WiredWX Hobby Weather ToolsLog in

 


Urgent Help with Trojan.Zeroaccess!inf

2 posters

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
Logs from aswMBR:

aswMBR version 0.9.9.1649 Copyright(c) 2011 AVAST Software
Run date: 2012-03-07 13:12:55
-----------------------------
13:12:55.734 OS Version: Windows 5.1.2600 Service Pack 3
13:12:55.734 Number of processors: 2 586 0x170A
13:12:55.734 ComputerName: RSHARMA6400 UserName: ravis
13:13:13.796 Initialize success
13:19:42.640 AVAST engine defs: 12030700
13:34:17.390 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
13:34:17.390 Disk 0 Vendor: WDC_WD2500BJKT-75F4T0 11.01A11 Size: 238475MB BusType: 3
13:34:17.437 Disk 0 MBR read successfully
13:34:17.453 Disk 0 MBR scan
13:34:17.531 Disk 0 Windows XP default MBR code
13:34:17.546 Disk 0 Partition 1 00 DE Dell Utility Dell 8.0 180 MB offset 63
13:34:17.593 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 238292 MB offset 369495
13:34:17.609 Disk 0 scanning sectors +488392065
13:34:17.718 Disk 0 scanning C:\WINDOWS\system32\drivers
13:34:25.656 File: C:\WINDOWS\system32\drivers\i8042prt.sys **INFECTED** Win32:Alureon-AQT [Rtk]
13:34:34.609 Disk 0 trace - called modules:
13:34:34.640 ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x8ad9afd0]<<
13:34:34.640 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8ae1d908]
13:34:34.640 3 CLASSPNP.SYS[f7657fd7] -> nt!IofCallDriver -> [0x8aeeb030]
13:34:34.640 \Driver\00000462[0x8ae2c178] -> IRP_MJ_CREATE -> 0x8ad9afd0
13:34:36.921 AVAST engine scan C:\WINDOWS
13:34:40.718 AVAST engine scan C:\WINDOWS\system32
13:36:48.812 AVAST engine scan C:\WINDOWS\system32\drivers
13:36:56.968 File: C:\WINDOWS\system32\drivers\i8042prt.sys **INFECTED** Win32:Alureon-AQT [Rtk]
13:37:05.937 AVAST engine scan C:\Documents and Settings\ravis
15:39:31.140 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\ravis\Desktop\MBR.dat"
15:39:31.453 The log file has been saved successfully to "C:\Documents and Settings\ravis\Desktop\aswMBR.txt"


aswMBR version 0.9.9.1649 Copyright(c) 2011 AVAST Software
Run date: 2012-03-07 13:12:55
-----------------------------
13:12:55.734 OS Version: Windows 5.1.2600 Service Pack 3
13:12:55.734 Number of processors: 2 586 0x170A
13:12:55.734 ComputerName: RSHARMA6400 UserName: ravis
13:13:13.796 Initialize success
13:19:42.640 AVAST engine defs: 12030700
13:34:17.390 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
13:34:17.390 Disk 0 Vendor: WDC_WD2500BJKT-75F4T0 11.01A11 Size: 238475MB BusType: 3
13:34:17.437 Disk 0 MBR read successfully
13:34:17.453 Disk 0 MBR scan
13:34:17.531 Disk 0 Windows XP default MBR code
13:34:17.546 Disk 0 Partition 1 00 DE Dell Utility Dell 8.0 180 MB offset 63
13:34:17.593 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 238292 MB offset 369495
13:34:17.609 Disk 0 scanning sectors +488392065
13:34:17.718 Disk 0 scanning C:\WINDOWS\system32\drivers
13:34:25.656 File: C:\WINDOWS\system32\drivers\i8042prt.sys **INFECTED** Win32:Alureon-AQT [Rtk]
13:34:34.609 Disk 0 trace - called modules:
13:34:34.640 ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x8ad9afd0]<<
13:34:34.640 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8ae1d908]
13:34:34.640 3 CLASSPNP.SYS[f7657fd7] -> nt!IofCallDriver -> [0x8aeeb030]
13:34:34.640 \Driver\00000462[0x8ae2c178] -> IRP_MJ_CREATE -> 0x8ad9afd0
13:34:36.921 AVAST engine scan C:\WINDOWS
13:34:40.718 AVAST engine scan C:\WINDOWS\system32
13:36:48.812 AVAST engine scan C:\WINDOWS\system32\drivers
13:36:56.968 File: C:\WINDOWS\system32\drivers\i8042prt.sys **INFECTED** Win32:Alureon-AQT [Rtk]
13:37:05.937 AVAST engine scan C:\Documents and Settings\ravis
15:39:31.140 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\ravis\Desktop\MBR.dat"
15:39:31.453 The log file has been saved successfully to "C:\Documents and Settings\ravis\Desktop\aswMBR.txt"
17:55:04.468 File: C:\Documents and Settings\ravis\Desktop\SecurityCheck.exe **HIDDEN**
17:56:53.453 AVAST engine scan C:\Documents and Settings\All Users
18:03:22.968 Scan finished successfully
18:20:15.734 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\ravis\Desktop\MBR.dat"
18:20:16.062 The log file has been saved successfully to "C:\Documents and Settings\ravis\Desktop\aswMBR.txt"


aswMBR version 0.9.9.1649 Copyright(c) 2011 AVAST Software
Run date: 2012-03-07 13:12:55
-----------------------------
13:12:55.734 OS Version: Windows 5.1.2600 Service Pack 3
13:12:55.734 Number of processors: 2 586 0x170A
13:12:55.734 ComputerName: RSHARMA6400 UserName: ravis
13:13:13.796 Initialize success
13:19:42.640 AVAST engine defs: 12030700
13:34:17.390 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
13:34:17.390 Disk 0 Vendor: WDC_WD2500BJKT-75F4T0 11.01A11 Size: 238475MB BusType: 3
13:34:17.437 Disk 0 MBR read successfully
13:34:17.453 Disk 0 MBR scan
13:34:17.531 Disk 0 Windows XP default MBR code
13:34:17.546 Disk 0 Partition 1 00 DE Dell Utility Dell 8.0 180 MB offset 63
13:34:17.593 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 238292 MB offset 369495
13:34:17.609 Disk 0 scanning sectors +488392065
13:34:17.718 Disk 0 scanning C:\WINDOWS\system32\drivers
13:34:25.656 File: C:\WINDOWS\system32\drivers\i8042prt.sys **INFECTED** Win32:Alureon-AQT [Rtk]
13:34:34.609 Disk 0 trace - called modules:
13:34:34.640 ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x8ad9afd0]<<
13:34:34.640 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8ae1d908]
13:34:34.640 3 CLASSPNP.SYS[f7657fd7] -> nt!IofCallDriver -> [0x8aeeb030]
13:34:34.640 \Driver\00000462[0x8ae2c178] -> IRP_MJ_CREATE -> 0x8ad9afd0
13:34:36.921 AVAST engine scan C:\WINDOWS
13:34:40.718 AVAST engine scan C:\WINDOWS\system32
13:36:48.812 AVAST engine scan C:\WINDOWS\system32\drivers
13:36:56.968 File: C:\WINDOWS\system32\drivers\i8042prt.sys **INFECTED** Win32:Alureon-AQT [Rtk]
13:37:05.937 AVAST engine scan C:\Documents and Settings\ravis
15:39:31.140 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\ravis\Desktop\MBR.dat"
15:39:31.453 The log file has been saved successfully to "C:\Documents and Settings\ravis\Desktop\aswMBR.txt"
17:55:04.468 File: C:\Documents and Settings\ravis\Desktop\SecurityCheck.exe **HIDDEN**
17:56:53.453 AVAST engine scan C:\Documents and Settings\All Users
18:03:22.968 Scan finished successfully
18:20:15.734 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\ravis\Desktop\MBR.dat"
18:20:16.062 The log file has been saved successfully to "C:\Documents and Settings\ravis\Desktop\aswMBR.txt"
18:20:27.281 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\ravis\Desktop\MBR.dat"
18:20:27.359 The log file has been saved successfully to "C:\Documents and Settings\ravis\Desktop\aswMBR.txt"


