Malicious URL blocked

Every 15 seconds I get an alert that states “Malicious URL blocked”
I have attached 2 screenshots, one which shows the alert (MAL URL2.bmp) and one which shows the URl that is addressed (MAL URL1.bmp). I tried to uninstall and reinstall avast, but that was definitely not the right fix.

I just had 3 alerts in a row, and they all looked to be different URLS and services …

This needs further analysis by a malware removal specialist:
Go to this topic http://forum.avast.com/index.php?topic=53253.0 for information on Logs to assist in cleaning malware. Use the information about getting and using the tools and attach the logs here, not in the LOGS topic.

Malwarebytes Anti-Malware (Trial) 1.62.0.1300
www.malwarebytes.org

Database version: v2012.07.29.08

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Bobby :: BOBBY-PC [administrator]

Protection: Enabled

7/29/2012 1:02:00 PM
mbam-log-2012-07-29 (13-02-00).txt

Scan type: Full scan (C:|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 326634
Time elapsed: 41 minute(s), 32 second(s)

Memory Processes Detected: 1
C:\Windows\svchost.exe (Trojan.Agent) → 5276 → Delete on reboot.

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 30
HKCR\CLSID{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\funmoods.funmoodsHlpr.1 (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\funmoods.funmoodsHlpr (PUP.Funmoods) → Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\CLSID{75A4D144-506D-4BE5-81DB-EC7DA1E7F840} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\TypeLib{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\esrv.funmoodsESrvc.1 (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\esrv.funmoodsESrvc (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\CLSID{965B9DBE-B104-44AC-950A-8A5F97AFF439} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\escort.escortIEPane.1 (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\escort.escortIEPane (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\CLSID{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\TypeLib{4E1E9D45-8BF9-4139-915C-9F83CC3D5921} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\funmoods.dskBnd.1 (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\funmoods.dskBnd (PUP.Funmoods) → Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\CLSID{A9DB719C-7156-415E-B49D-BAD039DE4F13} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\TypeLib{D7EE8177-D51E-4F89-92B6-83EA2EC40800} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\funmoodsApp.appCore.1 (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\funmoodsApp.appCore (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\CLSID{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\f (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\Typelib{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3} (PUP.Funmoods) → Quarantined and deleted successfully.
HKCR\Interface{0D80F1C5-D17B-4177-AC68-955F3EF9F191} (PUP.Funmoods) → Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy{C87FC351-A80D-43E9-9A86-CF1E29DC443A} (PUP.Funmoods) → Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\funmoods (PUP.FunMoods) → Quarantined and deleted successfully.
HKLM\SOFTWARE\Google\chrome\Extensions\fdloijijlkoblmigdofommgnheckmaki (PUP.Funmoods) → Quarantined and deleted successfully.

Registry Values Detected: 3
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar|{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) → Data: Funmoods Toolbar → Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} (PUP.Funmoods) → Data: → Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\funmoods|UninstallString (PUP.Funmoods) → Data: “C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\uninstall.exe” → Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 2
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16 (PUP.Funmoods) → Quarantined and deleted successfully.
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\bh (PUP.Funmoods) → Quarantined and deleted successfully.

Files Detected: 13
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\bh\funmoods.dll (PUP.Funmoods) → Quarantined and deleted successfully.
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe (PUP.Funmoods) → Quarantined and deleted successfully.
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsTlbr.dll (PUP.Funmoods) → Quarantined and deleted successfully.
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsApp.dll (PUP.Funmoods) → Quarantined and deleted successfully.
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsEng.dll (PUP.Funmoods) → Quarantined and deleted successfully.
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\uninstall.exe (PUP.FunMoods) → Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\DRM\C726.tmp.dat (Trojan.Agent.EXPD1) → Quarantined and deleted successfully.
C:\Users\Bobby\AppData\Local\Temp\21D7.tmp (Trojan.Agent.EXPD1) → Quarantined and deleted successfully.
C:\Users\Bobby\Downloads\SoftonicDownloader_for_microsoft-powerpoint-viewer.exe (PUP.ToolbarDownloader) → Quarantined and deleted successfully.
C:\Windows\svchost.exe (Trojan.Agent) → Delete on reboot.
C:\Users\Bobby\AppData\Local\Temp\0.4710249615934511 (Exploit.Drop.9) → Quarantined and deleted successfully.
C:\Users\Bobby\AppData\Local\Temp.exe (Trojan.Agent) → Quarantined and deleted successfully.
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsOEM.crx (PUP.Funmoods) → Quarantined and deleted successfully.

(end)

OTL.txt and Extras.txt attached

I am now getting a message that Malwarebytes is blocking an outgoing to 206.161.121.3 from avastsvc.exe
That probably shouldn’t be happening?
And still getting the Malicious URL blocked message at least 3 or 4 times per minute

ASWMBR log:

aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-07-29 14:34:42

14:34:42.807 OS Version: Windows x64 6.1.7601 Service Pack 1
14:34:42.807 Number of processors: 4 586 0x2A07
14:34:42.808 ComputerName: BOBBY-PC UserName: Bobby
14:34:46.601 Initialize success
14:34:46.708 AVAST engine defs: 12072901
14:35:04.326 Disk 0 (boot) \Device\Harddisk0\DR0 → \Device\Ide\IAAStorageDevice-1
14:35:04.326 Disk 0 Vendor: TOSHIBA_ GN00 Size: 610480MB BusType: 3
14:35:04.326 Device \Driver\iaStor → MajorFunction fffffa80092325e8
14:35:04.336 Disk 0 MBR read successfully
14:35:04.346 Disk 0 MBR scan
14:35:04.356 Disk 0 Windows 7 default MBR code
14:35:04.376 Disk 0 Partition 1 00 27 Hidden NTFS WinRE NTFS 18432 MB offset 2048
14:35:04.396 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 37750784
14:35:04.406 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 591946 MB offset 37955584
14:35:04.436 Disk 0 scanning C:\Windows\system32\drivers
14:35:12.068 Service scanning
14:35:42.621 Modules scanning
14:35:42.631 Disk 0 trace - called modules:
14:35:42.641 ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0xfffffa80092325e8]<<
14:35:42.651 1 nt!IofCallDriver → \Device\Harddisk0\DR0[0xfffffa8008aae060]
14:35:42.651 3 CLASSPNP.SYS[fffff88001a0143f] → nt!IofCallDriver → \Device\Ide\IAAStorageDevice-1[0xfffffa80062d0050]
14:35:42.661 \Driver\iaStor[0xfffffa80089a59e0] → IRP_MJ_CREATE → 0xfffffa80092325e8
14:35:45.242 AVAST engine scan C:\Windows
14:35:47.893 AVAST engine scan C:\Windows\system32
14:37:37.600 AVAST engine scan C:\Windows\system32\drivers
14:37:49.724 AVAST engine scan C:\Users\Bobby
14:39:40.635 Disk 0 MBR has been saved successfully to “C:\Users\Bobby\Desktop\MBR.dat”
14:39:40.645 The log file has been saved successfully to “C:\Users\Bobby\Desktop\aswMBR.txt”

A malware removal specialist has been informed of your topic.

Alas this is a different infection although it has similar elements and TDSSKiller will be but one part of the fix

Warning This fix is only relevant for this system and no other, using on another computer may cause problems

Be advised that when the fix commences it will shut down all running processes and you may lose the desktop and icons, they will return on reboot

Run OTL

[*]Under the Custom Scans/Fixes box at the bottom, paste in the following

https://dl.dropbox.com/u/73555776/OTL_Fix.GIF

:OTL [2012/07/29 13:58:56 | 000,020,480 | ---- | C] (Microsoft Corporation) -- C:\Windows\svchost.exe [2012/07/25 23:47:51 | 000,000,000 | ---D | C] -- C:\Users\Bobby\AppData\Roaming\BabylonToolbar [2012/07/25 23:47:44 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\BabylonToolbar [2012/07/25 23:47:34 | 000,000,000 | ---D | C] -- C:\Users\Bobby\AppData\Roaming\Babylon [2012/07/25 23:47:34 | 000,000,000 | ---D | C] -- C:\ProgramData\Babylon

:Files
ipconfig /flushdns /c

:Commands
[purity]
[resethosts]
[emptytemp]
[CREATERESTOREPOINT]
[Reboot]


[*]Then click the Run Fix button at the top
[*]Let the program run unhindered, reboot the PC when it is done
[*]Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.

THEN

Download the latest version of TDSSKiller from here and save it to your Desktop.

[*]Doubleclick on TDSSKiller.exe to run the application

http://dl.dropbox.com/u/73555776/TDSSFront.JPG

[*]Then click on Change parameters.

http://dl.dropbox.com/u/73555776/TDSSConfig.JPG

[*]Check the boxes beside Verify Driver Digital Signature and Detect TDLFS file system, then click OK.

[*]Click the Start Scan button.

[*]If a suspicious object is detected, the default action will be Skip, click on Continue.

http://dl.dropbox.com/u/73555776/TDSSFound.JPG

[*]If malicious objects are found, they will show in the Scan results and offer three (3) options.
[*]Ensure Cure is selected, then click Continue => Reboot now to finish the cleaning process.

[*]Get the report by selecting Reports

http://dl.dropbox.com/u/73555776/TDSSEnd.JPG

[*]Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

Please copy and paste its contents on your next reply.

FINALLY

Download and Install Combofix

Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

  • IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here

[*]Double click on ComboFix.exe & follow the prompts.
[*]Accept the disclaimer and allow to update if it asks

http://img.photobucket.com/albums/v706/ried7/NSIS_disclaimer_ENG.png

http://img.photobucket.com/albums/v706/ried7/NSIS_extraction.png

[*]When finished, it shall produce a log for you.
[*]Please include the C:\ComboFix.txt in your next reply.

Notes:

  1. Do not mouse-click Combofix’s window while it is running. That may cause it to stall.
  2. Do not “re-run” Combofix. If you have a problem, reply back for further instructions.
  3. If after the reboot you get errors about programmes being marked for deletion then reboot, that will cure it.

Please make sure you include the combo fix log in your next reply as well as describe how your computer is running now

I had run the kaspersky program when that other user posted it, I thought that was from the moderator. Now I see it wasn’t, I’m really new to using forums. The Malicious URL notice did stop. I am about to run the OTL fix and the ComboFix, will let you know if anything comes up

Not a problem it will cause no damage as long as it is used properly

Could you attach the log please as I will need to confirm it was a TDL infection and it has all gone

NEW OTL logfile attached

THE FIRST TIME I RAN KASPERSKY IT FOUND THREE THREATS THAT WERE “CURED”. I DONt SEE THAT IN THIS REPORT

I only need to see the last 20 lines at the most on the TDSSKiller log

HERE IS THE LAST COUPLE PAGES OF THE KASPERSKY REPORT AND THE COMBOFIX LOG IS ATTACHED.

