My antivirus shows hfgruifdkwrjn.dll Virusfil

July 9, 2009 at 03:10:42
Specs: Windows Vista Ultimate sp2 32b
My antivirus shows everytime when I start that I have a Virus in file "hfgruifdkwrjn.dll" and then I need to restart for it to remove the Virus. Because it doesn't seem to remove it I installed a trial version of Windows Live OneCare that found a obfuscator.et Virus but also shows all the time that I need to restart for it to be removed and after reboot it comes up with the same virus message

See More: My antivirus shows hfgruifdkwrjn.dll Virusfil

Report •


#1
July 9, 2009 at 06:56:58
1) Install, update database and run full scan with Malwarebytes' Anti-Malware. Attach malwarebyte full scan log, fix anything detected.

2) Run full Scan with SuperAntispyware : http://www.superantispyware.com/dow... . Fix what it detects and post summary scan log.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#2
July 9, 2009 at 23:54:58
Ok, first of all thank you for helping me.

Here is the Superantispyware log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/09/2009 at 02:57 PM

Application Version : 4.26.1006

Core Rules Database Version : 3982
Trace Rules Database Version: 1922

Scan type : Complete Scan
Total Scan Time : 02:02:38

Memory items scanned : 403
Memory threats detected : 0
Registry items scanned : 9355
Registry threats detected : 18
File items scanned : 269122
File threats detected : 292

Adware.DesktopSmileyToolbar
HKU\S-1-5-21-3735577838-3427107772-312358594-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5617ECA9-488D-4BA2-8562-9710B9AB78D2}
HKU\S-1-5-21-3735577838-3427107772-312358594-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{5617ECA9-488D-4BA2-8562-9710B9AB78D2}

Adware.SystemSearchDispatch
HKU\S-1-5-21-3735577838-3427107772-312358594-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{CDBFB47B-58A8-4111-BF95-06178DCE326D}

Adware.MyWebSearch/FunWebProducts
HKLM\SOFTWARE\FunWebProducts
HKLM\SOFTWARE\FunWebProducts\Installer
HKLM\SOFTWARE\FunWebProducts\Installer#Dir
HKLM\SOFTWARE\FunWebProducts\Installer#CurInstall
HKLM\SOFTWARE\FunWebProducts\Installer#sr
HKLM\SOFTWARE\FunWebProducts\Installer#pl
HKLM\SOFTWARE\MyWebSearch
HKLM\SOFTWARE\MyWebSearch\SearchAssistant
HKLM\SOFTWARE\MyWebSearch\SearchAssistant#pid
HKLM\SOFTWARE\MyWebSearch\SearchAssistant#fwp
HKLM\SOFTWARE\MyWebSearch\SearchAssistant#mwsask
HKLM\SOFTWARE\MyWebSearch\SearchAssistant#Dir
HKLM\SOFTWARE\MyWebSearch\SearchAssistant#sr
HKLM\SOFTWARE\MyWebSearch\SearchAssistant#pl
C:\Program Files\MyWebSearch\SrchAstt\1.bin
C:\Program Files\MyWebSearch\SrchAstt
C:\Program Files\MyWebSearch
C:\Program Files\FunWebProducts

Trojan.DNSChanger-Codec
HKU\S-1-5-21-3735577838-3427107772-312358594-1000\Software\fcn

Trojan.Dropper/Gen
C:\USERS\PETER\APPDATA\LOCAL\MICROSOFT\WINDOWS\TEMPORARY INTERNET FILES\VIRTUALIZED\C\USERS\PETER\DESKTOP\RQD3D13.EXE
C:\USERS\PETER\APPDATA\LOCAL\TEMP\MIA33B4.TMP\DATA\MICROSOFT VISUAL C++ RUNTIME 9.0 (INCLUDES ATL AND MFC) SERVICE PACK 1\915FF0F9\CD46533A\AAWDRIVERTOOL.EXE
C:\USERS\PETER\APPDATA\LOCAL\TEMP\TEMP1_UT2004 KEY CHANGER.ZIP\UT2004 KEY CHANGER.EXE