aswMBR version 0.9.9.1649 Copyright(c) 2011 AVAST Software
Run date: 2012-03-07 13:12:55
-----------------------------
13:12:55.734 OS Version: Windows 5.1.2600 Service Pack 3
13:12:55.734 Number of processors: 2 586 0x170A
13:12:55.734 ComputerName: RSHARMA6400 UserName: ravis
13:13:13.796 Initialize success
13:19:42.640 AVAST engine defs: 12030700
13:34:17.390 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
13:34:17.390 Disk 0 Vendor: WDC_WD2500BJKT-75F4T0 11.01A11 Size: 238475MB BusType: 3
13:34:17.437 Disk 0 MBR read successfully
13:34:17.453 Disk 0 MBR scan
13:34:17.531 Disk 0 Windows XP default MBR code
13:34:17.546 Disk 0 Partition 1 00 DE Dell Utility Dell 8.0 180 MB offset 63
13:34:17.593 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 238292 MB offset 369495
13:34:17.609 Disk 0 scanning sectors +488392065
13:34:17.718 Disk 0 scanning C:\WINDOWS\system32\drivers
13:34:25.656 File: C:\WINDOWS\system32\drivers\i8042prt.sys **INFECTED** Win32:Alureon-AQT [Rtk]
13:34:34.609 Disk 0 trace - called modules:
13:34:34.640 ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x8ad9afd0]<<
13:34:34.640 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8ae1d908]
13:34:34.640 3 CLASSPNP.SYS[f7657fd7] -> nt!IofCallDriver -> [0x8aeeb030]
13:34:34.640 \Driver\00000462[0x8ae2c178] -> IRP_MJ_CREATE -> 0x8ad9afd0
13:34:36.921 AVAST engine scan C:\WINDOWS
13:34:40.718 AVAST engine scan C:\WINDOWS\system32
13:36:48.812 AVAST engine scan C:\WINDOWS\system32\drivers
13:36:56.968 File: C:\WINDOWS\system32\drivers\i8042prt.sys **INFECTED** Win32:Alureon-AQT [Rtk]
13:37:05.937 AVAST engine scan C:\Documents and Settings\ravis
15:39:31.140 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\ravis\Desktop\MBR.dat"
15:39:31.453 The log file has been saved successfully to "C:\Documents and Settings\ravis\Desktop\aswMBR.txt"
17:55:04.468 File: C:\Documents and Settings\ravis\Desktop\SecurityCheck.exe **HIDDEN**
17:56:53.453 AVAST engine scan C:\Documents and Settings\All Users
18:03:22.968 Scan finished successfully
18:20:15.734 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\ravis\Desktop\MBR.dat"
18:20:16.062 The log file has been saved successfully to "C:\Documents and Settings\ravis\Desktop\aswMBR.txt"
18:20:27.281 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\ravis\Desktop\MBR.dat"
18:20:27.359 The log file has been saved successfully to "C:\Documents and Settings\ravis\Desktop\aswMBR.txt"
18:20:41.921 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\ravis\Desktop\MBR.dat"
18:20:41.984 The log file has been saved successfully to "C:\Documents and Settings\ravis\Desktop\aswMBR.txt"


aswMBR version 0.9.9.1649 Copyright(c) 2011 AVAST Software
Run date: 2012-03-08 00:09:51
-----------------------------
00:09:51.281 OS Version: Windows 5.1.2600 Service Pack 3
00:09:51.281 Number of processors: 2 586 0x170A
00:09:51.281 ComputerName: RSHARMA6400 UserName: ravis
00:10:04.515 Initialize success
00:10:15.437 AVAST engine defs: 12030701
00:10:20.062 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
00:10:20.062 Disk 0 Vendor: WDC_WD2500BJKT-75F4T0 11.01A11 Size: 238475MB BusType: 3
00:10:20.140 Disk 0 MBR read successfully
00:10:20.156 Disk 0 MBR scan
00:10:20.312 Disk 0 Windows XP default MBR code
00:10:20.343 Disk 0 Partition 1 00 DE Dell Utility Dell 8.0 180 MB offset 63
00:10:20.390 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 238292 MB offset 369495
00:10:20.453 Disk 0 scanning sectors +488392065
00:10:20.578 Disk 0 scanning C:\WINDOWS\system32\drivers
00:10:31.218 Service scanning
00:10:49.140 Modules scanning
00:10:53.234 Disk 0 trace - called modules:
00:10:53.296 ntoskrnl.exe CLASSPNP.SYS disk.sys atapi.sys hal.dll pciide.sys PCIIDEX.SYS
00:10:58.562 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8aef6ab8]
00:10:58.859 3 CLASSPNP.SYS[f7657fd7] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-3[0x8ae2cd98]
00:10:59.875 AVAST engine scan C:\WINDOWS
00:11:03.734 AVAST engine scan C:\WINDOWS\system32
00:12:57.171 AVAST engine scan C:\WINDOWS\system32\drivers
00:13:11.859 AVAST engine scan C:\Documents and Settings\ravis
04:41:55.515 AVAST engine scan C:\Documents and Settings\All Users
04:47:25.656 Scan finished successfully
07:16:33.703 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\ravis\Desktop\MBR.dat"
07:16:33.765 The log file has been saved successfully to "C:\Documents and Settings\ravis\Desktop\aswMBR.txt"


Will run SUPERAntiSpyware and MBAM now...

