Page 2 of 3 FirstFirst 123 LastLast
Results 11 to 20 of 24

Thread: pls help...something is really wrong...

  1. #11
    Junior Member
    Join Date
    Oct 2007
    Posts
    12

    Default here is the log..

    hi

    here is the log


    Incident Status Location

    Potentially unwanted tool:Application/NirCmd.A Not disinfected C:\Documents and Settings\Anne Therese C. Lim\Desktop\rambo burn\Setups\ComboFix.exe[nircmd.exe]
    Potentially unwanted tool:Application/NirCmd.A Not disinfected C:\Documents and Settings\Anne Therese C. Lim\Desktop\rambo burn\Setups\ComboFix.exe[nircmd.cfexe]
    Potentially unwanted tool:Application/NirCmd.A Not disinfected C:\WINDOWS\NirCmd.exe
    thanks

  2. #12
    Emeritus
    Join Date
    Nov 2005
    Location
    Texas
    Posts
    1,144

    Default

    Reboot and rescan with HiJackThis and post a new log here.
    Also please describe how your computer behaves at the moment.
    MS-MVP Windows Security 2006,2007,2008 & 2009
    ASAP member since 2004

  3. #13
    Junior Member
    Join Date
    Oct 2007
    Posts
    12

    Smile here is the hijackthis log after reboot

    hi

    here it is...my computer's ok now . i just noticed that there were some instances that it's so slow during startup that i sometimes had to restart it... but it has been happening even before i got the bug..maybe it's a memory problem (i think...??)

    i still have the hidden recycler and system volume information in my drive C and i couldnt delete them...

    thanks...