Adware.Tracking Cookie
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@208.122.40[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@208.122.40[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@2o7[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@77tracking[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@99counters[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@account.live[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@account.live[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad.240x400-1.adbn[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad.ad-srv[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad.adfill[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad.adnet[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad.auerbach-verlag[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad.myp2p[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad.rich1.adbn[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad.salebroker[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad.yieldmanager[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad1.vitabeat[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad2.doublepimp[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad2.ip[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@adbrite[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@admarketplace[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.ad4game[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.ad4game[3].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.admanage[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.admaxasia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.anm.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.aol.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.appleiphoneapps[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.associatedcontent[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.bittorrent[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.bleepingcomputer[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.bsplayer[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.cartoonnetwork[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.digital-digest[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.evasivelabs[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.heias[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.loudsocial[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.lucidmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.lucidmedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.lucidmedia[3].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.mediamayhemcorp[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.mobygames[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.ookla[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.overclock[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.pcsg[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.pugetsoundsoftware[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.quartermedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.socialreach[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.techguy[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.torrentreactor[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.us.e-planning[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.us.e-planning[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.vr-zone[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.w3hoster[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.warp3[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads.widgetbucks[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads1.partnerlogic[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads1.pushfish[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads1.telecentro.net[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads2.net-communities.co[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads3.exp[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads4.hermoment[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ads7.hermoment[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@adsrv.admediate[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@adstar-media[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@adstats.cdfreaks[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@adsystem.netcomposer-nc04[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@adultfriendfinder[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@adv.gamerzhut[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@adv.yesasia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@advancedcounter[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@advertising[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@advertlets[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@affiliates.millnicmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@affiliates.trafficsynergy[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@allyours.virginmedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@analytics.ientry[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@apmebf[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@at.atwola[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@atdmt[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@atwola[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@autophoto.oddcast[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@b5media[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@backbeatmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@banner.gamingsys[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@banners.victor[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@bannersng.yell[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@blog.oddcast[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@bluestreak[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@bridge1.admarketplace[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@broadband-finder.co[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@burstbeacon[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@burstnet[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@burstnet[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@cct.clickable[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@cerosmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@click.superpaysys[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@click.superpaysys[3].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@click.t10[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@clickaider[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@clickintext[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@clicktorrent[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@cogaccounts.codemasters[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@collective-media[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@count.brat-online[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@count.vivistats[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@counter-strike[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@counter.inkfrog[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@counter.marketplaceadvisor.channeladvisor[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@crackle[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@cyonix[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@da-tracking[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@de.at.atwola[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@discountlocks.co[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@display.mediafire[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@doubleclick[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@eas.apm.emediate[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@elitemate[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@eliteregistry.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@epn1.epona-media[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@europe-warez[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@exefind[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@exoclick[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@fastfinders.co[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@find.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@findmusic[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@flag-d-photo-screensaver.photo-screensavers.downloadsoftware4free[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@forums.hardwarezone.com[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@fulltraffic[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@game-advertising-online[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@hairy-canary.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@hardwarezone.com[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@hardwarezone[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@havamedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@help2.virginmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@host-d.oddcast[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@host.oddcast[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@imediablast[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@img1.uploadimages[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@imrworldwide[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@incentaclick[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@indoormedia.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@invitemedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@komtrack[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@komtrack[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@lfstmedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@media-convert[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@media-convert[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@media.brandreachsys[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@media.brandreachsys[3].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@media.sensis.com[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@media.xfire[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@media303[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@media6degrees[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@mediafire[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@mediagenerate[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@mediamarkt[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@mediamatters[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@mediamgr.ugo[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@mediaonenetwork[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@mediaplex[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@movies.virginmedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@msnaccountservices.112.2o7[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@msnportal.112.2o7[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@msnservices.112.2o7[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@my.virginmedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@myroitracking[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@mysso.virginmedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@nextag.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@nextag.co[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@nextag[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@oddcast[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@offersclick.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@optimize.indieclick[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@partner.finditquick[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@partyaccount[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@privatsex[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@questionmarket[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@revsci[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@richmedia.yahoo[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ronwarez[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@s02.flagcounter[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@sales.liveperson[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@sales.liveperson[3].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@sales.liveperson[4].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@sales.liveperson[5].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@saletrack.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@scanner.virus[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@search.virginmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@secure.partyaccount[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@selfcare.virginmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@servedby.adxpower[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@servedby.onlinemediadiva[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@server.cpmstar[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@server.lon.liveperson[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@server.lon.liveperson[3].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@server.lon.liveperson[4].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@server.lon.liveperson[5].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@server.lon.liveperson[6].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@sexsearchcom[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@sl3.kfactormedia[3].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@smartadserver[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@socialmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@stat.aldi[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@stat.dealtime[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@stats.gamestop[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@stats.paypal[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@status-cable.virginmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tacoda[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@talksport.cerosmedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tbtracker.lir[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@technoratimedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@thefind[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tns-counter[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@toplist.darkmule[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@toplisted[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tour.sexsearchcom[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@track.adnuts[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@track.webgains[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@track.webtrekk[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tracking.dc-storm[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tracking.klicktel[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tracking.klicktel[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tracking.mlsat02[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tracking.summitmedia.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@trackinganalytics[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@trackmatics[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@traffic.weatherbytech[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@traffictrack[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tribalfusion[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tto2.traffictrack[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tuneupmedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ufindus[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@uk.media.games.ign[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@uk.media.pc.ign[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@uk.media.pc.ign[3].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@uk.media.ps3.ign[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@uk.media.wii.ign[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@unrulymedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@vidego.multicastmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@virginmedia.metaboli.co[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@virginmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@vote4warez[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@w00tpublishers.wootmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@w12.media-convert[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@warez-dk-toolz[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@webstats.broadcom[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@worldtraffic[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.adultasiananime[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.broadband-finder.co[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.burstbeacon[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.burstnet[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.clash-media[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.counter[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.cyonix[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.dhmtracking.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.discountcodes[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.discountlocks.co[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.europe-warez[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.find.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.goaltraffic[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.impulsefind[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.incentaclick[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.inteletrack[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.mediafire[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.mktrack[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.netdebit-counter[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.netdebit-counter[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.oddcast[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.offersclick.co[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.telediscount[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.tuneupmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.usenext[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.usenext[3].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.virginmedia[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.virginmedia[3].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.warezscene[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@www.webmillstats[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@xiti[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@yadro[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@yoload.presidiomedia[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\peter@serving-sys[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\peter@serving-sys[3].txt
C:\WINDOWS\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@2o7[1].txt
C:\WINDOWS\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@2o7[3].txt


