Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

Backdoor Trojan: please help!


  • Please log in to reply

#16
RKinner

RKinner

    Malware Expert

  • Expert
  • 24,625 posts
  • MVP
No problem with ESET in Firefox. It just tends to be a bit easier in IE. The only thing it found was some malware that Combofix had already removed. C:\qoobox is where it puts the malware in case we want it back.

Are you still getting indications of an infection from Kaspersky?

Does it tell you a name or a file?
  • 0

Advertisements


#17
Guitarrulz

Guitarrulz

    Member

  • Topic Starter
  • Member
  • PipPip
  • 10 posts
Here is what Kaspersky is showing. You will know better than me but it may mean total threats detected and not necessarily what my current computer is infected with. At the top of the image it does say that my computer is currently protected which was red when I know I had a virus. Thanks!

Posted Image
  • 0

#18
RKinner

RKinner

    Malware Expert

  • Expert
  • 24,625 posts
  • MVP
I think it is a running total but I'm not an expert on Kaspersky.

Click on the Scan My Computer button and have it do a full scan. There should be a log or report when it finishes. I see a Report button at the top. What happens when you click on it?
  • 0

#19
Guitarrulz

Guitarrulz

    Member

  • Topic Starter
  • Member
  • PipPip
  • 10 posts
Ron, sorry for the delay. The report button shows current threats as well as past threats that have been removed. Its all encompassing. Currently under "Active" threats it is showing none. Thanks!

Kaspersky Log

Rootkit Scan: completed 23 days ago (events: 2, objects: 10597, time: 00:12:48)
3/9/2012 2:33:18 PM Task completed
3/9/2012 2:20:30 PM Task started
Disinfect active threats: completed 6 days ago (events: 4, objects: 3667, time: 00:00:20)
3/26/2012 4:22:59 AM Task completed
3/26/2012 4:22:43 AM Deleted: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\temp\U\80000004.@
3/26/2012 4:22:40 AM Detected: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\temp\U\80000004.@
3/26/2012 4:22:39 AM Task started
Rootkit Scan: malfunction (events: 2, objects: 0, time: 31783 days 00:03:38)
3/26/2012 4:57:26 AM Detected: HEUR:Backdoor.Win64.Generic C:\Windows\System32\consrv.dll
3/26/2012 4:54:46 AM Task started
Disinfect active threats: completed 6 days ago (events: 4, objects: 3614, time: 00:00:16)
3/26/2012 7:36:18 AM Task completed
3/26/2012 7:36:06 AM Will be deleted on system restart: Backdoor.Win32.ZAccess.aug C:\Windows\assembly\GAC_32\Desktop.ini
3/26/2012 7:36:02 AM Detected: Backdoor.Win32.ZAccess.aug C:\Windows\assembly\GAC_32\Desktop.ini
3/26/2012 7:36:02 AM Task started
Full Scan: stopped 6 days ago (events: 8, objects: 4034, time: 00:00:43)
3/26/2012 7:39:25 AM Task stopped
3/26/2012 7:39:15 AM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\_avt Logged
3/26/2012 7:39:09 AM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\DragWait.exe Logged
3/26/2012 7:39:08 AM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\DB\WAL.db Logged
3/26/2012 7:39:08 AM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\DB\VL.db Logged
3/26/2012 7:39:08 AM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\DB\UL.db Logged
3/26/2012 7:39:08 AM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\DB\SI.db Logged
3/26/2012 7:38:42 AM Task started
Quick Scan: completed 6 days ago (events: 2, objects: 3687, time: 00:00:20)
3/26/2012 7:39:27 AM Task completed
3/26/2012 7:39:07 AM Task started
Rootkit Scan: completed 6 days ago (events: 20, objects: 2143, time: 00:26:00)
3/26/2012 9:24:10 AM Task completed
3/26/2012 9:23:59 AM Will be deleted on system restart: Backdoor.Win32.ZAccess.cjj C:\Windows\assembly\temp\U\80000032.@
3/26/2012 9:23:59 AM Cannot be deleted: Backdoor.Win32.ZAccess.cjj C:\Windows\assembly\temp\U\80000032.@
3/26/2012 9:23:53 AM Detected: Backdoor.Win32.ZAccess.cjj C:\Windows\assembly\temp\U\80000032.@
3/26/2012 9:23:53 AM Will be deleted on system restart: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\temp\U\80000004.@
3/26/2012 9:23:53 AM Cannot be deleted: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\temp\U\80000004.@
3/26/2012 9:15:29 AM Detected: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\temp\U\80000004.@
3/26/2012 9:15:29 AM Will be deleted on system restart: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\temp\U\80000000.@
3/26/2012 9:15:29 AM Cannot be deleted: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\temp\U\80000000.@
3/26/2012 9:14:48 AM Detected: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\temp\U\80000000.@
3/26/2012 9:13:47 AM Will be deleted on system restart: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\GAC_64\Desktop.ini
3/26/2012 9:13:36 AM Detected: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\GAC_64\Desktop.ini
3/26/2012 9:13:25 AM Will be deleted on system restart: Backdoor.Win32.ZAccess.aug C:\Windows\assembly\GAC_32\Desktop.ini
3/26/2012 9:12:53 AM Detected: Backdoor.Win32.ZAccess.aug C:\Windows\assembly\GAC_32\Desktop.ini
3/26/2012 9:04:12 AM Will be deleted on system restart: HEUR:Backdoor.Win64.Generic C:\Windows\System32\consrv.dll
3/26/2012 9:04:11 AM Cannot be deleted: HEUR:Backdoor.Win64.Generic C:\Windows\System32\consrv.dll
3/26/2012 9:03:48 AM Detected: HEUR:Backdoor.Win64.Generic C:\Windows\System32\consrv.dll
3/26/2012 8:59:26 AM Will be deleted on system restart: Backdoor.Win64.ZAccess.bh C:\Windows\System32\fontcache3.0.0.0.dll
3/26/2012 8:58:38 AM Detected: Backdoor.Win64.ZAccess.bh C:\Windows\System32\fontcache3.0.0.0.dll
3/26/2012 8:58:10 AM Task started
Full Scan: stopped 6 days ago (events: 12, objects: 48291, time: 00:05:09)
3/26/2012 10:09:36 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\_avt Logged