    Logfile of HijackThis v1.99.1
    Scan saved at 10:22:03 AM, on 10/9/2007
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16512)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\ACS.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
    C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    C:\WINDOWS\system32\DVDRAMSV.exe
    C:\Program Files\Spyware Doctor\svcntaux.exe
    C:\Program Files\Spyware Doctor\swdsvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\igfxtray.exe
    C:\WINDOWS\system32\hkcmd.exe
    C:\Program Files\Apoint2K\Apoint.exe
    C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
    C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
    C:\Program Files\Apoint2K\Apntex.exe
    C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
    C:\WINDOWS\system32\dla\tfswctrl.exe
    C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
    C:\WINDOWS\system32\ZoomingHook.exe
    C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
    C:\Program Files\TOSHIBA\Accessibility\FnKeyHook.exe
    C:\Program Files\Toshiba\Tvs\TvsTray.exe
    C:\WINDOWS\system32\TPSMain.exe
    C:\WINDOWS\system32\TCtrlIOHook.exe
    C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
    C:\Program Files\ltmoh\Ltmoh.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\WINDOWS\vsnpstd3.exe
    C:\Program Files\Spyware Doctor\SDTrayApp.exe
    C:\WINDOWS\system32\TPSBattM.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
    C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
    C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\3M\PSNotes\psn.exe
    C:\WINDOWS\system32\RAMASST.exe
    C:\Program Files\Common Files\Skyscape\smARTupdate.exe
    C:\Program Files\WordWeb\wweb32.exe
    C:\PROGRA~1\3M\PSNotes\PSNGive.exe
    C:\WINDOWS\System32\alg.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Hijackthis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.yahoo.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/yco.../www.yahoo.com
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.shoptoshiba.ca/welcome
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Yahoo! IE Services Button - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: TextAloud - {F053C368-5458-45B2-9B4D-D8914BDDDBFF} - C:\PROGRA~1\TEXTAL~1\TAForIE.dll
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
    O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
    O4 - HKLM\..\Run: [TPNF] C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
    O4 - HKLM\..\Run: [CeEKEY] C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
    O4 - HKLM\..\Run: [NDSTray.exe] NDSTray.exe
    O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [PadTouch] C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
    O4 - HKLM\..\Run: [ZoomingHook] ZoomingHook.exe
    O4 - HKLM\..\Run: [SmoothView] C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
    O4 - HKLM\..\Run: [HWSetup] C:\Program Files\TOSHIBA\TOSHIBA Applet\HWSetup.exe hwSetUP
    O4 - HKLM\..\Run: [TOSHIBA Accessibility] C:\Program Files\TOSHIBA\Accessibility\FnKeyHook.exe
    O4 - HKLM\..\Run: [Tvs] C:\Program Files\Toshiba\Tvs\TvsTray.exe
    O4 - HKLM\..\Run: [SVPWUTIL] C:\Program Files\Toshiba\Windows Utilities\SVPWUTIL.exe SVPwUTIL
    O4 - HKLM\..\Run: [TPSMain] TPSMain.exe
    O4 - HKLM\..\Run: [TCtryIOHook] TCtrlIOHook.exe
    O4 - HKLM\..\Run: [TFncKy] TFncKy.exe
    O4 - HKLM\..\Run: [LtMoh] C:\\Program Files\\ltmoh\\Ltmoh.exe
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [snpstd3] C:\WINDOWS\vsnpstd3.exe
    O4 - HKLM\..\Run: [SDTray] "C:\Program Files\Spyware Doctor\SDTrayApp.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [YSearchProtection] "C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe"
    O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"
    O4 - HKCU\..\Run: [TOSCDSPD] C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [YSearchProtection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
    O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
    O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - Startup: Skyscape smARTupdate.lnk = C:\Program Files\Common Files\Skyscape\smARTupdate.exe
    O4 - Startup: WordWeb.lnk = C:\Program Files\WordWeb\wweb32.exe
    O4 - Global Startup: Post-itŪ Software Notes.lnk = C:\Program Files\3M\PSNotes\psn.exe
    O4 - Global Startup: RAMASST.lnk = C:\WINDOWS\system32\RAMASST.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0\bin\npjpi150.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0\bin\npjpi150.dll
    O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scieplugin.dll
    O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O11 - Options group: [INTERNATIONAL] International*
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - http://housecall65.trendmicro.com/ho...vex/hcImpl.cab
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/micr...?1181088772875
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/actives...ree/asinst.cab
    O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
    O20 - Winlogon Notify: klogon - C:\WINDOWS\system32\klogon.dll
    O20 - Winlogon Notify: WgaLogon - C:\WINDOWS\SYSTEM32\WgaLogon.dll
    O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
    O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\system32\ACS.exe
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Unknown owner - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe" -r (file missing)
    O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    O23 - Service: DVD-RAM_Service - Matsushita Electric Industrial Co., Ltd. - C:\WINDOWS\system32\DVDRAMSV.exe
    O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: LWWLicenseService - WoltersKluwerLWW - C:\Program Files\Common Files\WoltersKluwerLWW Shared\Service\LWWLicenseService.exe
    O23 - Service: Spyware Doctor Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\svcntaux.exe
    O23 - Service: Spyware Doctor Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\swdsvc.exe

  4. #14
    Emeritus
    Join Date
    Nov 2005
    Location
    Texas
    Posts
    1,144

    Default

    1. Right-click Start then click Search... or Find..., depending on the version of Windows you are running.
    2. In the Named input box, type:
    AUTORUN.INF
    3. In the Look In drop-down list, select a drive, then press Enter.
    4. Select the file, then open using Notepad.
    5. Check if the following lines are present in the file:
    [AutoRun]
    Open=RECYCLER\S-1-5-21-1078073611-1993962763-839522115-1003\mmc32.EXE
    shellexecute=RECYCLER\S-1-5-21-1078073611-1993962763-839522115-1003\mmc32.EXE
    shell\Auto\command=RECYCLER\S-1-5-21-1078073611-1993962763-839522115-1003\mmc32.EXE
    shell\Browser\command=RECYCLER\S-1-5-21-1078073611-1993962763-839522115-1003\mmc32.EXE
    6. If the lines are present, delete the file.
    7. Repeat steps 3 to 6 for AUTORUN.INF files in the remaining removable drives.
    8. Close Search Results.