And here is the Malwarebites log its 2 of them as I cancelled the first one by mistake but it found something allready:


Malwarebytes' Anti-Malware 1.38
Database version: 2401
Windows 6.0.6002 Service Pack 2

09/07/2009 22:30:03
mbam-log-2009-07-09 (22-30-03).txt

Scan type: Full Scan (C:\|)
Objects scanned: 7061
Time elapsed: 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autochk (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autochk (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\System32\autochk.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\System32\config\systemprofile\protect.dll (Trojan.Agent) -> Quarantined and deleted successfully.


and 2nd one:

Malwarebytes' Anti-Malware 1.38
Database version: 2401
Windows 6.0.6002 Service Pack 2

10/07/2009 07:31:59
mbam-log-2009-07-10 (07-31-59).txt

Scan type: Full Scan (C:\|)
Objects scanned: 376929
Time elapsed: 1 hour(s), 5 minute(s), 57 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 10
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 4

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2e4a92ab-f2c0-456a-9935-b715439790d7} (Spyware.Marketscore) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\OOO (Rogue.LivePlayer) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\OOO (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\Microsoft Windows Service (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\Microsoft Windows Service (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Users\Peter\downloads\eMule\Incoming\eset smart security (business) 3.0.669 - (67 year license!!)\Setup.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\WINDOWS\Temp\msb.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\Temp\obaniimjbw.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\nsrbgxod.bak (Trojan.Agent) -> Quarantined and deleted successfully.


After those scans and removing all items my antivirus still shows that virus when restarting


Report •

#3
July 10, 2009 at 00:00:17
Maybe that helps a bit in finding out what I need to do, my antivirus reports the file as being a "trojan.win32.Monder.cqbi"

Report •

Related Solutions

#4
July 10, 2009 at 05:27:31
Note: I can help you remove malware manually. Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible. First Track this topic. Then follow:

1) Can you please post your AVZ log:
Note: Run AVZ in windows normal mode. If avz.exe doesn't start, then try to rename the file avz.exe to something else and try to run it again. Make sure you have your web browser open in background before following the steps below.

i) To create the log file, download AVZ by clicking HERE. Please save this file to your desktop or "My Documents" folder.

ii) Next, unpack the file to a new folder using the Compressed (zipped) folders wizard built into Windows XP/Vista, or a zip utility of your choice.

iii) Once you have unpacked the contents of the zip archive, please launch the file AVZ.exe by double clicking on it or right clicking and selecting Open.
Note: If you are running Windows vista launch AVZ.exe by right clicking and selecting Run as Administrator.

You should now see the main window of the AVZ utility. Please navigate to File->Custom Scripts. Copy the script below by using the keyboard shortcut CTRL+C or the corresponding option via right click.

begin
ExecuteAVUpdateEx( 'http://avz.virusinfo.info/avz_up/', 1, '','','');
ExecuteStdScr(3);
RebootWindows(true);
end.


Paste the script into the execution window by using CTRL+V keyboard shortcut, or the "paste" option via the right click menu. Click on Run to run the script, the PC will reboot. After the reboot the LOG subfolder is created in the folder with AVZ, with a file called virusinfo_syscure.zip inside. Upload that file to rapidshare.com and paste the link here.

