSM SMS Sender 1.0.rar probably a variant of Win32/Agent trojan deleted - quarantined
C:\Documents and Settings\Tasha\Local Settings\Application Data\Microsoft\CD Burning\pw\jps1.7.zip Win32/PSW.Prostor.A trojan deleted - quarantined
C:\Documents and Settings\Tasha\Local Settings\Application Data\Microsoft\CD Burning\pw\Jps18.zip Win32/PSW.Prostor.NAA trojan deleted - quarantined
C:\Documents and Settings\Tasha\Local Settings\Application Data\Microsoft\CD Burning\pw\WinSpy.rar probably a variant of Win32/Agent trojan deleted - quarantined
C:\Documents and Settings\Tasha\Local Settings\Application Data\Microsoft\CD Burning\pw\XP_PASSWORD_MANAGER.rar probably a variant of Win32/Agent trojan deleted - quarantined
C:\Documents and Settings\Tasha\Local Settings\Application Data\Microsoft\CD Burning\pw\CCN\CCN.txt probably a variant of Win32/Delf trojan cleaned by deleting - quarantined
C:\Documents and Settings\Tasha\Local Settings\Application Data\Microsoft\CD Burning\pw\GSM SMS Sender 1.0\GSM SMS Sender 1.0.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
C:\Documents and Settings\Tasha\Local Settings\Application Data\Microsoft\CD Burning\pw\WinSpy\WinSpy.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
C:\Documents and Settings\Tasha\My Documents\crAcK\pw\CCN.zip probably a variant of Win32/Delf trojan deleted - quarantined
C:\Documents and Settings\Tasha\My Documents\crAcK\pw\GSM SMS Sender 1.0.rar probably a variant of Win32/Agent trojan deleted - quarantined
C:\Documents and Settings\Tasha\My Documents\crAcK\pw\jps1.7.zip Win32/PSW.Prostor.A trojan deleted - quarantined
C:\Documents and Settings\Tasha\My Documents\crAcK\pw\Jps18.zip Win32/PSW.Prostor.NAA trojan deleted - quarantined
C:\Documents and Settings\Tasha\My Documents\crAcK\pw\WinSpy.rar probably a variant of Win32/Agent trojan deleted - quarantined
C:\Documents and Settings\Tasha\My Documents\crAcK\pw\XP_PASSWORD_MANAGER.rar probably a variant of Win32/Agent trojan deleted - quarantined
C:\Documents and Settings\Tasha\My Documents\crAcK\pw\CCN\CCN.txt probably a variant of Win32/Delf trojan cleaned by deleting - quarantined
C:\Documents and Settings\Tasha\My Documents\crAcK\pw\GSM SMS Sender 1.0\GSM SMS Sender 1.0.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
C:\Documents and Settings\Tasha\My Documents\crAcK\pw\WinSpy\WinSpy.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
C:\PestPatrol\Quarantine\20071104180825.zip a variant of Win32/TrojanDownloader.Agent.NTA trojan deleted - quarantined
C:\Program Files\Common Files\Microsoft Shared\Web Folders\ibm00001.txt probably a variant of Win32/PSW.Sinowal.Gen trojan cleaned by deleting - quarantined
C:\Program Files\Common Files\Microsoft Shared\Web Folders\ibm00002.txt probably a variant of Win32/PSW.Sinowal.Gen trojan cleaned by deleting - quarantined
C:\Program Files\MSConfig CleanUp\MSConfigCleanUp.exe probably unknown NewHeur_PE virus deleted - quarantined
C:\System Volume Information\_restore{AF9B8530-7AB5-465F-A107-3ACB4FB06248}\RP535\A0029087.exe probably unknown NewHeur_PE virus deleted - quarantined
C:\WINDOWS\system32\adeeg.bak1 Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\adeeg.bak2 Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\adeeg.ini2 Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\adeeg.tmp Win32/Adware.Virtumonde.NEO application cleaned by deleting - quarantined
C:\WINDOWS\system32\geeda.txt Win32/Adware.Virtumonde application cleaned by deleting - quarantined
C:\WINDOWS\system32\drivers\runtime2.txt Win32/Rootkit.Agent.EY trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\drivers\runtime21.txt Win32/Rootkit.Agent.EY trojan cleaned by deleting - quarantined
C:\WINDOWS.1\system32\bridges.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
C:\WINDOWS.1\system32\cube.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
C:\WINDOWS.1\system32\fifteen.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
C:\WINDOWS.1\system32\flip.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
C:\WINDOWS.1\system32\netgame.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
C:\WINDOWS.1\system32\samegame.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
C:\WINDOWS.1\system32\twiddle.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
C:\WINDOWS.1\system32\untangle.txt probably a variant of Win32/Agent trojan cleaned by deleting - quarantined
D:\Install1431.txt a variant of Win32/TrojanDownloader.Agent.NTA trojan cleaned by deleting - quarantined
D:\Program Files\AIM\Sysfiles\WxBug.EXE Win32/Adware.WBug.A application deleted - quarantined
E:\!downloads\MS Office 2007 Enterprise - Passes All WGA Checks - Jackdilla.rar\MS Office 2007 Enterprise - Passes All WGA Checks - Jackdilla.iso probably a variant of Win32/TrojanDownloader.Agent trojan deleted - quarantined
E:\!downloads\MS Office 2007 Enterprise - Passes All WGA Checks - Jackdilla.rar\MS Office 2007 Enterprise - Passes All WGA Checks - Jackdilla.rar probably a variant of Win32/TrojanDownloader.Agent trojan deleted - quarantined

Thanks again,

Mike

#14 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,561 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:34 AM

Posted 19 March 2010 - 08:49 AM

That was really good.. Some of the findinings say it's possible that you have an infected Master Boot Record so lets check it to be sure.

Please download mbr.exe and save it to your desktop <- (Important!).
  • Double-click on mbr.exe and allow the mbr.sys driver to load if asked.
  • A black DOS window will open and quickly disappear. This is normal.
  • A log file named mbr.log will be created and saved on your desktop.
  • Copy and paste the results of the mbr.log in your next reply.
Also, go to Posted Image > Control Panel > User Accounts, then C:\Documents and Settings\ and let me know if there is a HelpAssistant Account listed.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#15 zse45tgb

zse45tgb
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:02:34 AM

Posted 19 March 2010 - 12:17 PM

Good morning,
Here is the log from MBR:

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
kernel: MBR read successfully
user & kernel MBR OK


In User Accounts, all that is listed is User (Computer Administrator) and Guest, which is off.
In C:\Documents and Settings\ there is no HelpAssistant account.

Regards,

Mike




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users