Jump to content

Recommended Posts

An unwanted program "XP AntiVirus 2011"" has hijacked my system. Attempts to install or rum Malwarebytes has failed. RootRepeal will not install...just get an endless "initializing" message. Did run the DSS app...here is the log:

.

DDS (Ver_11-03-05.01) - NTFSx86

Run by Joe at 10:57:40.01 on Thu 03/24/2011

Internet Explorer: 8.0.6001.18702

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.447.115 [GMT -5:00]

.

AV: AntiVir Desktop *Enabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}

.

============== Running Processes ===============

.

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir Desktop\sched.exe

C:\WINDOWS\system32\rundll32.exe

C:\WINDOWS\system32\ctfmon.exe

C:\PROGRA~1\SHORTK~1\shklite.exe

C:\PROGRA~1\Fighters\sfagent.exe

C:\PROGRA~1\Avira\ANTIVI~1\avgnt.exe

C:\PROGRA~1\BILLPS~1\WINPAT~1\WINPAT~1.EXE

C:\PROGRA~1\COMMON~1\Java\JAVAUP~1\jusched.exe

C:\PROGRA~1\Adobe\PHOTOS~1\3.0\Apps\apdproxy.exe

C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe

C:\DOCUME~1\Joe\LOCALS~1\Temp\34B.tmp

C:\Program Files\Avira\AntiVir Desktop\avguard.exe

C:\Program Files\iWin Games\iWinGamesInstaller.exe

C:\Program Files\iWin Games\iWinTrusted.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\WINDOWS\System32\nvsvc32.exe

C:\Program Files\Fighters\sfus.exe

C:\Program Files\Fighters\FighterSuiteService.exe

C:\WINDOWS\System32\svchost.exe -k imgsvc

C:\PROGRA~1\IObit\ADVANC~1\AWC.exe

C:\WINDOWS\explorer.exe

C:\PROGRA~1\SEAMON~1\SEAMON~1.EXE

C:\Joe\Downloads\dds.scr

.

============== Pseudo HJT Report ===============

.

uStart Page = hxxp://cgi.verizon.net/bookmarks/bmredir.asp?region=all&bw=dsl&cd=6.1&bm=ho_home

uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7

uSearch Bar = hxxp://us.rd.yahoo.com/customize/ycomp_adbe/defaults/sb/*http://www.yahoo.com/search/ie.html

mWindow Title = Everyones Internet

uInternet Connection Wizard,ShellNext = iexplore

uInternet Settings,ProxyOverride = 127.0.0.1;localhost

BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll

BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll

BHO: Java

Attach.zip

Ark.zip

Link to post
Share on other sites

post-32477-1261866970.gif

Please don't attach the scans / logs for these tools, use "copy/paste".

DO NOT use any TOOLS such as Combofix or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Stay with this topic until I give you the all clean post.

You might want to print these instructions out.

I suggest you do this:

XP Users

Double-click My Computer.

Click the Tools menu, and then click Folder Options.

Click the View tab.

Uncheck "Hide file extensions for known file types."

Under the "Hidden files" folder, select "Show hidden files and folders."

Uncheck "Hide protected operating system files."

Click Apply, and then click OK.

Vista Users

To enable the viewing of hidden and protected system files in Windows Vista please follow these steps:

Close all programs so that you are at your desktop.

Click on the Start button. This is the small round button with the Windows flag in the lower left corner.

Click on the Control Panel menu option.

When the control panel opens you can either be in Classic View or Control Panel Home view:

If you are in the Classic View do the following:

Double-click on the Folder Options icon.

Click on the View tab.

If you are in the Control Panel Home view do the following:

Click on the Appearance and Personalization link.

Click on Show Hidden Files or Folders.

Under the Hidden files and folders section select the radio button labeled Show hidden files and folders.

Remove the checkmark from the checkbox labeled Hide extensions for known file types.

Remove the checkmark from the checkbox labeled Hide protected operating system files.

Please do not delete anything unless instructed to.

I've been seeing some Java infections lately.

Go here and follow the instructions to clear your Java Cache

http://www.java.com/en/download/help/plugin_cache.xml

Next:

Note: Close all browsers before running ATF Cleaner: IE, FireFox, etc.

Please download ATF Cleaner by Atribune.

Download - ATF Cleaner

Link to post
Share on other sites

Ran programs. Here is aswMBR file:

aswMBR version 0.9.4 Copyright© 2011 AVAST Software

Run date: 2011-03-24 16:42:23

-----------------------------

16:42:23.428 OS Version: Windows 5.1.2600 Service Pack 3

16:42:23.428 Number of processors: 1 586 0xA00

16:42:23.428 ComputerName: DESKTOPHUB UserName: Joe

16:42:25.568 Initialize success

16:42:42.037 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3

16:42:42.037 Disk 0 Vendor: HDS722516VLAT20 V34OA60A Size: 157066MB BusType: 3

16:42:44.131 Disk 0 MBR read successfully

16:42:44.131 Disk 0 MBR scan

16:42:46.193 Disk 0 scanning sectors +321669495

16:42:46.350 Disk 0 scanning C:\WINDOWS\system32\drivers

16:43:29.818 Service scanning

16:43:31.068 Disk 0 trace - called modules:

16:43:31.115 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS

16:43:31.131 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x84a565e0]

16:43:31.146 3 CLASSPNP.SYS[f74c7fd7] -> nt!IofCallDriver -> \Device\00000063[0x84a58f18]

16:43:31.162 5 ACPI.sys[f741e620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-3[0x84a57d98]

16:43:31.193 Scan finished successfully

Link to post
Share on other sites

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Download ComboFix from one of these locations:

Link 1

Link 2 If using this link, Right Click and select Save As.

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs
  • Double click on ComboFix.exe & follow the prompts.
    Notes: Combofix will run without the Recovery Console installed. Skip the Recovery Console part if you're running Vista or Windows 7.
    Note: If you have XP SP3, use the XP SP2 package.
    If Vista or Windows 7, skip the Recovery Console part
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RC1.png

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt using Copy / Paste in your next reply.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.

2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.

3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.

4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

Combofix log:

ComboFix 11-03-24.01 - Joe 03/24/2011 18:16:46.2.1 - x86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.447.176 [GMT -5:00]

Running from: c:\joe\DOWNLO~1\ComboFix.exe

AV: AntiVir Desktop *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

C:\DFR5.tmp

c:\documents and settings\Joe\Local Settings\Application Data\{ED7AEA54-10FD-435B-A526-CF63FBC8F120}

c:\documents and settings\Joe\Local Settings\Application Data\{ED7AEA54-10FD-435B-A526-CF63FBC8F120}\chrome.manifest

c:\documents and settings\Joe\Local Settings\Application Data\{ED7AEA54-10FD-435B-A526-CF63FBC8F120}\chrome\content\_cfg.js

c:\documents and settings\Joe\Local Settings\Application Data\{ED7AEA54-10FD-435B-A526-CF63FBC8F120}\chrome\content\overlay.xul

c:\documents and settings\Joe\Local Settings\Application Data\{ED7AEA54-10FD-435B-A526-CF63FBC8F120}\install.rdf

c:\windows\Downloaded Program Files\RdxIE.dll

c:\windows\system32\dumphive.exe

c:\windows\system32\Process.exe

c:\windows\system32\SrchSTS.exe

c:\windows\system32\sstray.exe

c:\windows\system32\tmp.reg

c:\windows\system32\VCCLSID.exe

c:\windows\system32\WS2Fix.exe

c:\windows\usefowasilarefo.dll

.

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

-------\Legacy_IWINGAMESINSTALLER

-------\Service_iWinGamesInstaller

.

.

((((((((((((((((((((((((( Files Created from 2011-02-24 to 2011-03-24 )))))))))))))))))))))))))))))))

.

.

2011-03-24 15:11 . 2011-03-24 15:11 0 ----a-w- c:\windows\Xfupeyogomus.bin

2011-03-15 13:08 . 2011-02-03 00:19 73728 ----a-w- c:\windows\system32\javacpl.cpl

2011-03-15 12:58 . 2011-03-15 12:58 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-02-09 13:53 . 2002-11-26 20:15 186880 ----a-w- c:\windows\system32\encdec.dll

2011-02-09 13:53 . 2002-11-26 20:15 270848 ----a-w- c:\windows\system32\sbe.dll

2011-02-03 02:40 . 2010-05-18 05:27 472808 ----a-w- c:\windows\system32\deployJava1.dll

2011-02-02 07:58 . 2003-02-07 02:03 2067456 ----a-w- c:\windows\system32\mstscax.dll

2011-01-27 11:57 . 2003-02-07 02:03 677888 ----a-w- c:\windows\system32\mstsc.exe

2011-01-21 14:44 . 2003-02-07 00:47 439296 ----a-w- c:\windows\system32\shimgvw.dll

2011-01-07 14:09 . 2003-02-07 00:47 290048 ----a-w- c:\windows\system32\atmfd.dll

2010-12-31 13:10 . 2003-02-07 00:48 1854976 ----a-w- c:\windows\system32\win32k.sys

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ISUSPM"="c:\program files\Common Files\InstallShield\UpdateService\ISUSPM.exe" [2007-08-30 205480]

"Microsoft Works Update Detection"="c:\program files\Microsoft Works\WkDetect.exe" [2000-07-13 28739]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"WinPatrol"="c:\progra~1\BILLPS~1\WINPAT~1\WinPatrol.exe" [2005-11-15 222784]

"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2003-10-06 5058560]

"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]

"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2009-03-02 209153]

"sfagent"="c:\program files\Fighters\sfagent.exe" [2010-10-21 760968]

"Adobe Photo Downloader"="c:\program files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe" [2005-06-07 57344]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-10-29 249064]

.

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]

BootExecute REG_MULTI_SZ autocheck autochk *\0sprecovr \SystemRoot\sprecovr.txt

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-disabled]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" -osboot

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" -atboottime

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"c:\\WINDOWS\\system32\\sessmgr.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"c:\\Program Files\\Download Express\\dep.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Malwarebytes' Anti-Malware\\mbam.exe"=

"c:\\Program Files\\Parsons\\QuickVerse\\QuickVerse\\qvwin.exe"=

"c:\\Program Files\\mozilla.org\\SeaMonkey\\seamonkey.exe"=

"c:\\Program Files\\Spybot - Search & Destroy\\SpybotSD.exe"=

"c:\\Program Files\\Ahead\\Nero ShowTime\\ShowTime.exe"=

"c:\\Program Files\\Java\\jre6\\bin\\javaw.exe"=

"c:\\Program Files\\iWin Games\\iWinGames.exe"=

"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"3389:TCP"= 3389:TCP:*:Disabled:@xpsp2res.dll,-22009

.

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [11/18/2009 10:07 AM 108289]

R2 iWinTrusted;iWinTrusted;c:\program files\iWin Games\iWinTrusted.exe [3/26/2009 12:50 AM 78104]

R2 SPAMfighter Update Service;SPAMfighter Update Service;c:\program files\Fighters\sfus.exe [10/21/2010 07:44 AM 189064]

R2 Suite Service;Suite Service;c:\program files\Fighters\FighterSuiteService.exe [10/21/2010 07:44 AM 1130120]

S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [9/27/2008 11:22 AM 38496]

S3 rootre~1;rootre~1;\??\c:\windows\system32\drivers\rootre~1.sys --> c:\windows\system32\drivers\rootre~1.sys [?]

.

Contents of the 'Scheduled Tasks' folder

.

2011-03-24 c:\windows\Tasks\GlaryInitialize.job

- c:\program files\Glary Utilities\initialize.exe [2008-07-16 17:28]

.

2011-03-24 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-307708835-2833417153-1605846836-1006.job

- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-02-25 03:09]

.

2011-03-21 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-307708835-2833417153-1605846836-1006.job

- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-02-25 03:09]

.

2011-03-21 c:\windows\Tasks\SmartDefrag.job

- c:\program files\IObit\IObit SmartDefrag\IObit SmartDefrag.exe [2010-08-30 23:08]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://cgi.verizon.net/bookmarks/bmredir.asp?region=all&bw=dsl&cd=6.1&bm=ho_home

uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7

mWindow Title = Everyones Internet

uInternet Connection Wizard,ShellNext = iexplore

uInternet Settings,ProxyOverride = 127.0.0.1;localhost

IE: + &Download Express: download this file - c:\program files\Download Express\Add_Url.htm

Name-Space Handler: ftp\HIEClickCatcher - {E131C96E-4DDB-11D4-84B8-008048B33DEA} - c:\progra~1\DOWNLO~1\mdpph.dll

Name-Space Handler: http\HIEClickCatcher - {E131C96E-4DDB-11D4-84B8-008048B33DEA} - c:\progra~1\DOWNLO~1\mdpph.dll

Name-Space Handler: https\HIEClickCatcher - {E131C96E-4DDB-11D4-84B8-008048B33DEA} - c:\progra~1\DOWNLO~1\mdpph.dll

DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab

DPF: {DB0474CC-8EF6-47FC-905B-23FC58A70817} - hxxp://download.verizon.net/sfp/Cabs/hst/webinstall/HstWebInstall.cab

.

- - - - ORPHANS REMOVED - - - -

.

HKLM-Run-Yrawegos - c:\windows\usefowasilarefo.dll

SafeBoot-klmdb.sys

.

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2011-03-24 18:30

Windows 5.1.2600 Service Pack 3 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_LOCAL_MACHINE\software\Classes\.application\bootstrap]

@DACL=(02 0000)

@="bootstrap.application.1"

.

[HKEY_LOCAL_MACHINE\software\Microsoft\Active Setup\Installed Components\{abcdf74f-9a64-4e6e-b8eb-6e5a41de6550}\0409]

"Version"="1.0.0.2"

.

--------------------- DLLs Loaded Under Running Processes ---------------------

.

- - - - - - - > 'winlogon.exe'(800)

c:\windows\system32\Ati2evxx.dll

.

