Sorry for butting into this string instead of starting a new topic, but I seem to have a similar problem as described in the original post, meaning Avast is detecting threats in PROCESSES, and there seems to be no option to delete, repair, sent to chest, or otherwise remove the infection.
I am running Avast 5.0.677, virus definitions version 100915-1 on Windows XP, Service Pack 3.
Lavasoft Ad-Aware is usually running in the background, and I manually scan with MBAM and SuperAntiSpyware once or twice a week.
The first sign of a problem occurred on Sept. 14th, when clicking links on Google search results would re-direct the browser to other websites (ad sites, gaming sites, etc).
Scanning with MBAM and SuperAntiSpyware didn’t show any results then (all clean), but Avast reported a Win32:DNSChanger-VJ[Trj] in Process “svchost.exe” with no options other than the “move to chest” on the “apply to all” window, but the “Apply” button seemed disabled.
I rebooted, hoping to re-scan and perhaps fix the issue, but received a BSOD (0x0000007B) on both normal, last known good configuration, and safe mode boot attempts. Booting from an Ultimate Boot CD for Windows, showed that the C: drive letter had been changed to D:, and my secondary (storage only) hard drive was now marked as drive C:
Removing the secondary hard drive restored the correct drive letter C: to the system disc, and fixed the BSOD issue at least long enough to update all virus definition databases.
I started to re-scan, but then got hit with the “Anti-Virus 2010” pop-up, so I immediately terminated my Internet connection and set to remove all traces of the “Anti-Virus 2010”.
A full MBAM scan (log available if necessary) found, quarantined and removed “C:\WINDOWS\system32\us?rinit.exe (Rogue.Antivirus2010)”, and there was no problem with rebooting.
Then I ran a full scan with Avast, and this time I received two (2) reports of the
“Win32:DNSChanger-VJ[Trj]”
The first one in Process 1088 [svchost.exe], and a second one in Process 1576 [explorer.exe]
BOTH reported in memory block 0x00000000001A0000, block size 81920, Severity: High
and again no way to delete, repair, move, etc.
I followed the instructions of essexboy (link in quote at the top), and I’ve attached the MBAM Quick Scan log (which is showing the SAME “C:\WINDOWS\system32\us?rinit.exe (Rogue.Antivirus2010)” infection that was previously supposed to have been deleted under the full scan.
I also ran OTL, 3 times as a matter of fact, but it only produced an OTL.txt file (attached, and never an Extras.txt file.
To make a long story short, I really could use some help please on how to remove this “Win32:DNSChanger-VJ[Trj]” from those processes. (don’t think they’re false positives, because of the original browser-redirect problem).
Any kind of help or advice would be deeply appreciated.