Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Online Protection Tool


  • This topic is locked This topic is locked
26 replies to this topic

#1 drbeggs

drbeggs

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:48 PM

Posted 26 March 2010 - 11:45 PM

I have the exact sme thing as the post I quoted below. The same popup and the same things going on. I had AVG when I first seen the popup. Ran Malwarebytes in safe mode because it wouldnt allow me to do so in normal mode. I have since uninstalled AVG and installed McAfee Total Protection ran 2 or 3 times with nothing being fixed. Malwarebytes found 2 things and removed them but the "Online Protection Tool" is still here. Have tried to go to several websites to download other removal tools, but the virus has blocked everything I have tried. Even downloaded to another computer and saved to disc and tried to install from the disc and it would not do anything. I can go to any website except one that wants me to download something to do with removal. It knows!! LOL

XP Home Edition
IE 8
Firefox 3.6


I have Malwarebytes on my computer already and Hijackthis. I contacted McAfee and for $89.95 they will fix it, but I already bought the anti-virus so thats alll my $ they get. Please help!




Hi guys. i keep receiving this fake pop up alert. Here is the image to be more specific.

When i was about to post a introduction in this forums I received the pop up again. i noticed it mostly happens on forums.


Here is the image to be more specific.
Posted Image - The window+Message

Posted Image + Inside site.

I am not sure when i received this message the first time. It was about a week before i think. I knew exe files were not safe to download. Something about the wordings kept me away from it. However i was getting really annoyed by this, and i thought it might be the site or some sort. When i was browsing a different forum,it came up again i accidently hit allow instead of dont allow, and then all was a horrible nightmare. It downloaded setup.exe and automatically activated a fake virus protector antivirus, asking me to register to protect my system. I knew this was a fake, and i immediatly started scanning with malaware bytes- Anti malaware. It detected some items and asked for a reboot and i did. When i logged back in normal mode, the virus was not gone. Instead it covered up the whole desktop with the program running. I couldnt run task manager or anything. I restarted in safe mode with networking and tht didnt do the trick either. The virus protector covered my whole screen. I couldnt even get access to the desktop. Then i logged in my laptop trying to find a way to get rid of this. I found somewhere to restart in safe mode with cmd. In the site it said to type this on the notepad

[Version]
Signature="$Chicago$"
Provider=Myantispyware.com

[DefaultInstall]
AddReg=regsec

[regsec]
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System,DisableRegistryTools,0x00000020,0
HKLM, Software\Microsoft\Windows NT\CurrentVersion\Winlogon,Shell,0x00000020,"Explorer.exe"

Save this as fix.inf to your Desktop (remember to select Save as file type: All files in Notepad). Close Notepad.

In the command prompt type Explorer.exe and Press Enter. Windows Explorer opens. Locate the fix.inf, click right button and select Install. Close Windows Explorer.

In the command prompt type shutdown -r and press Enter. Your computer will be rebooted.


This is what i did. Exactly. And when i rebooted in normal mode. I logged in to my user account and everything was working well. The virus protector didn't pop up. So i assumed it was over. When i was trying to surf the net i noticed some weird things. For example in google. When you search for a person like michael jackson, usually there is a picture, a video, and more detailed stuffs in the search. But for some reason google didnt search that way for me.

This is what it looks like when i surf. You can see some difference from the classic google search.

Posted Image

Sometimes it displays title like <b> title <b>. I dont have a screenshot of that :thumbsup:

And my browser is very very slow. I know my pc can be slow without malaware. but iam pretty sure this has something to do with it. It takes a long time to click a link from google search, and sometimes it takes me to some ad sites. I have to click 2 times to get redirected to the original site. Sometimes when i google search i see like goodclickads, google-analytics when redirecting, in firefox I am not sure if iam explaining myself well. But i really am trying to. im not really good with computers:(. If someone can please assist me with this , it would be greatly appreciated. A lot of people are suggesting me to do a complete reboot. But if theres any other way to remove this Please suggest me. i have subscribed to this forum section, so i will be quick to respond.

Version- Windows Vista
Browsers- Safari, ie. Deleted firefox and googlecrome
Anti virus- ESET Nod 32 Anti virus

Also: Malwarebytes- Anti Malaware and superantispyware installed

Thanks in advance
~Chris



BC AdBot (Login to Remove)

 


#2 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:12:48 AM

Posted 27 March 2010 - 05:12 PM

Hi :thumbsup: ,



Do you have Malwarebytes installed?
If not please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.



We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.




Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#3 drbeggs

drbeggs
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:48 PM

Posted 27 March 2010 - 07:17 PM

Here is the log I have from the last time I ran MBAM. I also get an error when trying to update and couldn't get the files from the other link you provided.

Malwarebytes' Anti-Malware 1.44
Database version: 3510
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

3/27/2010 4:21:09 PM
mbam-log-2010-03-27 (16-21-09).txt

Scan type: Quick Scan
Objects scanned: 123828
Time elapsed: 8 minute(s), 45 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Here is the log from RootRepeal. Also would not let me update it.

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2010/03/27 16:22
Program Version: Version 1.3.5.0
Windows Version: Windows XP Media Center Edition SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xA9F1A000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79F8000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA7D9A000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: c:\windows\temp\sqlite_nqrxueihablyrld
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\documents and settings\dana\local settings\temp\~df1926.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\CONFIG\enterprisesec.config.cch.276.39046
Status: Locked to the Windows API!

Path: C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\CONFIG\security.config.cch.276.39031
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Application Data\Microsoft\CLR Security Config\v1.1.4322\security.config.cch.276.39046
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\DellDriverDownloadManager.exe.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\DellDriverDownloadManager.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\DellDriverDownloadManager.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Core.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Core.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\DellDriverDownloadManager.exe.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Interop.IWshRuntimeLibrary.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Interop.IWshRuntimeLibrary.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\stdole.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\stdole.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Xceed.Compression.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Xceed.Compression.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Dana\Local Settings\Apps\2.0\R5EN5P3Y.A2J\3H6X7MY2.BYV\manifests\Dell.eSupport.DownloadManager.Localization.resources.manifest
Status: Locked to the Windows API!

==EOF==

Ready for what you ask for next. Thank you

#4 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:12:48 AM

Posted 27 March 2010 - 07:32 PM

Hi,

We need to use the RKill Tool by Grinler
  • Link #1
    Link #2
    Link #3
    Link #4
  • Please Download Link #1. Save it to your Desktop.
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double click the RKill desktop icon to run the tool.
  • If you are using Vista please right click and run as Admin!
  • A black screen will briefly flash indicating a successful run.
  • If this does not occur please delete that application and download Link #2.
  • Continue process until the tool runs.
NOTE:
1. Try running RKill using Link 1, if it does not run, download Link 2 and delete Link 1 then try running it again.
2. If you still can't run RKill, repeat the same steps using Link 3 and 4. Please tell me if all the link does not work.
*If the tool does not run from any of the links, Please tell me about it.




Try updating MalwareBytes now and run a FULL scan.

Also, if you can't get it to update download the virus definitions from: [url="http://mbam.malwarebytes.or%20g/database/mbam-rules.exe""]http://mbam.malwarebytes.or g/database/mbam-rules.exe[/url].Run mbam-rules.exe and it should install.

If it isn't working try renaming the file to something random like 23243.exe and try then.



Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#5 drbeggs

drbeggs
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:48 PM

Posted 27 March 2010 - 08:55 PM

Link #1 worked. The black screen stayed for atleast a minute or two. Here is the log.

This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.
Ran as Dana on 03/27/2010 at 20:49:41.


Processes terminated by Rkill or while it was running:


C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe
C:\Documents and Settings\Dana\Desktop\rkill.pif


Rkill completed on 03/27/2010 at 20:50:48.

#6 drbeggs

drbeggs
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:48 PM

Posted 27 March 2010 - 09:05 PM

Also this did not work.

Try updating MalwareBytes now and run a FULL scan.

Also, if you can't get it to update download the virus definitions from: http://mbam.malwarebytes.or g/database/mbam-rules.exe.Run mbam-rules.exe and it should install.

If it isn't working try renaming the file to something random like 23243.exe and try then.



It went to the page but it is just a white window. Thats how it has been doing when I try to go to a site to download something to scan with. I tried to get SAS earlier and it took me to the site, but when I clicked on the download link it went to a white window and said "DONE"

#7 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:12:48 AM

Posted 28 March 2010 - 05:06 AM

I made a mistake with the link I've put.


Download from here: http://rapidshare.com/files/369091189/rules.ref.html

Save it to the desktop.

Please set your system to show all files.
Click Start, open My Computer, select the Tools menu and click Folder Options.
Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
Uncheck: Hide file extensions for known file types
Uncheck the Hide protected operating system files (recommended) option.
Click Yes to confirm.



Then Go to Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware and drag the rules.ref you've downloaded over the original and confirm the overwriting process.That will manually update malwarebytes.



Try scanning now with it and post the log. :thumbsup:



Or you could try this page to download the rules http://mbam.malwarebytes.org/database/mbam-rules.exe.Try this as well please.


Elle

Edited by Blind Faith, 28 March 2010 - 05:49 AM.

Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#8 drbeggs

drbeggs
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:48 PM

Posted 28 March 2010 - 10:09 AM

Neither of these worked to update MBAM. The file that downloaded with the first instructions you gave was an unrecognized file type, but i dragged to the MBAM folder anyway to see if might still work. It didnt do anything, but put the unrecocnized file in the folder. The second instruction did the same as last night. When I tried to go the the download page, the window went white and said "done".

#9 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:12:48 AM

Posted 28 March 2010 - 10:13 AM

Hi ,


When you dragged that file over the original one, you've updated it automaticaly.Those are the rules for Malwarebytes. and it has a specific file type.
You don't need to update it anymore now.

Please run a scan with MalwareBytes.



Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#10 drbeggs

drbeggs
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:48 PM

Posted 28 March 2010 - 10:32 AM

OK it didnt do anything when I put in there so I didnt think it worked. Do you want a full scan or quick scan?

#11 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:12:48 AM

Posted 28 March 2010 - 10:33 AM

Hi,

It doesn't need to do anything, Malwarebytes will use it to find the malicious files.


Full Scan please.




Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#12 drbeggs

drbeggs
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:48 PM

Posted 28 March 2010 - 10:34 AM

OK will do, thank you.

#13 drbeggs

drbeggs
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:48 PM

Posted 28 March 2010 - 11:27 AM

Ran full scan with MBAM, when it was almost done I remembered that I had gone back and rechecked the box to hide "protected operating files". I went and unchecked it again and did another quick scan. Should I do another full scan with it unchecked? Here are both scan logs.

Malwarebytes' Anti-Malware 1.44
Database version: 3510
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

3/28/2010 11:14:15 AM
mbam-log-2010-03-28 (11-14-15).txt

Scan type: Full Scan (C:\|)
Objects scanned: 205813
Time elapsed: 39 minute(s), 22 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)







Malwarebytes' Anti-Malware 1.44
Database version: 3510
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

3/28/2010 11:22:24 AM
mbam-log-2010-03-28 (11-22-24).txt

Scan type: Quick Scan
Objects scanned: 123056
Time elapsed: 7 minute(s), 26 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

#14 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:12:48 AM

Posted 28 March 2010 - 11:39 AM

Hi :thumbsup: ,

No, it's ok.It doesn't detect anything anyways.


Let's try something else.



Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.




Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#15 drbeggs

drbeggs
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:48 PM

Posted 28 March 2010 - 11:59 AM

It will not let me download SAS and I do not have another computer here that I can use. I will have to go to a friends house and do it unless you have another option. Thank you.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users