Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

MSDOS Virus// Search.popclick.net virus


  • This topic is locked This topic is locked
5 replies to this topic

#1 Joeysteg

Joeysteg

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:41 PM

Posted 19 January 2012 - 03:40 PM

Hey SO I got this virus while I was on facebook. I was using internet explorer and I got what I thought was an internet explorer update. SO I installed and of course its an ugly virus. I cant restore! IT wont even let me turn it off. ALso the programs are installed on my desktop but I cant delete them!
.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_29
Run by Owner at 14:34:09 on 2012-01-19
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.958.227 [GMT -5:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Microsoft\Service32\app.exe
C:\Program Files\Email\Internet\run.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Email\Internet\run.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
C:\WINDOWS\explorer.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\rundll32.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://search.popclick.net
uSearch Bar = hxxp://toolbar.inbox.com/search/dispatcher.aspx?tp=aus&qkw=%s&tbid=%tb_id&%language
uInternet Settings,ProxyOverride = *.local
mSearchAssistant = hxxp://toolbar.inbox.com/search/ie.aspx?tbid=80469&lng=en
mCustomizeSearch = hxxp://toolbar.inbox.com/help/sa_customize.aspx?tbid=80469
uURLSearchHooks: H - No File
mWinlogon: Shell=explorer.exe, c:\documents and settings\owner\Application Data/Email/avg.exe
mWinlogon: Userinit=c:\windows\system32\userinit.exe, c:\documents and settings\owner\svchost.exe
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\program files\spybot - search & destroy\SDHelper.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: {965B54B0-71E0-4611-8DE7-F73FA0B20E26} - No File
TB: {604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - No File
TB: {D7E97865-918F-41E4-9CD0-25AB1C574CE8} - No File
TB: {07AA283A-43D7-4CBE-A064-32A21112D94D} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [DW6] "c:\program files\the weather channel fw\desktop\DesktopWeather.exe"
uRun: [Email] C:\Program Files/Email/Internet/run.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRunOnce: [Internet] explorer.exe, c:\documents and settings\owner\Application Data/Email/avg.exe
uRunOnce: [SpybotDeletingB8737] command.com /c del "c:\program files\free offers from freeze.com\control.txt"
uRunOnce: [SpybotDeletingD7667] cmd.exe /c del "c:\program files\free offers from freeze.com\control.txt"
uRunOnce: [winlogon] C:\WINDOWS/system32/drivers/winlogon.scr
mRun: [SigmatelSysTrayApp] stsystra.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [Windows Defender] "c:\program files\windows defender\MSASCui.exe" -hide
mRun: [LogMeIn GUI] "c:\program files\logmein\x86\LogMeInSystray.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [Svc32] c:\program files\microsoft\service32\app.exe
mRun: [Email] C:\Program Files/Email/Internet/run.exe
mRunOnce: [AvgUninstallURL] cmd.exe /c start http://www.avg.com/ww.special-uninstallation-feedback-app?lic=OQBBAFYARgBSAEUARQAtAFYASwBQAEMAQgAtADYAQgBXAEYATQAtAFQAUgBMAFEAUgAtAEIAUgBVAEgAUAAtAEMAUAA4ADYARwA"&"inst=NwA3AC0ANAAyADEAMgAxADMANgAzADIALQBGAFAAOQArADYALQBUAEIAOQArADIALQBGAEwAKwA5AC0AWABPADMANgArADEALQBGADkATQA3AEMAKwA1AC0ARgA5AE0AMQAwAEIAKwAyAC0AWABPADkAKwAxAC0ARgA5AE0AMgArADEALQBEAEQAVAArADQAMgA5ADQAOQAxADIAOAAxADYALQBEAEQAOQAwAEYAKwAxAC0AUwBUADkAMABGAEEAUABQACsAMQAtAEYAOQAwAE0AMQAyAEEATgArADIALQBGADkAMABNADEAMgBBACsAMQAtAEYAOQAwAE0AMQAyAEEAQgArADEALQBVADkANQArADEALQBGADkAMABNADEAMgBBAFQAQgBOACsAMQAtAEYAOQAwAE0AMQAyAEIAKwAxAA"&"prod=90"&"ver=9.0.894
mRunOnce: [SpybotDeletingA3846] command.com /c del "c:\program files\free offers from freeze.com\control.txt"
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
mExplorerRun: [svchost] c:\docume~1\owner\locals~1\temp\svchost.exe
uPolicies-explorer: NoFolderOptions = 1
uPolicies-system: DisableTaskMgr = 1 (0x1)
mPolicies-system: EnableLUA = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
Trusted Zone: realpage.com
Trusted Zone: resiteit.com
DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} - hxxp://download.microsoft.com/download/e/7/3/e7345c16-80aa-4488-ae10-9ac6be844f99/OGAControl.cab
DPF: {48DD0448-9209-4F81-9F6D-D83562940134} - hxxp://lads.myspace.com/upload/MySpaceUploader1005.cab
DPF: {4AEF8AEE-3DE8-4B69-8B6E-6353B6C59B50} - hxxp://onesite.realpage.com/coreglobal/RealpageCab/Realpage.cab
DPF: {549F957E-2F89-11D6-8CFE-00C04F52B225} - hxxp://eversave.coupons.smartsource.com/download/cscmv5X.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1185908599093
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {C20316BF-1881-43B1-8E6B-41080E8070C8} - hxxp://trackit.mckinley.com/downloads/TrackitAudit.cab
DPF: {C7DB51B4-BCF7-4923-8874-7F1A0DC92277} - hxxp://office.microsoft.com/officeupdate/content/opuc4.cab
DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} -
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
DPF: {E9A2B153-810F-4B63-ADFF-8BAAC43A4A2B} - hxxps://www.intersourcing.com/scripts/RPDEClientLib.cab
DPF: {FA91DF8D-53AB-455D-AB20-F2F023E498D3} - hxxp://pmpro.cybersoft.net/Reserved.ReportViewerWebControl.axd?ReportSession=zqpqjx45ti2obvbspegcai45&ControlID=c5e1d082-abc4-47ed-a6bd-9e6c85986f7e&Culture=1033&UICulture=1033&ReportStack=1&OpType=PrintCab
TCP: DhcpNameServer = 10.1.10.1
TCP: Interfaces\{CDC411A3-1D0E-4182-9B13-5F8BD876C616} : DhcpNameServer = 10.1.10.1
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Notify: LMIinit - LMIinit.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\wifd1f~1\MpShHook.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
.
============= SERVICES / DRIVERS ===============
.
R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys --> c:\windows\system32\drivers\mfehidk.sys [?]
R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2011-4-18 165648]
R1 MpKsl787a427b;MpKsl787a427b;c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{998a34a8-45dd-4bca-aac8-820136db5f8a}\MpKsl787a427b.sys [2012-1-19 29904]
R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\logmein\x86\rainfo.sys [2011-9-16 12856]
R2 LMIRfsDriver;LogMeIn Remote File System Driver;c:\windows\system32\drivers\LMIRfsDriver.sys [2009-10-22 47640]
S2 LMIGuardianSvc;LMIGuardianSvc;c:\program files\logmein\x86\LMIGuardianSvc.exe [2011-9-26 374152]
S2 mfevtp;McAfee Validation Trust Protection Service;"c:\windows\system32\mfevtps.exe" --> c:\windows\system32\mfevtps.exe [?]
S2 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
S3 androidusb;SAMSUNG Android Composite ADB Interface Driver;c:\windows\system32\drivers\ssadadb.sys [2011-5-13 30312]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys --> c:\windows\system32\drivers\mferkdet.sys [?]
S3 RTL8192su;%RTL8192su.DeviceDesc.DispName%;c:\windows\system32\drivers\rtl8192su.sys --> c:\windows\system32\drivers\RTL8192su.sys [?]
S3 ssadbus;SAMSUNG Android USB Composite Device driver (WDM);c:\windows\system32\drivers\ssadbus.sys [2011-5-13 121064]
S3 ssadmdfl;SAMSUNG Android USB Modem (Filter);c:\windows\system32\drivers\ssadmdfl.sys [2011-5-13 12776]
S3 ssadmdm;SAMSUNG Android USB Modem Drivers;c:\windows\system32\drivers\ssadmdm.sys [2011-5-13 136808]
S4 LMIRfsClientNP;LMIRfsClientNP; [x]
UnknownUnknown MpKsl4bfb5579;MpKsl4bfb5579; [x]
UnknownUnknown MpKsl4ed9eae6;MpKsl4ed9eae6; [x]
.
=============== Created Last 30 ================
.
2012-01-19 18:21:41 -------- d-----w- c:\program files\Trend Micro
2012-01-19 18:18:03 159608 ----a-w- c:\windows\system32\mfevtps.exe.5e58.deleteme
2012-01-19 17:53:46 14664 ----a-w- c:\windows\stinger.sys
2012-01-19 17:52:21 159608 ----a-w- c:\windows\system32\mfevtps.exe.7203.deleteme
2012-01-19 17:51:47 -------- d-----w- c:\program files\stinger
2012-01-19 15:22:58 -------- d-----w- c:\program files\security1
2012-01-19 15:22:58 -------- d-----w- c:\program files\conduit
2012-01-19 15:18:48 29904 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{998a34a8-45dd-4bca-aac8-820136db5f8a}\MpKsl787a427b.sys
2012-01-19 15:18:46 56200 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{998a34a8-45dd-4bca-aac8-820136db5f8a}\offreg.dll
2012-01-19 15:11:04 -------- d-----w- c:\program files\Spybot - Search & Destroy
2012-01-19 15:11:04 -------- d-----w- c:\documents and settings\all users\application data\Spybot - Search & Destroy
2012-01-19 14:51:28 634632 ----a-w- c:\program files\internet explorer\bk.exe
2012-01-19 14:51:28 46080 --s---w- c:\windows\system32\csrcs.exe
2012-01-19 14:51:28 46080 ----a-w- c:\windows\system32\ping.com
2012-01-19 14:51:28 46080 ----a-w- c:\windows\system32\drivers\winlogon.scr
2012-01-19 14:51:28 -------- d--h--w- c:\program files\Email
2012-01-19 14:51:28 -------- d-----w- c:\documents and settings\owner\application data\Email
2012-01-19 14:51:27 46080 --s---w- c:\windows\system32\nw.exe
2012-01-19 14:51:27 46080 --s---w- c:\documents and settings\owner\svchost.exe
2012-01-19 14:51:26 386 ----a-w- c:\windows\system32\sys.bat
2012-01-18 16:17:13 6557240 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{998a34a8-45dd-4bca-aac8-820136db5f8a}\mpengine.dll
2012-01-15 17:19:54 -------- d-----w- c:\documents and settings\owner\local settings\application data\Apple Computer
2012-01-15 17:19:24 26600 ----a-w- c:\windows\system32\drivers\GEARAspiWDM.sys
2012-01-15 17:19:24 107368 ----a-w- c:\windows\system32\GEARAspi.dll
2012-01-15 17:18:07 -------- d-----w- c:\program files\iPod
2012-01-15 17:18:02 -------- d-----w- c:\program files\iTunes
2012-01-15 17:18:02 -------- d-----w- c:\documents and settings\all users\application data\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2012-01-15 17:17:34 -------- d-----w- c:\documents and settings\owner\local settings\application data\Apple
2012-01-15 17:17:10 4517664 ----a-w- c:\windows\system32\usbaaplrc.dll
2012-01-15 17:17:10 42496 ----a-w- c:\windows\system32\drivers\usbaapl.sys
2012-01-15 17:16:42 -------- d-----w- c:\program files\Bonjour
2011-12-27 17:00:10 -------- d-----w- c:\program files\AppGraffiti
.
==================== Find3M ====================
.
2011-12-19 22:24:01 83360 ----a-w- c:\windows\system32\LMIRfsClientNP.dll
2011-12-19 22:24:01 52096 ----a-w- c:\windows\system32\spool\prtprocs\w32x86\LMIproc.dll
2011-12-19 22:24:00 87424 ----a-w- c:\windows\system32\LMIinit.dll
2011-12-19 22:24:00 30592 ----a-w- c:\windows\system32\LMIport.dll
2011-12-15 22:25:07 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
.
============= FINISH: 14:35:27.03 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 Joeysteg

Joeysteg
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:41 PM

Posted 19 January 2012 - 03:46 PM

Oh yes and my gmer is still running. I will post that up as soon as its done!!!
Thanks again for the awesome help!

#3 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:07:41 PM

Posted 19 January 2012 - 09:24 PM

Hi,

As well as posting the GMER log, please run the following:



Please download aswMBR to your desktop.
  • Double click the aswMBR.exe icon to run it
  • When asked if you want to download Avast's virus definitions please select Yes.
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.
  • You will also notice another file created on the desktop named MBR.dat. Right click that file and select Send To>Compressed (zipped) file. Attach that zipped file in your next reply as well

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#4 Joeysteg

Joeysteg
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:41 PM

Posted 20 January 2012 - 11:32 AM

09:04:53.312 OS Version: Windows 5.1.2600 Service Pack 3
09:04:53.312 Number of processors: 2 586 0x6B01
09:04:53.312 ComputerName: LEASING UserName: Owner
09:04:54.593 Initialize success
09:08:05.515 AVAST engine defs: 12012000
09:14:54.359 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
09:14:54.359 Disk 0 Vendor: WDC_WD800JD-75MSA3 10.01E04 Size: 76293MB BusType: 3
09:14:54.468 Disk 0 MBR read successfully
09:14:54.484 Disk 0 MBR scan
09:14:55.796 Disk 0 Windows XP default MBR code
09:14:55.875 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 76285 MB offset 63
09:14:57.281 Disk 0 scanning sectors +156232125
09:14:58.453 Disk 0 scanning C:\WINDOWS\system32\drivers
09:16:51.890 Service scanning
09:16:52.500 Service MpKsl787a427b c:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{998A34A8-45DD-4BCA-AAC8-820136DB5F8A}\MpKsl787a427b.sys **LOCKED** 32
09:16:53.171 Modules scanning
09:18:07.734 Disk 0 trace - called modules:
09:18:07.750 ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys
09:18:07.750 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x85f79ab8]
09:18:07.750 3 CLASSPNP.SYS[f74c7fd7] -> nt!IofCallDriver -> \Device\00000060[0x85f7ef18]
09:18:07.750 5 ACPI.sys[f735e620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-3[0x85f87d98]
09:18:08.562 AVAST engine scan C:\WINDOWS
09:18:52.859 AVAST engine scan C:\WINDOWS\system32
09:24:38.843 AVAST engine scan C:\WINDOWS\system32\drivers
09:25:32.390 AVAST engine scan C:\Documents and Settings\Owner
09:31:32.656 AVAST engine scan C:\Documents and Settings\All Users
09:33:33.656 Scan finished successfully
10:07:23.078 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Owner\Desktop\MBR.dat"
10:07:23.109 The log file has been saved successfully to "C:\Documents and Settings\Owner\Desktop\aswMBR.txt"

Attached Files



#5 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:07:41 PM

Posted 20 January 2012 - 05:15 PM

Hi,

Please do the following:

Please download TDSSKiller.zip
  • Extract it to your desktop
  • Double click TDSSKiller.exe
  • Press Start Scan
    • Only if Malicious objects are found then ensure Cure is selected
    • Then click Continue > Reboot now
  • Copy and paste the log in your next reply
    • A copy of the log will be saved automatically to the root of the drive (typically C:\)


NEXT



Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#6 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:07:41 PM

Posted 26 January 2012 - 08:17 PM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users