Jump to content

Possible bootkit problems


Recommended Posts

Hello there,

My computer was recently infected with a virus from a pop-up and such a virus was immediately deleted by my antivirus - but several viruses managed to slip through somehow, possibly due to bootkit activity. When my antivirus requested a reboot to finish clean-up of the original virus, it shut down and then never managed to boot properly. It presented the blue-screen of death with the error message that an attempt was made to write to read-only memory. Eventually deciding to wipe the disk and reinstall Windows, the system seemed to work fine with no infection - even after linking the infected drive to another hard drive though before the wipe, it still only detected two infections which were eliminated but the OS still presented the BSoD. Eventually I decided to upgrade my system and obtained a new motherboard - the BioStar A780L - and also a new processor - an AMD Athlon II X2 Dual Core running at 3.2 Ghz (Upgraded from 2.61Ghz AMD Athlon 64 X2 Dual Core). I also added a 500GB SATAII hard drive as a backup drive. The computer now operates well and fast but when booting, it is incredibly slow despite a mostly empty OS drive. I have performed a Defrag and Disk Cleanup - however at the advice of a friend, I scanned using TDSSKiller for rootkits and was informed my BIOS.sys driver was suspicious because it was unsigned. I then performed scans using the advice of the "I'm infected" post and I have included the logs from them. Any help would be appreciated in confirming if the system is clean or not.

Thanks in advance.

P.S The new SATA drive hasn't been scanned, only the main directory has. For the two infections in the MalwareBytes log, I'm aware of them and think they're harmless. Feel free to contradict me though.

MalwareBytes Log:

Malwarebytes' Anti-Malware 1.51.2.1300

www.malwarebytes.org

Database version: 7809

Windows 5.1.2600 Service Pack 3 (Safe Mode)

Internet Explorer 8.0.6001.18702

28/09/2011 11:12:54

mbam-log-2011-09-28 (11-12-42).txt

Scan type: Full scan (C:\|)

Objects scanned: 216334

Time elapsed: 17 minute(s), 44 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 2

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

c:\documents and settings\Gareth\my documents\downloads\wpa_patch__old__\antiwpa_crypt.dll (Hacktool) -> No action taken.

c:\WINDOWS\system32\oobe\antiwpa_crypt.dll (Hacktool) -> No action taken.

DDS Log:

.

DDS (Ver_2011-08-26.01) - NTFSx86 NETWORK

Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_27

Run by Administrator at 10:29:44 on 2011-09-28

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2047.1588 [GMT 1:00]

.

AV: avast! Antivirus *Enabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}

.

============== Running Processes ===============

.

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\system32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Program Files\Mozilla Firefox\plugin-container.exe

C:\Documents and Settings\Administrator\My Documents\Downloads\fgp0r2rc.exe

.

============== Pseudo HJT Report ===============

.

BHO: avast! WebRep: {8e5e2654-ad2d-48bf-ac2d-d17f00898d06} - c:\program files\avast software\avast\aswWebRepIE.dll

BHO: Java Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll

BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

TB: avast! WebRep: {8e5e2654-ad2d-48bf-ac2d-d17f00898d06} - c:\program files\avast software\avast\aswWebRepIE.dll

uRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE

mRun: [avast] "c:\program files\avast software\avast\avastUI.exe" /nogui

mRun: [sunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"

mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup

mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit

mRun: [RTHDCPL] RTHDCPL.EXE

dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab

DPF: {CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab

DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab

TCP: DhcpNameServer = 192.168.2.1

TCP: Interfaces\{02D5A63D-7181-4D4C-8A25-D2CB6C2416B7} : DhcpNameServer = 192.168.2.1

TCP: Interfaces\{87F7CC98-E312-4D03-8D51-39EE9C5AD9C1} : DhcpNameServer = 192.168.2.1

SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

.

================= FIREFOX ===================

.

FF - ProfilePath - c:\documents and settings\administrator\application data\mozilla\firefox\profiles\mi6qxqk1.default\

FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll

.

============= SERVICES / DRIVERS ===============

.

R1 dtsoftbus01;DAEMON Tools Virtual Bus Driver;c:\windows\system32\drivers\dtsoftbus01.sys [2011-9-19 232512]

S1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2011-9-15 442200]

S1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2011-9-15 320856]

S1 BIOS;BIOS;c:\windows\system32\drivers\BIOS.sys [2010-3-2 13696]

S2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2011-9-15 20568]

S2 avast! Antivirus;avast! Antivirus;c:\program files\avast software\avast\AvastSvc.exe [2011-9-15 44768]

S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]

S2 nvUpdatusService;NVIDIA Update Service Daemon;c:\program files\nvidia corporation\nvidia updatus\daemonu.exe [2011-9-15 2255464]

S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [2010-3-2 1684736]

S3 cpuz134;cpuz134;c:\program files\cpuid\pc wizard 2010\pcwiz_x32.sys [2011-9-24 20328]

S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]

.

=============== Created Last 30 ================

.

2011-09-28 08:44:23 -------- d-----w- c:\documents and settings\administrator\local settings\application data\Mozilla

2011-09-28 08:22:39 -------- d-sh--w- c:\documents and settings\administrator\IETldCache

2011-09-28 08:13:42 -------- d-----w- c:\documents and settings\all users\application data\SecTaskMan

2011-09-28 08:07:44 -------- d-----w- C:\TDSSKiller_Quarantine

2011-09-24 13:32:51 114176 ----a-w- c:\windows\system32\PCWizard.cpl

2011-09-24 13:32:48 -------- d-----w- c:\program files\CPUID

2011-09-20 23:03:22 -------- d-----w- c:\windows\ie8updates

2011-09-20 17:40:16 953856 -c----w- c:\windows\system32\dllcache\mfc40u.dll

2011-09-20 17:39:50 617472 -c----w- c:\windows\system32\dllcache\comctl32.dll

2011-09-20 17:38:43 40960 -c----w- c:\windows\system32\dllcache\ndproxy.sys

2011-09-20 17:35:09 139656 -c----w- c:\windows\system32\dllcache\rdpwd.sys

2011-09-20 17:35:07 105472 -c----w- c:\windows\system32\dllcache\mup.sys

2011-09-20 17:28:06 602112 -c----w- c:\windows\system32\dllcache\msfeeds.dll

2011-09-20 17:28:05 55296 -c----w- c:\windows\system32\dllcache\msfeedsbs.dll

2011-09-20 17:28:04 743424 -c----w- c:\windows\system32\dllcache\iedvtool.dll

2011-09-20 17:28:04 247808 -c----w- c:\windows\system32\dllcache\ieproxy.dll

2011-09-20 17:28:04 12800 -c----w- c:\windows\system32\dllcache\xpshims.dll

2011-09-20 17:28:00 1991680 -c----w- c:\windows\system32\dllcache\iertutil.dll

2011-09-20 17:27:45 11081728 -c----w- c:\windows\system32\dllcache\ieframe.dll

2011-09-20 17:27:36 10496 -c----w- c:\windows\system32\dllcache\ndistapi.sys

2011-09-20 17:27:10 45568 -c----w- c:\windows\system32\dllcache\wab.exe

2011-09-20 16:06:44 -------- dc-h--w- c:\windows\ie8

2011-09-19 17:35:51 -------- d-----w- c:\windows\pss

2011-09-19 17:15:41 29184 -c--a-w- c:\windows\system32\dllcache\msoobe.exe

2011-09-19 15:20:45 -------- d-----w- c:\windows\system32\scripting

2011-09-19 15:20:44 -------- d-----w- c:\windows\system32\en

2011-09-19 15:20:44 -------- d-----w- c:\windows\system32\bits

2011-09-19 15:20:44 -------- d-----w- c:\windows\l2schemas

2011-09-19 15:16:02 -------- d-----w- c:\windows\network diagnostic

2011-09-19 15:08:57 -------- d-----w- c:\windows\EHome

2011-09-19 13:39:04 107888 ----a-w- c:\windows\system32\CmdLineExt.dll

2011-09-19 13:35:29 -------- d-----w- c:\windows\system32\LogFiles

2011-09-19 13:33:40 -------- d-----w- c:\windows\system32\xlive

2011-09-19 13:33:36 -------- d-----w- c:\program files\Microsoft Games for Windows - LIVE

2011-09-19 12:47:35 -------- d-----w- c:\windows\system32\XPSViewer

2011-09-19 12:46:21 27648 ----a-w- c:\windows\system32\spool\prtprocs\w32x86\filterpipelineprintproc.dll

2011-09-19 12:46:12 14048 ------w- c:\windows\system32\spmsg2.dll

2011-09-19 12:38:41 232512 ----a-w- c:\windows\system32\drivers\dtsoftbus01.sys

2011-09-19 12:38:20 -------- d-----w- c:\program files\DAEMON Tools Lite

2011-09-19 12:37:48 -------- d-----w- c:\documents and settings\all users\application data\DAEMON Tools Lite

2011-09-18 22:51:43 -------- d-----w- c:\windows\ServicePackFiles

2011-09-18 22:50:52 221184 ----a-w- c:\windows\system32\wmpns.dll

2011-09-18 10:08:10 25471 ------w- c:\windows\system32\drivers\watv10nt.sys

2011-09-18 10:08:10 22271 ------w- c:\windows\system32\drivers\watv06nt.sys

2011-09-18 10:08:10 11935 ------w- c:\windows\system32\drivers\wadv11nt.sys

2011-09-18 10:08:10 11871 ------w- c:\windows\system32\drivers\wadv09nt.sys

2011-09-18 10:08:10 11807 ------w- c:\windows\system32\drivers\wadv07nt.sys

2011-09-18 10:08:10 11295 ------w- c:\windows\system32\drivers\wadv08nt.sys

2011-09-18 10:08:04 95424 ------w- c:\windows\system32\drivers\slnthal.sys

2011-09-18 10:08:04 404990 ------w- c:\windows\system32\drivers\slntamr.sys

2011-09-18 10:08:04 13240 ------w- c:\windows\system32\drivers\slwdmsup.sys

2011-09-18 10:08:03 129535 ------w- c:\windows\system32\drivers\slnt7554.sys

2011-09-18 10:08:02 166912 ------w- c:\windows\system32\drivers\s3gnbm.sys

2011-09-18 10:08:01 13776 ------w- c:\windows\system32\drivers\recagent.sys

2011-09-18 10:07:59 180360 ------w- c:\windows\system32\drivers\ntmtlfax.sys

2011-09-18 10:07:58 452736 ------w- c:\windows\system32\drivers\mtxparhm.sys

2011-09-18 10:07:58 1309184 ------w- c:\windows\system32\drivers\mtlstrm.sys

2011-09-18 10:07:58 126686 ------w- c:\windows\system32\drivers\mtlmnt5.sys

2011-09-18 10:07:46 11868 ------w- c:\windows\system32\drivers\mdmxsdk.sys

2011-09-18 10:07:38 685056 ------w- c:\windows\system32\drivers\hsfcxts2.sys

2011-09-18 10:07:38 220032 ------w- c:\windows\system32\drivers\hsfbs2s2.sys

2011-09-18 10:07:38 1041536 ------w- c:\windows\system32\drivers\hsfdpsp2.sys

2011-09-18 09:37:17 272128 -c----w- c:\windows\system32\dllcache\bthport.sys

2011-09-18 09:37:16 272128 ------w- c:\windows\system32\drivers\bthport.sys

2011-09-18 09:36:39 357888 -c----w- c:\windows\system32\dllcache\srv.sys

2011-09-18 09:35:54 456320 -c----w- c:\windows\system32\dllcache\mrxsmb.sys

2011-09-18 09:35:46 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll

2011-09-18 09:35:31 744448 -c----w- c:\windows\system32\dllcache\helpsvc.exe

2011-09-18 09:32:07 203136 -c----w- c:\windows\system32\dllcache\rmcast.sys

2011-09-18 09:31:36 293376 ------w- c:\windows\system32\browserchoice.exe

2011-09-18 09:27:25 337408 -c----w- c:\windows\system32\dllcache\netapi32.dll

2011-09-18 09:26:29 5120 ----a-w- c:\windows\system32\xpsp4res.dll

2011-09-18 09:26:28 218112 -c----w- c:\windows\system32\dllcache\wordpad.exe

2011-09-18 09:24:35 345600 -c----w- c:\windows\system32\dllcache\localspl.dll

2011-09-18 09:20:28 -------- d-----w- c:\windows\system32\PreInstall

2011-09-18 09:15:22 -------- d--h--w- c:\windows\$hf_mig$

2011-09-18 09:12:10 -------- d-----w- c:\windows\system32\SoftwareDistribution

2011-09-17 18:26:48 -------- d-----w- c:\program files\VideoLAN

2011-09-16 15:49:57 69464 ----a-w- c:\windows\system32\XAPOFX1_3.dll

2011-09-16 15:47:27 -------- d-----w- c:\windows\Logs

2011-09-16 15:47:00 73728 ----a-w- c:\windows\system32\javacpl.cpl

2011-09-16 15:47:00 472808 ----a-w- c:\windows\system32\deployJava1.dll

2011-09-15 21:12:59 280276 -c--a-w- c:\windows\system32\nvdrsdb1.bin

2011-09-15 21:10:30 -------- d-----w- c:\program files\NVIDIA Corporation

2011-09-15 21:09:56 -------- d-----w- C:\NVIDIA

2011-09-15 21:05:17 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl

2011-09-15 20:49:52 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes

2011-09-15 20:49:49 22216 ----a-w- c:\windows\system32\drivers\mbam.sys

2011-09-15 20:49:49 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2011-09-15 20:45:24 442200 ----a-w- c:\windows\system32\drivers\aswSnx.sys

2011-09-15 20:45:06 41184 ----a-w- c:\windows\avastSS.scr

2011-09-15 20:44:53 -------- d-----w- c:\program files\AVAST Software

2011-09-15 20:44:53 -------- d-----w- c:\documents and settings\all users\application data\AVAST Software

.

==================== Find3M ====================

.

2011-09-19 17:21:29 507904 ----a-w- c:\windows\system32\winlogon.exe

2011-09-09 09:12:13 599040 ----a-w- c:\windows\system32\crypt32.dll

2011-07-15 13:29:31 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys

2011-07-08 14:02:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys

.

============= FINISH: 10:29:53.01 ===============

Attach.zip

Link to post
Share on other sites

post-32477-1261866970.gif

Logs will be closed if you haven't replied within 3 days

Please don't attach the scans / logs for these tools, use "copy/paste".

DO NOT use any TOOLS such as Combofix or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Please run a new MBAM scan being sure to update before scanning.

Post the scan results

Also please describe how your computer behaves at the moment.

Please don't attach the scans / logs, use "copy/paste".

Link to post
Share on other sites

Do you want all of the scans and logs again? The thing is, the pinned post at the top told me to attach those logs.

My system is still running fairly slow despite the upgrades, though I recently discovered the frequency of my CPU is being limited for some reason to 800Mhz or 1.9 Ghz - still unsure why, though I supsect a feature in the BIOS is to blame. Toggling said feature did nothing either.

Boot-up is quick when loading the OS but start-up is incredibly slow despite being such a clean, freshly installed system. I'm capable of doing more than before when it starts up but it's still a little unusual.

Addition of a graphics card has also resulted in POST and BIOS graphical... messes. Screens are out of resolution and colour depth is appalling with half the screen off my monitor. That may not be related to an infection however.

Link to post
Share on other sites

Malwarebytes' Anti-Malware 1.51.2.1300

www.malwarebytes.org

Database version: 7827

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

29/09/2011 16:45:35

mbam-log-2011-09-29 (16-45-35).txt

Scan type: Full scan (C:\|)

Objects scanned: 219212

Time elapsed: 1 hour(s), 23 minute(s), 13 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

Link to post
Share on other sites

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Download ComboFix from one of these locations:

Link 1

Link 2 If using this link, Right Click and select Save As.

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs
  • Double click on ComboFix.exe & follow the prompts.
    Notes: Combofix will run without the Recovery Console installed. Skip the Recovery Console part if you're running Vista or Windows 7.
    Note: If you have XP SP3, use the XP SP2 package.
    If Vista or Windows 7, skip the Recovery Console part
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RC1.png

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt using Copy / Paste in your next reply.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.

2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.

3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.

4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

ComboFix 11-09-29.06 - Gareth 29/09/2011 21:47:49.1.2 - x86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2047.1539 [GMT 1:00]

Running from: c:\documents and settings\Gareth\My Documents\Downloads\ComboFix.exe

AV: avast! Antivirus *Disabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\program files\driver

c:\windows\system32\d3d9caps.dat

c:\windows\system32\winlogon.bak

.

.

((((((((((((((((((((((((( Files Created from 2011-08-28 to 2011-09-29 )))))))))))))))))))))))))))))))

.

.

2011-09-28 08:07 . 2011-09-28 08:07 -------- d-----w- C:\TDSSKiller_Quarantine

2011-09-15 21:09 . 2011-09-29 09:16 -------- d-----w- C:\NVIDIA

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-09-19 17:21 . 2004-08-04 12:00 507904 ----a-w- c:\windows\system32\winlogon.exe

2011-09-09 09:12 . 2004-08-04 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll

2011-08-03 11:49 . 2009-09-27 23:12 5427200 ----a-w- c:\windows\system32\nvcuda.dll

2011-08-03 11:49 . 2009-09-27 23:12 2404864 ----a-w- c:\windows\system32\nvapi.dll

2011-08-03 11:49 . 2009-09-27 23:12 2387560 ----a-w- c:\windows\system32\nvcuvid.dll

2011-08-03 11:49 . 2009-09-27 23:12 2090088 ----a-w- c:\windows\system32\nvcuvenc.dll

2011-08-03 11:49 . 2009-09-27 23:12 16191488 ----a-w- c:\windows\system32\nvoglnt.dll

2011-08-03 11:49 . 2009-09-27 17:20 54272 ----a-w- c:\windows\system32\nvwddi.dll

2011-08-03 11:49 . 2009-09-27 17:19 146024 ----a-w- c:\windows\system32\nvsvc32.exe

2011-08-03 11:49 . 2009-09-27 17:19 145000 ----a-w- c:\windows\system32\nvcolor.exe

2011-08-03 11:49 . 2009-09-27 17:19 13892200 ----a-w- c:\windows\system32\nvcpl.dll

2011-08-03 11:49 . 2009-09-27 17:19 111208 ----a-w- c:\windows\system32\nvmctray.dll

2011-07-15 13:29 . 2004-08-04 12:00 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys

2011-07-08 14:02 . 2004-08-04 12:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys

2011-09-03 06:18 . 2011-09-15 20:38 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll

.

.

------- Sigcheck -------

Note: Unsigned files aren't necessarily malware.

.

[-] 2011-09-19 . 679A7259741F6A09994F02CE261B5F2E . 507904 . . [5.1.2600.5512] . . c:\windows\system32\winlogon.exe

[-] 2011-09-12 . 6225F14B8CE08CCBA8B25AD27843C674 . 502272 . . [5.1.2600.2180] . . c:\windows\$NtServicePackUninstall$\winlogon.exe

[7] 2008-04-14 . ED0EF0A136DEC83DF69F04118870003E . 507904 . . [5.1.2600.5512] . . c:\windows\ServicePackFiles\i386\winlogon.exe

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]

@="{472083B0-C522-11CF-8763-00608CC02F24}"

[HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]

2011-09-06 20:45 122512 ----a-w- c:\program files\AVAST Software\Avast\ashShell.dll

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"DAEMON Tools Lite"="c:\program files\DAEMON Tools Lite\DTLite.exe" [2011-08-02 4910912]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"avast"="c:\program files\AVAST Software\Avast\avastUI.exe" [2011-09-06 3722416]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-06-09 254696]

"RTHDCPL"="RTHDCPL.EXE" [2009-08-24 18702336]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-10-03 35696]

"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]

"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2011-08-03 13892200]

"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2011-08-03 111208]

.

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]

"Eventlog"=2 (0x2)

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\NVIDIA Corporation\\NVIDIA Updatus\\daemonu.exe"=

.

R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [15/09/2011 21:45 442200]

R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [15/09/2011 21:45 320856]

R1 BIOS;BIOS;c:\windows\system32\drivers\BIOS.sys [02/03/2010 03:11 13696]

R1 dtsoftbus01;DAEMON Tools Virtual Bus Driver;c:\windows\system32\drivers\dtsoftbus01.sys [19/09/2011 13:38 232512]

R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [15/09/2011 21:45 20568]

R2 nvUpdatusService;NVIDIA Update Service Daemon;c:\program files\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe [15/09/2011 22:26 2255464]

R3 NVHDA;Service for NVIDIA High Definition Audio Driver;c:\windows\system32\drivers\nvhda32.sys [29/09/2011 10:16 119528]

S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [18/03/2010 13:16 130384]

S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [02/03/2010 03:40 1684736]

S3 cpuz134;cpuz134;c:\program files\CPUID\PC Wizard 2010\pcwiz_x32.sys [24/09/2011 14:32 20328]

S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [18/03/2010 13:16 753504]

.

.

------- Supplementary Scan -------

.

TCP: DhcpNameServer = 192.168.2.1

FF - ProfilePath - c:\documents and settings\Gareth\Application Data\Mozilla\Firefox\Profiles\68y3kbvj.default\

.

- - - - ORPHANS REMOVED - - - -

.

AddRemove-8461-7759-5462-8226 - f:\vuze\uninstall.exe

.

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2011-09-29 21:55

Windows 5.1.2600 Service Pack 3 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_USERS\S-1-5-21-73586283-484061587-839522115-1004\Software\SecuROM\License information*]

"datasecu"=hex:ee,6f,65,12,d5,cb,b8,28,b3,88,c2,1f,7e,9a,f1,e1,55,55,f1,f9,4d,

ae,33,84,84,9f,7d,ee,b8,6d,52,d0,3e,92,25,7b,04,71,10,2c,56,ea,6e,e7,e9,07,\

"rkeysecu"=hex:9c,b4,64,54,b6,70,57,50,88,ec,4b,79,3d,76,ec,1d

.

[HKEY_LOCAL_MACHINE\software\Microsoft\DbgagD\1*]

"value"="?\09\05\10\10\05\1a?"

.

--------------------- DLLs Loaded Under Running Processes ---------------------

.

- - - - - - - > 'winlogon.exe'(764)

c:\windows\system32\Ati2evxx.dll

c:\windows\system32\atiadlxx.dll

.

Completion time: 2011-09-29 21:59:33

ComboFix-quarantined-files.txt 2011-09-29 20:59

.

Pre-Run: 22,382,972,928 bytes free

Post-Run: 24,123,506,688 bytes free

.

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

UnsupportedDebug="do not select this" /debug

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect /usepmtimer

.

- - End Of File - - 06AAF814ABD95F66D2EEBD087DB7436E

My computer still takes a while to load during start-up and my processor is being limited to only certain amounts of mhz/ghz when none of my motherboard's features that do such a thing are enabled. Apart from that, nothing really that noticeable. What concerned me was when the infection occured, only two viruses were found and removed and the OS on the hard drive before I wiped it still blue-screened upon the Windows log-on screen. This suggested to me that the Windows Log-on files were infected. I'm looking to confirm whether or not the infection has lasted through a complete format and reinstallation of Windows.

Link to post
Share on other sites

Copy/paste the text in the Codebox below into notepad:

Here's how to do that:

Click Start > Run type Notepad click OK.

This will open an empty notepad file:

Take your mouse, and place your cursor at the beginning of the text in the box below, then click and hold the left mouse button, while pulling your mouse over the text. This should highlight the text. Now release the left mouse button. Now, with the cursor over the highlighted text, right click the mouse for options, and select 'copy'. Now over the empty Notepad box, right click your mouse again, and select 'paste' and you will have copied and pasted the text.

KillAll::

RegNull::
[HKEY_LOCAL_MACHINE\software\Microsoft\DbgagD\1*]

Save this file to your desktop, Save this as "CFScript"

Here's how to do that:

1.Click File;

2.Click Save As... Change the directory to your desktop;

3.Change the Save as type to "All Files";

4.Type in the file name: CFScript

5.Click Save ...

CFScriptB-4.gif

Drag CFScript.txt into ComboFix.exe

Then post the results log using Copy / Paste

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

ComboFix 11-09-30.01 - Gareth 30/09/2011 9:09.2.2 - x86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2047.1553 [GMT 1:00]

Running from: c:\documents and settings\Gareth\Desktop\ComboFix.exe

Command switches used :: c:\documents and settings\Gareth\Desktop\CFScript.txt

AV: avast! Antivirus *Disabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

F:\Autorun.inf

.

.

((((((((((((((((((((((((( Files Created from 2011-08-28 to 2011-09-30 )))))))))))))))))))))))))))))))

.

.

2011-09-28 08:07 . 2011-09-28 08:07 -------- d-----w- C:\TDSSKiller_Quarantine

2011-09-15 21:09 . 2011-09-29 09:16 -------- d-----w- C:\NVIDIA

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-09-19 17:21 . 2004-08-04 12:00 507904 ----a-w- c:\windows\system32\winlogon.exe

2011-09-09 09:12 . 2004-08-04 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll

2011-08-03 11:49 . 2009-09-27 23:12 5427200 ----a-w- c:\windows\system32\nvcuda.dll

2011-08-03 11:49 . 2009-09-27 23:12 2404864 ----a-w- c:\windows\system32\nvapi.dll

2011-08-03 11:49 . 2009-09-27 23:12 2387560 ----a-w- c:\windows\system32\nvcuvid.dll

2011-08-03 11:49 . 2009-09-27 23:12 2090088 ----a-w- c:\windows\system32\nvcuvenc.dll

2011-08-03 11:49 . 2009-09-27 23:12 16191488 ----a-w- c:\windows\system32\nvoglnt.dll

2011-08-03 11:49 . 2009-09-27 17:20 54272 ----a-w- c:\windows\system32\nvwddi.dll

2011-08-03 11:49 . 2009-09-27 17:19 146024 ----a-w- c:\windows\system32\nvsvc32.exe

2011-08-03 11:49 . 2009-09-27 17:19 145000 ----a-w- c:\windows\system32\nvcolor.exe

2011-08-03 11:49 . 2009-09-27 17:19 13892200 ----a-w- c:\windows\system32\nvcpl.dll

2011-08-03 11:49 . 2009-09-27 17:19 111208 ----a-w- c:\windows\system32\nvmctray.dll

2011-07-15 13:29 . 2004-08-04 12:00 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys

2011-07-08 14:02 . 2004-08-04 12:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys

2011-09-03 06:18 . 2011-09-15 20:38 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll

.

