about total security...

View previous topic View next topic Go down

about total security...

Post by raynee3 on 16th September 2009, 4:19 am

I read the information in one of the post below. I tried to get to the point where you'd want me to come back here and post the computers info. (So we could go from there.) Well, I failed at that but somehow I managed to do a system restore while in safe mode. It seems to have worked, but geez, it just seemed to easy. Is that going to be sufficient? As with the previous poster the infected computer belongs to a friend, I'm really sorry but you're dealing with dumb and dumber here. Thanks in advance. Raynee

raynee3
Novice
Novice

Posts Posts : 5
Joined Joined : 2009-09-16
OS OS : vista,xp
Points Points : 26431
# Likes # Likes : 0

View user profile

Back to top Go down

Re: about total security...

Post by Dr Jay on 16th September 2009, 4:28 am

Hi

Please download Malwarebytes Anti-Malware from [You must be registered and logged in to see this link.].

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • Please save the log to a location you will remember.
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Posts Posts : 14310
Joined Joined : 2009-09-06
Gender Gender : Male
OS OS : Windows 10 Home & Pro
Arch. Arch. : x64 (64-bit)
Protection Protection : Bitdefender Total Security
Points Points : 302971
# Likes # Likes : 10

View user profile

Back to top Go down

Re: about total security...

Post by raynee3 on 16th September 2009, 9:54 am

I hope this is what you needed.

Malwarebytes' Anti-Malware 1.41
Database version: 2808
Windows 5.1.2600 Service Pack 2

9/16/2009 5:45:19 AM
mbam-log-2009-09-16 (05-45-19).txt

Scan type: Full Scan (C:\|)
Objects scanned: 226539
Time elapsed: 1 hour(s), 52 minute(s), 14 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 19
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 2
Files Infected: 38

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{cf54be1c-9359-4395-8533-1657cf209cfe} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{d518921a-4a03-425e-9873-b9a71756821e} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59c7fc09-1c83-4648-b3e6-003d2bbc7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68af847f-6e91-45dd-9b68-d6a12c30e5d7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170b96c-28d4-4626-8358-27e6caeef907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d1a71fa0-ff48-48dd-9b6d-7a13a3e42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ddb1968e-ead6-40fd-8dae-ff14757f60c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{f138d901-86f0-4383-99b6-9cdd406036da} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/Documents and Settings/charles rogers/Local Settings/Temp/rhapacft.dat (Rootkit.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rhapacft.dat (Rootkit.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rhapacft.dat (Rootkit.Agent) -> Delete on reboot.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bf (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bk (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\iu (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\mu (Trojan.Agent) -> Delete on reboot.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Documents and Settings\All Users\Application Data\14371254 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec (Stolen.data) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\charles rogers\Local Settings\Temp\teste1_p.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\teste2_p.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\teste3_p.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\teste4_p.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\rhapacft.dat (Rootkit.Agent) -> Delete on reboot.
C:\Documents and Settings\charles rogers\Local Settings\Temp\5_odb.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\avto.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\avto1.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\avto2.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\avto3.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\avto4.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\q1.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\q2.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\q3.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\q4.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\q5.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\q6.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\q7.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\q8.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temp\q9.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\Local Settings\Temporary Internet Files\Content.IE5\9Z9IR6JL\123[1].exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050482.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050484.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050485.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050486.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050487.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050488.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050490.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050491.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050492.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3A3061E7-B52D-4392-89A2-BB2C3595A48E}\RP119\A0050483.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\14371254\14371254 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\14371254\pc14371254ins (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec\user.ds.lll (Stolen.data) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\1.ico (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\2.ico (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\charles rogers\results.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\ErrorSmart Scheduled Scan.job (Rogue.ErrorSmart) -> Quarantined and deleted successfully.

raynee3
Novice
Novice

Posts Posts : 5
Joined Joined : 2009-09-16
OS OS : vista,xp
Points Points : 26431
# Likes # Likes : 0

View user profile

Back to top Go down

Re: about total security...

Post by Dr Jay on 16th September 2009, 5:30 pm

Hi

Please download ComboFix by sUBs
[You must be registered and logged in to see this link.] or [You must be registered and logged in to see this link.]

Please save the file to your Desktop, but rename it first:




Important information about ComboFix

Before the download:
  • Please copy and paste these instructions to Notepad and save to your Desktop, or print them - for easier access.
  • It is important to rename ComboFix before the download.
  • Please do not rename ComboFix to other names, but only the one indicated.

After the download:
  • Close any open browsers.
  • Very Important: Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results". [You must be registered and logged in to see this link.] if you don't know how.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until ComboFix has completely finished.
  • If there is no Internet connection after running ComboFix, then restart your computer to restore back your connection.

Running ComboFix:
  • Double click on svchost.exe & follow the prompts.
  • It will attempt to install the Recovery Console:




  • When ComboFix finishes, it will produce a report for you.
  • Please post the "C:\Combo-Fix.txt" in your next reply.


Troubleshooting ComboFix

Safe Mode:

If you still cannot get ComboFix to run, try booting into Safe Mode, and run it there.

(To boot into Safe Mode, tap F8 after BIOS, and just before the Windows
logo appears. A list of options will appear, select "Safe Mode.")

Re-downloading:

If this doesn't work either, try the same method (above method), but try to download it again, except name
ComboFix.exe to iexplore.exe, explorer.exe, or winlogon.exe.

Malware is known for blocking all "user" processes, except for its whitelist of system important processes such as iexplore.exe, explorer.exe, winlogon.exe.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Posts Posts : 14310
Joined Joined : 2009-09-06
Gender Gender : Male
OS OS : Windows 10 Home & Pro
Arch. Arch. : x64 (64-bit)
Protection Protection : Bitdefender Total Security
Points Points : 302971
# Likes # Likes : 10

View user profile

Back to top Go down

Re: about total security...

Post by raynee3 on 19th September 2009, 4:56 pm

Dragon Master Jay thank you for your help. I've got it in working order again. Big Grin

raynee3
Novice
Novice

Posts Posts : 5
Joined Joined : 2009-09-16
OS OS : vista,xp
Points Points : 26431
# Likes # Likes : 0

View user profile

Back to top Go down

Re: about total security...

Post by Dr Jay on 19th September 2009, 6:51 pm

Thanks for letting us know.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Posts Posts : 14310
Joined Joined : 2009-09-06
Gender Gender : Male
OS OS : Windows 10 Home & Pro
Arch. Arch. : x64 (64-bit)
Protection Protection : Bitdefender Total Security
Points Points : 302971
# Likes # Likes : 10

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum