Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

infected with the antispyware soft virus


  • This topic is locked This topic is locked
3 replies to this topic

#1 random22

random22

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:03:31 PM

Posted 07 June 2010 - 02:56 AM

On June 1st, 2010 my computer was visciously attacked by a predator trojan, or atleast that's when it was activated, anyway.

I feverishly searched the internet for possible solutions, even though the rogue "anti" virus tried to halt my plans in doing so.

You see, I realized early on that the anti-virus was in fact the virus so I did a 1-2-3. ALT + CNTL+DEL that is, and shut it down as soon as possible.

Then a located the files under local settings and the app data folder, and deleted the folder that looked suspicous, as i had been alerted earlier by people posting on forums who had previously undergone the same things.

I did my research and followed their instructions to the best of my ability, which included downloading the following: Malwarebytes, Combofix, Hijackthis, amongst others.

At las, I thought finally the culprite has been found and destroyed, but that is not so because my broswer is still hijacked, and it keeps redirecting me to various sites. Included in the post is the log file left by combo fix, if you need one from malware let me know.


Also, how did this trojan download to my pc without my knowledge?






((((((((((((((((((((((((( Files Created from 2010-05-07 to 2010-06-07 )))))))))))))))))))))))))))))))
.

2010-06-04 23:53 . 2010-06-04 23:53 -------- d-----w- c:\documents and settings\Theda Richardson\Application Data\Malwarebytes
2010-06-04 23:52 . 2010-04-29 22:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-06-04 23:52 . 2010-06-04 23:52 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-06-04 23:52 . 2010-04-29 22:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-06-04 23:52 . 2010-06-04 23:52 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-31 22:26 . 2010-05-31 22:43 -------- d-----w- c:\documents and settings\Theda Richardson\Local Settings\Application Data\VMware
2010-05-31 22:26 . 2010-05-31 22:26 -------- d-----w- c:\documents and settings\Theda Richardson\Application Data\VMware
2010-05-31 22:24 . 2010-05-31 22:24 921608 ----a-w- c:\documents and settings\All Users\Application Data\VMware\VMware Player\Uninstaller\uninstall.exe
2010-05-31 22:24 . 2010-05-31 22:18 581632 ----a-w- c:\documents and settings\All Users\Application Data\VMware\VMware Player\Uninstaller\module_core.dll
2010-05-31 22:24 . 2010-05-31 22:18 356352 ----a-w- c:\documents and settings\All Users\Application Data\VMware\VMware Player\Uninstaller\module_ws.dll
2010-05-31 22:24 . 2010-05-31 22:18 968752 ----a-w- c:\documents and settings\All Users\Application Data\VMware\VMware Player\Uninstaller\vnetlib64.dll
2010-05-31 22:24 . 2010-05-31 22:18 932400 ----a-w- c:\documents and settings\All Users\Application Data\VMware\VMware Player\Uninstaller\vnetlib64.exe
2010-05-31 22:24 . 2010-05-31 22:18 760368 ----a-w- c:\documents and settings\All Users\Application Data\VMware\VMware Player\Uninstaller\vnetlib.dll
2010-05-31 22:24 . 2010-05-31 22:18 760368 ----a-w- c:\documents and settings\All Users\Application Data\VMware\VMware Player\Uninstaller\vminstutil.dll
2010-05-31 22:24 . 2010-05-31 22:18 707120 ----a-w- c:\documents and settings\All Users\Application Data\VMware\VMware Player\Uninstaller\vnetlib.exe
2010-05-31 22:22 . 2010-05-21 07:39 334384 ----a-w- c:\windows\system32\vmnetdhcp.exe
2010-05-31 22:22 . 2010-05-21 07:39 399920 ----a-w- c:\windows\system32\vmnat.exe
2010-05-31 22:22 . 2010-05-21 07:37 26288 ----a-w- c:\windows\system32\drivers\vmnetuserif.sys
2010-05-31 22:22 . 2010-05-21 07:38 760368 ----a-w- c:\windows\system32\vnetlib.dll
2010-05-31 22:22 . 2010-05-21 07:38 24624 ----a-w- c:\windows\system32\drivers\VMkbd.sys
2010-05-31 22:21 . 2010-05-31 22:21 -------- d-----w- c:\program files\Common Files\VMware
2010-05-31 22:19 . 2010-06-02 06:42 -------- d-----w- c:\documents and settings\All Users\Application Data\VMware
2010-05-31 22:19 . 2010-05-31 22:19 -------- d-----w- c:\program files\VMware
2010-05-31 00:29 . 2010-05-31 01:14 -------- d-----w- c:\documents and settings\Theda Richardson\Application Data\Download Manager
2010-05-21 07:40 . 2010-05-21 07:40 70704 ----a-w- c:\windows\system32\drivers\vmci.sys
2010-05-21 07:40 . 2010-05-21 07:40 854064 ----a-w- c:\windows\system32\drivers\vmx86.sys
2010-05-21 07:37 . 2010-05-21 07:37 32688 ----a-w- c:\windows\system32\drivers\vmnetbridge.sys
2010-05-21 07:37 . 2010-05-21 07:37 51248 ----a-w- c:\windows\system32\vmnetbridge.dll
2010-05-21 06:40 . 2010-05-21 06:40 32304 ----a-w- c:\windows\system32\drivers\hcmon.sys
2010-05-21 06:13 . 2010-05-21 06:13 252464 ----a-w- c:\windows\system32\vmnc.dll
2010-05-21 04:19 . 2010-05-21 04:19 59952 ----a-w- c:\windows\system32\vnetinst.dll
2010-05-21 04:19 . 2010-05-21 04:19 18736 ----a-w- c:\windows\system32\drivers\vmnet.sys
2010-05-21 04:19 . 2010-05-21 04:19 16560 ----a-w- c:\windows\system32\drivers\vmnetadapter.sys
2010-05-20 09:33 . 2010-05-20 09:33 664 ----a-w- c:\windows\system32\d3d9caps.dat

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-15 03:35 . 2010-03-07 21:57 -------- d-----w- c:\program files\Twitter FriendAdder
2010-05-06 15:41 . 2009-10-23 08:37 55496 ----a-w- c:\documents and settings\Theda Richardson\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-05-02 17:30 . 2010-02-13 02:16 -------- d-----w- c:\documents and settings\All Users\Application Data\Yahoo!
2010-05-02 17:30 . 2010-02-13 02:09 -------- d-----w- c:\program files\Yahoo!
2010-05-02 17:30 . 2010-05-02 17:30 862872 ------w- c:\documents and settings\Theda Richardson\Application Data\Yahoo!\SearchProtection\fudogs_2.0.1.13_msgr_bts_setup.2010.04.01.01.exe
2010-04-27 23:42 . 2010-04-27 23:42 64960 ----a-w- c:\windows\system32\drivers\stcp2v30.sys
2010-04-26 15:13 . 2009-11-13 15:38 -------- d-----w- c:\documents and settings\Theda Richardson\Application Data\Apple Computer
2010-04-15 00:07 . 2010-04-15 00:07 -------- d-----w- c:\program files\Coupons
2010-03-24 00:25 . 2010-03-24 00:25 0 ----a-w- c:\documents and settings\Theda Richardson\Application Data\wklnhst.dat
2010-03-16 13:05 . 2009-11-07 16:24 79488 ----a-w- c:\documents and settings\Theda Richardson\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
2010-03-11 12:38 . 2010-03-11 12:38 832512 ----a-w- c:\windows\system32\wininet.dll
2010-03-11 12:38 . 2010-03-11 12:38 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-03-11 12:38 . 2010-03-11 12:38 17408 ----a-w- c:\windows\system32\corpol.dll
2010-03-09 11:09 . 2010-03-09 11:09 430080 ----a-w- c:\windows\system32\vbscript.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-09-05 417792]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKLM\~\startupfolder\C:^Documents and Settings^Theda Richardson^Start Menu^Programs^Startup^OneNote 2007 Screen Clipper and Launcher.lnk]
path=c:\documents and settings\Theda Richardson\Start Menu\Programs\Startup\OneNote 2007 Screen Clipper and Launcher.lnk
backup=c:\windows\pss\OneNote 2007 Screen Clipper and Launcher.lnkStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AESTFltr]
2009-02-18 21:41 737280 ----a-w- c:\windows\system32\AESTFltr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2008-04-15 12:00 15360 ----a-w- c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Mobile Broadband]
2009-01-09 23:15 455224 ----a-w- c:\swsetup\HPQWWAN\HPMobileBroadband.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\hpWirelessAssistant]
2008-04-15 21:51 488752 ----a-w- c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2009-10-29 04:21 141600 ----a-w- c:\program files\iTunes\iTunesHelper.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Messenger (Yahoo!)]
2009-11-10 23:39 5244216 ----a-w- c:\progra~1\Yahoo!\Messenger\YahooMessenger.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2009-05-07 23:33 136600 ----a-w- c:\program files\Java\jre6\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Syncables]
2009-04-02 08:51 173360 ----a-w- c:\program files\syncables\syncables desktop\Syncables.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VMware hqtray]
2010-05-21 07:39 64048 ----a-w- c:\program files\VMware\VMware Player\hqtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"VMware NAT Service"=2 (0x2)
"VMUSBArbService"=2 (0x2)
"VMnetDHCP"=2 (0x2)
"VMAuthdService"=2 (0x2)
"ufad-ws60"=3 (0x3)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\syncables\\syncables desktop\\jre\\bin\\javaw.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\VMware\\VMware Player\\vmware-authd.exe"=

R0 SahdIa32;HDD Filter Driver;c:\windows\system32\drivers\SahdIa32.sys [5/7/2009 4:32 PM 21488]
R0 SaibIa32;Volume Filter Driver;c:\windows\system32\drivers\SaibIa32.sys [5/7/2009 4:32 PM 15856]
R0 SysCow;SysCow;c:\windows\system32\drivers\syscow32x.sys [9/24/2008 10:09 PM 103792]
S1 SaibVd32;Virtual Disk Driver;c:\windows\system32\drivers\SaibVd32.sys [5/7/2009 4:32 PM 25584]
S2 9734BF6A-2DCD-40f0-BAB0-5AAFEEBE1269;Roxio SAIB Service;c:\program files\Roxio\BackOnTrack\Disaster Recovery\SaibSVC.exe [12/11/2008 10:46 PM 125424]
S2 vmci;VMware vmci;c:\windows\system32\drivers\vmci.sys [5/21/2010 12:40 AM 70704]
S3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [5/7/2009 4:23 PM 113664]
S3 L1c;NDIS Miniport Driver for Atheros AR8131/AR8132 PCI-E Ethernet Controller;c:\windows\system32\drivers\l1c51x86.sys [3/2/2009 2:03 PM 38912]
S3 RSUSBSTOR;RTS5121.Sys Realtek USB Card Reader;c:\windows\system32\drivers\RTS5121.sys [5/7/2009 4:23 PM 160256]
S3 Rts516xIR;Realtek IR Driver;c:\windows\system32\DRIVERS\Rts516xIR.sys --> c:\windows\system32\DRIVERS\Rts516xIR.sys [?]
S4 BOTService;BOTService;c:\program files\Roxio\BackOnTrack\Instant Restore\BOTService.exe [3/19/2009 12:04 PM 203248]
S4 VMUSBArbService;VMware USB Arbitration Service;c:\program files\Common Files\VMware\USB\vmware-usbarbitrator.exe [5/20/2010 11:40 PM 539184]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - PXHELP20
.
Contents of the 'Scheduled Tasks' folder

2010-06-04 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 20:34]

2010-06-06 c:\windows\Tasks\BackOnTrack Instant Restore Idle.job
- c:\program files\Roxio\BackOnTrack\Instant Restore\RstIdle.exe [2009-03-19 19:05]
.
.
------- Supplementary Scan -------
.
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = <local>
uInternet Settings,ProxyServer = http=127.0.0.1:5555
LSP: c:\program files\VMware\VMware Player\vsocklib.dll
FF - ProfilePath - c:\documents and settings\Theda Richardson\Application Data\Mozilla\Firefox\Profiles\nf70k0pi.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.yahoo.com/search?fr=ffsp1&p=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=ffds1&p=
FF - component: c:\documents and settings\Theda Richardson\Application Data\Mozilla\Firefox\Profiles\nf70k0pi.default\extensions\{5fb1186a-3398-4c47-b579-0f2eee222ad1}\platform\WINNT_x86-msvc\components\outwit.3.1.dll
FF - component: c:\documents and settings\Theda Richardson\Application Data\Mozilla\Firefox\Profiles\nf70k0pi.default\extensions\{5fb1186a-3398-4c47-b579-0f2eee222ad1}\platform\WINNT_x86-msvc\components\outwit.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npCouponPrinter.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npMozCouponPrinter.dll
FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
FF - user.js: yahoo.ytff.general.dontshowhpoffer - truec:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
.
- - - - ORPHANS REMOVED - - - -

