WiredWX Christian Hobby Weather Tools
Would you like to react to this message? Create an account in a few clicks or log in to continue.

WiredWX Christian Hobby Weather ToolsLog in

 


descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

more_horiz
Please download TFC by OldTimer to your desktop
  • Please double-click TFC.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • It will close all programs when run, so make sure you have saved all your work before you begin.
  • Click the Start
    button to begin the process. Depending on how often you clean temp
    files, execution time should be anywhere from a few seconds to a minute
    or two. Let it run uninterrupted to completion.
  • Once it's finished it should reboot your machine. If it does not, please manually reboot the machine yourself to ensure a complete clean.


==

It is time to fix the damages due to malware, and to secure your computer to help prevent re-infection.
Please download DragonFix by DragonMaster Jay, and save it to your Desktop. Right click and Extract All, and save the files to your Desktop.
  • Please disable realtime protection. (If any)
  • Double-click RunFirst.vbs. Follow the prompts and make sure it completes. It will confirm the Restore Point was added.
  • Double-click DragonFix.reg, and follow the prompt(s).
  • Please reboot your computer.


Let me know if it is running faster.

descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

more_horiz
Hi There'
The file cleaner did what it had to but I can not get the Dragon Fix to run , I turned off all protection and still would not work ......?

descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

more_horiz
Just try DragonFix.reg and skip the runfirst.vbs.

descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

more_horiz
Hi,
No that has not worked , maybe ...throw the pc out the door !!

descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

more_horiz
Please download the GMER Rootkit Scanner. Unzip it to your Desktop.

Before scanning, make sure all other running programs are closed and no other actions like a scheduled antivirus scan will occur while the scan is being performed. Do not use your computer for anything else during the scan.

Double-click gmer.exe. The program will begin to run.

**Caution**
These types of scans can produce false positives. Do NOT take any action on any
"<--- ROOKIT" entries unless advised!

If possible rootkit activity is found, you will be asked if you would like to perform a full scan.

  • Click NO
  • In the right panel, you will see a bunch of boxes that have been checked ... leave everything checked and ensure the Show all box is un-checked.
  • Now click the Scan button.
    Once the scan is complete, you may receive another notice about rootkit activity.
  • Click OK.
  • GMER will produce a log. Click on the [Save..] button, and in the File name area, type in "GMER.txt"
  • Save it where you can easily find it, such as your desktop.

Post the contents of GMER.txt in your next reply.

descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

more_horiz
Hi There.
I get a window open up when I try to open gmer it says that Windows can not access the spcified device path or file , You may not have permission to access this file

descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

more_horiz
Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:

    Code:


    :filefind
    scecli.dll
    netlogon.dll
    eventlog.dll
    winlogon.exe
    comres.dll
    crypt32.dll
    gpedit.dll
    rundll32.exe
    sfc.dll
    svchost.exe
    cngaudit.dll
    beep.sys
    wscntfy.exe
    atapi.sys


  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

more_horiz
It's telling me the same as for Gmer

descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

more_horiz

  1. Download peek.bat from the download link below and save it to your Desktop.

  • Double-click peek.bat to run it.
      A black Command Prompt window will appear shortly: the program is running.

  • Once it is finished, copy and paste the entire contents of the Log.txt file it creates as a reply to this post.
  • descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

    more_horiz
    Hi There,
    Same thing tells me I don't have pemrission

    descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

    more_horiz
    Sorry,
    I tried again and it worked this time......


    Volume in drive C has no label.
    Volume Serial Number is 103B-48E7

    Directory of C:\WINDOWS\$NtServicePackUninstall$

    28/02/2006 10:30 PM 180,224 scecli.dll

    Directory of C:\WINDOWS\$NtServicePackUninstall$

    28/02/2006 10:30 PM 407,040 netlogon.dll

    Directory of C:\WINDOWS\$NtServicePackUninstall$

    28/02/2006 10:30 PM 55,808 eventlog.dll
    3 File(s) 643,072 bytes

    Directory of C:\WINDOWS\ERDNT\cache

    14/04/2008 10:42 AM 181,248 scecli.dll

    Directory of C:\WINDOWS\ERDNT\cache

    14/04/2008 10:42 AM 407,040 netlogon.dll

    Directory of C:\WINDOWS\ERDNT\cache

    14/04/2008 10:41 AM 56,320 eventlog.dll
    3 File(s) 644,608 bytes

    Directory of C:\WINDOWS\ServicePackFiles\i386

    14/04/2008 10:42 AM 181,248 scecli.dll

    Directory of C:\WINDOWS\ServicePackFiles\i386

    14/04/2008 10:42 AM 407,040 netlogon.dll

    Directory of C:\WINDOWS\ServicePackFiles\i386

    14/04/2008 10:41 AM 56,320 eventlog.dll
    3 File(s) 644,608 bytes

    Directory of C:\WINDOWS\system32

    14/04/2008 10:42 AM 181,248 scecli.dll

    Directory of C:\WINDOWS\system32

    14/04/2008 10:42 AM 407,040 netlogon.dll

    Directory of C:\WINDOWS\system32

    14/04/2008 10:41 AM 56,320 eventlog.dll
    3 File(s) 644,608 bytes

    Total Files Listed:
    12 File(s) 2,576,896 bytes
    0 Dir(s) 16,346,513,408 bytes free

    descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

    more_horiz
    Please download SmitfraudFix (by S!Ri)
    Extract the content (a folder named SmitfraudFix) to your Desktop.

    Double-click smitfraudfix.exe
    Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
    Please copy/paste the content of that report into your next reply.

    descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

    more_horiz
    Moderated Message: Hello, your comment has been removed. Please do not post in another member's topic. If you need help, please read this over and click here to open a new topic.

    descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

    more_horiz
    Hello Again........



    Scan done at 11:46:25.62, Thu 24/12/2009
    Run from C:\Documents and Settings\Raelene\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in normal mode

    »»»»»»»»»»»»»»»»»»»»»»»» Process

    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\AVG\AVG9\avgchsvx.exe
    C:\Program Files\AVG\AVG9\avgrsx.exe
    C:\Program Files\AVG\AVG9\avgcsrvx.exe
    C:\Program Files\Tall Emu\Online Armor\OAcat.exe
    C:\Program Files\Tall Emu\Online Armor\oasrv.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\AVG\AVG9\Identity Protection\Agent\Bin\AVGIDSAgent.exe
    C:\Program Files\Google\Update\1.2.183.13\GoogleCrashHandler.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\AVG\AVG9\avgwdsvc.exe
    C:\Program Files\AVG\AVG9\avgfws9.exe
    C:\Program Files\AVG\AVG9\avgam.exe
    C:\Program Files\AVG\AVG9\avgnsx.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe
    C:\Program Files\AVG\AVG9\avgemc.exe
    C:\Program Files\AVG\AVG9\avgcsrvx.exe
    C:\Program Files\AVG\AVG9\avgcsrvx.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Tall Emu\Online Armor\oaui.exe
    C:\Program Files\Tall Emu\Online Armor\OAhlp.exe
    C:\WINDOWS\system32\cmd.exe

    »»»»»»»»»»»»»»»»»»»»»»»» hosts


    »»»»»»»»»»»»»»»»»»»»»»»» C:\


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32\LogFiles


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Raelene


    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\Raelene\LOCALS~1\Temp


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Raelene\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu


    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\Raelene\FAVORI~1


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files


    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="About:Home"
    "SubscribedURL"="About:Home"
    "FriendlyName"="My Current Home Page"


    »»»»»»»»»»»»»»»»»»»»»»»» o4Patch
    !!!Attention, following keys are not inevitably infected!!!

    o4Patch
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri



    »»»»»»»»»»»»»»»»»»»»»»»» IEDFix
    !!!Attention, following keys are not inevitably infected!!!




    »»»»»»»»»»»»»»»»»»»»»»»» Agent.OMZ.Fix
    !!!Attention, following keys are not inevitably infected!!!

    Agent.OMZ.Fix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» VACFix
    !!!Attention, following keys are not inevitably infected!!!

    VACFix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» 404Fix
    !!!Attention, following keys are not inevitably infected!!!

    404Fix
    Credits: Malware Analysis & Diagnostic
    Code: S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLs
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]


    »»»»»»»»»»»»»»»»»»»»»»»» Winlogon
    !!!Attention, following keys are not inevitably infected!!!

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"

    »»»»»»»»»»»»»»»»»»»»»»»» RK

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "System"=""




    »»»»»»»»»»»»»»»»»»»»»»»» DNS

    Description: NETGEAR WG111v2 54Mbps Wireless USB 2.0 Adapter - AVG miniport driver
    DNS Server Search Order: 10.0.0.138

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{6B71A212-C6FA-406B-B43F-C059145A3068}: DhcpNameServer=10.0.0.138
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{6B71A212-C6FA-406B-B43F-C059145A3068}: DhcpNameServer=10.0.0.138
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{6B71A212-C6FA-406B-B43F-C059145A3068}: DhcpNameServer=10.0.0.138
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=10.0.0.138
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=10.0.0.138
    HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=10.0.0.138


    »»»»»»»»»»»»»»»»»»»»»»»» Scanning for wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End

    descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

    more_horiz
    Please download Dial-A-Fix from here.

    Save it to your Desktop.

    Open Dial-a-fix.exe

    Click the green checkmark at the bottom of the window; this should select all options.

    Now, click GO.

    Allow it to run (the status will be displayed at the bottom), and follow any prompts you receive.

    descriptionsecurity tool removal - Page 1 EmptyRe: security tool removal

    more_horiz
    privacy_tip Permissions in this forum:
    You cannot reply to topics in this forum