WiredWX Christian Hobby Weather Tools
Would you like to react to this message? Create an account in a few clicks or log in to continue.

WiredWX Christian Hobby Weather ToolsLog in

 


Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

2 posters

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
Next log from TDSSKiller please.

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
TDSS Log zip file

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
We may have to work in the Recovery Environment if this doesn't work...

Please download Hitman Pro by Surfright from here and save it to your desktop.
  • Double click HitmanPro36.exe to run the scanner
  • Click Next
  • Accept the license conditions and click Next
  • Choose to do only a single scan. Do not enter any e-mail address and click Next
  • Hitman Pro will now scan your computer
  • After the scan, choose to ignore all threats - I want to have a look first, before deciding what to do
  • Click Next
  • You will now find an option to export the results of the scan to an XML file (log.xml). Please do so. Close Hitman Pro.
  • Please copy and paste the contents of log.xml into your next reply (You can open XML files with notepad)

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
It only came up with tracking cookies. No threats. When I clicked NEXT, it deleted the tracking cookies. Log is posted below.

Code:


HitmanPro 3.6.1.164
www.hitmanpro.com

  Computer name . . . . : USER-PC
  Windows . . . . . . . : 6.1.1.7601.X64/2
  User name . . . . . . : user-PC\user
  UAC . . . . . . . . . : Disabled
  License . . . . . . . : Free

  Scan date . . . . . . : 2012-09-06 17:31:15
  Scan mode . . . . . . : Normal
  Scan duration . . . . : 9m 21s
  Disk access mode  . . : Direct disk access (SRB)
  Cloud . . . . . . . . : Internet
  Reboot  . . . . . . . : No

  Threats . . . . . . . : 0
  Traces  . . . . . . . : 139

  Objects scanned . . . : 2,055,609
  Files scanned . . . . : 91,633
  Remnants scanned  . . : 668,203 files / 1,295,773 keys

Cookies _____________________________________________________________________

  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.wsod.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.yieldmanager.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:adbrite.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:adinterax.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.bridgetrack.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.lycos.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.lzjl.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.pointroll.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.undertone.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:adserver.adtechus.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:advertising.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:adviva.net
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:apmebf.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:at.atwola.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:atdmt.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:c.atdmt.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:casalemedia.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:citi.bridgetrack.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:clicksor.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:collective-media.net
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:doubleclick.net
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:fastclick.net
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:googleads.g.doubleclick.net
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:interclick.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:invitemedia.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:kontera.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:media6degrees.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:mediaplex.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:mm.chitika.net
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:pointroll.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:questionmarket.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:revsci.net
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:ru4.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:specificclick.net
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:statcounter.com
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:yieldmanager.net
  C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies:zedo.com
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\02UFQNEJ.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\04AH2UTM.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\04MKSI2J.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\04Z6FUEK.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\0H0OICUG.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\0KNL2RHS.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\17214AX5.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\2XG7X0HP.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\3AN91589.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\3CA62A86.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\3T1337LX.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\44JE4VLA.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\4SE63KNT.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\4Y5BVXE0.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\51VZH8WN.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\53AQ1QD5.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\58DI2IXQ.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\5D9LCY6O.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\79IGX62T.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\7CKH4QXK.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\7CS8U9QF.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\83BYGM4T.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\8OTNCQ54.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\9LBST4LA.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\9O3MY79U.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\A4EZZ1Z5.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\B4EGMC8M.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\C02XJ2J7.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\C1XREQTM.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\CBC9QBK7.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\DA3FYRGY.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\EGAYE9MQ.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\ELO04NXA.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\F6OLEX2I.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\FVRJV4OR.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\G5L8WGCQ.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\GA703PIJ.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\GBUAN5VV.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\GGEIXG1Z.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\GGKUCBYR.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\GGLAXOKQ.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\GO06QQ7U.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\HWQUQPF1.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\I2JB4K7M.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\IC02W8S4.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\IFVKK977.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\K75MJGVR.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\KAK4NBX8.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\KWQH3W71.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\L3NI17JY.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\NWKO15DC.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\NY94682I.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\OPM6H2BC.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\OT5QNEAV.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\OVY1OLD0.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\PUBG8S1V.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\RETKD4KD.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\RGD99UAX.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\RJW8I7KN.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\RM5E7SX7.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\S77SLTB0.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\SUAXA630.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\T0CHT0MK.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\TCD37ZWP.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\U3UVHKFY.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\U9L8JU0Z.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\UID4X11Z.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\VBK6U86B.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\VEI21VTJ.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\VG3DDHCW.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\W4VNR100.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\WEY4F60V.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\WEYAPLZR.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\XQ96YJWE.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Y9VQ6D2S.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\YAEHVKVS.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\YCKC2ZN0.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\YLRQ74GL.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\ZRWXJTJX.txt
  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\ZZYEXCT3.txt
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:ad.vuiads.org
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:ad.wsod.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:adinterax.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:ads.lzjl.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:adtechus.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:apmebf.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:clicksor.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:collective-media.net
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:crossexamine.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:doubleclick.net
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:eas.apm.emediate.eu
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:emjcd.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:in.getclicky.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:interclick.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:invitemedia.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:mediaplex.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:mm.chitika.net
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:pluckit.demandmedia.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:pointroll.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:static.freewebs.getclicky.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:stats.paypal.com
  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\14vvhgwh.default\cookies.sqlite:www.emjcd.com



descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
Please find the file MBR.dat on your Desktop and upload it here please.

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
The discussion board said it was the wrong file type and would not allow me to upload the mbr.dat file, so I had to zip it to upload it.

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
That's fine.

The MBR is verified clean!

How is the computer running overall?

