Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Vundo I believe [CLOSED]


  • This topic is locked This topic is locked

#1
DougD720

DougD720

    New Member

  • Member
  • Pip
  • 5 posts
Hey Everyone, i know a few things about computers and viruses and such but i cannot seem to get rid of this Vundo, thats what i believe it to be. I've read a million threads about removing it after i hit it with everything i had. I've been trying to fix this (my dad's) computer for literally the last 5 or 6 hours to no avail, everytime i think i nail it it comes back. I thought the combofix took it out for good cause it wasn't showin up on my Spybot S&D anymore but then i ran Kaspersky just to be sure and its there its just called Trojan.Win32.Monderb.gen which i believe is still vundo. Vundofix says i dont have it when it scans, however Kaspersky does. I just want whatever it is gone so my dad can stop whining about the pop-ups. Thanks!

Anyways... Heres my HJT Log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 13:52, on 2008-07-12
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\McAfee\Common Framework\FrameworkService.exe
C:\Program Files\McAfee\VirusScan Enterprise\Mcshield.exe
C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\RunDLL32.exe
C:\WINDOWS\stsystra.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtMng.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosA2dp.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtHid.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtHsp.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\tosOBEX.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\tosBtProc.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\HP\Smart Web Printing\hpswp_clipbook.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
D:\Virus Removal Tools\HiJackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft....k/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft....k/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft....k/?LinkId=54896
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [NVHotkey] rundll32.exe nvHotkey.dll,Start
O4 - HKLM\..\Run: [NvMediaCenter] RunDLL32.exe NvMCTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [SigmatelSysTrayApp] stsystra.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKLM\..\Run: [90ad3fa1] rundll32.exe "C:\WINDOWS\system32\bnctrnti.dll",b
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - Global Startup: Bluetooth Manager.lnk = ?
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: HP Clipbook - {58ECB495-38F0-49cb-A538-10282ABF65E7} - C:\Program Files\HP\Smart Web Printing\hpswp_extensions.dll
O9 - Extra button: HP Smart Select - {700259D7-1666-479a-93B1-3250410481E8} - C:\Program Files\HP\Smart Web Printing\hpswp_extensions.dll
O9 - Extra button: Skype - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://go.microsoft....k/?linkid=58813
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.mi...b?1193110351921
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.mi...b?1205670075468
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0) - http://dl8-cdn-01.su...ows-i586-jc.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = Cir-Q-Tek.net
O17 - HKLM\Software\..\Telephony: DomainName = Cir-Q-Tek.net
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = Cir-Q-Tek.net
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = Cir-Q-Tek.net
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: McAfee Framework Service (McAfeeFramework) - McAfee, Inc. - C:\Program Files\McAfee\Common Framework\FrameworkService.exe
O23 - Service: McAfee McShield (McShield) - McAfee, Inc. - C:\Program Files\McAfee\VirusScan Enterprise\Mcshield.exe
O23 - Service: McAfee Task Manager (McTaskManager) - McAfee, Inc. - C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE

--
End of file - 7321 bytes
  • 0

Advertisements


#2
DougD720

DougD720

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
PS I'm really sorry for this going up three times, i clicked post and a pop up appeared and nothing happened so i waited a minute and clicked it again and the same thing, then i clicked preview then post and it worked so i humbly apologize for the duplicate succession of posts.
  • 0

#3
Mike

Mike

    Malware Monger

  • Retired Staff
  • 2,745 posts
Hi there,

Before running a new scan let's clean out the temporary folders.

Download ATF Cleaner to your Desktop.

  • Double-click ATF-Cleaner.exe to run the program.
  • Click Select All found at the bottom of the list.
  • Click the Empty Selected button.
If you use Firefox browser, do this also:
  • Click Firefox at the top and choose Select All from the list.
  • Click the Empty Selected button.
  • NOTE : If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser, do this also:
  • Click Opera at the top and choose Select All from the list.
  • Close ALL Internet browsers (very important).
  • Click the Empty Selected button.
  • NOTE : If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.

Now download OTScanIt.exe to your Desktop and double-click on it to extract the files. It will create a folder named OTScanIt on your desktop.

Note: You must be logged on to the system with an account that has Administrator privileges to run this program.
  • Close ALL OTHER PROGRAMS.
  • Open the OTScanIt folder and double-click on OTScanIt.exe to start the program (if you are running on Vista then right-click the program and choose Run as Administrator).
  • In the Drivers section click on Non-Microsoft.
  • Under Additional Scans click the checkboxes in front of the following items to select them:
    • Reg - BotCheck
      File - Additional Folder Scans
  • Do not change any other settings.
  • Now click the Run Scan button on the toolbar.
  • Let it run unhindered until it finishes.
  • When the scan is complete Notepad will open with the report file loaded in it.
  • Click the Format menu and make sure that Wordwrap is not checked. If it is then click on it to uncheck it.
Use the Add Reply button and attach the file in your next post (do not try to copy/paste it into the post).
  • 0

#4
DougD720

DougD720

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
Scan Results are Attached. Thank you!

