1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Active Google Redirect (IE,FF), Micros. Update blocked, Kaspersky not

Discussion in 'Malware and Virus Removal Archive' started by lukebriggs, 2009/05/31.

  1. 2009/05/31
    lukebriggs

    lukebriggs Inactive Thread Starter

    Joined:
    2009/05/31
    Messages:
    7
    Likes Received:
    0
    [Active] Google Redirect (IE,FF), Micros. Update blocked, Kaspersky not

    This log was requested from my thread - see it for more details about the problems:

    http://www.windowsbbs.com/general-i...e-live-windows-update-problem.html#post460536

    DDS.txt:

    DDS (Ver_09-05-14.01) - NTFSx86
    Run by New Luke at 23:29:08.82 on Sun 05/31/2009
    Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_13
    Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.1023.506 [GMT 1:00]

    AV: Kaspersky Internet Security *On-access scanning enabled* (Outdated) {2C4D4BC6-0793-4956-A9F9-E252435469C0}
    FW: Kaspersky Internet Security *enabled* {2C4D4BC6-0793-4956-A9F9-E252435469C0}

    ============== Running Processes ===============

    C:\WINDOWS\system32\svchost -k DcomLaunch
    svchost.exe
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    svchost.exe
    svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    svchost.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 7.0\avp.exe
    C:\Program Files\IVT Corporation\BlueSoleil\BlueSoleilCS.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\WINDOWS\System32\CTsvcCDA.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\Program Files\SMART Board Software\SMARTBoardService.exe
    C:\WINDOWS\System32\svchost.exe -k imgsvc
    C:\WINDOWS\System32\MsPMSPSv.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 7.0\avp.exe
    C:\Program Files\IVT Corporation\BlueSoleil\BsHelpCS.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 7.0\avp.exe
    C:\Program Files\Logitech\iTouch\iTouch.exe
    C:\Program Files\IVT Corporation\BlueSoleil\BtTray.exe
    C:\Program Files\Lexmark 5200 series\lxbtbmgr.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\WINDOWS\system32\RUNDLL32.EXE
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Documents and Settings\New Luke\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
    C:\Program Files\Lexmark 5200 series\lxbtbmon.exe
    C:\Program Files\Logitech\MouseWare\system\em_exec.exe
    C:\Program Files\Creative\SBLive\Diagnostics\diagent.exe
    C:\WINDOWS\System32\svchost.exe -k HTTPFilter
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Documents and Settings\New Luke\My Documents\SpyHunter-Scanner-Install.exe
    C:\Program Files\Windows Live\Messenger\msnmsgr.exe
    C:\Program Files\Windows Media Player\wmplayer.exe
    C:\Documents and Settings\New Luke\Desktop\dds.scr

    ============== Pseudo HJT Report ===============

    uStart Page = hxxp://www.google.co.uk/
    uInternet Settings,ProxyOverride = localhost;*.local
    BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 6.0\reader\activex\AcroIEHelper.dll
    BHO: Skype add-on (mastermind): {22bf413b-c6d2-4d91-82a9-a0f997ba588c} - c:\program files\skype\toolbars\internet explorer\SkypeIEPlugin.dll
    BHO: {355D7733-76E2-4146-9BB2-C761006CE06B} - No File
    BHO: CIEDownload Object: {67bcf957-85fc-4036-8dc4-d4d80e00a77b} - c:\program files\smart board software\NotebookPlugin.dll
    BHO: {7E853D72-626A-48EC-A868-BA8D5E23E045} - No File
    BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
    BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
    BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
    uRun: [CTFMON.EXE] c:\windows\system32\ctfmon.exe
    uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
    uRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NVMCTRAY.DLL,NvTaskbarInit
    uRun: [Google Update] "c:\documents and settings\new luke\local settings\application data\google\update\GoogleUpdate.exe" /c
    uRun: [RegistryMechanic] c:\program files\registry mechanic\RegMech.exe /H
    mRun: [UpdReg] c:\windows\UpdReg.EXE
    mRun: [diagent] "c:\program files\creative\sblive\diagnostics\diagent.exe" startup
    mRun: [AVP] "c:\program files\kaspersky lab\kaspersky internet security 7.0\avp.exe "
    mRun: [ANIWZCS2Service] c:\program files\ani\aniwzcs2 service\WZCSLDR2.exe
    mRun: [zBrowser Launcher] c:\program files\logitech\itouch\iTouch.exe
    mRun: [Logitech Utility] Logi_MwX.Exe
    mRun: [BtTray] "c:\program files\ivt corporation\bluesoleil\BtTray.exe "
    mRun: [Lexmark 5200 series] "c:\program files\lexmark 5200 series\lxbtbmgr.exe "
    mRun: [LXBTCATS] rundll32 c:\windows\system32\spool\drivers\w32x86\3\LXBTtime.dll,_RunDLLEntry@16
    mRun: [FaxCenterServer] "c:\program files\lexmark fax solutions\fm3032.exe" /s
    mRun: [<NO NAME>]
    mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
    mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe "
    mRun: [nwiz] nwiz.exe /install
    mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
    mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
    mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe "
    mRun: [SpyHunter Security Suite] c:\program files\enigma software group\spyhunter\SpyHunter3.exe
    dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
    StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\logite~1.lnk - c:\program files\logitech\desktop messenger\8876480\program\LDMConf.exe
    StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office10\OSA.EXE
    mPolicies-explorer: <NO NAME> =
    IE: Add to Anti-Banner - c:\program files\kaspersky lab\kaspersky internet security 7.0\ie_banner_deny.htm
    IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office10\EXCEL.EXE/3000
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    IE: {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - {85E0B171-04FA-11D1-B7DA-00A0C90348D6} - c:\program files\kaspersky lab\kaspersky internet security 7.0\SCIEPlgn.dll
    IE: {77BF5300-1474-4EC7-9980-D32B190E9B07} - {77BF5300-1474-4EC7-9980-D32B190E9B07} - c:\program files\skype\toolbars\internet explorer\SkypeIEPlugin.dll
    DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
    DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
    DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} - hxxp://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
    DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/C/0/C/C0CBBA88-A6F2-48D9-9B0E-1719D1177202/LegitCheckControl.cab
    DPF: {1E54D648-B804-468d-BC78-4AFFED8E262E} - hxxp://www.nvidia.com/content/DriverDownload/srl/3.0.0.0/srl_bin/sysreqlab3.cab
    DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} - hxxp://messenger.zone.msn.com/binary/msgrchkr.cab56986.cab
    DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} - hxxp://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.4.1.cab
    DPF: {5D6F45B3-9043-443D-A792-115447494D24} - hxxp://messenger.zone.msn.com/EN-GB/a-UNO1/GAME_UNO1.cab
    DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1211762100375
    DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/products/plugin/autodl/jinstall-160-windows-i586.cab
    DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
    DPF: {A8F2B9BD-A6A0-486A-9744-18920D898429} - hxxp://www.sibelius.com/download/software/win/ActiveXPlugin.cab
    DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} - hxxp://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
    DPF: {C49134CC-B5EF-458C-A442-E8DFE7B4645F} - hxxp://www.yoyogames.com/downloads/activex/YoYo.cab
    DPF: {C53BDC3D-19A0-4062-BF34-0897A4E6A6A2} - hxxp://www.wildpockets.com/common/WildPocketsLoader-11994.cab
    DPF: {CAFEEFAC-0014-0002-0019-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_06-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
    DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
    DPF: {DE625294-70E6-45ED-B895-CFFA13AEB044} - hxxp://213.72.190.210/activex/AMC.cab
    DPF: {F8C5C0F1-D884-43EB-A5A0-9E1C4A102FA8} - hxxps://secure.gopetslive.com/dev/GoPetsWeb.cab
    TCP: NameServer = 85.255.112.158,85.255.112.86
    TCP: {95A024ED-5B01-4F7D-8A9A-D351A0406C6A} = 85.255.112.158,85.255.112.86
    TCP: {C107B689-B9EB-43B7-A340-DFA2877C39DB} = 85.255.112.158,85.255.112.86
    Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
    Notify: klogon - c:\windows\system32\klogon.dll
    AppInit_DLLs: c:\progra~1\kasper~1\kasper~1.0\adialhk.dll
    SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
    SSODL: vltdfabw - {E8F11BF5-091D-45CA-B853-C5503BB47EE7} - c:\windows\vltdfabw.dll

    ================= FIREFOX ===================

    FF - ProfilePath - c:\docume~1\newluk~1\applic~1\mozilla\firefox\profiles\fahel4kh.default\
    FF - plugin: c:\documents and settings\new luke\local settings\application data\google\update\1.2.145.5\npGoogleOneClick8.dll

    ============= SERVICES / DRIVERS ===============

    R0 kl1;Kl1;c:\windows\system32\drivers\kl1.sys [2007-4-28 112144]
    R1 klif;Klif;c:\windows\system32\drivers\klif.sys [2007-6-27 194320]
    R2 AVP;Kaspersky Internet Security 7.0;c:\program files\kaspersky lab\kaspersky internet security 7.0\avp.exe [2007-6-28 218376]
    R3 klim5;Kaspersky Anti-Virus NDIS Filter;c:\windows\system32\drivers\klim5.sys [2007-4-4 24344]
    S3 mcdevice;mcdevice;c:\windows\system32\drivers\mcdevice.sys [2009-2-20 324096]
    S3 rt2870;Ralink 802.11n USB Wireless LAN Card Driver;c:\windows\system32\drivers\rt2870.sys [2008-5-26 476416]

    =============== Created Last 30 ================

    2009-05-31 20:18 <DIR> --d----- c:\program files\Enigma Software Group
    2009-05-31 16:53 1,081,616 a------- c:\windows\system32\MSCOMCTL.OCX
    2009-05-28 10:59 43 a------- c:\windows\system32\InstallSettings.ini
    2009-05-28 10:54 1,124,720 a------- c:\windows\system32\D3DCompiler_34.dll
    2009-05-27 17:36 <DIR> --d----- c:\program files\DDS Converter 2
    2009-05-26 17:45 <DIR> --d----- c:\program files\3DRipperDX
    2009-05-21 17:27 <DIR> --d----- c:\program files\Foxit Software
    2009-05-21 02:12 <DIR> --d----- C:\Temp
    2009-05-17 19:28 <DIR> --d----- c:\documents and settings\new luke\.artofillusion
    2009-05-17 19:23 <DIR> --d----- c:\program files\ArtOfIllusion
    2009-05-16 22:06 <DIR> --d----- c:\program files\3D Object Converter 4.40
    2009-05-16 22:06 7,883 a------- c:\windows\Eng_UK.gpl
    2009-05-16 22:05 796,672 a------- c:\windows\GPInstall.exe
    2009-05-16 21:25 <DIR> --d----- c:\program files\Alias
    2009-05-16 18:38 <DIR> --d----- C:\JMEPHY
    2009-05-16 18:12 <DIR> --d----- C:\JMECVS
    2009-05-16 16:48 <DIR> --d----- c:\documents and settings\new luke\.jnlp-applet
    2009-05-13 20:19 <DIR> --d----- c:\documents and settings\new luke\.netbeans-derby
    2009-05-13 20:11 <DIR> --d----- c:\documents and settings\new luke\.netbeans
    2009-05-13 20:10 <DIR> --d----- c:\documents and settings\new luke\.netbeans-registration
    2009-05-13 20:02 <DIR> --d----- c:\program files\NetBeans 6.5.1
    2009-05-13 19:56 <DIR> --d----- c:\program files\JavaFX
    2009-05-13 18:54 <DIR> --d----- c:\docume~1\newluk~1\applic~1\[ManufacturerNonTM]
    2009-05-10 23:28 236 a---h--- c:\program files\common files\dx.reg
    2009-05-10 23:26 3,495,784 a------- c:\windows\system32\d3dx9_33.dll
    2009-05-10 23:26 1,029,126 a------- c:\windows\system32\d3d10.dll
    2009-05-10 23:26 462,864 a------- c:\windows\system32\d3dx10_37.dll
    2009-05-10 23:26 444,776 a------- c:\windows\system32\d3dx10_36.dll
    2009-05-10 23:26 444,776 a------- c:\windows\system32\d3dx10_35.dll
    2009-05-10 23:26 443,752 a------- c:\windows\system32\d3dx10_34.dll
    2009-05-10 23:26 443,752 a------- c:\windows\system32\d3dx10_33.dll