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
Overall, the computer seems to be operating pretty good. Fast boot-up and it seems the winrscdme process that was keeping the CPU at high usage is taken care of.

The only issue I've seen over the last couple of days is that the touchpad seems to have a mind of its own. It is like it is trying to take control of the computer-opening and closing things at random, highlighting text and moving it and such.

I had to use the touchpad button on the computer to turn the touchpad off just to be able to type this.

I haven't run the Malwarebytes anti-malware to see if it finds any thing.

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
The touchpad problem might just be a driver problem. Reinstalling the driver should help to resolve things.

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
That seems to have taken care of it.
Thank you for all your help.
rlslagle

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
You're welcome. Now, time to finish up, so I can make sure your computer is fully secure. Smile...

Clean up System Restore

Now, to get you off to a clean start, we will be creating a new Restore Point, then clearing the old ones to make sure you do not get reinfected, in case you need to "restore back."

To manually create a new Restore Point

  • Go to Control Panel and select System and Maintenance
  • Select System
  • On the left select Advance System Settings and accept the warning if you get one
  • Select System Protection Tab
  • Select Create at the bottom
  • Type in a name i.e. Clean
  • Select Create
Now we can purge the infected ones
  • Go back to the System and Maintenance page
  • Select Performance Information and Tools
  • On the left select Open Disk Cleanup
  • Select Files from all users and accept the warning if you get one
  • In the drop down box select your main drive i.e. C
  • For a few moments the system will make some calculations:
    Malware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 Diskcleanup1
  • Select the More Options tab
    Malware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 Moreoptions
  • In the System Restore and Shadow Backups select Clean up
    Malware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 Moreoptions2
  • Select Delete on the pop up
  • Select OK
  • Select Delete


Run OTC to remove our tools

To remove all of the tools we used and the files and folders they created, please do the following:
Please download OTC.exe by OldTimer:
  • Save it to your Desktop.
  • Double click OTC.exe.
  • Click the CleanUp! button.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes.

Note: If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.

Purge old temporary files

Download CCleaner Slim and save it to your Desktop - Alternate download link

When the file has been saved, go to your Desktop and double-click on ccsetupxxx_slim.exe
Follow the prompts to install the program.

* Double-click the CCleaner shortcut on the desktop to start the program.
* Click on the Options block on the left, then choose Cookies.
* Under Cookies to Delete, highlight any cookies you would like to retain permanently
* Click the right arrow > to move them to the Cookies to Keep window.
* Go into Options > Advanced & uncheck Only delete files in Windows Temp folders older than 48 hours
* Click Cleaner on the left then Run Cleaner on the right to run the program.
* Important: Make sure that ALL browser windows are closed before selecting Run Cleaner

Caution: Only use the Registry feature if you are very familiar with the registry.
Always back up your registry before making any changes. Exit CCleaner after it has completed it's process.

Security Check

Please download Security Check by screen317 from SpywareInfoforum.org or Changelog.fr.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
Results of screen317's Security Check version 0.99.50
Windows 7 Service Pack 1 x64 (UAC is disabled!)
Internet Explorer 9
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
Norton Internet Security
WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
Java(TM) 6 Update 29
Java(TM) 6 Update 18
Java version out of Date!
Adobe Flash Player 11.3.300.271 Flash Player out of Date!
Adobe Reader X 10.1.2 Adobe Reader out of Date!
Mozilla Firefox 12.0 Firefox out of Date!
Google Chrome 21.0.1180.83
Google Chrome 21.0.1180.89
````````Process Check: objlist.exe by Laurent````````
Norton ccSvcHst.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C: 2%
````````````````````End of Log``````````````````````

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
Adobe Reader Update!

Please download the newest version of Adobe Acrobat Reader from Adobe.com

Before installing: it is important to remove older versions of Acrobat Reader since it does not do so automatically and old versions still leave you vulnerable.
Go to the Control Panel and enter Add or Remove Programs (Programs and Features in Vista/7).
Search in the list for all previous installed versions of Adobe Acrobat Reader. Uninstall/Remove each of them.

Once old versions are gone, please install the newest version.

Java Update!

Please download the newest version of Java from Java.com.

Before installing: it is important to remove older versions of Java since it does not do so automatically and old versions still leave you vulnerable.
Go to the Control Panel and enter Add or Remove Programs (Programs and Features in Vista/7).
Search in the list for all previous installed versions of Java. (J2SE Runtime Environment). Please uninstall/remove each of them.

Once old versions are gone, please install the newest version.

Read more about Java exploit problems

Adobe Flash Player Update!

Please download the newest version of Adobe Flash Player from Adobe.com

Before installing: it is important to remove older versions of Flash Player since it does not do so automatically and old versions still leave you vulnerable.
Go to the Control Panel and enter Add or Remove Programs (Programs and Features in Vista/7).
Search in the list for all previous installed versions of Adobe Flash Player. Uninstall/Remove each of them.

Once old versions are gone, please install the newest version.

Firefox update
Firefox is out of date. Firefox is a very popular web browser, and if it is out of date, it is very vulnerable to security bugs, and other holes. To update it now, click Help > About Firefox > Check for Updates.


Personal Tips on Preventing Malware

See this page for more info about malware and prevention.

Any other questions before I mark this topic solved?

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
You have helped a lot.
Thank you.
I have no further questions.
rlslagle

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
Marked as such. You're welcome! √

descriptionMalware:  winrscmde/Trojan.agent/Trojan:DOS/Alurean.A - Page 2 EmptyRe: Malware: winrscmde/Trojan.agent/Trojan:DOS/Alurean.A

more_horiz
privacy_tip Permissions in this forum:
You cannot reply to topics in this forum