Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Help! Have virus and need immediate help

  • This topic is locked This topic is locked
16 replies to this topic

#1 hersheykissed


  • Members
  • 104 posts
  • Local time:07:15 PM

Posted 04 December 2012 - 12:33 PM

Hi, I know that there's a wait time, but I was hoping I might still be able to get immediate help. I have a virus on my computer, but I am on a deadline for work and it's confidential information so I am afraid to work on it until the virus is removed. My deadline is in a few hours.

I have Windows 7. I ran a full scan on Malwarbytes, and it got some stuff, but not everything. My computer is still not working right, and when I run rkill again, there's still stuff showing up. I was using Microsoft Security Essentials, and it had been just updated a few days ago, and there was no notice of anything showing up, but my computer was running funny, so I ran rkill to check. That's when I found that I was infected.

And thank you!

Here's the rkill report:

This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.

Rkill was run on 12/04/2012 at 11:26:13.
Operating System: Windows 7 Home Premium

Processes terminated by Rkill or while it was running:

C:\Program Files (x86)\Acer\clear.fi\MVP\.\Kernel\DMR\DMREngine.exe

Rkill completed on 12/04/2012 at 11:26:23.

Edit: Moved topic from AntiVirus, Firewall and Privacy Products and Protection Methods to the more appropriate forum. ~ Animal

BC AdBot (Login to Remove)


#2 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,534 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:07:15 PM

Posted 04 December 2012 - 02:45 PM

Hello, if you have NOT rebooted then system since running RKill then run these next.. IF you have run RKill again.

Then these..... Reboot after all are done.

Please download Malwarebytes Anti-Malware Posted Image and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you cannot update Malwarebytes or use the Internet to download any files to the infected computer, manually update the database by following the instructions in FAQ Section A: 4. Issues.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When the scan is complete, click OK, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.

-- Some types of malware will target Malwarebytes and other security tools to keep them from running properly. If that's the case, use Malwarebytes Chameleon and follow the onscreen instructions. The Chameleon folder can be accessed by opening the program folder for Malwarebytes Anti-Malware (normally C:\Program Files\Malwarebytes' Anti-Malware or C:\Program Files (x86)\Malwarebytes' Anti-Malware).

Please Download TDSSkiller
Launch it.
Click on change parameters-Select TDLFS file system
Click on "Scan".
Please post the LOG report(log file should be in your C drive)

Do not change the default options on scan results.


ADW Cleaner

Please download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • You will be prompted to restart your computer. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.



I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image
      icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.

NOTE:Sometimes if ESET finds no infections it will not create a log.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 hersheykissed

  • Topic Starter

  • Members
  • 104 posts
  • Local time:07:15 PM

Posted 04 December 2012 - 04:11 PM

Hi, thank you so much for you quick response. I'm having trouble getting online now, so I'll reboot the computer in safe mode. I hope that's okay.

My computer keeps crashing on me now and freezing on me.

#4 hersheykissed

  • Topic Starter

  • Members
  • 104 posts
  • Local time:07:15 PM

Posted 04 December 2012 - 04:15 PM

I'm at the public library. How do I download onto an usb drive? and they're blocking me from downloading the tskiller.

#5 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,534 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:07:15 PM

Posted 04 December 2012 - 04:23 PM

Either copy to the desktop and then to the drive or directly to the drive.
Try safe mode with Networking.

I have to run for about an hoour.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 hersheykissed

  • Topic Starter

  • Members
  • 104 posts
  • Local time:07:15 PM

Posted 04 December 2012 - 06:50 PM

Malwarebytes Anti-Malware

Database version: v2012.12.04.12

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Alice :: ALICE-PC [administrator]

12/4/2012 5:22:33 PM
mbam-log-2012-12-04 (17-22-33).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 233464
Time elapsed: 5 minute(s), 38 second(s)

Memory Processes Detected: 1
C:\Windows\svchost.exe (Trojan.Agent) -> 12620 -> Delete on reboot.

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 1
C:\Windows\svchost.exe (Trojan.Agent) -> Delete on reboot.


#7 hersheykissed

  • Topic Starter

  • Members
  • 104 posts
  • Local time:07:15 PM

Posted 04 December 2012 - 07:16 PM

I don't know where in the C drive to find the log for the TDSSkiller.

It found 2 threats, one that said to cure, and the other (medium risk) it said skip. I just pressed continue. Do I need to do something for it? It is TDSS File System.

Edited by hersheykissed, 04 December 2012 - 07:19 PM.

#8 hersheykissed

  • Topic Starter

  • Members
  • 104 posts
  • Local time:07:15 PM

Posted 04 December 2012 - 07:28 PM

# AdwCleaner v2.011 - Logfile created 12/04/2012 at 18:23:12
# Updated 02/12/2012 by Xplode
# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
# User : Alice - ALICE-PC
# Boot Mode : Normal
# Running from : C:\Users\Alice\Desktop\AdwCleaner.exe
# Option [Delete]

***** [Services] *****

***** [Files / Folders] *****

File Deleted : C:\Users\Public\Desktop\eBay.lnk
Folder Deleted : C:\Program Files (x86)\Conduit
Folder Deleted : C:\Users\Alice\AppData\Local\Conduit
Folder Deleted : C:\Users\Alice\AppData\LocalLow\boost_interprocess
Folder Deleted : C:\Users\Alice\AppData\LocalLow\Conduit
Folder Deleted : C:\Users\Alice\AppData\Roaming\Mozilla\Firefox\Profiles\hl8d024m.default\ConduitCommon
Folder Deleted : C:\Users\Alice\AppData\Roaming\Mozilla\Firefox\Profiles\hl8d024m.default\CT3072253
Folder Deleted : C:\Users\Alice\AppData\Roaming\Mozilla\Firefox\Profiles\hl8d024m.default\extensions\{687578b9-7132-4a7a-80e4-30ee31099e03}

***** [Registry] *****

Key Deleted : HKCU\Software\AppDataLow\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT3072253
Key Deleted : HKLM\Software\Conduit
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5}

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16455

[OK] Registry is clean.

-\\ Mozilla Firefox v11.0 (en-US)

Profile name : default
File : C:\Users\Alice\AppData\Roaming\Mozilla\Firefox\Profiles\hl8d024m.default\prefs.js

Deleted : user_pref("CT3072253..clientLogIsEnabled", false);
Deleted : user_pref("CT3072253..clientLogServiceUrl", "hxxp://clientlog.users.conduit.com/ClientDiagnostics.as[...]
Deleted : user_pref("CT3072253..uninstallLogServiceUrl", "hxxp://uninstall.users.conduit.com/Uninstall.asmx/Re[...]
Deleted : user_pref("CT3072253.ALLOW_SHOWING_HIDDEN_TOOLBAR", false);
Deleted : user_pref("CT3072253.AboutPrivacyUrl", "hxxp://www.conduit.com/privacy/Default.aspx");
Deleted : user_pref("CT3072253.BrowserCompStateIsOpen_129573915102477663", true);
Deleted : user_pref("CT3072253.BrowserCompStateIsOpen_129749445881800338", true);
Deleted : user_pref("CT3072253.BrowserCompStateIsOpen_129805375651312503", true);
Deleted : user_pref("CT3072253.CTID", "CT3072253");
Deleted : user_pref("CT3072253.CurrentServerDate", "4-11-2012");
Deleted : user_pref("CT3072253.DSInstall", false);
Deleted : user_pref("CT3072253.DialogsAlignMode", "LTR");
Deleted : user_pref("CT3072253.DialogsGetterLastCheckTime", "Thu Nov 01 2012 12:25:22 GMT-0500 (Central Daylig[...]
Deleted : user_pref("CT3072253.DownloadReferralCookieData", "");
Deleted : user_pref("CT3072253.FirstServerDate", "5-7-2012");
Deleted : user_pref("CT3072253.FirstTime", true);
Deleted : user_pref("CT3072253.FirstTimeFF3", true);
Deleted : user_pref("CT3072253.FirstTimeHiddenVer", true);
Deleted : user_pref("CT3072253.FixPageNotFoundErrors", true);
Deleted : user_pref("CT3072253.GroupingServerCheckInterval", 1440);
Deleted : user_pref("CT3072253.GroupingServiceUrl", "hxxp://grouping.services.conduit.com/");
Deleted : user_pref("CT3072253.HPInstall", false);
Deleted : user_pref("CT3072253.HasUserGlobalKeys", true);
Deleted : user_pref("CT3072253.HomePageProtectorEnabled", false);
Deleted : user_pref("CT3072253.HomepageBeforeUnload", "chrome://branding/locale/browserconfig.properties");
Deleted : user_pref("CT3072253.Initialize", true);
Deleted : user_pref("CT3072253.InitializeCommonPrefs", true);
Deleted : user_pref("CT3072253.InstallationAndCookieDataSentCount", 3);
Deleted : user_pref("CT3072253.InstallationId", "fft78B6.tmp.exe");
Deleted : user_pref("CT3072253.InstallationType", "XPE");
Deleted : user_pref("CT3072253.InstalledDate", "Thu Jul 05 2012 10:08:09 GMT-0500 (Central Daylight Time)");
Deleted : user_pref("CT3072253.IsAlertDBUpdated", true);
Deleted : user_pref("CT3072253.IsGrouping", false);
Deleted : user_pref("CT3072253.IsInitSetupIni", true);
Deleted : user_pref("CT3072253.IsMulticommunity", false);
Deleted : user_pref("CT3072253.IsOpenThankYouPage", true);
Deleted : user_pref("CT3072253.IsOpenUninstallPage", false);
Deleted : user_pref("CT3072253.LanguagePackLastCheckTime", "Sat Nov 03 2012 00:13:23 GMT-0500 (Central Dayligh[...]
Deleted : user_pref("CT3072253.LanguagePackReloadIntervalMM", 1440);
Deleted : user_pref("CT3072253.LanguagePackServiceUrl", "hxxp://translation.users.conduit.com/Translation.ashx[...]
Deleted : user_pref("CT3072253.LastLogin_3.13.0.6", "Sun Aug 05 2012 21:55:09 GMT-0500 (Central Daylight Time)[...]
Deleted : user_pref("CT3072253.LastLogin_3.14.1.0", "Sat Sep 08 2012 18:53:12 GMT-0500 (Central Daylight Time)[...]
Deleted : user_pref("CT3072253.LastLogin_3.15.1.0", "Sun Nov 04 2012 13:42:18 GMT-0600 (Central Standard Time)[...]
Deleted : user_pref("CT3072253.LatestVersion", "");
Deleted : user_pref("CT3072253.Locale", "en");
Deleted : user_pref("CT3072253.MCDetectTooltipHeight", "83");
Deleted : user_pref("CT3072253.MCDetectTooltipUrl", "hxxp://@EB_INSTALL_LINK@/rank/tooltip/?version=1");
Deleted : user_pref("CT3072253.MCDetectTooltipWidth", "295");
Deleted : user_pref("CT3072253.MyStuffEnabledAtInstallation", false);
Deleted : user_pref("CT3072253.OriginalFirstVersion", "");
Deleted : user_pref("CT3072253.SearchBoxWidth", 100);
Deleted : user_pref("CT3072253.SearchCaption", "uTorrentControl2 Customized Web Search");
