Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

DL from SUN won't stop


  • This topic is locked This topic is locked
52 replies to this topic

#1 Ripcord52

Ripcord52

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 PM

Posted 16 March 2011 - 10:46 AM

Inherited an older PC and have been having 'fun' tweaking it for my own use. JRE was old (version 5) so I tried to update it to v6build24 but ran into problems as neither the on-line or off-line installs would install. That is a problem I may come back to on another topic.
As part of my own efforts to clear up the problem, I un-installed the older version, through the add/remove utility of XP (control panel). I gave up on the problem for a day or two, then noticed a new problem.

I'm on a dial-up connection (yes, there is still a bunch of us out here) and every time I connect, immediately after the ISP connection is fully established something connects to javadl.sun.com.

I use WireShark to view this activity, although I'm not a pro as using that utility, and I see a bit of re-direction to what appears to be a legitimate DL site for java. As you can imagine, this is not intended by myself and pretty much kills my already poor connection rate.

I have gone through regedit and deleted any references to java and sun that seemed to be associated with this behavior. Yes, risky, but I tried to be careful in what was deleted. I've also done this with all my downloaded files, folders, etc. through Explorer.
I've gone through MSCONFIG and TASK MANAGER but did not find anything there suspicious, although I may have missed something.
I tried adding javadl.sun.com as well as http://javadl.sun.com; to the Windows Firewall blockings, to no avail.

On one occasion (there may have been other but I don't load WireShark each time), I noted in WireShark a couple of 'odd' connections taking place: TCP 2593 MNS Mail Notice Service (I don't use MNS mail.) TCP 2595 World Fusion 1 (?)

I use Firefox 3.6.15 exclusively, although some help files open the MSIE browser. I also run NoScript (2.0.9.8), AdBlockPlus (1.3.3), CacheViewer (0.6.3) and Spybot.

I'm stuck and cannot find any help through an on-line search, hence my presence here.

How do I stop this auto-connect and dl attempt?

SysInfo:
OS Version: Microsoft Windows XP Home Edition, Service Pack 3, 32 bit
Processor: Intel® Celeron® D CPU 3.20GHz, x86 Family 15 Model 6 Stepping 4
Processor Count: 1
RAM: 1405 Mb
Graphics Card: ATI RADEON XPRESS 200 Series , 128 Mb
Hard Drives: C: Total - 73994 MB, Free - 59819 MB; D: Total - 4525 MB, Free - 2228 MB; G: Total - 150675 MB, Free - 109597 MB; H: Total - 5636 MB, Free - 936 MB;
Motherboard: Intel Corporation, D101GGC, AAD54032-302, BTGC632017U4
Antivirus: Defender Pro Antivirus, Updated: Yes, On-Demand Scanner: Enabled

HJT log:
Logfile of HijackThis v1.99.1
Scan saved at 12:54:34 PM, on 3/13/2011
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Defender Pro\Defender Pro Update Service\livesrv.exe
C:\Program Files\Defender Pro\Defender Pro\vsserv.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Portrait Displays\Shared\DTSRVC.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Digital Media Reader\readericon45G.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Portrait Displays\Pivot Software\wpctrl.exe
C:\Spybot - Search & Destroy\TeaTimer.exe
C:\WordWeb\wweb32.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\NETGEAR\WG111v3\WG111v3.exe
G:\KeyText\KeyText.exe
C:\Program Files\Portrait Displays\Pivot Software\floater.exe
C:\SolSuite\SolSuite.exe
C:\WINDOWS\notepad.exe
C:\Documents and Settings\Owner\Desktop\firefox\firefox.exe
G:\HiJackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,SearchAssistant = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - (no file)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: (no name) - {9D425283-D487-4337-BAB6-AB8354A81457} - (no file)
O3 - Toolbar: (no name) - {9D425283-D487-4337-BAB6-AB8354A81457} - (no file)
O3 - Toolbar: Defender Pro Toolbar - {381FFDE8-2394-4f90-B10D-FC6124A40F8C} - C:\Program Files\Defender Pro\Defender Pro\IEToolbar.dll
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [readericon] C:\Program Files\Digital Media Reader\readericon45G.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Recguard] %WINDIR%\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [PivotSoftware] "C:\Program Files\Portrait Displays\Pivot Software\wpctrl.exe"
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [WordWeb] "C:\WordWeb\wweb32.exe" -startup
O4 - Startup: KeyText.lnk = G:\KeyText\KeyText.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Global Startup: NETGEAR WG111v3 Smart Wizard.lnk = C:\Program Files\NETGEAR\WG111v3\WG111v3.exe
O8 - Extra context menu item: &Search - ?s=100000334&p=ZCfox000&si=&a=nDHiGqhP5LvH5fuarASU1g&n=2010070514
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {53F6FCCD-9E22-4d71-86EA-6E43136192AB} - (no file)
O9 - Extra button: (no name) - {925DAB62-F9AC-4221-806A-057BFB1014AA} - (no file)
O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [INTERNATIONAL] International
O16 - DPF: {6A060448-60F9-11D5-A6CD-0002B31F7455} (ExentInf Class) -
O17 - HKLM\System\CCS\Services\Tcpip\..\{30F691B6-5F12-4C68-A497-611CE125BB9E}: NameServer = 63.246.206.29 64.80.224.125
O23 - Service: Defender Pro Arrakis Server (Arrakis3) - BitDefender S.R.L. http://www.bitdefender.com - C:\Program Files\Common Files\Defender Pro\Defender Pro Arrakis Server\bin\arrakis3.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Portrait Displays Display Tune Service (DTSRVC) - Unknown owner - C:\Program Files\Common Files\Portrait Displays\Shared\DTSRVC.exe
O23 - Service: Defender Pro Update Service (LIVESRV) - Unknown owner - C:\Program Files\Common Files\Defender Pro\Defender Pro Update Service\livesrv.exe" /service (file missing)
O23 - Service: Defender Pro Virus Shield (VSSERV) - Unknown owner - C:\Program Files\Defender Pro\Defender Pro\vsserv.exe" /service (file missing)

Edited by hamluis, 16 March 2011 - 11:39 AM.
Moved from XP forum to Malware Removal Logs.


