WiredWX Hobby Weather ToolsLog in

 


Antivirus live

2 posters

descriptionAntivirus live EmptyAntivirus live

more_horiz
Hi, my PC has been infected with this virus and I'm having trouble with the instructions on your removal guide. I have started in safe mode and followed the initial instructions but I'm unable to download malwarebytes. When I attempt to click the download link, my browser attempts to open a new page and then it just locks up. I'm unsure of what to try next. Can you help?

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Some further information. I'm still unable to navigate between any web pages or open up a new window in the browser. Just clicking on one of my favorites results in the browser trying to open up a new window which doesn't respond. The only way I seem to be able to access any site is to make that site my home page and then the browser will open up to that site when I start it. Once on a web page, I can navigate around in links on that site but I can't go anywhere else. Typing an address into the address bar and hitting enter also results in the browser trying to open up a new window and locking up.

Thanks in advance for any help you can provide.

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Please download ComboFix Antivirus live Combofix from BleepingComputer.com

Alternate link: GeeksToGo.com

Alternate link: Forospyware.com

Rename ComboFix.exe to commy.exe before you save it to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools A guide to do this can be found here
  • Click Start>Run then copy paste the following command into the Run box & click OK "%userprofile%\desktop\commy.exe" /stepdel
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console

Antivirus live Query_RC
Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:
Antivirus live RC_successful

  • Click on Yes, to continue scanning for malware.
  • When finished, it shall produce a log for you. Please include the contents of C:\ComboFix.txt in your next reply.

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Enclosed are the contents of the combo fix log:

ComboFix 09-12-21.02 - Dan Short 12/21/2009 23:29:24.1.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1013.758 [GMT -5:00]
Running from: c:\documents and settings\Dan Short\desktop\commy.exe
Command switches used :: /stepdel
FW: Norton Internet Worm Protection *disabled* {990F9400-4CEE-43EA-A83A-D013ADD8EA6E}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Dan Short\Local Settings\Application Data\nnojbq
c:\documents and settings\Dan Short\Local Settings\Application Data\nnojbq\cheisysguard.exe
c:\windows\system32\drivers\gaopdxsjrtlkaw.sys
c:\windows\system32\drivers\gaopdxviqjoykj.sys
c:\windows\system32\gaopdxvnlrfmtm.dll
C:\Autorun.inf
c:\windows\system32\drivers\gaopdxsjrtlkaw.sys
c:\windows\system32\drivers\gaopdxviqjoykj.sys
c:\windows\system32\gaopdxcounter
c:\windows\system32\gaopdxvnlrfmtm.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_gaopdxserv.sys
-------\Legacy_gaopdxserv.sys


((((((((((((((((((((((((( Files Created from 2009-11-22 to 2009-12-22 )))))))))))))))))))))))))))))))
.

2009-12-22 03:25 . 2009-12-22 03:25 664 ----a-w- c:\windows\system32\d3d9caps.dat
2009-12-22 02:14 . 2009-12-22 02:15 -------- d-----w- c:\documents and settings\All Users\AVP 2009
2009-12-22 01:43 . 2009-12-22 01:43 43640 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-12-19 17:51 . 2009-12-19 17:51 -------- d-----w- c:\documents and settings\Dan Short\Application Data\DataSafeOnline
2009-12-19 17:46 . 2007-06-14 00:21 172032 ----a-w- c:\windows\system32\igfxres.dll
2009-12-19 17:40 . 2004-08-04 10:00 538624 -c--a-w- c:\windows\system32\dllcache\spider.exe
2009-12-19 17:39 . 2004-08-04 10:00 10129408 -c--a-w- c:\windows\system32\dllcache\hwxkor.dll
2009-12-19 17:21 . 2004-08-04 10:00 24661 -c--a-w- c:\windows\system32\dllcache\spxcoins.dll
2009-12-19 17:21 . 2004-08-04 10:00 24661 ----a-w- c:\windows\system32\spxcoins.dll
2009-12-19 17:21 . 2004-08-04 10:00 13312 -c--a-w- c:\windows\system32\dllcache\irclass.dll
2009-12-19 17:21 . 2004-08-04 10:00 13312 ----a-w- c:\windows\system32\irclass.dll
2009-12-19 12:11 . 2009-12-19 12:11 -------- d-----w- c:\windows\dell
2009-12-17 15:59 . 2009-12-17 15:59 79488 ----a-w- c:\documents and settings\Dan Short\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-22 04:36 . 2007-08-23 21:13 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-12-19 17:51 . 2007-08-29 00:43 43640 ----a-w- c:\documents and settings\Dan Short\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-12-19 17:36 . 2004-08-10 18:02 23444 ----a-w- c:\windows\system32\emptyregdb.dat
2009-11-20 04:55 . 2009-10-30 03:42 -------- d-----w- c:\program files\NCH Software
2009-11-03 23:26 . 2007-08-23 21:05 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-11-03 23:26 . 2007-08-23 21:06 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2009-11-03 23:25 . 2007-08-28 23:07 -------- d-----w- c:\program files\Hewlett-Packard
2009-11-03 23:23 . 2007-08-23 21:06 -------- d-----w- c:\program files\Symantec
2009-11-03 23:16 . 2009-10-30 03:43 -------- d-----w- c:\documents and settings\Dan Short\Application Data\NCH Software
2009-11-03 23:16 . 2009-10-30 03:43 -------- d-----w- c:\documents and settings\All Users\Application Data\NCH Software
2009-11-03 22:52 . 2009-11-03 01:32 -------- d-----w- c:\program files\ToggleEN
2009-11-03 01:32 . 2009-11-03 01:32 -------- d-----w- c:\program files\Conduit
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{038cb5c7-48ea-4af9-94e0-a1646542e62b}"= "c:\program files\ToggleEN\tbTog1.dll" [2009-11-03 2166296]

