Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie

Please Help-Personal AntiVirus Virus

Options
  • 19-08-2009 2:09pm
    #1
    Registered Users Posts: 55 ✭✭


    Hi,
    I am folowing the steps in the 'I think I have a virus' thread.
    I have downloaded and run Comedian and TFC but I can't get MBAM exe to run. The laptop will freezes and then get a flash of blue screen and then it reboots.
    I have run it ok on my own laptop, this is for a friend's laptop.

    Does anyone have any suggestions please?

    OK I just renamed the exe and it has installed on the desktop but I still can't run it, I also tried running it in safe mode but still no luck. Now I have these Google Installer popups coming up-am losing my patience..


Comments

  • Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


    hi

    Please download ComboFix from Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**
    1. If you are using Firefox, make sure that your download settings are as follows:
      • Tools->Options->Main tab
      • Set to "Always ask me where to Save the files".
    2. During the download, rename Combofix to Combo-Fix as follows:

      CF_download_FF.gif

      CF_download_rename.gif

    3. It is important you rename Combofix during the download, but not after.
    4. Please do not rename Combofix to other names, but only to the one indicated.
    5. Close any open browsers.
    6. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      • Close any open browsers.
      • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

    7. Double click on combo-Fix.exe & follow the prompts.
    8. When finished, it will produce a report for you.
    9. Please post the "C:\Combo-Fix.txt" for further review.
    **Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**


  • Registered Users Posts: 55 ✭✭RockPaper


    ok thanks, I have to download it onto the good machine and transfer over, I'll try it later and post details


  • Registered Users Posts: 55 ✭✭RockPaper


    I've downloaded Combofix to the good machine, changed the name etc and have installed it on the infected machine.

    So when I go to run it, it says-'This machine does not have the 'Microsoft Windows Recovery console' installed, click yes to download/install, problem is I can't connect to the Internet on the infected machine as it will redirect me to different sites.

    Any suggestions as to how I can proceed now??

    Thanks Again :)


  • Registered Users Posts: 55 ✭✭RockPaper


    Here is the log-

    ComboFix 09-08-18.04 - Hilary 19/08/2009 21:28.1.1 - NTFSx86
    Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.446.56 [GMT 1:00]
    Running from: c:\documents and settings\Hilary\Desktop\Combo-Fix.exe
    AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
    .
    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    c:\recycler\S-1-5-21-3530048883-3600819332-288864503-1003
    c:\recycler\S-1-5-21-602162358-1708537768-682003330-1003
    c:\recycler\S-1-5-21-613159865-1444794590-1532137977-1003
    c:\windows\system32\drivers\ndisrd.sys
    c:\windows\system32\drivers\UACwxwmneprep.sys
    c:\windows\system32\msxmlm.dll
    c:\windows\system32\ndisapi.dll
    c:\windows\system32\UACepbgovolnm.dat
    c:\windows\system32\uacinit.dll
    c:\windows\system32\UACxqkyabrpuf.dll
    c:\windows\system32\UACxufwbxrsvx.dll
    Infected copy of c:\windows\system32\mspmsnsv.dll was found and disinfected
    Restored copy from - c:\windows\$NtUninstallWMFDist11$\mspmsnsv.dll
    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    \Service_UACd.sys
    \Legacy_UACd.sys
    \Legacy_NDISRD
    \Service_NDISRD

    ((((((((((((((((((((((((( Files Created from 2009-07-19 to 2009-08-19 )))))))))))))))))))))))))))))))
    .
    2009-11-21 19:35 . 2009-03-06 14:00 284160 -c----w- c:\windows\system32\dllcache\pdh.dll
    2009-11-21 19:35 . 2009-02-09 10:01 401408 -c----w- c:\windows\system32\dllcache\rpcss.dll
    2009-11-21 19:35 . 2009-02-06 09:54 35328 -c----w- c:\windows\system32\dllcache\sc.exe
    2009-11-21 19:35 . 2005-07-26 04:20 60416 -c----w- c:\windows\system32\dllcache\colbact.dll
    2009-11-21 19:35 . 2009-02-09 10:01 473088 -c----w- c:\windows\system32\dllcache\fastprox.dll
    2009-11-21 19:35 . 2009-02-06 10:22 110592 -c----w- c:\windows\system32\dllcache\services.exe
    2009-11-21 19:35 . 2009-02-06 09:41 227840 -c----w- c:\windows\system32\dllcache\wmiprvse.exe
    2009-11-21 19:35 . 2009-02-09 10:01 617984 -c----w- c:\windows\system32\dllcache\advapi32.dll
    2009-11-21 19:35 . 2009-02-09 10:01 715264 -c----w- c:\windows\system32\dllcache\ntdll.dll
    2009-11-21 19:28 . 2008-04-21 10:02 215552 -c----w- c:\windows\system32\dllcache\wordpad.exe
    2009-09-24 21:12 . 2009-09-24 21:13
    d
    w- c:\documents and settings\Hilary\Local Settings\Application Data\Deployment
    2009-08-19 19:46 . 2009-07-03 14:49 15688 ----a-w- c:\windows\system32\lsdelete.exe
    2009-08-19 16:43 . 2009-07-03 14:49 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
    2009-08-19 16:43 . 2009-08-19 16:43
    dc-h--w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}
    2009-08-19 16:43 . 2009-07-08 17:28 2920112 -c--a-w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}\Ad-AwareAE.exe
    2009-08-19 16:43 . 2009-08-19 16:43
    d
    w- c:\program files\Lavasoft
    2009-08-19 13:29 . 2009-08-19 16:25
    d
    w- c:\program files\fluffy
    2009-08-19 13:27 . 2009-08-03 12:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-08-19 13:27 . 2009-08-19 13:27
    d
    w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-08-19 13:27 . 2009-08-03 12:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-08-19 13:27 . 2009-08-19 16:17
    d
    w- c:\program files\Malwarebytes' Anti-Malware
    2009-08-19 12:11 . 2009-08-19 14:49
    d
    w- c:\program files\ERUNT
    2009-08-18 16:29 . 2009-08-18 16:29
    d
    w- c:\windows\ServicePackFiles
    2009-08-18 16:24 . 2009-08-19 14:32
    d
    w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
    2009-08-18 14:20 . 2009-07-28 15:33 55656 ----a-w- c:\windows\system32\drivers\avgntflt.sys
    2009-08-18 12:04 . 2009-08-19 16:43
    dc----w- c:\windows\system32\DRVSTORE
    2009-08-18 12:02 . 2009-08-19 16:43
    d
    w- c:\documents and settings\All Users\Application Data\Lavasoft
    2009-08-18 11:55 . 2009-08-18 11:56
    d
    w- c:\program files\Defraggler
    2009-08-18 11:53 . 2009-08-18 11:53
    d
    w- c:\documents and settings\Hilary\Application Data\Yahoo!
    2009-08-18 11:53 . 2009-08-18 11:53
    d
    w- c:\program files\CCleaner
    2009-08-18 11:15 . 2009-06-05 07:42 655872 -c----w- c:\windows\system32\dllcache\mstscax.dll
    2009-08-08 11:40 . 2009-08-08 11:40
    d
    w- c:\program files\Common Files\Uninstall
    2009-08-05 09:11 . 2009-08-05 09:11 204800 -c----w- c:\windows\system32\dllcache\mswebdvd.dll
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-08-19 20:36 . 2007-08-07 19:51
    d
    w- c:\program files\Symantec AntiVirus
    2009-08-05 09:11 . 2005-08-04 11:21 204800 ----a-w- c:\windows\system32\mswebdvd.dll
    2009-07-17 18:55 . 2005-08-04 11:20 58880 ----a-w- c:\windows\system32\atl.dll
    2009-07-13 22:43 . 2005-08-04 11:21 286208 ----a-w- c:\windows\system32\wmpdxm.dll
    2009-06-29 16:12 . 2005-08-04 11:21 827392 ----a-w- c:\windows\system32\wininet.dll
    2009-06-29 16:12 . 2005-08-04 11:21 78336 ----a-w- c:\windows\system32\ieencode.dll
    2009-06-29 16:12 . 2005-08-04 11:20 17408
    w- c:\windows\system32\corpol.dll
    2009-06-27 19:26 . 2009-06-27 19:26
    d
    w- c:\documents and settings\Hilary\Application Data\Talkback
    2009-06-27 19:25 . 2009-06-27 19:25 0 ----a-w- c:\windows\nsreg.dat
    2009-06-27 19:24 . 2009-06-27 19:24
    d
    w- c:\program files\Common Files\xing shared
    2009-06-27 19:24 . 2009-06-27 19:23
    d
    w- c:\program files\Common Files\Real
    2009-06-27 19:23 . 2009-06-27 19:23
    d
    w- c:\program files\Real