BC AdBot (Login to Remove)

 


#2 Casey_boy

Casey_boy

    Bleeping physicist


  • Malware Response Team
  • 7,765 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:UK
  • Local time:02:31 AM

Posted 21 March 2011 - 08:07 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

Please take note:

  • If you have since resolved the original problem you were having, we would appreciate you letting us know.
  • If you are unable to create a log because your computer cannot start up successfully please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • If you are unable to perform the steps we have recommended please try one more time and if unsuccessful alert us of such and we will design an alternate means of obtaining the necessary information.
  • If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • Upon completing the steps below another staff member will review your topic an do their best to resolve your issues.
  • If you have already posted a DDS log, please do so again, as your situation may have changed.
  • Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


Thanks and again sorry for the delay.

Casey

If I have been helping you and I do not reply within 48hours, feel free to send me a PM.


* My Website * Am I Infected? * Malware Removal Help * If you'd like to say thanks *


#3 Ripcord52

Ripcord52
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 PM

Posted 25 March 2011 - 10:31 AM

More problems and getting worse. 'Net keeps dropping me after only a few seconds or minutes.
PC has slowed to a crawl. CPU usage frequently up to 100%.
Bit Defender Pro in combination with SpyBot, seems to be the major problem currently, but what caused this to happen is not clear to me.
Did find Adware and was able to remove that fairly easily. Errant connections to rogue web sites seems to have ended but I'm not sure as other problems still continue.

As I'm able to, I will follow advise given thus far.
Note: Tried to run GMER anti-rootkit Scanner, but that froze the PC.
Was able to use RootkitBuster 3.60, which found nothing.
Communication with this forum will be 'as possible' from only this PC, which is going to be 'iffy' at best, sorry.


DDS results:

DDS (Ver_11-03-05.01) - NTFSx86
Run by Owner at 11:19:40.98 on Fri 03/25/2011
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1406.847 [GMT -4:00]
.
AV: Defender Pro Antivirus *Enabled/Outdated* {6C4BB89C-B0ED-4F41-A29C-4373888923BB}
FW: Defender Pro Firewall *Enabled*
.
============== Running Processes ===============
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Common Files\Defender Pro\Defender Pro Update Service\livesrv.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Common Files\Portrait Displays\Shared\DTSRVC.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Defender Pro\Defender Pro\vsserv.exe
C:\Program Files\Digital Media Reader\readericon45G.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Portrait Displays\Pivot Software\wpctrl.exe
C:\Program Files\Defender Pro\Defender Pro\bdagent.exe
C:\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Portrait Displays\Pivot Software\floater.exe
C:\Program Files\NETGEAR\WG111v3\WG111v3.exe
G:\KeyText\KeyText.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\taskmgr.exe
C:\SolSuite\SolSuite.exe
C:\Wireshark\wireshark.exe
C:\Wireshark\dumpcap.exe
C:\Documents and Settings\Owner\Desktop\firefox\firefox.exe
C:\WINDOWS\notepad.exe
C:\Download\dds.scr
.
============== Pseudo HJT Report ===============
.
uSearch Bar = about:blank
uLocal Page = about:blank
uStart Page = about:blank
uSearch Page = about:blank
mSearch Page = about:blank
mLocal Page = about:blank
mStart Page = about:blank
mSearchAssistant = about:blank
mCustomizeSearch = about:blank
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\spybot~1\SDHelper.dll
TB: Defender Pro Toolbar: {381ffde8-2394-4f90-b10d-fc6124a40f8c} - c:\program files\defender pro\defender pro\IEToolbar.dll
TB: {472734EA-242A-422B-ADF8-83D1E48CC825} - No File
TB: {9D425283-D487-4337-BAB6-AB8354A81457} - No File
TB: {4B3803EA-5230-4DC3-A7FC-33638F3D3542} - No File
TB: {D7E97865-918F-41E4-9CD0-25AB1C574CE8} - No File
uRun: [SpybotSD TeaTimer] c:\spybot - search & destroy\TeaTimer.exe
mRun: [readericon] c:\program files\digital media reader\readericon45G.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Recguard] %WINDIR%\SMINST\RECGUARD.EXE
mRun: [PivotSoftware] "c:\program files\portrait displays\pivot software\wpctrl.exe"
mRun: [DPAgent] "c:\program files\defender pro\defender pro\bdagent.exe"
mRun: [Defender Pro Antiphishing Helper] "c:\program files\defender pro\defender pro\IEShow.exe"
dRun: [Power2GoExpress] NA
StartupFolder: c:\docume~1\owner\startm~1\programs\startup\keytext.lnk - g:\keytext\KeyText.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\netgea~1.lnk - c:\program files\netgear\wg111v3\WG111v3.exe
IE: &Search - ?s=100000334&p=ZCfox000&si=&a=nDHiGqhP5LvH5fuarASU1g&n=2010070514
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\spybot~1\SDHelper.dll
Notify: AtiExtEvent - Ati2evxx.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\docume~1\owner\applic~1\mozilla\firefox\profiles\rdc52tio.default\
FF - prefs.js: browser.search.selectedEngine - Search
FF - prefs.js: browser.startup.homepage - about:blank
FF - prefs.js: keyword.URL - hxxp://www.google.com/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q=
FF - prefs.js: network.proxy.type - 0
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\np_gp.dll
FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\documents and settings\owner\desktop\firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: SQLite Manager: SQLiteManager@mrinalkant.blogspot.com - %profile%\extensions\SQLiteManager@mrinalkant.blogspot.com
FF - Ext: CacheViewer: {71328583-3CA7-4809-B4BA-570A85818FBB} - %profile%\extensions\{71328583-3CA7-4809-B4BA-570A85818FBB}
FF - Ext: NoScript: {73a6fe31-595d-460b-a920-fcc0f8843232} - %profile%\extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}
FF - Ext: Adblock Plus: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} - %profile%\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
.
---- FIREFOX POLICIES ----
.
FF - user.js: browser.search.selectedEngine - Search
FF - user.js: keyword.URL - hxxp://www.google.com/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q=
.
============= SERVICES / DRIVERS ===============
.
R2 BDVEDISK;BDVEDISK;c:\program files\defender pro\defender pro\bdvedisk.sys [2009-4-1 82696]
R2 EAPPkt;Realtek EAPPkt Protocol;c:\windows\system32\drivers\EAPPkt.sys [2007-10-9 38144]
R3 bdfm;BDFM;c:\windows\system32\drivers\bdfm.sys [2009-6-29 152328]
R3 bdfndisf;BitDefender Firewall NDIS Filter Service;c:\windows\system32\drivers\bdfndisf.sys [2009-7-9 110472]
R3 npf;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2010-1-26 50704]
S3 Arrakis3;Defender Pro Arrakis Server;c:\program files\common files\defender pro\defender pro arrakis server\bin\arrakis3.exe [2009-6-25 176128]
S3 cpuz132;cpuz132;\??\c:\docume~1\owner\locals~1\temp\cpuz132\cpuz132_x32.sys --> c:\docume~1\owner\locals~1\temp\cpuz132\cpuz132_x32.sys [?]
S3 RTL8187B;NETGEAR WG111v3 Wireless-G USB Adapter Vista Driver;c:\windows\system32\drivers\wg111v3.sys [2009-7-31 341504]
.
=============== Created Last 30 ================
.
2011-03-23 16:17:08 -------- d-sha-w- c:\windows\Repair
2011-03-23 16:13:25 -------- d-----w- c:\windows\system32\NtmsData
2011-03-16 16:03:46 190032 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2011-03-11 20:05:03 -------- d-----w- c:\windows\system32\lib
2011-03-11 20:05:00 -------- d-----w- c:\windows\system32\bin
2011-03-08 20:00:44 2855 ----a-w- c:\windows\system32\command.PIF
2011-03-02 02:27:15 -------- d-----w- c:\program files\MSECache
2011-03-02 02:18:01 -------- d-----w- c:\docume~1\owner\applic~1\OpenOffice.org
2011-03-02 02:15:39 -------- d-----w- c:\program files\OpenOffice.org 3
.
==================== Find3M ====================
.
2011-02-09 16:04:57 29696 ----a-w- c:\windows\mickey32.dll
2011-02-09 16:04:57 232784 ----a-w- c:\windows\Matrix Code.scr
2011-02-09 16:04:57 2285222 ----a-w- c:\windows\Matrix Code.exe
2011-01-11 01:10:49 62009 ----a-w- c:\windows\system32\wpfb_ati2dvag.dll
.
============= FINISH: 11:21:43.09 ===============

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:31 PM

Posted 25 March 2011 - 03:11 PM

Hello

My name is gringo and I will be Helping you from this point forward

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • Please Do not Attach logs or put in code boxes unless I tell you so.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.

If you have not done so please Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Here is the first thing I would like you to do.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

:Run JavaRa

  • Please download JavaRa and unzip it to your desktop.
  • Double-click on JavaRa.exe to start the program.
  • From the drop-down menu, choose English and click on Select.
  • JavaRa will open; click on Remove Older Versions to remove the older versions of Java installed on your computer.
  • Click Yes when prompted. When JavaRa is done, a notice will appear that a logfile has been produced. Click OK.
  • A logfile will pop up. Please save it to a convenient location.



Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 Ripcord52

Ripcord52
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 PM

Posted 25 March 2011 - 11:14 PM

Thanks Gringo, I'll do my best to keep up, time-wise, but even grabbing ComboFix has taken 2 hours and about 20 re-dial attempts to get it all. JavaRa is now saved, after only 2 re-dials! I'll get busy with these and your instructions and get back to you asap, hopefully within 48 hrs.

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:31 PM

Posted 26 March 2011 - 02:31 AM

Hello

I know it will be slow



Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 Ripcord52

Ripcord52
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 PM

Posted 26 March 2011 - 01:00 PM

(The next morning, after shutting down PC, then spending a few hours doing things with it...)

Exited SpyBot Search and Destroy. Tried to close/disable Bit Defender Pro, as per the linked instructions, but those were for a different version. I'm running
'Defender Pro 15-in-1 Build 13.0.14.272. In Expert mode, I disabled all modules and crossed my fingers.

JavaRa found yet two more entries, jre 1.6.0_18 and jre 1.6.0_20, which it removed. Oddly, these were found in C:\Documents and
Settings\Owner\Application Data\Sun\Java\, an area I'd already looked in before several times. I wonder how they got back in there again.

Ran ComboFix, which did not find the Windows Recovery Module. It wanted to go on-line to install it but I couldn't get a connection at that time.
Finished running ComboFix, which went through its paces with no apparent hitch. (Log posted below) While CF was running, Bit Defender window opened
3 times, but did not 'complain' about anything. Odd. I closed the window each time and ComboFix continued to run.

Looked for Windows Recovery Module in the recovery partition (D:\) but didn't spot it. If I can get a decent connection on-line, I'll try to d/l it then.
Good grief, too used to my other PC (which is dead). Found several things to get rid of in Windows Components.
Going to un-install MSN Explorer, Outlook Express and Windows Messenger, although the later two are showing 0.0MB at the moment.

REBOOT: (hard kill)

Still a very slow boot-up and loading applications (e.g. Paint Shop Pro) is still slow but a bit better than before.
Firefox browser used to load up in about 5 seconds, now closer to 30.