    2009-05-10 23:26 440,080 a------- c:\windows\system32\d3dx10.dll
    2009-05-10 23:26 187,398 a------- c:\windows\system32\d3d10core.dll
    2009-05-10 23:26 974,354 a------- c:\windows\system32\crypt32new.dll
    2009-05-10 23:26 770,069 a------- c:\windows\system32\advapi32new.dll
    2009-05-10 23:26 171,023 a------- c:\windows\system32\apphelpnew.dll
    2009-05-10 20:05 448 ---shr-- C:\autorun.inf
    2009-05-10 19:13 <DIR> --d----- C:\FLEXLM
    2009-05-10 18:00 49,664 a------- c:\windows\system32\SNTI386.DLL
    2009-05-10 18:00 18,432 a------- c:\windows\system32\RNBOVDD.DLL
    2009-05-10 18:00 73,728 a------- c:\windows\system32\drivers\SENTINEL.SYS
    2009-05-10 18:00 20,032 a----r-- c:\windows\system32\drivers\SNTNLUSB.SYS
    2009-05-10 18:00 264,704 a------- c:\windows\system32\hlvdd.dll
    2009-05-10 18:00 47,616 a------- c:\windows\system32\drivers\Haspnt.sys
    2009-05-10 18:00 6,656 a------- c:\windows\system32\haspvdd.dll
    2009-05-10 18:00 2,577 a------- c:\windows\system32\config.hsp
    2009-05-10 18:00 383 a------- c:\windows\system32\haspdos.sys
    2009-05-10 18:00 9,949 -------- c:\windows\system32\SENTINEL.HLP
    2009-05-10 17:56 <DIR> --d----- c:\windows\system32\RNBOSENT
    2009-05-10 17:56 7,328 a------- c:\windows\system32\drivers\ds1410d.sys
    2009-05-10 17:56 <DIR> --d----- c:\program files\GLOBEtrotter Software Inc
    2009-05-10 17:55 693,760 a------- c:\windows\system32\drivers\hardlock.sys
    2009-05-10 17:54 <DIR> --d----- c:\documents and settings\new luke\WINDOWS
    2009-05-10 17:38 3,497,832 a------- c:\windows\system32\d3dx9_34.dll
    2009-05-10 01:18 4,096 a------- c:\windows\d3dx.dat
    2009-05-10 01:03 <DIR> --d----- c:\program files\Torque
    2009-05-09 23:27 0 a---h--- c:\windows\SwSys2.bmp
    2009-05-09 23:27 0 a---h--- c:\windows\SwSys1.bmp
    2009-05-09 23:26 <DIR> --d----- c:\docume~1\alluse~1\applic~1\YoYoGames
    2009-05-09 00:40 58,672 a---h--- c:\windows\system32\mlfcache.dat
    2009-05-03 21:35 <DIR> --d----- C:\wamp
    2009-05-02 17:04 <DIR> --d----- c:\windows\IIS Temporary Compressed Files
    2009-05-02 17:03 <DIR> --d----- c:\windows\system32\Cache
    2009-05-02 17:03 7,168 ac------ c:\windows\system32\dllcache\EXCH_snprfdll.dll
    2009-05-02 17:03 57,856 ac------ c:\windows\system32\dllcache\EXCH_scripto.dll
    2009-05-02 17:03 26,112 ac------ c:\windows\system32\dllcache\EXCH_seos.dll
    2009-05-02 17:03 12,288 ac------ c:\windows\system32\dllcache\EXCH_smtpctrs.dll
    2009-05-02 17:03 38,912 ac------ c:\windows\system32\dllcache\EXCH_ntfsdrv.dll
    2009-05-02 17:03 23,040 ac------ c:\windows\system32\dllcache\EXCH_regtrace.exe
    2009-05-02 17:03 65,536 ac------ c:\windows\system32\dllcache\EXCH_mailmsg.dll
    2009-05-02 17:03 43,520 ac------ c:\windows\system32\dllcache\EXCH_fcachdll.dll
    2009-05-02 17:03 45,056 ac------ c:\windows\system32\dllcache\EXCH_aqadmin.dll
    2009-05-02 17:03 5,632 ac------ c:\windows\system32\dllcache\EXCH_adsiisex.dll
    2009-05-02 10:50 9 a------- c:\windows\system32\ANIWZCSUSERNAME{222C0DEC-D906-4CC0-A8EB-6601D81311B4}

    ==================== Find3M ====================

    2009-05-31 23:29 74,004,256 a--sh--- c:\windows\system32\drivers\fidbox.dat
    2009-05-31 23:28 3,668,000 a--sh--- c:\windows\system32\drivers\fidbox2.dat
    2009-05-31 19:56 345,800 a--sh--- c:\windows\system32\drivers\fidbox2.idx
    2009-05-31 19:56 992,552 a--sh--- c:\windows\system32\drivers\fidbox.idx
    2009-05-31 11:20 34 a------- c:\documents and settings\new luke\jagex_runescape_preferences.dat
    2009-04-24 22:39 368,640 a------- c:\windows\system32\ReWire.dll
    2009-04-24 22:39 233,472 a------- c:\windows\system32\REX Shared Library.dll
    2009-04-20 22:04 79,392 a------- c:\docume~1\newluk~1\applic~1\GDIPFONTCACHEV1.DAT
    2009-04-11 22:20 410,984 a------- c:\windows\system32\deploytk.dll
    2009-03-06 15:22 284,160 a------- c:\windows\system32\pdh.dll
    2009-03-03 01:18 826,368 a------- c:\windows\system32\wininet.dll
    2008-05-26 02:32 32,768 a--sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008051920080526\index.dat
    2008-05-26 02:32 32,768 a--sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008052620080527\index.dat

    ============= FINISH: 23:30:34.12 ===============
     
  2. 2009/06/01
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Print these instructions out.

    NOTE. If any of the programs listed below refuse to run, try renaming executive file to something else; for instance, rename hijackthis.exe to scanner.exe

    ***VERY IMPORTANT! Make sure, you update Superantispyware, and Malwarebytes before running the scans.***

    STEP 1. Download SUPERAntiSpyware Free for Home Users:
    http://www.superantispyware.com/

    * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    * An icon will be created on your desktop. Double-click that icon to launch the program.
    * If asked to update the program definitions, click "Yes ". If not, update the definitions before scanning by selecting "Check for Updates ". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
    * Close SUPERAntiSpyware.

    PHYSICALLY DISCONNECT FROM THE INTERNET

    Restart computer in Safe Mode.
    To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

    * Open SUPERAntiSpyware.
    * Click Scan your Computer... button.
    * Click Scanning Preferences/Control Center... button.
    * Under General and Startup tab, make sure, Start SUPERAntiSpyware when Windows starts option is UN-checked.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all others unchecked):
    - Close browsers before scanning.
    - Terminate memory threats before quarantining.

    * Click the Close button to leave the control center screen.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, choose Perform Complete Scan.
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click OK.
    * Make sure everything has a checkmark next to it and click Next.
    * A notification will appear that Quarantine and Removal is Complete. Click OK and then click the Finish button to return to the main menu.
    * If asked if you want to reboot, click Yes.
    * To retrieve the removal information after reboot, launch SUPERAntispyware again.
    - Click Preferences, then click the Statistics/Logs tab.
    - Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    - If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    - Please copy and paste the Scan Log results in your next reply.

    * Click Close to exit the program.
    Post SUPERAntiSpyware log.

    RECONNECT TO THE INTERNET

    RESTART COMPUTER!

    STEP 2. Download Malwarebytes' Anti-Malware: http://www.malwarebytes.org/mbam.php to your desktop.
    (Malwarebytes is free to use as a manual scanner. Payment is only required if you wish to have it run and update automatically which is not necessary for our purposes)

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform full scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    STEP 3. Download GMER: http://www.gmer.net/files.php, by clicking on Download EXE button.
    Alternative downloads:
    - http://majorgeeks.com/GMER_d5198.html
    - http://www.softpedia.com/get/Interne...ers/GMER.shtml
    Double click on downloaded .exe file, select Rootkit tab and click the Scan button.
    When scan is completed, click Save button, and save the results as gmer.log
    Warning ! Please, do not select the "Show all" checkbox during the scan.
    Post the log to your next reply.

    RESTART COMPUTER

    STEP 4. Download HijackThis:
    http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis/download
    by clicking on Download HijackThis Installer
    Install, and run it.
    Post HijackThis log.
    Do NOT attempt to "fix" anything!


    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
    lukebriggs likes this.

  3. to hide this advert.

  4. 2009/06/01
    lukebriggs

    lukebriggs Inactive Thread Starter

    Joined:
    2009/05/31
    Messages:
    7
    Likes Received:
    0
    Hey there - thankyou for your very quick reply! I've just tried to download superantispyware.exe, but both internet explorer and FF are claiming that they cannot display the webpage. I'm going to try and download it on another computer, then transfer it to this one.

    Edit: Transfers + downloads successful :)
     
    Last edited: 2009/06/01
  5. 2009/06/01
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Alrighty:)
     
  6. 2009/06/01
    lukebriggs

    lukebriggs Inactive Thread Starter

    Joined:
    2009/05/31
    Messages:
    7
    Likes Received:
    0
    The lil SuperAntiSpyware scan is now done and it looks like its already done the trick :D Im going to continue following the tutorial though of course :) Thanks a bunch! [The application windows still have the different font and large buttons, but I can live with that :)]

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 06/01/2009 at 03:55 PM

    Application Version : 4.26.1004

    Core Rules Database Version : 3910
    Trace Rules Database Version: 1854

    Scan type : Complete Scan
    Total Scan Time : 03:52:13

    Memory items scanned : 235
    Memory threats detected : 0
    Registry items scanned : 7922
    Registry threats detected : 5
    File items scanned : 236433519
    File threats detected : 1

    Trojan.Net-JSU/NMC
    HKLM\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad#vltdfabw [ {E8F11BF5-091D-45CA-B853-C5503BB47EE7} ]

    Trojan.DNS-Changer (Hi-Jacked DNS)
    HKLM\SYSTEM\CONTROLSET003\SERVICES\TCPIP\PARAMETERS\INTERFACES\{95A024ED-5B01-4F7D-8A9A-D351A0406C6A}#NAMESERVER
    HKLM\SYSTEM\CONTROLSET003\SERVICES\TCPIP\PARAMETERS\INTERFACES\{C107B689-B9EB-43B7-A340-DFA2877C39DB}#NAMESERVER
    HKLM\SYSTEM\CONTROLSET004\SERVICES\TCPIP\PARAMETERS\INTERFACES\{95A024ED-5B01-4F7D-8A9A-D351A0406C6A}#NAMESERVER
    HKLM\SYSTEM\CONTROLSET004\SERVICES\TCPIP\PARAMETERS\INTERFACES\{C107B689-B9EB-43B7-A340-DFA2877C39DB}#NAMESERVER

    Trojan.Unclassified/RegSVR-Fake
    C:\WINDOWS\SYSTEM32\EMBEDDED\REGSVR.EXE
     
  7. 2009/06/01
    lukebriggs

    lukebriggs Inactive Thread Starter

    Joined:
    2009/05/31
    Messages:
    7
    Likes Received:
    0
    Malwarebytes' Anti-Malware 1.37
    Database version: 2207
    Windows 5.1.2600 Service Pack 3

    6/1/2009 19:45:17
    mbam-log-2009-06-01 (19-45-10).txt

    Scan type: Full Scan (C:\|)
    Objects scanned: 236433316
    Time elapsed: 2 hour(s), 24 minute(s), 28 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 6
    Registry Values Infected: 0
    Registry Data Items Infected: 8
    Folders Infected: 0
    Files Infected: 5

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{355d7733-76e2-4146-9bb2-c761006ce06b} (Trojan.FakeAlert) -> No action taken.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{355d7733-76e2-4146-9bb2-c761006ce06b} (Trojan.FakeAlert) -> No action taken.
    HKEY_CLASSES_ROOT\atfxqogp.bakq (Trojan.FakeAlert) -> No action taken.
    HKEY_CLASSES_ROOT\atfxqogp.toolbar.1 (Trojan.FakeAlert) -> No action taken.
    HKEY_CURRENT_USER\SOFTWARE\{NSINAME} (Trojan.Agent) -> No action taken.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\gxvxcserv.sys (Trojan.Agent) -> No action taken.

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId (Trojan.FakeAlert) -> Bad: (VIRUS ALERT!) Good: (55276-011-8078667-22418) -> No action taken.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> No action taken.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.158,85.255.112.86 -> No action taken.
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{c107b689-b9eb-43b7-a340-dfa2877c39db}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.158,85.255.112.86 -> No action taken.
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.158,85.255.112.86 -> No action taken.
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces\{c107b689-b9eb-43b7-a340-dfa2877c39db}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.158,85.255.112.86 -> No action taken.
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.112.158,85.255.112.86 -> No action taken.
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\Tcpip\Parameters\Interfaces\{c107b689-b9eb-43b7-a340-dfa2877c39db}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.158,85.255.112.86 -> No action taken.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    c:\system volume information\_restore{4b26bf08-c0db-45f6-bd77-79c295bb4318}\RP339\A0068766.exe (Rogue.FakeAlert) -> No action taken.
    c:\system volume information\_restore{4b26bf08-c0db-45f6-bd77-79c295bb4318}\RP346\A0069816.exe (Trojan.DNSChanger) -> No action taken.
    c:\program files\e2eSoft\VCam\styles\Vista.cjstyles (Trojan.Agent) -> No action taken.
    C:\autorun.inf (Trojan.DNSChanger) -> No action taken.
    c:\RECYCLER\S-7-1-77-100025593-100007035-100020037-4938.com (Trojan.DNSChanger) -> No action taken.
     
  8. 2009/06/01
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Very well :)

    We'll worry about it, when your computer is clean :)

    Malwarebytes log shows No action taken comment after each item, so you either posted the log from before fixes, or you didn't fix issues.
    Post correct log, or re-run 'Bytes.
     
  9. 2009/06/03
    lukebriggs

    lukebriggs Inactive Thread Starter

    Joined:
    2009/05/31
    Messages:
    7
    Likes Received:
    0
    Thanks again for all your help :) Im going to re-run bytes as soon as I get the chance - right now I'm doing some exams (gcses) which are a load more important than this computer :p
     
  10. 2009/06/03
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Good luck with your exams :)
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.