Virus disables avg and diverts searches

Acer Aspire 5920
July 24, 2009 at 14:09:57
Specs: Microsoft Windows Vista Home Premium, 1.833 GHz / 3061 MB
Well I managed to get rid of the trojan part...I think but there's still something there, my computer runs quite slow and when I search on search engines and click a link I get diverted to another site unless I open in a new tab. Norton detected a backdoor.tideserv virus and here is a log:

;***********************************************************************************************************************************************************************************
ANALYSIS: 2009-07-04 08:52:11
PROTECTIONS: 3
MALWARE: 15
SUSPECTS: 2
;***********************************************************************************************************************************************************************************
PROTECTIONS
Description Version Active Updated
;===================================================================================================================================================================================
Norton Internet Security 15.0.0.60 Yes Yes
Windows Defender 1.1.1505.0 No Yes
Norton Internet Security 15.0.0.60 No Yes
;===================================================================================================================================================================================
MALWARE
Id Description Type Active Severity Disinfectable Disinfected Location
;===================================================================================================================================================================================
00139059 Cookie/Traffic Marketplace TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@trafficmp[1].txt
00139061 Cookie/Doubleclick TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@doubleclick[2].txt
00139064 Cookie/Atlas DMT TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@atdmt[2].txt
00145405 Cookie/RealMedia TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@247realmedia[1].txt
00145738 Cookie/Mediaplex TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@mediaplex[1].txt
00168056 Cookie/YieldManager TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad.yieldmanager[1].txt
00168061 Cookie/Apmebf TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@apmebf[1].txt
00168076 Cookie/BurstNet TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@burstnet[2].txt
00168090 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@serving-sys[1].txt
00168093 Cookie/Serving-sys TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@bs.serving-sys[1].txt
00168109 Cookie/Adtech TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adtech[1].txt
00170495 Cookie/PointRoll TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.pointroll[2].txt
00172221 Cookie/Zedo TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@zedo[1].txt
00207936 Cookie/Adviva TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adviva[1].txt
01606636 Cookie/Adserver TrackingCookie No 0 Yes No C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adserver.easyad[1].txt
;===================================================================================================================================================================================
SUSPECTS
Sent Location �QvlP���9
;===================================================================================================================================================================================
Yes C:\Windows\System32\MSIVXjblrtvpncoijcniijtpppmtdpmkikehr.dll �QvlP���9
Yes C:\Windows\System32\MSIVXmvvnemurtotapsxbcyweopqtctfxncxq.dll �QvlP���9
;===================================================================================================================================================================================
VULNERABILITIES
Id Severity Description �QvlP���9
;===================================================================================================================================================================================
;===================================================================================================================================================================================


See More: Virus disables avg and diverts searches

Report •


#1
July 24, 2009 at 14:52:24
Note: I can help you remove malware manually. Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible. First Track this topic. Then follow:

1) Can you please post your AVZ log:
Note: Run AVZ in windows normal mode and make sure you are connect to internet. If avz.exe doesn't start, then try to rename the file avz.exe to something else and try to run it again. Make sure you have your web browser open in background before following the steps below.

i) To create the log file, download AVZ by clicking HERE. Please save this file to your desktop or "My Documents" folder.

ii) Next, unpack the file to a new folder using the Compressed (zipped) folders wizard built into Windows XP/Vista, or a zip utility of your choice.

iii) Once you have unpacked the contents of the zip archive, please launch the file AVZ.exe by double clicking on it or right clicking and selecting Open.
Note: If you are running Windows vista launch AVZ.exe by right clicking and selecting Run as Administrator.

You should now see the main window of the AVZ utility. Please navigate to File->Custom Scripts. Copy the script below by using the keyboard shortcut CTRL+C or the corresponding option via right click.

begin
ExecuteAVUpdateEx( 'http://avz.virusinfo.info/avz_up/', 1, '','','');
ExecuteStdScr(3);
RebootWindows(true);
end.


Paste the script into the execution window by using CTRL+V keyboard shortcut, or the "paste" option via the right click menu. Click on Run to run the script, the PC will reboot. After the reboot the LOG subfolder is created in the folder with AVZ, with a file called virusinfo_syscure.zip inside. Upload that file to rapidshare.com and paste the link here.

Image Tutorial

2) Follow these steps in order numbered:

1) Download GMER: http://gmer.net/download.php
[This version will download a randomly named file (Recommended).]

2) Disconnect from the Internet and close all running programs.

3) Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.

4) Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.

5) GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)

6) If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.

7) Now click the Scan button. If you see a rootkit warning window, click OK.

8) When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log and upload it rapidshare.com. Post the download link to the uploaded file in your post.

9) Exit GMER and re-enable all active protection when done.

Note: Please give me the exact name of the file you downloaded in step 1 + post your log from step 8 in your next post.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •
Related Solutions


Ask Question