    --------------------------------

    One of the best features of Windows XP is the System Restore option, however if a virus or spyware infection.
    There can be backups made in the System Restore folder.
    Therefore, clearing the restore points is necessary after a virus or spyware removal.

    To reset your restore points, please note that you will need to log into your computer with an account
    which has full administrator access. You will know if the account has administrator access because
    you will be able to see the System Restore tab. If the tab is missing, you are logged in under a limited account.

    1. Turn off System Restore.
    On the Desktop, right-click My Computer.
    Click Properties.
    Click the System Restore tab.
    Check Turn off System Restore.
    Click Apply, and then click OK.

    2. Reboot.

    3. Turn ON System Restore.
    On the Desktop, right-click My Computer.
    Click Properties.
    Click the System Restore tab.
    UN-Check *Turn off System Restore*.
    Click Apply, and then click OK.

    ------------------------------------

    Let me know how it is running after that.
    MS-MVP Windows Security 2006,2007,2008 & 2009
    ASAP member since 2004

  5. #15
    Junior Member
    Join Date
    Oct 2007
    Posts
    12

    Smile autorun.inf

    hi

    i had a lot of autorun.infs but none contained the lines you specified. However, i remember encountering those things in my kaspersky antivirus.. it said it has been deleted etc...here's the log of my kaspersky..hope this helps...

    thanks again..

    detected: riskware Hidden install Running process: E:\RECYCLER\S-1-5-21-1078073611-1993962763-839522115-1003\mmc32.EXE
    detected: riskware Invader Running process: E:\RECYCLER\S-1-5-21-1078073611-1993962763-839522115-1003\mmc32.EXE
    detected: riskware Invader Running process: C:\WINDOWS\system32\crss.exe
    deleted: virus Virus.Win32.AutoRun.k File: C:\windows\system32\dnscon70.dll//UPX
    deleted: virus Virus.Win32.AutoRun.k File: C:\windows\system32\netmanage.dll
    deleted: virus Virus.Win32.AutoRun.k File: C:\WINDOWS\system32\mstcpcon20.dll//UPX
    deleted: virus Virus.Win32.AutoRun.k File: C:\WINDOWS\system32\netused.dll
    detected: riskware Invader Running process: C:\Documents and Settings\Anne Therese C. Lim\Local Settings\Temp\Rar$EX02.141\Registry Booster v2.0.1092.3366\registrybooster.exe
    detected: riskware Invader Running process: C:\Documents and Settings\Anne Therese C. Lim\Local Settings\Temp\is-RFJAN.tmp\is-5U0AB.tmp
    deleted: virus Virus.Win32.AutoRun.k File: C:\System Volume Information\_restore{32CB1E4A-62B9-458C-AE0D-5DDC8434B0C5}\RP132\A0036863.dll//UPX
    deleted: virus Virus.Win32.AutoRun.k File: C:\System Volume Information\_restore{32CB1E4A-62B9-458C-AE0D-5DDC8434B0C5}\RP132\A0036864.dll
    detected: riskware Invader Running process: C:\Program Files\Error Nuker\uninstall.exe
    detected: riskware Invader Running process: C:\Documents and Settings\Anne Therese C. Lim\Local Settings\Temp\A~NSISu_.exe
    deleted: virus Virus.Win32.AutoRun.k File: C:\System Volume Information\_restore{32CB1E4A-62B9-458C-AE0D-5DDC8434B0C5}\RP132\A0036865.dll//UPX
    deleted: virus Virus.Win32.AutoRun.k File: C:\System Volume Information\_restore{32CB1E4A-62B9-458C-AE0D-5DDC8434B0C5}\RP132\A0036866.dll
    deleted: virus Virus.Win32.AutoRun.k File: C:\WINDOWS\system32\SR1000R.DLL
    deleted: virus Virus.Win32.AutoRun.k File: C:\WINDOWS\Temp\_ISTMPI.DIR\autorun.inf
    not found: virus Virus.Win32.AutoRun.k File: C:\WINDOWS\Temp\_ISTMPI.DIR\mmc32.exe
    detected: riskware Invader Running process: C:\Documents and Settings\Anne Therese C. Lim\Desktop\ru20.exe
    detected: riskware Invader Running process: C:\Program Files\Rapidshare Unlimited\Rapidshare Unlimited.exe
    detected: riskware Invader Running process: C:\WINDOWS\TEMP\Rapidshare Unlimited.bat
    detected: riskware Invader Running process: C:\Documents and Settings\Anne Therese C. Lim\Desktop\Grabber.exe
    detected: riskware Invader Running process: C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
    deleted: virus Virus.Win32.AutoRun.k File: C:\System Volume Information\_restore{32CB1E4A-62B9-458C-AE0D-5DDC8434B0C5}\RP136\A0036990.DLL
    deleted: virus Virus.Win32.AutoRun.k File: C:\System Volume Information\_restore{32CB1E4A-62B9-458C-AE0D-5DDC8434B0C5}\RP131\A0036820.dll
    deleted: virus Virus.Win32.AutoRun.k File: C:\System Volume Information\_restore{32CB1E4A-62B9-458C-AE0D-5DDC8434B0C5}\RP131\A0036826.exe//UPX
    deleted: virus Virus.Win32.AutoRun.k File: C:\System Volume Information\_restore{32CB1E4A-62B9-458C-AE0D-5DDC8434B0C5}\RP131\A0036830.dll
    deleted: virus Virus.Win32.AutoRun.k File: C:\Documents and Settings\Anne Therese C. Lim\Local Settings\Temp\DelAA.tmp//UPX

