Still have same viruses after system reformat

June 11, 2009 at 10:16:09
Specs: Windows XP
I reformatted my computer using my XP installation discs, get AVG Internet Security back, and now I have the same viruses, it's extremely annoying and I don't know if there's a way to get rid of them. It's mostly tmp.exe files that keep downloading more s--- like that on their own, I have no clue how to get rid of these viruses, if you need more specific information you can IM me on AIM at LxxxSTAxxxL.

See More: Still have same viruses after system reformat

Report •


#1
June 11, 2009 at 10:26:11

Report •

#2
Report •

#3
June 11, 2009 at 10:48:45
That only show virus in restore files. Follow:

Turn system restore off > reboot. How to turn it off/on: http://support.kaspersky.com/faq/?q... Run a full scan with:

Download and run Kaspersky AVP tool: http://devbuilds.kaspersky-labs.com...
Once you download and start the tool:

# Check below options:

    * Select all the objects/places to be scanned. 
    * Settings > Customize > Heuristic analyzer > Enable deep rootkit search

# Click Scan
# Fix what it detects
# Attach Scan log/Summary to your next message.

Illustrated tutorial: http://img32.imageshack.us/img32/76...

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

Related Solutions

#4
June 11, 2009 at 11:00:26
Computer will NOT let me access my system properties, when I hit system it says:

Windows cannot find C:WINDOWS\system32\rundll32.exe.


Report •

#5
June 11, 2009 at 12:38:13
Skip that part for now just scan your system. Also you might need your windows installation CD. Do you have one?

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#6
June 11, 2009 at 13:11:04
Yes I do and here is the log:

deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001651.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001690.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001730.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001740.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001840.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001842.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001870.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001872.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001876.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001878.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001884.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001907.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001924.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001926.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001928.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001938.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001943.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001945.exe
deleted: Trojan program Rootkit.Win32.Agent.jj File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001972.sys
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0001981.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0002001.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0002058.exe
deleted: new threat Type_Win32 (modification) File: C:\System Volume Information\_restore{54E97F98-D21A-4762-924D-E701832858D0}\RP4\A0002086.exe


Report •

#7
June 11, 2009 at 13:34:27
Post the whole scan log... Or post screen shot of it.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#8
June 11, 2009 at 13:57:18
It's blocking me from opening the log =[.

Report •

#9
June 11, 2009 at 14:11:39
1) Can you please post your AVZ log:
Note: Run AVZ in windows normal mode. If avz.exe doesn't start, then try to rename the file avz.exe to something else and try to run it again. Make sure you have your web browser open in background before following the steps below.

i) To create the logfile, download AVZ by clicking HERE. Please save this file to your desktop or "My Documents" folder.

ii) Next, unpack the file to a new folder using the Compressed (zipped) folders wizard built into Windows XP/Vista, or a zip utility of your choice.

iii) Once you have unpacked the contents of the zip archive, please launch the file AVZ.exe by double clicking on it or right clicking and selecting Open.
Note: If you are running Windows vista launch AVZ.exe by right clicking and selecting Run as Administrator.

You should now see the main window of the AVZ utility. Please navigate to File->Custom Scripts. Copy the script below by using the keyboard shortcut CTRL+C or the corresponding option via right click.

begin
ExecuteStdScr(3);
RebootWindows(true);
end.


Paste the script into the execution window by using CTRL+V keyboard shortcut, or the "paste" option via the right click menu. Click on Run to run the script, the PC will reboot. After the reboot the LOG subfolder is created in the folder with AVZ, with a file called virusinfo_syscure.zip inside. Upload that file to rapidshare.com and paste the link here.

Image Tutorial

2) Download and Run DDS which will create a Pseudo HJT Report as part of its log: DDS Tool Download Link. When done, DDS will open two (2) logs

   1. DDS.txt
   2. Attach.txt

Upload the logs to rapidshare.com and paste download link in your next reply.
Note: Disable any script-blocking programs and then double-click on the DDS.scr icon to start the program. If you did not disable a script-blocker that may be part of your antimalware program, you may receive a warning from your antimalware product asking if you would like DDS.scr to run. Please allow it to do so.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •


Ask Question