1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Solved Problems with virus attack

Discussion in 'Malware and Virus Removal Archive' started by Ant S, 2010/10/15.

  1. 2010/10/23
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Thank you :))) and I'm glad to see your computer being more happy.

    Your computer could definitely use some more RAM.

    Also, you're running really low on C drive free space:
    You have very small hard drive.

    ==============================================================

    Update your Java version here: http://www.java.com/en/download/installed.jsp

    Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

    Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

    Now, we need to remove old Java version and its remnants...

    Download JavaRa to your desktop and unzip it to its own folder
    • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
    • Accept any prompts.

    ================================================================

    Run OTL
    • Under the [color= "#0000FF"]Custom Scans/Fixes[/color] box at the bottom, paste in the following

      Code:
      :OTL
      O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - No CLSID value found.
      O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
      O2 - BHO: (no name) - AutorunsDisabled - No CLSID value found.
      O4 - HKLM..\Run: [TFncKy] File not found
      O16 - DPF: {0000000A-0000-0010-8000-00AA00389B71} http://download.microsoft.com/downlo...CC2/wmavax.CAB (Reg Error: Key error.)
      O16 - DPF: {31435657-9980-0010-8000-00AA00389B71} http://download.microsoft.com/downlo...8f/wvc1dmo.cab (Reg Error: Key error.)
      O16 - DPF: {33564D57-0000-0010-8000-00AA00389B71} http://download.microsoft.com/downlo...22/wmv9VCM.CAB (Reg Error: Key error.)
      O16 - DPF: {41564D57-9980-0010-8000-00AA00389B71} http://download.microsoft.com/downlo...1F/wmvadvd.cab (Reg Error: Key error.)
      O16 - DPF: {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499} http://download.bitdefender.com/reso...an8/oscan8.cab (Reg Error: Key error.)
      O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.)
      O16 - DPF: Microsoft XML Parser for Java file://C:\WINDOWS\Java\classes\xmldso.cab (Reg Error: Key error.)
      [2010/08/24 11:00:39 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Ant\Application Data\Symantec
      [2010/08/16 07:13:14 | 000,000,000 | ---D | C] -- C:\Documents and Settings\Ant\Local Settings\Application Data\Symantec_Corporation
      [2010/08/15 20:15:49 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Symantec
      [1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
      [1 C:\Documents and Settings\Ant\*.tmp files -> C:\Documents and Settings\Ant\*.tmp -> ]
      
      
      :Services
      
      :Reg
      
      :Files
      
      :Commands
      [purity]
      [emptytemp]
      [emptyflash]
      [Reboot]
      
    • Then click the [color= "#FF0000"]Run Fix[/color] button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • You will get a log that shows the results of the fix. Please post it.

    ================================================================

    Last scans...

    1. Download Security Check from HERE, and save it to your Desktop.
    • Double-click SecurityCheck.exe
    • Follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.


    2. Download Temp File Cleaner (TFC)
    • Double click on TFC.exe to run the program.
    • Click on Start button to begin cleaning process.
    • TFC will close all running programs, and it may ask you to restart computer.


    3. Please run a free online scan with the ESET Online Scanner

    • Disable your antivirus program
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • IMPORTANT! UN-check Remove found threats
    • Accept any security warnings from your browser.
    • Check Scan archives
    • Click Start
    • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    • When the scan completes, push List of found threats
    • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    • NOTE. If Eset won't find any threats, it won't produce any log.
     
  2. 2010/10/24
    Ant S

    Ant S Inactive Thread Starter

    Joined:
    2010/10/14
    Messages:
    43
    Likes Received:
    0
    Yes, its quite an old laptop. There's space in only one slot for around another 128 MB.

    The 10GB disk was only supposed to be a temporary fix after I fried my old drive. I've 40GB and 120GB drives but couldn't migrate. Apparently I need to create a disk image, which is something I've not had chance to get my head round yet. :confused:

    Updated Java, ran Temp File Cleaner. OTL, Security Check logs to follow. ESET didn't find any threats.

    Not sure why Security Check says Java is still out of date.
     
    Last edited: 2010/10/24

  3. to hide this advert.

  4. 2010/10/24
    Ant S

    Ant S Inactive Thread Starter

    Joined:
    2010/10/14
    Messages:
    43
    Likes Received:
    0
    OTL log

    All processes killed
    ========== OTL ==========
    Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{02478D38-C3F9-4efb-9B51-7695ECA05670}\ not found.
    Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5C255C8A-E604-49b4-9D64-90988571CECB}\ not found.
    Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\AutorunsDisabled\ deleted successfully.
    Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\TFncKy deleted successfully.
    Starting removal of ActiveX control {0000000A-0000-0010-8000-00AA00389B71}
    C:\WINDOWS\Downloaded Program Files\WMAVAX.inf moved successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{0000000A-0000-0010-8000-00AA00389B71}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0000000A-0000-0010-8000-00AA00389B71}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{0000000A-0000-0010-8000-00AA00389B71}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0000000A-0000-0010-8000-00AA00389B71}\ not found.
    Starting removal of ActiveX control {31435657-9980-0010-8000-00AA00389B71}
    C:\WINDOWS\Downloaded Program Files\wvc1dmo.inf moved successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{31435657-9980-0010-8000-00AA00389B71}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{31435657-9980-0010-8000-00AA00389B71}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{31435657-9980-0010-8000-00AA00389B71}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{31435657-9980-0010-8000-00AA00389B71}\ not found.
    Starting removal of ActiveX control {33564D57-0000-0010-8000-00AA00389B71}
    C:\WINDOWS\Downloaded Program Files\WMV9VCM.inf moved successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{33564D57-0000-0010-8000-00AA00389B71}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33564D57-0000-0010-8000-00AA00389B71}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{33564D57-0000-0010-8000-00AA00389B71}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{33564D57-0000-0010-8000-00AA00389B71}\ not found.
    Starting removal of ActiveX control {41564D57-9980-0010-8000-00AA00389B71}
    C:\WINDOWS\Downloaded Program Files\wmvadvd.inf moved successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{41564D57-9980-0010-8000-00AA00389B71}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{41564D57-9980-0010-8000-00AA00389B71}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{41564D57-9980-0010-8000-00AA00389B71}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{41564D57-9980-0010-8000-00AA00389B71}\ not found.
    Starting removal of ActiveX control {5D86DDB5-BDF9-441B-9E9E-D4730F4EE499}
    C:\WINDOWS\Downloaded Program Files\oscan8.inf not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{5D86DDB5-BDF9-441B-9E9E-D4730F4EE499}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5D86DDB5-BDF9-441B-9E9E-D4730F4EE499}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{5D86DDB5-BDF9-441B-9E9E-D4730F4EE499}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5D86DDB5-BDF9-441B-9E9E-D4730F4EE499}\ not found.
    Starting removal of ActiveX control {E2883E8F-472F-4FB0-9522-AC9BF37916A7}
    C:\WINDOWS\Downloaded Program Files\gp.inf not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found.
    File oft XML Parser for Java file://C:\WINDOWS\Java\classes\xmldso.cab not found.
    Starting removal of ActiveX control Microsoft XML Parser for Java
    Registry error reading value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\Microsoft XML Parser for Java\DownloadInformation\\INF .
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\Microsoft XML Parser for Java\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Microsoft XML Parser for Java\ not found.
    C:\Documents and Settings\Ant\Application Data\Symantec\Norton Ghost folder moved successfully.
    C:\Documents and Settings\Ant\Application Data\Symantec folder moved successfully.
    C:\Documents and Settings\Ant\Local Settings\Application Data\Symantec_Corporation\VProConsole.exe_Url_lpdc2k50jgmq1bxprss5e1wfkmvu5yvj\9.0.0.0 folder moved successfully.
    C:\Documents and Settings\Ant\Local Settings\Application Data\Symantec_Corporation\VProConsole.exe_Url_lpdc2k50jgmq1bxprss5e1wfkmvu5yvj folder moved successfully.
    C:\Documents and Settings\Ant\Local Settings\Application Data\Symantec_Corporation folder moved successfully.
    C:\Documents and Settings\All Users\Application Data\Symantec\hpc folder moved successfully.
    C:\Documents and Settings\All Users\Application Data\Symantec\LiveUpdate folder moved successfully.
    C:\Documents and Settings\All Users\Application Data\Symantec folder moved successfully.
    C:\WINDOWS\System32\CONFIG.TMP deleted successfully.
    C:\Documents and Settings\Ant\usrusmt2.tmp\JOURNAL.DAT deleted successfully.
    C:\Documents and Settings\Ant\usrusmt2.tmp folder deleted successfully.
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    ========== FILES ==========
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: Default User
    ->Temp folder emptied: 65984 bytes
    ->Temporary Internet Files folder emptied: 33726 bytes

    User: All Users

    User: NetworkService
    ->Temp folder emptied: 69918 bytes
    ->Temporary Internet Files folder emptied: 33170 bytes

    User: LocalService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 32902 bytes

    User: Owner
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 67 bytes

    User: Ant
    ->Temp folder emptied: 11491488 bytes
    ->Temporary Internet Files folder emptied: 63890692 bytes
    ->Java cache emptied: 0 bytes
    ->Google Chrome cache emptied: 18637897 bytes
    ->Flash cache emptied: 24727 bytes

    User: Administrator
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Guest
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 67 bytes

    User: A I Swain

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\dllcache .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 452099 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 34282 bytes
    RecycleBin emptied: 3919963 bytes

    Total Files Cleaned = 94.00 mb


    [EMPTYFLASH]

    User: Default User

    User: All Users

    User: NetworkService

    User: LocalService

    User: Owner

    User: Ant
    ->Flash cache emptied: 0 bytes

    User: Administrator

    User: Guest

    User: A I Swain

    Total Flash Files Cleaned = 0.00 mb


    OTL by OldTimer - Version 3.2.16.0 log created on 10232010_225902

    Files\Folders moved on Reboot...

    Registry entries deleted on Reboot...
     
  5. 2010/10/24
    Ant S

    Ant S Inactive Thread Starter

    Joined:
    2010/10/14
    Messages:
    43
    Likes Received:
    0
    Security Check log

    Results of screen317's Security Check version 0.99.5
    Windows XP Service Pack 3
    Internet Explorer 6 Out of date!
    ``````````````````````````````
    Antivirus/Firewall Check:

    Windows Firewall Disabled!
    Microsoft Security Essentials
    Microsoft Security Essentials successfully updated!
    ```````````````````````````````
    Anti-malware/Other Utilities Check:

    Malwarebytes' Anti-Malware
    HijackThis 2.0.2
    CCleaner
    Java(TM) 6 Update 22
    Out of date Java installed!
    Adobe Flash Player
    Adobe Reader 7.0.9
    Out of date Adobe Reader installed!
    ````````````````````````````````
    Process Check:
    objlist.exe by Laurent

    Windows Defender MSMpEng.exe
    Microsoft Security Essentials msseces.exe
    ````````````````````````````````
    DNS Vulnerability Check:

    GREAT! (Not vulnerable to DNS cache poisoning)

    ``````````End of Log````````````
     
  6. 2010/10/24
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Just a program glitch. Don't worry about it.

    Update IE to at least version 7.

    Update Adobe Reader

    You can download it from http://www.adobe.com/products/acrobat/readstep2.html
    After installing the latest Adobe Reader, uninstall all previous versions.
    Note. If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

    Alternatively, you can uninstall Adobe Reader (33.5 MB), download and install Foxit PDF Reader(3.5MB) from HERE.
    It's a much smaller file to download and uses a lot less resources than Adobe Reader.
    Note: When installing FoxitReader, make sure to UN-check any pre-checked toolbar, or other garbage.
    On this page:

    [​IMG]

    make sure, you have both boxes UN-checked AND (important!) click on Decline button

    ==============================================================

    Your computer is clean :)

    1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

    Run OTL

    • Under the Custom Scans/Fixes box at the bottom, paste in the following:

    Code:
    :OTL
    :Commands
    [purity]
    [emptytemp]
    [EMPTYFLASH]
    [CLEARALLRESTOREPOINTS]
    [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • Post resulting log.

    2. Now, we'll remove all tools, we used during our cleaning process

    Clean up with OTL:

    • Double-click OTL.exe to start the program.
    • Close all other programs apart from OTL as this step will require a reboot
    • On the OTL main screen, press the CLEANUP button
    • Say Yes to the prompt and then allow the program to reboot your computer.

    If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

    3. Make sure, Windows Updates are current.

    4. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

    7. Run Temporary File Cleaner (TFC) weekly.

    8. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

    9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
    The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

    10. Run defrag at your convenience.

    11. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

    12. Please, let me know, how is your computer doing.
     
  7. 2010/10/24
    Ant S

    Ant S Inactive Thread Starter

    Joined:
    2010/10/14
    Messages:
    43
    Likes Received:
    0
    Broni, there's been a problem... :(

    The last OTL scan knocked out the computer's keyboard function buttons. It deleted the buttons' registry key. Looking back, OTL had reported that the .exe file (TFncKy.exe) wasn't found, but it was there.

    I've done a system restore which has effectively taken me back to the start of post #41. What do you suggest? Do you think there could be other false positives?
     
  8. 2010/10/24
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    That shouldn't be a problem.
    Simply re-run OTL fix again, but remove that one O4 item from my script.

    Then, continue with my reply #45.
     
  9. 2010/10/25
    Ant S

    Ant S Inactive Thread Starter

    Joined:
    2010/10/14
    Messages:
    43
    Likes Received:
    0
    Hi, Broni. Another problem...

    I re-ran OTL and all the other steps on post #41 (but without the O4.) All seemed fine, but over the last 24 hours MS Word has quit on me three times for no apparent reason. (The application literally just vanishes--no freezing, no error message, etc. This is something I've not seen before.)

    I've just done another system restore that's effectively taken me back to the beginning of post #41 and am going to see if that cures the Word problem. I'll post back with an update then hopefully you can advise me from there, though it may have to be in a couple of days time.
     
  10. 2010/10/25
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    No more system restore, please.
    If any program doesn't work, simply reinstall it, like MS Office.

    Since your computer is malware free, I'm marking it as resolved.
     
  11. 2010/10/28
    Ant S

    Ant S Inactive Thread Starter

    Joined:
    2010/10/14
    Messages:
    43
    Likes Received:
    0
    Before you disappear, Broni... :)

    Because I’ve little space on my laptop, I’ve room only for a handful of restore points. Also, my laptop is OEM, so I’ve no installation disk. I'm a bit worried that if I find in a few day's time that OTL has caused some other part of my PC to stop working, there could be no way of fixing it.

    It looks as though the instructions on post #41 did cause the Ms Word problem. (To be fair, I could've re-installed Word, but do we know if OTL didn't knock out part of the OS rather than Word?) I’m quite nervous. OTL has already reported one false positive.

    Can the OTL script on post #41 or part of it be safely skipped? Do the intructions relate to virus removal or they for less essential mopping up?

    Thanks again.
     
  12. 2010/10/28
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    The script #41 is not essential and you can skip it, if you wish.

    You have to keep in mind, that when we clean some infected computer some side effects may happen and they happen.

    Reinstalling some program is not a big deal compare to still infected computer.
     
  13. 2010/11/15
    Ant S

    Ant S Inactive Thread Starter

    Joined:
    2010/10/14
    Messages:
    43
    Likes Received:
    0
    Just to bring this thread up to date...

    The instructions on post #41 were a bit of a nightmare.

    (1) After the Java update installation, JavaRa removed the update, leaving my PC with no Java whatsoever

    (2) After installing the Java update (without running JavaRa), some java applets stopped using ClearType fonts

    (3) The OTL fix deleted the registry for the .exe that provides access to my keyboard's function keys; it also appeared to do something to cause MS Word to suddenly vanish when in use

    As a consequence, the Java update and Java removal tool was skipped and the OTL fix run with a minimal script.

    Have run through the clean-up instructions (on post#45.) (However, for reasons found above, I didn't clear the computer's restore points using OTL.) The computer is doing fine. :)

    I’ll post a final round-up shortly for anyone following this thread.
     
  14. 2010/11/15
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Ok....
     
  15. 2010/11/24
    Ant S

    Ant S Inactive Thread Starter

    Joined:
    2010/10/14
    Messages:
    43
    Likes Received:
    0
    Just to round this thread up...

    The five symptoms appeared to have been caused by a combination of the Vundo trojan and a 'forged' termdd.sys file.

    The Vundo trojan was probably responsible for the Internet browser re-directs. It re-directs to seemingly harmless websites to remain inconspicuous. It also attacks anti-malware programs. The registry entries created by the trojan were cleaned by Malwarebyte's Anti-malware. The 700MB disk-bloat was removed by ComboFix.

    termdd.sys file is a Windows service. It's forged nature and failure to properly start explains the "Win32 Services" error message. TDSSKiller effectively found and dealt with the bogus file.

    Unfortunately, the post-removal clean-up almost caused as many problems as I'd had at the start. Be wary when running fixes using OTL. It can report false positives.

    Don’t connect to the Internet with anti-virus switched off!

    Thanks to Broni for his help. Much appreciated. :)
     
  16. 2010/11/24
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    You're very welcome :)
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.