- - - - - - - > 'explorer.exe'(2816)

c:\windows\system32\WININET.dll

c:\progra~1\BILLPS~1\WINPAT~1\PATROLPRO.DLL

c:\windows\system32\webcheck.dll

c:\windows\system32\IEFRAME.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Avira\AntiVir Desktop\avguard.exe

c:\program files\Java\jre6\bin\jqs.exe

c:\windows\System32\nvsvc32.exe

c:\windows\system32\wdfmgr.exe

c:\windows\system32\msiexec.exe

.

**************************************************************************

.

Completion time: 2011-03-24 18:39:39 - machine was rebooted

ComboFix-quarantined-files.txt 2011-03-24 23:39

ComboFix2.txt 2008-09-26 20:13

.

Pre-Run: 109,707,190,272 bytes free

Post-Run: 109,623,836,672 bytes free

.

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

UnsupportedDebug="do not select this" /debug

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn

.

- - End Of File - - A2578D7EC6A7AF9360E140084F64A568

Link to post
Share on other sites

Good job thumbup.gif

The following will implement some cleanup procedures as well as reset System Restore points:

For XP:

  • Click START run
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

For Vista / Windows 7

  • Click START Search
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

If you used DeFogger

To re-enable your Emulation drivers, double click DeFogger to run the tool.

  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK

IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_enable which will appear on your desktop.

Your Emulation drivers are now re-enabled.

Here's my usual all clean post

To be on the safe side, I would also change all my passwords.

This infection appears to have been cleaned, but as the malware could be configured to run any program a remote attacker requires, it's impossible to be 100% sure that any machine is clean.

Log looks good :D

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.
    5. Change the Download signed ActiveX controls to Prompt
    6. Change the Download unsigned ActiveX controls to Disable
    7. Change the Initialize and script ActiveX controls not marked as safe to Disable
    8. Change the Installation of desktop items to Prompt
    9. Change the Launching programs and files in an IFRAME to Prompt
    10. Change the Navigate sub-frames across different domains to Prompt
    11. When all these settings have been made, click on the OK button.
    12. If it prompts you as to whether or not you want to save the settings, press the Yes button.
    13. Next press the Apply button and then the OK to exit the Internet Properties page.

    [*]Update your AntiVirus Software - It is imperative that you update your Antivirus software at least once a week

    (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    [*]Use a Firewall - I can not stress how important it is that you use a Firewall on your computer.

    Without a firewall your computer is succeptible to being hacked and taken over.

    I am very serious about this and see it happen almost every day with my clients.

    Simply using a Firewall in its default configuration can lower your risk greatly.

    [*] WOT , Web of Trust, As 'Googling' is such an integral part of internet life, this free browser add on warns you about risky websites that try to scam visitors, deliver malware or send spam. It is especially helpful when browsing or searching in unfamiliar territory. WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites:

    Green to go

    Yellow for caution

    Red to stop

    WOT has an addon available for both Firefox and IE.

    [*] JAVA Click this link and click on the Free JAVA Download

    [*]Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly.

    This will ensure your computer has always the latest security updates available installed on your computer.

    If there are new updates to install, install them immediately, reboot your computer, and revisit the site

    until there are no more critical updates.

Only run one Anti-Virus and Firewall program.

I would suggest you read:

PC Safety and Security--What Do I Need?.

How to Prevent Malware:

The full version of Malwarebytes' Anti-Malware could have helped protect your computer against this threat.

We use different ways of protecting your computer(s):

  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention

Save yourself the hassle and get protected.

Link to post
Share on other sites

Ran Malwarebytes and found one infected file...

Malwarebytes' Anti-Malware 1.50.1.1100

www.malwarebytes.org

Database version: 6164

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

3/25/2011 07:00:10 AM

mbam-log-2011-03-25 (07-00-10).txt

Scan type: Full scan (C:\|)

Objects scanned: 282149

Time elapsed: 1 hour(s), 12 minute(s), 8 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 1

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

c:\WINDOWS\lsaEsl.dll (Trojan.Hiloti) -> Quarantined and deleted successfully.

Link to post
Share on other sites

Malwarebytes' Anti-Malware 1.50.1.1100

www.malwarebytes.org

Database version: 6164

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

3/26/2011 12:39:56 PM

mbam-log-2011-03-26 (12-39-56).txt

Scan type: Full scan (C:\|)

Objects scanned: 279796

Time elapsed: 49 minute(s), 20 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 1

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

c:\system volume information\_restore{681ad0f2-0d47-41b9-8237-a8c74bd32df4}\RP1866\A0125662.dll (Trojan.Hiloti) -> Quarantined and deleted successfully.

Link to post
Share on other sites

Click Start > All Programs > Accessories > System Tools > Disk Cleanup

This will bring up the Disk Cleanup window.

Click the More Options tab.

In the System Restore field, click Clean up

You will be prompted if you want to remove all but the most recent Restore Point.

Click Yes.

Click OK.

When prompted whether you're sure you want to do this click Yes.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.