WebBrowser-{604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - (no file)
MSConfigStartUp-91225019 - c:\docume~1\ALLUSE~1\APPLIC~1\91225019\91225019.exe
MSConfigStartUp-96606330 - c:\docume~1\ALLUSE~1\APPLIC~1\96606330\96606330.exe
MSConfigStartUp-Search Protection - c:\program files\Yahoo!\Search Protection\SearchProtection.exe
AddRemove-Adobe Flash Player ActiveX - c:\windows\system32\Macromed\Flash\uninstall_activeX.exe
AddRemove-HijackThis - c:\documents and settings\Theda Richardson\My Documents\HijackThis.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-06-06 23:50
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...


c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\60E31627FDA0A46932B0E5948949F2A5 94 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\6AFA4286D305D35CF857C64AE01F5F72 102 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\6BE21D2CEA2D1FE84F67CBEE9584AB74 134 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\6EE3F4B30DD5A19E5ECECC8051B4EDE0 144 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\730D5998294EC1DD878D90791B588994 112 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\74BFD122C0875EC75DBE5C6DB4C59019 124 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\7667F5CFD4E1208817FCE9FA714E92FB 96 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\CC1D2217978633D67C5F5C2857AA9B12 132 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\CC8AB4F39B5BEE7A1413C682ED05BBF3 132 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\D0F063B6B88A2B8BFE21C3993A613447 178 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\D33BA91FECBE98D217EE38BE0B2B0EF5 114 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\D36802DB84D22C0C5A87479A6AEA4A65 98 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\D725F3459E2275E9EA5871B92AD896D0 110 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\D7BA3D541D00D5B658CE5FEBB3CFC62D 98 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\DF1365D71945475FBDA282D5BBA2B7A0 168 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\E4AED02DCCD7B73DC8965E0D507CE301 96 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\E5062987353057B4F90E8C7A2DEAE329 100 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\E536990EF3683384E4BBCC6E97D6C151 132 bytes
c:\documents and settings\Theda Richardson\Application Data\Microsoft\CryptnetUrlCache\MetaData\E782C84DFF3B7552B71E5F5DC4865E1A 106 bytes

scan completed successfully
hidden files: 19

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Installer\UserData\LocalSystem\Components\||A~*]
"AB141C35E9F4BF344B9FC010BB17F68A"=""
.
Completion time: 2010-06-06 23:54:49
ComboFix-quarantined-files.txt 2010-06-07 06:54

Pre-Run: 111,651,844,096 bytes free
Post-Run: 114,368,843,776 bytes free

- - End Of File - - 8C2055AF0C2927ACB956869C88D28E45






BC AdBot (Login to Remove)

 


#2 random22

random22
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:03:31 PM

Posted 08 June 2010 - 08:04 AM

CAN SOMEONE PLEASE HELP ME!!!!!!!!!!!!!!!!!11


ALSO I CANNOT USE COMBOFIX IN NORMAL MODE, ONLY IN SAFE MODE.

#3 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • ONLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:11:31 PM

Posted 10 June 2010 - 07:11 AM

Hello ,
And welcome.gif to the Bleeping Computer Malware Removal Forum
. My name is Elise and I'll be glad to help you with your computer problems.


I will be working on your malware issues, this may or may not solve other issues you may have with your machine.

Please note that whatever repairs we make, are for fixing your computer problems only and by no means should be used on another computer.
  • The cleaning process is not instant. Logs can take some time to research, so please be patient with me. I know that you need your computer working as quickly as possible, and I will work hard to help see that happen.
  • Please reply using the Add/Reply button in the lower right hand corner of your screen. Do not start a new topic.
  • The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Unfortunately, if I do not hear back from you within 5 days, I will be forced to close your topic. If you still need help after I have closed your topic, send me or a moderator a personal message with the address of the thread or feel free to create a new one.
You may want to keep the link to this topic in your favorites. Alternatively, you can click the button at the top bar of this topic and Track this Topic, where you can choose email notifications. The topics you are tracking are shown here.
-----------------------------------------------------------

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

If you have already posted a log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Please download OTL from one of the following mirrors:
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the button.
  • Two reports will open, copy and paste them in a reply here:
    • OTListIt.txt <-- Will be opened
    • Extra.txt <-- Will be minimized

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

-------------------------------------------------------------
In the meantime please, do NOT install any new programs or update anything unless told to do so while we are fixing your problem

If you still need help, please include the following in your next reply
  • A detailed description of your problems
  • A new OTL log (don't forget extra.txt)
  • GMER log

Thanks and again sorry for the delay.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#4 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • ONLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:11:31 PM

Posted 15 June 2010 - 06:06 AM

Due to lack of activity this topic is now closed.

If you are the original topic starter and you need this topic reopened, please send me a PM.

Everyone else, please start a new topic.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users