Spybot had numerous alerts, which I allowed/denied as below:

On re-boot after first ComboFix attempt.
***
Category: System Startup user entry
Change: Value added
Entry: NoDriveAutoRun
New data: 67108863
Change denied.
***
Category: System Startup user entry
Change: Value added
Entry: NoDrives
New data: 0
Change denied.
***
Category: User-specific browser toolbar
Change: Value deleted
Entry: {9D425283-D487-4337-BAB6-AB8354A81457}
Old data: hex:83,52,42,9D,87,Dr,37,43,BA,B6,AB,83,54,A8,14,57,00,09,00,00

That registry entry turns out to be:
SearchToolbarLib.CSearchToolbarImpl.1 (Cool Search? damn)

Change allowed.
***
Category: Browser page
Change: Value changed
Entry: Search Page
Old data: about:blank
New Data: http://www.microsoft.com'isapi/redir.dll?prd=iear=iesearch
Change denied.
***
Category: Browser page
Change: Value deleted
Entry: Search Bar
Old data: about:Blank
Change denied.
***
Category: Browser page
Change: Value changed
Entry: Search Page
Old data: about:blank
New Data: http://go.microsoft.com/fwlink/?LinkId=54896
Change denied.
***
Category: Browser page
Change: Value changed
Entry: Default_Page_URL
Old data: about:blank
New Data: http://go.microsoft.com/fwlink/?LinkId=69157
Change denied.
***
Category: Browser page
Change: Value added
Entry: Default_Page_URL
New Data: http://go.microsoft.com/fwlink/?LinkId=54896
Change denied.
***
Catergory: Browser page
Change: Value changed
Entry: SearchAssistant
Old data: about:blank
New data: http://ie.search.msn.com/{SUB-RC1766}/srchasst/srchasst.htm
Change denied.
***
Catergory: Browser page
Change: Value changed
Entry: CustomizeSearch
Old data: about:blank
New data: http://ie.search.msn.com/{SUB-RC1766}/srchasst/srchcust.htm
Change denied.
***
Category: Command processor
Change: Value deleted
Entry: AutoRun
Change allowed.
***
Category: NT startup
Change: Value deleted
Entry: load
Change allowed.
***
Category: Disable Registrytool
Change: Value added
Entry: DisableRegistryTools
New data: 0
Change allowed.
***
Category: Firewall Authorized Applications
Change: Value deleted
Entry: C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
Old data: C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe:*:Enabled:Yahoo! Messenger
New data:
Change denied
***

ComboFix Log:

ComboFix 11-03-25.01 - Owner 03/26/2011 9:49.1.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1406.1010 [GMT -4:00]
Running from: c:\documents and settings\Owner\Desktop\ComboFix.exe
AV: Defender Pro Antivirus *Disabled/Outdated* {6C4BB89C-B0ED-4F41-A29C-4373888923BB}
FW: Defender Pro Firewall *Disabled* {4055920F-2E99-48A8-A270-4243D2B8F242}
.
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\bin
c:\windows\system32\bin\client\jvm.dll
c:\windows\system32\bin\client\Xusage.txt
c:\windows\system32\bin\cmm.dll
c:\windows\system32\bin\msvcr71.dll
c:\windows\system32\bin\msvcrt.dll
c:\windows\system32\bin\new_plugin\npjp2.dll
c:\windows\system32\bin\Questionable\awt.dll
c:\windows\system32\bin\Questionable\axbridge.dll
c:\windows\system32\bin\Questionable\dcpr.dll
c:\windows\system32\bin\Questionable\deploy.dll
c:\windows\system32\bin\Questionable\deployJava1.dll
c:\windows\system32\bin\Questionable\dt_shmem.dll
c:\windows\system32\bin\Questionable\dt_socket.dll
c:\windows\system32\bin\Questionable\eula.dll
c:\windows\system32\bin\Questionable\fontmanager.dll
c:\windows\system32\bin\Questionable\hpi.dll
c:\windows\system32\bin\Questionable\hprof.dll
c:\windows\system32\bin\Questionable\instrument.dll
c:\windows\system32\bin\Questionable\ioser12.dll
c:\windows\system32\bin\Questionable\j2pcsc.dll
c:\windows\system32\bin\Questionable\j2pkcs11.dll
c:\windows\system32\bin\Questionable\jaas_nt.dll
c:\windows\system32\bin\Questionable\java-rmi.exe
c:\windows\system32\bin\Questionable\java.dll
c:\windows\system32\bin\Questionable\java.exe
c:\windows\system32\bin\Questionable\java_crw_demo.dll
c:\windows\system32\bin\Questionable\javacpl.cpl
c:\windows\system32\bin\Questionable\javacpl.exe
c:\windows\system32\bin\Questionable\javaw.exe
c:\windows\system32\bin\Questionable\javaws.exe
c:\windows\system32\bin\Questionable\jawt.dll
c:\windows\system32\bin\Questionable\jbroker.exe
c:\windows\system32\bin\Questionable\JdbcOdbc.dll
c:\windows\system32\bin\Questionable\jdwp.dll
c:\windows\system32\bin\Questionable\jkernel.dll
c:\windows\system32\bin\Questionable\jli.dll
c:\windows\system32\bin\Questionable\jp2iexp.dll
c:\windows\system32\bin\Questionable\jp2launcher.exe
c:\windows\system32\bin\Questionable\jp2native.dll
c:\windows\system32\bin\Questionable\jp2ssv.dll
c:\windows\system32\bin\Questionable\jpeg.dll
c:\windows\system32\bin\Questionable\jpicom.dll
c:\windows\system32\bin\Questionable\jpiexp.dll
c:\windows\system32\bin\Questionable\jpinscp.dll
c:\windows\system32\bin\Questionable\jpioji.dll
c:\windows\system32\bin\Questionable\jpishare.dll
c:\windows\system32\bin\Questionable\jqs.exe
c:\windows\system32\bin\Questionable\jqsnotify.exe
c:\windows\system32\bin\Questionable\jsound.dll
c:\windows\system32\bin\Questionable\jsoundds.dll
c:\windows\system32\bin\Questionable\keytool.exe
c:\windows\system32\bin\Questionable\kinit.exe
c:\windows\system32\bin\Questionable\klist.exe
c:\windows\system32\bin\Questionable\ktab.exe
c:\windows\system32\bin\Questionable\management.dll
c:\windows\system32\bin\Questionable\mlib_image.dll
c:\windows\system32\bin\Questionable\net.dll
c:\windows\system32\bin\Questionable\nio.dll
c:\windows\system32\bin\Questionable\npdeployJava1.dll
c:\windows\system32\bin\Questionable\npjpi160_24.dll
c:\windows\system32\bin\Questionable\npoji610.dll
c:\windows\system32\bin\Questionable\npt.dll
c:\windows\system32\bin\Questionable\orbd.exe
c:\windows\system32\bin\Questionable\pack200.exe
c:\windows\system32\bin\Questionable\policytool.exe
c:\windows\system32\bin\Questionable\rmi.dll
c:\windows\system32\bin\Questionable\rmid.exe
c:\windows\system32\bin\Questionable\rmiregistry.exe
c:\windows\system32\bin\Questionable\servertool.exe
c:\windows\system32\bin\Questionable\splashscreen.dll
c:\windows\system32\bin\Questionable\ssv.dll
c:\windows\system32\bin\Questionable\ssvagent.exe
c:\windows\system32\bin\Questionable\sunmscapi.dll
c:\windows\system32\bin\Questionable\tnameserv.exe
c:\windows\system32\bin\Questionable\unpack.dll
c:\windows\system32\bin\Questionable\unpack200.exe
c:\windows\system32\bin\Questionable\verify.dll
c:\windows\system32\bin\Questionable\w2k_lsa_auth.dll
c:\windows\system32\bin\Questionable\wsdetect.dll
c:\windows\system32\bin\Questionable\zip.dll
c:\windows\system32\bin\unicows.dll
c:\windows\system32\command.pif
.
.
((((((((((((((((((((((((( Files Created from 2011-02-26 to 2011-03-26 )))))))))))))))))))))))))))))))
.
.
2011-03-23 16:17 . 2011-03-23 16:17 -------- d-sha-w- c:\windows\Repair
2011-03-23 16:13 . 2011-03-23 16:29 -------- d-----w- c:\windows\system32\NtmsData
2011-03-16 16:03 . 2011-03-16 16:03 190032 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2011-03-11 20:39 . 2011-03-11 20:40 -------- d-----w- c:\documents and settings\Administrator
2011-03-11 20:05 . 2011-03-11 20:05 -------- d-----w- c:\windows\system32\lib
2011-03-11 18:15 . 2011-03-11 18:15 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2011-03-02 02:27 . 2011-03-02 02:27 -------- d-----w- c:\program files\MSECache
2011-03-02 02:18 . 2011-03-02 02:18 -------- d-----w- c:\documents and settings\Owner\Application Data\OpenOffice.org
2011-03-02 02:15 . 2011-03-02 02:15 -------- d-----w- c:\program files\OpenOffice.org 3
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-02-09 16:04 . 2011-02-01 03:57 29696 ----a-w- c:\windows\mickey32.dll
2011-02-09 16:04 . 2011-02-01 03:57 2285222 ----a-w- c:\windows\Matrix Code.exe
2011-02-09 16:04 . 2011-02-01 03:57 232784 ----a-w- c:\windows\Matrix Code.scr
2011-01-11 01:10 . 2011-01-11 01:10 62009 ----a-w- c:\windows\system32\wpfb_ati2dvag.dll
2011-01-09 02:14 . 2011-01-09 02:14 65536 ----a-r- c:\documents and settings\Owner\Application

Data\Microsoft\Installer\{E89D78B8-28F7-412F-8B26-C684739CBBDC}\PalmDesktopShortcut.exe
2011-01-09 02:14 . 2011-01-09 02:14 65536 ----a-r- c:\documents and settings\Owner\Application

