Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Fake Alert and others


  • This topic is locked This topic is locked
19 replies to this topic

#1 David Shepherd

David Shepherd

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 22 July 2010 - 01:19 AM

Scanned and cleaned infected PC with UBCD4Win running Spybot SD, SuperAntiSpyware, MalwareBytes and finally booted to Windows safe mode with network support and ran Trend Micro House Call.
Some of the items detected and removed:
DNSFlush
FraudSecurityMasterAV
Win32.Agent
Win32.delf
Win32.FakeAlert
Zlob.Vcodec
AntiMalwareDoctor
SecurityMasterAV
Rogue.Agent/Gen-Nullo(DLL)

Symptoms persisted such as access denied when saving/closing msconfig to start in limited diagnostic mode.
Internet Explorer would allow access to Google and Microsoft sites, but not the Windows Updates site. Internet Explorer would state cannot connect... When attempting to make changes with msconfig, the error stated something like your administrator has placed policies that prohibit or something like that. Also early on I noticed Internet Explorer redirects or hijacks. That was one of the first symptoms experienced along with fake alerts and security warnings. After cleaning with the tools mentioned, one of the scans (possibly house call) stated the hosts file could not be accessed or access denied. Attempted manual access and edit, access denied. Also note I created a new admin account just to complete these scans to get around any possible issues with the existing accounts. Didn't really help. Back to the hosts file, booted back up with UBCD4Win, edited the hosts file which contained a number of malicious site references. Deleted and copied a good host file from a known working PC same OS.

Next Step was to visit this site and run the processes/logs to post for help.

Step number 8 - GMER Log: I have attempted 3 times to complete the scan. Each time the PC rebooted during the scan and did not allow me to save a log.

The PC now has NO network connection or access, no mouse or usb support when booted in either safe mode with network or normal mode. No access to area like device manager or msconfig etc.
Thank you for any guidance you can provide.
David Shepherd

UPDATE 7/22/2010 9:34PM PST:
Restored access to area such as system restore etc. It was due to registry corruption. Used windows registry tool on UBCD4Win to restore registry to a few days back (furthest available), booted to safe mode, was able to access system restore, restored to earliest available check point. Now functioning but IE still cannot connect to Windows Update, can connect to Google and MSN.

Attempting to run GMER and create log file. System is running disconnected from network. Will post if it completes.
Did not complete - BSOD with STOP: 0x0000007F (0x0000000D,0x00000000,0x00000000,0x0000000).


DDS (Ver_10-03-17.01) - NTFSx86 NETWORK

Run by scan at 21:21:56.73 on Tue 07/20/2010

Internet Explorer: 8.0.6001.18702

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.637 [GMT -7:00]



AV: McAfee VirusScan *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}

FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}



============== Running Processes ===============



C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\system32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe

C:\Program Files\McAfee\MPF\MPFSrv.exe

c:\PROGRA~1\mcafee.com\agent\mcagent.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Internet Explorer\IEXPLORE.EXE

C:\Program Files\Internet Explorer\IEXPLORE.EXE

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Internet Explorer\IEXPLORE.EXE

C:\Program Files\Internet Explorer\IEXPLORE.EXE

C:\Documents and Settings\scan\Desktop\dds.scr



============== Pseudo HJT Report ===============



uStart Page = hxxp://www.dell.com

TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn\yt.dll

TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll

TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll

EB: Real.com: {fe54fa40-d68c-11d2-98fa-00c0f0318afe} - c:\windows\system32\Shdocvw.dll

uRun: [ISUSPM] "c:\program files\common files\installshield\updateservice\isuspm.exe" -scheduler

uRun: [DellSupport] "c:\program files\dellsupport\DSAgnt.exe" /startup

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

mRun: [CorelDRAW Graphics Suite 11b] c:\program files\corel\corel graphics 12\languages\en\programs\Registration.exe /title="CorelDRAW Graphics Suite 12" /date=080410 serial=dr12wrx-0042714-gjf lang=EN

mRun: [WD Button Manager] WDBtnMgr.exe

mRun: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u

mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"

mRun: [SigmatelSysTrayApp] stsystra.exe

mRun: [RoxWatchTray] "c:\program files\common files\roxio shared\10.0\sharedcom\RoxWatchTray10.exe"

mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime

mRun: [MMTray] "c:\program files\musicmatch\musicmatch jukebox\mm_tray.exe"

mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey

mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"

mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start

mRun: [ISUSPM Startup] "c:\program files\common files\installshield\updateservice\isuspm.exe" -startup

mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe

mRun: [EverioService] "c:\program files\cyberlink\pcm4everio\EverioService.exe"

mRun: [ehTray] c:\windows\ehome\ehtray.exe

mRun: [dscactivate] "c:\program files\dell support center\gs_agent\custom\dsca.exe"

mRun: [DMXLauncher] "c:\program files\roxio\cineplayer\DMXLauncher.exe"

mRun: [DLA] c:\windows\system32\dla\DLACTRLW.EXE

mRun: [ATIPTA] "c:\program files\ati technologies\ati control panel\atiptaxx.exe"

mRun: [AppleSyncNotifier] c:\program files\common files\apple\mobile device support\bin\AppleSyncNotifier.exe

mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"

StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe

StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\mcafee~1.lnk - c:\program files\mcafee security scan\2.0.181\SSScheduler.exe

uPolicies-explorer: NoFolderOptions = 30

mPolicies-system: EnableLUA = 0 (0x0)

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\mi1933~1\office11\REFIEBAR.DLL

IE: {B205A35E-1FC4-4CE3-818B-899DBBB3388C} - {552781AF-37E4-4FEE-920A-CED9E648EADD} - c:\program files\common files\microsoft shared\encarta search bar\ENCSBAR.DLL

IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll

IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll

Trusted Zone: musicmatch.com\online

DPF: {01016526-5E80-11D8-9E86-0007E96C65AE} - hxxps://install.charter.com/diskless/bin/ssctlsma.dll

DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} - hxxp://download.microsoft.com/download/e/4/9/e494c802-dd90-4c6b-a074-469358f075a6/OGAControl.cab

DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab

DPF: {3DCEC959-378A-4922-AD7E-FD5C925D927F} - hxxp://disney.go.com/pirates/online/testActiveX/built/signed/DisneyOnlineGames.cab

DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} - hxxp://www.costcophotocenter.com/CostcoActivia.cab

DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} - hxxp://by113fd.bay113.hotmail.msn.com/resources/MsnPUpld.cab

DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab

DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab

DPF: {A1662FB6-39BE-41BB-ACDC-0448FB1B5817} - hxxp://images3.pnimedia.com/ProductAssets/costcous/activex/v3_0_0_5/PhotoCenter_ActiveX_Control.cab

DPF: {CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab

DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab

DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab

DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab

DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab

DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab

DPF: {E77F23EB-E7AB-4502-8F37-247DBAF1A147} - hxxp://gfx1.hotmail.com/mail/w4/pr01/photouploadcontrol/MSNPUpld.cab

Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll

Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll

SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

IFEO: image file execution options - svchost.exe

Hosts: 127.0.0.1 www.spywareinfo.com



============= SERVICES / DRIVERS ===============



S1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2007-8-2 214664]

S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-1-6 135664]

S2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\mcafee\siteadvisor\McSACore.exe [2008-9-30 93320]

S2 McProxy;McAfee Proxy Service;c:\progra~1\common~1\mcafee\mcproxy\mcproxy.exe [2007-8-2 359952]

S2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]

S2 McShield;McAfee Real-time Scanner;c:\progra~1\mcafee\viruss~1\mcshield.exe [2007-8-2 144704]

S2 Norton PC Checkup Application Launcher;Norton PC Checkup Application Launcher;c:\program files\norton pc checkup\norton pc checkup\engine\2.0.2.506\SymcPCCULaunchSvc.exe [2009-12-12 103280]

S2 PCCUJobMgr;Common Client Job Manager Service;c:\program files\norton pc checkup\norton pc checkup\engine\2.0.2.506\ccSvcHst.exe [2009-12-12 126392]

S2 Roxio Upnp Server 10;Roxio Upnp Server 10;c:\program files\roxio\digital home 10\RoxioUpnpService10.exe [2007-8-24 362992]

S2 RoxLiveShare10;LiveShare P2P Server 10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxLiveShare10.exe [2007-8-24 309744]

S2 RoxWatch10;Roxio Hard Drive Watcher 10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxWatch10.exe [2007-8-24 166384]

S2 SessionLauncher;SessionLauncher;c:\docume~1\robert\locals~1\temp\dx9\sessionlauncher.exe --> c:\docume~1\robert\locals~1\temp\dx9\SessionLauncher.exe [?]

S3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\mcafee security scan\2.0.181\McCHSvc.exe [2010-1-15 227232]

S3 McSysmon;McAfee SystemGuards;c:\progra~1\mcafee\viruss~1\mcsysmon.exe [2007-8-2 606736]

S3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2007-8-2 79816]

S3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2007-8-2 35272]

S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2007-8-2 34248]

S3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2007-8-2 40552]

S3 Roxio UPnP Renderer 10;Roxio UPnP Renderer 10;c:\program files\roxio\digital home 10\RoxioUPnPRenderer10.exe [2007-8-24 72176]

S3 RoxMediaDB10;RoxMediaDB10;c:\program files\common files\roxio shared\10.0\sharedcom\RoxMediaDB10.exe [2007-8-24 1083888]



=============== Created Last 30 ================



2010-07-21 04:21:12 0 ----a-w- c:\documents and settings\scan\defogger_reenable

2010-07-20 14:48:30 0 d-----w- C:\Downloads

2010-07-20 08:01:54 0 d-sh--w- c:\documents and settings\scan\IECompatCache

2010-07-20 07:57:07 0 d-----w- c:\docume~1\scan\applic~1\ElevatedDiagnostics

2010-07-20 06:52:38 0 d-----w- c:\docume~1\scan\applic~1\Tific

2010-07-20 06:44:30 0 d-sh--w- c:\documents and settings\scan\PrivacIE

2010-07-20 06:43:58 0 d-----w- c:\docume~1\scan\applic~1\Malwarebytes

2010-07-20 06:20:48 157712 ----a-w- c:\windows\system32\drivers\tmcomm.sys

2010-07-18 05:36:47 0 d-----w- c:\program files\Spybot - Search & Destroy

2010-07-16 04:42:27 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-07-16 04:42:26 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-07-16 04:42:26 0 d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-07-16 04:42:26 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes

2010-07-14 01:32:22 2836 ----a-w- c:\windows\olonaniy.dll

2010-07-13 00:12:00 0 d-sh--w- c:\docume~1\alluse~1\applic~1\SMMQBLAV

2010-07-13 00:11:17 0 d-sh--w- c:\docume~1\alluse~1\applic~1\2d118ff

2010-07-12 21:00:53 120 ----a-w- c:\windows\Upeboledun.dat

2010-07-12 21:00:53 0 ----a-w- c:\windows\Xwabexexexivux.bin

2010-07-12 20:37:59 0 d-----w- C:\spoolerlogs



==================== Find3M ====================



2010-05-05 13:30:57 173056 ----a-w- c:\windows\system32\dllcache\ie4uinit.exe

2010-05-02 05:22:50 1851264 ----a-w- c:\windows\system32\win32k.sys

2010-05-02 05:22:50 1851264 ------w- c:\windows\system32\dllcache\win32k.sys

2008-06-25 04:54:32 88 --sh--r- c:\windows\system32\AD9AA515E9.sys

2008-06-25 04:54:37 3350 --sha-w- c:\windows\system32\KGyGaAvL.sys

2008-12-21 02:41:57 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008122020081221\index.dat



============= FINISH: 21:23:29.39 ===============

Attached Files


Edited by David Shepherd, 22 July 2010 - 11:55 PM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:30 PM

Posted 28 July 2010 - 06:37 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 David Shepherd

David Shepherd
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 02 August 2010 - 10:35 AM

Hello m0le and thanks for the reply.
I'm willing to give it a last shot attempt if you are.

Thank you,
David Shepherd

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:30 PM

Posted 02 August 2010 - 05:48 PM

There's some malware on the log but there may be something hidden which is making this much harder to remove.

Please download MBRCheck to your desktop.

1. Double click MBRCheck.exe to run it (Right click and run as Administrator for Vista).
2. It will open a black window, please do not fix anything (if it gives you an option).
3. Exit that window and it will produce a log (MBRCheck_date_time).
4. Please post that log when you reply.
Posted Image
m0le is a proud member of UNITE

#5 David Shepherd

David Shepherd
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 03 August 2010 - 10:16 AM

Thanks m0le,

MBRCheck log attached.

Thank you,
David Shepherd

Attached Files



#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:30 PM

Posted 03 August 2010 - 06:01 PM

No, that's fine. smile.gif


Please run Rkill

Download and Run RKill

Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

Link 1
Link 2
Link 3
Link 4
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • Please post the resulting log in your next reply.

Then please run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#7 David Shepherd

David Shepherd
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 03 August 2010 - 08:37 PM

Logs attached.
Note that the first time running rkill then ComboFix, the system crashed during ComboFix to a BSOD. Restarted in Safe/network mode, re-ran rkill and ComboFix successfully as shown in the attached logs. Hopefully this procedure was okay.

Thank you,
David Shepherd

Attached Files



#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:30 PM

Posted 04 August 2010 - 04:24 PM

The procedure was okay. Not the best way to run Combofix but hopefully now you should be able to run it in normal mode. Please do so as shown below:

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

QUOTE
File::
c:\windows\Upeboledun.dat
c:\windows\Xwabexexexivux.bin

Folder::
c:\documents and settings\NetworkService\Local Settings\Application Data\hjyedannw
c:\documents and settings\NetworkService\Local Settings\Application Data\monjfpvvk
c:\documents and settings\All Users\Application Data\SMMQBLAV
c:\documents and settings\Andora\Local Settings\Application Data\ijivfuvee


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE

#9 David Shepherd

David Shepherd
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 04 August 2010 - 06:10 PM

ComboFix log attached. thumbup.gif
Thanks again,
David Shepherd

Attached Files



#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:30 PM

Posted 04 August 2010 - 06:16 PM

That's looking a lot healthier. thumbup2.gif
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#11 David Shepherd

David Shepherd
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 04 August 2010 - 11:41 PM

m0le,
Thanks again for the help thumbup2.gif
ESETScan complete and log attached.
Thank you,
David Shepherd

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:30 PM

Posted 05 August 2010 - 08:26 AM

QUOTE
ESETScan complete and log attached.


Er...think you missed the attaching part, David lmfao.gif
Posted Image
m0le is a proud member of UNITE

#13 David Shepherd

David Shepherd
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 05 August 2010 - 11:08 AM

Hate when that happens.
Trying again blink.gif
Thanks,
David

Attached Files



#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:30 PM

Posted 05 August 2010 - 11:11 AM

Not too bad. The top two are the original trojans. You also have ESET picking up the quarantine folder and the Java cache and system restore folders - none of those are a problem at this stage.

How is the PC running now?
Posted Image
m0le is a proud member of UNITE

#15 David Shepherd

David Shepherd
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 05 August 2010 - 11:32 AM

m0le,
Seems to be running pretty well thumbup.gif Thank you.
So what's your diagnosis Doc? Will the patient survive? smile.gif

Thanks,
David




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users