3/26/2012 10:09:34 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DragWait.exe Logged
3/26/2012 10:09:33 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\WAL.db Logged
3/26/2012 10:09:33 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\VL.db Logged
3/26/2012 10:09:33 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\UL.db Logged
3/26/2012 10:09:33 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\SI.db Logged
3/26/2012 10:09:09 AM Will be deleted on system restart: Backdoor.Win64.ZAccess.bh c:\windows\system32\fontcache3.0.0.0.dll
3/26/2012 10:08:58 AM Detected: Backdoor.Win64.ZAccess.bh c:\windows\system32\fontcache3.0.0.0.dll
3/26/2012 10:08:53 AM Task started
3/26/2012 9:24:48 AM Task stopped
3/26/2012 9:24:27 AM Detected: Backdoor.Win64.ZAccess.bh C:\Windows\System32\fontcache3.0.0.0.dll
3/26/2012 9:24:21 AM Task started
Disinfect active threats: completed 6 days ago (events: 4, objects: 3652, time: 00:00:16)
3/26/2012 9:25:04 AM Task completed
3/26/2012 9:24:52 AM Will be deleted on system restart: Backdoor.Win64.ZAccess.bh C:\Windows\System32\fontcache3.0.0.0.dll
3/26/2012 9:24:49 AM Detected: Backdoor.Win64.ZAccess.bh C:\Windows\System32\fontcache3.0.0.0.dll
3/26/2012 9:24:48 AM Task started
Disinfect active threats: completed 6 days ago (events: 5, objects: 3974, time: 00:00:16)
3/26/2012 9:37:37 AM Task completed
3/26/2012 9:37:27 AM Detected: Backdoor.Win64.ZAccess.bh C:\Windows\System32\fontcache3.0.0.0.dll
3/26/2012 9:37:26 AM Will be deleted on system restart: Backdoor.Win64.ZAccess.bh C:\Windows\System32\fontcache3.0.0.0.dll
3/26/2012 9:37:21 AM Detected: Backdoor.Win64.ZAccess.bh C:\Windows\System32\fontcache3.0.0.0.dll
3/26/2012 9:37:21 AM Task started
Rootkit Scan: stopped 5 days ago (events: 4, objects: 110, time: 00:39:58)
3/26/2012 4:03:18 PM Task stopped
3/26/2012 4:03:17 PM Cannot be backed up: Backdoor.Win64.ZAccess.bh c:\windows\system32\rpsupdaterr.dll
3/26/2012 3:24:05 PM Detected: Backdoor.Win64.ZAccess.bh c:\windows\system32\rpsupdaterr.dll
3/26/2012 3:23:20 PM Task started
Rootkit Scan: malfunction (events: 2, objects: 0, time: 31782 days 00:07:24)
3/27/2012 4:51:54 AM Detected: Backdoor.Win64.ZAccess.bh c:\windows\system32\rpsupdaterr.dll
3/27/2012 4:51:00 AM Task started
Disinfect active threats: completed 5 days ago (events: 4, objects: 3587, time: 00:00:17)
3/27/2012 5:03:25 AM Task completed
3/27/2012 5:03:12 AM Deleted: HEUR:Backdoor.Win64.Generic c:\windows\assembly\temp\U\80000000.@
3/27/2012 5:03:08 AM Detected: HEUR:Backdoor.Win64.Generic c:\windows\assembly\temp\U\80000000.@
3/27/2012 5:03:08 AM Task started
Full Scan: stopped 4 days ago (events: 3, objects: 998, time: 00:03:38)
3/27/2012 6:53:59 PM Task stopped
3/27/2012 6:50:38 PM Detected: Backdoor.Win64.ZAccess.bh c:\Windows\System32\rpsupdaterr.dll
3/27/2012 6:50:21 PM Task started
Disinfect active threats: completed 4 days ago (events: 4, objects: 1007, time: 00:00:12)
3/27/2012 6:54:11 PM Task completed
3/27/2012 6:54:01 PM Deleted: Backdoor.Win64.ZAccess.bh c:\Windows\System32\rpsupdaterr.dll
3/27/2012 6:53:59 PM Detected: Backdoor.Win64.ZAccess.bh c:\Windows\System32\rpsupdaterr.dll
3/27/2012 6:53:59 PM Task started
Disinfect active threats: completed 4 days ago (events: 4, objects: 3982, time: 00:00:24)
3/27/2012 8:34:21 PM Task completed
3/27/2012 8:34:02 PM Will be deleted on system restart: Backdoor.Win64.ZAccess.bh c:\Windows\System32\wanarp.dll
3/27/2012 8:33:58 PM Detected: Backdoor.Win64.ZAccess.bh c:\Windows\System32\wanarp.dll
3/27/2012 8:33:57 PM Task started
Full Scan: stopped 4 days ago (events: 2, objects: 1, time: 00:00:10)
3/28/2012 9:00:02 AM Task stopped
3/28/2012 8:59:52 AM Task started
Quick Scan: completed 4 days ago (events: 2, objects: 791, time: 00:00:23)
3/28/2012 9:00:34 AM Task completed
3/28/2012 9:00:11 AM Task started
Full Scan: stopped 4 days ago (events: 11, objects: 46990, time: 00:16:10)
3/28/2012 9:46:20 AM Task stopped
3/28/2012 9:46:20 AM Processing error c:\Documents and Settings\Guitarrulz\Desktop\New folder\GTAIV\data2.cab Read error
3/28/2012 9:33:18 AM Deleted: Exploit.Java.CVE-2011-3544.nm c:\Documents and Settings\Guitarrulz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\19375e9b-595be597/ub.class