16:46:55.0815 0800 W32Time (1c9d80cc3849b3788048078c26486e1a) C:\Windows\system32\w32time.dll
16:46:55.0925 0800 W32Time - ok
16:46:55.0940 0800 WacomPen (4e9440f4f152a7b944cb1663d3935a3e) C:\Windows\system32\drivers\wacompen.sys
16:46:56.0003 0800 WacomPen - ok
16:46:56.0049 0800 WANARP (356afd78a6ed4457169241ac3965230c) C:\Windows\system32\DRIVERS\wanarp.sys
16:46:56.0143 0800 WANARP - ok
16:46:56.0143 0800 Wanarpv6 (356afd78a6ed4457169241ac3965230c) C:\Windows\system32\DRIVERS\wanarp.sys
16:46:56.0190 0800 Wanarpv6 - ok
16:46:56.0299 0800 WatAdminSvc (3cec96de223e49eaae3651fcf8faea6c) C:\Windows\system32\Wat\WatAdminSvc.exe
16:46:56.0361 0800 WatAdminSvc - ok
16:46:56.0439 0800 wbengine (78f4e7f5c56cb9716238eb57da4b6a75) C:\Windows\system32\wbengine.exe
16:46:56.0517 0800 wbengine - ok
16:46:56.0642 0800 WbioSrvc (3aa101e8edab2db4131333f4325c76a3) C:\Windows\System32\wbiosrvc.dll
16:46:56.0689 0800 WbioSrvc - ok
16:46:56.0720 0800 wcncsvc (7368a2afd46e5a4481d1de9d14848edd) C:\Windows\System32\wcncsvc.dll
16:46:56.0783 0800 wcncsvc - ok
16:46:56.0798 0800 WcsPlugInService (20f7441334b18cee52027661df4a6129) C:\Windows\System32\WcsPlugInService.dll
16:46:56.0829 0800 WcsPlugInService - ok
16:46:56.0876 0800 Wd (72889e16ff12ba0f235467d6091b17dc) C:\Windows\system32\drivers\wd.sys
16:46:56.0907 0800 Wd - ok
16:46:56.0985 0800 Wdf01000 (441bd2d7b4f98134c3a4f9fa570fd250) C:\Windows\system32\drivers\Wdf01000.sys
16:46:57.0048 0800 Wdf01000 - ok
16:46:57.0063 0800 WdiServiceHost (bf1fc3f79b863c914687a737c2f3d681) C:\Windows\system32\wdi.dll
16:46:57.0126 0800 WdiServiceHost - ok
16:46:57.0126 0800 WdiSystemHost (bf1fc3f79b863c914687a737c2f3d681) C:\Windows\system32\wdi.dll
16:46:57.0141 0800 WdiSystemHost - ok
16:46:57.0188 0800 WebClient (3db6d04e1c64272f8b14eb8bc4616280) C:\Windows\System32\webclnt.dll
16:46:57.0235 0800 WebClient - ok
16:46:57.0266 0800 Wecsvc (c749025a679c5103e575e3b48e092c43) C:\Windows\system32\wecsvc.dll
16:46:57.0329 0800 Wecsvc - ok
16:46:57.0360 0800 wercplsupport (7e591867422dc788b9e5bd337a669a08) C:\Windows\System32\wercplsupport.dll
16:46:57.0391 0800 wercplsupport - ok
16:46:57.0438 0800 WerSvc (6d137963730144698cbd10f202e9f251) C:\Windows\System32\WerSvc.dll
16:46:57.0531 0800 WerSvc - ok
16:46:57.0594 0800 WfpLwf (611b23304bf067451a9fdee01fbdd725) C:\Windows\system32\DRIVERS\wfplwf.sys
16:46:57.0656 0800 WfpLwf - ok
16:46:57.0687 0800 WIMMount (05ecaec3e4529a7153b3136ceb49f0ec) C:\Windows\system32\drivers\wimmount.sys
16:46:57.0687 0800 WIMMount - ok
16:46:57.0734 0800 WinDefend - ok
16:46:57.0750 0800 WinHttpAutoProxySvc - ok
16:46:57.0812 0800 Winmgmt (19b07e7e8915d701225da41cb3877306) C:\Windows\system32\wbem\WMIsvc.dll
16:46:57.0906 0800 Winmgmt - ok
16:46:57.0999 0800 WinRM (bcb1310604aa415c4508708975b3931e) C:\Windows\system32\WsmSvc.dll
16:46:58.0093 0800 WinRM - ok
16:46:58.0249 0800 WinUsb (fe88b288356e7b47b74b13372add906d) C:\Windows\system32\DRIVERS\WinUsb.sys
16:46:58.0296 0800 WinUsb - ok
16:46:58.0374 0800 Wlansvc (4fada86e62f18a1b2f42ba18ae24e6aa) C:\Windows\System32\wlansvc.dll
16:46:58.0483 0800 Wlansvc - ok
16:46:58.0545 0800 wlcrasvc (06c8fa1cf39de6a735b54d906ba791c6) C:\Program Files\Windows Live\Mesh\wlcrasvc.exe
16:46:58.0561 0800 wlcrasvc - ok
16:46:58.0701 0800 wlidsvc (2bacd71123f42cea603f4e205e1ae337) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
16:46:58.0764 0800 wlidsvc - ok
16:46:58.0873 0800 WmiAcpi (f6ff8944478594d0e414d3f048f0d778) C:\Windows\system32\DRIVERS\wmiacpi.sys
16:46:58.0920 0800 WmiAcpi - ok
16:46:58.0998 0800 wmiApSrv (38b84c94c5a8af291adfea478ae54f93) C:\Windows\system32\wbem\WmiApSrv.exe
16:46:59.0076 0800 wmiApSrv - ok
16:46:59.0154 0800 WMPNetworkSvc - ok
16:46:59.0201 0800 WPCSvc (96c6e7100d724c69fcf9e7bf590d1dca) C:\Windows\System32\wpcsvc.dll
16:46:59.0232 0800 WPCSvc - ok
16:46:59.0263 0800 WPDBusEnum (93221146d4ebbf314c29b23cd6cc391d) C:\Windows\system32\wpdbusenum.dll
16:46:59.0294 0800 WPDBusEnum - ok
16:46:59.0325 0800 ws2ifsl (6bcc1d7d2fd2453957c5479a32364e52) C:\Windows\system32\drivers\ws2ifsl.sys
16:46:59.0372 0800 ws2ifsl - ok
16:46:59.0403 0800 wscsvc (e8b1fe6669397d1772d8196df0e57a9e) C:\Windows\System32\wscsvc.dll
16:46:59.0450 0800 wscsvc - ok
16:46:59.0450 0800 WSearch - ok
16:46:59.0591 0800 wuauserv (d9ef901dca379cfe914e9fa13b73b4c4) C:\Windows\system32\wuaueng.dll
16:46:59.0669 0800 wuauserv - ok
16:46:59.0778 0800 WudfPf (d3381dc54c34d79b22cee0d65ba91b7c) C:\Windows\system32\drivers\WudfPf.sys
16:46:59.0871 0800 WudfPf - ok
16:46:59.0918 0800 WUDFRd (cf8d590be3373029d57af80914190682) C:\Windows\system32\DRIVERS\WUDFRd.sys
16:47:00.0027 0800 WUDFRd - ok
16:47:00.0074 0800 wudfsvc (7a95c95b6c4cf292d689106bcae49543) C:\Windows\System32\WUDFSvc.dll
16:47:00.0152 0800 wudfsvc - ok
16:47:00.0183 0800 WwanSvc (9a3452b3c2a46c073166c5cf49fad1ae) C:\Windows\System32\wwansvc.dll
16:47:00.0261 0800 WwanSvc - ok
16:47:00.0308 0800 MBR (0x1B8) (a36c5e4f47e84449ff07ed3517b43a31) \Device\Harddisk0\DR0
16:47:01.0478 0800 \Device\Harddisk0\DR0 ( TDSS File System ) - warning
16:47:01.0478 0800 \Device\Harddisk0\DR0 - detected TDSS File System (1)
16:47:01.0509 0800 Boot (0x1200) (f9c07dcd4dda07b53738dfa5cd175672) \Device\Harddisk0\DR0\Partition0
16:47:01.0525 0800 \Device\Harddisk0\DR0\Partition0 - ok
16:47:01.0541 0800 Boot (0x1200) (4e352787ed8dc5e0c27b54acbbdd8a78) \Device\Harddisk0\DR0\Partition1
16:47:01.0541 0800 \Device\Harddisk0\DR0\Partition1 - ok
16:47:01.0541 0800 ============================================================
16:47:01.0541 0800 Scan finished
16:47:01.0541 0800 ============================================================
16:47:01.0556 4040 Detected object count: 2
16:47:01.0556 4040 Actual detected object count: 2
16:47:14.0255 4040 Freemake Improver ( UnsignedFile.Multi.Generic ) - skipped by user
16:47:14.0255 4040 Freemake Improver ( UnsignedFile.Multi.Generic ) - User select action: Skip
16:47:14.0255 4040 \Device\Harddisk0\DR0 ( TDSS File System ) - skipped by user
16:47:14.0255 4040 \Device\Harddisk0\DR0 ( TDSS File System ) - User select action: Skip

The Malicious URL alert has stopped. I honestly didn’t see any other ill effects other than the alert. Computer seems to be running fine. Is there anything in nparticular I should tell my son about how this virus came to his comuter? He’s 12 and has a habit of accepting toolbars and the like.
Thanks for all the help,
Bob

Could you re-run TDSSKiller please.
When you get to this detection select delete:

\Device\Harddisk0\DR0 ( TDSS File System )

How is the computer now ?

Computer seems to be rinning fine, thank you very much. When I deleted that file with TDSS killer, avast gave a Malware Blocked alert, I assume that was supposed to happen. Any more scans or logs you need?

If you could just confirm that windows updates is working

Reference toolbars, all they really do is slow down the computer and fill it full of junk ;D

Subject to no further problems :slight_smile:

I will remove my tools now and give some recommendations, but, I would like you to run for 24 hours or so and come back if you have any problems

Now the best part of the day ----- Your log now appears clean :thumbsup:

A good workman always cleans up after himself so…The following will implement some cleanup procedures as well as reset System Restore points:

Run OTL
[*]Under the Custom Scans/Fixes box at the bottom, paste in the following

:Commands [resethosts] [emptytemp] [Reboot]

[*]Then click the Run Fix button at the top
[*]Let the program run unhindered, reboot the PC when it is done

Remove ComboFix

[*]Hold down the Windows key + R on your keyboard. This will display the Run dialogue box
[*]In the Run box, type in ComboFix /Uninstall (Notice the space between the “x” and “/”) then click OK

http://i1224.photobucket.com/albums/ee362/Essexboy3/Misc%20screen%20shots/CF_Uninstall-1.jpg

[]Follow the prompts on the screen
[
]A message should appear confirming that ComboFix was uninstalled

Run OTL and hit the cleanup button. It will remove all the programmes we have used plus itself.

We will now confirm that your hidden files are set to that, as some of the tools I use will change that

[*]Go to control panel
[*]Select folder options (Appearance > Folder options in category view)
[*]Select the View Tab.
[*]Under the Hidden files and folders heading select Do not show hidden files and folders.
[]Click Yes to confirm.
[
]Click OK.

http://users.telenet.be/bluepatchy/miekiemoes/images/javaicon.gif

Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system.
Please follow these steps to remove older version of Java components and upgrade the application.

Upgrading Java:

[] Go to this site and click Do I have Java
[
] It will check your current version and then offer to update to the latest version

SPRING CLEAN

To manually create a new Restore Point

[*]Go to Control Panel and select System
[*]Select System
[*]On the left select System Protection and accept the warning if you get one
[*]Select System Protection Tab
[*]Select Create at the bottom
[*]Type in a name i.e. Clean
[*]Select Create

Now we can purge the infected ones

[*]GoStart > All programs > Accessories > system tools
[*]Right click Disc cleanup and select run as administrator
[*]Select Your main drive and accept the warning if you get one
[*]For a few moments the system will make some calculations
[*]Select the More Options tab
[*]In the System Restore and Shadow Backups select Clean up
[*]Select Delete on the pop up
[]Select OK
[
]Select Delete

Now that you are clean, to help protect your computer in the future I recommend that you get the following free programmes:

http://img233.imageshack.us/img233/7729/mbamicontw5.gif

Malwarebytes. Update and run weekly to keep your system clean

Download and install FileHippo update checker and run it monthly it will show you which programmes on your system need updating and give a download link

It is critical to have both a firewall and anti virus to protect your system and to keep them updated. To keep your operating system up to date visit

[*]Microsoft Windows Update

To learn more about how to protect yourself while on the internet read our little guide How did I get infected in the first place ?

Keep safe :wave: