TechSpot

Trojan virus, please help

Solved
By necee99
Sep 8, 2012
  1. Broni

    Broni Malware Annihilator Posts: 46,808   +254

    You didn't say:
    [​IMG]

    ==========================================

    OTL logs are clean.

    Last scans...

    1. Download Security Check from HERE, and save it to your Desktop.
    • Double-click SecurityCheck.exe
    • Follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

      NOTE SecurityCheck may produce some false warning(s), so leave the results reading to me.

    2. Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
    • Make sure the following options are checked:
      • Internet Services
      • Windows Firewall
      • System Restore
      • Security Center
      • Windows Update
      • Windows Defender
    • Press "Scan".
    • It will create a log (FSS.txt) in the same directory the tool is run.
    • Please copy and paste the log to your reply.

    3. Please download AdwCleaner by Xplode onto your desktop.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Search.
    • A logfile will automatically open after the scan has finished.
    • Please post the contents of that logfile with your next reply.
    • You can find the logfile at C:\AdwCleaner[R1].txt as well.

    4. Download Temp File Cleaner (TFC)
    Alternate download: http://www.itxassociates.com/OT-Tools/TFC.exe
    • Double click on TFC.exe to run the program.
    • Click on Start button to begin cleaning process.
    • TFC will close all running programs, and it may ask you to restart computer.

    5. Please run a free online scan with the ESET Online Scanner

    • Disable your antivirus program
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • Accept any security warnings from your browser.
    • Check Scan archives
    • Click Start
    • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    • When the scan completes, click on List of found threats
    • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    • NOTE. If Eset won't find any threats, it won't produce any log.
  2. necee99

    necee99 TS Enthusiast Topic Starter Posts: 139

    Oh, sorry, thought it was a retorical question. lol:D. Computer seems to be performing fine. will complete next tasks. thanks. what do I need to do to the sd card I placed into the infected computer before it was clean? how can I not transfer virus, if there is one on card, from placing it in machine before internet connection was restored?
  3. necee99

    necee99 TS Enthusiast Topic Starter Posts: 139

    Results of screen317's Security Check version 0.99.50
    Windows 7 Service Pack 1 x64 (UAC is enabled)
    Internet Explorer 9
    ``````````````Antivirus/Firewall Check:``````````````
    Windows Firewall Enabled!
    McAfee Anti-Virus and Anti-Spyware
    WMI entry may not exist for antivirus; attempting automatic update.
    `````````Anti-malware/Other Utilities Check:`````````
    Malwarebytes Anti-Malware version 1.62.0.1300
    Java(TM) 6 Update 35
    Java version out of Date!
    Adobe Reader X (10.1.4)
    ````````Process Check: objlist.exe by Laurent````````
    Malwarebytes Anti-Malware mbamservice.exe
    Malwarebytes Anti-Malware mbamgui.exe
    `````````````````System Health check`````````````````
    Total Fragmentation on Drive C: 15% Defragment your hard drive soon! (Do NOT defrag if SSD!)
    ````````````````````End of Log``````````````````````
  4. necee99

    necee99 TS Enthusiast Topic Starter Posts: 139

    Farbar Service Scanner Version: 06-08-2012
    Ran by Kenyada (administrator) on 13-09-2012 at 08:51:01
    Running from "C:\Users\Kenyada\Desktop"
    Microsoft Windows 7 Home Premium Service Pack 1 (X64)
    Boot Mode: Normal
    ****************************************************************
    Internet Services:
    ============
    Connection Status:
    ==============
    Localhost is accessible.
    LAN connected.
    Google IP is accessible.
    Google.com is accessible.
    Yahoo IP is accessible.
    Yahoo.com is accessible.

    Windows Firewall:
    =============
    Firewall Disabled Policy:
    ==================

    System Restore:
    ============
    System Restore Disabled Policy:
    ========================

    Action Center:
    ============
    Windows Update:
    ============
    Windows Autoupdate Disabled Policy:
    ============================

    Windows Defender:
    ==============
    WinDefend Service is not running. Checking service configuration:
    The start type of WinDefend service is set to Demand. The default start type is Auto.
    The ImagePath of WinDefend service is OK.
    The ServiceDll of WinDefend service is OK.

    Windows Defender Disabled Policy:
    ==========================
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender]
    "DisableAntiSpyware"=DWORD:1

    Other Services:
    ==============

    File Check:
    ========
    C:\Windows\System32\nsisvc.dll => MD5 is legit
    C:\Windows\System32\drivers\nsiproxy.sys => MD5 is legit
    C:\Windows\System32\dhcpcore.dll => MD5 is legit
    C:\Windows\System32\drivers\afd.sys => MD5 is legit
    C:\Windows\System32\drivers\tdx.sys => MD5 is legit
    C:\Windows\System32\Drivers\tcpip.sys
    [2012-09-12 20:27] - [2012-08-22 13:12] - 1913200 ____A (Microsoft Corporation) F782CAD3CEDBB3F9FFE3BF2775D92DDC
    C:\Windows\System32\dnsrslvr.dll => MD5 is legit
    C:\Windows\System32\mpssvc.dll => MD5 is legit
    C:\Windows\System32\bfe.dll => MD5 is legit
    C:\Windows\System32\drivers\mpsdrv.sys => MD5 is legit
    C:\Windows\System32\SDRSVC.dll => MD5 is legit
    C:\Windows\System32\vssvc.exe => MD5 is legit
    C:\Windows\System32\wscsvc.dll => MD5 is legit
    C:\Windows\System32\wbem\WMIsvc.dll => MD5 is legit
    C:\Windows\System32\wuaueng.dll => MD5 is legit
    C:\Windows\System32\qmgr.dll => MD5 is legit
    C:\Windows\System32\es.dll => MD5 is legit
    C:\Windows\System32\cryptsvc.dll => MD5 is legit
    C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit
    C:\Windows\System32\ipnathlp.dll => MD5 is legit
    C:\Windows\System32\svchost.exe => MD5 is legit
    C:\Windows\System32\rpcss.dll => MD5 is legit

    **** End of log ****
  5. necee99

    necee99 TS Enthusiast Topic Starter Posts: 139

    # AdwCleaner v2.001 - Logfile created 09/13/2012 at 08:56:33
    # Updated 09/09/2012 by Xplode
    # Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
    # User : Kenyada - YADA
    # Boot Mode : Normal
    # Running from : C:\Users\Kenyada\Desktop\adwcleaner.exe
    # Option [Search]

    ***** [Services] *****

    ***** [Files / Folders] *****
    File Found : C:\Users\Public\Desktop\eBay.lnk
    Folder Found : C:\Program Files (x86)\Free Offers from Freeze.com
    Folder Found : C:\ProgramData\Ask
    ***** [Registry] *****
    Key Found : HKCU\Software\AppDataLow\Software\Freecause
    Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
    Key Found : HKLM\Software\Freeze.com
    Key Found : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
    Key Found : HKLM\SOFTWARE\Classes\Interface\{23119123-0854-469D-807A-171568457991}
    Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
    Key Found : HKU\S-1-5-21-2768975208-2880637573-2043491993-1001\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
    ***** [Internet Browsers] *****
    -\\ Internet Explorer v9.0.8112.16421
    [HKCU\Software\Microsoft\Internet Explorer\Main - Start Page] = hxxp://home.mywebsearch.com/index.jhtml?n=77DE8857&ptnrS=XPxdm118YYus&ptb=A6233D46-F379-4274-BEAF-5CC731340E36&si=bing_tvfanshows-broad
    *************************
    AdwCleaner[R1].txt - [1511 octets] - [13/09/2012 08:56:33]
    ########## EOF - C:\AdwCleaner[R1].txt - [1571 octets] ##########
  6. necee99

    necee99 TS Enthusiast Topic Starter Posts: 139

    Eset found viruses
    C:\TDSSKiller_Quarantine\09.09.2012_20.50.45\mbr0000\tdlfs0000\tsk0000.dta a variant of Win32/Olmarik.AYI trojan cleaned by deleting - quarantined
    C:\TDSSKiller_Quarantine\09.09.2012_20.50.45\mbr0000\tdlfs0000\tsk0001.dta Win64/Olmarik.AK trojan cleaned by deleting - quarantined
    C:\TDSSKiller_Quarantine\09.09.2012_20.50.45\mbr0000\tdlfs0000\tsk0002.dta Win64/Olmarik.AL trojan cleaned by deleting - quarantined
    C:\TDSSKiller_Quarantine\09.09.2012_20.50.45\mbr0000\tdlfs0000\tsk0003.dta a variant of Win32/Rootkit.Kryptik.NP trojan cleaned by deleting - quarantined
    C:\TDSSKiller_Quarantine\09.09.2012_20.50.45\mbr0000\tdlfs0000\tsk0010.dta a variant of Win32/Olmarik.AYI trojan cleaned by deleting - quarantined
  7. Broni

    Broni Malware Annihilator Posts: 46,808   +254

    Install Panda USB Vaccine, or BitDefenderā€™s USB Immunizer on your computer to protect it from any infected USB device.
    Then you're safe to scan it with your AV program.

    ============================================

    • Close all open programs and internet browsers.
    • Double click on adwcleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the contents of that logfile with your next reply.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.

    Next...

    • Double click on adwcleaner.exe to run the tool.
    • Click on Uninstall.
    • Confirm with yes.

    =======================================

    Your computer is clean [​IMG]

    1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

    Run OTL

    • Under the Custom Scans/Fixes box at the bottom, paste in the following:

    Code:
    :OTL
    :Commands
    [purity]
    [emptytemp]
    [EMPTYFLASH]
    [emptyjava]
    [CLEARALLRESTOREPOINTS]
    [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • Post resulting log.

    2. Now, we'll remove all tools, we used during our cleaning process

    Clean up with OTL:

    • Double-click OTL.exe to start the program.
    • Close all other programs apart from OTL as this step will require a reboot
    • On the OTL main screen, press the CLEANUP button
    • Say Yes to the prompt and then allow the program to reboot your computer.

    If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

    3. Make sure, Windows Updates are current.

    4. If any trojans, rootkits or bootkits were listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

    7. Run Temporary File Cleaner (TFC) weekly.

    8. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

    9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
    The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

    10. (Windows XP only) Run defrag at your convenience.

    11. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

    12. Read:
    How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html
    Simple and easy ways to keep your computer safe and secure on the Internet: http://www.bleepingcomputer.com/tutorials/keep-your-computer-safe-online/

    13. Please, let me know, how your computer is doing.
  8. necee99

    necee99 TS Enthusiast Topic Starter Posts: 139

    Btw. when I restored computer back to be able to get internet connection back. the only restore point was well before running any of the previous programs.

    # AdwCleaner v2.001 - Logfile created 09/14/2012 at 08:41:43
    # Updated 09/09/2012 by Xplode
    # Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
    # User : Kenyada - YADA
    # Boot Mode : Normal
    # Running from : C:\Users\Kenyada\Desktop\adwcleaner.exe
    # Option [Delete]

    ***** [Services] *****

    ***** [Files / Folders] *****
    File Deleted : C:\Users\Public\Desktop\eBay.lnk
    Folder Deleted : C:\Program Files (x86)\Free Offers from Freeze.com
    Folder Deleted : C:\ProgramData\Ask
    ***** [Registry] *****
    Key Deleted : HKCU\Software\AppDataLow\Software\Freecause
    Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
    Key Deleted : HKLM\Software\Freeze.com
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
    Key Deleted : HKLM\SOFTWARE\Classes\Interface\{23119123-0854-469D-807A-171568457991}
    Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
    ***** [Internet Browsers] *****
    -\\ Internet Explorer v9.0.8112.16421
    Restored : [HKCU\Software\Wow6432Node\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
    Restored : [HKCU\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
    Restored : [HKU\S-1-5-19\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
    Restored : [HKU\S-1-5-20\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
    Replaced : [HKCU\Software\Microsoft\Internet Explorer\Main - Start Page] = hxxp://home.mywebsearch.com/index.jhtml?n=77DE8857&ptnrS=XPxdm118YYus&ptb=A6233D46-F379-4274-BEAF-5CC731340E36&si=bing_tvfanshows-broad --> hxxp://www.google.com
    *************************
    AdwCleaner[R1].txt - [1634 octets] - [13/09/2012 08:56:33]
    AdwCleaner[S1].txt - [1839 octets] - [14/09/2012 08:41:43]
    ########## EOF - C:\AdwCleaner[S1].txt - [1899 octets] ##########
  9. Broni

