STEP 1: Run a HitmanPro scan
<ol>
STEP 2: Run a scan with ESET Online Scanner
<ol>
<hr />
STEP 3: Run a scan with Kaspersky Virus Removal Tool
-------------------------------------------------------------------
While the Kapersky Virus Removal Tool is still running, and for the next 18 hours will continue, here are the logs of the HitmanPro and ESET runs.
--------------------------------------------------------------
Code:
HitmanPro 3.7.8.208
www.hitmanpro.com
Computer name . . . . : HELMUT-NOTEBOOK
Windows . . . . . . . : 6.0.2.6002.X86/2
User name . . . . . . : HELMUT-NOTEBOOK\Besitzer
UAC . . . . . . . . . : Disabled
License . . . . . . . : Free
Scan date . . . . . . : 2013-12-02 14:17:38
Scan mode . . . . . . : Normal
Scan duration . . . . : 8m 41s
Disk access mode . . : Direct disk access (SRB)
Cloud . . . . . . . . : Internet
Reboot . . . . . . . : No
Threats . . . . . . . : 0
Traces . . . . . . . : 24
Objects scanned . . . : 1.722.190
Files scanned . . . . : 30.989
Remnants scanned . . : 340.890 files / 1.350.311 keys
Suspicious files ____________________________________________________________
C:\Windows\system32\DBCLIENT.DLL
Size . . . . . . . : 210.032 bytes
Age . . . . . . . : 429.2 days (2012-09-29 09:05:27)
Entropy . . . . . : 6.4
SHA-256 . . . . . : 8395C8F23C50D2203FC3F4A9847ABADDF6F240C593E17A4B3625F3985F423236
Publisher . . . . : Inprise Corporation
Description . . . : Borland Database Engine
Version . . . . . : 5.0.1.32
Copyright . . . . : Copyright Inprise Corp. 1991-1998
RSA Key Size . . . : 512
Authenticode . . . : Self-signed
Fuzzy . . . . . . : 26.0
Program is code signed with a weak certificate. This is common to malware.
Program is code self-signed.
The file is located in a folder that contains core operating system files from Windows. This is not typical for most programs and is only common to system tools, drivers and hacking utilities.
Cookies _____________________________________________________________________
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.yieldmanager.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:conrad.122.2o7.net
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:doubleclick.net
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:#####ed-tube.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:geeksaresexy.net
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:h2porn.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:invitemedia.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:largeporntube.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:oracle.112.2o7.net
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:qporno.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:revsci.net
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:statcounter.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:stats.paypal.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:statse.webtrendslive.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:www.etracker.de
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:www.largeporntube.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:www.lovethatsex.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:www.sexkontakt.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:www.xxxkinky.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:xiti.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:xxxkinky.com
C:\Users\Besitzer\AppData\Local\Google\Chrome\User Data\Default\Cookies:yahoogroups.112.2o7.net
C:\Users\Besitzer\AppData\Roaming\Microsoft\Windows\Cookies\P8MZRE9P.txt
----------------------------------------------------------------
C:\Users\All Users\et1lri.fdd a variant of Win32/Reveton.W trojan
C:\Users\All Users\f4r7trr.fdd a variant of Win32/Reveton.W trojan
C:\Users\All Users\g9ejwr7t.fdd a variant of Win32/Reveton.W trojan
C:\Users\All Users\lmqfjtfr.fdd a variant of Win32/Reveton.W trojan
C:\Users\All Users\rj8zlcwliq.fdd a variant of Win32/Reveton.W trojan
C:\Users\All Users\wr8f4od.fdd a variant of Win32/Reveton.W trojan
C:\ProgramData\et1lri.fdd a variant of Win32/Reveton.W trojan cleaned by deleting - quarantined
C:\ProgramData\f4r7trr.fdd a variant of Win32/Reveton.W trojan cleaned by deleting - quarantined
C:\ProgramData\g9ejwr7t.fdd a variant of Win32/Reveton.W trojan cleaned by deleting - quarantined
C:\ProgramData\lmqfjtfr.fdd a variant of Win32/Reveton.W trojan cleaned by deleting - quarantined
C:\ProgramData\rj8zlcwliq.fdd a variant of Win32/Reveton.W trojan cleaned by deleting - quarantined
C:\ProgramData\wr8f4od.fdd a variant of Win32/Reveton.W trojan cleaned by deleting - quarantined
E:\Backup Vista-PC\BOOT (L)\Users\Helmut\AppData\Local\Temp\jar_cache6133717273483310499.tmp multiple threats cleaned by deleting - quarantined
E:\Backup Vista-PC\BOOT (L)\Users\Helmut\Desktop\Downloads\XvidSetup.exe.crdownload a variant of Win32/Adware.HotBar.H application cleaned by deleting - quarantined
E:\Backup Vista-PC\BOOT (L)\Users\Helmut\Documents\Downloads\AdvancedPCTweaker_Setup.exe a variant of Win32/Adware.AdvPCTweak application cleaned by deleting - quarantined
E:\Backup Vista-PC\BOOT (L)\Users\Helmut\Documents\Downloads\XvidSetup.exe.crdownload a variant of Win32/Adware.HotBar.H application cleaned by deleting - quarantined
---------------------------------------------------------------
The last Log of the Kaspersky will follow suit, when its generated.