Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

internet crime complaint center virus in safe mode


  • This topic is locked This topic is locked
48 replies to this topic

#1 mervelous

mervelous

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:03:05 PM

Posted 13 January 2013 - 08:33 PM

Hello. My PC with Vista Ultimate is infected with the IC3 ransomware. I initially opened in Safe Mode (with Networking) and ran Malwarebytes scan, which identified some items; removed, re-booted and the virus screen reappeared. Tried again in Safe Mode and ran Full scan; more items, after removal and re-boot, same screen. Tried Safe Mode a third time and tried to open Emisoft IExplore; after a few screen flickers, the IC3 screen block appeared again, in Safe Mode. Now everytime i try to open Safe Mode with Networking the IC3 screen block appears. Any advice at all will be greatly appreciated. Thanks!!

BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:05 PM

Posted 14 January 2013 - 12:31 PM

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your malware problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.

To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
On the System Recovery Options menu you will get the following options:
Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt
[*]Select Command Prompt
[*]In the command window type in notepad and press Enter.
[*]The notepad opens. Under File menu select Open.
[*]Select "Computer" and find your flash drive letter and close the notepad.
[*]In the command window type e:\frst64.exe and press Enter
Note: Replace letter e with the drive letter of your flash drive.
[*]The tool will start to run.
[*]When the tool opens click Yes to disclaimer.

[*]First Press the Scan button.
[*]It will make a log (FRST.txt)

[*]Second Type the following in the edit box after "Search:". services.exe
[*]Click the Search button
[*]It will make a log (Search.txt)
[/list]
I want you to poste Both the FRST.txt report and the Search.txt into your reply to me

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 mervelous

mervelous
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:03:05 PM

Posted 14 January 2013 - 02:56 PM

Hello Gringo, thank you for the help. Here are the reports-

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 09-01-2013
Ran by SYSTEM at 14-01-2013 11:39:07
Running from D:\
Windows Vista ™ Ultimate Service Pack 1 (X86) OS Language: English(US)
The current controlset is ControlSet001

==================== Registry (Whitelisted) ===================

HKLM\...\Run: [RtHDVCpl] RtHDVCpl.exe [x]
HKLM\...\Run: [StartCCC] "C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun [61440 2008-01-21] (Advanced Micro Devices, Inc.)
HKLM\...\Run: [Dell DataSafe Online] "C:\Program Files\Dell DataSafe Online\DataSafeOnline.exe" /m [1745648 2008-11-03] ()
HKLM\...\Run: [dellsupportcenter] "C:\Program Files\Dell Support Center\bin\sprtcmd.exe" /P dellsupportcenter [206064 2009-01-29] (SupportSoft, Inc.)
HKLM\...\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime [417792 2010-02-15] (Apple Inc.)
HKLM\...\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [35760 2010-06-19] (Adobe Systems Incorporated)
HKLM\...\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [976832 2010-06-09] (Adobe Systems Incorporated)
HKLM\...\Run: [mcui_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey [1278648 2012-09-12] (McAfee, Inc.)
HKLM\...\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript [824232 2012-12-14] (Malwarebytes Corporation)
HKLM\...\Run: [] [x]
HKLM\...\Run: [ApnUpdater] "C:\Program Files\Ask.com\Updater\Updater.exe" [1564872 2012-06-06] (Ask)
HKU\jeff\...\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background [3882312 2008-12-02] (Microsoft Corporation)
HKU\jeff\...\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe [202240 2008-01-20] (Microsoft Corporation)
HKU\jeff\...\Run: [StartNow Search Protect] "C:\Program Files\StartNow Toolbar\search_protect.exe" /RELAY /REPORT /PROTECT [1352048 2012-09-06] ()
HKU\jeff\...\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [68856 2009-04-29] (Google Inc.)
HKU\jeff\...\Run: [Google] "xidpwooedd.exe" [x]
HKU\jeff\...\Run: [rlqvaknd] C:\Users\jeff\AppData\Roaming\unzhaza [x]
HKU\jeff\...\Policies\system: [DisableTaskMgr] 1
HKLM\...\RunOnce: [Launcher] %WINDIR%\SMINST\Components\scheduler\Launcher.exe [165104 2009-02-23] (Softthinks)
HKLM\...\Winlogon: [Shell] explorer.exe, C:\ProgramData\unzhaza [x ] ()
Winlogon\Notify\GoToAssist: C:\Program Files\Citrix\GoToAssist\514\G2AWinLogon.dll [X]
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1
Startup: C:\Users\All Users\Start Menu\Programs\Startup\Dell Remote Access.lnk
ShortcutTarget: Dell Remote Access.lnk -> C:\Windows\Installer\{F66A31D9-7831-4FBA-BA02-C411C0047CC5}\NewShortcut4_F66A31D978314FBABA02C411C0047CC5.exe (Macrovision Corporation)
Startup: C:\Users\Default\Start Menu\Programs\Startup\Dell Dock First Run.lnk
ShortcutTarget: Dell Dock First Run.lnk -> C:\Program Files\Dell\DellDock\DellDock.exe (Stardock Corporation)
Startup: C:\Users\Default User\Start Menu\Programs\Startup\Dell Dock First Run.lnk
ShortcutTarget: Dell Dock First Run.lnk -> C:\Program Files\Dell\DellDock\DellDock.exe (Stardock Corporation)
Startup: C:\Users\jeff\Start Menu\Programs\Startup\Dell Dock.lnk
ShortcutTarget: Dell Dock.lnk -> C:\Program Files\Dell\DellDock\DellDock.exe (Stardock Corporation)
Startup: C:\Users\jeff\Start Menu\Programs\Startup\ZooskMessenger.lnk
ShortcutTarget: ZooskMessenger.lnk -> (No File)

==================== Services (Whitelisted) ===================

2 AdobeActiveFileMonitor7.0; C:\Program Files\Adobe\Photoshop Elements 7.0\PhotoshopElementsFileAgent.exe [169312 2008-09-16] (Adobe Systems Incorporated)
2 Canon Driver Information Assist Service; "C:\Program Files\Canon\DIAS\CnxDIAS.exe" [3405160 2008-08-04] (CANON INC.)
2 DockLoginService; C:\Program Files\Dell\DellDock\DockLogin.exe [155648 2008-12-18] (Stardock Corporation)
2 McMPFSvc; "C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe" /McCoreSvc [167784 2012-08-31] (McAfee, Inc.)
2 mcmscsvc; "C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe" /McCoreSvc [167784 2012-08-31] (McAfee, Inc.)
2 McNaiAnn; "C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe" /McCoreSvc [167784 2012-08-31] (McAfee, Inc.)
2 McNASvc; "C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe" /McCoreSvc [167784 2012-08-31] (McAfee, Inc.)
3 McODS; "C:\Program Files\McAfee\VirusScan\mcods.exe" [279048 2012-11-16] (McAfee, Inc.)
2 McProxy; "C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe" /McCoreSvc [167784 2012-08-31] (McAfee, Inc.)
2 McShield; "C:\Program Files\Common Files\McAfee\SystemCore\\mcshield.exe" [203400 2012-11-09] (McAfee, Inc.)
2 mfefire; "C:\Program Files\Common Files\McAfee\SystemCore\\mfefire.exe" [168880 2012-11-09] (McAfee, Inc.)
2 mfevtp; "C:\Program Files\Common Files\McAfee\SystemCore\mfevtps.exe" [167344 2012-11-09] (McAfee, Inc.)
2 MSK80Service; "C:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe" /McCoreSvc [167784 2012-08-31] (McAfee, Inc.)
2 SftService; "C:\Windows\sminst\sftservice.EXE" [632048 2009-02-23] (SoftThinks)
2 sprtsvc_DellSupportCenter; "C:\Program Files\Dell Support Center\bin\sprtsvc.exe" /service /P DellSupportCenter [201968 2009-01-29] (SupportSoft, Inc.)
2 hnmsvc; "c:\Program Files\Common Files\Dell\Advanced Networking Service\hnm_svc.exe" [x]
3 MSSQL$MSSMLBIZ; "c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe" -sMSSMLBIZ [x]
4 MSSQLServerADHelper; "c:\Program Files\Microsoft SQL Server\90\Shared\sqladhlp90.exe" [x]
2 SQLBrowser; "c:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe" [x]
2 SQLWriter; "c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe" [x]
2 Updater Service for StartNow Toolbar; C:\Program Files\StartNow Toolbar\ToolbarUpdaterService.exe [x]

==================== Drivers (Whitelisted) ====================

1 A2DDA; \??\C:\Users\jeff\Desktop\EmsisoftEmergencyKit\Run\a2ddax86.sys [17904 2012-09-26] (Emsi Software GmbH)
3 akshasp; C:\Windows\System32\DRIVERS\akshasp.sys [327168 2006-11-22] (Aladdin Knowledge Systems Ltd.)
3 aksusb; C:\Windows\System32\DRIVERS\aksusb.sys [100096 2006-11-22] (Aladdin Knowledge Systems Ltd.)
3 cfwids; C:\Windows\System32\drivers\cfwids.sys [60480 2012-11-09] (McAfee, Inc.)
2 Hardlock; C:\Windows\system32\drivers\hardlock.sys [693760 2006-11-22] (Aladdin Knowledge Systems Ltd.)
3 HipShieldK; C:\Windows\System32\drivers\HipShieldK.sys [146872 2012-04-20] (McAfee, Inc.)
3 mfeapfk; C:\Windows\System32\drivers\mfeapfk.sys [132912 2012-11-09] (McAfee, Inc.)
3 mfeavfk; C:\Windows\System32\drivers\mfeavfk.sys [234824 2012-11-09] (McAfee, Inc.)
3 mfebopk; C:\Windows\System32\drivers\mfebopk.sys [65488 2012-11-09] (McAfee, Inc.)
3 mfefirek; C:\Windows\System32\drivers\mfefirek.sys [362640 2012-11-09] (McAfee, Inc.)
0 mfehidk; C:\Windows\System32\drivers\mfehidk.sys [565352 2012-11-09] (McAfee, Inc.)
3 mferkdet; C:\Windows\System32\drivers\mferkdet.sys [92192 2012-11-09] (McAfee, Inc.)
1 mfewfpk; C:\Windows\System32\drivers\mfewfpk.sys [210136 2012-11-09] (McAfee, Inc.)
2 Packet; C:\Windows\System32\DRIVERS\packet.sys [22016 2008-06-17] (SingleClick Systems)
3 .mfenlfk; \? [x]
3 IpInIp; C:\Windows\System32\DRIVERS\ipinip.sys [x]
3 mfeavfk01; [x]
3 NwlnkFlt; C:\Windows\System32\DRIVERS\nwlnkflt.sys [x]
3 NwlnkFwd; C:\Windows\System32\DRIVERS\nwlnkfwd.sys [x]
3 PCD5SRVC{3F6A8B78-EC003E00-05040104}; \??\C:\PROGRA~1\DELLSU~1\HWDiag\bin\PCD5SRVC.pkms [x]

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2013-01-13 13:28 - 2013-01-13 17:19 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\Application Data\unzhaza.exe
2013-01-13 13:28 - 2013-01-13 17:19 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\AppData\Roaming\unzhaza.exe
2013-01-13 13:12 - 2013-01-13 17:19 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\Local Settings\unzhaza.exe
2013-01-13 13:12 - 2013-01-13 17:19 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\Local Settings\Application Data\unzhaza.exe
2013-01-13 13:12 - 2013-01-13 17:19 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\AppData\Local\unzhaza.exe
2013-01-13 13:12 - 2013-01-13 17:09 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\All Users\unzhaza.exe
2013-01-13 13:12 - 2013-01-13 17:09 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\All Users\Application Data\unzhaza.exe
2012-12-29 12:41 - 2012-12-29 12:41 - 00751078 ____A C:\Users\All Users\Application Data\1.bmp
2012-12-29 12:41 - 2012-12-29 12:41 - 00751078 ____A C:\Users\All Users\1.bmp
2012-12-17 21:21 - 2012-12-17 21:21 - 00632952 ____A C:\Users\jeff\Downloads\cbsidlm-tr1_9-ieSpell-BP2-10208550.exe


==================== One Month Modified Files and Folders ========

2013-01-14 11:38 - 2013-01-14 11:38 - 00000000 ____D C:\FRST
2013-01-13 17:20 - 2011-03-04 15:41 - 00001356 ____A C:\Users\jeff\Local Settings\d3d9caps.dat
2013-01-13 17:20 - 2011-03-04 15:41 - 00001356 ____A C:\Users\jeff\Local Settings\Application Data\d3d9caps.dat
2013-01-13 17:20 - 2011-03-04 15:41 - 00001356 ____A C:\Users\jeff\AppData\Local\d3d9caps.dat
2013-01-13 17:20 - 2010-03-24 15:56 - 00000000 ____D C:\Users\jeff\Tracing
2013-01-13 17:20 - 2006-11-02 05:00 - 00032578 ____A C:\Windows\Tasks\SCHEDLGU.TXT
2013-01-13 17:20 - 2006-11-02 05:00 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-01-13 17:19 - 2013-01-13 13:28 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\Application Data\unzhaza.exe
2013-01-13 17:19 - 2013-01-13 13:28 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\AppData\Roaming\unzhaza.exe
2013-01-13 17:19 - 2013-01-13 13:12 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\Local Settings\unzhaza.exe
2013-01-13 17:19 - 2013-01-13 13:12 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\Local Settings\Application Data\unzhaza.exe
2013-01-13 17:19 - 2013-01-13 13:12 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\AppData\Local\unzhaza.exe
2013-01-13 17:19 - 2009-12-28 20:25 - 00000878 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2013-01-13 17:19 - 2009-04-29 11:43 - 00000000 ____D C:\Users\jeff\Local Settings\SoftThinks
2013-01-13 17:19 - 2009-04-29 11:43 - 00000000 ____D C:\Users\jeff\Local Settings\Application Data\SoftThinks
2013-01-13 17:19 - 2009-04-29 11:43 - 00000000 ____D C:\Users\jeff\AppData\Local\SoftThinks
2013-01-13 17:19 - 2006-11-02 04:46 - 00003616 ____A C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2013-01-13 17:19 - 2006-11-02 04:46 - 00003616 ____A C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2013-01-13 17:09 - 2013-01-13 13:12 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\All Users\unzhaza.exe
2013-01-13 17:09 - 2013-01-13 13:12 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\All Users\Application Data\unzhaza.exe
2013-01-13 15:09 - 2006-11-02 02:33 - 00769072 ____A C:\Windows\System32\PerfStringBackup.INI
2013-01-13 14:31 - 2010-11-29 15:52 - 00064224 ____A C:\Windows\PFRO.log
2013-01-13 14:29 - 2006-11-02 03:18 - 00000000 ____D C:\Windows\MSAgent
2013-01-13 13:27 - 2006-11-02 04:41 - 00000000 ____D C:\Windows\WindowsMobile
2013-01-13 13:26 - 2009-04-29 11:43 - 00000000 ____D C:\users\jeff
2013-01-13 13:13 - 2009-04-24 07:31 - 01589200 ____A C:\Windows\WindowsUpdate.log
2013-01-13 13:07 - 2009-12-28 20:26 - 00000882 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2013-01-13 13:00 - 2012-05-16 23:10 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-01-11 16:43 - 2009-04-29 12:08 - 00000416 ___AH C:\Windows\Tasks\User_Feed_Synchronization-{ED6A9948-842C-4093-A298-F9BF91E6FFCE}.job
2013-01-11 11:08 - 2009-11-09 10:03 - 00000000 ____D C:\Users\jeff\Local Settings\CutePDF Writer
2013-01-11 11:08 - 2009-11-09 10:03 - 00000000 ____D C:\Users\jeff\Local Settings\Application Data\CutePDF Writer
2013-01-11 11:08 - 2009-11-09 10:03 - 00000000 ____D C:\Users\jeff\AppData\Local\CutePDF Writer
2013-01-10 10:11 - 2009-04-24 12:48 - 00000000 ____D C:\Users\All Users\Microsoft Help
2013-01-10 10:11 - 2009-04-24 12:48 - 00000000 ____D C:\Users\All Users\Application Data\Microsoft Help
2013-01-10 10:04 - 2006-11-02 02:24 - 65273848 ____A (Microsoft Corporation) C:\Windows\System32\mrt.exe
2013-01-08 14:00 - 2012-05-16 23:10 - 00697864 ____A (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerApp.exe
2013-01-08 14:00 - 2011-07-18 07:31 - 00074248 ____A (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerCPLApp.cpl
2013-01-02 13:33 - 2006-11-02 04:35 - 00000000 ____D C:\Windows\Performance
2012-12-29 12:54 - 2006-11-02 03:18 - 00000000 ____D C:\Windows\Globalization
2012-12-29 12:45 - 2012-04-25 08:22 - 00000908 ____A C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2012-12-29 12:45 - 2012-04-25 08:22 - 00000908 ____A C:\Users\All Users\Desktop\Malwarebytes Anti-Malware.lnk
2012-12-29 12:45 - 2010-11-01 09:29 - 00000000 ____D C:\Program Files\Malwarebytes' Anti-Malware
2012-12-29 12:41 - 2012-12-29 12:41 - 00751078 ____A C:\Users\All Users\Application Data\1.bmp
2012-12-29 12:41 - 2012-12-29 12:41 - 00751078 ____A C:\Users\All Users\1.bmp
2012-12-17 21:21 - 2012-12-17 21:21 - 00632952 ____A C:\Users\jeff\Downloads\cbsidlm-tr1_9-ieSpell-BP2-10208550.exe

ZeroAccess:
C:\Users\jeff\AppData\Local\{00bf3d64-94dc-c1f5-8281-5ad7e7b338fd}
C:\Users\jeff\AppData\Local\{00bf3d64-94dc-c1f5-8281-5ad7e7b338fd}\L
C:\Users\jeff\AppData\Local\{00bf3d64-94dc-c1f5-8281-5ad7e7b338fd}\U

==================== Known DLLs (Whitelisted) =================


==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => MD5 is legit
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points =========================

Restore point made on: 2012-11-25 18:20:28
Restore point made on: 2012-11-26 10:35:32
Restore point made on: 2012-11-27 10:55:07
Restore point made on: 2012-11-28 18:05:38
Restore point made on: 2012-11-29 12:17:25
Restore point made on: 2012-11-30 11:00:32
Restore point made on: 2012-12-10 10:56:47
Restore point made on: 2012-12-11 09:55:02
Restore point made on: 2012-12-12 18:19:13
Restore point made on: 2012-12-13 09:46:50
Restore point made on: 2012-12-14 12:45:24
Restore point made on: 2012-12-17 12:31:47
Restore point made on: 2012-12-18 17:54:21
Restore point made on: 2012-12-19 19:27:25
Restore point made on: 2012-12-20 10:10:13
Restore point made on: 2012-12-21 10:04:51
Restore point made on: 2012-12-26 14:34:36
Restore point made on: 2012-12-27 13:05:05
Restore point made on: 2012-12-28 14:16:11
Restore point made on: 2012-12-29 16:45:14
Restore point made on: 2012-12-31 11:32:01
Restore point made on: 2013-01-01 10:03:58
Restore point made on: 2013-01-02 17:49:11
Restore point made on: 2013-01-03 11:08:43
Restore point made on: 2013-01-04 10:45:07
Restore point made on: 2013-01-05 12:29:38
Restore point made on: 2013-01-06 17:06:19
Restore point made on: 2013-01-07 15:29:54
Restore point made on: 2013-01-08 20:01:15
Restore point made on: 2013-01-09 17:37:26
Restore point made on: 2013-01-10 10:03:44
Restore point made on: 2013-01-10 19:48:45
Restore point made on: 2013-01-11 08:32:33

==================== Memory info ===========================

Percentage of memory in use: 8%
Total physical RAM: 4093.27 MB
Available physical RAM: 3748.3 MB
Total Pagefile: 3958.62 MB
Available Pagefile: 3806.66 MB
Total Virtual: 2047.88 MB
Available Virtual: 1966.31 MB

==================== Partitions =============================

1 Drive c: (OS) (Fixed) (Total:581.48 GB) (Free:449.84 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
2 Drive d: () (Removable) (Total:15.11 GB) (Free:15.05 GB) FAT32
3 Drive e: (symfiles) (CDROM) (Total:0.56 GB) (Free:0.5 GB) UDF
4 Drive x: (RECOVERY) (Fixed) (Total:14.65 GB) (Free:8.02 GB) NTFS

Disk ### Status Size Free Dyn Gpt
-------- ---------- ------- ------- --- ---
Disk 0 Online 596 GB 0 B
Disk 1 Online 15 GB 0 B

Partitions of Disk 0:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 OEM 39 MB 32 KB
Partition 2 Primary 15 GB 40 MB
Partition 3 Primary 581 GB 15 GB

=========================================================

Disk: 0
Partition 1
Type : DE
Hidden: Yes
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 4 FAT Partition 39 MB Healthy Hidden

=========================================================

Disk: 0
Partition 2
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 1 X RECOVERY NTFS Partition 15 GB Healthy Boot

=========================================================

Disk: 0
Partition 3
Type : 07
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 2 C OS NTFS Partition 581 GB Healthy

=========================================================

Partitions of Disk 1:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 15 GB 32 KB

=========================================================

Disk: 1
Partition 1
Type : 0C
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 3 D FAT32 Removable 15 GB Healthy

=========================================================

Last Boot: 2013-01-13 14:02


Farbar Recovery Scan Tool (x86) Version: 09-01-2013
Ran by SYSTEM at 2013-01-14 11:41:04
Running from D:\

================== Search: "services.exe" ===================

C:\Windows\winsxs\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6001.18000_none_cf5fc067cd49010a\services.exe
[2008-01-20 18:22] - [2008-01-20 18:22] - 0279040 ____A (Microsoft Corporation) 2B336AB6286D6C81FA02CBAB914E3C6C

C:\Windows\System32\services.exe
[2008-01-20 18:22] - [2008-01-20 18:22] - 0279040 ____A (Microsoft Corporation) 2B336AB6286D6C81FA02CBAB914E3C6C

C:\Windows\SoftwareDistribution\Download\cd2b15b1a90e884578188440a1660b12\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6002.18005_none_d14b3973ca6acc56\services.exe
[2009-09-18 08:04] - [2009-04-10 22:27] - 0279552 ____A (Microsoft Corporation) D4E6D91C1349B7BFB3599A6ADA56851B

=== End Of Search ===

Thanks again!
==================== End Of Log ============================

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:05 PM

Posted 14 January 2013 - 03:42 PM

Hello

Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt

HKU\jeff\...\Run: [Google] "xidpwooedd.exe" [x]
HKU\jeff\...\Run: [rlqvaknd] C:\Users\jeff\AppData\Roaming\unzhaza [x]
HKU\jeff\...\Policies\system: [DisableTaskMgr] 1
HKLM\...\Winlogon: [Shell] explorer.exe, C:\ProgramData\unzhaza [x ] ()
2013-01-13 13:28 - 2013-01-13 17:19 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\Application Data\unzhaza.exe
2013-01-13 13:28 - 2013-01-13 17:19 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\AppData\Roaming\unzhaza.exe
2013-01-13 13:12 - 2013-01-13 17:19 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\Local Settings\unzhaza.exe
2013-01-13 13:12 - 2013-01-13 17:19 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\Local Settings\Application Data\unzhaza.exe
2013-01-13 13:12 - 2013-01-13 17:19 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\jeff\AppData\Local\unzhaza.exe
2013-01-13 13:12 - 2013-01-13 17:09 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\All Users\unzhaza.exe
2013-01-13 13:12 - 2013-01-13 17:09 - 00189440 ____A (BitTech Co. Ltd.) C:\Users\All Users\Application Data\unzhaza.exe
C:\Users\jeff\AppData\Local\{00bf3d64-94dc-c1f5-8281-5ad7e7b338fd}


NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 mervelous

mervelous
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:03:05 PM

Posted 14 January 2013 - 04:13 PM

Hello Gringo, here is the log-

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 09-01-2013
Ran by SYSTEM at 2013-01-14 13:11:07 Run:1
Running from D:\

==============================================

HKEY_USERS\jeff\Software\Microsoft\Windows\CurrentVersion\Run\\Google Value deleted successfully.
HKEY_USERS\jeff\Software\Microsoft\Windows\CurrentVersion\Run\\rlqvaknd Value deleted successfully.
HKEY_USERS\jeff\Software\Microsoft\Windows\CurrentVersion\Policies\system\\DisableTaskMgr Value deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell Value was restored successfully .
C:\Users\jeff\Application Data\unzhaza.exe moved successfully.
C:\Users\jeff\AppData\Roaming\unzhaza.exe not found.
C:\Users\jeff\Local Settings\unzhaza.exe moved successfully.
C:\Users\jeff\Local Settings\Application Data\unzhaza.exe not found.
C:\Users\jeff\AppData\Local\unzhaza.exe not found.
C:\Users\All Users\unzhaza.exe moved successfully.
C:\Users\All Users\Application Data\unzhaza.exe not found.
C:\Users\jeff\AppData\Local\{00bf3d64-94dc-c1f5-8281-5ad7e7b338fd} moved successfully.

==== End of Fixlog ====

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:05 PM

Posted 14 January 2013 - 04:19 PM

Hello


These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.


-AdwCleaner-

  • Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.

--RogueKiller--

  • Download & SAVE to your Desktop RogueKiller or from here
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 mervelous

mervelous
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:03:05 PM

Posted 14 January 2013 - 04:26 PM

Gringo- Should I re-boot the infected computer in standard mode or Safe mode to run these programs?

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:05 PM

Posted 14 January 2013 - 04:41 PM

normal if possible
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 mervelous

mervelous
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:03:05 PM

Posted 14 January 2013 - 04:58 PM

Encouraging, It opened without the screen block! Here's the logs-


# AdwCleaner v2.105 - Logfile created 01/14/2013 at 13:40:13
# Updated 08/01/2013 by Xplode
# Operating system : Windows Vista ™ Ultimate Service Pack 1 (32 bits)
# User : jeff - JEFF-PC
# Boot Mode : Safe mode
# Running from : F:\adwcleaner.exe
# Option [Delete]


***** [Services] *****

Stopped & Deleted : Updater Service for StartNow Toolbar

***** [Files / Folders] *****

Folder Deleted : C:\Program Files\Ask.com
Folder Deleted : C:\Program Files\Conduit
Folder Deleted : C:\Program Files\Productivity_3
Folder Deleted : C:\ProgramData\IBUpdaterService
Folder Deleted : C:\Users\jeff\AppData\Local\Conduit
Folder Deleted : C:\Users\jeff\AppData\Local\SanctionedMedia
Folder Deleted : C:\Users\jeff\AppData\Local\Temp\AskSearch
Folder Deleted : C:\Users\jeff\AppData\LocalLow\AskToolbar
Folder Deleted : C:\Users\jeff\AppData\LocalLow\Conduit
Folder Deleted : C:\Users\jeff\AppData\LocalLow\PriceGong
Folder Deleted : C:\Users\jeff\AppData\LocalLow\Productivity_3
Folder Deleted : C:\Users\jeff\AppData\Roaming\PerformerSoft
Folder Deleted : C:\Windows\Installer\{86D4B82A-ABED-442A-BE86-96357B70F4FE}

***** [Registry] *****

Key Deleted : HKCU\Software\APN
Key Deleted : HKCU\Software\AppDataLow\AskToolbarInfo
Key Deleted : HKCU\Software\AppDataLow\Software\AskToolbar
Key Deleted : HKCU\Software\AppDataLow\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\PriceGong
Key Deleted : HKCU\Software\AppDataLow\Software\Productivity_3
Key Deleted : HKCU\Software\AppDataLow\Toolbar
Key Deleted : HKCU\Software\Ask.com
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5AA24EA-11B8-4113-95AE-9ED71DEAF12A}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{79A765E1-C399-405B-85AF-466F52E918B0}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{86D4B82A-ABED-442A-BE86-96357B70F4FE}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Productivity_3 Toolbar
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{1FCA4DF8-9ACD-4DFB-89CC-DDD0082FC588}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{5911488E-9D1E-40EC-8CBB-06B231CC153F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{6E13D095-45C3-4271-9475-F3B48227DD9F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{6F282B65-56BF-4BD1-A8B2-A4449A05863D}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1A93C934-025B-4C3A-B38E-9654A7003239}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1FCA4DF8-9ACD-4DFB-89CC-DDD0082FC588}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5911488E-9D1E-40EC-8CBB-06B231CC153F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6E13D095-45C3-4271-9475-F3B48227DD9F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6F282B65-56BF-4BD1-A8B2-A4449A05863D}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B18460F4-6A88-4012-AB5C-78B5A45F44D7}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{79A765E1-C399-405B-85AF-466F52E918B0}
Key Deleted : HKCU\Software\SanctionedMedia
Key Deleted : HKCU\Software\Zugo
Key Deleted : HKLM\Software\APN
Key Deleted : HKLM\Software\AskToolbar
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{9B0CB95C-933A-4B8C-B6D4-EDCD19A43874}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\GenericAskToolbar.DLL
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{1FCA4DF8-9ACD-4DFB-89CC-DDD0082FC588}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{5911488E-9D1E-40EC-8CBB-06B231CC153F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6E13D095-45C3-4271-9475-F3B48227DD9F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B18460F4-6A88-4012-AB5C-78B5A45F44D7}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKLM\SOFTWARE\Classes\GenericAskToolbar.ToolbarWnd
Key Deleted : HKLM\SOFTWARE\Classes\GenericAskToolbar.ToolbarWnd.1
Key Deleted : HKLM\Software\Classes\Installer\Features\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\Software\Classes\Installer\Products\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{6C434537-053E-486D-B62A-160059D9D456}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{91CF619A-4686-4CA4-9232-3B2E6B63AA92}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{AC71B60E-94C9-4EDE-BA46-E146747BB67E}
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.BandObject
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.BandObject.1
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT3003489
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.ToolbarHelperObject
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.ToolbarHelperObject.1
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}
Key Deleted : HKLM\Software\Conduit
Key Deleted : HKLM\Software\Freeze.com
Key Deleted : HKLM\Software\GamesBarSetup
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{53184256-A38C-4120-BFFC-D81DE0AE2001}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5AA24EA-11B8-4113-95AE-9ED71DEAF12A}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F162058D-93FE-4316-BC1D-1C6928615CEE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FCA4DF8-9ACD-4DFB-89CC-DDD0082FC588}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6E13D095-45C3-4271-9475-F3B48227DD9F}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{B18460F4-6A88-4012-AB5C-78B5A45F44D7}
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0CFE535C35F99574E8340BFA75BF92C2
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\120DFADEB50841F408F04D2A278F9509
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\261F213D1F55267499B1F87D0CC3BCF7
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\741B4ADF27276464790022C965AB6DA8
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7DE196B10195F5647A2B21B761F3DE01
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D4F5849367142E4685ED8C25E44C5ED
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A5875B04372C19545BEB90D4D606C472
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A876D9E80B896EC44A8620248CC79296
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B66FFAB725B92594C986DE826A867888
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{86D4B82A-ABED-442A-BE86-96357B70F4FE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Productivity_3 Toolbar
Key Deleted : HKLM\Software\Productivity_3
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{1FCA4DF8-9ACD-4DFB-89CC-DDD0082FC588}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D4027C7F-154A-4066-A1AD-4243D8127440}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{1FCA4DF8-9ACD-4DFB-89CC-DDD0082FC588}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{5911488E-9D1E-40EC-8CBB-06B231CC153F}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{D4027C7F-154A-4066-A1AD-4243D8127440}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks [{1FCA4DF8-9ACD-4DFB-89CC-DDD0082FC588}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [ApnUpdater]

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.19088

[OK] Registry is clean.

-\\ Google Chrome v23.0.1271.97

File : C:\Users\jeff\AppData\Local\Google\Chrome\User Data\Default\Preferences

Deleted [l.7] : homepage = "hxxp://search.startnow.com/s/?src=startpage&provider=&provider_name=startnow&prov[...]
Deleted [l.11] : urls_to_restore_on_startup = [ "hxxp://search.startnow.com/s/?src=startpage&provider=&prov[...]
Deleted [l.33] : icon_url = "hxxp://www.startnow.com/startnow/images/sn_favicon.ico",
Deleted [l.39] : search_url = "hxxp://search.startnow.com/s/?q={searchTerms}&src=defsearch&provider=&provider_[...]
Deleted [l.523] : homepage = "hxxp://search.startnow.com/s/?src=startpage&provider=&provider_name=startnow&provide[...]
Deleted [l.832] : urls_to_restore_on_startup = [ "hxxp://search.startnow.com/s/?src=startpage&provider=&provide[...]

*************************

AdwCleaner[S1].txt - [9762 octets] - [14/01/2013 13:40:13]

########## EOF - C:\AdwCleaner[S1].txt - [9822 octets] ##########


RogueKiller V8.4.3 [Jan 10 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6001 Service Pack 1) 32 bits version
Started in : Normal mode
User : jeff [Admin rights]
Mode : Remove -- Date : 01/14/2013 13:52:44

Bad processes : 0

Registry Entries : 17
[TASK][SUSP PATH] PC Performer.job : F:\PCPerformer_GN.exe /XML="C:\Users\jeff\AppData\Local\Temp\A514.tmp" /STP=0:2 -> DELETED
[HJPOL] HKLM\[...]\System : DisableTaskMgr (0) -> DELETED
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowRecentDocs (0) -> REPLACED (1)
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyPics (0) -> REPLACED (1)
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyMusic (0) -> REPLACED (1)
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowHelp (0) -> REPLACED (1)
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowRun (0) -> REPLACED (1)
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowSetProgramAccessAndDefaults (0) -> REPLACED (1)
[HJ DESK] HKCU\[...]\ClassicStartMenu : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\ClassicStartMenu : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\NewStartPanel : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ] HKCU\[...]\Command Processor : AutoRun ("C:\Users\jeff\AppData\Local\unzhaza.exe") -> DELETED

Particular Files / Folders:

Driver : [LOADED]

Extern Hives:
-> D:\windows\system32\config\SOFTWARE
-> D:\windows\system32\config\SYSTEM
-> D:\Users\Default\NTUSER.DAT

HOSTS File:
--> C:\Windows\system32\drivers\etc\hosts



MBR Check:

+++++ PhysicalDrive0: WDC WD6400AAKS-75A7B2 ATA Device +++++
--- User ---
[MBR] b934803cf6bd0581b3d3e9780ac51716
[BSP] 10a83de1cadf7099361443dc3941cced : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] DELL-UTIL (0xde) [VISIBLE] Offset (sectors): 63 | Size: 39 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 81920 | Size: 15000 Mo
2 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 30801920 | Size: 595439 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[2]_D_01142013_02d1352.txt >>
RKreport[1]_S_01142013_02d1352.txt ; RKreport[2]_D_01142013_02d1352.txt

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:05 PM

Posted 14 January 2013 - 05:06 PM

Hello

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 mervelous

mervelous
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:03:05 PM

Posted 14 January 2013 - 05:43 PM

I'm having trouble shutting down McAfee. I've turned off Real Time Scanning, Scheduled Scanning, Automatic Updates and the Firewall. I get a Prompt from Combofix that McAfee anti-virus and anti-spyware is still running and continuing may create problems. Any suggestions? I can't find any other locations to turn off McAfee other than the SecurityCenter. Thanks.

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:05 PM

Posted 14 January 2013 - 05:53 PM

just go ahead and run combofix



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 mervelous

mervelous
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:03:05 PM

Posted 14 January 2013 - 05:54 PM

My SecurityCenter screen does not look like the one shown in the tutorial....It has four bars at the top: Real Time Scanning, Automatic Updates, Firewall, Subscription. Scanning, Updates and Firewall are all off.

OK

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:05 PM

Posted 14 January 2013 - 05:57 PM

turn off what you can and go ahead and run combofix


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 mervelous

mervelous
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:03:05 PM

Posted 14 January 2013 - 06:45 PM

Gringo, The combofix scan has been running for about 40 min., still no report. Should i close it and re-start?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users