Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Totally Lost


  • Please log in to reply
21 replies to this topic

#1 cjgillma

cjgillma

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 18 October 2009 - 08:25 PM

Hello!


I would appreciate any help/guidance possible. After installing a windows update set of quite a few updates the other day, I started to get redirected to thefreeyard which I now know is apparently a redirect virus. A few other problems which I seemed to have fixed like runtime system 5 error and other small annoyances were solved by scanning with malware bytes, spybot and hijack this. I can't, however, get rid of this redirecting nonsense.

I was about to delve into working with Root Repeal but thought better of it before totally screwing up my computer. I would LOVE some expert advice and would be happy to post any log from any program scan to finally put an end to this problem and be sure there is no other crap left on the computer as well.

Thank you kindly to anyone that can help!

Cory

BC AdBot (Login to Remove)

 


#2 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:18 PM

Posted 18 October 2009 - 08:58 PM

Please post your Malwarebytes log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#3 cjgillma

cjgillma
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 20 October 2009 - 07:52 PM

Hi Budapest;

Sorry about the delay;

Here's the log of the most recent scan

Thanks

Cory

==========================



Malwarebytes' Anti-Malware 1.41
Database version: 2974
Windows 5.1.2600 Service Pack 3

17/10/2009 6:46:29 PM
mbam-log-2009-10-17 (18-46-29).txt

Scan type: Full Scan (C:\|)
Objects scanned: 176486
Time elapsed: 50 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 0
Registry Values Infected: 3
Registry Data Items Infected: 8
Folders Infected: 0
Files Infected: 11

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\calc.dll (Trojan.Agent) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\calc (Trojan.Agent) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\wallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\calc (Trojan.Agent) -> Delete on reboot.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SecurityProviders (Broken.SecurityProviders) -> Bad: (msapsspc.dll schannel.dll digest.dll msnsspc.dll) Good: (msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\calc.dll (Trojan.Agent) -> Delete on reboot.
C:\biabqjx.exe (Trojan.Zbot) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\ntuser.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temp\rundll32.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\scandisk.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{42EFD585-2B66-4955-93C4-73CC80FC12C5}\RP243\A0060339.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{42EFD585-2B66-4955-93C4-73CC80FC12C5}\RP243\A0061339.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{42EFD585-2B66-4955-93C4-73CC80FC12C5}\RP244\A0061355.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{42EFD585-2B66-4955-93C4-73CC80FC12C5}\RP244\A0061356.exe (Trojan.Zbot) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\scandisk.lnk (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temp\nsrbgxod.bak (Trojan.Agent) -> Delete on reboot.

#4 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:18 PM

Posted 20 October 2009 - 07:56 PM

Please reboot your computer, update Malwarebytes and run a quick scan. Post the new log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#5 cjgillma

cjgillma
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 21 October 2009 - 05:56 AM

Hey Budapest;

I did a full scan (sorry, totally missed your note about a quick scan), but I figured it's just as helpful, and it caught some more problems.

Here is the log:

Malwarebytes' Anti-Malware 1.41
Database version: 3001
Windows 5.1.2600 Service Pack 3

21/10/2009 2:16:42 AM
mbam-log-2009-10-21 (02-16-42).txt

Scan type: Full Scan (C:\|)
Objects scanned: 177492
Time elapsed: 55 minute(s), 28 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\calc.dll (Trojan.Agent) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\calc (Trojan.Agent) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\calc (Trojan.Agent) -> Delete on reboot.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\calc.dll (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\Administrator\ntuser.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\scandisk.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{42EFD585-2B66-4955-93C4-73CC80FC12C5}\RP245\A0061524.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\scandisk.lnk (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temp\nsrbgxod.bak (Trojan.Agent) -> Delete on reboot.

#6 cjgillma

cjgillma
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 21 October 2009 - 05:58 AM

Sorry;

also, upon reboot, it mentioned that it could not delete this one

"WINDOWS\system32\calc.dll (Trojan.Agent) -> Delete on reboot."