  6. #16
    Emeritus
    Join Date
    Nov 2005
    Location
    Texas
    Posts
    1,144

    Default

    Lets try a different scan go HERE and do a online scan.
    Let me know what is found.
    MS-MVP Windows Security 2006,2007,2008 & 2009
    ASAP member since 2004

  7. #17
    Junior Member
    Join Date
    Oct 2007
    Posts
    12

    Arrow about the autorun.infs

    [QUOTE=ikchok_jr;125721]hi

    i had a lot of autorun.infs but none contained the lines you specified.

    hi

    i forgot to mention that the autorun.infs i am talking about are from legitimate programs (they come in cds) i use for school... i actually installed those programs because i need them for my studies...

    i've installed them ever since...

    but i am still scanning using the f-secure just to see if there are still bugs in my computer.. ill post the result once the scan is done..

    thanks again

  8. #18
    Junior Member
    Join Date
    Oct 2007
    Posts
    12

    Smile fsecure log

    hi

    here's the result of the fsecure scan

    there are 2 spywares an 3 were skipped during the scan...

    thanks

    Scanning Report
    Tuesday, October 09, 2007 20:28:41 - 21:39:31
    Computer name: ANNETHERESECLIM
    Scanning type: Scan system for viruses, rootkits, spyware
    Target: C:\



    Result: 2 malware found
    Tracking Cookie (spyware)
    System (Disinfected)
    System

    --------------------------------------------------------------------------------

    Statistics
    Scanned:
    Files: 33178
    System: 4471
    Not scanned: 3
    Actions:
    Disinfected: 1
    Renamed: 0
    Deleted: 0
    None: 1
    Submitted: 0
    Files not scanned:
    C:\HIBERFIL.SYS
    C:\PAGEFILE.SYS
    C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT

    --------------------------------------------------------------------------------

    Options
    Scanning engines:
    F-Secure AVP: 7.0.171, 2007-10-09
    F-Secure Blacklight: 1.0.64
    F-Secure Draco: 1.0.35, 0618-150-72
    F-Secure Libra: 2.4.2, 2007-10-07
    F-Secure Orion: 1.2.37, 2007-10-09
    F-Secure Pegasus: 1.19.0, 2007-09-03
    Scanning options:
    Scan defined files: COM EXE SYS OV? BIN SCR DLL SHS HTM HTML HTT VBS JS INF VXD DO? XL? RTF CPL WIZ HTA PP? PWZ P?T MSO PIF . ACM ASP AX CNV CSC DRV INI MDB MPD MPP MPT OBD OBT OCX PCI TLB TSP WBK WBT WPC WSH VWP WML BOO HLP TD0 TT6 MSG ASD JSE VBE WSC CHM EML PRC SHB BAT LNK ANI AVB CEO CMD LSP MAP MHT MIF PDF PHP POT WMF NWS TAR TGZ WSF ZL? {* ZIP JAR ARJ LZH TAR TGZ GZ CAB RAR BZ2 HQX
    Use Advanced heuristics

  9. #19
    Emeritus
    Join Date
    Nov 2005
    Location
    Texas
    Posts
    1,144

    Default

    Download SDFix and save it to your Desktop.

    Double click SDFix.exe and it will extract the files to %systemdrive%
    (Drive that contains the Windows Directory, typically C:\SDFix)

    Please then reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, the Advanced Options Menu should appear;
    • Select the first option, to run Windows in Safe Mode, then press Enter.
    • Choose your usual account.
    • Open the extracted SDFix folder and double click RunThis.bat to start the script.
    • Type Y to begin the cleanup process.
    • It will remove any Trojan Services and Registry Entries that it finds then prompt you to press any key to Reboot.
    • Press any Key and it will restart the PC.
    • When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
    • Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt
      (Report.txt will also be copied to Clipboard ready for posting back on the forum).
    • Finally paste the contents of the Report.txt back on the forum with a new HijackThis log
    MS-MVP Windows Security 2006,2007,2008 & 2009
    ASAP member since 2004

  10. #20
    Junior Member
    Join Date
    Oct 2007
    Posts
    12

    Smile sdfix

    hi

    i hope i did this correctly because after running it for the 1st time, i restarted but it didnt run again (still in safe mode). so what i did was to restart in normal mode and it ran again...got a bit nervous there...it said no viruses were found etc...

    the recycler and the system volume information hidden folders are still there...why cant they be deleted? maybe they're benign...(i hope..)

    thanks again for all your help


    here are the results + the catchme.exe results that came after


    SDFix: Version 1.107

    Run by Anne Therese C. Lim on Wed 10/10/2007 at 07:56 PM

    Microsoft Windows XP [Version 5.1.2600]

    Running From: C:\SDFix

    Safe Mode:
    Checking Services:


    Restoring Windows Registry Values
    Restoring Windows Default Hosts File

    Rebooting...


    Normal Mode:
    Checking Files:

    No Trojan Files Found




    Removing Temp Files...

    ADS Check:

    C:\WINDOWS
    No streams found.

    C:\WINDOWS\system32
    No streams found.

    C:\WINDOWS\system32\svchost.exe
    No streams found.

    C:\WINDOWS\system32\ntoskrnl.exe
    No streams found.



    Final Check:

    Remaining Services:
    ------------------




    Authorized Application Key Export:

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
    "C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"="C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe:*:Enabled:Yahoo! Messenger"

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]

    Remaining Files:
    ---------------


    Files with Hidden Attributes:

    Wed 10 Oct 2007 4,640,768 A..H. --- "C:\Documents and Settings\Anne Therese C. Lim\ntuser.tmp"
    Tue 26 Jun 2007 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"
    Thu 20 Sep 2007 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\5b662b7887793c36c7b10d29ea0e0cdc\BIT2A.tmp"
    Thu 20 Sep 2007 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\cf7ced0e70c80a1e476f1abf49afecb1\BIT29.tmp"

    Finished!
    -----------
    catchme.exe

    catchme 0.3.1160 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2007-10-10 20:41:03
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden services & system hive ...

    scanning hidden registry entries ...

    scanning hidden files ...

    scan completed successfully
    hidden processes: 0
    hidden services: 0
    hidden files: 0

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •