Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

how to remove Worm.Lefgroo.A


  • This topic is locked This topic is locked
27 replies to this topic

#1 12stang

12stang

  • Members
  • 141 posts
  • OFFLINE
  •  
  • Local time:12:10 PM

Posted 13 February 2012 - 06:41 PM

my ie popup with metroflog.com ricardo looked it up whats the best way to remove this

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:10 PM

Posted 13 February 2012 - 08:02 PM

Hello,Worm:Win32/Lefgroo.A is a worm that spreads by dropping copies of itself to all writeable fixed and removable drives in the system.


if you connected a flashdrive to this PC,it and the other machine(s) are infected.


Please download MiniToolBox, save it to your desktop and run it.

Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size.
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.

Note: When using "Reset FF Proxy Settings" option Firefox should be closed.



Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1 <<<== Use this one first.

Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Troubleshoot Malwarebytes' Anti-Malware



I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NOTE: In some instances if no malware is found there will be no log produced.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 12stang

12stang
  • Topic Starter

  • Members
  • 141 posts
  • OFFLINE
  •  
  • Local time:12:10 PM

Posted 13 February 2012 - 08:50 PM

========================= Memory info: ===================================

Percentage of memory in use: 63%
Total physical RAM: 2037.3 MB
Available physical RAM: 752.25 MB
Total Pagefile: 4313.87 MB
Available Pagefile: 2627.77 MB
Total Virtual: 2047.88 MB
Available Virtual: 1963.02 MB

Edited by 12stang, 14 February 2012 - 01:10 AM.


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:10 PM

Posted 13 February 2012 - 09:19 PM

Good,this is the pig,,, C:\WINDOWS\pss\Musica.exe.Startup (Worm.Brontok) ... How is it now?
You needed to reboot to remove them all.

You have some older apps that need to be removed and updated if you want to use them.
Adobe Reader 9.1 (Version: 9.1.0)
Java™ SE Runtime Environment 6 (Version: 1.6.0.0)


iTunes (Version: 8.0.2.20) is up to version 10
HiJackThis (Version: 1.0.0) obsolete

You have 2 Google Toolbars, I am of the belief to remove ANY toolbars.


Update Java and Adobe below.

Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 7 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • From the list, select your OS and Platform (32-bit or 64-bit).
  • If a download for an Offline Installation is available, it is recommended to choose that and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-7u2-windows-i586.exe (or jre-7u2-windows-x64.exe for 64-bit) to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
  • The McAfee Security Scan Plus tool is installed by default unless you uncheck the McAfee installation box when updating Java.
Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.


Similarly Update to Adobe Reader X (10.1.0)
Note UN check the box so you do not install the toolbar,unless you really want it..

Free! Google Toolbar search Google from any web page, block pop-ups

Yes, install Google Toolbar - optional

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 12stang

12stang
  • Topic Starter

  • Members
  • 141 posts
  • OFFLINE
  •  
  • Local time:12:10 PM

Posted 13 February 2012 - 09:43 PM

yes it had to reboot and nothing has popped up like before thank for the help.also they dont have a 32 bit java app what do mean by the toolbar post that i should or i shouldn.and another question do you think my laptop has a worst virus because i think thats were i got that virus from a flashdrive

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:10 PM

Posted 13 February 2012 - 09:55 PM

also they dont have a 32 bit java app
The 2nd from bottom is the 32 ..x86 = 32

Windows x86 Offline 19.35 MB jre-7u2-windows-i586.exe


what do mean by the toolbar post that i should or i shouldn.
I don't install any toolbars,I feel they are soye=ware and slow the system down.

and another question do you think my laptop has a worst virus because i think thats were i got that virus from a flashdrive

Scan the flashdrive with an antivirus.

Did you run the ESET scan you didn't post a log or say anything about it.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 12stang

12stang
  • Topic Starter

  • Members
  • 141 posts
  • OFFLINE
  •  
  • Local time:12:10 PM

Posted 13 February 2012 - 10:02 PM

okay iam do that i think iam need some help on my other laptop too.no i did run it what is it for

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:10 PM

Posted 13 February 2012 - 10:36 PM

Its a malware scanner ,,to make sure we did not miss any thing.

OK, lets finish this one and then we can do the laptop

Edited by boopme, 13 February 2012 - 10:36 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 12stang

12stang
  • Topic Starter

  • Members
  • 141 posts
  • OFFLINE
  •  
  • Local time:12:10 PM

Posted 14 February 2012 - 01:03 AM

did the last step



C:\google\google.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Intel\Intel.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Intel\ExtremeGraphics\ExtremeGraphics.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Intel\Logs\Logs.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Start Menu\Start Menu.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Start Menu\Programs\Programs.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Contacts\Contacts.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\Documents.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\Musica.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\Floodgate\Floodgate.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\Harman Pro\Harman Pro.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\kudosrocklegend\kudosrocklegend.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\Lizzie McGuire CD-ROMS\Lizzie McGuire CD-ROMS.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\Lizzie McGuire CD-ROMS\Fashion all over it!\Fashion all over it!.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\Lizzie McGuire CD-ROMS\Go Lizzie!\Go Lizzie!.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\Lizzie McGuire CD-ROMS\Whoops\Whoops.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\Morpheus Playlists\Morpheus Playlists.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\Morpheus Shared\Morpheus Shared.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\My Google Gadgets\My Google Gadgets.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\My Scans\My Scans.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\OneNote Notebooks\OneNote Notebooks.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Documents\Updater\Updater.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Downloads\SystemArchitect1.60.0.0-R1\SystemArchitect1.60.0.0-R1.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Favorites\Favorites.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Favorites\Links\Links.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Favorites\Microsoft Websites\Microsoft Websites.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Favorites\MSN Websites\MSN Websites.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Favorites\Windows Live\Windows Live.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Incomplete\Incomplete.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Links\Links.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Music.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Alacranes Musical\Alacranes Musical.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Aventura\Aventura.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Bone Thugs-N-Harmony\Bone Thugs-N-Harmony.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Chamillionaire\Chamillionaire.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Chingo Bling & Stunta\Chingo Bling & Stunta.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Christina Aguilera\Christina Aguilera.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Christina Aguilera\Back to Basics\Back to Basics.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Compilations\Compilations.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Crime Mob\Crime Mob.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Don Omar\Don Omar.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Filero\Filero.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Filero & X-Ray\Filero & X-Ray.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\game untold\game untold.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\gilberto santa rosa\gilberto santa rosa.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Guerilla Maab\Guerilla Maab.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Hector El Father\Hector El Father.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Hector _El Father_\Hector _El Father_.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Hoodfellaz\Hoodfellaz.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Huey\Huey.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Immortal Soldierz\Immortal Soldierz.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\iTunes\iTunes.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Juan Gotti\Juan Gotti.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Latin One Stop Presents\Latin One Stop Presents.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Latin Throne\Latin Throne.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Lorenzo de Monteclaro\Lorenzo de Monteclaro.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Los Federales de Nuevo León\Los Federales de Nuevo León.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Los Invasores De Nuevo Leon\Los Invasores De Nuevo Leon.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Los Originales de San Juan\Los Originales de San Juan.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Lucky Luciano\Lucky Luciano.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Master p\Master p.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Mike Jones featuring Bun B & Snoop\Mike Jones featuring Bun B & Snoop.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Nickelback\Nickelback.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Paul Wall\Paul Wall.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Paula DeAnda\Paula DeAnda.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Playlists\Playlists.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Ramon Ayala\Ramon Ayala.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Rihanna\Rihanna.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Rihanna\A Girl Like Me\A Girl Like Me.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Rihanna\Good Girl Gone Bad\Good Girl Gone Bad.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\S.P.M\S.P.M.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\S.P.M\The Last Chair Violinist\The Last Chair Violinist.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Scarface Presents Green City featuring M\Scarface Presents Green City featuring M.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Shadow\Shadow.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\South Park Mexican\South Park Mexican.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\The Most Hated\The Most Hated.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Trae\Trae.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Trae & Z-RO\Trae & Z-RO.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Twin Beredaz\Twin Beredaz.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Unknown Artist\Unknown Artist.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Various Artists\Various Artists.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Vicente Fernández\Vicente Fernández.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Z Ro\Z Ro.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Music\Z-RO\Z-RO.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\Pictures.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2007-06-14\2007-06-14.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2007-07-17\2007-07-17.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2007-08-10\2007-08-10.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2007-09-11\2007-09-11.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2007-09-23\2007-09-23.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2007-09-30\2007-09-30.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2007-11-22\2007-11-22.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2007-12-21\2007-12-21.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2007-12-25\2007-12-25.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2007-12-27\2007-12-27.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-01-07\2008-01-07.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-01-15\2008-01-15.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-01-20\2008-01-20.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-01-24 lol\2008-01-24 lol.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-02-04\2008-02-04.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-02-11\2008-02-11.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-02-24\2008-02-24.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-02-28\2008-02-28.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-03-02\2008-03-02.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-03-13\2008-03-13.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-03-17\2008-03-17.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-03-23\2008-03-23.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-03-25\2008-03-25.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-04-21\2008-04-21.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-04-23\2008-04-23.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-04-26\2008-04-26.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-05-29\2008-05-29.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-06-01\2008-06-01.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-06-13\2008-06-13.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-06-16\2008-06-16.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-06-26\2008-06-26.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-07-01 SUMMER'\2008-07-01 SUMMER'.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-07-29 MEXiCO\2008-07-29 MEXiCO.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-08-06 SUMMAh bAbY\2008-08-06 SUMMAh bAbY.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-08-31 ChURCh\2008-08-31 ChURCh.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-09-08 fUN TiMEz\2008-09-08 fUN TiMEz.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-09-23 hURRiCANEE iKEEE\2008-09-23 hURRiCANEE iKEEE.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-10-09 QUiNCiANERA\2008-10-09 QUiNCiANERA.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-10-18 q2e3r43\2008-10-18 q2e3r43.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-10-26 25-26\2008-10-26 25-26.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-10-26 25-26\2008-10-22 fff\2008-10-22 fff.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-11-09 QUiNCE\2008-11-09 QUiNCE.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-11-27 MEEE\2008-11-27 MEEE.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-11-27 MEEE\2008-12-27 ha\2008-12-27 ha.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2008-11-27 MEEE\2009-01-02 09 hoe\2009-01-02 09 hoe.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-02-17 09'\2009-02-17 09'.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-03-16 hahaha 09'\2009-03-16 hahaha 09'.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-03-25 09''\2009-03-25 09''.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-04-26 susy 15\2009-04-26 susy 15.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-05-03 5-3-09\2009-05-03 5-3-09.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-05-24 nasa!\2009-05-24 nasa!.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-06-09 summahh\2009-06-09 summahh.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-07-05 mexico\2009-07-05 mexico.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-07-14 cgfh\2009-07-14 cgfh.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-08-07 chloe'\2009-08-07 chloe'.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-08-30 good weekend\2009-08-30 good weekend.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-09-07 cookie\2009-09-07 cookie.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-10-07 baby\2009-10-07 baby.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-10-25 emily\2009-10-25 emily.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-11-14 mayra bdayyyyyyyy 16 bleep\2009-11-14 mayra bdayyyyyyyy 16 bleep.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2009-12-20 emilyyyyyyyyy\2009-12-20 emilyyyyyyyyy.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2010-01-10 10'\2010-01-10 10'.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2010-05-26\2010-05-26.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2010-06-13\2010-06-13.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2010-07-16 jayson\2010-07-16 jayson.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2010-09-01 jaysonnnn\2010-09-01 jaysonnnn.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2010-09-13 Jayson\2010-09-13 Jayson.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2010-10-06 MAYRA\2010-10-06 MAYRA.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2010-11-12 JAYSONNNN\2010-11-12 JAYSONNNN.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2011-01-04 Holidays 2010\2011-01-04 Holidays 2010.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2011-05-11 2011\2011-05-11 2011.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2011-06-25 May&&June'\2011-06-25 May&&June'.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2011-07-30 Mayra's Graduation\2011-07-30 Mayra's Graduation.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2011-07-31 june&july\2011-07-31 june&july.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\2011-08-16 mayra\2011-08-16 mayra.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\3-23-2007\3-23-2007.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\4-13-2007\4-13-2007.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\4-17-2007\4-17-2007.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\AdRiANA liMA\AdRiANA liMA.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\lAYOUTz\lAYOUTz.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\lAYOUTz\JORGE!\JORGE!.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\lAYOUTz\SWiMMiNG\SWiMMiNG.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\MAyRA;z STUff!\MAyRA;z STUff!.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\New Folder (2)\New Folder (2).exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\New Folder (2)\2008-07-09 lOWRidER bleep=]\2008-07-09 lOWRidER bleep=].exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\New Folder (2)\tats\tats.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Pictures\qUOTEz\qUOTEz.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Saved Games.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Microsoft Games\Microsoft Games.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Microsoft Games\Chess Titans\Chess Titans.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Microsoft Games\FreeCell\FreeCell.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Microsoft Games\Hearts\Hearts.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Microsoft Games\Mahjong Titans\Mahjong Titans.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Microsoft Games\Purble Place\Purble Place.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Microsoft Games\Solitaire\Solitaire.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Microsoft Games\Spider Solitaire\Spider Solitaire.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Sandlot Games\Sandlot Games.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Sandlot Games\Ballhalla\Ballhalla.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Saved Games\Sandlot Games\Super Granny 4\Super Granny 4.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Searches\Searches.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Shared\Shared.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Owner\Videos\Videos.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\Users\Public\Pictures\Sample Pictures\MY EVREYTHiNGGGGG\MY EVREYTHiNGGGGG.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\WINDOWS\SMINST\SMINST.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\WINDOWS\System32\com\dmp\dmp.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\WINDOWS\System32\spool\PRINTERS\PRINTERS.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\WINDOWS\System32\Tasks\Tasks.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
C:\WINDOWS\tracing\tracing.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
D:\Musica.exe Win32/VB.NMS trojan cleaned by deleting - quarantined
D:\recovery\recovery.exe Win32/VB.NMS trojan cleaned by deleting - quarantined

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:10 PM

Posted 14 February 2012 - 02:30 PM

It appears you are downloading dangerous files. You removed part of the log above so I cannot tell you which ones.
How is it running now?


Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 12stang

12stang
  • Topic Starter

  • Members
  • 141 posts
  • OFFLINE
  •  
  • Local time:12:10 PM

Posted 14 February 2012 - 04:00 PM

is running better nothing has popped up and its running smoother also i got mcafee is that good or should i put something else

#12 12stang

12stang
  • Topic Starter

  • Members
  • 141 posts
  • OFFLINE
  •  
  • Local time:12:10 PM

Posted 14 February 2012 - 04:12 PM

Malwarebytes Anti-Malware 1.60.1.1000
www.malwarebytes.org

Database version: v2012.02.14.05

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 7.0.6002.18005
Owner :: OWNER-PC [administrator]

2/14/2012 3:03:57 PM
mbam-log-2012-02-14 (15-03-57).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 186671
Time elapsed: 4 minute(s), 36 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

#13 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:10 PM

Posted 14 February 2012 - 08:00 PM

Hello, the AV tool you prefer is up to you.
I prefer the Avira Antivir Free or ESET pay.

Your infection a trojan downloader dropped by another malware Trojan. It connects to certain web servers to download other malware. Again be careful what you download. If your MacAfee doesn't allow you to scan a download then switch it out for Avira which will. I save my d'loads to the Desktop and then scan them before I open them.


If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.

Tips to protect yourself against malware and reduce the potential for re-infection:Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs. They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users. The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications. Read P2P Software User Advisories and Risks of File-Sharing Technology.

Keeping Autorun enabled on USB and other removable drives has become a significant security risk due to the increasing number of malware variants that can infect them and transfer the infection to your computer. To learn more about this risk, please read:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#14 12stang

12stang
  • Topic Starter

  • Members
  • 141 posts
  • OFFLINE
  •  
  • Local time:12:10 PM

Posted 14 February 2012 - 08:51 PM

got that done.
i ran the minibox and malware bytes on my laptop and a message keeped popping up but it still finish the log here it is

and iam running eset right now


MiniToolBox by Farbar Version: 18-01-2012
Ran by ivan (administrator) on 14-02-2012 at 14:43:40
Microsoft® Windows Vista™ Home Premium Service Pack 1 (X64)
Boot Mode: Normal
***************************************************************************

========================= Flush DNS: ===================================

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.
Hosts file not detected in the default directory
========================= IP Configuration: ================================

NVIDIA nForce Networking Controller = Local Area Connection (Connected)
Broadcom 4321AG 802.11a/b/g/draft-n Wi-Fi Adapter = Wireless Network Connection (Media disconnected)
The following helper DLL cannot be loaded: IFMON.DLL.
The following command was not found: int ip dump.

Windows IP Configuration

Host Name . . . . . . . . . . . . : ivan-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Broadcast
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : hsd1.tx.comcast.net.

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . : hsd1.tx.comcast.net.
Description . . . . . . . . . . . : NVIDIA nForce Networking Controller
Physical Address. . . . . . . . . : 00-1E-68-85-1B-14
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::8cb9:7383:6a14:f6d1%11(Preferred)
IPv4 Address. . . . . . . . . . . : 76.31.197.62(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.248.0
Lease Obtained. . . . . . . . . . : Tuesday, February 14, 2012 2:42:58 PM
Lease Expires . . . . . . . . . . : Saturday, February 18, 2012 1:01:48 AM
Default Gateway . . . . . . . . . : 76.31.192.1
DHCP Server . . . . . . . . . . . : 68.87.66.18
DNS Servers . . . . . . . . . . . : 75.75.76.76
75.75.75.75
NetBIOS over Tcpip. . . . . . . . : Enabled

Wireless LAN adapter Wireless Network Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : carewifi.org
Description . . . . . . . . . . . : Broadcom 4321AG 802.11a/b/g/draft-n Wi-Fi Adapter
Physical Address. . . . . . . . . : 00-21-00-1A-9A-25
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 13:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{3106ABB9-A3A7-45F6-9568-C38F62C8F0AB}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 15:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.hsd1.tx.comcast.net.
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 7:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 6TO4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 6:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft 6to4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 18:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 02-00-54-55-4E-01
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 11:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 6TO4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 12:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 6TO4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 14:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 6TO4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 16:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 6TO4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 17:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.hsd1.tx.comcast.net.
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 19:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.carewifi.org
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 20:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{3D5901E1-D460-4116-BCC7-C9EB1C839C4C}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 21:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 6TO4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes


Pinging google.com [74.125.227.110] with 32 bytes of data:

Reply from 74.125.227.110: bytes=32 time=16ms TTL=56

Reply from 74.125.227.110: bytes=32 time=15ms TTL=56



Ping statistics for 74.125.227.110:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 15ms, Maximum = 16ms, Average = 15ms



Pinging yahoo.com [98.139.183.24] with 32 bytes of data:

Reply from 98.139.183.24: bytes=32 time=80ms TTL=49

Reply from 98.139.183.24: bytes=32 time=150ms TTL=48



Ping statistics for 98.139.183.24:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 80ms, Maximum = 150ms, Average = 115ms



Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:

Reply from 208.43.87.2: Destination host unreachable.

Reply from 208.43.87.2: Destination host unreachable.



Ping statistics for 208.43.87.2:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),



Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
11 ...00 1e 68 85 1b 14 ...... NVIDIA nForce Networking Controller
10 ...00 21 00 1a 9a 25 ...... Broadcom 4321AG 802.11a/b/g/draft-n Wi-Fi Adapter
1 ........................... Software Loopback Interface 1
12 ...00 00 00 00 00 00 00 e0 isatap.{3106ABB9-A3A7-45F6-9568-C38F62C8F0AB}
13 ...00 00 00 00 00 00 00 e0 isatap.hsd1.tx.comcast.net.
21 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
15 ...00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter
14 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
16 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
20 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
17 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
18 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
24 ...00 00 00 00 00 00 00 e0 isatap.hsd1.tx.comcast.net.
22 ...00 00 00 00 00 00 00 e0 isatap.carewifi.org
23 ...00 00 00 00 00 00 00 e0 isatap.{3D5901E1-D460-4116-BCC7-C9EB1C839C4C}
25 ...00 00 00 00 00 00 00 e0 6TO4 Adapter
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 76.31.192.1 76.31.197.62 20
76.31.192.0 255.255.248.0 On-link 76.31.197.62 276
76.31.197.62 255.255.255.255 On-link 76.31.197.62 276
76.31.199.255 255.255.255.255 On-link 76.31.197.62 276
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
169.254.0.0 255.255.0.0 On-link 76.31.197.62 296
169.254.255.255 255.255.255.255 On-link 76.31.197.62 276
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 76.31.197.62 276
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 76.31.197.62 276
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
1 306 ::1/128 On-link
11 276 fe80::/64 On-link
11 276 fe80::8cb9:7383:6a14:f6d1/128
On-link
1 306 ff00::/8 On-link
11 276 ff00::/8 On-link
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 mswsock.dll [File Not found] ()
Catalog5 02 C:\Windows\SysWOW64\napinsp.dll [50176] (Microsoft Corporation)
Catalog5 03 C:\Windows\SysWOW64\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 04 C:\Windows\SysWOW64\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 05 mswsock.dll [File Not found] ()
Catalog5 06 C:\Windows\SysWOW64\winrnr.dll [19968] (Microsoft Corporation)
Catalog9 01 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 02 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 03 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 04 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 05 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Corporation)
Catalog9 06 C:\Windows\SysWOW64\wpclsp.dll [72192] (Microsoft Co

#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:10 PM

Posted 14 February 2012 - 09:11 PM

Ok let me know about ESET..

Your HOSTS file may be infected.
Reset the HOSTS file
As this infection also changes your Windows HOSTS file, we want to replace this file with the default version for your operating system.
Some types of malware will alter the HOSTS file as part of its infection. Please follow the instructions provided in How do I reset the hosts file back to the default?

To reset the hosts file automatically,go HERE click the Posted Image button. Then just follow the prompts in the Fix it wizard.


OR
Click Run in the File Download dialog box or save MicrosoftFixit50267.msi to your Desktop and double-click on it to run. Then just follow the promots in the Fix it wizard.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users