    2009-06-25 08:17 . 2005-08-04 11:21 59392 ----a-w- c:\windows\system32\wdigest.dll
    2009-06-25 08:17 . 2005-08-04 11:21 56320 ----a-w- c:\windows\system32\secur32.dll
    2009-06-25 08:17 . 2005-08-04 11:21 168448 ----a-w- c:\windows\system32\schannel.dll
    2009-06-25 08:17 . 2005-08-04 11:21 136192 ----a-w- c:\windows\system32\msv1_0.dll
    2009-06-25 08:17 . 2005-08-04 11:21 729600 ----a-w- c:\windows\system32\lsasrv.dll
    2009-06-25 08:17 . 2005-08-04 11:21 301568 ----a-w- c:\windows\system32\kerberos.dll
    2009-06-22 11:35 . 2005-08-04 11:21 92544 ----a-w- c:\windows\system32\drivers\ksecdd.sys
    2009-06-16 14:55 . 2005-08-04 11:21 119808 ----a-w- c:\windows\system32\t2embed.dll
    2009-06-16 14:55 . 2005-08-04 11:20 82432 ----a-w- c:\windows\system32\fontsub.dll
    2009-06-12 11:50 . 2005-08-04 11:21 76288 ----a-w- c:\windows\system32\telnet.exe
    2009-06-10 14:21 . 2005-08-04 11:20 84992 ----a-w- c:\windows\system32\avifil32.dll
    2009-06-10 06:32 . 2005-08-04 11:21 132096 ----a-w- c:\windows\system32\wkssvc.dll
    2009-06-05 07:42 . 2005-08-04 12:33 655872 ----a-w- c:\windows\system32\mstscax.dll
    2009-06-03 19:27 . 2005-08-04 11:21 1290752 ----a-w- c:\windows\system32\quartz.dll
    2006-10-11 08:04 . 2009-06-27 19:22 61036 ----a-w- c:\program files\mozilla firefox\components\jar50.dll
    2006-10-11 08:04 . 2009-06-27 19:22 48742 ----a-w- c:\program files\mozilla firefox\components\jsd3250.dll
    2006-10-11 08:05 . 2009-06-27 19:22 29313 ----a-w- c:\program files\mozilla firefox\components\myspell.dll
    2006-10-11 08:05 . 2009-06-27 19:22 41082 ----a-w- c:\program files\mozilla firefox\components\spellchk.dll
    2006-10-11 08:04 . 2009-06-27 19:22 166510 ----a-w- c:\program files\mozilla firefox\components\xpinstal.dll
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\toscdspd.exe" [2005-04-11 65536]
    "MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-10-13 1694208]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-06-28 344064]
    "SynTPLpr"="c:\program files\Synaptics\SynTP\SynTPLpr.exe" [2004-10-08 98394]
    "SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2004-10-08 688218]
    "Toshiba Hotkey Utility"="c:\program files\Toshiba\Windows Utilities\Hotkey.exe" [2005-08-01 1093632]
    "SmoothView"="c:\program files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe" [2005-05-12 118784]
    "PadTouch"="c:\program files\TOSHIBA\Touch and Launch\PadExe.exe" [2004-11-17 1077327]
    "dla"="c:\windows\system32\dla\tfswctrl.exe" [2005-05-31 122941]
    "ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-07-19 52896]
    "vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2006-09-27 125168]
    "TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-06-27 185872]
    "NDSTray.exe"="NDSTray.exe" [BU]
    "CFSServ.exe"="CFSServ.exe" [BU]
    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2004-08-04 15360]
    c:\documents and settings\Hilary\Start Menu\Programs\Startup\
    ERUNT AutoBackup.lnk - c:\program files\ERUNT\AUTOBACK.EXE [2005-10-20 38912]
    Microsoft Office OneNote 2003 Quick Launch.lnk - c:\program files\Microsoft Office\OFFICE11\ONENOTEM.EXE [2004-6-11 59080]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
    @="Service"
    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusOverride"=dword:00000001
    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
    "DisableMonitoring"=dword:00000001
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [19/08/2009 17:43 64160]
    R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [03/07/2009 15:49 1029456]
    R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [24/07/2009 20:28 101936]
    R3 HSFHWATI;HSFHWATI;c:\windows\system32\drivers\HSFHWATI.sys [04/08/2005 22:09 211200]
    S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [27/09/2006 20:33 116464]
    .
    Contents of the 'Scheduled Tasks' folder
    2009-08-19 c:\windows\Tasks\Ad-Aware Update (Weekly).job
    - c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-07-03 14:49]
    2006-03-24 c:\windows\Tasks\Registration reminder 1.job
    - c:\windows\system32\OOBE\oobebaln.exe [2005-08-04 12:00]
    2006-03-24 c:\windows\Tasks\Registration reminder 3.job
    - c:\windows\system32\OOBE\oobebaln.exe [2005-08-04 12:00]
    .
    - - - - ORPHANS REMOVED - - - -
    HKLM-Run-PersonalAV - c:\program files\PersonalAV\pav.exe

    .
    Supplementary Scan
    .
    uStart Page = hxxp://www.google.ie/
    uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
    mStart Page = hxxp://www.google.com
    uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    FF - ProfilePath - c:\documents and settings\Hilary\Application Data\Mozilla\Firefox\Profiles\8jxxazd1.default\
    FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=
    FF - prefs.js: browser.search.selectedEngine - Google
    FF - prefs.js: browser.startup.homepage - hxxp://en-us.start.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-US:official
    FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll
    FF - component: c:\program files\Mozilla Firefox\extensions\{3112ca9c-de6d-4884-a869-9855de68056c}\components\googletoolbar.dll
    FF - component: c:\program files\Mozilla Firefox\extensions\{3112ca9c-de6d-4884-a869-9855de68056c}\components\metrics.dll
    FF - component: c:\program files\Mozilla Firefox\extensions\talkback@mozilla.org\components\qfaservices.dll
    FF - component: c:\program files\Real\RealPlayer\browserrecord\components\nprpbrowserrecordplugin.dll
    .
    **************************************************************************
    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-08-19 21:38
    Windows 5.1.2600 Service Pack 2 NTFS
    scanning hidden processes ...
    scanning hidden autostart entries ...
    scanning hidden files ...
    scan completed successfully
    hidden files: 0
    **************************************************************************
    .
    DLLs Loaded Under Running Processes
    - - - - - - - > 'winlogon.exe'(664)
    c:\windows\system32\Ati2evxx.dll
    - - - - - - - > 'explorer.exe'(2788)
    c:\windows\system32\WININET.dll
    c:\windows\system32\ieframe.dll
    c:\windows\system32\WPDShServiceObj.dll
    c:\windows\system32\PortableDeviceTypes.dll
    c:\windows\system32\PortableDeviceApi.dll
    .
    Other Running Processes
    .
    c:\windows\system32\ati2evxx.exe
    c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
    c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
    c:\program files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
    c:\windows\system32\acs.exe
    c:\windows\system32\ati2evxx.exe
    c:\program files\Toshiba\ConfigFree\CFSvcs.exe
    c:\program files\Symantec AntiVirus\DefWatch.exe
    c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    c:\program files\Symantec AntiVirus\Rtvscan.exe
    c:\program files\Toshiba\ConfigFree\NDSTray.exe
    c:\windows\system32\wbem\unsecapp.exe
    c:\program files\Symantec AntiVirus\DoScan.exe
    c:\program files\Lavasoft\Ad-Aware\AAWTray.exe
    .
    **************************************************************************
    .
    Completion time: 2009-08-19 21:50 - machine was rebooted
    ComboFix-quarantined-files.txt 2009-08-19 20:50
    Pre-Run: 51,363,753,984 bytes free
    Post-Run: 51,302,248,448 bytes free
    WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect
    217 --- E O F --- 2009-08-19 13:08


  • Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


    hi

    Download TFC to your desktop
    • Open the file and close any other windows.
    • It will close all programs itself when run, make sure to let it run uninterrupted.
    • Click the Start button to begin the process. The program should not take long to finish its job
    • Once its finished it should reboot your machine, if not, do this yourself to ensure a complete clean




    Please download Malwarebytes' Anti-Malware from Here

    Double Click mbam-setup.exe to install the application.
    • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select "Perform Quick Scan", then click Scan.
    • The scan may take some time to finish,so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Copy&Paste the entire report in your next reply.
    Extra Note:
    If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.






    Go to Kaspersky website and perform an online antivirus scan.
    1. Read through the requirements and privacy statement and click on Accept button.
    2. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
    3. When the downloads have finished, click on Settings.
    4. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
        Spyware, Adware, Dialers, and other potentially dangerous programs
        Archives
        Mail databases
      [*]Click on My Computer under Scan.
      [*]Once the scan is complete, it will display the results. Click on View Scan Report.
      [*]You will see a list of infected items there. Click on Save Report As....
      [*]Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.


    5. Advertisement
    6. Registered Users Posts: 55 ✭✭RockPaper


      mbam log

      Malwarebytes' Anti-Malware 1.40
      Database version: 2551
      Windows 5.1.2600 Service Pack 2
      19/08/2009 22:57:45
      mbam-log-2009-08-19 (22-57-45).txt
      Scan type: Quick Scan
      Objects scanned: 85043
      Time elapsed: 5 minute(s), 15 second(s)
      Memory Processes Infected: 0
      Memory Modules Infected: 0
      Registry Keys Infected: 0
      Registry Values Infected: 2
      Registry Data Items Infected: 0
      Folders Infected: 2
      Files Infected: 3
      Memory Processes Infected:
      (No malicious items detected)
      Memory Modules Infected:
      (No malicious items detected)
      Registry Keys Infected:
      (No malicious items detected)
      Registry Values Infected:
      HKEY_CURRENT_USER\Environment\avapp (Rogue.PersonalAntiVirus) -> Quarantined and deleted successfully.
      HKEY_CURRENT_USER\Environment\avuninst (Rogue.PersonalAntiVirus) -> Quarantined and deleted successfully.
      Registry Data Items Infected:
      (No malicious items detected)
      Folders Infected:
      C:\Program Files\Common Files\Uninstall\PersonalAV (Rogue.PersonalAntiVirus) -> Quarantined and deleted successfully.
      C:\Documents and Settings\All Users\Start Menu\PersonalAV (Rogue.PersonalAntiVirus) -> Quarantined and deleted successfully.
      Files Infected:
      C:\Program Files\Common Files\Uninstall\PersonalAV\Uninstall.lnk (Rogue.PersonalAntiVirus) -> Quarantined and deleted successfully.
      C:\Documents and Settings\All Users\Start Menu\PersonalAV\Personal Antivirus.lnk (Rogue.PersonalAntiVirus) -> Quarantined and deleted successfully.
      C:\Documents and Settings\All Users\Start Menu\PersonalAV\Uninstall.lnk (Rogue.PersonalAntiVirus) -> Quarantined and deleted successfully.


    7. Registered Users Posts: 55 ✭✭RockPaper


      Kaspersky Log

      KASPERSKY ONLINE SCANNER 7.0: scan report
      Thursday, August 20, 2009
      Operating system: Microsoft Windows XP Home Edition Service Pack 2 (build 2600)
      Kaspersky Online Scanner version: 7.0.26.13
      Last database update: Thursday, August 20, 2009 00:17:50
      Records in database: 2664005
      Scan settings:
      scan using the following database: extended
      Scan archives: yes
      Scan e-mail databases: yes
      Scan area - My Computer:
      C:\
      D:\
      Scan statistics:
      Objects scanned: 39201
      Threats found: 3
      Infected objects found: 3
      Suspicious objects found: 0
      Scan duration: 01:34:59

      File name / Threat / Threats count
      C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0BD80000\4BDC7164.VBN Infected: Trojan.Win32.Tdss.anrc 1
      C:\Qoobox\Quarantine\C\WINDOWS\system32\UACxqkyabrpuf.dll.vir Infected: Packed.Win32.TDSS.y 1
      C:\WINDOWS\system32\oobe\ISPSoftware\BTYahoo\BroadbandFromBT.exe Infected: not-a-virus:Dialer.Win32.BT.g 1
      Selected area has been scanned.


      Thank You


    8. Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


      hi

      CLICK HERE to download the HijackThis Installer:
      1. Save HJTInstall.exe to your desktop.
      2. Double-click on HJTInstall.exe to run the program.
      3. By default it will install to C:\Program Files\Trend Micro\HijackThis.
      4. Accept the license agreement by clicking the "I Accept" button.
      5. Click on the "Do a system scan and save a log file" button. It will scan and then ask you to save the log.
      6. Click "Save log" to save the log file and then the log will open in Notepad.
      7. Click on "Edit -> Select All" then click on "Edit -> Copy" to copy the entire contents of the log.
      8. Come back here to this thread and paste the log in your next reply.
      9. Do NOT have HijackThis fix anything yet! Most of what it finds will be harmless or even required.


    9. Registered Users Posts: 55 ✭✭RockPaper


      HijackThis Log

      Logfile of Trend Micro HijackThis v2.0.2
      Scan saved at 13:37:56, on 20/08/2009
      Platform: Windows XP SP2 (WinNT 5.01.2600)
      MSIE: Internet Explorer v7.00 (7.00.6000.16876)
      Boot mode: Normal
      Running processes:
      C:\WINDOWS\System32\smss.exe
      C:\WINDOWS\system32\winlogon.exe
      C:\WINDOWS\system32\services.exe
      C:\WINDOWS\system32\lsass.exe
      C:\WINDOWS\system32\Ati2evxx.exe
      C:\WINDOWS\system32\svchost.exe
      C:\WINDOWS\System32\svchost.exe
      C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
      C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
      C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
      C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
      C:\WINDOWS\system32\spoolsv.exe
      C:\WINDOWS\system32\acs.exe
      C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
      C:\Program Files\Symantec AntiVirus\DefWatch.exe
      C:\Program Files\Java\jre6\bin\jqs.exe
      C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
      C:\Program Files\Symantec AntiVirus\Rtvscan.exe
      C:\WINDOWS\system32\Ati2evxx.exe
      C:\WINDOWS\Explorer.EXE
      C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
      C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
      C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
      C:\Program Files\Toshiba\Windows Utilities\Hotkey.exe
      C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
      C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
      C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
      C:\WINDOWS\system32\dla\tfswctrl.exe
      C:\Program Files\TOSHIBA\ConfigFree\CFSServ.exe
      C:\Program Files\Common Files\Symantec Shared\ccApp.exe
      C:\PROGRA~1\SYMANT~1\VPTray.exe
      C:\Program Files\Common Files\Real\Update_OB\realsched.exe
      C:\Program Files\Java\jre6\bin\jusched.exe
      C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
      C:\Program Files\Messenger\msmsgs.exe
      C:\WINDOWS\system32\ctfmon.exe
      C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
      C:\Program Files\Microsoft Office\OFFICE11\ONENOTEM.EXE
      C:\Program Files\Symantec AntiVirus\DoScan.exe
      C:\Program Files\internet explorer\iexplore.exe
      C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
      C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
      R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ie/
      R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
      R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
      R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
      O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
      O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
      O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
      O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
      O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
      O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
      O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
      O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
      O4 - HKLM\..\Run: [Toshiba Hotkey Utility] "C:\Program Files\Toshiba\Windows Utilities\Hotkey.exe" /lang en
      O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
      O4 - HKLM\..\Run: [SmoothView] C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
      O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
      O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
      O4 - HKLM\..\Run: [CFSServ.exe] CFSServ.exe -NoClient
      O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
      O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
      O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
      O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
      O4 - HKCU\..\Run: [TOSCDSPD] C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
      O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
      O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
      O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
      O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
      O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
      O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
      O4 - Startup: Microsoft Office OneNote 2003 Quick Launch.lnk = C:\Program Files\Microsoft Office\OFFICE11\ONENOTEM.EXE
      O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
      O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
      O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
      O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
      O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
      O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
      O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
      O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\acs.exe
      O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
      O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
      O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
      O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
      O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
      O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
      O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
      O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
      O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
      O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
      O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
      O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
      --
      End of file - 7285 bytes


    10. Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


      Your logs are clean


      Follow these steps to uninstall Combofix and tools used in the removal of malware
      • Click START then RUN
      • Now type Combofix /u in the runbox and click OK. Note the space between the X and the U, it needs to be there.
        CF_Cleanup.png


      • Download OTC to your desktop and run it
      • Click Yes to beginning the Cleanup process and remove these components, including this application.
      • You will be asked to reboot the machine to finish the Cleanup process. Choose Yes.


      Below I have included a number of recommendations for how to protect your computer against malware infections.
      • Keep Windows updated by regularly checking their website at :
        http://windowsupdate.microsoft.com/
        This will ensure your computer has always the latest security updates available installed on your computer.

      • SpywareBlaster protects against bad ActiveX, it immunizes your PC against them.

      • SpywareGuard offers realtime protection from spyware installation attempts. Make sure you are only running one real-time anti-spyware protection program ( eg : TeaTimer, Windows Defender ) or there will be a conflict.

      • Make Internet Explorer more secure
        • Click Start > Run
        • Type Inetcpl.cpl & click OK
        • Click on the Security tab
        • Click Reset all zones to default level
        • Make sure the Internet Zone is selected & Click Custom level
        • In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
        • Next Click OK, then Apply button and then OK to exit the Internet Properties page.
      • TFC - Cleans temporary files from IE and Windows, empties the recycle bin and more. Great tool to help speed up your computer and knock out those nasties that like to reside in the temp folders.

      • MVPS Hosts file replaces your current HOSTS file with one containing well known ad sites and other bad sites. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer, meaning it will be difficult to infect yourself in the future.

      • Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more
        secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in pop up
        blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from
        Here


        If you choose to use Firefox, I highly recommend these add-ons to keep your PC even more secure.
        • NoScript - for blocking ads and other potential website attacks
        • McAfee SiteAdvisor - this tells you whether the sites you are about to visit are safe or not. A must if you do a lot of Googling

      • Keep a backup of your important files - Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.

      • ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.

      • FileHippo Update Checker is an extremely helpful program that will tell you which of your programs need to be updated. Its important to keep programs up to date so that malware doesn't exploit any old security flaws.

      • Recovery Console - Recent trends appear to indicate that future infections will include attacks to the boot sector of the computer. The installation of the Recovery Console in the computer will be our only defense against this threat. For more information and steps to install the Recovery Console see This Article. Should you need assistance in installing the Recovery Console, please do not hesitate to ask.

      • Please read my guide on how to prevent malware and about safe computing here
      Thank you for your patience, and performing all of the procedures requested.


    11. Advertisement
    12. Registered Users Posts: 55 ✭✭RockPaper


      Thank You!! :D:D:D

      I really appreciate all your help and all of the suggestions too


    Advertisement