Jump to content

Starbuck

Members
  • Posts

    2
  • Joined

  • Last visited

Everything posted by Starbuck

  1. Nevermind. I waited a couple of days, updated MBAM via safe mode, rescanned and it appears to picked up the virus this time around. Yay! Fingers crossed.
  2. I'm a first timer here so please bear with me as I muddle through this. I have run the latest version of MBAM and initially, it picked up some infected files. I thought that would take care of my problem but the fake Security Shield pop ups continue. I ran MBAM again and it's not finding any issues. My DDS and most recent MBAM log follow; and the attach.txt and GMER scan are zipped and attached. The GMER scan didn't find any system modifications. DDS (Ver_2011-06-23.01) - NTFSAMD64 NETWORK Internet Explorer: 8.0.7600.16385 Run by Jennifer at 19:00:42 on 2011-07-12 Microsoft Windows 7 Home Premium 6.1.7600.0.1252.1.1033.18.3895.2916 [GMT -7:00] . AV: McAfee Anti-Virus and Anti-Spyware *Enabled/Updated* {86355677-4064-3EA7-ABB3-1B136EB04637} SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46} SP: McAfee Anti-Virus and Anti-Spyware *Enabled/Updated* {3D54B793-665E-3129-9103-206115370C8A} FW: McAfee Firewall *Enabled* {BE0ED752-0A0B-3FFF-80EC-B2269063014C} . ============== Running Processes =============== . C:\windows\system32\wininit.exe C:\windows\system32\lsm.exe C:\windows\system32\svchost.exe -k DcomLaunch C:\windows\system32\svchost.exe -k RPCSS C:\windows\System32\svchost.exe -k LocalServiceNetworkRestricted C:\windows\system32\svchost.exe -k netsvcs C:\windows\system32\svchost.exe -k LocalSystemNetworkRestricted C:\windows\system32\svchost.exe -k LocalService C:\windows\system32\svchost.exe -k NetworkService C:\windows\system32\svchost.exe -k LocalServiceNoNetwork C:\windows\system32\mfevtps.exe C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe C:\windows\system32\svchost.exe -k NetworkServiceNetworkRestricted C:\windows\Explorer.EXE C:\windows\system32\ctfmon.exe c:\PROGRA~1\mcafee.com\agent\mcagent.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\windows\SysWOW64\cmd.exe C:\windows\system32\conhost.exe C:\windows\SysWOW64\cscript.exe C:\windows\system32\wbem\wmiprvse.exe . ============== Pseudo HJT Report =============== . uStart Page = hxxp://www.google.com/ig?hl=en mDefault_Page_URL = hxxp://www.google.com/ig/redirectdomain?brand=TSNA&bmod=TSNA mStart Page = hxxp://www.google.com/ig/redirectdomain?brand=TSNA&bmod=TSNA uInternet Settings,ProxyOverride = <local>;*.local mWinlogon: Userinit=userinit.exe, Malwarebytes' Anti-Malware 1.51.0.1200 www.malwarebytes.org Database version: 7082 Windows 6.1.7600 (Safe Mode) Internet Explorer 8.0.7600.16385 7/12/2011 6:15:51 PM mbam-log-2011-07-12 (18-15-51).txt Scan type: Full scan (C:\|D:\|) Objects scanned: 401979 Time elapsed: 40 minute(s), 58 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 0 Registry Values Infected: 0 Registry Data Items Infected: 0 Folders Infected: 0 Files Infected: 0 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: (No malicious items detected) Registry Values Infected: (No malicious items detected) Registry Data Items Infected: (No malicious items detected) Folders Infected: (No malicious items detected) Files Infected: (No malicious items detected) Attach.zip
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.