    Broni Malware Annihilator Posts: 46,808   +254

  10. necee99

    necee99 TS Enthusiast Topic Starter Posts: 139

    All processes killed
    ========== OTL ==========
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: Administrator
    ->Temp folder emptied: 0 bytes

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Kenyada
    ->Temp folder emptied: 2193401 bytes
    ->Temporary Internet Files folder emptied: 20683548 bytes
    ->Java cache emptied: 0 bytes
    ->Flash cache emptied: 1020 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32 (64bit) .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 10183 bytes
    %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 50132 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 22.00 mb


    [EMPTYFLASH]

    User: Administrator

    User: All Users

    User: Default

    User: Default User

    User: Kenyada
    ->Flash cache emptied: 0 bytes

    User: Public

    Total Flash Files Cleaned = 0.00 mb


    [EMPTYJAVA]

    User: Administrator

    User: All Users

    User: Default

    User: Default User

    User: Kenyada
    ->Java cache emptied: 0 bytes

    User: Public

    Total Java Files Cleaned = 0.00 mb

    Restore point Set: OTL Restore Point

    OTL by OldTimer - Version 3.2.61.3 log created on 09152012_111243
    Files\Folders moved on Reboot...
    C:\Users\Kenyada\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DF07EB97828A4D1B16.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DF0B273150E7F62440.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DF181837CD44870C9D.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DF3262311DE3F35A57.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DF62A1A8E76E80D432.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DF820F11217A29768C.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DF86663B5A8FDD0793.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DF89C7A005F5BE1031.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DF8A56C5188B11CABD.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DF8A88497345273FD9.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DF9028818FCD987AB4.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DFAC3ED98868991F68.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DFAFE3036BC6227792.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DFB31399A97B14E3D5.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DFC476DF90359A2AE1.TMP not found!
    File\Folder C:\Users\Kenyada\AppData\Local\Temp\~DFF3C94A4385EE7662.TMP not found!
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TG6V2JPB\918[1].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\TG6V2JPB\net[1].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\NCQBSWTC\B6894069[1].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\LI8CIEES\B6894069[1].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\LI8CIEES\bizo_multi[1].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6XZ8ZPAN\B6894069[1].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6XZ8ZPAN\B6894069[2].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6XZ8ZPAN\billboard[1].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6XZ8ZPAN\billboard[2].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6XZ8ZPAN\partner[1].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6XZ8ZPAN\partner[2].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\6XZ8ZPAN\partner[3].htm moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\AntiPhishing\ED8654D5-B9F0-4DD9-B3E8-F8F560086FDF.dat moved successfully.
    C:\Users\Kenyada\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DAT moved successfully.
    PendingFileRenameOperations files...
    Registry entries deleted on Reboot...
  11. Broni

    Broni Malware Annihilator Posts: 46,808   +254

     
  12. necee99

    necee99 TS Enthusiast Topic Starter Posts: 139

    Computer seems to be responding unusually slow. like delayed.
  13. Broni

    Broni Malware Annihilator Posts: 46,808   +254

    Turn the computer off.
    Wait 1 minute.
    Start it up again.
  14. necee99

    necee99 TS Enthusiast Topic Starter Posts: 139

    I guess things are going good now. thanks for all your help. one more question. will reformating or formatting my sd card remove any viruses, if any from the card, if any were transfered. I have downloaded bit defender.
  15. Broni

    Broni Malware Annihilator Posts: 46,808   +254

    Way to go!! [​IMG]
    Good luck and stay safe :)


Add New Comment

TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...


Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.