[HKEY_CLASSES_ROOT\clsid\{038cb5c7-48ea-4af9-94e0-a1646542e62b}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{038cb5c7-48ea-4af9-94e0-a1646542e62b}]
2009-11-03 22:52 2166296 ----a-w- c:\program files\ToggleEN\tbTog1.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{038cb5c7-48ea-4af9-94e0-a1646542e62b}"= "c:\program files\ToggleEN\tbTog1.dll" [2009-11-03 2166296]

[HKEY_CLASSES_ROOT\clsid\{038cb5c7-48ea-4af9-94e0-a1646542e62b}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{038CB5C7-48EA-4AF9-94E0-A1646542E62B}"= "c:\program files\ToggleEN\tbTog1.dll" [2009-11-03 2166296]

[HKEY_CLASSES_ROOT\clsid\{038cb5c7-48ea-4af9-94e0-a1646542e62b}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-11-17 68856]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-9-23 29696]
Dell Network Assistant.lnk - c:\windows\Installer\{0240BDFB-2995-4A3F-8C96-18D41282B716}\Icon0240BDFB3.exe [2007-8-23 7168]
Kodak EasyShare software.lnk - c:\program files\Kodak\Kodak EasyShare software\bin\EasyShare.exe [2007-6-21 282624]

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Dell Network Assistant\\ezi_hnm2.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"10421:UDP"= 10421:UDP:SingleClick Discovery Protocol
"10426:UDP"= 10426:UDP:SingleClick ICC
"86:TCP"= 86:TCP:BroadCam Video Streaming Server TCP/IP Port

S3 motccgp;Motorola USB Composite Device Driver;c:\windows\system32\drivers\motccgp.sys [11/2/2007 5:29 PM 17920]
S3 motccgpfl;MotCcgpFlService;c:\windows\system32\drivers\motccgpfl.sys [11/2/2007 5:29 PM 7680]
S3 motport;Motorola USB Diagnostic Port;c:\windows\system32\drivers\motport.sys [11/2/2007 5:29 PM 22528]
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.geekpolice.net/forum.htm
uSearch Page = hxxp://www.google.com
uSearchMigratedDefaultUrl = hxxp://www.mywebsearch.com/jsp/cfg_redir2.jsp?id=ZRxdm429YYUS&fl=0&ptb=7bCvMJFCJZeZBle5o1Z9Kw&url=http://edits.mywebsearch.com/toolbaredits/barsearch.jhtml&st=sb&searchfor={searchTerms}
uSearch Bar = hxxp://www.google.com/ie
mDefault_Search_URL = hxxp://www.google.com/ie
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
mSearchAssistant = hxxp://www.google.com/ie
IE: &Search - http://edits.mywebsearch.com/toolbaredits/menusearch.jhtml?p=ZRxdm429YYUS
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-A_M_P_NET - c:\program files\AntiMalware_Pro\AntiMalware_Pro.exe



**************************************************************************
scanning hȋdden processes ...

scanning hȋdden autostart entries ...

scanning hȋdden files ...

scan completed successfully
hȋdden files:

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(1884)
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Dell Network Assistant\hnm_svc.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
c:\program files\Dell Network Assistant\ezi_hnm2.exe
c:\program files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2009-12-21 23:40:36 - machine was rebooted
ComboFix-quarantined-files.txt 2009-12-22 04:40

Pre-Run: 25,846,792,192 bytes free
Post-Run: 33,973,252,096 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

- - End Of File - - 215104C70AE7A92BD678A3025E4AC329

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Antivirus live Mbamicontw5 Please download Malwarebytes Anti-Malware from here.

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • Please save the log to a location you will remember.
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
That link worked for the download but I still seem to be having the issue navigating between web sites and opening new windows in the browser. Thanks for your help so far.

Malwarebytes' Anti-Malware 1.42
Database version: 3407
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

12/22/2009 12:09:27 AM
mbam-log-2009-12-22 (00-09-27).txt

Scan type: Quick Scan
Objects scanned: 108152
Time elapsed: 4 minute(s), 23 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 6
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\{NSINAME} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\MenuExt\&Search\(default) (Adware.Hotbar) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Documents and Settings\All Users\AVP 2009 (Malware.Trace) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\rn.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\AVP 2009\1.dat (Malware.Trace) -> Quarantined and deleted successfully.

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Please download Rooter and Save it to your desktop

  1. Double click it to start the tool.
  2. Click Scan.
  3. Eventually, a Notepad file containing the report will open, also found at C:\Rooter.txt. Post that log in your next reply.

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Enclosed are the results of the Rooter scan:

Rooter.exe (v1.0.2) by Eric_71
.
SeDebugPrivilege granted successfully ...
.
Windows XP Home Edition (5.1.2600) Service Pack 2
[32_bits] - x86 Family 6 Model 15 Stepping 2, GenuineIntel
.
[wscsvc] (Security Center) RUNNING (state:4)
[SharedAccess] RUNNING (state:4)
Windows Firewall -> Disabled !
.
Internet Explorer 6.0.2900.2180
.
C:\ [Fixed-NTFS] .. ( Total:74 Go - Free:30 Go )
D:\ [CD_Rom]
.
Scan : 07:44.47
Path : C:\Documents and Settings\Dan Short\Desktop\Rooter.exe
User : Dan Short ( Administrator -> YES )
.
----------------------\\ Processes
.
Locked [System Process] (0)
______ System (4)
______ \SystemRoot\System32\smss.exe (616)
______ \??\C:\WINDOWS\system32\csrss.exe (664)
______ \??\C:\WINDOWS\system32\winlogon.exe (688)
______ C:\WINDOWS\system32\services.exe (732)
______ C:\WINDOWS\system32\lsass.exe (744)
______ C:\WINDOWS\system32\svchost.exe (912)
______ C:\WINDOWS\system32\svchost.exe (984)
______ C:\WINDOWS\System32\svchost.exe (1080)
______ C:\WINDOWS\system32\svchost.exe (1120)
______ C:\WINDOWS\system32\svchost.exe (1164)
______ C:\WINDOWS\system32\svchost.exe (1284)
______ C:\WINDOWS\system32\spoolsv.exe (1496)
______ C:\WINDOWS\Explorer.EXE (1736)
______ C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe (1816)
______ C:\WINDOWS\system32\ctfmon.exe (1832)
______ C:\Program Files\Dell Network Assistant\ezi_hnm2.exe (1916)
______ C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe (1924)
______ C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe (180)
______ C:\Program Files\Dell Network Assistant\hnm_svc.exe (236)
______ C:\Program Files\Java\jre6\bin\jqs.exe (272)
______ C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe (288)
______ C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe (440)
______ C:\WINDOWS\System32\alg.exe (2172)
______ C:\WINDOWS\system32\wscntfy.exe (2180)
______ C:\WINDOWS\system32\svchost.exe (2336)
______ C:\WINDOWS\system32\wuauclt.exe (3140)
______ C:\Program Files\Internet Explorer\IEXPLORE.EXE (2960)
______ C:\Documents and Settings\Dan Short\Desktop\Rooter.exe (4000)
.
----------------------\\ Device\Harddisk0\
.
\Device\Harddisk0 [Sectors : 63 x 512 Bytes]
.
\Device\Harddisk0\Partition1 (Start_Offset:32256 | Length:49319424)
\Device\Harddisk0\Partition2 --[ MBR ]-- (Start_Offset:49351680 | Length:79941496320)
.
----------------------\\ Scheduled Tasks
.
C:\WINDOWS\Tasks\desktop.ini
C:\WINDOWS\Tasks\SA.DAT
.
----------------------\\ Registry
.
.
----------------------\\ Files & Folders
.
----------------------\\ Scan completed at 07:45.09
.
C:\Rooter$\Rooter_1.txt - (22/12/2009 | 07:45.09)

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Please download Stealth MBR Rootkit Detector by GMER from GMER.net, and save to your Desktop.
  • Double-click mbr.exe to start the program.
  • When done scanning, it will save a log on the Desktop called mbr.log.
  • Please post the contents of that log in your next reply.

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Enclosed are the results of the scan:

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
kernel: MBR read successfully
user & kernel MBR OK

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Antivirus live Mbamicontw5 Please download Malwarebytes Anti-Malware from here.

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • Please save the log to a location you will remember.
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Malwarebytes' Anti-Malware 1.42
Database version: 3414
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

12/23/2009 8:03:16 AM
mbam-log-2009-12-23 (08-03-16).txt

Scan type: Full Scan (C:\|)
Objects scanned: 158288
Time elapsed: 26 minute(s), 5 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\commy12953c\Combo-Fix.sys (Rootkit.Agent) -> Quarantined and deleted successfully.

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
1. Click the Start Menu.
2. Click Run.
3. Type in "mbam.exe /developer", without the quotes.
4. Run the same type of scan you did before and save the logfile and post it.

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Malwarebytes' Anti-Malware 1.42
Database version: 3414
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

12/23/2009 6:35:22 PM
mbam-log-2009-12-23 (18-35-22).txt

Scan type: Full Scan (C:\|)
Objects scanned: 158240
Time elapsed: 35 minute(s), 38 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
Download Security Check by screen317 from SpywareInfoforum.org or Changelog.fr.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

descriptionAntivirus live EmptyRe: Antivirus live

more_horiz
privacy_tip Permissions in this forum:
You cannot reply to topics in this forum