Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Search Re-Direct - Does not appear to be TDSS


  • This topic is locked This topic is locked
21 replies to this topic

#1 ridefree83

ridefree83

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:10:46 PM

Posted 30 March 2013 - 07:35 AM

I have tried everything short of re-installing my OS to try to eliminate this redirect.  I have flushed DNS, run various malware removal tools, checked and re-checked LAN settings, ensured logs files were good, tried to uninstall / reinstall IE - nothing has eliminated the redirect.

 

This re-direct often, or most commonly re-directs my google search through livesearchnow.com and lands on relish.com.  Webpages will open when typed into the browser directly and also if I open the "cached" version of the webpage.

 

I have run dds as requested and have attached the dds.txt log.  The attach.txt say not to post unless specifically directed so I have not attached.

 

Any help on this would really be appreciated!!

Attached Files

  • Attached File  dds.txt   8.42KB   5 downloads


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:46 PM

Posted 30 March 2013 - 11:44 AM


Hello ridefree83

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.




These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-
  • Download Security Check by screen317 from here.
    • Save it to your Desktop.
    • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
-AdwCleaner-
  • Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the content of that logfile with your next answer.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.
--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+
  • Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 ridefree83

ridefree83
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:10:46 PM

Posted 30 March 2013 - 12:24 PM

Hi Gringo, I look forward to working with you.

 

All 3 programs were sucessfully downloaded and run.

 

Reports as follow -

 

Security Check:

 

Results of screen317's Security Check version 0.99.61 
 Windows XP Service Pack 3 x86  
 Internet Explorer 8 
``````````````Antivirus/Firewall Check:``````````````
 Windows Security Center service is not running! This report may not be accurate!
 Windows Firewall Enabled! 
Symantec Endpoint Protection  
 Antivirus up to date! 
`````````Anti-malware/Other Utilities Check:`````````
 Spybot - Search & Destroy
 CCleaner    
 Java™ 6 Update 39 
 Java version out of Date!
````````Process Check: objlist.exe by Laurent```````` 
 Norton ccSvcHst.exe
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C:: 6%
````````````````````End of Log``````````````````````
 

 

ADWCLEANER:

 

# AdwCleaner v2.115 - Logfile created 03/30/2013 at 13:08:19
# Updated 17/03/2013 by Xplode
# Operating system : Microsoft Windows XP Service Pack 3 (32 bits)
# User : Steve Darnell - SCUBA-STEVE
# Boot Mode : Normal
# Running from : C:\Documents and Settings\Steve Darnell\Desktop\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****


***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18702

[OK] Registry is clean.

*************************

AdwCleaner[R1].txt - [1337 octets] - [17/03/2013 20:43:24]
AdwCleaner[R2].txt - [797 octets] - [18/03/2013 22:30:57]
AdwCleaner[S1].txt - [1413 octets] - [17/03/2013 20:48:01]
AdwCleaner[S2].txt - [856 octets] - [18/03/2013 22:33:41]
AdwCleaner[S3].txt - [787 octets] - [30/03/2013 13:08:19]

########## EOF - C:\AdwCleaner[S3].txt - [846 octets] ##########

 

 

ROGUEKILLER:

 

RogueKiller V8.5.4 [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User : Steve Darnell [Admin rights]
Mode : Remove -- Date : 03/30/2013 13:16:06
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 1 ¤¤¤
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
SSDT[12] : NtAlertResumeThread @ 0x805CB024 -> HOOKED (Unknown @ 0x865BECB8)
SSDT[13] : NtAlertThread @ 0x805CAFD4 -> HOOKED (Unknown @ 0x8677B220)
SSDT[17] : NtAllocateVirtualMemory @ 0x8059DF54 -> HOOKED (Unknown @ 0x865D28A0)
SSDT[31] : NtConnectPort @ 0x80599A7E -> HOOKED (Unknown @ 0x86688C88)
SSDT[43] : NtCreateMutant @ 0x8060E330 -> HOOKED (Unknown @ 0x865FBF80)
SSDT[53] : NtCreateThread @ 0x805C73DE -> HOOKED (Unknown @ 0x8673A2F8)
SSDT[83] : NtFreeVirtualMemory @ 0x805A85AE -> HOOKED (Unknown @ 0x866144F0)
SSDT[89] : NtImpersonateAnonymousToken @ 0x805EF70C -> HOOKED (Unknown @ 0x865BC868)
SSDT[91] : NtImpersonateThread @ 0x805CDC9A -> HOOKED (Unknown @ 0x865BCCB8)
SSDT[108] : NtMapViewOfSection @ 0x805A762E -> HOOKED (Unknown @ 0x8671BF20)
SSDT[114] : NtOpenEvent @ 0x80605DA4 -> HOOKED (Unknown @ 0x865BC418)
SSDT[123] : NtOpenProcessToken @ 0x805E43B2 -> HOOKED (Unknown @ 0x86637C40)
SSDT[129] : NtOpenThreadToken @ 0x805E43D0 -> HOOKED (Unknown @ 0x8661BA90)
SSDT[206] : NtResumeThread @ 0x805CAE60 -> HOOKED (Unknown @ 0x865E83A0)
SSDT[213] : NtSetContextThread @ 0x805C9036 -> HOOKED (Unknown @ 0x866483A0)
SSDT[228] : NtSetInformationProcess @ 0x805C3F20 -> HOOKED (Unknown @ 0x865EF858)
SSDT[229] : NtSetInformationThread @ 0x805C1EE0 -> HOOKED (Unknown @ 0x8665CEB0)
SSDT[253] : NtSuspendProcess @ 0x805CAF28 -> HOOKED (Unknown @ 0x865BBBC0)
SSDT[254] : NtSuspendThread @ 0x805CAD9A -> HOOKED (Unknown @ 0x86649ED0)
SSDT[257] : NtTerminateProcess @ 0x805C86EA -> HOOKED (Unknown @ 0x866373A0)
SSDT[258] : NtTerminateThread @ 0x805C88E4 -> HOOKED (Unknown @ 0x86648A80)
SSDT[267] : NtUnmapViewOfSection @ 0x805A8444 -> HOOKED (Unknown @ 0x8664E2D8)
SSDT[277] : NtWriteVirtualMemory @ 0x805A99CE -> HOOKED (Unknown @ 0x86612DB8)

¤¤¤ HOSTS File: ¤¤¤
--> C:\WINDOWS\system32\drivers\etc\hosts

127.0.0.1       localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: TOSHIBA MK8026GAX +++++
--- User ---
[MBR] c424cb29543ded1c83e77a6fea4938b0
[BSP] ae203e84dcb456630d870d8f3155a2b5 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 76316 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[2]_D_03302013_02d1316.txt >>
RKreport[1]_S_03302013_02d1315.txt ; RKreport[2]_D_03302013_02d1316.txt

 

Let me know what next steps are.

 

Thanks.



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:46 PM

Posted 30 March 2013 - 12:45 PM


Hello ridefree83

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

  • Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 ridefree83

ridefree83
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:10:46 PM

Posted 30 March 2013 - 01:13 PM

Thanks for the reply.

 

Working on it now, will post back shortly.



#6 ridefree83

ridefree83
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:10:46 PM

Posted 30 March 2013 - 01:42 PM

Installed and ran combofix - no prpoblems or issues.

 

Log as follows -

 

COMBOFIX:

 

ComboFix 13-03-30.01 - Steve Darnell 03/30/2013  14:17:34.3.1 - x86
Microsoft Windows XP Professional  5.1.2600.3.1252.1.1033.18.1023.537 [GMT -4:00]
Running from: c:\documents and settings\Steve Darnell\Desktop\ComboFix.exe
AV: Symantec Endpoint Protection *Disabled/Updated* {FB06448E-52B8-493A-90F3-E43226D3305C}
.
.
(((((((((((((((((((((((((   Files Created from 2013-02-28 to 2013-03-30  )))))))))))))))))))))))))))))))
.
.
2013-03-24 19:45 . 2013-02-12 00:32 12928 -c----w- c:\windows\system32\dllcache\usb8023x.sys
2013-03-24 18:47 . 2013-03-24 18:51 -------- dc-h--w- c:\windows\ie8
2013-03-24 15:15 . 2013-03-24 15:21 -------- d-----w- c:\documents and settings\Administrator
2013-03-23 19:14 . 2013-03-23 19:14 -------- d-----w- c:\windows\IIS Temporary Compressed Files
2013-03-23 19:11 . 2008-04-14 12:00 7680 -c--a-w- c:\windows\system32\dllcache\inetmgr.exe
2013-03-23 19:08 . 2013-03-23 22:16 -------- d-----w- C:\Inetpub
2013-03-19 00:47 . 2013-01-17 05:28 232336 ------w- c:\windows\system32\MpSigStub.exe
2013-03-18 12:18 . 2013-03-18 12:18 -------- d-----w- c:\documents and settings\Steve Darnell\Local Settings\Application Data\PCHealth
2013-03-18 00:22 . 2013-03-18 00:42 -------- d-----w- c:\documents and settings\All Users\Application Data\HitmanPro
2013-03-17 22:56 . 2013-03-17 22:56 -------- d--h--w- c:\windows\PIF
2013-03-17 22:55 . 2013-03-17 22:55 -------- d-----w- C:\TDSSKiller_Quarantine
2013-03-17 13:22 . 2013-03-17 13:22 -------- d-----w- c:\documents and settings\Steve Darnell\Application Data\Malwarebytes
2013-03-17 13:21 . 2013-03-17 13:21 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2013-03-17 02:27 . 2013-03-17 02:27 -------- d-----w- c:\program files\CCleaner
2013-03-17 00:25 . 2013-03-17 00:25 -------- d-----w- c:\program files\Enigma Software Group
2013-03-17 00:22 . 2013-03-17 18:50 -------- d-----w- c:\windows\0AC0F1B261C74B6EACEF58FCC0B94835.TMP
2013-03-17 00:22 . 2013-03-17 00:22 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2013-03-09 03:12 . 2013-03-09 03:12 159744 --sha-r- c:\windows\system32\xmlprovi0.dll
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-03-13 02:20 . 2012-04-12 11:40 693976 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-03-13 02:20 . 2011-05-24 11:17 73432 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-02-12 00:32 . 2008-04-14 12:00 12928 ----a-w- c:\windows\system32\drivers\usb8023.sys
2013-02-05 20:05 . 2009-09-25 05:37 916480 ----a-w- c:\windows\system32\wininet.dll
2013-02-05 20:05 . 2008-04-14 12:00 43520 ----a-w- c:\windows\system32\licmgr10.dll
2013-02-05 20:05 . 2008-04-14 12:00 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2013-02-05 05:53 . 2009-09-24 13:41 385024 ----a-w- c:\windows\system32\html.iec
2013-01-26 03:55 . 2008-04-14 12:00 552448 ----a-w- c:\windows\system32\oleaut32.dll
2013-01-15 21:56 . 2012-04-27 23:35 477616 ----a-w- c:\windows\system32\npdeployJava1.dll
2013-01-15 21:56 . 2011-05-28 13:15 473520 ----a-w- c:\windows\system32\deployJava1.dll
2013-01-15 20:14 . 2012-04-27 23:35 73728 ----a-w- c:\windows\system32\javacpl.cpl
2013-01-07 01:16 . 2009-08-05 01:44 2193024 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-01-07 00:36 . 2009-08-04 14:20 2069760 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-01-04 01:20 . 2009-04-17 12:26 1867264 ----a-w- c:\windows\system32\win32k.sys
2013-01-02 06:49 . 2009-06-03 19:09 1292288 ----a-w- c:\windows\system32\quartz.dll
2013-01-02 06:49 . 2008-04-14 12:00 148992 ----a-w- c:\windows\system32\mpg2splt.ax
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2009-10-21 115560]
"Apoint"="c:\program files\Apoint\Apoint.exe" [2005-10-07 176128]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-07-07 344064]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-02-21 59240]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2011-10-24 421888]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-09-17 254896]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccEvtMgr]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccSetMgr]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37.sys]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Symantec Antivirus]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Symantec Antvirus]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Symantec\\Symantec Endpoint Protection\\Smc.exe"=
"c:\\Program Files\\Symantec\\Symantec Endpoint Protection\\SNAC.EXE"=
"c:\\Program Files\\Common Files\\Symantec Shared\\ccApp.exe"=
"c:\\Program Files\\Common Files\\Apple\\Apple Application Support\\WebKit2WebProcess.exe"=
.
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [8/15/2012 3:53 PM 106656]
S0 ntcdrdrv;ntcdrdrv;c:\windows\system32\DRIVERS\ntcdrdrv.sys --> c:\windows\system32\DRIVERS\ntcdrdrv.sys [?]
S3 esgiguard;esgiguard;\??\c:\program files\Enigma Software Group\SpyHunter\esgiguard.sys --> c:\program files\Enigma Software Group\SpyHunter\esgiguard.sys [?]
S3 Fasydimnpatl;Fasydimnpatl;c:\windows\system32\drivers\dmload.sys [4/14/2008 8:00 AM 5888]
.
--- Other Services/Drivers In Memory ---
.
*Deregistered* - TrueSight
.
Contents of the 'Scheduled Tasks' folder
.
2013-03-30 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-12 02:20]
.
2013-03-30 c:\windows\Tasks\pcwbhzoga.job
- c:\windows\system32\xmlprovi0.dll [2013-03-09 03:12]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Settings,ProxyOverride = *.local
IE: Append Link Target to Existing PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1 71.252.0.12
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-03-30 14:24
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(856)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(3336)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2013-03-30  14:27:38
ComboFix-quarantined-files.txt  2013-03-30 18:27
ComboFix2.txt  2013-03-24 18:40
ComboFix3.txt  2013-03-20 03:45
.
Pre-Run: 67,853,377,536 bytes free
Post-Run: 67,877,916,672 bytes free
.
- - End Of File - - 72A112F3BCBA2794F3BE39C008747360

 

Opened internet explorer and noticed the following:

received warning that IE was not my default browser - weird because it is my only browser - did nothing to change

keep receiving warning about leaving / entering secure websites - clicked ok to proceed

 

Went to google and ran a few random searches.  At first, all seemed normal.  Used back browser button to click new link.  Third attempt resulted in a redirect (livesearchnow.com ending on spry.com).

 

Closed IE.  Opened again and typed new search.  First link (below top advertised links) worked.  Used back browser and clicked next link and was re-directed again.

 

Please let me know if you need more info or other specific details.  Does not seem that problem has been resolved.

 

Next steps?

 

Thanks.



#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:46 PM

Posted 30 March 2013 - 03:25 PM


Hello ridefree83

we will run this now, it will help remove some files from the computer.


Blitzblank.

Download BlitzBlank and save it to your desktop. Open Blitzblank.exe
DeleteFile:
c:\windows\system32\xmlprovi0.dll
c:\windows\Tasks\pcwbhzoga.job
  • Click OK at the warning (and take note of it, this is a VERY powerful tool!).
  • Click the Script tab and copy/paste the following text there:
    • Click Execute Now. Your computer will need to reboot in order to replace the files.
    • When done, post me the report created by Blitzblank. you can find it at the root of the drive Normaly C:\
  • Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 ridefree83

ridefree83
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:10:46 PM

Posted 30 March 2013 - 05:44 PM

Thanks Gringo.

 

Before I complete this next step, can you please verify the text you want me to paste into the script tab?

 

In reading your response above, there does not appear to be anything for me to paste, but rather steps to click execute now and then post the report.

 

Could you please clarify?

 

Thanks!



#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:46 PM

Posted 30 March 2013 - 05:52 PM

DeleteFile:
c:\windows\system32\xmlprovi0.dll
c:\windows\Tasks\pcwbhzoga.job


the above is what I want you to use as the script


the forum software messes with my response

Edited by gringo_pr, 30 March 2013 - 05:53 PM.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 ridefree83

ridefree83
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:10:46 PM

Posted 30 March 2013 - 05:58 PM

Got it.

 

Thanks for the quick response.  I assumed thats what you meant, but didn't want to make things worse by guessing.

 

Downloaded and ran BlitzBlank with script.

 

Report as follows-

 

BLITZBLANK:

 

BlitzBlank 1.0.0.32

File/Registry Modification Engine native application
MoveFileOnReboot: sourceFile = "\??\c:\windows\system32\xmlprovi0.dll", destinationFile = "(null)", replaceWithDummy = 0
MoveFileOnReboot: sourceFile = "\??\c:\windows\tasks\pcwbhzoga.job", destinationFile = "(null)", replaceWithDummy = 0



#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:46 PM

Posted 30 March 2013 - 06:16 PM


Hello ridefree83

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:
 ClearJavaCache:: 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 ridefree83

ridefree83
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:10:46 PM

Posted 30 March 2013 - 07:13 PM

Gringo, I am going to answer you list a little out of order.

 

2. Ran script thru combofix with no problems.  computer restarted, no problems.

 

3. Computer seems to be working again.  Went into IE and ran 6-8 searches in google.  All results seem to be legit.

 

1. Report from Combofix:

 

ComboFix 13-03-30.01 - Steve Darnell 03/30/2013  19:27:25.4.1 - x86
Microsoft Windows XP Professional  5.1.2600.3.1252.1.1033.18.1023.417 [GMT -4:00]
Running from: c:\documents and settings\Steve Darnell\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Steve Darnell\Desktop\CFScript.txt
AV: Symantec Endpoint Protection *Disabled/Updated* {FB06448E-52B8-493A-90F3-E43226D3305C}
.
.
(((((((((((((((((((((((((   Files Created from 2013-02-28 to 2013-03-30  )))))))))))))))))))))))))))))))
.
.
2013-03-24 19:45 . 2013-02-12 00:32 12928 -c----w- c:\windows\system32\dllcache\usb8023x.sys
2013-03-24 18:47 . 2013-03-24 18:51 -------- dc-h--w- c:\windows\ie8
2013-03-24 15:15 . 2013-03-24 15:21 -------- d-----w- c:\documents and settings\Administrator
2013-03-23 19:14 . 2013-03-23 19:14 -------- d-----w- c:\windows\IIS Temporary Compressed Files
2013-03-23 19:11 . 2008-04-14 12:00 7680 -c--a-w- c:\windows\system32\dllcache\inetmgr.exe
2013-03-23 19:08 . 2013-03-23 22:16 -------- d-----w- C:\Inetpub
2013-03-19 00:47 . 2013-01-17 05:28 232336 ------w- c:\windows\system32\MpSigStub.exe
2013-03-18 12:18 . 2013-03-18 12:18 -------- d-----w- c:\documents and settings\Steve Darnell\Local Settings\Application Data\PCHealth
2013-03-18 00:22 . 2013-03-18 00:42 -------- d-----w- c:\documents and settings\All Users\Application Data\HitmanPro
2013-03-17 22:56 . 2013-03-17 22:56 -------- d--h--w- c:\windows\PIF
2013-03-17 22:55 . 2013-03-17 22:55 -------- d-----w- C:\TDSSKiller_Quarantine
2013-03-17 13:22 . 2013-03-17 13:22 -------- d-----w- c:\documents and settings\Steve Darnell\Application Data\Malwarebytes
2013-03-17 13:21 . 2013-03-17 13:21 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2013-03-17 02:27 . 2013-03-17 02:27 -------- d-----w- c:\program files\CCleaner
2013-03-17 00:25 . 2013-03-17 00:25 -------- d-----w- c:\program files\Enigma Software Group
2013-03-17 00:22 . 2013-03-17 18:50 -------- d-----w- c:\windows\0AC0F1B261C74B6EACEF58FCC0B94835.TMP
2013-03-17 00:22 . 2013-03-17 00:22 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-03-13 02:20 . 2012-04-12 11:40 693976 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-03-13 02:20 . 2011-05-24 11:17 73432 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-02-12 00:32 . 2008-04-14 12:00 12928 ----a-w- c:\windows\system32\drivers\usb8023.sys
2013-02-05 20:05 . 2009-09-25 05:37 916480 ----a-w- c:\windows\system32\wininet.dll
2013-02-05 20:05 . 2008-04-14 12:00 43520 ----a-w- c:\windows\system32\licmgr10.dll
2013-02-05 20:05 . 2008-04-14 12:00 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2013-02-05 05:53 . 2009-09-24 13:41 385024 ----a-w- c:\windows\system32\html.iec
2013-01-26 03:55 . 2008-04-14 12:00 552448 ----a-w- c:\windows\system32\oleaut32.dll
2013-01-15 21:56 . 2012-04-27 23:35 477616 ----a-w- c:\windows\system32\npdeployJava1.dll
2013-01-15 21:56 . 2011-05-28 13:15 473520 ----a-w- c:\windows\system32\deployJava1.dll
2013-01-15 20:14 . 2012-04-27 23:35 73728 ----a-w- c:\windows\system32\javacpl.cpl
2013-01-07 01:16 . 2009-08-05 01:44 2193024 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-01-07 00:36 . 2009-08-04 14:20 2069760 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-01-04 01:20 . 2009-04-17 12:26 1867264 ----a-w- c:\windows\system32\win32k.sys
2013-01-02 06:49 . 2009-06-03 19:09 1292288 ----a-w- c:\windows\system32\quartz.dll
2013-01-02 06:49 . 2008-04-14 12:00 148992 ----a-w- c:\windows\system32\mpg2splt.ax
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2009-10-21 115560]
"Apoint"="c:\program files\Apoint\Apoint.exe" [2005-10-07 176128]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-07-07 344064]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-02-21 59240]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2011-10-24 421888]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-09-17 254896]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccEvtMgr]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccSetMgr]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37.sys]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Symantec Antivirus]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Symantec Antvirus]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Symantec\\Symantec Endpoint Protection\\Smc.exe"=
"c:\\Program Files\\Symantec\\Symantec Endpoint Protection\\SNAC.EXE"=
"c:\\Program Files\\Common Files\\Symantec Shared\\ccApp.exe"=
"c:\\Program Files\\Common Files\\Apple\\Apple Application Support\\WebKit2WebProcess.exe"=
.
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [8/15/2012 3:53 PM 106656]
S0 ntcdrdrv;ntcdrdrv;c:\windows\system32\DRIVERS\ntcdrdrv.sys --> c:\windows\system32\DRIVERS\ntcdrdrv.sys [?]
S3 esgiguard;esgiguard;\??\c:\program files\Enigma Software Group\SpyHunter\esgiguard.sys --> c:\program files\Enigma Software Group\SpyHunter\esgiguard.sys [?]
S3 Fasydimnpatl;Fasydimnpatl;c:\windows\system32\drivers\dmload.sys [4/14/2008 8:00 AM 5888]
.
Contents of the 'Scheduled Tasks' folder
.
2013-03-30 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-12 02:20]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Settings,ProxyOverride = *.local
IE: Append Link Target to Existing PDF - c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1 71.252.0.12
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-03-30 19:35
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(860)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(1644)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2013-03-30  19:37:07
ComboFix-quarantined-files.txt  2013-03-30 23:37
ComboFix2.txt  2013-03-30 18:27
ComboFix3.txt  2013-03-24 18:40
ComboFix4.txt  2013-03-20 03:45
.
Pre-Run: 67,842,199,552 bytes free
Post-Run: 67,840,434,176 bytes free
.
- - End Of File - - 974C1913D8038FAE1DDB5314A0C33343
 

 

Next Steps?



#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:46 PM

Posted 30 March 2013 - 08:43 PM


Hello ridefree83

I would like to see a report that combofix makes.

extra combofix report
C:\Qoobox\Add-Remove Programs.txt
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box
    • click ok
  • copy and paste the report into this topic for me to review

    Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 ridefree83

ridefree83
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:10:46 PM

Posted 30 March 2013 - 08:51 PM

Adobe Flash Player 11 ActiveX
ALPS Touch Pad Driver
Apple Application Support
ATI - Software Uninstall Utility
ATI AVIVO Codecs
ATI Control Panel
ATI Display Driver
C-Major Audio
CCleaner
Dell Driver Download Manager
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
Hotfix for Windows XP (KB952287)
Hotfix for Windows XP (KB954550-v5)
Hotfix for Windows XP (KB970653-v3)
Java Auto Updater
Java™ 6 Update 39
LiveUpdate 3.3 (Symantec Corporation)
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft .NET Framework 3.5 SP1
Microsoft Application Error Reporting
Microsoft Compression Client Pack 1.0 for Windows XP
Microsoft User-Mode Driver Framework Feature Pack 1.0
Microsoft Visual C++ 2008 Redistributable - KB2467174 - x86 9.0.30729.5570
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161
OGA Notifier 2.0.0048.0
QuickTime
Security Update for Microsoft .NET Framework 3.5 SP1 (KB2604111)
Security Update for Microsoft .NET Framework 3.5 SP1 (KB2657424)
Security Update for Microsoft .NET Framework 3.5 SP1 (KB2736416)
Security Update for Windows Internet Explorer 8 (KB2510531)
Security Update for Windows Internet Explorer 8 (KB2797052)
Security Update for Windows Internet Explorer 8 (KB2809289)
Security Update for Windows XP (KB2807986)
Security Update for Windows XP (KB923561)
Security Update for Windows XP (KB923789)
Security Update for Windows XP (KB946648)
Security Update for Windows XP (KB950762)
Security Update for Windows XP (KB950974)
Security Update for Windows XP (KB951066)
Security Update for Windows XP (KB951376-v2)
Security Update for Windows XP (KB951748)
Security Update for Windows XP (KB952004)
Security Update for Windows XP (KB952954)
Security Update for Windows XP (KB954459)
Security Update for Windows XP (KB955069)
Security Update for Windows XP (KB956572)
Security Update for Windows XP (KB956744)
Security Update for Windows XP (KB956802)
Security Update for Windows XP (KB956803)
Security Update for Windows XP (KB956844)
Security Update for Windows XP (KB957097)
Security Update for Windows XP (KB958644)
Security Update for Windows XP (KB958687)
Security Update for Windows XP (KB958869)
Security Update for Windows XP (KB959426)
Security Update for Windows XP (KB960225)
Security Update for Windows XP (KB960803)
Security Update for Windows XP (KB960859)
Security Update for Windows XP (KB961371-v2)
Security Update for Windows XP (KB961501)
Security Update for Windows XP (KB968537)
Security Update for Windows XP (KB969059)
Security Update for Windows XP (KB970238)
Security Update for Windows XP (KB971486)
Security Update for Windows XP (KB971557)
Security Update for Windows XP (KB971633)
Security Update for Windows XP (KB971657)
Security Update for Windows XP (KB971961)
Security Update for Windows XP (KB973354)
Security Update for Windows XP (KB973507)
Security Update for Windows XP (KB973525)
Security Update for Windows XP (KB973869)
Security Update for Windows XP (KB974112)
Security Update for Windows XP (KB974455)
Security Update for Windows XP (KB974571)
Security Update for Windows XP (KB975025)
Security Update for Windows XP (KB975467)
Spybot - Search & Destroy
Symantec Endpoint Protection
Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
Update for Microsoft Windows (KB971513)
Update for Windows XP (KB951978)
Update for Windows XP (KB967715)
Update for Windows XP (KB968389)
Update for Windows XP (KB973815)
Update for Windows XP (KB976749)
WebFldrs XP
Windows Genuine Advantage Notifications (KB905474)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Internet Explorer 8
Windows Media Format 11 runtime
Windows Media Player 11
XP Codec Pack
 



#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:46 PM

Posted 30 March 2013 - 09:03 PM


Hello

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (Revo does allot better of a job)
  • Programs to remove

    • Java™ 6 Update 39


Please download and install Revo Uninstaller Free
  • Double click Revo Uninstaller to run it.
  • From the list of programs double click on The Program to remove
  • When prompted if you want to uninstall click Yes.
  • Be sure the Moderate option is selected then click Next.
  • The program will run, If prompted again click Yes
  • when the built-in uninstaller is finished click on Next.
  • Once the program has searched for leftovers click Next.
  • Check/tick the bolded items only on the list then click Delete
  • when prompted click on Yes and then on next.
  • put a check on any folders that are found and select delete
  • when prompted select yes then on next
  • Once done click Finish.
  • .



    Clean Out Temp Files
    • This small application you may want to keep and use once a week to keep the computer clean.

      Download CCleaner from here http://www.ccleaner.com/
      • Run the installer to install the application.
      • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
      • Run CCleaner. default settings are fine
      • Click Run Cleaner.
      • Close CCleaner.
Run Malwarebytes

Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes' Anti-Malware
    • and Launch Malwarebytes' Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
  • Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
    Click OK to either and let MBAM proceed with the disinfection process.
    If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.



    Download HijackThis
    • Go Here to download HijackThis program
    • Save HijackThis to your desktop.
    • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
    • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
    • copy and paste hijackthis report into the topic
    "information and logs"
    • In your next post I need the following
      • Log From MBAM
        • report from Hijackthis
          • let me know of any problems you may have had
            • How is the computer doing now?
          Gringo






I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users