Attached Files


  • 0

#5
Mike

Mike

    Malware Monger

  • Retired Staff
  • 2,745 posts
Hi there,

Start OTScanIt. Copy/Paste the information in the Code box below into the pane where it says "Paste fix here" and then click the Run Fix button.


[Kill Explorer]
[Unregister Dlls]
[Registry - Non-Microsoft Only]
< Run [HKEY_LOCAL_MACHINE\] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
YY -> 90ad3fa1 -> %SystemRoot%\system32\bnctrnti.dll [rundll32.exe "C:\WINDOWS\system32\bnctrnti.dll",b]
< ShellExecuteHooks [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks
YY -> {684BFE7F-F5B2-4AB3-A95E-EB5036A2D286} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\nnnoNEuS.dll []
< Winlogon\Notify settings [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\
YY -> nnnoNEuS -> %SystemRoot%\system32\nnnoNEuS.dll
< Trusted Sites Domains [HKEY_LOCAL_MACHINE\] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\
YN -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\ -> [Key] 4623 domain(s) found.
YN -> 41 domain(s) and sub-domain(s) not assigned to a zone. -> 
< Trusted Sites Ranges [HKEY_LOCAL_MACHINE\] > -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\
YN -> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\ -> [Key] 77 range(s) found.
< Trusted Sites Domains [HKEY_CURRENT_USER\] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\
YN -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\ -> [Key] 4622 domain(s) found.
YN -> 40 domain(s) and sub-domain(s) not assigned to a zone. -> 
< Trusted Sites Ranges [HKEY_CURRENT_USER\] > -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\
YN -> HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges\ -> [Key] 77 range(s) found.
< BHO's [HKEY_LOCAL_MACHINE] > -> HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
YY -> {684BFE7F-F5B2-4AB3-A95E-EB5036A2D286} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\nnnoNEuS.dll [Reg Error: Value  does not exist or could not be read.]
YY -> {92afd67c-6f44-4cf1-b18b-0cade79a8e24} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\ugsrln.dll [Reg Error: Value  does not exist or could not be read.]
YY -> {A8D7398E-E5CD-41F9-ADEA-762DB8FFB738} [HKEY_LOCAL_MACHINE] -> %SystemRoot%\system32\fccyxxVO.dll [Reg Error: Value  does not exist or could not be read.]
YN -> {A91F755D-7803-48D7-B3A5-4304E9F4FA38} [HKEY_LOCAL_MACHINE] -> Reg Error: Key does not exist or could not be opened. [Reg Error: Key does not exist or could not be opened.]
YN -> {fe6bfc4d-ef77-4e49-bdfb-21a8808c84b1} [HKEY_LOCAL_MACHINE] -> Reg Error: Key does not exist or could not be opened. [Reg Error: Key does not exist or could not be opened.]
[Registry - Additional Scans - Non-Microsoft Only]
< BotCheck > -> 
*Authentication Packages* -> HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\\Authentication Packages
YY -> C:\WINDOWS\system32\fccyxxVO -> %SystemRoot%\system32\fccyxxVO.dll
< BotCheck > -> 
[Files/Folders - Created Within 30 days]
NY -> bnctrnti.dll -> %SystemRoot%\System32\bnctrnti.dll
NY -> ceexqo.dll -> %SystemRoot%\System32\ceexqo.dll
NY -> ckrcrn.dll -> %SystemRoot%\System32\ckrcrn.dll
NY -> cvgwxxyp.dll -> %SystemRoot%\System32\cvgwxxyp.dll
NY -> fccyxxVO.dll -> %SystemRoot%\System32\fccyxxVO.dll
NY -> fmvohayy.dll -> %SystemRoot%\System32\fmvohayy.dll
NY -> htmrbglb.dll -> %SystemRoot%\System32\htmrbglb.dll
NY -> itnrtcnb.ini -> %SystemRoot%\System32\itnrtcnb.ini
NY -> ligzps.dll -> %SystemRoot%\System32\ligzps.dll
NY -> nnnoNEuS.dll -> %SystemRoot%\System32\nnnoNEuS.dll
NY -> okvbcdct.dll -> %SystemRoot%\System32\okvbcdct.dll
NY -> opnkkLEX.dll -> %SystemRoot%\System32\opnkkLEX.dll
NY -> pmnoPIcA.dll -> %SystemRoot%\System32\pmnoPIcA.dll
NY -> rijmwm.dll -> %SystemRoot%\System32\rijmwm.dll
NY -> sdxpct.dll -> %SystemRoot%\System32\sdxpct.dll
NY -> tmp.reg -> %SystemRoot%\System32\tmp.reg
NY -> tufekjob.dll -> %SystemRoot%\System32\tufekjob.dll
NY -> ugsrln.dll -> %SystemRoot%\System32\ugsrln.dll
NY -> vtUoLbxx.dll -> %SystemRoot%\System32\vtUoLbxx.dll
NY -> wiqryqwo.dll -> %SystemRoot%\System32\wiqryqwo.dll
NY -> wnfnqwfk.dll -> %SystemRoot%\System32\wnfnqwfk.dll
NY -> ysdfyh.dll -> %SystemRoot%\System32\ysdfyh.dll
NY -> 5 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp
[Files Created - Additional Folder Scans - Non-Microsoft Only]
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\05500439eco011336.zip:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\05900798 799 800 opt.zip:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\microresearch.pdf:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\Production_status andy 0702.xls:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\Quote_on_June_11th,_2008.doc:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\renewlargepotentialopportunity.zip:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\Desktop\OTScanIt.exe:Zone.Identifier
[Files/Folders - Modified Within 30 days]
NY -> bnctrnti.dll -> %SystemRoot%\System32\bnctrnti.dll
NY -> 1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp
NY -> ceexqo.dll -> %SystemRoot%\System32\ceexqo.dll
NY -> ckrcrn.dll -> %SystemRoot%\System32\ckrcrn.dll
NY -> cvgwxxyp.dll -> %SystemRoot%\System32\cvgwxxyp.dll
NY -> fccyxxVO.dll -> %SystemRoot%\System32\fccyxxVO.dll
NY -> fmvohayy.dll -> %SystemRoot%\System32\fmvohayy.dll
NY -> htmrbglb.dll -> %SystemRoot%\System32\htmrbglb.dll
NY -> itnrtcnb.ini -> %SystemRoot%\System32\itnrtcnb.ini
NY -> ligzps.dll -> %SystemRoot%\System32\ligzps.dll
NY -> nnnoNEuS.dll -> %SystemRoot%\System32\nnnoNEuS.dll
NY -> okvbcdct.dll -> %SystemRoot%\System32\okvbcdct.dll
NY -> opnkkLEX.dll -> %SystemRoot%\System32\opnkkLEX.dll
NY -> OVxxyccf.ini -> %SystemRoot%\System32\OVxxyccf.ini
NY -> OVxxyccf.ini2 -> %SystemRoot%\System32\OVxxyccf.ini2
NY -> pmnoPIcA.dll -> %SystemRoot%\System32\pmnoPIcA.dll
NY -> rijmwm.dll -> %SystemRoot%\System32\rijmwm.dll
NY -> sdxpct.dll -> %SystemRoot%\System32\sdxpct.dll
NY -> tufekjob.dll -> %SystemRoot%\System32\tufekjob.dll
NY -> ugsrln.dll -> %SystemRoot%\System32\ugsrln.dll
NY -> vtUoLbxx.dll -> %SystemRoot%\System32\vtUoLbxx.dll
NY -> wiqryqwo.dll -> %SystemRoot%\System32\wiqryqwo.dll
NY -> wnfnqwfk.dll -> %SystemRoot%\System32\wnfnqwfk.dll
NY -> ysdfyh.dll -> %SystemRoot%\System32\ysdfyh.dll
NY -> 5 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp
[Files Modified - Additional Folder Scans - Non-Microsoft Only]
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\05500439eco011336.zip:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\05900798 799 800 opt.zip:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\microresearch.pdf:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\Production_status andy 0702.xls:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\Quote_on_June_11th,_2008.doc:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\My Documents\TNT STOCK STATUS.xls:Zone.Identifier
NY -> @Alternate Data Stream - 26 bytes -> %UserProfile%\Desktop\OTScanIt.exe:Zone.Identifier
[Empty Temp Folders]
[Start Explorer]


The fix should only take a very short time. When the fix is completed a message box will popup telling you that it is finished. CLick the Ok button and Notepad will open with a log of actions taken during the fix. Post that information back here.

I will review the information when it comes back in.

Also let me know of any problems you encountered performing the steps above or any continuing problems you are still having with the computer.

Now,

Please download Malwarebytes' Anti-Malware from Here or Here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Then,

Please download Deckard's System Scanner (DSS) and save it to your Desktop.
  • Close all other windows before proceeding.
  • Double-click on dss.exe and follow the prompts.
  • When it has finished, dss will open two Notepads main.txt and extra.txt -- please copy (CTRL+A and then CTRL+C) and paste (CTRL+V) the contents of main.txt and extra.txt in your next reply.
Note:These logs may be too large to post in one reply, if so, please post extra.txt in a seperate reply.

Edited by Mike, 13 July 2008 - 06:43 AM.

  • 0

#6
Mike

Mike

    Malware Monger

  • Retired Staff
  • 2,745 posts
Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please contact a staff member. This applies only to the original topic starter. Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP