I read the information in one of the post below. I tried to get to the point where you'd want me to come back here and post the computers info. (So we could go from there.) Well, I failed at that but somehow I managed to do a system restore while in safe mode. It seems to have worked, but geez, it just seemed to easy. Is that going to be sufficient? As with the previous poster the infected computer belongs to a friend, I'm really sorry but you're dealing with dumb and dumber here. Thanks in advance. Raynee

raynee3

Newbie Surfer

Posts : 5
Joined : 2009-09-16
Operating System : vista,xp

Hi

Double Click mbam-setup.exe to install the application.

• Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
• Once the program has loaded, select "Perform Full Scan", then click Scan.
• The scan may take some time to finish,so please be patient.
• When the scan is complete, click OK, then Show Results to view the results.
• Make sure that everything is checked, and click Remove Selected.
• When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
• Please save the log to a location you will remember.
• The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.

[You must be registered and logged in to see this link.] - Get $30 off Kaspersky products. ~DMJ GeekPolice Academy Manager Donations/Contributions DragonMaster Jay Manager | Tech Officer Posts : 13451 Joined : 2009-09-07 Operating System : Windows 7 Ultimate ## Re: about total security... I hope this is what you needed. Malwarebytes' Anti-Malware 1.41 Database version: 2808 Windows 5.1.2600 Service Pack 2 9/16/2009 5:45:19 AM mbam-log-2009-09-16 (05-45-19).txt Scan type: Full Scan (C:\|) Objects scanned: 226539 Time elapsed: 1 hour(s), 52 minute(s), 14 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 19 Registry Values Infected: 4 Registry Data Items Infected: 0 Folders Infected: 2 Files Infected: 38 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{cf54be1c-9359-4395-8533-1657cf209cfe} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Typelib\{d518921a-4a03-425e-9873-b9a71756821e} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59c7fc09-1c83-4648-b3e6-003d2bbc7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68af847f-6e91-45dd-9b68-d6a12c30e5d7} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170b96c-28d4-4626-8358-27e6caeef907} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d1a71fa0-ff48-48dd-9b6d-7a13a3e42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ddb1968e-ead6-40fd-8dae-ff14757f60c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{f138d901-86f0-4383-99b6-9cdd406036da} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/Documents and Settings/charles rogers/Local Settings/Temp/rhapacft.dat (Rootkit.Agent) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rhapacft.dat (Rootkit.Agent) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rhapacft.dat (Rootkit.Agent) -> Delete on reboot. HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully. Registry Values Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bf (Trojan.Agent) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bk (Trojan.Agent) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\iu (Trojan.Agent) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\mu (Trojan.Agent) -> Delete on reboot. Registry Data Items Infected: (No malicious items detected) Folders Infected: C:\Documents and Settings\All Users\Application Data\14371254 (Rogue.Multiple) -> Quarantined and deleted successfully. C:\WINDOWS\system32\lowsec (Stolen.data) -> Quarantined and deleted successfully. Files Infected: C:\Documents and Settings\charles rogers\Local Settings\Temp\teste1_p.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\teste2_p.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\teste3_p.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\teste4_p.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\rhapacft.dat (Rootkit.Agent) -> Delete on reboot. C:\Documents and Settings\charles rogers\Local Settings\Temp\5_odb.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\avto.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\avto1.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\avto2.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\avto3.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\avto4.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\q1.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\q2.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\q3.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\q4.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\q5.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\q6.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\q7.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\q8.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temp\q9.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\Local Settings\Temporary Internet Files\Content.IE5\9Z9IR6JL\123[1].exe (Trojan.Dropper) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050482.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050484.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050485.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050486.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050487.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050488.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050490.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050491.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050492.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050483.exe (Trojan.Clicker) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Application Data\14371254\14371254 (Rogue.Multiple) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Application Data\14371254\pc14371254ins (Rogue.Multiple) -> Quarantined and deleted successfully. C:\WINDOWS\system32\lowsec\user.ds.lll (Stolen.data) -> Quarantined and deleted successfully. C:\WINDOWS\system32\1.ico (Malware.Trace) -> Quarantined and deleted successfully. C:\WINDOWS\system32\2.ico (Malware.Trace) -> Quarantined and deleted successfully. C:\Documents and Settings\charles rogers\results.txt (Malware.Trace) -> Quarantined and deleted successfully. C:\WINDOWS\Tasks\ErrorSmart Scheduled Scan.job (Rogue.ErrorSmart) -> Quarantined and deleted successfully. raynee3 Newbie Surfer Posts : 5 Joined : 2009-09-16 Operating System : vista,xp ## Re: about total security... Hi Please download ComboFix by sUBs Link 1: Forospyware.com or Link 2: BleepingComputer.com Please save the file to your Desktop, but rename it first: Important information about ComboFix Before the download: • Please copy and paste these instructions to Notepad and save to your Desktop, or print them - for easier access. • It is important to rename ComboFix before the download. • Please do not rename ComboFix to other names, but only the one indicated. After the download: • Close any open browsers. • Very Important: Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results". Please visit here if you don't know how. • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts • Please do not attempt to re-connect your machine back to the Internet until ComboFix has completely finished. • If there is no Internet connection after running ComboFix, then restart your computer to restore back your connection. Running ComboFix: • Double click on svchost.exe & follow the prompts. • It will attempt to install the Recovery Console: • When ComboFix finishes, it will produce a report for you. • Please post the "C:\Combo-Fix.txt" in your next reply. Troubleshooting ComboFix Safe Mode: If you still cannot get ComboFix to run, try booting into Safe Mode, and run it there. (To boot into Safe Mode, tap F8 after BIOS, and just before the Windows logo appears. A list of options will appear, select "Safe Mode.") Re-downloading: If this doesn't work either, try the same method (above method), but try to download it again, except name ComboFix.exe to iexplore.exe, explorer.exe, or winlogon.exe. Malware is known for blocking all "user" processes, except for its whitelist of system important processes such as iexplore.exe, explorer.exe, winlogon.exe. [You must be registered and logged in to see this link.] - Get$30 off Kaspersky products.

~DMJ

Donations/Contributions

DragonMaster Jay

Manager | Tech Officer

Posts : 13451
Joined : 2009-09-07
Operating System : Windows 7 Ultimate

Dragon Master Jay thank you for your help. I've got it in working order again.

raynee3

Newbie Surfer

Posts : 5
Joined : 2009-09-16
Operating System : vista,xp

Thanks for letting us know.

[You must be registered and logged in to see this link.] - Get \$30 off Kaspersky products.

~DMJ

Donations/Contributions

DragonMaster Jay

Manager | Tech Officer

Posts : 13451
Joined : 2009-09-07
Operating System : Windows 7 Ultimate