View Single Post
Old 04-08-2012, 12:24   #1
TangoVirtud
Junior Member
 
Iscritto dal: Apr 2011
Messaggi: 10
Virus distrugge il mio sistema di protezione windows 7

Ciao, ragazzi!!!

Un virus mi ha rotto le scatole e tutto il sistema di protezione di windows 7.
Per esempio, non posso attivare il firewall, non posso installare MSE, ne niente che habbia a che fare con la protezione del sistema.
Prima di venire qui, ho provato a reinstallare MSEssentials, però non ha funzionato, e invece mi è scattato un problema abbastanza noioso, che è proprio quello di accendere la notebook, e quasi contemporaneamente partiva un quadro che avvisava:

"Si è verificato un problema irreversibile. windows verrà riavviato automaticamente tra un minuto."

Ho provato diverse cose, ma alla fine ho iniziato windows col ripristino, e al meno questo non si è presentato di nuovo. Ho fato una scansione con Kaspersky rescue disk 10, e aveva trovato dei trojani. Purtroppo, non ho registrato i log di queste procedure che ho fato ciecamente.
Poi, son venuto qui, e ho esseguito le scansioni da voi nel post "sono infetto, cosa faccio?" Avviso che il link per scaricare parser log non funziona.

Ma, cmq. Ecco i log:

Emsisoft Anti-Malware - Versione 6.6
Ultimo aggiornamento: 03/08/2012 03:52:45

Impostazioni scansione:

Tipo scansione: Completa
Oggetti: Rootkits, Memoria, Tracce, C:\
Archivio scansioni: On
Scansione ADS: On

Scansione avviata: 03/08/2012 04:35:48

C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EUCZ43VR\in[2].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTXWNHX\in[2].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTXWNHX\in[10].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTXWNHX\in[3].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTXWNHX\in[7].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTXWNHX\in[8].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4P4PQ83R\in[2].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4P4PQ83R\in[4].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XXIE2GH\in[5].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XXIE2GH\in[6].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XXIE2GH\in[9].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XXIE2GH\in[1].htm rilevati: Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XXIE2GH\in[4].htm rilevati: Trojan.IframeRef!E2
C:\Users\Sergio\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\4c0e4825-281c6af7 -> CL3.class rilevati: Virus.Java.Exploit!E2
C:\Users\Sergio\AppData\Local\Temp\ICReinstall\cnet2_revosetup_exe.exe rilevati: Riskware.Win32.InstallCore.AMN!E1
C:\Users\Sergio\AppData\Local\Mozilla\Firefox\Profiles\6w79p0mv.default\Cache\8\93\00B57d01 -> unnamed rilevati: AdWare.JS.Pornpop!E2
C:\Users\Sergio\AppData\Local\Mozilla\Firefox\Profiles\6w79p0mv.default\Cache\0\6B\4B0CFd01 -> unnamed rilevati: AdWare.JS.Pornpop!E2
C:\Program Files\Media Finder\hook.html rilevati: Riskware.Downloader.JS.MediaFinder!E2
C:\Downloads\Jairo - Les Jardins Du Ciel (Best Of)\Jairo - Les Jardins Du Ciel (Best Of) - 17.Tes Mots Caressent Ma Vie.mp3.bc! rilevati: Trojan.Win32.FakeAV!E2

Scansionati 551540
Rilevato 19

Fine scansione: 03/08/2012 06:14:11
Tempo scansione: 1:38:23

C:\Downloads\Jairo - Les Jardins Du Ciel (Best Of)\Jairo - Les Jardins Du Ciel (Best Of) - 17.Tes Mots Caressent Ma Vie.mp3.bc! In quarantena Trojan.Win32.FakeAV!E2
C:\Program Files\Media Finder\hook.html In quarantena Riskware.Downloader.JS.MediaFinder!E2
C:\Users\Sergio\AppData\Local\Mozilla\Firefox\Profiles\6w79p0mv.default\Cache\8\93\00B57d01 -> unnamed In quarantena AdWare.JS.Pornpop!E2
C:\Users\Sergio\AppData\Local\Mozilla\Firefox\Profiles\6w79p0mv.default\Cache\0\6B\4B0CFd01 -> unnamed In quarantena AdWare.JS.Pornpop!E2
C:\Users\Sergio\AppData\Local\Temp\ICReinstall\cnet2_revosetup_exe.exe In quarantena Riskware.Win32.InstallCore.AMN!E1
C:\Users\Sergio\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\4c0e4825-281c6af7 -> CL3.class In quarantena Virus.Java.Exploit!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EUCZ43VR\in[2].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTXWNHX\in[2].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTXWNHX\in[10].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTXWNHX\in[3].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTXWNHX\in[7].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTTXWNHX\in[8].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4P4PQ83R\in[2].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4P4PQ83R\in[4].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XXIE2GH\in[5].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XXIE2GH\in[6].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XXIE2GH\in[9].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XXIE2GH\in[1].htm In quarantena Trojan.IframeRef!E2
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0XXIE2GH\in[4].htm In quarantena Trojan.IframeRef!E2

In quarantena 19



HJT


Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 01:28:45, on 04/08/2012
Platform: Windows 7 SP1 (WinNT 6.00.3505)
MSIE: Internet Explorer v9.00 (9.00.8112.16447)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Unlocker\UnlockerAssistant.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Users\Sergio\Documents\MiniBin\minibin.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Program Files\OpenDNS\DNSCrypt\OpenDNSInterface.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Windows\system32\Macromed\Flash\FlashPlayerPlugin_11_3_300_268.exe
C:\Windows\system32\Macromed\Flash\FlashPlayerPlugin_11_3_300_268.exe
C:\PROGRAM FILES\EMSISOFT ANTI-MALWARE\a2guard.exe
C:\Windows\system32\ctfmon.exe
C:\Program Files\Prevx\prevx.exe
C:\Program Files\Real\RealPlayer\update\realsched.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://isearch.avg.com/?cid={D0B8BDC3-E8BA-4ED2-BCEA-AF4AEA147839}&mid=599592ace16347d09da30196dca633f2-708138ad09019763ca686ad141d46a1be8be6a65&lang=it&ds=ts024&pr=sa&d=2012-06-06 00:53:34&v=11.1.0.7&sap=hp
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: SafeOnline BHO - {69D72956-317C-44bd-B369-8E44D4EF9801} - C:\Windows\system32\PxSecure.dll
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Oracle\JavaFX 2.1 Runtime\bin\ssv.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Oracle\JavaFX 2.1 Runtime\bin\jp2ssv.dll
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [UnlockerAssistant] "C:\Program Files\Unlocker\UnlockerAssistant.exe"
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Real\RealPlayer\update\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [emsisoft anti-malware] "c:\program files\emsisoft anti-malware\a2guard.exe" /d=60
O4 - HKLM\..\RunOnce: [Malwarebytes Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'SERVIZIO LOCALE')
O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'SERVIZIO LOCALE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'SERVIZIO DI RETE')
O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'SERVIZIO DI RETE')
O4 - Startup: MiniBin.lnk = Sergio\Documents\MiniBin\minibin.exe
O4 - Global Startup: OpenDNSCrypt.lnk = ?
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O17 - HKLM\System\CCS\Services\Tcpip\..\{6F56DBE4-AFA0-49DC-AA09-0656E031A06D}: NameServer = 208.67.222.222,208.67.220.220
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL (file missing)
O23 - Service: Emsisoft Anti-Malware 6.6 - Service (a2AntiMalware) - Emsisoft GmbH - C:\Program Files\Emsisoft Anti-Malware\a2service.exe
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: AMD External Events Utility - AMD - C:\Windows\system32\atiesrxx.exe
O23 - Service: AMD FUEL Service - Advanced Micro Devices, Inc. - C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe
O23 - Service: CSIScanner - Prevx - C:\Program Files\Prevx\prevx.exe
O23 - Service: OpenDNSCrypt (DNSCrypt) - Unknown owner - C:\Program Files\OpenDNS\DNSCrypt\OpenDNSCryptService.exe
O23 - Service: Mozilla Maintenance Service (MozillaMaintenance) - Mozilla Foundation - C:\Program Files\Mozilla Maintenance Service\maintenanceservice.exe
O23 - Service: Servizio Vodafone Mobile Broadband (VmbService) - Vodafone - C:\Program Files\Vodafone\Vodafone Mobile Broadband\Bin\VmbService.exe

--
End of file - 5281 bytes


MAmalware non ha segnalato infezioni nell'ultimo scan. Cmq, carico su Mediafire i log di MbAM, CureIt, e Sysinspector. Ecco la cartella:

http://www.mediafire.com/?pby6xwcgi8zlq

Adesso, vorrei sapere come fare per sbloccare le funzioni di sicurezza del mio computer.
TangoVirtud è offline