Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I have an error report from event viewer ?


  • Please log in to reply
45 replies to this topic

#1 Jove

Jove

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 03 November 2011 - 07:37 PM

I am helping a friend in the Philippines who is no expert with the computer,. .

we have been having some problems with her computer, especially it disconnects alot,
but she thinks it is the connection service, I am doubtful of that.

Anyway I have a clue to a possible infection because she is also saying her PC is generally pretty slow.

Here is the info from the Event Viewer Properties;

Event Type: Warning
Event Source: Avira Antivirus
Event Category: Infection
Event ID: 4113
Date: 11/4/2011
Time: 6:54:53 AM
User: NT AUTHORITY\SYSTEM
Computer: SHARON-7A420A67
Description:
AntiVir has detected 'TR/Gendal.kdv.387756' in the file C:\Documents and Settings\sharon\Application Data\20.tmp

Please guide us, . . .
Your help will really be appreciated.




OS Name Microsoft Windows XP Professional
Version 5.1.2600 Service Pack 3 Build 2600
OS Manufacturer Microsoft Corporation
System Name JAY-B66978F39D7
System Manufacturer To Be Filled By O.E.M.
System Model To Be Filled By O.E.M.
System Type X86-based PC
Processor x86 Family 6 Model 23 Stepping 6 GenuineIntel ~2511 Mhz
BIOS Version/Date American Megatrends Inc. P1.40, 2/5/2009
SMBIOS Version 2.4
Windows Directory C:\WINDOWS
System Directory C:\WINDOWS\system32
Boot Device \Device\HarddiskVolume1
Locale United States
Hardware Abstraction Layer Version = "5.1.2600.5512 (xpsp.080413-2111)"
User Name
Time Zone Pacific Daylight Time
Total Physical Memory 1,024.00 MB
Available Physical Memory 294.54 MB
Total Virtual Memory 2.00 GB
Available Virtual Memory 1.96 GB
Page File Space 2.41 GB
Page File C:\pagefile.sys

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,663 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:03:40 PM

Posted 03 November 2011 - 08:34 PM

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 03 November 2011 - 08:54 PM

Will do Broni, I am instructing her there, thanks!

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


#4 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 03 November 2011 - 09:34 PM

#1 Complete

Results of screen317's Security Check version 0.99.24
Windows XP Service Pack 3 x86
Internet Explorer 7 Out of date!
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Avira Free Antivirus
Hunt Virus Utilities
WMI entry may not exist for antivirus; attempting automatic update.
Avira successfully updated!
```````````````````````````````
Anti-malware/Other Utilities Check:

CCleaner (remove only)
Adobe Flash Player ( 10.3.181.14) Flash Player Out of Date!
Mozilla Firefox (x86 en-US..)
````````````````````````````````
Process Check:
objlist.exe by Laurent

Avira Antivir avgnt.exe
Avira Antivir avguard.exe
``````````End of Log````````````

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


#5 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 03 November 2011 - 10:02 PM

#2 complete;
Results of screen317's Security Check version 0.99.24
Windows XP Service Pack 3 x86
Internet Explorer 7 Out of date!
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Avira Free Antivirus
Hunt Virus Utilities
WMI entry may not exist for antivirus; attempting automatic update.
Avira successfully updated!
```````````````````````````````
Anti-malware/Other Utilities Check:

CCleaner (remove only)
Adobe Flash Player ( 10.3.181.14) Flash Player Out of Date!
Mozilla Firefox (x86 en-US..)
````````````````````````````````
Process Check:
objlist.exe by Laurent

Avira Antivir avgnt.exe
Avira Antivir avguard.exe
``````````End of Log````````````
MiniToolBox by Farbar
Ran by sharon (administrator) on 04-11-2011 at 10:58:39
Microsoft Windows XP Service Pack 3, v.5512 (X86)

***************************************************************************

"Reset IE Proxy Settings": IE Proxy Settings were reset.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================


127.0.0.1 localhost

========================= IP Configuration: ================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp

# Interface IP Configuration for "Local Area Connection 2"

set address name="Local Area Connection 2" source=dhcp
set dns name="Local Area Connection 2" source=dhcp register=PRIMARY
set wins name="Local Area Connection 2" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : sharon-7a420a67

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Unknown

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No



Ethernet adapter Local Area Connection:



Media State . . . . . . . . . . . : Media disconnected

Description . . . . . . . . . . . : Realtek RTL8102E Family PCI-E Fast Ethernet NIC

Physical Address. . . . . . . . . : 00-19-66-B9-4E-42



Ethernet adapter Local Area Connection 2:



Connection-specific DNS Suffix . :

Description . . . . . . . . . . . : HUAWEI Mobile Connect - 3G Network Card

Physical Address. . . . . . . . . : 00-1E-10-1F-30-5F

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 10.173.170.227

Subnet Mask . . . . . . . . . . . : 255.255.255.248

Default Gateway . . . . . . . . . : 10.173.170.225

DHCP Server . . . . . . . . . . . : 10.173.170.225

DNS Servers . . . . . . . . . . . : 202.138.128.50

202.138.128.54

Lease Obtained. . . . . . . . . . : Friday, November 04, 2011 10:40:44 AM

Lease Expires . . . . . . . . . . : Friday, November 04, 2011 12:40:44 PM

Server: dns-cache.digitelone.com
Address: 202.138.128.50

Name: google.com
Addresses: 74.125.71.106, 74.125.71.147, 74.125.71.99, 74.125.71.103
74.125.71.104, 74.125.71.105



Pinging google.com [74.125.71.105] with 32 bytes of data:



Reply from 74.125.71.105: bytes=32 time=117ms TTL=50

Reply from 74.125.71.105: bytes=32 time=126ms TTL=50



Ping statistics for 74.125.71.105:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 117ms, Maximum = 126ms, Average = 121ms

Server: dns-cache.digitelone.com
Address: 202.138.128.50

Name: yahoo.com
Addresses: 209.191.122.70, 67.195.160.76, 72.30.2.43, 98.137.149.56
98.139.180.149



Pinging yahoo.com [98.139.180.149] with 32 bytes of data:



Reply from 98.139.180.149: bytes=32 time=425ms TTL=42

Reply from 98.139.180.149: bytes=32 time=445ms TTL=41



Ping statistics for 98.139.180.149:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 425ms, Maximum = 445ms, Average = 435ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 19 66 b9 4e 42 ...... Realtek RTL8102E Family PCI-E Fast Ethernet NIC - Packet Scheduler Miniport
0x10004 ...00 1e 10 1f 30 5f ...... HUAWEI Mobile Connect - 3G Network Card - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 10.173.170.225 10.173.170.227 40
10.173.170.224 255.255.255.248 10.173.170.227 10.173.170.227 40
10.173.170.227 255.255.255.255 127.0.0.1 127.0.0.1 40
10.255.255.255 255.255.255.255 10.173.170.227 10.173.170.227 40
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 10.173.170.227 10.173.170.227 40
255.255.255.255 255.255.255.255 10.173.170.227 2 1
255.255.255.255 255.255.255.255 10.173.170.227 10.173.170.227 1
Default Gateway: 10.173.170.225
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\System32\mswsock.dll [245248] (Microsoft Corporation)
Catalog5 02 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 C:\Windows\System32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 01 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 04 C:\Windows\system32\rsvpsp.dll [92672] (Microsoft Corporation)
Catalog9 05 C:\Windows\system32\rsvpsp.dll [92672] (Microsoft Corporation)
Catalog9 06 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 14 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 15 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (11/02/2011 05:25:43 PM) (Source: Application Error) (User: )
Description: Faulting application airstrike3d.exe, version 1.5.5.0, faulting module airstrike3d.exe, version 1.5.5.0, fault address 0x00015ab0.
Processing media-specific event for [airstrike3d.exe!ws!]

Error: (11/02/2011 07:08:39 PM) (Source: .NET Runtime Optimization Service) (User: )
Description: .NET Runtime Optimization Service (clr_optimization_v2.0.50727_32) - Service reached limit of transient errors. Will shut down. Last error returned from Service Manager: 0x800736b1.


System errors:
=============
Error: (11/04/2011 09:07:23 AM) (Source: Service Control Manager) (User: )
Description: The DCService.exe service terminated unexpectedly. It has done this 1 time(s).

Error: (11/04/2011 08:40:43 AM) (Source: Dhcp) (User: )
Description: The IP address lease 10.173.159.96 for the Network Card with network address 001E101F305F has been
denied by the DHCP server 10.173.170.225 (The DHCP Server sent a DHCPNACK message).

Error: (11/03/2011 07:17:33 PM) (Source: Dhcp) (User: )
Description: The IP address lease 10.173.157.98 for the Network Card with network address 001E101F951B has been
denied by the DHCP server 10.173.162.97 (The DHCP Server sent a DHCPNACK message).

Error: (11/03/2011 02:48:42 PM) (Source: Dhcp) (User: )
Description: The IP address lease 10.173.146.67 for the Network Card with network address 001E101F9427 has been
denied by the DHCP server 10.173.169.161 (The DHCP Server sent a DHCPNACK message).

Error: (11/03/2011 02:20:08 PM) (Source: Service Control Manager) (User: )
Description: The Wireless Zero Configuration service terminated unexpectedly. It has done this 1 time(s).

Error: (11/03/2011 02:20:08 PM) (Source: Service Control Manager) (User: )
Description: The Automatic Updates service terminated unexpectedly. It has done this 1 time(s).

Error: (11/03/2011 02:20:08 PM) (Source: Service Control Manager) (User: )
Description: The Windows Management Instrumentation service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service.

Error: (11/03/2011 02:20:08 PM) (Source: Service Control Manager) (User: )
Description: The Distributed Link Tracking Client service terminated unexpectedly. It has done this 1 time(s).

Error: (11/03/2011 02:20:08 PM) (Source: Service Control Manager) (User: )
Description: The Themes service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 60000 milliseconds: Restart the service.

Error: (11/03/2011 02:20:08 PM) (Source: Service Control Manager) (User: )
Description: The Telephony service terminated unexpectedly. It has done this 1 time(s).


Microsoft Office Sessions:
=========================

=========================== Installed Programs ============================

7-Zip 4.57
Adobe Flash Player 10 Plugin (Version: 10.3.181.14)
Adobe Flash Player 11 ActiveX (Version: 11.0.1.152)
Alky for Applications (Windows XP) (Version: 1.1)
Avira Free Antivirus (Version: 12.0.0.861)
CCleaner (remove only)
Gadget Installer (Version: 1.0.2)
GameHouse Super Games AIO® (Version: 1.0)
HashTab 2.0.8 (Version: 2.0.8)
Hunt Virus Utilities
IconPackager
IZArc 3.81 (Version: 3.81 Build 1550)
K-Lite Codec Pack 3.9.0 Standard (Version: 3.9.0)
Kels' CPL Bonus Pack! (Version: 8.2.2)
LClock
Microsoft .NET Framework 2.0 Service Pack 1 (Version: 2.1.21022)
Microsoft .NET Framework 3.0 Service Pack 1 (Version: 3.1.21022)
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5 (Version: 3.5.21022)
Microsoft Kernel-Mode Driver Framework Feature Pack 1.9
Microsoft Office 2007 Recent Documents Gadget (Version: 12.0.4518.1027)
Microsoft Office Excel MUI (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Outlook MUI (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office PowerPoint MUI (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proof (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proof (French) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proof (Spanish) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proofing (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Shared MUI (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Shared Setup Metadata MUI (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Standard 2007 (Version: 12.0.4518.1014)
Microsoft Office Word MUI (English) 2007 (Version: 12.0.4518.1014)
Microsoft Silverlight (Version: 4.0.60831.0)
Microsoft Visual C++ 2005 Redistributable - KB2467175 (Version: 8.0.51011)
Microsoft Visual C++ 2005 SP1 Redistributable (Version: 8.0.56336)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30304 (Version: 9.0.30304)
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (Version: 10.0.40219)
Microsoft Web Services Enhancements 1.0 SP1 (Version: 1.0.3057.0)
Microsoft Web Services Enhancements 2.0 SP3 (Version: 2.0.5050.0)
Microsoft Web Services Enhancements 3.0 (Version: 3.0.5305.0)
Mozilla Firefox 7.0 (x86 en-US) (Version: 7.0)
MSXML 6.0 Parser (KB933579) (Version: 6.10.1200.0)
PowerCmd 1.9 (Version: AppVerName)
Realtek High Definition Audio Driver
RocketDock 1.3.5
Skype™ 5.5 (Version: 5.5.124)
Styler (Version: 1.4.0.1)
Sun Broadband Wireless (Version: 16.001.06.04.256)
Unlocker 1.8.7 (Version: 1.8.7)
VirtualDJ Home FREE (Version: 7.0.5)
VLC media player 1.1.11 (Version: 1.1.11)
WebFldrs XP (Version: 9.50.7523)
WindowBlinds (Version: 6.10)
Windows Sidebar (Version: 6.0.6001.18000)
WinRAR 4.01 (32-bit) (Version: 4.01.0)
XML Paper Specification Shared Components Pack 1.0
Yahoo! Messenger
Yahoo! Search Protection
Yahoo! Software Update
Yahoo! Toolbar

========================= Memory info: ===================================

Percentage of memory in use: 43%
Total physical RAM: 2038.23 MB
Available physical RAM: 1157.29 MB
Total Pagefile: 3934.72 MB
Available Pagefile: 2988.5 MB
Total Virtual: 2047.88 MB
Available Virtual: 1989.67 MB

========================= Partitions: =====================================

2 Drive c: () (Fixed) (Total:59.62 GB) (Free:53.14 GB) NTFS
3 Drive d: () (Fixed) (Total:89.42 GB) (Free:57.73 GB) NTFS
5 Drive g: (Sun Broadband) (CDROM) (Total:0.02 GB) (Free:0 GB) CDFS

========================= Users: ========================================

User accounts for \\SHARON-7A420A67

Administrator Guest HelpAssistant
sharon SUPPORT_388945a0


**** End of log ****
[11:03:36 PM] Aaron Hermogenes: that's it?

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


#6 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 03 November 2011 - 10:58 PM

Broni we are having a problem with MalwareBytes downloads

is there another site ?

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


#7 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 03 November 2011 - 11:13 PM

Its Ok I got it

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


#8 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 03 November 2011 - 11:17 PM

Concerning MBAM
do you want the results from one scan (quick scan ),
is that all you want ?

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


#9 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 03 November 2011 - 11:25 PM

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8081

Windows 5.1.2600 Service Pack 3, v.5512
Internet Explorer 7.0.5730.13

11/4/2011 12:23:34 PM
mbam-log-2011-11-04 (12-23-34).txt

Scan type: Quick scan
Objects scanned: 152222
Time elapsed: 4 minute(s), 49 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 3
Registry Data Items Infected: 1
Folders Infected: 2
Files Infected: 53

Memory Processes Infected:
c:\WINDOWS\jodrive32.exe (Backdoor.Bot) -> 552 -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Config Setup (Backdoor.Bot) -> Value: Microsoft Config Setup -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Config Setup (Backdoor.Bot) -> Value: Microsoft Config Setup -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Taskman (Trojan.Agent) -> Value: Taskman -> Delete on reboot.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Taskman (Trojan.Downloader) -> Bad: (c:\RECYCLER\R-1-5-21-1482476501-1644491937-682003330-1013\ecleaner.exe) Good: () -> Delete on reboot.

Folders Infected:
c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413 (Worm.AutoRun) -> Quarantined and deleted successfully.
c:\RECYCLER\r-1-5-21-1482476501-1644491937-682003330-1013 (Worm.AutoRun.Gen) -> Delete on reboot.

Files Infected:
c:\WINDOWS\jodrive32.exe (Backdoor.Bot) -> Delete on reboot.
c:\RECYCLER\r-1-5-21-1482476501-1644491937-682003330-1013\ecleaner.exe (Trojan.Downloader) -> Delete on reboot.
c:\documents and settings\sharon\application data\11.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\114.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\115.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\12.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\15.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\16.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\18.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\1A.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\1B.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\1C.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\2.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\20.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\22.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\23.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\F.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\27.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\28.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\2F.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\30.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\3E.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\4.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\41.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\6.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\A.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\B.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\RECYCLER\r-1-5-21-1482476501-1644491937-682003330-1013\ winfixer c a r d .cmd (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\03.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\12.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\28.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\40.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\41.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\66.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\76.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\3ZXJQSE5\cx[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\3ZXJQSE5\iL44[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\45GTPCPK\cx[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GFFW3TYV\cx[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\GFFW3TYV\hj[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\networkservice\local settings\temporary internet files\Content.IE5\JRM4C34Q\iL44[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\10.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\14.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\19.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\1E.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\1F.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\25.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\26.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\2A.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\33.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\42.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413\Desktop.ini (Worm.AutoRun) -> Quarantined and deleted successfully.
c:\RECYCLER\r-1-5-21-1482476501-1644491937-682003330-1013\Desktop.ini (Worm.AutoRun.Gen) -> Quarantined and deleted successfully.

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,663 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:03:40 PM

Posted 03 November 2011 - 11:30 PM

Go ahead with GMER.

Are you familiar with Hunt Virus Utilities?
I can't find much info on it.
If it's listed in Add\Remove uninstall it.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#11 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 03 November 2011 - 11:33 PM

will do

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


#12 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 04 November 2011 - 12:01 AM

Concerning GMER Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.


Please check for active protection for what I should be disabling.


About Avira , . . .
To disable this I think I will have to go to MSCONFIG, because she can not see it in services, . . .
If it is disabled in msconfig then it will be a selective start up and will pop up everytime she starts, . . that will be confusing so if she then checks it after will it the still be selective??

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


#13 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 04 November 2011 - 01:54 AM

Sorry Broni, if I ask to much of you, but I think she does not have a fire walll
and that the Avira is probably running and I'm am not sure of any other. but I will check this tomorrow , as I'm out of time now.

and we will do the GMER at that time also. . . I guess we could uninstall the Avira for
A/R. so I will check the logs we made
thank you for your help, see you tomorrow.

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


#14 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 04 November 2011 - 06:08 AM

Latest MBAM Scan

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8081

Windows 5.1.2600 Service Pack 3, v.5512
Internet Explorer 7.0.5730.13

11/4/2011 7:07:10 PM
mbam-log-2011-11-04 (19-07-10).txt

Scan type: Quick scan
Objects scanned: 151561
Time elapsed: 3 minute(s), 55 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 5
Registry Data Items Infected: 2
Folders Infected: 1
Files Infected: 5

Memory Processes Infected:
c:\WINDOWS\aadrive32.exe (Backdoor.Bot) -> 2904 -> Failed to unload process.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup (Backdoor.Bot) -> Value: Microsoft Driver Setup -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup (Backdoor.Bot) -> Value: Microsoft Driver Setup -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tnaww (Backdoor.Bot) -> Value: Tnaww -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Worm.AutoRun) -> Value: Shell -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Taskman (Trojan.Agent) -> Value: Taskman -> Delete on reboot.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Taskman (Backdoor.Bot) -> Bad: (C:\RECYCLER\S-1-5-21-0243556031-888888379-781863308-1413\syitm.exe) Good: () -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (explorer.exe,C:\RECYCLER\S-1-5-21-0243556031-888888379-781863308-1413\syitm.exe) Good: (Explorer.exe) -> Quarantined and deleted successfully.

Folders Infected:
c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413 (Worm.AutoRun) -> Quarantined and deleted successfully.

Files Infected:
c:\WINDOWS\aadrive32.exe (Backdoor.Bot) -> Delete on reboot.
c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413\syitm.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\11.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\12.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413\Desktop.ini (Worm.AutoRun) -> Quarantined and deleted successfully.

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert


#15 Jove

Jove
  • Topic Starter

  • Members
  • 2,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Very South Jersey
  • Local time:06:40 PM

Posted 04 November 2011 - 06:26 AM

Next Quick scan


Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8081

Windows 5.1.2600 Service Pack 3, v.5512
Internet Explorer 7.0.5730.13

11/4/2011 7:21:13 PM
mbam-log-2011-11-04 (19-21-13).txt

Scan type: Quick scan
Objects scanned: 151823
Time elapsed: 4 minute(s), 9 second(s)

Memory Processes Infected: 7
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 8
Registry Data Items Infected: 2
Folders Infected: 1
Files Infected: 14

Memory Processes Infected:
c:\documents and settings\sharon\application data\4.tmp (Spyware.Password) -> 2816 -> Unloaded process successfully.
c:\documents and settings\sharon\application data\6.tmp (Backdoor.Bot) -> 264 -> Unloaded process successfully.
c:\WINDOWS\aadrive32.exe (Backdoor.Bot) -> 3668 -> Unloaded process successfully.
c:\documents and settings\sharon\application data\14.tmp (Backdoor.Bot) -> 580 -> Unloaded process successfully.
c:\WINDOWS\jodrive32.exe (Backdoor.Bot) -> 3532 -> Unloaded process successfully.
c:\documents and settings\sharon\application data\19.tmp (Backdoor.Bot) -> 2560 -> Unloaded process successfully.
c:\documents and settings\sharon\application data\1B.tmp (Trojan.Agent) -> 2620 -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup (Backdoor.Bot) -> Value: Microsoft Driver Setup -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup (Backdoor.Bot) -> Value: Microsoft Driver Setup -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Config Setup (Backdoor.Bot) -> Value: Microsoft Config Setup -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Config Setup (Backdoor.Bot) -> Value: Microsoft Config Setup -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tnaww (Backdoor.Bot) -> Value: Tnaww -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adonpdf (Backdoor.Bot) -> Value: adonpdf -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Worm.AutoRun) -> Value: Shell -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Taskman (Trojan.Agent) -> Value: Taskman -> Delete on reboot.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Taskman (Backdoor.Bot) -> Bad: (C:\RECYCLER\S-1-5-21-0243556031-888888379-781863308-1413\syitm.exe) Good: () -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (explorer.exe,C:\RECYCLER\S-1-5-21-0243556031-888888379-781863308-1413\syitm.exe) Good: (Explorer.exe) -> Quarantined and deleted successfully.

Folders Infected:
c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413 (Worm.AutoRun) -> Quarantined and deleted successfully.

Files Infected:
c:\documents and settings\sharon\application data\4.tmp (Spyware.Password) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\6.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\aadrive32.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\14.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\jodrive32.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\19.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413\syitm.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\addoon32.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\11.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\15.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\1C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\1E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\sharon\application data\1B.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
c:\RECYCLER\s-1-5-21-0243556031-888888379-781863308-1413\Desktop.ini (Worm.AutoRun) -> Quarantined and deleted successfully.

When you don't have to worry about your computer anymore, you can start
living again !

vrwqzc.gif
Success is a result, not a goal. . . . Flaubert





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users