Deleted : user_pref("CT3072253.SearchEngineBeforeUnload", "chrome://browser-region/locale/region.properties");
Deleted : user_pref("CT3072253.SearchFromAddressBarIsInit", true);
Deleted : user_pref("CT3072253.SearchFromAddressBarUrl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT307[...]
Deleted : user_pref("CT3072253.SearchInNewTabEnabled", true);
Deleted : user_pref("CT3072253.SearchInNewTabIntervalMM", 1440);
Deleted : user_pref("CT3072253.SearchInNewTabLastCheckTime", "Thu Nov 01 2012 12:25:22 GMT-0500 (Central Dayli[...]
Deleted : user_pref("CT3072253.SearchInNewTabServiceUrl", "hxxp://newtab.conduit-hosting.com/newtab/?ctid=EB_T[...]
Deleted : user_pref("CT3072253.SearchProtectorEnabled", false);
Deleted : user_pref("CT3072253.SearchProtectorToolbarDisabled", false);
Deleted : user_pref("CT3072253.SendProtectorDataViaLogin", true);
Deleted : user_pref("CT3072253.ServiceMapLastCheckTime", "Thu Nov 01 2012 12:25:19 GMT-0500 (Central Daylight [...]
Deleted : user_pref("CT3072253.SettingsLastCheckTime", "Thu Nov 01 2012 12:25:18 GMT-0500 (Central Daylight Ti[...]
Deleted : user_pref("CT3072253.SettingsLastUpdate", "1351523139");
Deleted : user_pref("CT3072253.TBHomePageUrl", "hxxp://search.conduit.com/?ctid=CT3072253&SearchSource=13");
Deleted : user_pref("CT3072253.ThirdPartyComponentsInterval", 504);
Deleted : user_pref("CT3072253.ThirdPartyComponentsLastCheck", "Thu Nov 01 2012 12:25:18 GMT-0500 (Central Day[...]
Deleted : user_pref("CT3072253.ThirdPartyComponentsLastUpdate", "1331805997");
Deleted : user_pref("CT3072253.ToolbarShrinkedFromSetup", false);
Deleted : user_pref("CT3072253.TrusteLinkUrl", "hxxp://trust.conduit.com/CT3072253");
Deleted : user_pref("CT3072253.TrustedApiDomains", "conduit.com,conduit-hosting.com,conduit-services.com,clien[...]
Deleted : user_pref("CT3072253.UserID", "UN99074411166861262");
Deleted : user_pref("CT3072253.ValidationData_Toolbar", 2);
Deleted : user_pref("CT3072253.alertChannelId", "1463702");
Deleted : user_pref("CT3072253.autoDisableScopes", -1);
Deleted : user_pref("CT3072253.backendstorage.cbcountry_001", "5553");
Deleted : user_pref("CT3072253.backendstorage.cbfirsttime", "546875204A756C20303520323031322031303A30383A31322[...]
Deleted : user_pref("CT3072253.backendstorage.facebook_mode", "32");
Deleted : user_pref("CT3072253.backendstorage.facebook_user_locale", "656E");
Deleted : user_pref("CT3072253.backendstorage.url_history0001", "687474703A2F2F7472616E736372697074696F6E68617[...]
Deleted : user_pref("CT3072253.generalConfigFromLogin", "{\"ApiMaxAlerts\":\"12\",\"SocialDomains\":\"social.c[...]
Deleted : user_pref("CT3072253.globalFirstTimeInfoLastCheckTime", "Thu Nov 01 2012 12:25:22 GMT-0500 (Central [...]
Deleted : user_pref("CT3072253.homepageProtectorEnableByLogin", true);
Deleted : user_pref("CT3072253.initDone", true);
Deleted : user_pref("CT3072253.isAppTrackingManagerOn", false);
Deleted : user_pref("CT3072253.myStuffEnabled", true);
Deleted : user_pref("CT3072253.myStuffPublihserMinWidth", 400);
Deleted : user_pref("CT3072253.myStuffSearchUrl", "hxxp://Apps.conduit.com/search?q=SEARCH_TERM&SearchSourceOr[...]
Deleted : user_pref("CT3072253.myStuffServiceIntervalMM", 1440);
Deleted : user_pref("CT3072253.myStuffServiceUrl", "hxxp://mystuff.conduit-services.com/MyStuffService.ashx?Co[...]
Deleted : user_pref("CT3072253.navigateToUrlOnSearch", false);
Deleted : user_pref("CT3072253.oldAppsList", "129295695672325902,129571859753931591,111,129593762370823811,129[...]
Deleted : user_pref("CT3072253.revertSettingsEnabled", false);
Deleted : user_pref("CT3072253.searchProtectorDialogDelayInSec", 10);
Deleted : user_pref("CT3072253.searchProtectorEnableByLogin", true);
Deleted : user_pref("CT3072253.testingCtid", "");
Deleted : user_pref("CT3072253.toolbarAppMetaDataLastCheckTime", "Thu Nov 01 2012 12:25:22 GMT-0500 (Central D[...]
Deleted : user_pref("CT3072253.toolbarContextMenuLastCheckTime", "Thu Nov 01 2012 12:25:22 GMT-0500 (Central D[...]
Deleted : user_pref("CT3072253.usagesFlag", 2);
Deleted : user_pref("CommunityToolbar.ETag.hxxp://Settings.toolbar.search.conduit.com/root/CT3072253/CT3072253[...]
Deleted : user_pref("CommunityToolbar.ETag.hxxp://appsmetadata.toolbar.conduit-services.com/?ctid=CT3072253", [...]
Deleted : user_pref("CommunityToolbar.ETag.hxxp://contextmenu.toolbar.conduit-services.com/?name=GottenApps&lo[...]
Deleted : user_pref("CommunityToolbar.ETag.hxxp://contextmenu.toolbar.conduit-services.com/?name=OtherApps&loc[...]
Deleted : user_pref("CommunityToolbar.ETag.hxxp://contextmenu.toolbar.conduit-services.com/?name=SharedApps&lo[...]
Deleted : user_pref("CommunityToolbar.ETag.hxxp://contextmenu.toolbar.conduit-services.com/?name=Toolbar&local[...]
Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.alert.conduit-services.com/alert/dlg.pkg", "\[...]
Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.toolbar.conduit-services.com/DLG.pkg?ver=3.13[...]
Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.toolbar.conduit-services.com/DLG.pkg?ver=3.14[...]
Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.toolbar.conduit-services.com/DLG.pkg?ver=3.15[...]
Deleted : user_pref("CommunityToolbar.ETag.hxxp://servicemap.conduit-services.com/Toolbar/?ownerId=CT3072253",[...]
Deleted : user_pref("CommunityToolbar.ETag.hxxp://translation.toolbar.conduit-services.com/?locale=en", "\"f61[...]
Deleted : user_pref("CommunityToolbar.LatestLibsPath", "file:///C:\\Users\\Alice\\AppData\\Roaming\\Mozilla\\F[...]
Deleted : user_pref("CommunityToolbar.LatestToolbarVersionInstalled", "");
Deleted : user_pref("CommunityToolbar.SearchFromAddressBarSavedUrl", "");
Deleted : user_pref("CommunityToolbar.ToolbarsList", "CT3072253");
Deleted : user_pref("CommunityToolbar.ToolbarsList2", "CT3072253");
Deleted : user_pref("CommunityToolbar.ToolbarsList4", "CT3072253");
Deleted : user_pref("CommunityToolbar.globalUserId", "a90e7995-6158-4a6e-aac9-2adc44015b67");
Deleted : user_pref("CommunityToolbar.isAlertUrlAddedToFeedItemTable", true);
Deleted : user_pref("CommunityToolbar.isClickActionAddedToFeedItemTable", true);
Deleted : user_pref("CommunityToolbar.keywordURLSelectedCTID", "CT3072253");
Deleted : user_pref("CommunityToolbar.notifications.alertDialogsGetterLastCheckTime", "Thu Nov 01 2012 12:25:2[...]
Deleted : user_pref("CommunityToolbar.notifications.alertEnabled", false);
Deleted : user_pref("CommunityToolbar.notifications.clientsServerUrl", "hxxp://alert.client.conduit.com");
Deleted : user_pref("CommunityToolbar.notifications.locale", "en");
Deleted : user_pref("CommunityToolbar.notifications.loginIntervalMin", 1440);
Deleted : user_pref("CommunityToolbar.notifications.loginLastCheckTime", "Thu Nov 01 2012 12:25:22 GMT-0500 (C[...]
Deleted : user_pref("CommunityToolbar.notifications.loginLastUpdateTime", "1313487611");
Deleted : user_pref("CommunityToolbar.notifications.messageShowTimeSec", 20);
Deleted : user_pref("CommunityToolbar.notifications.servicesServerUrl", "hxxp://alert.services.conduit.com");
Deleted : user_pref("CommunityToolbar.notifications.showTrayIcon", false);
Deleted : user_pref("CommunityToolbar.notifications.userCloseIntervalMin", 300);
Deleted : user_pref("CommunityToolbar.notifications.userId", "7858fd09-b6a1-41e2-8373-55b721a13367");
Deleted : user_pref("CommunityToolbar.originalHomepage", "chrome://branding/locale/browserconfig.properties");
Deleted : user_pref("CommunityToolbar.originalSearchEngine", "chrome://browser-region/locale/region.properties[...]
Deleted : user_pref("keyword.URL", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT3072253&SearchSource=2&q=[...]


AdwCleaner[S1].txt - [13396 octets] - [04/12/2012 18:23:12]

########## EOF - C:\AdwCleaner[S1].txt - [13457 octets] ##########

#9 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,534 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:07:15 PM

Posted 04 December 2012 - 08:27 PM

Wow,did I get stuck in a mess and just got back.

Did you run ESET?

Let's have a look at what TDSSKiller has previously removed:

  • Please download TDSS Qlook and save it to your desktop.
  • Double-click the program and run it.
  • Type the letter A and press ENTER.
  • A logfile will open (TDSSQ.txt), please copy and paste the contents of that logfile into your next reply.

You need to reboot the machine if you have not.

How is it now?

Edited by boopme, 04 December 2012 - 08:28 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 hersheykissed

  • Topic Starter

  • Members
  • 104 posts
  • Local time:07:15 PM

Posted 04 December 2012 - 09:15 PM

Sorry, ESET just now finished. My computer's still acting the same. The fan will come on, as if something is trying to run, and that's usually when it starts to freeze up. I'll go do the last download now.

C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0000.dta a variant of Win32/Olmarik.AYI trojan
C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0001.dta a variant of Win64/Olmarik.AM trojan
C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0002.dta a variant of Win32/Rootkit.Kryptik.QM trojan
C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0003.dta Win64/Olmarik.AN trojan
C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0007.dta Win32/Olmarik.AFK trojan
C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0008.dta Win64/Olmarik.AK trojan
C:\Users\Alice\Desktop\adobe-host.zip BAT/HostsChanger.A application
C:\Users\Alice\Desktop\adobe-host\disable_activation.cmd BAT/HostsChanger.A application
C:\Users\Alice\Desktop\Office2010\2010-64.zip a variant of Win32/HackKMS.A application
C:\Users\Alice\Desktop\Office2010\Activator.zip a variant of Win32/HackKMS.A application

Edited by hersheykissed, 04 December 2012 - 09:17 PM.

#11 hersheykissed

  • Topic Starter

  • Members
  • 104 posts
  • Local time:07:15 PM

Posted 04 December 2012 - 09:19 PM

TDSSKiller Quarantine Information log
TDSS Qlook Version - Alice - Tue 12/04/2012 - 20:18:30.38.
Microsoft Windows 7 Home Premium 6.1.7601 Service Pack 1
***** START SCAN Tue 12/04/2012 20:18:32.75 *****

---------- TDSSKiller logs ----------


---------- TDSSStarter logs ----------

---------- DIR LIST ----------


---------- INI FILES ----------

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\object.ini

Verdict: Rootkit.Boot.Pihar.c

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\mbr0000\object.ini

Type: MBR
Name: \Device\Harddisk0\DR0

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\mbr0000\tsk0000.ini

Type: Raw image

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\mbr0000\tsk0001.ini

Type: Raw BB image

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\mbr0000\tsk0002.ini

Type: Api image

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\object.ini

Verdict: TDSS File System
Name: \Device\Harddisk0\DR0

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0000.ini

Name: cmd.dll
Size: 33280
File time: 2012/12/04 05:59:09.0522

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0001.ini

Name: cmd64.dll
Size: 3072
File time: 2012/12/04 05:59:09.0522

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0002.ini

Name: drv32
Size: 43008
File time: 2012/12/04 05:59:09.0522

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0003.ini

Name: drv64
Size: 22528
File time: 2012/12/04 05:59:09.0522

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0004.ini

Name: servers.dat
Size: 266
File time: 2012/12/04 05:59:09.0523

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0005.ini

Name: config.ini
Size: 57
File time: 2012/12/04 05:59:09.0523

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0006.ini

Name: ldr16
Size: 1233
File time: 2012/12/04 05:59:09.0523

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0007.ini

Name: ldr32
Size: 3142
File time: 2012/12/04 05:59:09.0523

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0008.ini

Name: ldr64
Size: 3656
File time: 2012/12/04 05:59:09.0523

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0009.ini

Name: s
Size: 79
File time: 2012/12/04 05:59:09.0523

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0010.ini

Name: ldrm
Size: 512
File time: 2012/12/04 05:59:09.0523

=== C:\TDSSKiller_Quarantine\04.12.2012_17.53.24\mbr0000\tdlfs0000\tsk0011.ini

Name: u
Size: 28
File time: 2012/12/04 06:06:07.0137

***** END SCAN Tue 12/04/2012 20:18:33.20 *****

#12 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,534 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:07:15 PM

Posted 04 December 2012 - 09:51 PM

You have some nasty rootkits. I want to run another tool.
Do you do banking and/or financials on here?

Please download aswMBR ( 4.5MB ) to your desktop.
  • Double click the aswMBR.exe icon, and click Run.
  • When asked if you'd like to "download the latest Avast! virus definitions", click Yes.
  • Click the Scan button to start the scan.
  • On completion of the scan, click the save log button, save it to your desktop, then copy and paste it in your next reply.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 hersheykissed

  • Topic Starter

  • Members
  • 104 posts
  • Local time:07:15 PM

Posted 04 December 2012 - 09:56 PM

No, but there are potential confidential client information. But as of now, I think it's safe enough. Although I do online banking here, but I haven't accessed it since this hit.

Running the program now.

Edited by hersheykissed, 04 December 2012 - 09:57 PM.

#14 hersheykissed

  • Topic Starter

  • Members
  • 104 posts
  • Local time:07:15 PM

Posted 04 December 2012 - 10:18 PM

aswMBR version Copyright© 2011 AVAST Software
Run date: 2012-12-04 21:01:06
21:01:06.404 OS Version: Windows x64 6.1.7601 Service Pack 1
21:01:06.404 Number of processors: 4 586 0x2505
21:01:06.404 ComputerName: ALICE-PC UserName: Alice
21:01:08.853 Initialize success
21:02:11.002 AVAST engine defs: 12120401
21:03:59.606 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1
21:03:59.606 Disk 0 Vendor: TOSHIBA_ GN00 Size: 305245MB BusType: 3
21:03:59.637 Disk 0 MBR read successfully
21:03:59.637 Disk 0 MBR scan
21:03:59.653 Disk 0 Windows 7 default MBR code
21:03:59.653 Disk 0 Partition 1 00 27 Hidden NTFS WinRE NTFS 16384 MB offset 2048
21:03:59.684 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 33556480
21:03:59.700 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 288759 MB offset 33761280
21:03:59.731 Disk 0 scanning C:\Windows\system32\drivers
21:04:13.693 Service scanning
21:04:58.918 Modules scanning
21:04:58.933 Disk 0 trace - called modules:
21:04:58.964 ntoskrnl.exe CLASSPNP.SYS disk.sys iaStor.sys hal.dll
21:04:58.980 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa8002663060]
21:04:58.980 3 CLASSPNP.SYS[fffff88001a0143f] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-1[0xfffffa80023ea050]
21:05:00.384 AVAST engine scan C:\Windows
21:05:04.409 AVAST engine scan C:\Windows\system32
21:09:11.342 AVAST engine scan C:\Windows\system32\drivers
21:09:39.921 AVAST engine scan C:\Users\Alice
21:15:40.063 AVAST engine scan C:\ProgramData
21:16:50.201 Scan finished successfully
21:17:40.027 Disk 0 MBR has been saved successfully to "C:\Users\Alice\Desktop\MBR.dat"
21:17:40.043 The log file has been saved successfully to "C:\Users\Alice\Desktop\aswMBR.txt"

#15 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,534 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:07:15 PM

Posted 04 December 2012 - 10:39 PM

OK, I suspect thats a hidden Rootkit and we will need to repost to use different tools to remove it.

We should get a deeper look. Please follow this Preparation Guide and post in a new topic.

Let me know if all went well.

Include this link back to here...
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users