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
Please go to Jotti's malware scan
(If more than one file needs scanned they must be done separately and links posted for each one)

* Copy the file path in the below Code box:

Code:

C:\WINDOWS\system32\drivers\i8042prt.sys 


* At the upload site, click once inside the window next to Browse.
* Press Ctrl+V on the keyboard (both at the same time) to paste the file path into the window.
* Next click Submit file
* Your file will possibly be entered into a queue which normally takes less than a minute to clear.
* This will perform a scan across multiple different virus scanning engines.
* Important: Wait for all of the scanning engines to complete.
* Once the scan is finished, Copy and then Paste the link in the address bar into your next reply.
************************************************************

  • Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop.
  • Once extracted, open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • Click the Report button and copy/paste the contents of it into your next reply
Note:It will also create a log in the C:\ directory..

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
SUPERAntiSpyware Logs:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 03/08/2012 at 11:50 AM

Application Version : 5.0.1146

Core Rules Database Version : 8315
Trace Rules Database Version: 6127

Scan type : Complete Scan
Total Scan Time : 03:06:51

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned : 643
Memory threats detected : 0
Registry items scanned : 34703
Registry threats detected : 0
File items scanned : 757946
File threats detected : 28

Trojan.Agent/Gen-Sefnit
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\INSTALLMATE\{32F7DD37-9A2A-B2E0-8C17-57316B50E0C4}\_SETUP.DLL

Adware.Tracking Cookie
account.goodgamestudios.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
cdn.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
cdn2.baronsmedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
content.yieldmanager.edgesuite.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
convoad.technoratimedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
core.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
kaltura.hutchmedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
media.heavy.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
media.kyte.tv [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
media.mtvnservices.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
media.npr.org [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
media.whosay.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
media1.break.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
media2.onsugar.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
media4.onsugar.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
msnbcmedia.msn.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
objects.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
s0.2mdn.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
secure-us.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
sftrack.searchforce.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
speed.pointroll.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
tag.2bluemedia.hiro.tv [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
tag.mediashakers.hiro.tv [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
vitamine.networldmedia.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]
www.goodcholesterolcount.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\K4AFYPL2 ]

Trojan.Agent/Gen-Sirefef
C:\QOOBOX\QUARANTINE\C\WINDOWS\SYSTEM32\DRIVERS\I8042PRT.SYS.VIR
C:\SYSTEM VOLUME INFORMATION\_RESTORE{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000031.SYS

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
MBAM Logs:

Malwarebytes Anti-Malware 1.60.1.1000
www.malwarebytes.org

Database version: v2012.03.08.06

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
ravis :: RSHARMA6400 [administrator]

3/8/2012 12:20:01 PM
mbam-log-2012-03-08 (12-20-01).txt

Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 745155
Time elapsed: 3 hour(s), 36 minute(s), 21 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 145
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000069.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000070.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000071.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000073.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000074.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000075.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000076.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000077.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000078.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000079.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000080.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000081.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000082.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000083.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000084.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000085.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000086.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000087.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000088.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000089.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000091.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000092.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000093.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000094.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000095.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000096.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000097.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000098.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000099.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000100.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000101.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000102.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000103.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000104.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000105.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000072.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000090.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000216.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000234.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001149.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001167.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001203.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001221.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000204.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000205.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000206.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000207.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000208.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000209.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000210.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000211.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000212.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000213.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000214.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000215.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000217.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000218.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000219.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000220.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000221.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000222.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000223.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000224.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000225.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000226.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000227.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000228.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000229.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000230.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000231.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000232.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000233.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000235.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000236.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000237.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000238.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0000239.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001133.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001134.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001135.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001136.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001137.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001138.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001139.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001140.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001141.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001142.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001143.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001144.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001145.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001146.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001147.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001148.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001150.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001151.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001152.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001153.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001154.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001155.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001156.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001157.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001158.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001159.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001160.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001161.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001162.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001163.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001164.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001165.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001166.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001168.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001204.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001205.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001206.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001207.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001208.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001209.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001210.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001211.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001212.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001213.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001214.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001215.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001216.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001217.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001218.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001219.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001220.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001222.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001223.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001224.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001225.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001226.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001227.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001228.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001229.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001230.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001231.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001232.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001233.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001234.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001235.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001236.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001237.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D9CC1861-E441-467E-8082-E65F54719D9E}\RP1\A0001238.dll (RootKit.0Access.H) -> Quarantined and deleted successfully.

(end)

Link from Jotti's malware scan:
http://virusscan.jotti.org/en/scanresult/5e5b06d57a8a5b6e85b5ce3c39ad251453580085

Running TDSSKiller now

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
No infections found by TDSSKiller.

Also my Symantec is reporting that comboFix is a trojan. Is it possible that it can get infected?

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
Also my Symantec is reporting that comboFix is a trojan. Is it possible that it can get infected?

That's normal. No worries.

SysProt Antirootkit

Download
SysProt Antirootkit from the link below (you will find it at the bottom
of the page under attachments, or you can get it from one of the
mirrors).

http://sites.google.com/site/sysprotantirootkit/

Unzip it into a folder on your desktop.

  • Double click Sysprot.exe to start the program.
  • Click on the Log tab.
  • In the Write to log box select the following items.

    • Process << Selected
    • Kernel Modules << Selected
    • SSDT << Selected
    • Kernel Hooks << Selected
    • IRP Hooks << NOT Selected
    • Ports << NOT Selected
    • Hidden Files << Selected

  • At the bottom of the page

    • Hidden Objects Only << Selected

  • Click on the Create Log button on the bottom right.
  • After a few seconds a new window should appear.
  • Select Scan Root Drive. Click on the Start button.
  • When it is complete a new window will appear to indicate that the scan is finished.
  • The log will be saved automatically in the same folder Sysprot.exe was extracted to. Open the text file and copy/paste the log here.

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
Logs from SysProt:

SysProt AntiRootkit v1.0.1.0
by swatkat

******************************************************************************************
******************************************************************************************

No Hidden Processes found

******************************************************************************************
******************************************************************************************
Kernel Modules:
Module Name: \SystemRoot\System32\Drivers\dump_atapi.sys
Service Name: ---
Module Base: B6F91000
Module End: B6FA9000
Hidden: Yes

Module Name: \SystemRoot\System32\Drivers\dump_WMILIB.SYS
Service Name: ---
Module Base: BA668000
Module End: BA66A000
Hidden: Yes

******************************************************************************************
******************************************************************************************
SSDT:
Function Name: ZwAlertResumeThread
Address: 83CBF938
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwAlertThread
Address: 83CBF9F8
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwAllocateVirtualMemory
Address: 83CCD8C0
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwConnectPort
Address: 87015828
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwCreateMutant
Address: 83CD57F8
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwCreateThread
Address: 83CD4448
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwFreeVirtualMemory
Address: 83CD46A0
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwImpersonateAnonymousToken
Address: 83CD2970
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwImpersonateThread
Address: 83CBF900
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwMapViewOfSection
Address: 8B029A20
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwOpenEvent
Address: 83CCE900
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwOpenProcessToken
Address: 83CA6378
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwOpenThreadToken
Address: 83CBD258
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwResumeThread
Address: 83CA5610
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwSetContextThread
Address: 83CAA228
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwSetInformationProcess
Address: 83CC0920
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwSetInformationThread
Address: 83CAE260
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwSuspendProcess
Address: 83CD56B0
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwSuspendThread
Address: 83CCF568
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwTerminateProcess
Address: 83CC4B00
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwTerminateThread
Address: 83CAA1F0
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwUnmapViewOfSection
Address: 83CA6EB8
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

Function Name: ZwWriteVirtualMemory
Address: 8A774E98
Driver Base: 0
Driver End: 0
Driver Name: _unknown_

******************************************************************************************
******************************************************************************************
No Kernel Hooks found

******************************************************************************************
******************************************************************************************
Hidden files/folders:
Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\amd64\filterpipelineprintproc.dll
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\amd64\msxpsdrv.cat
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\amd64\msxpsdrv.inf
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\amd64\msxpsinc.gpd
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\amd64\msxpsinc.ppd
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\amd64\mxdwdrv.dll
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\amd64\xpssvcs.dll
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\i386\filterpipelineprintproc.dll
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\i386\msxpsdrv.cat
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\i386\msxpsdrv.inf
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\i386\msxpsinc.gpd
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\i386\msxpsinc.ppd
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\i386\mxdwdrv.dll
Status: Access denied

Object: C:\6ee3ce9dfaee4caeb5d2c3db18519a\i386\xpssvcs.dll
Status: Access denied

Object: C:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\SrtETmp\E7B1F351.TMP
Status: Access denied

Object: C:\Documents and Settings\ravis\Desktop\Motive\AdminC\.metadata\.plugins\org.eclipse.wst.server.core\tmp0\ConfigurationManager\WEB-INF\classes\com\motive\serviceview\configurationmanager\actions\zipexchange\ZipConfigUploadAction$PerItemMergeConflictResolv
Status: Hidden

Object: C:\Documents and Settings\ravis\Desktop\Motive\WorkSpace\.metadata\.plugins\org.eclipse.wst.server.core\tmp0\ConfigurationManager\WEB-INF\classes\com\motive\serviceview\configurationmanager\actions\testModuleThrottlingTabs\TestModuleThrottlingConfiguratio
Status: Hidden

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
Please update me on how your computer is working.

I'd like to scan your machine with ESET OnlineScan

•Hold down Control and click on the following link to open ESET OnlineScan in a new window.
ESET OnlineScan
•Click the Urgent Help with Trojan.Zeroaccess!inf - Page 2 EsetOnline button.
•For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

  • Click on Urgent Help with Trojan.Zeroaccess!inf - Page 2 EsetSmartInstall to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the Urgent Help with Trojan.Zeroaccess!inf - Page 2 EsetSmartInstallDesktopIcon-1 icon on your desktop.

•Check Urgent Help with Trojan.Zeroaccess!inf - Page 2 EsetAcceptTerms
•Click the Urgent Help with Trojan.Zeroaccess!inf - Page 2 EsetStart button.
•Accept any security warnings from your browser.
•Check Urgent Help with Trojan.Zeroaccess!inf - Page 2 EsetScanArchives
•Push the Start button.
•ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
•When the scan completes, push Urgent Help with Trojan.Zeroaccess!inf - Page 2 EsetListThreats
•Push Urgent Help with Trojan.Zeroaccess!inf - Page 2 EsetExport, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
•Push the Urgent Help with Trojan.Zeroaccess!inf - Page 2 EsetBack button.
•Push Urgent Help with Trojan.Zeroaccess!inf - Page 2 EsetFinish
A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
My computer looks fine and working very smooth right now.

Its only my Symantech is reporting threats from ComboFix quarantine folder.
I just finished 18 hour long ESET scan and nothing found in that scan.

Thank you so much for the help. Please let me know what steps needs to be done next. Also please provide your personal donation link in your next post.

Please suggest which is the most trusted Antivirus or Malware protection software/tool should I use to avoid this hassle in the future.

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
Its only my Symantech is reporting threats from ComboFix quarantine folder.
I just finished 18 hour long ESET scan and nothing found in that scan.

That's normal. We'll get rid of those right now.
Also please provide your personal donation link in your next post.

I don't have one but there could be one on this site.
Please suggest which is the most trusted Antivirus or Malware protection software/tool should I use to avoid this hassle in the future.

Below you will find a list of free AV's. I prefer MSE but everyone has different opinions. I like MSE because it's lite-weight, not a resource hog like some, no hassles installation and updates every day.

Remember to only install one antivirus!

1) Avast! Home Edition
2) AVG Free Edition
3) Avira AntiVir Personal
4) Microsoft Security Essentials for Windows Vista\Windows 7 - 64 bit Download
4-a) Microsoft Security Essentials for Windows XP
5) Comodo Antivirus (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" if you choose this one)
6) PC Tools AntiVirus Free Edition
7) ThreatFire

It is strongly recommended that you run only one antivirus program at a time. Having more than one antivirus program active in memory uses additional resources and can result in program conflicts and false virus alerts. If you choose to install more than one antivirus program on your computer, then only one of them should be active in memory at a time.
********************************************************
To uninstall ComboFix


  • Click the Start button. Click Run. For Vista: type in Run in the Start search, and click on Run in the results pane.
  • In the field, type in ComboFix /uninstall


Urgent Help with Trojan.Zeroaccess!inf - Page 2 Combofix_uninstall_image

(Note: Make sure there's a space between the word ComboFix and the forward-slash.)


  • Then, press Enter, or click OK.
  • This will uninstall ComboFix, delete its folders and files, hides System files and folders, and resets System Restore.

*************************************************
To remove all of the tools we used and the files and folders they created do the following:
Double click OTL.exe.

  • Click the CleanUp button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes.

Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.
*************************************************
Clean out your temporary internet files and temp files.

Download TFC by OldTimer to your desktop.

Double-click TFC.exe to run it.

Note: If you are running on Vista, right-click on the file and choose Run As Administrator

TFC will close all programs when run, so make sure you have saved all your work before you begin.

* Click the Start button to begin the cleaning process.
* Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two.
* Please let TFC run uninterrupted until it is finished.

Once TFC is finished it should restart your computer. If it does not, please manually restart the computer yourself to ensure a complete cleaning.
**************************************************
Looking over your log it seems you don't have any evidence of a third party firewall.

Firewalls protect against hackers and malicious intruders. You need to download a free firewall from one of these reliable vendors.

Remember only install ONE firewall

1) Comodo Personal Firewall (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage" and uncheck any HopSurf and/or Ask.com options if you choose this one)
2) Online Armor
3) Agnitum Outpost
4) PC Tools Firewall Plus

If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
***************************************************
Use the Secunia Software Inspector to check for out of date software.

•Click Start Now

•Check the box next to Enable thorough system inspection.

•Click Start

•Allow the scan to finish and scroll down to see if any updates are needed.
•Update anything listed.
.
----------

Go to Microsoft Windows Update and get all critical updates.

----------

I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
Safe Surfing!

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
Hi Dave,

I tried cleaning up using above steps but I can still see all the software: Mbam, sysprot, SuperAntiSpyware, SecurityCheck, TFC, aswMBR are still present at my desktop.

Also command "ComboFix /uninstall" didn't run for me. I tried all the combinations too.

There is also one more wired behavior at startup. I see 2 text files being open up every time my computer restarts.
Screen shot is attached:
https://i.servimg.com/u/f45/17/35/08/35/at_sta10.jpg

Let me know how can we fix it.

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
I tried cleaning up using above steps but I can still see all the software: Mbam, sysprot, SuperAntiSpyware, SecurityCheck, TFC, aswMBR are still present at my desktop.

You can uninstall/delete those programs.

Download this program and run it Uninstall ComboFix .It will remove ComboFix for you

*********************************************
To turn off Windows XP System Restore:

NOTE: These instructions assume that you are using the default Windows XP Start Menu and have not changed to the Classic Start menu. To re-enable the default menu, right-click Start, click Properties, click Start menu (not Classic) and then click OK.

1. Click Start.
2. Right-click the My Computer icon, and then click Properties.
3. Click the System Restore tab.
4. Check "Turn off System Restore" or "Turn off System Restore on all drives"
5. Click Apply.
6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
7. Click OK.
8. Restart the computer and follow the instructions in the next section to turn on System Restore.

To turn on Windows XP System Restore:

1. Click Start.
2. Right-click My Computer, and then click Properties.
3. Click the System Restore tab.
4. Uncheck "Turn off System Restore" or "Turn off System Restore on all drives."
5. Click Apply, and then click OK.
*************************************************
There is also one more wired behavior at startup. I see 2 text files being open up every time my computer restarts.

I've never seen this before. Is this the first time this has happened?

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
That started happening after I ran ComboFix for the first time long back. If I remember correctly my laptop got hang and I had to force reboot my laptop while combofix was in process to clean my laptop. And after that I see those 2 files open everytime my laptop reboots.

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
ComboFix is a very powerful program and should not be used without the guidance of a malware expert. I suspect that's what happened here and since it happened long ago, I wouldn't know how to fix it now. Those text files must have a name. Try running a search for them and delete them, if found.

descriptionUrgent Help with Trojan.Zeroaccess!inf - Page 2 EmptyRe: Urgent Help with Trojan.Zeroaccess!inf

more_horiz
privacy_tip Permissions in this forum:
You cannot reply to topics in this forum