Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malware Blues


  • Please log in to reply
9 replies to this topic

#1 mondsric

mondsric

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:12 PM

Posted 28 July 2011 - 07:48 AM

I'm having the same problem. Here is what a got after using rootkit. Please advise



RkU Version: 3.8.389.593, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
==============================================
WARNING: Virus alike driver modification [a302.sys]
WARNING: Virus alike driver modification [a303.sys]
WARNING: Virus alike driver modification [a304.sys]
WARNING: Virus alike driver modification [a305.sys]
WARNING: Virus alike driver modification [a306.sys]
WARNING: Virus alike driver modification [a307.sys]
WARNING: Virus alike driver modification [a308.sys]
WARNING: Virus alike driver modification [a309.sys]
WARNING: Virus alike driver modification [a310.sys]
WARNING: Virus alike driver modification [a311.sys]
WARNING: Virus alike driver modification [a313.sys]
WARNING: Virus alike driver modification [a314.sys]
==============================================
>Stealth
==============================================
WARNING: Virus alike driver modification [a308.sys]
WARNING: Virus alike driver modification [a314.sys]
WARNING: Virus alike driver modification [wadv08nt.sys]
WARNING: Virus alike driver modification [a302.sys]
WARNING: Virus alike driver modification [ialmsbw.sys]
WARNING: Virus alike driver modification [ati1mdxx.sys]
WARNING: Virus alike driver modification [wadv07nt.sys]
WARNING: Virus alike driver modification [a305.sys]
WARNING: Virus alike driver modification [mdmxsdk.sys]
WARNING: Virus alike driver modification [wadv09nt.sys]
WARNING: Virus alike driver modification [wadv11nt.sys]
WARNING: Virus alike driver modification [ati1pdxx.sys]
WARNING: Virus alike driver modification [mtlmnt5.sys]
WARNING: Virus alike driver modification [slnt7554.sys]
WARNING: Virus alike driver modification [slwdmsup.sys]
WARNING: Virus alike driver modification [recagent.sys]
WARNING: Virus alike driver modification [MODEMCSA.sys]
WARNING: Virus alike driver modification [a306.sys]
WARNING: Virus alike driver modification [s3gnbm.sys]
WARNING: Virus alike driver modification [ntmtlfax.sys]
WARNING: Virus alike driver modification [iqvw32.sys]
WARNING: Virus alike driver modification [vch.sys]
WARNING: Virus alike driver modification [ati1ttxx.sys]
WARNING: Virus alike driver modification [a307.sys]
WARNING: Virus alike driver modification [hsfbs2s2.sys]
WARNING: Virus alike driver modification [watv06nt.sys]
WARNING: Virus alike driver modification [watv10nt.sys]
WARNING: Virus alike driver modification [a309.sys]
WARNING: Virus alike driver modification [ati1snxx.sys]
WARNING: Virus alike driver modification [a303.sys]
WARNING: Virus alike driver modification [ati1xbxx.sys]
WARNING: Virus alike driver modification [ati1raxx.sys]
WARNING: Virus alike driver modification [a311.sys]
WARNING: Virus alike driver modification [a310.sys]
WARNING: Virus alike driver modification [wa301a.sys]
WARNING: Virus alike driver modification [wa301b.sys]
WARNING: Virus alike driver modification [ati1xsxx.sys]
WARNING: Virus alike driver modification [ati1tuxx.sys]
WARNING: Virus alike driver modification [a313.sys]
WARNING: Virus alike driver modification [StMp3Rec.sys]
WARNING: Virus alike driver modification [a304.sys]
WARNING: Virus alike driver modification [ati1btxx.sys]
WARNING: Virus alike driver modification [ati1rvxx.sys]
WARNING: Virus alike driver modification [ialmkchw.sys]
WARNING: Virus alike driver modification [slnthal.sys]

Edited by hamluis, 28 July 2011 - 05:25 PM.
Split from different topic.


BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:12 AM

Posted 28 July 2011 - 06:26 PM

Welcome aboard Posted Image

Please describe your computer issues.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 mondsric

mondsric
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:12 PM

Posted 29 July 2011 - 07:40 AM

After running unhide.exe hidden folders returned to the start menu but most were empty. I then ran rootkit and got this report. Where do I go from here? Thanks

#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:12 AM

Posted 29 July 2011 - 11:02 AM

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 mondsric

mondsric
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:12 PM

Posted 01 August 2011 - 08:29 AM

Security Check results:

Results of screen317's Security Check version 0.99.7
Windows XP Service Pack 3
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Disabled!
McAfee AntiVirus Plus
ZoneAlarm Spy Blocker Toolbar
ZoneAlarm
ZoneAlarm Toolbar
ZoneAlarm Spy Blocker
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
CCleaner
EasyCleaner
Java Web Start
Java™ 6 Update 23
Java™ SE Runtime Environment 6 Update 1
Java 2 Runtime Environment, SE v1.4.2
Java 2 Runtime Environment, SE v1.4.1_02
Out of date Java installed!
Adobe Flash Player 10.3.181.26
Adobe Atmosphere Player for Acrobat and Adobe Reader
Adobe Reader X (10.1.0)
Mozilla Firefox (x86 en-US..) Firefox Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Windows Defender MSMpEng.exe
IObit IObit Malware Fighter IMFsrv.exe
Windows Defender MsMpEng.exe
Zone Labs ZoneAlarm zlclient.exe
FireTrust MailWasher Free MailWasher.exe
``````````End of Log````````````

#6 mondsric

mondsric
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:12 PM

Posted 01 August 2011 - 08:36 AM

Malwarebytes Results

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7331

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

7/30/2011 7:28:19 PM
mbam-log-2011-07-30 (19-28-19).txt

Scan type: Quick scan
Objects scanned: 232911
Time elapsed: 26 minute(s), 35 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Edited by mondsric, 01 August 2011 - 08:42 AM.


#7 mondsric

mondsric
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:12 PM

Posted 01 August 2011 - 08:38 AM

Mini Toolbox results:

MiniToolBox by Farbar
Ran by RICHARD MONDSCHEIN (administrator) on 01-08-2011 at 09:30:21
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
ProxyServer: 127.0.0.1:8118

========================= FF Proxy Settings: ==============================

"network.proxy.ftp", "127.0.0.1"
"network.proxy.ftp_port", 8118
"network.proxy.gopher", "127.0.0.1"
"network.proxy.gopher_port", 8118
"network.proxy.http", "127.0.0.1"
"network.proxy.http_port", 8118
"network.proxy.no_proxies_on", "*.local"
"network.proxy.share_proxy_settings", true
"network.proxy.socks", "127.0.0.1"
"network.proxy.socks_port", 8118
"network.proxy.ssl", "127.0.0.1"
"network.proxy.ssl_port", 8118
"network.proxy.type", 0
========================= Hosts content: =================================

127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
127.0.0.1 100sexlinks.com
127.0.0.1 www.10sek.com
127.0.0.1 10sek.com
127.0.0.1 www.123topsearch.com
127.0.0.1 123topsearch.com
127.0.0.1 www.132.com

There are 10604 more lines starting with "127.0.0.1"

========================= IP Configuration: ================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : MAIN

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No



Ethernet adapter Local Area Connection:



Connection-specific DNS Suffix . :

Description . . . . . . . . . . . : Intel® PRO/100 VE Network Connection

Physical Address. . . . . . . . . : 00-0C-F1-98-7B-79

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.1.3

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.1.1

DHCP Server . . . . . . . . . . . : 192.168.1.1

DNS Servers . . . . . . . . . . . : 192.168.1.1

Lease Obtained. . . . . . . . . . : Monday, August 01, 2011 8:05:49 AM

Lease Expires . . . . . . . . . . : Tuesday, August 02, 2011 8:05:49 AM

Server: UnKnown
Address: 192.168.1.1

Name: google.com
Addresses: 74.125.93.105, 74.125.93.104, 74.125.93.99, 74.125.93.103
74.125.93.147, 74.125.93.106



Pinging google.com [74.125.93.106] with 32 bytes of data:



Reply from 74.125.93.106: bytes=32 time=34ms TTL=53

Reply from 74.125.93.106: bytes=32 time=34ms TTL=53



Ping statistics for 74.125.93.106:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 34ms, Maximum = 34ms, Average = 34ms

Server: UnKnown
Address: 192.168.1.1

Name: yahoo.com
Addresses: 72.30.2.43, 98.137.149.56, 209.191.122.70, 67.195.160.76
69.147.125.65



Pinging yahoo.com [69.147.125.65] with 32 bytes of data:



Reply from 69.147.125.65: bytes=32 time=20ms TTL=55

Reply from 69.147.125.65: bytes=32 time=19ms TTL=55



Ping statistics for 69.147.125.65:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 19ms, Maximum = 20ms, Average = 19ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=64

Reply from 127.0.0.1: bytes=32 time<1ms TTL=64



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 0c f1 98 7b 79 ...... Intel® PRO/100 VE Network Connection - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.3 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.3 192.168.1.3 20
192.168.1.0 255.255.255.0 192.168.1.3 192.168.1.3 20
192.168.1.3 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.3 192.168.1.3 20
224.0.0.0 240.0.0.0 192.168.1.3 192.168.1.3 20
255.255.255.255 255.255.255.255 192.168.1.3 192.168.1.3 1
Default Gateway: 192.168.1.1
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (08/01/2011 01:35:01 AM) (Source: MPSampleSubmission) (User: )
Description: EventType mptelemetry, P1 80080005, P2 updateservicemanager-_get_services, P3 fallbackcheck, P4 1.1.1593.0, P5 mpsigdwn.dll, P6 1.1.1593.0, P7 windows defender, P8 NIL, P9 mptelemetry0, P10 mptelemetry1.

Error: (07/31/2011 01:35:01 AM) (Source: MPSampleSubmission) (User: )
Description: EventType mptelemetry, P1 80080005, P2 updateservicemanager-_get_services, P3 fallbackcheck, P4 1.1.1593.0, P5 mpsigdwn.dll, P6 1.1.1593.0, P7 windows defender, P8 NIL, P9 mptelemetry0, P10 mptelemetry1.

Error: (07/30/2011 10:47:18 AM) (Source: Microsoft Office 10) (User: )
Description: Rejected Safe Mode action : Microsoft Word.

Error: (07/30/2011 10:46:47 AM) (Source: Microsoft Office 10) (User: )
Description: Faulting application winword.exe, version 10.0.6866.0, faulting module mso.dll, version 10.0.6870.0, fault address 0x000073ae.

Error: (07/29/2011 01:38:01 AM) (Source: MPSampleSubmission) (User: )
Description: EventType mptelemetry, P1 80080005, P2 updateservicemanager-_get_services, P3 fallbackcheck, P4 1.1.1593.0, P5 mpsigdwn.dll, P6 1.1.1593.0, P7 windows defender, P8 NIL, P9 mptelemetry0, P10 mptelemetry1.

Error: (07/27/2011 02:27:00 AM) (Source: MPSampleSubmission) (User: )
Description: EventType mptelemetry, P1 80080005, P2 updateservicemanager-_get_services, P3 fallbackcheck, P4 1.1.1593.0, P5 mpsigdwn.dll, P6 1.1.1593.0, P7 windows defender, P8 NIL, P9 mptelemetry0, P10 mptelemetry1.

Error: (07/26/2011 04:02:09 PM) (Source: MsiInstaller) (User: RICHARD MONDSCHEIN)RICHARD MONDSCHEIN
Description: Product: The Print Shop 21 -- 1: The InstallScript engine is missing from this machine. If available, please run ISScript.msi, or contact your support personnel for further assistance.

Error: (07/26/2011 02:07:21 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module unknown, version 0.0.0.0, fault address 0x052d5ab0.
Processing media-specific event for [iexplore.exe!ws!]

Error: (07/26/2011 01:40:21 PM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: This operation returned because the timeout period expired.

Error: (07/26/2011 01:40:19 PM) (Source: crypt32) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.


System errors:
=============
Error: (08/01/2011 01:35:00 AM) (Source: DCOM) (User: SYSTEM)
Description: The server {E60687F7-01A1-40AA-86AC-DB1CBF673334} did not register with DCOM within the required timeout.

Error: (08/01/2011 01:34:31 AM) (Source: Service Control Manager) (User: )
Description: The Automatic Updates service terminated with the following error:
%%2147942405

Error: (08/01/2011 01:34:30 AM) (Source: DCOM) (User: SYSTEM)
Description: The server {E60687F7-01A1-40AA-86AC-DB1CBF673334} did not register with DCOM within the required timeout.

Error: (08/01/2011 01:34:01 AM) (Source: Service Control Manager) (User: )
Description: The Automatic Updates service terminated with the following error:
%%2147942405

Error: (07/31/2011 01:35:00 AM) (Source: DCOM) (User: SYSTEM)
Description: The server {E60687F7-01A1-40AA-86AC-DB1CBF673334} did not register with DCOM within the required timeout.

Error: (07/31/2011 01:34:31 AM) (Source: Service Control Manager) (User: )
Description: The Automatic Updates service terminated with the following error:
%%2147942405

Error: (07/31/2011 01:34:30 AM) (Source: DCOM) (User: SYSTEM)
Description: The server {E60687F7-01A1-40AA-86AC-DB1CBF673334} did not register with DCOM within the required timeout.

Error: (07/31/2011 01:34:01 AM) (Source: Service Control Manager) (User: )
Description: The Automatic Updates service terminated with the following error:
%%2147942405

Error: (07/30/2011 08:12:38 AM) (Source: DCOM) (User: SYSTEM)
Description: The server {3A185DDE-E020-4985-A8F2-E27CDC4A0F3A} did not register with DCOM within the required timeout.

Error: (07/30/2011 08:07:24 AM) (Source: Service Control Manager) (User: )
Description: The MozyHome Backup Service service terminated with service-specific error 2 (0x2).


Microsoft Office Sessions:
=========================
Error: (08/01/2011 01:35:01 AM) (Source: MPSampleSubmission)(User: )
Description: mptelemetry80080005updateservicemanager-_get_servicesfallbackcheck1.1.1593.0mpsigdwn.dll1.1.1593.0windows defenderNILNILNIL

Error: (07/31/2011 01:35:01 AM) (Source: MPSampleSubmission)(User: )
Description: mptelemetry80080005updateservicemanager-_get_servicesfallbackcheck1.1.1593.0mpsigdwn.dll1.1.1593.0windows defenderNILNILNIL

Error: (07/30/2011 10:47:18 AM) (Source: Microsoft Office 10)(User: )
Description: Microsoft WordWord experienced a serious error the last time the add-in 'c:\program files\microsoft office\office10\startup\~$thtype commands 5 for word.dot' was opened. Would you like to disable this add-in?
To reenable this add-in, click About Microsoft Word on the Help menu, and then click Disabled Items

Error: (07/30/2011 10:46:47 AM) (Source: Microsoft Office 10)(User: )
Description: winword.exe10.0.6866.0mso.dll10.0.6870.0000073ae

Error: (07/29/2011 01:38:01 AM) (Source: MPSampleSubmission)(User: )
Description: mptelemetry80080005updateservicemanager-_get_servicesfallbackcheck1.1.1593.0mpsigdwn.dll1.1.1593.0windows defenderNILNILNIL

Error: (07/27/2011 02:27:00 AM) (Source: MPSampleSubmission)(User: )
Description: mptelemetry80080005updateservicemanager-_get_servicesfallbackcheck1.1.1593.0mpsigdwn.dll1.1.1593.0windows defenderNILNILNIL

Error: (07/26/2011 04:02:09 PM) (Source: MsiInstaller)(User: RICHARD MONDSCHEIN)RICHARD MONDSCHEIN
Description: Product: The Print Shop 21 -- 1: The InstallScript engine is missing from this machine. If available, please run ISScript.msi, or contact your support personnel for further assistance. (NULL)(NULL)(NULL)

Error: (07/26/2011 02:07:21 PM) (Source: Application Error)(User: )
Description: iexplore.exe8.0.6001.18702unknown0.0.0.0052d5ab0

Error: (07/26/2011 01:40:21 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThis operation returned because the timeout period expired.

Error: (07/26/2011 01:40:19 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabA required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.


========================= Memory info: ===================================

Percentage of memory in use: 33%
Total physical RAM: 3709.98 MB
Available physical RAM: 2463.75 MB
Total Pagefile: 5598.49 MB
Available Pagefile: 4226.89 MB
Total Virtual: 2047.88 MB
Available Virtual: 1989.7 MB

========================= Partitions: =====================================

2 Drive c: () (Fixed) (Total:74.47 GB) (Free:18.26 GB) NTFS
4 Drive e: (New Volume) (Fixed) (Total:1397.26 GB) (Free:1355.99 GB) NTFS
5 Drive f: (My Book) (Fixed) (Total:1862.98 GB) (Free:1771.4 GB) NTFS

========================= Users: ========================================

User accounts for \\MAIN

Administrator ASPNET CHRISTINA MONDSCHEIN
Guest HelpAssistant RICHARD MONDSCHEIN
STEFANIE MONDSCHEIN STEVEN MONDSCHEIN SUPPORT_388945a0
SUPPORT_3f151ab9


== End of log ==

#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:12 AM

Posted 01 August 2011 - 07:24 PM

I still need GMER log.

Also...

After running unhide.exe hidden folders returned to the start menu but most were empty

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

64-bit users go HERE
  • Double-click SystemLook.exe to run it.
  • Vista\Win 7 users:: Right click on SystemLook.exe, click Run As Administrator
  • Copy the content of the following box into the main textfield:
    :dir
    %Temp%\smtmp /s
    
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 mondsric

mondsric
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:12 PM

Posted 03 August 2011 - 08:56 AM

SystemLook 30.07.11 by jpshortstuff
Log created at 09:55 on 03/08/2011 by RICHARD MONDSCHEIN
Administrator - Elevation successful

========== dir ==========

C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\smtmp - Unable to find folder.

-= EOF =-

#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:12 AM

Posted 03 August 2011 - 06:58 PM

Unfortunately, that crucial back up folder is missing, so you'll have to restore all items manually.

You can restore the defaults for the Start Menu, Accessories and Administrative Tools as follows:
Posted Image
  • Then click on the Restore button.

========================================================================

To manually recreate "All Programs" entries, follow these steps...

  • Download App Paths
  • Double click on AppPaths.exe to run the program.
  • Keep the program open.

In this example I'll recreate an entry for Avast antivirus program.
  • Go Start>All Programs.
  • Right click on Avast entry, click "Properties".

Posted Image
NOTE. Make sure, you right click on Avast program, NOT on Avast folder.

  • You'll see this window:

Posted Image

Due to the damage caused by the infection, you'll find "Target" box empty.

  • Go back to AppPaths window and find Avast entry.
  • Right click on Avast line, click "Edit".
  • A pop-up window will open:

Posted Image

  • Highlight everything in "Path" box, right click on it, click "Copy"
  • Go back to Avast "Properties" window, right click inside "Target" box, click "Paste".
  • IMPORTANT! Add quotation marks at the beginning of the path and at the end
  • Click OK and you're done.

Posted Image


In case, program's link shows as (empty): (<========YOUR CASE)

Posted Image

  • Open Windows Explorer, navigate to Avast folder in Program Files
  • Right click on Avast ".exe" file, click "Create shortcut":

Posted Image

  • Copy that shortcut, go back to Start menu.
  • Right click on avast!Free Antivirus, click "Paste".
  • You'll see Avast shortcut recreated replacing (empty) entry.

Alternatively....
...you paste that shortcut in:
(XP) - C:\Documents and Settings\All Users\Start Menu\Programs\Avast
(Vista/7) - C:\ProgramData\Start Menu\Programs\Avast

Let me know how it worked for you.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users