3/28/2012 9:33:17 AM Detected: Exploit.Java.CVE-2011-3544.nm c:\Documents and Settings\Guitarrulz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\19375e9b-595be597/ub.class
3/28/2012 9:30:34 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\_avt Logged
3/28/2012 9:30:32 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DragWait.exe Logged
3/28/2012 9:30:32 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\WAL.db Logged
3/28/2012 9:30:32 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\VL.db Logged
3/28/2012 9:30:32 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\UL.db Logged
3/28/2012 9:30:31 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\SI.db Logged
3/28/2012 9:30:10 AM Task started
Full Scan: completed 3 days ago (events: 18, objects: 785023, time: 06:27:40)
3/28/2012 4:14:01 PM Task completed
3/28/2012 2:57:57 PM Cannot be deleted: HEUR:Backdoor.Win64.Generic c:\Windows\system64\consrv.dll
3/28/2012 2:57:29 PM Deleted: Backdoor.Win64.ZAccess.bh c:\Windows\System32\epfwtdi.dll
3/28/2012 2:57:28 PM Deleted: HEUR:Backdoor.Win64.Generic c:\Windows\System32\consrv.dll
3/28/2012 11:48:19 AM Detected: HEUR:Backdoor.Win64.Generic c:\Windows\system64\consrv.dll
3/28/2012 11:42:44 AM Detected: Backdoor.Win64.ZAccess.bh c:\Windows\System32\epfwtdi.dll
3/28/2012 11:42:40 AM Detected: HEUR:Backdoor.Win64.Generic c:\Windows\System32\consrv.dll
3/28/2012 11:37:25 AM Deleted: HEUR:Backdoor.Win64.Generic c:\Windows\assembly\temp\U\80000000.@
3/28/2012 11:37:25 AM Deleted: HEUR:Backdoor.Win64.Generic c:\Windows\assembly\temp\U\80000004.@
3/28/2012 11:36:35 AM Detected: HEUR:Backdoor.Win64.Generic c:\Windows\assembly\temp\U\80000000.@
3/28/2012 11:36:31 AM Detected: HEUR:Backdoor.Win64.Generic c:\Windows\assembly\temp\U\80000004.@
3/28/2012 9:46:57 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\_avt Logged
3/28/2012 9:46:56 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DragWait.exe Logged
3/28/2012 9:46:56 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\WAL.db Logged
3/28/2012 9:46:56 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\VL.db Logged
3/28/2012 9:46:56 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\UL.db Logged
3/28/2012 9:46:56 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\SI.db Logged
3/28/2012 9:46:21 AM Task started
Rootkit Scan: stopped 3 days ago (events: 6, objects: 621, time: 00:29:40)
3/28/2012 6:49:43 PM Task stopped
3/28/2012 6:49:13 PM Will be deleted on system restart: HEUR:Backdoor.Win64.Generic C:\Windows\System32\consrv.dll
3/28/2012 6:28:19 PM Detected: HEUR:Backdoor.Win64.Generic c:\Windows\System32\consrv.dll
3/28/2012 6:25:48 PM Will be deleted on system restart: Trojan-Proxy.Win32.Agent.fia c:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Adobe\sp.DLL
3/28/2012 6:21:32 PM Detected: Trojan-Proxy.Win32.Agent.fia c:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Adobe\sp.DLL
3/28/2012 6:20:03 PM Task started
Disinfect active threats: completed 3 days ago (events: 6, objects: 3646, time: 00:00:40)
3/28/2012 6:49:42 PM Task completed
3/28/2012 6:49:39 PM Will be deleted on system restart: Trojan-Proxy.Win32.Agent.fia C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Adobe\sp.DLL
3/28/2012 6:49:32 PM Detected: Trojan-Proxy.Win32.Agent.fia C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Adobe\sp.DLL
3/28/2012 6:49:19 PM Cannot be deleted: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\temp\U\80000000.@
3/28/2012 6:49:02 PM Detected: HEUR:Backdoor.Win64.Generic C:\Windows\assembly\temp\U\80000000.@
3/28/2012 6:49:02 PM Task started
Rootkit Scan: stopped 3 days ago (events: 3, objects: 96, time: 00:26:42)
3/29/2012 5:23:14 AM Task stopped
3/29/2012 4:57:10 AM Detected: Trojan-Proxy.Win32.Agent.fia C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Adobe\sp.DLL
3/29/2012 4:56:32 AM Task started
Disinfect active threats: completed 3 days ago (events: 8, objects: 3700, time: 00:00:37)
3/29/2012 5:23:45 AM Task completed
3/29/2012 5:23:38 AM Will be deleted on system restart: Trojan-Proxy.Win32.Agent.fia C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Adobe\sp.DLL
3/29/2012 5:23:33 AM Detected: Trojan-Proxy.Win32.Agent.fia C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Adobe\sp.DLL
3/29/2012 5:23:26 AM Will be deleted on system restart: Backdoor.Win64.ZAccess.bh C:\Windows\System32\acpiec.dll
3/29/2012 5:23:20 AM Detected: Backdoor.Win64.ZAccess.bh C:\Windows\System32\acpiec.dll
3/29/2012 5:23:18 AM Deleted: Backdoor.Win32.ZAccess.cjj C:\Windows\assembly\temp\U\80000032.@
3/29/2012 5:23:08 AM Detected: Backdoor.Win32.ZAccess.cjj C:\Windows\assembly\temp\U\80000032.@
3/29/2012 5:23:08 AM Task started
Rootkit Scan: completed 3 days ago (events: 5, objects: 34, time: 00:02:39)
3/29/2012 1:15:01 PM Task completed
3/29/2012 1:15:00 PM Will be deleted on system restart: Backdoor.Win64.ZAccess.bh C:\Windows\System32\dptrackerd.dll
3/29/2012 1:15:00 PM Cannot be deleted: Backdoor.Win64.ZAccess.bh C:\Windows\System32\dptrackerd.dll
3/29/2012 1:13:19 PM Detected: Backdoor.Win64.ZAccess.bh C:\Windows\System32\dptrackerd.dll
3/29/2012 1:12:21 PM Task started
Quick Scan: completed 2 days ago (events: 2, objects: 4190, time: 00:00:24)
3/29/2012 9:22:28 PM Task completed
3/29/2012 9:22:04 PM Task started
Rootkit Scan: completed 2 days ago (events: 2, objects: 2871, time: 00:14:07)
3/30/2012 8:30:58 AM Task completed
3/30/2012 8:16:51 AM Task started
Rootkit Scan: completed 2 days ago (events: 2, objects: 2838, time: 00:08:17)
3/30/2012 2:36:42 PM Task completed
3/30/2012 2:28:25 PM Task started
Rootkit Scan: completed 1 day ago (events: 2, objects: 2595, time: 00:07:55)
3/30/2012 4:22:37 PM Task completed
3/30/2012 4:14:42 PM Task started
Rootkit Scan: stopped 1 day ago (events: 2, objects: 187, time: 00:01:00)
3/30/2012 6:27:46 PM Task stopped
3/30/2012 6:26:46 PM Task started
Rootkit Scan: completed 1 day ago (events: 2, objects: 2916, time: 00:08:47)
3/30/2012 7:13:51 PM Task completed
3/30/2012 7:05:04 PM Task started
Quick Scan: completed 1 day ago (events: 2, objects: 4122, time: 00:00:18)
3/30/2012 7:47:13 PM Task completed
3/30/2012 7:46:55 PM Task started
Full Scan: stopped 1 day ago (events: 2, objects: 338, time: 00:00:02)
3/30/2012 7:47:27 PM Task stopped
3/30/2012 7:47:25 PM Task started
Rootkit Scan: completed 1 day ago (events: 2, objects: 2944, time: 00:28:36)
3/31/2012 6:02:44 AM Task completed
3/31/2012 5:34:07 AM Task started
Rootkit Scan: completed 1 day ago (events: 2, objects: 2924, time: 00:08:17)
3/31/2012 7:24:18 AM Task completed
3/31/2012 7:16:01 AM Task started
Quick Scan: completed 1 day ago (events: 2, objects: 3608, time: 00:00:15)
3/31/2012 7:55:40 AM Task completed
3/31/2012 7:55:25 AM Task started
Full Scan: completed 1 hour ago (events: 10, objects: 339008, time: 00:11:22)
3/31/2012 9:30:35 AM Task started
3/31/2012 9:30:52 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\SI.db Logged
3/31/2012 9:30:52 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\UL.db Logged
3/31/2012 9:30:52 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\VL.db Logged
3/31/2012 9:30:52 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DB\WAL.db Logged
3/31/2012 9:30:53 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\DragWait.exe Logged
3/31/2012 9:30:53 AM Detected: HiddenObject.Multi.Generic c:\ADSM_PData_0150\_avt Logged
4/1/2012 1:27:19 PM Task stopped
4/1/2012 1:27:25 PM Task started
4/1/2012 1:38:47 PM Task completed
Rootkit Scan: completed 1 hour ago (events: 2, objects: 99, time: 00:05:20)
4/1/2012 1:31:59 PM Task completed
4/1/2012 1:26:36 PM Task started
Full Scan: completed 55 minutes ago (events: 8, objects: 232342, time: 00:18:00)
4/1/2012 2:11:06 PM Task started
4/1/2012 2:11:20 PM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\DB\SI.db Logged
4/1/2012 2:11:20 PM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\DB\UL.db Logged
4/1/2012 2:11:20 PM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\DB\VL.db Logged
4/1/2012 2:11:20 PM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\DB\WAL.db Logged
4/1/2012 2:11:21 PM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\DragWait.exe Logged
4/1/2012 2:11:21 PM Detected: HiddenObject.Multi.Generic C:\ADSM_PData_0150\_avt Logged
4/1/2012 2:29:06 PM Task completed
  • 0

#20
RKinner

RKinner

    Malware Expert

  • Expert
  • 24,625 posts
  • MVP
Then I guess we are done and can clean up.

You can uninstall or delete any tools we had you download and their logs.
To uninstall combofix, copy the next line:

"%userprofile%\Desktop\combofix.exe" /Uninstall

Start, All Programs, Accessories then right click on Command Prompt and Run As Administrator.
then right click, Paste, then hit Enter.

OTL has a cleanup tab if you go there it will remove itself and its logs.

To hide hidden files again (OTL may do it for you):

Vista or Win7

# Open the Control Panel menu and click Folder Options.
# After the new window appears select the View tab.
# Remove the check in the checkbox labeled Display the contents of system folders.
# Under the Hidden files and folders section select the radio button labeled Do not Show hidden files and folders.
# Check the checkbox labeled Hide protected operating system files.
# Press the Apply button and then the OK button and exit My Computer.

Also make sure you have the latest versions of any adobe.com products you use like Shockwave, Flash or Acrobat.

Whether you use adobe reader, acrobat or fox-it to read pdf files you need to disable Javascript in the program. There is an exploit out there now that can use it to get on your PC. For Adobe Reader: Start, All Programs, Adobe Reader, Edit, Preferences, Click on Javascript in the left column and uncheck Enable Acrobat Javascript. OK Close program. It's the same for Foxit reader except you uncheck Enable Javascript Actions.

To help keep your programs up-to-date you should download and run the UpdateChecker:
http://www.filehippo.../updatechecker/
(You don't need to download Betas and if there is a program you don't use you can just uninstall it rather than update it. Exception is MSN messenger which appears to be part of Windows.)
If you get a blocked program notice after installing updatechecker then change it to not run at start then manually run it once a week.
Seems to work best if Firefox is the default browser. You can also try Secunia PSI http://secunia.com/v...l/download_psi/ Same kind of info. You don't need both.
If you use Firefox then get the AdBlock Plus Add-on. WOT (Web of Trust) is another you might want to try.
The equivalent to AdBlock Plus for IE is called Simple Adblock and you should install it too: http://simple-adblock.com/
The free version only blocks 200 ads a day so another reason to use Firefox or Chrome.

If Firefox is slow loading make sure it only has the current Java add-on. Then download and run Speedy Fox.
http://www.crystalidea.com/speedyfox . You can run it any time that Firefox seems slow.

Be warned: If you use Limewire, utorrent or any of the other P2P programs you will almost certain be coming back to the Malware Removal forum. If you must use P2P then submit any files you get to http://virustotal.com before you open them.


If you have a router, log on to it today and change the default password! If using a Wireless router you really should be using encryption on the link. Use the strongest (newest) encryption method that your router and PC wireless adapter support especially if you own a business. See http://www.king5.com...-120637284.html and http://www.seattlepi...ted-1344185.php for why encryption is important. If you don't know how, visit the router maker's website. They all have detailed step by step instructions or a wizard you can download.

Ron
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP