Jump to content
IObit Forum
Top Free Driver Updater Tools Best 25 PC Optimization Software Best 22 Antimalware Best 22 Uninstaller Software IObit Coupons & Discount Offers PC Optimizer Mac Boost Advice IObit Coupons A Good Utility Program From IObit IObit Promo Codes IObit Coupon Codes IObit Coupons and Deals FAQs Driver Booster Pro Review

I did an oops, how do repair it?


Recommended Posts

I got a virus and did everything I could use with the non-pro edition of ASC to remove it. Finally I went into the suggested programs that on running processes, BHO, hklm, etc and bocked them. Seems I blocked all the rundll32. Now I cannot open ASC to put them back. I can't open any program cept Internet Explorer right now. I did manage to get to minfo32 fie, but could not open. Almost every pogra is giving me a corrupted file eror doyou wish touse your internet protection response includin ASC. I did manage to run sfc /scannow, but that seemed to have no effect. I assume removing ASC will just make my prolems worse. How can I repair this issue?

 

I am running 32 bit Micrsoft XP I believe service pck 3,but as cannot open add/remove programs, I cannot be 100% certain.

Link to comment
Share on other sites

Keep in mind cannor open ASC so i is dificult for me to be specific as I cannot see it. I hit the button on the right of maitain windows, ran bottem scan, went to suggested threats, and then checked boxes and "fixed".

Link to comment
Share on other sites

"What function in ASC did you use to block them? Startup manager?"

 

I described where I did it. You have the open screen. There are 4 large circles. I hit the one on the right, think is call security and maintence or some such. Top scan is spyware removal, don't have a clue the name of the bottom scan. It lists runnin process, BHO, and a number of types of programs running. Ultimately, Iwas using this area to stop a virus from being included in my start up procedures.

 

 

"What is your OS?"

 

I thought I was clear in my post, Windows XP. Is there something more specific you are looking for like it ishom edition, which it is.

 

"Can you access system restore?"

 

No

Link to comment
Share on other sites

Assume at this point I cannot use any program on my computer with exception being internet explorer, access anything through control panel, or use any windows commands in run. Was able to trace through c: to ASC nd msinfo32 folder, which it will not allow me to open either program as an corrupt file and then requestsif I would like to active my internet security.

Link to comment
Share on other sites

Hi Ulf

If you right click My Computer and choose properties you can in the display see your OS and the Sp number + some other essential information.

By the way ASC is NOT an anti-virus program - you have to use a good anti-virus program alongside ASC.

What virus are we talking about? Are you using Norton or MacAfee? Some of their versions have a false positive regarding ASC and IS360

Cheers

solbjerg

 

 

I got a virus and did everything I could use with the non-pro edition of ASC to remove it. Finally I went into the suggested programs that on running processes, BHO, hklm, etc and bocked them. Seems I blocked all the rundll32. Now I cannot open ASC to put them back. I can't open any program cept Internet Explorer right now. I did manage to get to minfo32 fie, but could not open. Almost every pogra is giving me a corrupted file eror doyou wish touse your internet protection response includin ASC. I did manage to run sfc /scannow, but that seemed to have no effect. I assume removing ASC will just make my prolems worse. How can I repair this issue?

 

I am running 32 bit Micrsoft XP I believe service pck 3,but as cannot open add/remove programs, I cannot be 100% certain.

Link to comment
Share on other sites

Hi Ulf

If you right click My Computer and choose properties you can in the display see your OS and the Sp number + some other essential information.

By the way ASC is NOT an anti-virus program - you have to use a good anti-virus program alongside ASC.

What virus are we talking about? Are you using Norton or MacAfee? Some of their versions have a false positive regarding ASC and IS360

Cheers

solbjerg

 

I right click and it closes. I wrot a lt of information that you ae not reading. I appriciate yor help. I tried it and I could not get past right click on properties. Never showed a screen. This stage is getting back what I ruined. I'll go into the registry and delete files. Right now just need to be able to to run and operate systems. I can run 2-3 programs right now.

Link to comment
Share on other sites

Hi Ulf

I did of course read the previous posts, but didn't find enough information shedding much light on the situation, perhaps I am half-blind - not an unreasonable assumption :-)

Have you tried all suggestions? For example have you been able to open the computer in safe-mode?

Does the right click on my computer close the the computer too in safe-mode?

Have you by hand deleted items in the registry?? Did you backup beforehand?

Are you able to run an online anti-virus scan by one of the free online scanners?

Cheers

solbjerg

 

 

I right click and it closes. I wrot a lt of information that you ae not reading. I appriciate yor help. I tried it and I could not get past right click on properties. Never showed a screen. This stage is getting back what I ruined. I'll go into the registry and delete files. Right now just need to be able to to run and operate systems. I can run 2-3 programs right now.
Link to comment
Share on other sites

I attempted to run safe mode and got a big blue scren saying I have a virus and cannot run safe mode. I attempted twice, I went with last known good configuration and that seemed to repair that issue. Of course, the virus is also back. I currently do not have an anti-virus program. Any suggetions? I would never get Norton or Macafee.

Link to comment
Share on other sites

Hello and welcome to IOBit Forums. My name is Dave. I will be helping you out with your particular problem on your computer. I am working under the guidance of one of the specialist of this forum so it may take a bit longer to process your logs.

 

1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.

2. The fixes are specific to your problem and should only be used for this issue on this machine.

3. If you don't know or understand something, please don't hesitate to ask.

4. Please DO NOT run any other tools or scans while I am helping you.

5. It is important that you reply to this thread. Do not start a new topic.

6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.

7. Absence of symptoms does not mean that everything is clear.

=============================================

 

Before we continue download and install a free antivirus.

 

Remember to only install one antivirus!

 

1) Avast! Home Edition

2) AVG Free Edition

3) Avira AntiVir Personal

4) Microsoft Security Essentials for Windows Vista\Windows 7 - 64 bit Download

4-a) Microsoft Security Essentials for Windows XP

5) Comodo Antivirus (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" if you choose this one)

6) PC Tools AntiVirus Free Edition

 

It is strongly recommended that you run only one antivirus program at a time. Having more than one antivirus program active in memory uses additional resources and can result in program conflicts and false virus alerts. If you choose to install more than one antivirus program on your computer, then only one of them should be active in memory at a time.

 

=====================================

 

SUPERAntiSpyware

 

If you already have SUPERAntiSpyware be sure to check for updates before scanning!

 

Download SuperAntispyware Free Edition (SAS)

* Double-click the icon on your desktop to run the installer.

* When asked to Update the program definitions, click Yes

* If you encounter any problems while downloading the updates, manually download and unzip them from here

* Next click the Preferences button.

 

•Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts

* Click the Scanning Control tab.

* Under Scanner Options make sure only the following are checked:

 

•Close browsers before scanning

•Scan for tracking cookies

•Terminate memory threats before quarantining

Please leave the others unchecked

 

•Click the Close button to leave the control center screen.

 

* On the main screen click Scan your computer

* On the left check the box for the drive you are scanning.

* On the right choose Perform Complete Scan

* Click Next to start the scan. Please be patient while it scans your computer.

* After the scan is complete a summary box will appear. Click OK

* Make sure everything in the white box has a check next to it, then click Next

* It will quarantine what it found and if it asks if you want to reboot, click Yes

 

•To retrieve the removal information please do the following:

•After reboot, double-click the SUPERAntiSpyware icon on your desktop.

•Click Preferences. Click the Statistics/Logs tab.

 

•Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.

 

•It will open in your default text editor (preferably Notepad).

•Save the notepad file to your desktop by clicking (in notepad) File > Save As...

 

* Save the log somewhere you can easily find it. (normally the desktop)

* Click close and close again to exit the program.

*Copy and Paste the log in your post.

 

=====================================

 

Malwarebytes' Anti-Malware (MBAM)

 

If you already have Malwarebytes be sure to check for updates before scanning!

 

Download Malwarebytes Anti-Malware and save it to your desktop. Alternate download link

 

•Double-click mbam-setup.exe and follow the prompts to install the program.

 

•Be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.

 

If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.

•If an update is found, it will download and install the latest version.

•Once the program has loaded, select Perform Quick Scan, then click Scan.

 

•When the scan is complete, click OK, then Show Results to view the results.

 

•Be sure that everything is checked, and click Remove Selected.

 

•When completed, a log will open in Notepad. Save it to a convenient location like the Desktop.

 

•The log is also automatically saved and can be viewed later by clicking the Logs tab in MBAM.

 

Copy and Paste the contents of the report in your reply.

 

•Exit MBAM.

.

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

 

==================================

 

Please download: HiJackThis to your Desktop.

  • Double Click the HijackThis icon, located on your Desktop.
  • By Default, it will install to: C:\Program Files\Trend Micro\HijackThis
  • Accept the license agreement.
  • Click the Open the Misc Tools section button.
  • Place a checkmark beside Calculate MD5 of files if possible. Then, click Back.
  • Click Do a System Scan and Save a Logfile. Or, if you see a white screen, click Scan.
  • Please post the log in your next reply.

Link to comment
Share on other sites

SpuerAntiSpyware

 

SUPERAntiSpyware Scan Log

http://www.superantispyware.com

 

Generated 07/26/2010 at 03:13 AM

 

Application Version : 4.41.1000

 

Core Rules Database Version : 5265

Trace Rules Database Version: 3077

 

Scan type : Complete Scan

Total Scan Time : 05:22:31

 

Memory items scanned : 423

Memory threats detected : 0

Registry items scanned : 7651

Registry threats detected : 34

File items scanned : 61997

File threats detected : 84

 

Adware.Agent/Gen-EZLife[AdShot]

HKLM\Software\Classes\CLSID\{E0EC6FBA-F009-3535-95D6-B6390DB27DA1}

HKCR\CLSID\{E0EC6FBA-F009-3535-95D6-B6390DB27DA1}

HKCR\CLSID\{E0EC6FBA-F009-3535-95D6-B6390DB27DA1}#AppID

HKCR\CLSID\{E0EC6FBA-F009-3535-95D6-B6390DB27DA1}\InprocServer32

HKCR\CLSID\{E0EC6FBA-F009-3535-95D6-B6390DB27DA1}\InprocServer32#ThreadingModel

HKCR\CLSID\{E0EC6FBA-F009-3535-95D6-B6390DB27DA1}\ProgID

HKCR\CLSID\{E0EC6FBA-F009-3535-95D6-B6390DB27DA1}\Programmable

HKCR\CLSID\{E0EC6FBA-F009-3535-95D6-B6390DB27DA1}\TypeLib

HKCR\CLSID\{E0EC6FBA-F009-3535-95D6-B6390DB27DA1}\VersionIndependentProgID

 

Adware.Tracking Cookie

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@stopzilla[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@adserver.adtechus[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@ads.gamersmedia[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@interclick[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@bizzclick[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@counter.surfcounters[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@statcounter[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@bannertgt[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@rotator.adjuggler[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@xm.xtendmedia[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@a1.interclick[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@ads.ad4game[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@at.atwola[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@ar.atwola[3].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@ar.atwola[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@advertise[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@content.yieldmanager[3].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@ads.undertone[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@ad.yieldmanager[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@adlegend[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@ads.intergi[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@content.yieldmanager[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@adxpose[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@intermundomedia[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@atwola[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@ads.watershed-publishing[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@www.stopzilla[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@ads.e-planning[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@ad.wsod[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@adecn[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@avgtechnologies.112.2o7[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@invitemedia[2].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@edgeadx[1].txt

C:\Documents and Settings\Maxwell Anderson\Cookies\maxwell_anderson@media6degrees[1].txt

bc.youporn.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

cdn.insights.gravity.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

cdn.media.theview.tv [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

cdn4.specificclick.net [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

cloudfront.mediamatters.org [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

core.insightexpressai.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

ia.media-imdb.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

media.ign.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

media.king5.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

media.mtvnservices.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

media.scanscout.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

media1.break.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

msnbcmedia.msn.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

objects.tremormedia.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

s0.2mdn.net [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

secure-us.imrworldwide.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

service.twistage.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

udn.specificclick.net [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

video.redorbit.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

http://www.naiadsystems.com [ C:\Documents and Settings\Maxwell Anderson\Application Data\Macromedia\Flash Player\#SharedObjects\7CDMYG9J ]

C:\Documents and Settings\Maxwell Anderson\Local Settings\Temp\Cookies\maxwell_anderson@ad.yieldmanager[1].txt

C:\Documents and Settings\Maxwell Anderson\Local Settings\Temp\Cookies\maxwell_anderson@content.yieldmanager[2].txt

C:\Documents and Settings\Maxwell Anderson\Local Settings\Temp\Cookies\maxwell_anderson@content.yieldmanager[3].txt

C:\Documents and Settings\Maxwell Anderson\Local Settings\Temp\Cookies\maxwell_anderson@invitemedia[2].txt

C:\Documents and Settings\Maxwell Anderson\Local Settings\Temp\Cookies\maxwell_anderson@media6degrees[1].txt

crackle.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\LHKJ7K5U ]

media.mtvnservices.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\LHKJ7K5U ]

media.scanscout.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\LHKJ7K5U ]

objects.tremormedia.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\LHKJ7K5U ]

secure-us.imrworldwide.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\LHKJ7K5U ]

service.twistage.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\LHKJ7K5U ]

 

Adware.MyWebSearch/FunWebProducts

HKU\S-1-5-21-1445900358-414898540-1940255998-1006\SOFTWARE\FunWebProducts

 

Adware.Flash Tracking Cookie

C:\Documents and Settings\Maxwell Anderson\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\7CDMYG9J\MEDIA.MTVNSERVICES.COM

C:\Documents and Settings\Maxwell Anderson\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\7CDMYG9J\MEDIA1.BREAK.COM

C:\Documents and Settings\Maxwell Anderson\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\7CDMYG9J\MSNBCMEDIA.MSN.COM

C:\Documents and Settings\Maxwell Anderson\Application Data\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\7CDMYG9J\SECURE-US.IMRWORLDWIDE.COM

 

Malware.Trace

C:\WINDOWS\Tasks\{8C3FDD81-7AE0-4605-A46A-2488B179F2A3}.job

C:\WINDOWS\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job

HKLM\SOFTWARE\AVSolution

HKU\.DEFAULT\SOFTWARE\AVSolution

HKU\S-1-5-21-1445900358-414898540-1940255998-1006\SOFTWARE\AVSolution

HKU\S-1-5-18\SOFTWARE\AVSolution

HKU\.DEFAULT\SOFTWARE\AVSUITE

HKU\S-1-5-21-1445900358-414898540-1940255998-1006\SOFTWARE\AVSUITE

HKU\S-1-5-18\SOFTWARE\AVSUITE

HKLM\SOFTWARE\AVSUITE

HKU\S-1-5-21-1445900358-414898540-1940255998-1006\Software\QNB2EB90WX

 

Disabled.SecurityCenterOption

HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER#ANTIVIRUSDISABLENOTIFY

HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER#FIREWALLDISABLENOTIFY

HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER#UPDATESDISABLENOTIFY

 

Adware.AdRotator

HKU\S-1-5-21-1445900358-414898540-1940255998-1006\Software\RZDVL2F27W

HKLM\SOFTWARE\Classes\AppID\{38061EDC-40BB-4618-A8DA-E56353347E6D}

HKLM\SOFTWARE\Classes\AppID\{38061EDC-40BB-4618-A8DA-E56353347E6D}\instl

HKLM\SOFTWARE\Classes\AppID\{38061EDC-40BB-4618-A8DA-E56353347E6D}\instl\data

HKLM\SOFTWARE\Classes\AppID\{38061EDC-40BB-4618-A8DA-E56353347E6D}\instl\data#afltId

HKLM\SOFTWARE\Classes\AppID\{38061EDC-40BB-4618-A8DA-E56353347E6D}\instl\data#hrdId

HKLM\SOFTWARE\Classes\AppID\{38061EDC-40BB-4618-A8DA-E56353347E6D}\instl\data#instlDay

HKLM\SOFTWARE\Classes\AppID\{38061EDC-40BB-4618-A8DA-E56353347E6D}\instl\data#prdctId

HKLM\SOFTWARE\Classes\AppID\{38061EDC-40BB-4618-A8DA-E56353347E6D}\instl\data#sftId

HKLM\SOFTWARE\Classes\AppID\{7B6A2552-E65B-4a9e-ADD4-C45577FFD8FD}

HKLM\SOFTWARE\Classes\AppID\{84C3C236-F588-4c93-84F4-147B2ABBE67B}

HKLM\SOFTWARE\Classes\AppID\{84C3C236-F588-4c93-84F4-147B2ABBE67B}\apps

C:\Documents and Settings\Maxwell Anderson\Application Data\SKY-BANNERS\skb\log.xml

C:\Documents and Settings\Maxwell Anderson\Application Data\SKY-BANNERS\skb

C:\Documents and Settings\Maxwell Anderson\Application Data\SKY-BANNERS

C:\Documents and Settings\Maxwell Anderson\Application Data\STREET-ADS

 

Trojan.Agent/Gen-Faldesc

C:\VIRUS.400908281

 

Trojan.Agent/Gen-CDesc[Gen]

C:\VIRUS.400909703

 

Trojan.Agent/Gen-RogueDropper

C:\VIRUS.400911218

C:\VIRUS.418627984

 

Trojan.Agent/Gen-OnlineGames

C:\VIRUS.400912000

 

Trojan.Agent/Gen-FakeAlert[Mares]

C:\VIRUS.400995093

 

Rogue.Agent/Gen-Nullo[DLL]

C:\WINDOWS\IXOLIBUG.DLL

C:\WINDOWS\OBUWEBEW.DLL

 

Trojan.Agent/Gen

C:\WINDOWS\PSS\SCANDISK.DLLSTARTUP

 

 

Took 5 hours to perform.

Link to comment
Share on other sites

Malwarebytes' Anti-malware

 

Malwarebytes' Anti-Malware 1.46

http://www.malwarebytes.org

 

Database version: 4350

 

Windows 5.1.2600 Service Pack 3

Internet Explorer 7.0.5730.11

 

7/26/2010 4:28:16 AM

mbam-log-2010-07-26 (04-28-16).txt

 

Scan type: Quick scan

Objects scanned: 136765

Time elapsed: 54 minute(s), 12 second(s)

 

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 4

Registry Values Infected: 1

Registry Data Items Infected: 1

Folders Infected: 0

Files Infected: 7

 

Memory Processes Infected:

(No malicious items detected)

 

Memory Modules Infected:

(No malicious items detected)

 

Registry Keys Infected:

HKEY_CLASSES_ROOT\cscrptxt.cscrptxt (Adware.EZlife) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\cscrptxt.cscrptxt.1.0 (Adware.EZlife) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\adshothlpr.adshothlpr (Adware.Adrotator) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\adshothlpr.adshothlpr.1.0 (Adware.Adrotator) -> Quarantined and deleted successfully.

 

Registry Values Infected:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\AppCertDlls\appsecdll (Trojan.Agent) -> Quarantined and deleted successfully.

 

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Maxwell Anderson\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Internet Explorer\iexplore.exe") Good: (iexplore.exe) -> Quarantined and deleted successfully.

 

Folders Infected:

(No malicious items detected)

 

Files Infected:

C:\virus.400996312 (Trojan.Hiloti) -> Quarantined and deleted successfully.

C:\WINDOWS\Temp\0.19200646685060607.exe (Trojan.Dropper) -> Quarantined and deleted successfully.

C:\WINDOWS\Temp\0.9651704371807333.gif (Extension.Mismatch) -> Quarantined and deleted successfully.

C:\WINDOWS\Temp\exe.exe (Trojan.Dropper) -> Quarantined and deleted successfully.

C:\Documents and Settings\Maxwell Anderson\Local Settings\Application Data\ave.exe (Rogue.MultipleAV) -> Quarantined and deleted successfully.

C:\WINDOWS\exe.exe (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\Maxwell Anderson\ntload.dll (Trojan.Agent) -> Quarantined and deleted successfully.

Link to comment
Share on other sites

Hijackthis

 

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 4:41:00 AM, on 7/26/2010

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v7.00 (7.00.5730.0011)

Boot mode: Normal

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\AVG\AVG9\avgchsvx.exe

C:\Program Files\AVG\AVG9\avgrsx.exe

C:\Program Files\AVG\AVG9\avgcsrvx.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\system32\rundll32.exe

C:\Program Files\AVG\AVG9\avgwdsvc.exe

C:\WINDOWS\system32\svchost.exe

C:\PROGRA~1\AVG\AVG9\avgtray.exe

C:\WINDOWS\system32\ctfmon.exe

C:\WINDOWS\system32\SearchIndexer.exe

C:\Program Files\AVG\AVG9\avgnsx.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=127.0.0.1:5643

O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll (filesize 1619296 bytes, MD5 9709500432501607C7DD32B9F2B07E1F)

O3 - Toolbar: (no name) - {BA52B914-B692-46c4-B683-905236F6F655} - (no file)

O3 - Toolbar: (no name) - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - (no file)

O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto (filesize 169984 bytes, MD5 A81135541C9D4EBCE43EFA8AD31395B4)

O4 - HKLM\..\Run: [AVG9_TRAY] C:\PROGRA~1\AVG\AVG9\avgtray.exeC:\PROGRA~1\AVG\AVG9\avgtray.exe

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exeC:\WINDOWS\system32\ctfmon.exe

O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll (filesize 509328 bytes, MD5 F921D875A1CBD69A6A462BA2514BC831)

O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll (filesize 509328 bytes, MD5 F921D875A1CBD69A6A462BA2514BC831)

O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll (filesize 604056 bytes, MD5 E003E1BE8780DD39DF02C3F06CDEDF04)

O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll (filesize 604056 bytes, MD5 E003E1BE8780DD39DF02C3F06CDEDF04)

O9 - Extra button: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\WINDOWS\system32\shdocvw.dll (filesize 1499136 bytes, MD5 26CB10FA893F940AB09713FF46DCDADE)

O9 - Extra 'Tools' menuitem: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\WINDOWS\system32\shdocvw.dll (filesize 1499136 bytes, MD5 26CB10FA893F940AB09713FF46DCDADE)

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL (filesize 39464 bytes, MD5 AEF204E782BFA2C8448CB43A58960744)

O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll (filesize 1499136 bytes, MD5 26CB10FA893F940AB09713FF46DCDADE)

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe (filesize 558080 bytes, MD5 AAC1D4EE39DF138C5D30AC5883E3B59F)

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe (filesize 558080 bytes, MD5 AAC1D4EE39DF138C5D30AC5883E3B59F)

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (filesize 1695232 bytes, MD5 3E930C641079443D4DE036167A69CAA2)

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (filesize 1695232 bytes, MD5 3E930C641079443D4DE036167A69CAA2)

O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)

O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll (filesize 178040 bytes, MD5 68747446F9D982938DB6B110F2908271)

O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG9\avgpp.dll (filesize 91488 bytes, MD5 3D9895B981AFAC3CE2ABE9C0A63D949A)

O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL (filesize 1959208 bytes, MD5 1E79B48BC50B99FDC0066860BCEFBC23)

O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLLC:\Program Files\SUPERAntiSpyware\SASWINLO.DLL

O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dllC:\WINDOWS\SYSTEM32\avgrsstx.dll

O23 - Service: AVG Free WatchDog (avg9wd) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgwdsvc.exeC:\Program Files\AVG\AVG9\avgwdsvc.exe

 

--

End of file - 6225 bytes

Link to comment
Share on other sites

Download Disable/Remove Windows Messenger to the desktop to remove Windows Messenger.

 

Do not confuse Windows Messenger with MSN Messenger because they are not the same. Windows Messenger is a frequent cause of popups.

 

Unzip the file on the desktop. Open the MessengerDisable.exe and choose the bottom box - Uninstall Windows Messenger and click Apply.

 

Exit out of MessengerDisable then delete the two files that were put on the desktop.

 

=============================================

 

Open HijackThis and select Do a system scan only

 

Place a check mark next to the following entries: (if there)

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Int ernet Settings,ProxyServer = http=127.0.0.1:5643

O3 - Toolbar: (no name) - {BA52B914-B692-46c4-B683-905236F6F655} - (no file)

O3 - Toolbar: (no name) - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - (no file)

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (filesize 1695232 bytes, MD5 3E930C641079443D4DE036167A69CAA2)

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (filesize 1695232 bytes, MD5 3E930C641079443D4DE036167A69CAA2)

O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)

Important: Close all open windows except for HijackThis and then click Fix checked.

 

Once completed, exit HijackThis.

 

=======================================

 

We have to find some way of getting more free space on your HDD. What is the size of your HDD? You should have at least 15% free space otherwise, your computer will eventually crash.

 

•Start HijackThis

•Click on the Misc Tools button

•Click on the Open Uninstall Manager button.

•Click on the Save list... button and specify where you would like to save this file. When you press Save button a Notepad will open with the contents of that file. Save the file to your desktop.

Copy and paste this file in your next reply.

 

======================================

 

Download Security Check by screen317 from one of the following links and save it to your desktop.

 

Link 1

Link 2

 

* Unzip SecurityCheck.zip and a folder named Security Check should appear.

* Open the Security Check folder and double-click Security Check.bat

* Follow the on-screen instructions inside of the black box.

* A Notepad document should open automatically called checkup.txt

* Post the contents of that document in your next reply.

 

Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.

Link to comment
Share on other sites

"Download Disable/Remove Windows Messenger to the desktop to remove Windows Messenger."

 

I received a different name for the product, it came back as PC Tools Registry Mechanic. Just want to make sure I am using the correct program.

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...