Jump to content

MBAM exits within a few seconds


AshK

Recommended Posts

Hi,

I recently got a problem with google searches re-directing me to the wrong pages. After reading up on this forum I tried to install MBAM. When I tried to run, it would automatically close down within a few seconds.

I found a topic on the forum "i'm infected - what do I do now" and followed the instructions on there.

1. Disabled CD-rom Emulation Software

2. Ran DDS - saved both files to desktop

3. Tried to run GMER - this scans for about 20 mins and then I get a message box stating DCOM server - "INITIATED BY NT AUTHORITY/SYSTEM. Process launcher service terminated unexpectedly".

The computer then shuts down and restarts. Therefore I am unable to save the log it produces.

Can you please help?

Ive pasted the dds log below if that helps:

DDS (Ver_09-12-01.01) - NTFSx86

Run by Amish at 13:10:27.32 on 25/02/2010

Internet Explorer: 6.0.2900.2180

Microsoft Windows XP Home Edition 5.1.2600.2.1252.44.1033.18.2038.1606 [GMT 0:00]

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch

C:\WINDOWS\system32\svchost -k rpcss

C:\WINDOWS\System32\svchost.exe -k netsvcs

C:\WINDOWS\system32\svchost.exe -k NetworkService

C:\WINDOWS\system32\svchost.exe -k LocalService

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Digital Media Reader\shwiconem.exe

C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe

C:\WINDOWS\system32\igfxtray.exe

C:\WINDOWS\system32\igfxpers.exe

C:\PROGRA~1\mcafee.com\agent\mcagent.exe

C:\WINDOWS\zHotkey.exe

C:\WINDOWS\RTHDCPL.EXE

C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe

C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe

C:\WINDOWS\system32\ctfmon.exe

c:\progra~1\mcafee.com\vso\mcvsescn.exe

C:\WINDOWS\system32\svchost.exe -k LocalService

c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe

C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS

C:\WINDOWS\system32\svchost.exe -k imgsvc

c:\PROGRA~1\mcafee.com\vso\mcshield.exe

C:\WINDOWS\System32\alg.exe

C:\WINDOWS\System32\svchost.exe -k HTTPFilter

C:\WINDOWS\system32\wuauclt.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\WINDOWS\system32\wbem\wmiprvse.exe

C:\Documents and Settings\Amish\Desktop\dds.scr

============== Pseudo HJT Report ===============

uSearch Bar = hxxp://www.google.co.uk/ie

uStart Page = hxxp://www.google.co.uk/

uInternet Connection Wizard,ShellNext = hxxp://www.uk.emachines.com/

mSearchAssistant = hxxp://www.google.com/ie

uURLSearchHooks: BigMAQ Toolbar: {7f312b9a-208b-49fa-8218-b9aa22ec1463} - c:\program files\bigmaq\tbBig1.dll

mWinlogon: Userinit=c:\windows\system32\userinit.exe,c:\windows\system32\sdra64.exe,

BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll

BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL

BHO: BigMAQ Toolbar: {7f312b9a-208b-49fa-8218-b9aa22ec1463} - c:\program files\bigmaq\tbBig1.dll

BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar1.dll

TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll

TB: McAfee VirusScan: {ba52b914-b692-46c4-b683-905236f6f655} - c:\progra~1\mcafee.com\vso\mcvsshl.dll

TB: BigMAQ Toolbar: {7f312b9a-208b-49fa-8218-b9aa22ec1463} - c:\program files\bigmaq\tbBig1.dll

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe

mRun: [sunKistEM] c:\program files\digital media reader\shwiconem.exe

mRun: [<NO NAME>]

mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"

mRun: [Recguard] %WINDIR%\SMINST\RECGUARD.EXE

mRun: [Reminder] %WINDIR%\Creator\Remind_XP.exe

mRun: [High Definition Audio Property Page Shortcut] HDAShCut.exe

mRun: [AzMixerSel] c:\program files\realtek\installshield\AzMixerSel.exe

mRun: [igfxTray] c:\windows\system32\igfxtray.exe

mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe

mRun: [Persistence] c:\windows\system32\igfxpers.exe

mRun: [VSOCheckTask] "c:\progra~1\mcafee.com\vso\mcmnhdlr.exe" /checktask

mRun: [MCAgentExe] c:\progra~1\mcafee.com\agent\mcagent.exe

mRun: [MCUpdateExe] c:\progra~1\mcafee.com\agent\McUpdate.exe

mRun: [CHotkey] zHotkey.exe

mRun: [RTHDCPL] RTHDCPL.EXE

mRun: [Alcmtr] ALCMTR.EXE

mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"

mRun: [VirusScan Online] c:\progra~1\mcafee.com\vso\mcvsshld.exe

mRunOnce: [Malwarebytes' Anti-Malware] c:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silent

dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE

StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\instal~1.lnk - c:\program files\sifxinst\SIFXINST.EXE

IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0002-ABCDEFFEDCBC} - c:\program files\java\jre1.5.0_02\bin\npjpi150_02.dll

IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll

IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_02-windows-i586.cab

DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab

DPF: {CAFEEFAC-0015-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_02-windows-i586.cab

Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\progra~1\micros~2\office12\GR99D3~1.DLL

Notify: igfxcui - igfxdev.dll

SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL

============= SERVICES / DRIVERS ===============

R2 MCVSRte;McAfee.com VirusScan Online Realtime Engine;c:\progra~1\mcafee.com\vso\mcvsrte.exe [2009-3-28 122880]

R3 McShield;McAfee.com McShield;c:\progra~1\mcafee.com\vso\mcshield.exe [2009-3-28 225375]

R3 NaiFiltr;NaiFiltr;c:\windows\system32\drivers\NaiFiltr.sys [2009-3-28 23296]

S3 FsUsbExDisk;FsUsbExDisk;c:\windows\system32\FsUsbExDisk.Sys [2009-5-14 36608]

S3 mcupdmgr.exe;McAfee SecurityCenter Update Manager;c:\progra~1\mcafee.com\agent\mcupdmgr.exe [2009-3-28 249856]

=============== Created Last 30 ================

2010-02-25 13:02:14 0 ----a-w- c:\documents and settings\amish\defogger_reenable

2010-02-25 12:59:50 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-02-25 12:59:47 19160 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-02-25 12:59:47 0 d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-02-24 18:37:51 0 d-----w- c:\docume~1\amish\applic~1\Malwarebytes

2010-02-24 18:37:45 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes

2010-02-20 17:51:17 0 d-sh--w- c:\windows\system32\lowsec

2010-02-07 13:37:21 0 d-----w- c:\windows\SxsCaPendDel

2010-02-04 18:07:07 664 ----a-w- c:\windows\system32\d3d9caps.dat

==================== Find3M ====================

2009-12-31 16:14:12 352640 ----a-w- c:\windows\system32\drivers\srv.sys

2009-12-22 05:35:11 668672 ----a-w- c:\windows\system32\wininet.dll

2009-12-22 05:35:05 81920 ----a-w- c:\windows\system32\ieencode.dll

2009-12-16 12:58:04 343040 ----a-w- c:\windows\system32\mspaint.exe

2009-12-14 07:35:35 33280 ----a-w- c:\windows\system32\csrsrv.dll

2009-12-08 18:55:25 2180352 ----a-w- c:\windows\system32\ntoskrnl.exe

2009-12-08 18:19:32 2057728 ----a-w- c:\windows\system32\ntkrnlpa.exe

2009-11-27 17:33:35 17920 ----a-w- c:\windows\system32\msyuv.dll

2009-11-27 17:33:35 1291264 ----a-w- c:\windows\system32\quartz.dll

2009-11-27 16:37:27 8704 ----a-w- c:\windows\system32\tsbyuv.dll

2009-11-27 16:37:27 84992 ----a-w- c:\windows\system32\avifil32.dll

2009-11-27 16:37:27 48128 ----a-w- c:\windows\system32\iyuv_32.dll

2009-11-27 16:37:27 28672 ----a-w- c:\windows\system32\msvidc32.dll

2009-11-27 16:37:27 11264 ----a-w- c:\windows\system32\msrle32.dll

============= FINISH: 13:11:35.85 ===============

Link to post
Share on other sites

Hello AshK

Welcome to Malwarebytes.

=====================

Looking at your system now, one or more of the identified infections is a backdoor Trojan.

If this computer is ever used for on-line banking, I suggest you do the following immediately:

1. Call all of your banks, credit card companies, financial institutions and inform them that you may be a victim of identity theft and to put a watch on your accounts or change all your account numbers.

2. From a clean computer, change ALL your on-line passwords for email, for banks, financial accounts, PayPal, eBay, on-line companies, any on-line forums or groups you belong to.

Do NOT change passwords or do any transactions while using the infected computer because the attacker will get the new passwords and transaction information.

=============

Download ComboFix from one of these locations:

Link 1

Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Link to post
Share on other sites

Hi thanks so much for your help on this. Its much appreciated.

I ran combofix as instructed and it produced the following report:

ComboFix 10-02-28.04 - Amish 01/03/2010 13:17:29.1.1 - x86

Microsoft Windows XP Home Edition 5.1.2600.2.1252.44.1033.18.2038.1659 [GMT 0:00]

Running from: c:\documents and settings\Amish\Desktop\ComboFix.exe

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\documents and settings\Amish\Application Data\inst.exe

c:\documents and settings\Amish\Local Settings\Temp\dyiosi.tmp

c:\recycler\S-1-5-21-416397930-138837774-1584774534-1003

c:\windows\COUPON~1.OCX

c:\windows\CouponPrinter.ocx

c:\windows\system32\lowsec

c:\windows\system32\lowsec\local.ds

c:\windows\system32\lowsec\user.ds

c:\windows\system32\sdra64.exe

D:\Autorun.inf

.

((((((((((((((((((((((((( Files Created from 2010-02-01 to 2010-03-01 )))))))))))))))))))))))))))))))

.

2010-02-25 16:39 . 2010-02-12 10:03 293376 ------w- c:\windows\system32\browserchoice.exe

2010-02-25 12:59 . 2010-01-07 16:07 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-02-25 12:59 . 2010-02-25 17:03 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-02-25 12:59 . 2010-01-07 16:07 19160 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-02-24 19:07 . 2010-02-24 19:07 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes

2010-02-24 18:37 . 2010-02-24 18:37 -------- d-----w- c:\documents and settings\Amish\Application Data\Malwarebytes

2010-02-24 18:37 . 2010-02-24 18:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2010-02-07 13:37 . 2010-02-07 14:32 -------- d-----w- c:\windows\SxsCaPendDel

2010-02-04 18:07 . 2010-02-04 18:07 664 ----a-w- c:\windows\system32\d3d9caps.dat

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-02-25 18:36 . 2009-03-28 16:23 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help

2010-02-07 13:45 . 2009-05-14 18:18 -------- d-----w- c:\documents and settings\Amish\Application Data\Samsung

2010-02-07 13:42 . 2009-05-14 18:17 -------- d-----w- c:\program files\Samsung

2010-02-07 13:42 . 2009-03-28 03:21 -------- d--h--w- c:\program files\InstallShield Installation Information

2010-02-07 13:39 . 2009-05-16 02:02 -------- d-----w- c:\documents and settings\All Users\Application Data\WinZip

2010-02-06 22:14 . 2009-03-28 15:26 -------- d-----w- c:\documents and settings\Amish\Application Data\uTorrent

2010-02-06 14:18 . 2009-11-15 12:42 -------- d-----w- c:\documents and settings\All Users\Application Data\DVD Shrink

2009-12-31 20:17 . 2009-03-31 15:02 -------- d-----w- c:\documents and settings\Amish\Application Data\Vso

2009-12-31 16:14 . 2009-03-28 10:15 352640 ----a-w- c:\windows\system32\drivers\srv.sys

2009-12-22 05:35 . 2009-03-28 10:15 668672 ----a-w- c:\windows\system32\wininet.dll

2009-12-22 05:35 . 2009-03-28 10:13 81920 ----a-w- c:\windows\system32\ieencode.dll

2009-12-16 12:58 . 2009-03-28 10:14 343040 ----a-w- c:\windows\system32\mspaint.exe

2009-12-14 07:35 . 2009-03-28 10:12 33280 ----a-w- c:\windows\system32\csrsrv.dll

2009-12-08 18:55 . 2009-03-28 10:14 2180352 ----a-w- c:\windows\system32\ntoskrnl.exe

2009-12-08 18:19 . 2009-03-28 11:08 2057728 ----a-w- c:\windows\system32\ntkrnlpa.exe

2009-12-04 14:41 . 2009-03-28 10:14 453760 ----a-w- c:\windows\system32\drivers\mrxsmb.sys

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]

"{7f312b9a-208b-49fa-8218-b9aa22ec1463}"= "c:\program files\BigMAQ\tbBig1.dll" [2009-11-13 2166296]

[HKEY_CLASSES_ROOT\clsid\{7f312b9a-208b-49fa-8218-b9aa22ec1463}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{7f312b9a-208b-49fa-8218-b9aa22ec1463}]

2009-11-13 20:25 2166296 ----a-w- c:\program files\BigMAQ\tbBig1.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]

"{7f312b9a-208b-49fa-8218-b9aa22ec1463}"= "c:\program files\BigMAQ\tbBig1.dll" [2009-11-13 2166296]

[HKEY_CLASSES_ROOT\clsid\{7f312b9a-208b-49fa-8218-b9aa22ec1463}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]

"{7F312B9A-208B-49FA-8218-B9AA22EC1463}"= "c:\program files\BigMAQ\tbBig1.dll" [2009-11-13 2166296]

[HKEY_CLASSES_ROOT\clsid\{7f312b9a-208b-49fa-8218-b9aa22ec1463}]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]

"SunKistEM"="c:\program files\Digital Media Reader\shwiconem.exe" [2004-11-15 135168]

"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2004-11-02 32768]

"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2002-09-13 212992]

"Reminder"="c:\windows\Creator\Remind_XP.exe" [2005-03-15 966656]

"High Definition Audio Property Page Shortcut"="HDAShCut.exe" [2005-01-07 61952]

"AzMixerSel"="c:\program files\Realtek\InstallShield\AzMixerSel.exe" [2005-06-11 53248]

"IgfxTray"="c:\windows\system32\igfxtray.exe" [2005-04-25 94208]

"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2005-04-25 77824]

"Persistence"="c:\windows\system32\igfxpers.exe" [2005-04-25 114688]

"VSOCheckTask"="c:\progra~1\mcafee.com\vso\mcmnhdlr.exe" [2004-07-01 139264]

"MCAgentExe"="c:\progra~1\mcafee.com\agent\mcagent.exe" [2004-08-17 245760]

"MCUpdateExe"="c:\progra~1\mcafee.com\agent\McUpdate.exe" [2004-10-25 184320]

"CHotkey"="zHotkey.exe" [2005-05-03 543232]

"RTHDCPL"="RTHDCPL.EXE" [2005-07-13 14679552]

"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2006-10-27 31016]

"VirusScan Online"="c:\progra~1\mcafee.com\vso\mcvsshld.exe" [2004-08-17 180224]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2004-08-04 15360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Install Pending Files.LNK - c:\program files\SIFXINST\SIFXINST.EXE [2009-3-28 729088]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]

"midi9"=c:\docume~1\Amish\LOCALS~1\Temp\dyiosi.tmp 2yADJIIHEP

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\uTorrent\\uTorrent.exe"=

"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=

"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=

"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=

R3 NaiFiltr;NaiFiltr;c:\windows\system32\drivers\NaiFiltr.sys [28/03/2009 04:02 23296]

S3 FsUsbExDisk;FsUsbExDisk;c:\windows\system32\FsUsbExDisk.Sys [14/05/2009 18:18 36608]

.

Contents of the 'Scheduled Tasks' folder

2010-03-01 c:\windows\Tasks\McAfee.com Update Check (APATEL-Amish).job

- c:\progra~1\mcafee.com\agent\mcupdate.exe [2009-03-28 11:08]

2010-03-01 c:\windows\Tasks\McAfee.com Update Check (YOUR-E071523647-Owner).job

- c:\progra~1\mcafee.com\agent\mcupdate.exe [2009-03-28 11:08]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.co.uk/

uInternet Connection Wizard,ShellNext = hxxp://www.uk.emachines.com/

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-03-01 13:29

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2248)

c:\windows\system32\msi.dll

c:\progra~1\mcafee.com\vso\McVSSkt.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\progra~1\mcafee.com\vso\mcvsrte.exe

c:\windows\zHotkey.exe

c:\windows\RTHDCPL.EXE

c:\progra~1\mcafee.com\vso\mcvsescn.exe

c:\program files\Common Files\New Boundary\PrismXL\PRISMXL.SYS

c:\progra~1\mcafee.com\vso\mcshield.exe

c:\windows\system32\wscntfy.exe

.

**************************************************************************

.

Completion time: 2010-03-01 13:32:37 - machine was rebooted

ComboFix-quarantined-files.txt 2010-03-01 13:32

Pre-Run: 35,515,691,008 bytes free

Post-Run: 36,346,691,584 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

- - End Of File - - 251C269DA502AA47DE8EDEE9DAFEAF52

Link to post
Share on other sites

You are welcome.

Update Run Malwarebytes

Please update\run Malwarebytes' Anti-Malware.

Double Click the Malwarebytes Anti-Malware icon to run the application.

  • Click on the update tab then click on Check for updates.
  • If an update is found, it will download and install the latest version.
  • Once the update has loaded, go to the Scanner tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatley.

=====

* Go here to run an online scannner from ESET.

  • Note: You will need to use Internet explorer for this scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activex control to install
  • Click Start
  • Check next options: Remove found threats and Scan unwanted applications.
  • Click Scan
  • Wait for the scan to finish
  • Use notepad to open the logfile located at C:\Program Files\ESET\ESET Online Scanner\log.txt
  • Copy and paste that log as a reply to this topic

Link to post
Share on other sites

Thanks for the clear instruction - very easy to follow.

As requested I have copied and pasted both logs below.

MBAM log:

Malwarebytes' Anti-Malware 1.44

Database version: 3809

Windows 5.1.2600 Service Pack 2

Internet Explorer 6.0.2900.2180

01/03/2010 16:13:27

mbam-log-2010-03-01 (16-13-27).txt

Scan type: Quick Scan

Objects scanned: 124772

Time elapsed: 5 minute(s), 1 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 10

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{3446af26-b8d7-199b-4cfc-6fd764ca5c9f} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{4776c4dc-e894-7c06-2148-5d73cef5f905} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{3446af26-b8d7-199b-4cfc-6fd764ca5c9f} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{4776c4dc-e894-7c06-2148-5d73cef5f905} (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

ESET log:

ESETSmartInstaller@High as CAB hook log:

OnlineScanner.ocx - registred OK

# version=7

# IEXPLORE.EXE=6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)

# OnlineScanner.ocx=1.0.0.6211

# api_version=3.0.2

# EOSSerial=f2e28db3024e544d92877103d2e21d98

# end=finished

# remove_checked=true

# archives_checked=false

# unwanted_checked=true

# unsafe_checked=false

# antistealth_checked=false

# utc_time=2010-03-01 05:18:42

# local_time=2010-03-01 05:18:42 (+0000, GMT Standard Time)

# country="United Kingdom"

# lang=9

# osver=5.1.2600 NT Service Pack 2

# compatibility_mode=8192 67108863 100 0 3735 3735 0 0

# scanned=130441

# found=23

# cleaned=23

# scan_time=3458

C:\My Backup -- 09-03-28 0405AM\WINDOWS\system32\heupoeia.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 6CA20686966424BB307C2B6BB49ACFA9 C

C:\My Backup -- 09-03-28 0405AM\WINDOWS\system32\wGPoXHQr.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 0FD6063862FFB24DB214B9AF4F5FA923 C

C:\My Backup -- 09-03-28 0405AM\WINDOWS\system32\wGPoXHQr.ini2 Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 88952C0EB5347563F0811B8663AFB11B C

C:\Qoobox\Quarantine\C\Documents and Settings\Amish\Local Settings\Temp\dyiosi.tmp.vir Win32/Daonol.AV trojan (cleaned by deleting - quarantined) 1F01D85490113D303DB344BBD0816B45 C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Application Data\ymyecgq.exe a variant of Win32/Kryptik.AOB trojan (cleaned by deleting - quarantined) CC192B0F4826A661B3FE3C589CCBB4D2 C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temp\11537.exe Win32/Adware.BHO.NCX application (cleaned by deleting - quarantined) 2436217D6C73DCFF2A28431D12E83609 C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temp\16584.exe a variant of Win32/Kryptik.VP trojan (cleaned by deleting - quarantined) 23211A438B1A13B13D71F0B9EABC3695 C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temp\9994.exe Win32/TrojanDownloader.FakeAlert.ZI trojan (cleaned by deleting - quarantined) EAA16D80F6B712AA856649A035F8E57D C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temp\FA.tmp Win32/TrojanDownloader.FakeAlert.ZI trojan (cleaned by deleting - quarantined) EAA16D80F6B712AA856649A035F8E57D C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temp\FB.tmp a variant of Win32/Kryptik.VP trojan (cleaned by deleting - quarantined) 23211A438B1A13B13D71F0B9EABC3695 C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temporary Internet Files\Content.IE5\0495UHQW\142[2].htm probably a variant of Win32/Agent trojan (cleaned by deleting - quarantined) 3254E12316F77D5133B2FF11AD1AB712 C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temporary Internet Files\Content.IE5\0495UHQW\perce[1].gif Win32/TrojanDownloader.FakeAlert.ZI trojan (cleaned by deleting - quarantined) EAA16D80F6B712AA856649A035F8E57D C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temporary Internet Files\Content.IE5\19QQLMHX\142[1].htm probably a variant of Win32/Agent trojan (cleaned by deleting - quarantined) 3254E12316F77D5133B2FF11AD1AB712 C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temporary Internet Files\Content.IE5\19QQLMHX\bb[1].jpg a variant of Win32/Kryptik.VP trojan (cleaned by deleting - quarantined) 23211A438B1A13B13D71F0B9EABC3695 C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temporary Internet Files\Content.IE5\HO10IYR2\item[1].gif Win32/Adware.BHO.NCX application (cleaned by deleting - quarantined) 2436217D6C73DCFF2A28431D12E83609 C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temporary Internet Files\Content.IE5\LVOYR13I\142[1].htm probably a variant of Win32/Agent trojan (cleaned by deleting - quarantined) 3254E12316F77D5133B2FF11AD1AB712 C

F:\My Backup -- 09-03-28 0405AM\Documents and Settings\Amish P\Local Settings\Temporary Internet Files\Content.IE5\LVOYR13I\promo[1].exe Win32/TrojanDownloader.Zlob.CZG trojan (cleaned by deleting - quarantined) 445C86C81FBA3D9F2854F358104B9146 C

F:\My Backup -- 09-03-28 0405AM\WINDOWS\system32\heupoeia.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 6CA20686966424BB307C2B6BB49ACFA9 C

F:\My Backup -- 09-03-28 0405AM\WINDOWS\system32\msxml71.dll Win32/TrojanDownloader.FakeAlert.AAL trojan (cleaned by deleting - quarantined) 4708165EF92FF5ADE40B50960D078097 C

F:\My Backup -- 09-03-28 0405AM\WINDOWS\system32\wGPoXHQr.ini Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 0FD6063862FFB24DB214B9AF4F5FA923 C

F:\My Backup -- 09-03-28 0405AM\WINDOWS\system32\wGPoXHQr.ini2 Win32/Adware.Virtumonde.NEO application (cleaned by deleting - quarantined) 88952C0EB5347563F0811B8663AFB11B C

F:\My Backup -- 09-03-28 0405AM\WINDOWS\msa.exe a variant of Win32/Kryptik.VP trojan (cleaned by deleting - quarantined) 23211A438B1A13B13D71F0B9EABC3695 C

F:\My Backup -- 09-03-28 0405AM\WINDOWS\msb.exe a variant of Win32/Kryptik.VP trojan (cleaned by deleting - quarantined) 23211A438B1A13B13D71F0B9EABC3695 C

Link to post
Share on other sites

DDS (Ver_09-12-01.01) - NTFSx86

Run by Amish at 20:07:58.05 on 01/03/2010

Internet Explorer: 6.0.2900.2180

Microsoft Windows XP Home Edition 5.1.2600.2.1252.44.1033.18.2038.1500 [GMT 0:00]

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Digital Media Reader\shwiconem.exe

C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe

C:\WINDOWS\system32\igfxtray.exe

C:\WINDOWS\system32\igfxpers.exe

C:\PROGRA~1\mcafee.com\agent\mcagent.exe

C:\WINDOWS\zHotkey.exe

C:\WINDOWS\RTHDCPL.EXE

C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe

C:\PROGRA~1\mcafee.com\vso\mcvsshld.exe

C:\WINDOWS\system32\ctfmon.exe

c:\progra~1\mcafee.com\vso\mcvsescn.exe

svchost.exe

c:\PROGRA~1\mcafee.com\vso\mcvsrte.exe

C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS

C:\WINDOWS\system32\svchost.exe -k imgsvc

c:\PROGRA~1\mcafee.com\vso\mcshield.exe

C:\WINDOWS\system32\wscntfy.exe

C:\WINDOWS\system32\wuauclt.exe

C:\WINDOWS\System32\svchost.exe -k HTTPFilter

C:\Program Files\Internet Explorer\IEXPLORE.EXE

C:\Documents and Settings\Amish\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.co.uk/

uInternet Connection Wizard,ShellNext = hxxp://www.uk.emachines.com/

uURLSearchHooks: BigMAQ Toolbar: {7f312b9a-208b-49fa-8218-b9aa22ec1463} - c:\program files\bigmaq\tbBig1.dll

BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll

BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL

BHO: BigMAQ Toolbar: {7f312b9a-208b-49fa-8218-b9aa22ec1463} - c:\program files\bigmaq\tbBig1.dll

BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar1.dll

TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll

TB: McAfee VirusScan: {ba52b914-b692-46c4-b683-905236f6f655} - c:\progra~1\mcafee.com\vso\mcvsshl.dll

TB: BigMAQ Toolbar: {7f312b9a-208b-49fa-8218-b9aa22ec1463} - c:\program files\bigmaq\tbBig1.dll

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe

mRun: [sunKistEM] c:\program files\digital media reader\shwiconem.exe

mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"

mRun: [Recguard] %WINDIR%\SMINST\RECGUARD.EXE

mRun: [Reminder] %WINDIR%\Creator\Remind_XP.exe

mRun: [High Definition Audio Property Page Shortcut] HDAShCut.exe

mRun: [AzMixerSel] c:\program files\realtek\installshield\AzMixerSel.exe

mRun: [igfxTray] c:\windows\system32\igfxtray.exe

mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe

mRun: [Persistence] c:\windows\system32\igfxpers.exe

mRun: [VSOCheckTask] "c:\progra~1\mcafee.com\vso\mcmnhdlr.exe" /checktask

mRun: [MCAgentExe] c:\progra~1\mcafee.com\agent\mcagent.exe

mRun: [MCUpdateExe] c:\progra~1\mcafee.com\agent\mcupdate.exe

mRun: [CHotkey] zHotkey.exe

mRun: [RTHDCPL] RTHDCPL.EXE

mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"

mRun: [VirusScan Online] c:\progra~1\mcafee.com\vso\mcvsshld.exe

mRunOnce: [Malwarebytes' Anti-Malware] c:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silent

dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE

StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\instal~1.lnk - c:\program files\sifxinst\SIFXINST.EXE

IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0002-ABCDEFFEDCBC} - c:\program files\java\jre1.5.0_02\bin\npjpi150_02.dll

IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll

IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL

DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_02-windows-i586.cab

DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab

DPF: {CAFEEFAC-0015-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_02-windows-i586.cab

Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\progra~1\micros~2\office12\GR99D3~1.DLL

Notify: igfxcui - igfxdev.dll

SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL

============= SERVICES / DRIVERS ===============

R2 MCVSRte;McAfee.com VirusScan Online Realtime Engine;c:\progra~1\mcafee.com\vso\mcvsrte.exe [2009-3-28 122880]

R3 McShield;McAfee.com McShield;c:\progra~1\mcafee.com\vso\mcshield.exe [2009-3-28 225375]

R3 NaiFiltr;NaiFiltr;c:\windows\system32\drivers\NaiFiltr.sys [2009-3-28 23296]

S3 FsUsbExDisk;FsUsbExDisk;c:\windows\system32\FsUsbExDisk.Sys [2009-5-14 36608]

S3 mcupdmgr.exe;McAfee SecurityCenter Update Manager;c:\progra~1\mcafee.com\agent\mcupdmgr.exe [2009-3-28 249856]

=============== Created Last 30 ================

2010-03-01 16:18:51 0 d-----w- c:\program files\ESET

2010-03-01 13:16:06 0 d-sha-r- C:\cmdcons

2010-03-01 13:14:30 98816 ----a-w- c:\windows\sed.exe

2010-03-01 13:14:30 77312 ----a-w- c:\windows\MBR.exe

2010-03-01 13:14:30 261632 ----a-w- c:\windows\PEV.exe

2010-03-01 13:14:30 161792 ----a-w- c:\windows\SWREG.exe

2010-02-25 16:39:35 293376 ------w- c:\windows\system32\browserchoice.exe

2010-02-25 13:02:14 0 ----a-w- c:\documents and settings\amish\defogger_reenable

2010-02-25 12:59:50 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-02-25 12:59:47 19160 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-02-25 12:59:47 0 d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-02-24 18:37:51 0 d-----w- c:\docume~1\amish\applic~1\Malwarebytes

2010-02-24 18:37:45 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes

2010-02-07 13:37:21 0 d-----w- c:\windows\SxsCaPendDel

2010-02-04 18:07:07 664 ----a-w- c:\windows\system32\d3d9caps.dat

==================== Find3M ====================

2009-12-22 05:35:11 668672 ------w- c:\windows\system32\wininet.dll

2009-12-22 05:35:05 81920 ----a-w- c:\windows\system32\ieencode.dll

2009-12-16 12:58:04 343040 ----a-w- c:\windows\system32\mspaint.exe

2009-12-14 07:35:35 33280 ----a-w- c:\windows\system32\csrsrv.dll

2009-12-08 18:55:25 2180352 ------w- c:\windows\system32\ntoskrnl.exe

2009-12-08 18:19:32 2057728 ------w- c:\windows\system32\ntkrnlpa.exe

============= FINISH: 20:08:29.33 ===============

Everything seems to be working fine now. I have still not used any of the websites where I am asked for a username and password such as online banking, yahoo acount etc. Can I now begin to use these using the new passwords I created following your advice? I dont want to be too hasty just incase my computer is not 100% clean and someone gets hold of my details.

Should I run DeFogger again to re-enable my emulation drives?

Also can I ask you advice on what I should be doing to avoid this type of problem in the future?

Link to post
Share on other sites

Can I now begin to use these using the new passwords I created following your advice?
Yes.
Should I run DeFogger again to re-enable my emulation drives?
Yes
Also can I ask you advice on what I should be doing to avoid this type of problem in the future?
Yes I will post prevention instructions now at the bottom of this post.

=======Cleanup=======

  • Click START then RUN
  • Now type Combofix /uninstall in the runbox and click OK. Note the space between the X and the U, it needs to be there.

===============Update Java===============

Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:

  • Download the latest version of Java SE Runtime Environment (JRE) and save it to your desktop.
  • Scroll down to where it says "Java SE Runtime Environment (JRE) 6 Update 18...allows end-users to run Java applications".
  • Click the "Download" button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u18-windows-i586.exe to install the newest version.

======================Clear out infected System Restore points======================

Then we need to reset your System Restore points.

The link below shows how to do this.

How to Turn On and Turn Off System Restore in Windows XP

http://support.microsoft.com/kb/310405/en-us

If you are using Vista then see this link: http://www.bleepingcomputer.com/tutorials/...143.html#manual

Delete\uninstall anything else that we have used that is leftover.

=====================================

After that your all set.

The following are some articles and a Windows Update link that I like to suggest to people to prevent malware and general PC maintenance.

Windows Updates - It is very important to make sure that both Internet Explorer and Windows are kept current with the latest critical security patches from Microsoft. To do this just start Internet Explorer and select Tools > Windows Update, and follow the online instructions from there.

Prevention article To find out more information about how you got infected in the first place and some great guidelines to follow to prevent future infections please read the Prevention artice by Miekiemoes.

If your computer is slow Is a tutorial on what you can do if your computer is slow.

File sharing program dangers Reasons to stay away from File sharing programs for ex: BitTorrent,Limewire,Kazaa,emule,Utorrent,Limewire etc...

Link to post
Share on other sites

Everything seems to be running fine now.

Ive unistalled combofix and deleted all the other software that you had asked me to use, including the logs.

Java has now been updated to the latest version you recommended.

I got a little confused on the resetting of the system restore points but after reading up on Microsoft website realised that to reset the points I must turn off system restore then turn back on. I hope ive got it right!!

Ive installed the following programs after reading your prevention guides: Avira Antivir Personal (removed McAfee), Spywareblaster 4.2, Online Armor Free (Was gonna stick with XP firewall but read that this only blocks incoming traffic and not outgoing traffic).

I also did an online scan using Secunia Software Inspector and updated Adobe Reader and Adobe Flash to latest versions.

I also decided to change my browser to Firefox 3.6 as read alot of bad reviews about Internet Explorer. Now I just have to get used to the layout and buttons of my new browser!!

I hope ive done everything I can to ensure I dont get infected again.

Thanks again for all your help. You're a star!!!

Ash

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.