Thanks

Cory

#7 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:18 PM

Posted 21 October 2009 - 03:41 PM

Please download ATF Cleaner by Atribune & save it to your desktop. alternate download link DO NOT use yet.
Please download and install SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here and unzip into the program's folder.)
  • Under the "Configuration and Preferences", click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#8 cjgillma

cjgillma
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 21 October 2009 - 10:19 PM

Alright well this is starting to suck...

I got as far as Rebooting in Safe mode with no porblems;

then when I try to reboot in Safe Mode (which I've done umpteen times before and know how to do, though I appreciate the instructions, I'm just telling you this so you don't think the problem is me, as opposed to the computer) it takes me to a screen to select the operating system (of which there is only 1 choice "xp porfessional").

When I select it, it restarts my computer and takes me to a the F8 option page again, this time with only 4 options (instead of the 8 or so you normally get). When I select Safe Mode here, it returns me to the operating system page (same story, one choice), and restarts and continues the cycle indefinitely until I select "Start windows normally" or shutdown.

I believe it should just boot up in safe mode with "safe mode" written in the corners after I select that option, but no deal.

Pretty ugly.

Any ideas?

Thanks

Cory

#9 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:18 PM

Posted 21 October 2009 - 10:26 PM

If you cannot boot into Safe Mode, run the SUPERAntiSpyware scan in Normal Mode for now.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#10 cjgillma

cjgillma
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 21 October 2009 - 10:32 PM

So not the ATF-Cleaner first as per your earlier instructions?

#11 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:18 PM

Posted 21 October 2009 - 10:42 PM

Run ATF then SUPERAntiSpyware both in Normal Mode. Post the SUPERAntiSpyware log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#12 cjgillma

cjgillma
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 23 October 2009 - 07:32 PM

Thanks for your patience with this;

I've been really busy being the reason for the slow responses. I want to try to get this done though. Thanks

Here is the SuperAntiSpyware Log

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 10/23/2009 at 08:22 PM

Application Version : 4.29.1004

Core Rules Database Version : 4179
Trace Rules Database Version: 1978

Scan type : Complete Scan
Total Scan Time : 01:04:08

Memory items scanned : 404
Memory threats detected : 0
Registry items scanned : 5930
Registry threats detected : 0
File items scanned : 71505
File threats detected : 3

Adware.Tracking Cookie
.apmebf.com [ C:\Documents and Settings\Administrator\Application Data\MozillaControl\profiles\MozillaControl\g69pirf2.slt\cookies.txt ]
.toplist.cz [ C:\Documents and Settings\Administrator\Application Data\MozillaControl\profiles\MozillaControl\g69pirf2.slt\cookies.txt ]
.adcentriconline.com [ C:\Documents and Settings\Administrator\Application Data\MozillaControl\profiles\MozillaControl\g69pirf2.slt\cookies.txt ]

#13 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:18 PM

Posted 23 October 2009 - 10:06 PM

Update Malwarebytes, run a quick scan and post the new log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#14 cjgillma

cjgillma
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 24 October 2009 - 07:54 AM

Here are the results of the quick scan:

When I rebooted, it was the first time in 2 weeks that I didn't get a dialog box about some .dll file missing or corrupt.

==========================

Malwarebytes' Anti-Malware 1.41
Database version: 3024
Windows 5.1.2600 Service Pack 3

24/10/2009 8:43:11 AM
mbam-log-2009-10-24 (08-43-11).txt

Scan type: Quick Scan
Objects scanned: 99590
Time elapsed: 5 minute(s), 34 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\calc (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\calc (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\scandisk.lnk (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\calc.dll (Trojan.Downloader) -> Quarantined and deleted successfully.


Cheers,

Cory

#15 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:18 PM

Posted 24 October 2009 - 04:15 PM

Download this file to your desktop:

http://download.bleepingcomputer.com/grinler/rkill.exe

Double-click the file to run the application. A command windows will appear briefly. No log will be produced.

Then run another quick-scan with Malwarebytes. Post the new Malwarebytes log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users