Data\Microsoft\Installer\{E89D78B8-28F7-412F-8B26-C684739CBBDC}\ARPPRODUCTICON.exe
2010-10-09 12:27 . 2010-10-09 01:25 47104 ----a-w- c:\program files\mozilla firefox\components\FFComm.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\spybot - search & destroy\TeaTimer.exe" [2009-01-26 2144088]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"readericon"="c:\program files\Digital Media Reader\readericon45G.exe" [2005-12-10 139264]
"RTHDCPL"="RTHDCPL.EXE" [2006-04-05 16120832]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2002-09-14 212992]
"PivotSoftware"="c:\program files\Portrait Displays\Pivot Software\wpctrl.exe" [2007-02-09 694008]
"DPAgent"="c:\program files\Defender Pro\Defender Pro\bdagent.exe" [2009-07-22 1103872]
"Defender Pro Antiphishing Helper"="c:\program files\Defender Pro\Defender Pro\IEShow.exe" [2009-07-21 69120]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Power2GoExpress"="NA" [X]
.
c:\documents and settings\Owner\Start Menu\Programs\Startup\
KeyText.lnk - g:\keytext\KeyText.exe [2004-9-28 409600]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
NETGEAR WG111v3 Smart Wizard.lnk - c:\program files\NETGEAR\WG111v3\WG111v3.exe [2009-12-23 2330624]
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^Owner^Start Menu^Programs^Startup^ZMatrix.lnk]
path=c:\documents and settings\Owner\Start Menu\Programs\Startup\ZMatrix.lnk
backup=c:\windows\pss\ZMatrix.lnkStartup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Alcmtr]
2005-05-04 02:43 69632 ----a-w- c:\windows\Alcmtr.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Defender Pro Antiphishing Helper]
2009-07-21 20:22 69120 ----a-w- c:\program files\Defender Pro\Defender Pro\ieshow.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DT HPW]
2008-07-14 18:42 81920 ----a-w- c:\program files\Common Files\Portrait Displays\Shared\DT_Startup.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Reminder]
2005-02-26 01:24 966656 ------w- c:\windows\creator\Remind_XP.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]
2009-01-26 20:31 2144088 --sha-r- c:\spybot - search & destroy\TeaTimer.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WordWeb]
2009-11-09 05:18 65216 ------w- c:\wordweb\wweb32.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"YahooAUService"=2 (0x2)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Defender Pro\\Defender Pro\\DpReg.exe"=
"c:\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Yahoo!\\Messenger\\YServer.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
.
R2 BDVEDISK;BDVEDISK;c:\program files\Defender Pro\Defender Pro\bdvedisk.sys [4/1/2009 11:25 AM 82696]
R2 EAPPkt;Realtek EAPPkt Protocol;c:\windows\system32\drivers\EAPPkt.sys [10/9/2007 1:13 PM 38144]
R3 bdfm;BDFM;c:\windows\system32\drivers\bdfm.sys [6/29/2009 2:12 PM 152328]
R3 bdfndisf;BitDefender Firewall NDIS Filter Service;c:\windows\system32\drivers\bdfndisf.sys [7/9/2009 9:49 AM 110472]
S3 Arrakis3;Defender Pro Arrakis Server;c:\program files\Common Files\Defender Pro\Defender Pro Arrakis Server\bin\arrakis3.exe [6/25/2009 4:04 PM

176128]
S3 npf;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [1/26/2010 10:09 PM 50704]
S3 RTL8187B;NETGEAR WG111v3 Wireless-G USB Adapter Vista Driver;c:\windows\system32\drivers\wg111v3.sys [7/31/2009 3:12 PM 341504]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
bdx REG_MULTI_SZ scan
.
.
------- Supplementary Scan -------
.
uLocal Page = about:blank
uStart Page = about:blank
mLocal Page = about:blank
mStart Page = about:blank
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\Owner\Application Data\Mozilla\Firefox\Profiles\rdc52tio.default\
FF - prefs.js: browser.startup.homepage - about:blank
FF - prefs.js: keyword.URL - hxxp://www.google.com/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q=
FF - prefs.js: network.proxy.type - 0
FF - user.js: keyword.URL - hxxp://www.google.com/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q=
.
- - - - ORPHANS REMOVED - - - -
.
MSConfigStartUp-DW6 - c:\program files\The Weather Channel FW\Desktop\DesktopWeather.exe
MSConfigStartUp-Messenger (Yahoo!) - c:\progra~1\Yahoo!\Messenger\YahooMessenger.exe
MSConfigStartUp-QuickTime Task - c:\program files\QuickTime\qttask.exe
MSConfigStartUp-Weather - c:\program files\AWS\WeatherBug\Weather.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-03-26 10:00
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3908368350-3080709795-2641152995-1003\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\ACPI\PNP0F13\4&29c049b9&0\LogConf]
@DACL=(02 0000)
"BasicConfigVector"=hex(a):48,00,00,00,0f,00,00,00,00,00,00,00,00,00,00,00,00,
00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,01,00,01,00,01,00,00,00,00,02,\
"BootConfig"=hex(8):01,00,00,00,0f,00,00,00,00,00,00,00,01,00,01,00,01,00,00,
00,02,01,01,00,0c,00,00,00,0c,00,00,00,ff,ff,ff,ff
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Enum\HID\Vid_046d&Pid_c045\6&2425b5f&0&0000\LogConf]
@DACL=(02 0000)
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(904)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2011-03-26 10:05:52
ComboFix-quarantined-files.txt 2011-03-26 14:05
ComboFix2.txt 2009-04-20 01:43
ComboFix3.txt 2009-04-18 17:01
.
Pre-Run: 62,750,773,248 bytes free
Post-Run: 62,806,241,280 bytes free
.
- - End Of File - - A73964E4EC981C6C17ECD87E5C2F80D9

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:31 PM

Posted 26 March 2011 - 03:34 PM

Hello

I would ike to see a report that combofix makes.

extra combofix report

  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box
C:\Qoobox\Add-Remove Programs.txt
  • click ok

copy and paste the report into this topic for me to review

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 Ripcord52

Ripcord52
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 PM

Posted 26 March 2011 - 10:35 PM

Normally Windows takes less than a minute to load up, these days it is taking closer to 10 minutes.
This includes that time between the desktop being fully available and the time that the CPU usage drops below 100%.
Elements of Bit Defender Pro are very 'memory heavy', notably the "TeaTimer" process. I cannot say if this behavior is much different than before my troubles began as I didn't pay that much attention to it then.

Extra ComboFix Report:

ACDSee
Adobe Flash Player 10 ActiveX
Adobe Flash Player 10 Plugin
Adobe Reader 7.0
Adobe Shockwave Player 11.5
ATI Display Driver
Compatibility Pack for the 2007 Office system
Defender Pro 15-in-1
Digital Media Reader
DVD Solution
GOM Player
High Definition Audio Driver Package - KB888111
HijackThis 1.99.1
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
Hotfix for Windows XP (KB2158563)
Hotfix for Windows XP (KB952287)
Hotfix for Windows XP (KB954550-v5)
Hotfix for Windows XP (KB961118)
Hotfix for Windows XP (KB979306)
Hotfix for Windows XP (KB981793)
HP My Display
Jewel Quest (remove only)
Malwarebytes' Anti-Malware
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft .NET Framework 3.5 SP1
Microsoft Office 2000 Small Business
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
Mozilla Firefox (3.6.15)
NETGEAR WG111v3 wireless USB 2.0 adapter
OpenOffice.org 3.3
Palm Desktop
Pivot Software
REALTEK GbE & FE Ethernet PCI NIC Driver
Realtek High Definition Audio Driver
Recovery Software Suite eMachines
Rhinoceros 2.0
SDK
Security Update for CAPICOM (KB931906)
Security Update for Microsoft .NET Framework 3.5 SP1 (KB2416473)
Security Update for Step By Step Interactive Training (KB898458)
Security Update for Windows Internet Explorer 8 (KB2183461)
Security Update for Windows Internet Explorer 8 (KB2360131)
Security Update for Windows Internet Explorer 8 (KB971961)
Security Update for Windows Internet Explorer 8 (KB978207)
Security Update for Windows Internet Explorer 8 (KB981332)
Security Update for Windows Internet Explorer 8 (KB982381)
Security Update for Windows Media Player (KB2378111)
Security Update for Windows Media Player (KB911564)
Security Update for Windows Media Player (KB952069)
Security Update for Windows Media Player (KB954155)
Security Update for Windows Media Player (KB968816)
Security Update for Windows Media Player (KB973540)
Security Update for Windows Media Player (KB975558)
Security Update for Windows Media Player (KB978695)
Security Update for Windows Media Player 10 (KB911565)
Security Update for Windows XP (KB2079403)
Security Update for Windows XP (KB2115168)
Security Update for Windows XP (KB2121546)
Security Update for Windows XP (KB2160329)
Security Update for Windows XP (KB2259922)
Security Update for Windows XP (KB2279986)
Security Update for Windows XP (KB2286198)
Security Update for Windows XP (KB2296011)
Security Update for Windows XP (KB2347290)
Security Update for Windows XP (KB2360937)
Security Update for Windows XP (KB2387149)
Security Update for Windows XP (KB923561)
Security Update for Windows XP (KB941569)
Security Update for Windows XP (KB946648)
Security Update for Windows XP (KB950760)
Security Update for Windows XP (KB950762)
Security Update for Windows XP (KB950974)
Security Update for Windows XP (KB951066)
Security Update for Windows XP (KB951376-v2)
Security Update for Windows XP (KB951748)
Security Update for Windows XP (KB952004)
Security Update for Windows XP (KB952954)
Security Update for Windows XP (KB955069)
Security Update for Windows XP (KB956572)
Security Update for Windows XP (KB956744)
Security Update for Windows XP (KB956802)
Security Update for Windows XP (KB956803)
Security Update for Windows XP (KB956844)
Security Update for Windows XP (KB958644)
Security Update for Windows XP (KB958869)
Security Update for Windows XP (KB959426)
Security Update for Windows XP (KB960225)
Security Update for Windows XP (KB960803)
Security Update for Windows XP (KB960859)
Security Update for Windows XP (KB961501)
Security Update for Windows XP (KB969059)
Security Update for Windows XP (KB969947)
Security Update for Windows XP (KB970238)
Security Update for Windows XP (KB970430)
Security Update for Windows XP (KB971468)
Security Update for Windows XP (KB971657)
Security Update for Windows XP (KB972270)
Security Update for Windows XP (KB973354)
Security Update for Windows XP (KB973507)
Security Update for Windows XP (KB973869)
Security Update for Windows XP (KB973904)
Security Update for Windows XP (KB974112)
Security Update for Windows XP (KB974318)
Security Update for Windows XP (KB974392)
Security Update for Windows XP (KB974571)
Security Update for Windows XP (KB975025)
Security Update for Windows XP (KB975467)
Security Update for Windows XP (KB975560)
Security Update for Windows XP (KB975561)
Security Update for Windows XP (KB975562)
Security Update for Windows XP (KB975713)
Security Update for Windows XP (KB977165-v2)
Security Update for Windows XP (KB977816)
Security Update for Windows XP (KB977914)
Security Update for Windows XP (KB978037)
Security Update for Windows XP (KB978251)
Security Update for Windows XP (KB978262)
Security Update for Windows XP (KB978338)
Security Update for Windows XP (KB978542)
Security Update for Windows XP (KB978601)
Security Update for Windows XP (KB978706)
Security Update for Windows XP (KB979309)
Security Update for Windows XP (KB979482)
Security Update for Windows XP (KB979559)
Security Update for Windows XP (KB979683)
Security Update for Windows XP (KB979687)
Security Update for Windows XP (KB980195)
Security Update for Windows XP (KB980218)
Security Update for Windows XP (KB980232)
Security Update for Windows XP (KB980436)
Security Update for Windows XP (KB981322)
Security Update for Windows XP (KB981852)
Security Update for Windows XP (KB981957)
Security Update for Windows XP (KB981997)
Security Update for Windows XP (KB982132)
Security Update for Windows XP (KB982214)
Security Update for Windows XP (KB982665)
Security Update for Windows XP (KB982802)
Soft Data Fax Modem with SmartCP
SolSuite
Spybot - Search & Destroy
Spybot - Search & Destroy 1.3
Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
Update for Windows Internet Explorer 8 (KB976662)
Update for Windows Internet Explorer 8 (KB980182)
Update for Windows Internet Explorer 8 (KB980302)
Update for Windows XP (KB2141007)
Update for Windows XP (KB2345886)
Update for Windows XP (KB951978)
Update for Windows XP (KB955759)
Update for Windows XP (KB967715)
Update for Windows XP (KB968389)
Update for Windows XP (KB971737)
Update for Windows XP (KB973687)
Update for Windows XP (KB973815)
Update for Windows XP (KB978207)
Viewpoint Media Player
WebFldrs XP
Windows Backup Utility
Windows Genuine Advantage Validation Tool
Windows Internet Explorer 8
Windows Media Format Runtime
Windows Media Player 10
Windows XP Service Pack 3
WinPcap 4.1.1
Wireshark 1.0.7
WordWeb
XviD-1.0-Beta3 Video Codec 26122003 (Koepi's developer build)
Yahoo! Messenger
ZMatrix 1.5.2

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:31 PM

Posted 27 March 2011 - 12:46 AM

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

1. click on start
2. then go to settings
3. after that you need control panel
4. look for the icon add/remove programs
click on the following programs

Adobe Reader 7.0

and click on remove

Update Adobe Reader

Recently there have been vunerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

You can download it from http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions.
If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

Note: When installing FoxitReader, be carefull not to install anything to do with AskBar.
[/list]
TFC(Temp File Cleaner):

  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :

  • I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
  • If you accidently close it, the log file is saved here and will be named like this:
  • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 Ripcord52

Ripcord52
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 PM

Posted 27 March 2011 - 09:32 AM

Adobe Reader 7 deleted.
I have both Foxit and OpenOffice, so the loss of Adobe Reader is not an issue. (So why did I still have it, habit?)

I've not been able to update Malwarebytes' since April of last year, kept getting a check-sum error or lost the connection. I did try again today though and voila!, got it updated in one attempt! (You must be a good influence.)

HJT (1.99.01) had never found updates before, turns out the update site was no longer valid.
Have the latest version now, through your link, and will install.

INFO: 7 minutes to boot the PC this morning, at 100% CPU usage, then 1 more minute at 30% usage.
Started WireShark, as a quick test, and that took 30 seconds at 100% CPU usage. After that, it loaded very quickly, which wasn't a surprise.

Get back to you after I get your latest instructions carried out, the cats fed and medicated, the grandsons fed, the wife tended to, etc.
Life continues...

Thank you, Gringo.

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:31 PM

Posted 27 March 2011 - 11:04 AM

:thumbup2:
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 Ripcord52

Ripcord52
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 PM

Posted 27 March 2011 - 06:21 PM

Adobe Reader 7 deleted.
Foxit Reader already installed sometime ago, without the AskBar. That program resides on my G:\ drive. When my old PC 'died' I took the HD and put it into this PC as a Slave. It is still partioned, as by OEM.
The current C:\ is also OEM partioned. Of the software that will run from the old HD and that I want access to regulary, I've made shortcuts to. Most of the data files I develope also continue to reside on the old HD.
Old HD = 150 MB, current C:\ = 80 MB.

TFC ran without a problem, reboot required and allowed.

MBAM updated (6182) and run with no problems.

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 6182

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

3/27/2011 12:30:22 PM
mbam-log-2011-03-27 (12-30-22).txt

Scan type: Quick scan
Objects scanned: 171927
Time elapsed: 18 minute(s), 11 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


HJT log:

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 12:42:41 PM, on 3/27/2011
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Defender Pro\Defender Pro Update Service\livesrv.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Portrait Displays\Shared\DTSRVC.exe
C:\Program Files\Defender Pro\Defender Pro\vsserv.exe
C:\Program Files\Digital Media Reader\readericon45G.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Portrait Displays\Pivot Software\wpctrl.exe
C:\Program Files\Defender Pro\Defender Pro\bdagent.exe
C:\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Portrait Displays\Pivot Software\floater.exe
C:\Program Files\NETGEAR\WG111v3\WG111v3.exe
G:\KeyText\KeyText.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Trend Micro\HiJackThis\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,SearchAssistant = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\SPYBOT~1\SDHelper.dll
O3 - Toolbar: Defender Pro Toolbar - {381FFDE8-2394-4f90-B10D-FC6124A40F8C} - C:\Program Files\Defender Pro\Defender Pro\IEToolbar.dll
O4 - HKLM\..\Run: [readericon] C:\Program Files\Digital Media Reader\readericon45G.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Recguard] %WINDIR%\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [PivotSoftware] "C:\Program Files\Portrait Displays\Pivot Software\wpctrl.exe"
O4 - HKLM\..\Run: [DPAgent] "C:\Program Files\Defender Pro\Defender Pro\bdagent.exe"
O4 - HKLM\..\Run: [Defender Pro Antiphishing Helper] "C:\Program Files\Defender Pro\Defender Pro\IEShow.exe"
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-18\..\Run: [Power2GoExpress] NA (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Power2GoExpress] NA (User 'Default user')
O4 - Startup: KeyText.lnk = G:\KeyText\KeyText.exe
O4 - Global Startup: NETGEAR WG111v3 Smart Wizard.lnk = C:\Program Files\NETGEAR\WG111v3\WG111v3.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Defender Pro Arrakis Server (Arrakis3) - BitDefender S.R.L. http://www.bitdefender.com - C:\Program Files\Common Files\Defender Pro\Defender Pro Arrakis Server\bin\arrakis3.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Portrait Displays Display Tune Service (DTSRVC) - Unknown owner - C:\Program Files\Common Files\Portrait Displays\Shared\DTSRVC.exe
O23 - Service: Defender Pro Update Service (LIVESRV) - Defender Pro - C:\Program Files\Common Files\Defender Pro\Defender Pro Update Service\livesrv.exe
O23 - Service: Defender Pro Virus Shield (VSSERV) - Defender Pro - C:\Program Files\Defender Pro\Defender Pro\vsserv.exe

--
End of file - 5044 bytes

Rebooted (hard kill). No apparent change. Given the above information, this doesn't surprise me. I do wish I knew what the devil was going on though.
The SunDL appears to have stopped but I'll have to examine WireShark logs at some future time to find out if there is some 'funny stuff' going on there still.

What's next in box of tricks?

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:31 PM

Posted 28 March 2011 - 11:14 AM

I want you to run this tool for me next.

tdsskiller:

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 Ripcord52

Ripcord52
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:31 PM

Posted 28 March 2011 - 07:00 PM

Shall do!




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users