Image Tutorial

2) Download and Run DDS which will create a Pseudo HJT Report as part of its log: DDS Tool Download Link. When done, DDS will open two (2) logs

   1. DDS.txt
   2. Attach.txt

Upload the logs to rapidshare.com and paste download link in your next reply.
Note: Disable any script-blocking programs and then double-click on the DDS.scr icon to start the program. If you did not disable a script-blocker that may be part of your antimalware program, you may receive a warning from your antimalware product asking if you would like DDS.scr to run. Please allow it to do so.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#5
July 10, 2009 at 08:17:29

Report •

#6
July 10, 2009 at 08:30:39
Follow these Steps in order numbered. Don't proceed to next step unless you have successfully completed previous step:

1) Attach a Combofix log, please review and follow these instructions carefully.

Download it here -> http://download.bleepingcomputer.co...

Before Saving it to Desktop, please rename it to something like 123.exe to stop malware from disabling it.

Now, please make sure no other programs are running, close all other windows and pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) until after the scanning and removal process has taken place.

Please double click on the file you downloaded. Follow the onscreen prompts to start the scan. Once the scanning process has started please DO NOT click on the Combofix window or attempt to use your computer as this can cause the scanning process to stall. It may take a while to complete scanning and this is normal.

You will be disconnected from the internet and your desktop icons/toolbars will disappear during scanning, do not worry, this is normal and it will be restored after scanning has completed.

Combofix will create a logfile and display it after your computer has rebooted. Usually located in c:\combofix.txt, please upload that file to rapidshare.com and paste the link here.

2) Please zip up C:\qoobox\quarantine and upload it, to a filehost such as http://rapidshare.com/ Then, Private Message me the Download links to the uploaded files.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#7
July 10, 2009 at 16:20:31
Here is the Combofix file:

http://rapidshare.com/files/2543669...


Report •

#8
July 10, 2009 at 16:47:12
Follow these Steps in order numbered. Don't proceed to next step unless you have successfully completed previous step:

1) Install, update database and run full scan with Malwarebytes' Anti-Malware. Attach malwarebyte full scan log, fix anything detected.

2) Run full Scan with SuperAntispyware : http://www.superantispyware.com/dow... . Fix what it detects and post summary scan log.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#9
July 10, 2009 at 18:19:04
Uninstall Combofix by: pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) > Start > run > type combofix /u > ok.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#10
July 11, 2009 at 03:27:22
is it normal that superantispyware is after 8 hours still not finished? Had to stop it as I did the scan at work and had to pack my laptop away to take it home

Report •

#11
July 11, 2009 at 06:21:28
Yes pause/stop other antivirus/spyware programs.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#12
July 11, 2009 at 13:40:08
Thank you again very very much for helping me.

Here is the Malwarebytes log:

Malwarebytes' Anti-Malware 1.38
Database version: 2405
Windows 6.0.6002 Service Pack 2

11/07/2009 02:49:50
mbam-log-2009-07-11 (02-49-46).txt

Scan type: Full Scan (C:\|)
Objects scanned: 320379
Time elapsed: 1 hour(s), 54 minute(s), 2 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Qoobox\quarantine\C\WINDOWS\System32\hjgruiftdkwrjn.dll.vir (Trojan.TDSS) -> No action taken.

And the superantispyware one:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/11/2009 at 08:47 PM

Application Version : 4.26.1006

Core Rules Database Version : 3986
Trace Rules Database Version: 1926

Scan type : Complete Scan
Total Scan Time : 01:54:34

Memory items scanned : 289
Memory threats detected : 0
Registry items scanned : 9349
Registry threats detected : 0
File items scanned : 257385
File threats detected : 22

Adware.Tracking Cookie
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@ad.yieldmanager[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@adrevolver[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@advertising[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@adviva[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@apmebf[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@at.atwola[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@atdmt[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@bs.serving-sys[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@doubleclick[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@media.adrevolver[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@media.adrevolver[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@mediaplex[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@paypal.112.2o7[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@pro-market[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@serving-sys[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@smartadserver[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@specificclick[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@stats.paypal[2].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tacoda[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@tribalfusion[1].txt
C:\Users\Peter\AppData\Roaming\Microsoft\Windows\Cookies\Low\peter@xiti[1].txt

Trojan.Agent/Gen-PEC
C:\WINDOWS\PEV.EXE


Report •

#13
July 11, 2009 at 13:43:44
Follow Response Number 9. Is your problem fixed?

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#14
July 11, 2009 at 13:49:33
Yes, it seems my antivirus doesn't find anything anymore. Thank you very much.
Just one more question, what antivirus, antispyware and firewall combination would you suggest? Price doesn't matter if they are not free ones as my PC and privat security is me worht it

Report •

#15
July 11, 2009 at 13:59:16
For AV kasperksy/bitdefender/eset/norton/avira are pretty good. Antimalware: superantispyware/malwarebytes. Firewall don't generally need if you have internet security suite.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •


Ask Question