.

------- Sigcheck -------

Note: Unsigned files aren't necessarily malware.

.

[-] 2011-09-19 . 679A7259741F6A09994F02CE261B5F2E . 507904 . . [5.1.2600.5512] . . c:\windows\system32\winlogon.exe

[-] 2011-09-12 . 6225F14B8CE08CCBA8B25AD27843C674 . 502272 . . [5.1.2600.2180] . . c:\windows\$NtServicePackUninstall$\winlogon.exe

[7] 2008-04-14 . ED0EF0A136DEC83DF69F04118870003E . 507904 . . [5.1.2600.5512] . . c:\windows\ServicePackFiles\i386\winlogon.exe

.

((((((((((((((((((((((((((((( SnapShot@2011-09-29_20.55.46 )))))))))))))))))))))))))))))))))))))))))

.

+ 2011-09-30 08:20 . 2011-09-30 08:20 16384 c:\windows\temp\Perflib_Perfdata_788.dat

+ 2004-08-04 12:00 . 2011-09-30 08:25 75530 c:\windows\system32\perfc009.dat

- 2004-08-04 12:00 . 2011-09-29 20:42 75530 c:\windows\system32\perfc009.dat

+ 2004-08-04 12:00 . 2011-09-30 08:25 472562 c:\windows\system32\perfh009.dat

- 2004-08-04 12:00 . 2011-09-29 20:42 472562 c:\windows\system32\perfh009.dat

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]

@="{472083B0-C522-11CF-8763-00608CC02F24}"

[HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]

2011-09-06 20:45 122512 ----a-w- c:\program files\AVAST Software\Avast\ashShell.dll

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"DAEMON Tools Lite"="c:\program files\DAEMON Tools Lite\DTLite.exe" [2011-08-02 4910912]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"avast"="c:\program files\AVAST Software\Avast\avastUI.exe" [2011-09-06 3722416]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-06-09 254696]

"RTHDCPL"="RTHDCPL.EXE" [2009-08-24 18702336]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-10-03 35696]

"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]

"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2011-08-03 13892200]

"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2011-08-03 111208]

.

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]

"Eventlog"=2 (0x2)

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\NVIDIA Corporation\\NVIDIA Updatus\\daemonu.exe"=

.

R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [15/09/2011 21:45 442200]

R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [15/09/2011 21:45 320856]

R1 BIOS;BIOS;c:\windows\system32\drivers\BIOS.sys [02/03/2010 03:11 13696]

R1 dtsoftbus01;DAEMON Tools Virtual Bus Driver;c:\windows\system32\drivers\dtsoftbus01.sys [19/09/2011 13:38 232512]

R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [15/09/2011 21:45 20568]

R2 nvUpdatusService;NVIDIA Update Service Daemon;c:\program files\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe [15/09/2011 22:26 2255464]

R3 NVHDA;Service for NVIDIA High Definition Audio Driver;c:\windows\system32\drivers\nvhda32.sys [29/09/2011 10:16 119528]

S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [18/03/2010 13:16 130384]

S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [02/03/2010 03:40 1684736]

S3 cpuz134;cpuz134;c:\program files\CPUID\PC Wizard 2010\pcwiz_x32.sys [24/09/2011 14:32 20328]

S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [18/03/2010 13:16 753504]

.

.

------- Supplementary Scan -------

.

TCP: DhcpNameServer = 192.168.2.1

FF - ProfilePath - c:\documents and settings\Gareth\Application Data\Mozilla\Firefox\Profiles\68y3kbvj.default\

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2011-09-30 09:20

Windows 5.1.2600 Service Pack 3 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_USERS\S-1-5-21-73586283-484061587-839522115-1004\Software\SecuROM\License information*]

"datasecu"=hex:ee,6f,65,12,d5,cb,b8,28,b3,88,c2,1f,7e,9a,f1,e1,55,55,f1,f9,4d,

ae,33,84,84,9f,7d,ee,b8,6d,52,d0,3e,92,25,7b,04,71,10,2c,56,ea,6e,e7,e9,07,\

"rkeysecu"=hex:9c,b4,64,54,b6,70,57,50,88,ec,4b,79,3d,76,ec,1d

.

--------------------- DLLs Loaded Under Running Processes ---------------------

.

- - - - - - - > 'winlogon.exe'(768)

c:\windows\system32\Ati2evxx.dll

c:\windows\system32\atiadlxx.dll

.

- - - - - - - > 'explorer.exe'(3036)

c:\windows\system32\WININET.dll

c:\windows\system32\ieframe.dll

c:\windows\system32\webcheck.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\AVAST Software\Avast\AvastSvc.exe

c:\program files\Java\jre6\bin\jqs.exe

c:\windows\system32\nvsvc32.exe

c:\windows\system32\wscntfy.exe

c:\windows\RTHDCPL.EXE

c:\windows\system32\RUNDLL32.EXE

.

**************************************************************************

.

Completion time: 2011-09-30 09:28:10 - machine was rebooted

ComboFix-quarantined-files.txt 2011-09-30 08:28

ComboFix2.txt 2011-09-29 20:59

.

Pre-Run: 24,271,650,816 bytes free

Post-Run: 24,248,586,240 bytes free

.

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

UnsupportedDebug="do not select this" /debug

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect /usepmtimer

.

- - End Of File - - 3AD0986FB85E60EB5FE849D2D3A65154

Start-up seems fairly normal now, quite quick and without many issues. The log-on screen barely shows at all before booting into the main desktop - something it normally does before the infection happened. Not much else to describe, the system behaves as normal and there's very little that's irregular apart from a slow system at times, though this could be related to the limitation of my CPU (Something I have yet to find the cause for - it may be a built in feature of my processor.). One thing to note is the script I wrote vanished during Combofix running. I don't know if that's usual or not.

Link to post
Share on other sites

One thing to note is the script I wrote vanished during Combofix running. I don't know if that's usual or not.
My guess is CF didn't know what it was and removed it.

Good job thumbup.gif

The following will implement some cleanup procedures as well as reset System Restore points:

For XP:

  • Click START run
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

For Vista / Windows 7

  • Click START Search
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

If you used DeFogger

To re-enable your Emulation drivers, double click DeFogger to run the tool.

  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK

IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_enable which will appear on your desktop.

Your Emulation drivers are now re-enabled.

Here's my usual all clean post

To be on the safe side, I would also change all my passwords.

This infection appears to have been cleaned, but as the malware could be configured to run any program a remote attacker requires, it's impossible to be 100% sure that any machine is clean.

Log looks good :D

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.
    5. Change the Download signed ActiveX controls to Prompt
    6. Change the Download unsigned ActiveX controls to Disable
    7. Change the Initialize and script ActiveX controls not marked as safe to Disable
    8. Change the Installation of desktop items to Prompt
    9. Change the Launching programs and files in an IFRAME to Prompt
    10. Change the Navigate sub-frames across different domains to Prompt
    11. When all these settings have been made, click on the OK button.
    12. If it prompts you as to whether or not you want to save the settings, press the Yes button.
    13. Next press the Apply button and then the OK to exit the Internet Properties page.

    [*]Update your AntiVirus Software - It is imperative that you update your Antivirus software at least once a week

    (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    [*]Use a Firewall - I can not stress how important it is that you use a Firewall on your computer.

    Without a firewall your computer is succeptible to being hacked and taken over.

    I am very serious about this and see it happen almost every day with my clients.

    Simply using a Firewall in its default configuration can lower your risk greatly.

    [*]Using a secure browser plugin M86 SecureBrowsing makes it safe to search, surf and socialize online. This free browser plug-in displays security icons next to links on search engines and social networking sites like Facebook, Twitter and LinkedIn, so you'll know which pages are safe and which ones to avoid.

    •Free browser plug-in for Internet Explorer and Firefox

    •Real-time safety ratings

    •Ideal for Facebook, Twitter and LinkedIn

    [*] JAVA Click this link and click on the Free JAVA Download

    [*]Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly.

    This will ensure your computer has always the latest security updates available installed on your computer.

    If there are new updates to install, install them immediately, reboot your computer, and revisit the site

    until there are no more critical updates.

Only run one Anti-Virus and Firewall program.

I would suggest you read:

PC Safety and Security--What Do I Need?.

How to Prevent Malware:

The full version of Malwarebytes' Anti-Malware could have helped protect your computer against this threat.

We use different ways of protecting your computer(s):

  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention

Save yourself the hassle and get protected.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.