Hi everyone,
I’m new to this forum, but I’ve been around computers my whole life. I don’t claim to know everything, and that is why I am asking for help. I found a thread on this forum with instructions for including log information for this file and I hope that I have included everything needed. I would reformat with Win7, but this computer is used at an architecture firm and software/licensing is a royal pain.
I have scanned the PC multiple times with Malwarebytes as well as Avast boot-time scan. However, Avast continues to popup saying that it is blocking a trojan that is located in the C:\Windows\Installer{8ba5ea…
Thanks in advance for any advice or help!
Jeremy
This particular PC is built as follows:
AMD Phenom II x2 555 Processor 3.21GHz
Asus mobo
4GB Ram
Windows 7 Professional 32-Bit OEM
HERE ARE THE LOGS:
Malwarebytes Anti-Malware 1.62.0.1300
www.malwarebytes.org
Database version: v2012.07.24.12
Windows 7 Service Pack 1 x86 NTFS
Internet Explorer 9.0.8112.16421
Sheila :: SHEILA-PC [administrator]
7/25/2012 4:25:40 AM
mbam-log-2012-07-25 (04-25-40).txt
Scan type: Full scan (C:|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 261087
Time elapsed: 22 minute(s), 7 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 0
(No malicious items detected)
Registry Values Detected: 0
(No malicious items detected)
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 0
(No malicious items detected)
Files Detected: 11
C:\Windows\assembly\GAC\Desktop.ini (Trojan.0access) → Quarantined and deleted successfully.
C:\Windows\Installer{8ba5ea61-e71e-260f-3356-ff8fd764f6a3}\U\00000008.@ (Trojan.Dropper.BCMiner) → Quarantined and deleted successfully.
C:\Windows\Installer{8ba5ea61-e71e-260f-3356-ff8fd764f6a3}\U\trz39B.tmp (Rootkit.Zaccess) → Quarantined and deleted successfully.
C:\Windows\Installer{8ba5ea61-e71e-260f-3356-ff8fd764f6a3}\U\trz4918.tmp (Rootkit.Zaccess) → Quarantined and deleted successfully.
C:\Windows\Installer{8ba5ea61-e71e-260f-3356-ff8fd764f6a3}\U\trz532B.tmp (Rootkit.Zaccess) → Quarantined and deleted successfully.
C:\Windows\Installer{8ba5ea61-e71e-260f-3356-ff8fd764f6a3}\U\trz7532.tmp (Rootkit.Zaccess) → Quarantined and deleted successfully.
C:\Windows\Installer{8ba5ea61-e71e-260f-3356-ff8fd764f6a3}\U\trz9990.tmp (Rootkit.Zaccess) → Quarantined and deleted successfully.
C:\Windows\Installer{8ba5ea61-e71e-260f-3356-ff8fd764f6a3}\U\trzB640.tmp (Rootkit.Zaccess) → Quarantined and deleted successfully.
C:\Windows\Installer{8ba5ea61-e71e-260f-3356-ff8fd764f6a3}\U\trzBCD2.tmp (Rootkit.Zaccess) → Quarantined and deleted successfully.
C:\Windows\Installer{8ba5ea61-e71e-260f-3356-ff8fd764f6a3}\U\trzE427.tmp (Trojan.Sirefef) → Quarantined and deleted successfully.
C:\Windows\Installer{8ba5ea61-e71e-260f-3356-ff8fd764f6a3}\U\trzF1C1.tmp (Rootkit.Zaccess) → Quarantined and deleted successfully.
(end)
aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-07-25 13:50:33
13:50:33.987 OS Version: Windows 6.1.7601 Service Pack 1
13:50:33.987 Number of processors: 2 586 0x403
13:50:33.987 ComputerName: ******-PC UserName: Sheila
13:50:35.422 Initialize success
13:50:36.031 AVAST engine defs: 12072500
13:50:53.846 Disk 0 (boot) \Device\Harddisk0\DR0 → \Device\00000064
13:50:53.846 Disk 0 Vendor: WDC_WD10 05.0 Size: 953869MB BusType: 3
13:50:53.862 Disk 0 MBR read successfully
13:50:53.862 Disk 0 MBR scan
13:50:53.862 Disk 0 Windows 7 default MBR code
13:50:53.862 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 2048
13:50:53.893 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 953767 MB offset 206848
13:50:53.893 Disk 0 scanning sectors +1953521664
13:50:53.940 Disk 0 scanning C:\Windows\system32\drivers
13:51:01.350 Service scanning
13:51:12.301 Modules scanning
13:51:15.514 Disk 0 trace - called modules:
13:51:15.530 ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys halmacpi.dll storport.sys nvstor.sys
13:51:16.029 1 nt!IofCallDriver → \Device\Harddisk0\DR0[0x85dd8030]
13:51:16.029 3 CLASSPNP.SYS[8a3c659e] → nt!IofCallDriver → [0x84e1ab40]
13:51:16.029 5 ACPI.sys[8a43b3d4] → nt!IofCallDriver → \Device\00000064[0x856f0030]
13:51:16.887 AVAST engine scan C:\Windows
13:51:18.853 AVAST engine scan C:\Windows\system32
13:52:21.019 File: C:\Windows\assembly\GAC\Desktop.ini INFECTED Win32:Sirefef-PL [Rtk]
13:52:38.179 AVAST engine scan C:\Windows\system32\drivers
13:52:44.996 AVAST engine scan C:\Users\Sheila
13:54:30.207 Disk 0 MBR has been saved successfully to “C:\Users\Sheila\Desktop\Virus Logs\MBR.dat”
13:54:30.222 The log file has been saved successfully to “C:\Users\Sheila\Desktop\Virus Logs\aswMBR.txt”
I have attached the OTL log. Thanks again!