Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Backdoor.Tidserv.I!inf - Can't remove!


  • This topic is locked This topic is locked
25 replies to this topic

#1 nbrad4d

nbrad4d

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 28 May 2013 - 01:25 AM

The computer has been infected and turned off for about a year... Please help!
 
DDS (Ver_2012-11-20.01) - NTFS_x86 MINIMAL
Internet Explorer: 8.0.6001.19088
Run by Brandon C Sheehan at 2:15:32 on 2013-05-28
Microsoft® Windows Vista™ Home Basic   6.0.6002.2.1252.1.1033.18.3327.2950 [GMT -4:00]
.
AV: Norton 360 *Disabled/Outdated* {63DF5164-9100-186D-2187-8DC619EFD8BF}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: Norton 360 *Disabled/Outdated* {D8BEB080-B73A-17E3-1B37-B6B462689202}
FW: Norton 360 *Disabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k NetworkService
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://home.mywebsearch.com/index.jhtml?n=77C09F4F&ptnrS=GRxdm0945CUS&ptb=5tWT3EhCqFNeiB6R25FpXA
uURLSearchHooks: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - <orphaned>
uURLSearchHooks: ToolbarURLSearchHook Class: {CA3EB689-8F09-4026-AA10-B9534C691CE0} - c:\program files\fast browser search\ie\tbhelper.dll
uURLSearchHooks: <No Name>: {FF365CDC-88FE-4ffa-A3F3-357855231DFA} - c:\program files\puredefmusic\toolbar\1.bin\p3SrcAs.dll
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - <orphaned>
BHO: PriceGongBHO Class: {1631550F-191D-4826-B069-D9439253D926} - c:\program files\pricegong\2.1.0\PriceGongIE.dll
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Shop to Win 2: {20FEC4E7-F7B7-438B-8191-33D2EFC5EBEA} - c:\program files\shop to win 2\ShoppingBHO.dll
BHO: Symantec NCO BHO: {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - c:\program files\norton 360\engine\5.2.1.3\coieplg.dll
BHO: Symantec Intrusion Prevention: {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - c:\program files\norton 360\engine\5.2.1.3\ips\ipsbho.dll
BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - c:\program files\google\googletoolbarnotifier\5.7.7227.1100\swg.dll
BHO: Updater For My.Freeze.com Toolbar: {C26CD490-5F01-41E3-B150-EB29F19DA056} - 
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - 
BHO: Toolbar BHO: {E30A55B1-F1B7-43a4-B3F6-EC90CDC4FE60} - c:\program files\puredefmusic\toolbar\1.bin\p3bar.dll
BHO: Search Assistant BHO: {FF365CDB-88FE-4ffa-A3F3-357855231DFA} - c:\program files\puredefmusic\toolbar\1.bin\p3SrcAs.dll
BHO: HP Smart BHO Class: {FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
TB: Google Toolbar: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: PureDef Music Toolbar: {E30A55B9-F1B7-43A4-B3F6-EC90CDC4FE60} - c:\program files\puredefmusic\toolbar\1.bin\p3bar.dll
TB: PureDef Music Toolbar: {E30A55B9-F1B7-43a4-B3F6-EC90CDC4FE60} - c:\program files\puredefmusic\toolbar\1.bin\p3bar.dll
TB: Norton Toolbar: {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - c:\program files\norton 360\engine\5.2.1.3\coieplg.dll
TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [InstallIQUpdater] "c:\program files\w3i\installiqupdater\InstallIQUpdater.exe" /silent /autorun
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
mRun: [Windows Defender] c:\program files\windows defender\MSASCui.exe -hide
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [Skytel] Skytel.exe
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"
mRun: [LanguageShortcut] "c:\program files\cyberlink\powerdvd\language\Language.exe"
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [hpqSRMon] <no file>
StartupFolder: c:\users\brando~1\appdata\roaming\micros~1\windows\startm~1\programs\startup\onenot~1.lnk - c:\program files\microsoft office\office12\ONENOTEM.EXE
StartupFolder: c:\users\brando~1\appdata\roaming\micros~1\windows\startm~1\programs\startup\_uninst_.lnk - c:\users\brandon c sheehan\appdata\local\temp\_uninst_.bat
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
mPolicies-Explorer: BindDirectlyToPropertySetStorage = dword:0
mPolicies-System: EnableUIADesktopToggle = dword:0
mPolicies-Explorer: NoDriveTypeAutoRun = dword:145
IE: &Search - <no file>
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
IE: {DDE87865-83C5-48c4-8357-2F5B1AA84522} - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - hxxp://ak.exe.imgfarm.com/images/nocache/funwebproducts/ei-4/ZwinkyInitialSetup1.0.1.1.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
TCP: NameServer = 209.18.47.61 209.18.47.62 192.168.1.1
TCP: Interfaces\{B833AF42-C1A5-4EE1-BAD4-79185B538F09} : DHCPNameServer = 209.18.47.61 209.18.47.62 192.168.1.1
LSA: Security Packages =  kerberos msv1_0 schannel wdigest tspkg
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\brandon c sheehan\appdata\roaming\mozilla\firefox\profiles\49wobq1w.default\
FF - prefs.js: browser.search.selectedEngine - Secure Search
FF - prefs.js: browser.startup.homepage - hxxp://home.mywebsearch.com/index.jhtml?n=77C09F4F&ptnrS=GRxdm0945CUS&ptb=5tWT3EhCqFNeiB6R25FpXA
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=mcafee&p=
FF - prefs.js: network.proxy.type - 0
FF - component: c:\program files\pricegong\2.1.0\ff\components\PriceGongFF.dll
FF - component: c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_5.1.0.29\coffplgn_2011_7_5_1\components\coFFPlgn.dll
FF - component: c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_5.1.0.29\ipsffplgn\components\IPSFFPl.dll
FF - plugin: c:\program files\adobe\reader 10.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\google\update\1.3.21.115\npGoogleUpdate3.dll
FF - plugin: c:\program files\viewpoint\viewpoint media player\npViewpoint.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: XUL Cache: {0ed28905-e60b-4ce0-bdb7-e5713d5b2431} - %profile%\extensions\{0ed28905-e60b-4ce0-bdb7-e5713d5b2431}
FF - Ext: Symantec Intrusion Prevention: {BBDA0591-3099-440a-AA10-41764D9DB4DB} - c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_5.1.0.29\IPSFFPlgn
FF - Ext: Norton Toolbar: {2D3F3651-74B9-4795-BDEC-6DA2F431CB62} - c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_5.1.0.29\coFFPlgn_2011_7_5_1
FF - Ext: XULRunner: {E1AAC6AC-D656-4AF5-8F58-2E43BE6EC9F2} - c:\windows\system32\config\systemprofile\appdata\local\{E1AAC6AC-D656-4AF5-8F58-2E43BE6EC9F2}
FF - Ext: PriceGong: {8A9386B4-E958-4c4c-ADF4-8F26DB3E4829} - c:\program files\pricegong\2.1.0\FF
.
============= SERVICES / DRIVERS ===============
.
R0 MrFilter;EasyWrite Driver;c:\windows\system32\drivers\MRFilter.sys [2009-3-2 27136]
R0 SymDS;Symantec Data Store;c:\windows\system32\drivers\n360\0502010.003\symds.sys [2012-8-27 340088]
R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\n360\0502010.003\symefa.sys [2012-8-27 744568]
S1 BHDrvx86;BHDrvx86;c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_5.1.0.29\definitions\bashdefs\20120823.005\BHDrvx86.sys [2012-8-23 995488]
S1 IDSVix86;IDSVix86;c:\programdata\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_5.1.0.29\definitions\ipsdefs\20120824.001\IDSvix86.sys [2012-8-24 386208]
S1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\n360\0502010.003\ironx86.sys [2012-8-27 136312]
S1 SYMTDIv;Symantec Vista Network Dispatch Driver;c:\windows\system32\drivers\n360\0502010.003\symtdiv.sys [2012-8-27 331384]
S2 0277611336926510mcinstcleanup;McAfee Application Installer Cleanup (0277611336926510);c:\users\brando~1\appdata\local\temp\027761~1.exe -cleanup -nolog --> c:\users\brando~1\appdata\local\temp\027761~1.EXE -cleanup -nolog [?]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 MBAMScheduler;MBAMScheduler;c:\program files\malwarebytes' anti-malware\mbamscheduler.exe [2013-5-27 418376]
S2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2013-5-27 701512]
S2 N360;Norton 360;c:\program files\norton 360\engine\5.2.1.3\ccsvchst.exe [2012-8-27 130008]
S2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2009-5-31 24652]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2012-5-13 106104]
S3 ggflt;SEMC USB Flash Driver Filter;c:\windows\system32\drivers\ggflt.sys [2011-9-11 13224]
S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2013-5-27 22856]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
.
=============== Created Last 30 ================
.
2013-05-27 23:13:29 -------- d-----w- c:\programdata\Kaspersky Lab
2013-05-27 23:13:18 -------- d-----w- c:\users\brandon c sheehan\appdata\roaming\Malwarebytes
2013-05-27 23:13:01 -------- d-----w- c:\programdata\Malwarebytes
2013-05-27 23:12:56 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2013-05-27 23:12:55 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
.
==================== Find3M  ====================
.
.
=================== ROOTKIT  ====================
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 6.0.6002 Disk: WDC_WD2500AAJS-00VTA0 rev.01.01B01 -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP4T0L0-8 
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll ataport.SYS pciide.sys PCIIDEX.SYS atapi.sys 
1 nt!IofCallDriver[0x8245511B] -> \Device\Harddisk0\DR0[0x85B170C0]
3 CLASSPNP[0x8B5A08B3] -> nt!IofCallDriver[0x8245511B] -> [0x8599D680]
5 acpi[0x82E496BC] -> nt!IofCallDriver[0x8245511B] -> \Device\Ide\IdeDeviceP3T0L0-6[0x8500D8A0]
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; MOV ES, AX; MOV DS, AX; MOV SI, 0x7c00; MOV DI, 0x600; MOV CX, 0x200; CLD ; REP MOVSB ; PUSH AX; PUSH 0x61c; RETF ; STI ; MOV CX, 0x4; MOV BP, 0x7be; CMP BYTE [BP+0x0], 0x0;  }
user != kernel MBR !!! 
sectors 488397166 (+255): user != kernel
.
============= FINISH:  2:17:22.40 ===============
 

 

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:28 PM

Posted 28 May 2013 - 10:37 PM


Hello nbrad4d

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.


These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 nbrad4d

nbrad4d
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 29 May 2013 - 11:56 AM

I ran the two programs. Now, Malwarebytes keeps popping up saying it has blocked a suspicious website. It gives a different IP address every time of something it blocked. I'm not sure if this is related though - the computer is my boyfriend's, and he doesn't remember exactly what it was doing before he turned it off almost a year ago. He says it was slow, which seems to be fixed, but I'm not sure.
Here are the logs:
AdwCleaner:

# AdwCleaner v2.301 - Logfile created 05/29/2013 at 02:07:45
# Updated 16/05/2013 by Xplode
# Operating system : Windows Vista ™ Home Basic Service Pack 2 (32 bits)
# User : Brandon C Sheehan - BRANDONCSHEE-PC
# Boot Mode : Safe mode
# Running from : E:\AdwCleaner.exe
# Option [Delete]


***** [Services] *****

Stopped & Deleted : Viewpoint Manager Service

***** [Files / Folders] *****

File Deleted : C:\Program Files\Mozilla Firefox\.autoreg
File Deleted : C:\Program Files\Mozilla FireFox\Components\AskSearch.js
File Deleted : C:\Users\Brandon C Sheehan\AppData\Roaming\Mozilla\Firefox\Profiles\49wobq1w.default\searchplugins\mywebsearch.xml
Folder Deleted : C:\Program Files\Fast Browser Search
Folder Deleted : C:\Program Files\Free Offers from Freeze.com
Folder Deleted : C:\Program Files\PriceGong
Folder Deleted : C:\Program Files\puredefmusic
Folder Deleted : C:\Program Files\Viewpoint
Folder Deleted : C:\ProgramData\Viewpoint
Folder Deleted : C:\Users\Brandon C Sheehan\AppData\LocalLow\myfreezetoolbar
Folder Deleted : C:\Users\Brandon C Sheehan\AppData\LocalLow\PriceGong
Folder Deleted : C:\Users\Brandon C Sheehan\AppData\LocalLow\puredefmusic
Folder Deleted : C:\Users\Brandon C Sheehan\AppData\LocalLow\Viewpoint

***** [Registry] *****

Key Deleted : HKCU\Software\AppDataLow\Software\Freecause
Key Deleted : HKCU\Software\AppDataLow\Software\PriceGong
Key Deleted : HKCU\Software\AppDataLow\Software\puredefmusic
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\MenuExt\&Search
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{CF739809-1C6C-47C0-85B9-569DBB141420}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\PriceGong
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\puredefmusictoolbar Uninstall
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\ViewpointMediaPlayer
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{00A6FAF1-072E-44CF-8957-5838F569A31D}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{07B18EA1-A523-4961-B6BB-170DE4475CCA}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{07B18EA9-A523-4961-B6BB-170DE4475CCA}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{1631550F-191D-4826-B069-D9439253D926}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{201F27D4-3704-41D6-89C1-AA35E39143ED}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{3041D03E-FD4B-44E0-B742-2D9B88305F98}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{C26CD490-5F01-41E3-B150-EB29F19DA056}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{E30A55B1-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{E30A55B9-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{F0626A63-410B-45E2-99A1-3F2475B2D695}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FF365CDB-88FE-4FFA-A3F3-357855231DFA}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF6-072E-44CF-8957-5838F569A31D}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{0702A2B6-13AA-4090-9E01-BCDC85DD933F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA1-A523-4961-B6BB-170DE4475CCA}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA9-A523-4961-B6BB-170DE4475CCA}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EAB-A523-4961-B6BB-170DE4475CCA}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{0BD6F992-62AD-47F7-ACA6-299729BE4E2B}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1631550F-191D-4826-B069-D9439253D926}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{201F27D4-3704-41D6-89C1-AA35E39143ED}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{3041D03E-FD4B-44E0-B742-2D9B88305F98}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{91C18ED5-5E1C-4AE5-A148-A861DE8C8E16}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{C26CD490-5F01-41E3-B150-EB29F19DA056}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{E30A55B1-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{E30A55B9-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F0626A63-410B-45E2-99A1-3F2475B2D695}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FF365CDB-88FE-4FFA-A3F3-357855231DFA}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FF365CDC-88FE-4FFA-A3F3-357855231DFA}
Key Deleted : HKCU\Software\puredefmusic
Key Deleted : HKCU\Software\YahooPartnerToolbar
Key Deleted : HKCU\Software\Zugo
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{055069F3-F78B-4BD1-A277-FE66648D3300}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{835315FC-1BF6-4CA9-80CD-F6C158D40692}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{EB583FE1-9458-4EDA-AC68-24D24F17C70F}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\BHO.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\PriceGongIE.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\ShoppingBHO.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1
Key Deleted : HKLM\SOFTWARE\Classes\BHO.PSHelper
Key Deleted : HKLM\SOFTWARE\Classes\BHO.PSHelper.1
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{0BD6F992-62AD-47F7-ACA6-299729BE4E2B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{147A976F-EEE1-4377-8EA7-4716E4CDD239}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{1631550F-191D-4826-B069-D9439253D926}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{A2870243-600E-4883-81F7-BB1ACDF8E3BC}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{C26CD490-5F01-41E3-B150-EB29F19DA056}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D2A2595C-4FE4-4315-AA9B-19DBD6271B71}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E30A55B1-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E30A55B9-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E30A55BB-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FF365CDB-88FE-4FFA-A3F3-357855231DFA}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FF365CDC-88FE-4FFA-A3F3-357855231DFA}
Key Deleted : HKLM\SOFTWARE\Classes\ComObject.DeskbarEnabler
Key Deleted : HKLM\SOFTWARE\Classes\ComObject.DeskbarEnabler.1
Key Deleted : HKLM\SOFTWARE\Classes\FCSB000062035.JSOptionsImpl
Key Deleted : HKLM\SOFTWARE\Classes\FCSB000062035.JSOptionsImpl.1
Key Deleted : HKLM\SOFTWARE\Classes\FCSB000062035.Shopping
Key Deleted : HKLM\SOFTWARE\Classes\FCSB000062035.Shopping.1
Key Deleted : HKLM\SOFTWARE\Classes\IMsiDe1egate.Application.1
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{45D59156-647B-4B06-B20E-0E297A1077BD}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BE990A32-C2EC-4654-8FD0-26FECEA81998}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D7C0D2ED-A16B-4939-BCAF-D61205B6D4DB}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E30A55BA-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E30A55BC-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKLM\SOFTWARE\Classes\PriceFactorIE.PriceGongBHO
Key Deleted : HKLM\SOFTWARE\Classes\PriceFactorIE.PriceGongBHO.1
Key Deleted : HKLM\SOFTWARE\Classes\PriceGongIE.PriceGongCtrl
Key Deleted : HKLM\SOFTWARE\Classes\PriceGongIE.PriceGongCtrl.1
Key Deleted : HKLM\SOFTWARE\Classes\PureDefMusicBar.SettingsPlugin
Key Deleted : HKLM\SOFTWARE\Classes\PureDefMusicBar.SettingsPlugin.1
Key Deleted : HKLM\SOFTWARE\Classes\PureDefMusicBar.ToolbarPlugin
Key Deleted : HKLM\SOFTWARE\Classes\PureDefMusicBar.ToolbarPlugin.1
Key Deleted : HKLM\SOFTWARE\Classes\TBSB07183.IEToolbar
Key Deleted : HKLM\SOFTWARE\Classes\TBSB07183.IEToolbar.1
Key Deleted : HKLM\SOFTWARE\Classes\TBSB07183.TBSB07183
Key Deleted : HKLM\SOFTWARE\Classes\TBSB07183.TBSB07183.3
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.XBTBPos00
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.XBTBPos00.1
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{3088C799-9630-4719-A471-4544D7CABC2D}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{8B3372D0-09F0-41A5-8D9B-134E148672FB}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{E30A55B0-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKLM\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook
Key Deleted : HKLM\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook.1
Key Deleted : HKLM\Software\Freeze.com
Key Deleted : HKLM\Software\MetaStream
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E30A55B8-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E30A55BA-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E30A55BF-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll
Key Deleted : HKLM\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1631550F-191D-4826-B069-D9439253D926}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C26CD490-5F01-41E3-B150-EB29F19DA056}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E30A55B1-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FF365CDB-88FE-4FFA-A3F3-357855231DFA}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{E30A55BB-F1B7-43A4-B3F6-EC90CDC4FE60}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PriceGong
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\puredefmusictoolbar Uninstall
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ViewpointMediaPlayer
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@viewpoint.com/VMP
Key Deleted : HKLM\Software\puredefmusic
Key Deleted : HKLM\Software\Viewpoint
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{E30A55B9-F1B7-43A4-B3F6-EC90CDC4FE60}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{CA3EB689-8F09-4026-AA10-B9534C691CE0}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{EF99BD32-C1FB-11D2-892F-0090271D4F88}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{FF365CDC-88FE-4FFA-A3F3-357855231DFA}]
Value Deleted : HKCU\Software\Mozilla\Firefox\Extensions [{8a9386b4-e958-4c4c-adf4-8f26db3e4829}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{E30A55B9-F1B7-43A4-B3F6-EC90CDC4FE60}]

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.19088

Replaced : [HKCU\Software\Microsoft\Internet Explorer\Main - Start Page] = hxxp://home.mywebsearch.com/index.jhtml?n=77C09F4F&ptnrS=GRxdm0945CUS&ptb=5tWT3EhCqFNeiB6R25FpXA --> hxxp://www.google.com

-\\ Mozilla Firefox v3.6.24 (en-US)

File : C:\Users\Brandon C Sheehan\AppData\Roaming\Mozilla\Firefox\Profiles\49wobq1w.default\prefs.js

Deleted : user_pref("browser.startup.homepage", "hxxp://home.mywebsearch.com/index.jhtml?n=77C09F4F&ptnrS=GRxd[...]
Deleted : user_pref("extensions.mywebsearch.openSearchURL", "hxxp://search.mywebsearch.com/mywebsearch/opensea[...]
Deleted : user_pref("extensions.mywebsearch.prevKwdEnabled", true);
Deleted : user_pref("extensions.mywebsearch.prevKwdURL", "chrome://browser-region/locale/region.properties");

*************************

AdwCleaner[R1].txt - [14660 octets] - [29/05/2013 02:06:08]
AdwCleaner[R2].txt - [14721 octets] - [29/05/2013 02:06:42]
AdwCleaner[R3].txt - [14782 octets] - [29/05/2013 02:07:09]
AdwCleaner[S1].txt - [14922 octets] - [29/05/2013 02:07:45]

########## EOF - C:\AdwCleaner[S1].txt - [14983 octets] ##########
 

 

 

 

JRT:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 4.9.4 (05.06.2013:1)
OS: Windows Vista ™ Home Basic x86
Ran by Brandon C Sheehan on Wed 05/29/2013 at  2:16:10.95
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values

Successfully deleted: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\\installiqupdater
Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\DisplayName
Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\URL



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0B4A10D1-FBD6-451d-BFDA-F03252B05984}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{1006DBEA-76DB-47B1-BB1E-EA160540604A}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{0B4A10D1-FBD6-451d-BFDA-F03252B05984}



~~~ Files



~~~ Folders

Successfully deleted: [Folder] "C:\ProgramData\w3i"
Successfully deleted: [Folder] "C:\Program Files\w3i"



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Wed 05/29/2013 at  2:19:12.65
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

Thank you for helping! I'm sorry I can't give much more amplifying information. If there's anything else you need to know I'll try and answer.



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:28 PM

Posted 29 May 2013 - 12:26 PM

Hello nbrad4d

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo

Edited by gringo_pr, 29 May 2013 - 12:26 PM.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 nbrad4d

nbrad4d
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 30 May 2013 - 12:45 AM

Ran Combofix, no problems while running it.
The computer seems to be running fine, the only thing I noticed in a quick test was internet explorer crashing and google chrome refuses to load anything, including it's own settings page. Internet explorer works fine though, besides the crashing when I opened it.
Thanks for all your help!

Log from Combofix:

ComboFix 13-05-30.01 - Brandon C Sheehan 05/30/2013   1:22.1.2 - x86
Microsoft® Windows Vista™ Home Basic   6.0.6002.2.1252.1.1033.18.3327.2351 [GMT -4:00]
Running from: c:\users\Brandon C Sheehan\Desktop\ComboFix.exe
SP: Windows Defender *Enabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Brandon C Sheehan\AppData\Roaming\Microsoft\Windows\Recent\httpwww.facebook.comphoto.phpfbid=274519785895811&set=t.100000190544446&type=1.URL
c:\users\Brandon C Sheehan\AppData\Roaming\Microsoft\Windows\Recent\MSN Entertainment.url
c:\users\Public\RemoveSGP0.exe
c:\windows\Downloaded Program Files\f3initialsetup1.0.1.1.inf
c:\windows\MailSwitch.ocx
c:\windows\SwSys1.bmp
c:\windows\SwSys2.bmp
c:\windows\wt
.
.
(((((((((((((((((((((((((   Files Created from 2013-04-28 to 2013-05-30  )))))))))))))))))))))))))))))))
.
.
2013-05-29 17:26 . 2013-05-29 17:26 -------- d-----w- c:\programdata\MFAData
2013-05-29 17:26 . 2013-05-29 17:26 -------- d--h--w- c:\programdata\Common Files
2013-05-29 17:26 . 2013-05-29 17:26 -------- d-----w- c:\users\Brandon C Sheehan\AppData\Local\MFAData
2013-05-29 17:26 . 2013-05-29 17:26 -------- d-----w- c:\users\Brandon C Sheehan\AppData\Local\Avg2013
2013-05-29 17:14 . 2013-05-29 17:14 -------- d-----w- c:\program files\Kaspersky Lab
2013-05-29 17:14 . 2013-05-29 17:14 40776 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2013-05-29 17:05 . 2008-04-17 21:12 107368 ----a-r- c:\windows\system32\GEARAspi.dll
2013-05-29 06:16 . 2013-05-29 06:16 -------- d-----w- c:\windows\ERUNT
2013-05-29 06:15 . 2013-05-29 06:15 -------- d-----w- C:\JRT
2013-05-27 23:13 . 2013-05-29 17:14 -------- d-----w- c:\programdata\Kaspersky Lab
2013-05-27 23:13 . 2013-05-27 23:13 -------- d-----w- c:\users\Brandon C Sheehan\AppData\Roaming\Malwarebytes
2013-05-27 23:13 . 2013-05-27 23:13 -------- d-----w- c:\programdata\Malwarebytes
2013-05-27 23:12 . 2013-04-04 18:50 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2013-05-27 23:12 . 2013-05-27 23:13 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
"KSS"="c:\program files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe" [2012-04-25 202296]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="RtHDVCpl.exe" [2008-02-13 4915200]
"Skytel"="Skytel.exe" [2007-11-20 1826816]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-08-01 61440]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2006-11-23 56928]
"LanguageShortcut"="c:\program files\CyberLink\PowerDVD\Language\Language.exe" [2006-12-06 54832]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2008-03-26 49152]
"Windows Mobile-based device management"="c:\windows\WindowsMobile\wmdSync.exe" [2008-01-21 215552]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-06-06 937920]
.
c:\users\Brandon C Sheehan\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]
_uninst_.lnk - c:\users\Brandon C Sheehan\AppData\Local\Temp\_uninst_.bat [N/A]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2008-3-25 214360]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=""
"FirewallOverride"=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=dword:00000001
.
R2 0277611336926510mcinstcleanup;McAfee Application Installer Cleanup (0277611336926510);c:\users\BRANDO~1\AppData\Local\Temp\027761~1.EXE [x]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ    PLA DPS BFE mpssvc
HPZ12 REG_MULTI_SZ    Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ    hpqcxs08 hpqddsvc
WindowsMobile REG_MULTI_SZ    wcescomm rapimgr
LocalServiceRestricted REG_MULTI_SZ    WcesComm RapiMgr
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-05-29 17:09 1165776 ----a-w- c:\program files\Google\Chrome\Application\27.0.1453.94\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-05-30 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-30 20:08]
.
2013-05-29 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-30 20:08]
.
2011-01-21 c:\windows\Tasks\User_Feed_Synchronization-{02644410-2685-40C9-94BF-EFDF72E973C6}.job
- c:\windows\system32\msfeedssync.exe [2011-06-18 04:32]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 209.18.47.61 209.18.47.62 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
HKLM-Run-hpqSRMon - (no file)
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-05-30 01:28
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 6.0.6002 Disk: WDC_WD2500AAJS-00VTA0 rev.01.01B01 -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP4T0L0-4
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll >>UNKNOWN [0x86A7ACEC]<<
_asm { PUSH EBP; MOV EBP, ESP; SUB ESP, 0x50; PUSH EBX; PUSH ESI; MOV DWORD [EBP-0x4], 0x8569c846; SUB DWORD [EBP-0x4], 0x8569c12e; PUSH EDI; CALL 0xffffffffffffe10c;  }
1 nt!IofCallDriver[0x8245311B] -> \Device\Harddisk0\DR0[0x85CC8390]
3 CLASSPNP[0x8B1AC8B3] -> nt!IofCallDriver[0x8245311B] -> [0x84C07A70]
5 acpi[0x82E4A6BC] -> nt!IofCallDriver[0x8245311B] -> [0x855D2030]
[0x863A49C0] -> IRP_MJ_CREATE -> 0x86A7ACEC
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; MOV ES, AX; MOV DS, AX; MOV SI, 0x7c00; MOV DI, 0x600; MOV CX, 0x200; CLD ; REP MOVSB ; PUSH AX; PUSH 0x61c; RETF ; STI ; MOV CX, 0x4; MOV BP, 0x7be; CMP BYTE [BP+0x0], 0x0;  }
detected disk devices:
\Device\Ide\IdeDeviceP3T0L0-3 -> \??\IDE#DiskWDC_WD2500AAJS-00VTA0___________________01.01B01#5&355b62b4&0&1.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
\Driver\atapi DriverStartIo -> 0x86A7AAEA
user != kernel MBR !!!
Warning: possible TDL4 rootkit infection !
TDL4 rootkit infection detected ! Use: "mbr.exe -f" to fix.
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3417664244-2787471360-2270125920-1000\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:e9,39,88,e4,6b,88,23,58,79,78,6d,94,3f,01,6a,48,a3,9d,60,79,e3,64,4b,
   25,62,96,53,c3,13,f0,66,1b,b1,71,54,66,51,da,9d,ad,54,1f,92,cb,9e,da,3a,3e,\
"??"=hex:5d,2e,bc,00,9b,07,bc,9c,34,34,87,88,c9,ab,ca,0d
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2013-05-30  01:30:23
ComboFix-quarantined-files.txt  2013-05-30 05:30
.
Pre-Run: 186,809,085,952 bytes free
Post-Run: 187,542,999,040 bytes free
.
- - End Of File - - 433757A87BE946F65900933BD2DD09DC
 



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:28 PM

Posted 30 May 2013 - 07:47 AM


Hello nbrad4d

I would like you to try and run these next.

TDSSKiller

Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • more than one report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". The one that I need is the larger one. Please copy and paste the contents of that file here.

    Note** this report can be very long - so if the website gives you an error saying it is to long you may attache it

    If the forum still complains about it being to long send me everything that is at the end of the report after where it says

    ==================
    Scan finished
    ==================
and I will see if I want to see the whole report

--RogueKiller--

Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • the scan will make two reports the one I would like to see is called RKreport[2].txt on your Desktop
  • Exit/Close RogueKiller+
send me the reports made from TDSSKiller and Roguekiller and also let me know how the computer is doing at this time.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 nbrad4d

nbrad4d
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 01 June 2013 - 12:40 AM

Both programs ran. Google Chrome now opens and runs normally, the computer seems faster, but internet explorer is still crashing the first time I open it. I'm still not sure if that's a part of this or not though.

TDSS Report: (too big - from Scan Finished)
01:15:37.0721 1928  Scan finished
01:15:37.0721 1928  ============================================================
01:15:37.0721 3036  Detected object count: 8
01:15:37.0721 3036  Actual detected object count: 8
01:17:49.0424 3036  hpqcxs08 ( UnsignedFile.Multi.Generic ) - skipped by user
01:17:49.0424 3036  hpqcxs08 ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:17:49.0424 3036  hpqddsvc ( UnsignedFile.Multi.Generic ) - skipped by user
01:17:49.0424 3036  hpqddsvc ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:17:49.0424 3036  MrFilter ( UnsignedFile.Multi.Generic ) - skipped by user
01:17:49.0424 3036  MrFilter ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:17:49.0424 3036  Net Driver HPZ12 ( UnsignedFile.Multi.Generic ) - skipped by user
01:17:49.0424 3036  Net Driver HPZ12 ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:17:49.0439 3036  Pml Driver HPZ12 ( UnsignedFile.Multi.Generic ) - skipped by user
01:17:49.0439 3036  Pml Driver HPZ12 ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:17:49.0455 3036  C:\Windows\system32\drivers\rdpencdd.sys - copied to quarantine
01:17:49.0502 3036  \Device\Harddisk0\DR0\TDLFS\config.ini - copied to quarantine
01:17:49.0502 3036  \Device\Harddisk0\DR0\TDLFS\tdl - copied to quarantine
01:17:49.0517 3036  \Device\Harddisk0\DR0\TDLFS\rsrc.dat - copied to quarantine
01:17:49.0517 3036  \Device\Harddisk0\DR0\TDLFS\bckfg.tmp - copied to quarantine
01:17:49.0517 3036  \Device\Harddisk0\DR0\TDLFS\tdlcmd.dll - copied to quarantine
01:18:21.0142 3036  Backup copy not found, trying to cure infected file..
01:18:21.0142 3036  Cure success, using it..
01:18:21.0142 3036  C:\Windows\system32\drivers\rdpencdd.sys - will be cured on reboot
01:18:21.0142 3036  RDPENCDD ( Rootkit.Win32.TDSS.tdl3 ) - User select action: Cure
01:18:21.0142 3036  RichVideo ( UnsignedFile.Multi.Generic ) - skipped by user
01:18:21.0142 3036  RichVideo ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:18:21.0142 3036  \Device\Harddisk0\DR0 ( TDSS File System ) - skipped by user
01:18:21.0142 3036  \Device\Harddisk0\DR0 ( TDSS File System ) - User select action: Skip
01:18:49.0736 2860  Deinitialize success
 

 

Rogue Killer Report:
01:15:37.0721 1928  Scan finished
01:15:37.0721 1928  ============================================================
01:15:37.0721 3036  Detected object count: 8
01:15:37.0721 3036  Actual detected object count: 8
01:17:49.0424 3036  hpqcxs08 ( UnsignedFile.Multi.Generic ) - skipped by user
01:17:49.0424 3036  hpqcxs08 ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:17:49.0424 3036  hpqddsvc ( UnsignedFile.Multi.Generic ) - skipped by user
01:17:49.0424 3036  hpqddsvc ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:17:49.0424 3036  MrFilter ( UnsignedFile.Multi.Generic ) - skipped by user
01:17:49.0424 3036  MrFilter ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:17:49.0424 3036  Net Driver HPZ12 ( UnsignedFile.Multi.Generic ) - skipped by user
01:17:49.0424 3036  Net Driver HPZ12 ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:17:49.0439 3036  Pml Driver HPZ12 ( UnsignedFile.Multi.Generic ) - skipped by user
01:17:49.0439 3036  Pml Driver HPZ12 ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:17:49.0455 3036  C:\Windows\system32\drivers\rdpencdd.sys - copied to quarantine
01:17:49.0502 3036  \Device\Harddisk0\DR0\TDLFS\config.ini - copied to quarantine
01:17:49.0502 3036  \Device\Harddisk0\DR0\TDLFS\tdl - copied to quarantine
01:17:49.0517 3036  \Device\Harddisk0\DR0\TDLFS\rsrc.dat - copied to quarantine
01:17:49.0517 3036  \Device\Harddisk0\DR0\TDLFS\bckfg.tmp - copied to quarantine
01:17:49.0517 3036  \Device\Harddisk0\DR0\TDLFS\tdlcmd.dll - copied to quarantine
01:18:21.0142 3036  Backup copy not found, trying to cure infected file..
01:18:21.0142 3036  Cure success, using it..
01:18:21.0142 3036  C:\Windows\system32\drivers\rdpencdd.sys - will be cured on reboot
01:18:21.0142 3036  RDPENCDD ( Rootkit.Win32.TDSS.tdl3 ) - User select action: Cure
01:18:21.0142 3036  RichVideo ( UnsignedFile.Multi.Generic ) - skipped by user
01:18:21.0142 3036  RichVideo ( UnsignedFile.Multi.Generic ) - User select action: Skip
01:18:21.0142 3036  \Device\Harddisk0\DR0 ( TDSS File System ) - skipped by user
01:18:21.0142 3036  \Device\Harddisk0\DR0 ( TDSS File System ) - User select action: Skip
01:18:49.0736 2860  Deinitialize success
 

 



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:28 PM

Posted 01 June 2013 - 12:45 AM


Hello



I would like you to rerun TDSSKiller and this time when it gets to this part
  • \Device\Harddisk0\DR0 ( TDSS File System ) - skipped by user
    \Device\Harddisk0\DR0 ( TDSS File System ) - User select action: Skip
I want you to select Delete this time instead of skip.


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 nbrad4d

nbrad4d
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 01 June 2013 - 01:14 AM

Finished - Report was too long, posting from Scan Finished again:

02:10:15.0916 2668  Scan finished
02:10:15.0916 2668  ============================================================
02:10:15.0916 3792  Detected object count: 8
02:10:15.0916 3792  Actual detected object count: 8
02:11:07.0635 3792  hpqcxs08 ( UnsignedFile.Multi.Generic ) - skipped by user
02:11:07.0635 3792  hpqcxs08 ( UnsignedFile.Multi.Generic ) - User select action: Skip
02:11:07.0635 3792  hpqddsvc ( UnsignedFile.Multi.Generic ) - skipped by user
02:11:07.0635 3792  hpqddsvc ( UnsignedFile.Multi.Generic ) - User select action: Skip
02:11:07.0635 3792  MrFilter ( UnsignedFile.Multi.Generic ) - skipped by user
02:11:07.0635 3792  MrFilter ( UnsignedFile.Multi.Generic ) - User select action: Skip
02:11:07.0635 3792  Net Driver HPZ12 ( UnsignedFile.Multi.Generic ) - skipped by user
02:11:07.0635 3792  Net Driver HPZ12 ( UnsignedFile.Multi.Generic ) - User select action: Skip
02:11:07.0635 3792  Pml Driver HPZ12 ( UnsignedFile.Multi.Generic ) - skipped by user
02:11:07.0635 3792  Pml Driver HPZ12 ( UnsignedFile.Multi.Generic ) - User select action: Skip
02:11:07.0635 3792  RDPENCDD ( UnsignedFile.Multi.Generic ) - skipped by user
02:11:07.0635 3792  RDPENCDD ( UnsignedFile.Multi.Generic ) - User select action: Skip
02:11:07.0635 3792  RichVideo ( UnsignedFile.Multi.Generic ) - skipped by user
02:11:07.0635 3792  RichVideo ( UnsignedFile.Multi.Generic ) - User select action: Skip
02:11:07.0728 3792  \Device\Harddisk0\DR0\TDLFS\config.ini - copied to quarantine
02:11:07.0744 3792  \Device\Harddisk0\DR0\TDLFS\tdl - copied to quarantine
02:11:07.0744 3792  \Device\Harddisk0\DR0\TDLFS\rsrc.dat - copied to quarantine
02:11:07.0744 3792  \Device\Harddisk0\DR0\TDLFS\bckfg.tmp - copied to quarantine
02:11:07.0744 3792  \Device\Harddisk0\DR0\TDLFS\tdlcmd.dll - copied to quarantine
02:11:07.0744 3792  \Device\Harddisk0\DR0\TDLFS - deleted
02:11:07.0744 3792  \Device\Harddisk0\DR0 ( TDSS File System ) - User select action: Delete



#10 nbrad4d

nbrad4d
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 01 June 2013 - 01:17 AM

Also, I just noticed that I accidentally linked the wrong report for the Rogue Killer. Here's the real one.
 

RogueKiller V8.5.4 [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version
Started in : Normal mode
User : Brandon C Sheehan [Admin rights]
Mode : Remove -- Date : 06/01/2013 01:30:56
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 4 ¤¤¤
[STARTUP][SUSP PATH] _uninst_.lnk @Brandon C Sheehan : C:\Users\Brandon C Sheehan\AppData\Local\Temp\_uninst_.bat [x] -> DELETED
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1       localhost

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: WDC WD2500AAJS-00VTA0 ATA Device +++++
--- User ---
[MBR] 2d6a164b66519cab66e95790b91c61f5
[BSP] 0acb2e62a0cca99a88563d3f3ede7f78 : Windows Vista MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 238473 Mo
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: WDC WD2500AAJS-00VTA0 ATA Device +++++
--- User ---
[MBR] 2c307e3578dfc19aa69c68f69fa00b77
[BSP] 3c35c746143dfffb6faa6fbd2131a344 : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 238473 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[2]_D_06012013_02d0130.txt >>
RKreport[1]_S_06012013_02d0130.txt ; RKreport[2]_D_06012013_02d0130.txt



#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:28 PM

Posted 01 June 2013 - 01:27 AM


Hello nbrad4d

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:

ClearJavaCache::


 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:28 PM

Posted 04 June 2013 - 09:27 AM


Greetings


I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools




Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 nbrad4d

nbrad4d
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 04 June 2013 - 11:59 PM

I haven't noticed any problems with the computer. It seems to be working fine now.
 
ComboFix 13-06-02.02 - Brandon C Sheehan 06/03/2013   2:40.2.2 - x86
Microsoft® Windows Vista™ Home Basic   6.0.6002.2.1252.1.1033.18.3327.2302 [GMT -4:00]
Running from: c:\users\Brandon C Sheehan\Desktop\ComboFix.exe
Command switches used :: c:\users\Brandon C Sheehan\Desktop\CFScript.txt.txt
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point
.
.
(((((((((((((((((((((((((   Files Created from 2013-05-03 to 2013-06-03  )))))))))))))))))))))))))))))))
.
.
2013-06-03 06:44 . 2013-06-03 06:44 -------- d-----w- c:\windows\system32\config\systemprofile\AppData\Local\temp
2013-06-03 06:44 . 2013-06-03 06:44 -------- d-----w- c:\users\Default\AppData\Local\temp
2013-06-01 05:17 . 2013-06-01 06:11 -------- d-----w- C:\TDSSKiller_Quarantine
2013-05-30 05:30 . 2013-06-03 06:44 -------- d-----w- c:\users\Brandon C Sheehan\AppData\Local\temp
2013-05-29 17:26 . 2013-05-29 17:26 -------- d-----w- c:\programdata\MFAData
2013-05-29 17:26 . 2013-05-29 17:26 -------- d--h--w- c:\programdata\Common Files
2013-05-29 17:26 . 2013-05-29 17:26 -------- d-----w- c:\users\Brandon C Sheehan\AppData\Local\MFAData
2013-05-29 17:26 . 2013-05-29 17:26 -------- d-----w- c:\users\Brandon C Sheehan\AppData\Local\Avg2013
2013-05-29 17:14 . 2013-05-29 17:14 -------- d-----w- c:\program files\Kaspersky Lab
2013-05-29 17:05 . 2008-04-17 21:12 107368 ----a-r- c:\windows\system32\GEARAspi.dll
2013-05-29 06:16 . 2013-05-29 06:16 -------- d-----w- c:\windows\ERUNT
2013-05-29 06:15 . 2013-05-29 06:15 -------- d-----w- C:\JRT
2013-05-27 23:13 . 2013-05-29 17:14 -------- d-----w- c:\programdata\Kaspersky Lab
2013-05-27 23:13 . 2013-05-27 23:13 -------- d-----w- c:\users\Brandon C Sheehan\AppData\Roaming\Malwarebytes
2013-05-27 23:13 . 2013-05-27 23:13 -------- d-----w- c:\programdata\Malwarebytes
2013-05-27 23:12 . 2013-04-04 18:50 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2013-05-27 23:12 . 2013-05-27 23:13 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-06-01 05:19 . 2008-01-21 02:34 6144 ----a-w- c:\windows\system32\drivers\RDPENCDD.sys
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
"KSS"="c:\program files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe" [2012-04-25 202296]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="RtHDVCpl.exe" [2008-02-13 4915200]
"Skytel"="Skytel.exe" [2007-11-20 1826816]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-08-01 61440]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2006-11-23 56928]
"LanguageShortcut"="c:\program files\CyberLink\PowerDVD\Language\Language.exe" [2006-12-06 54832]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2008-03-26 49152]
"Windows Mobile-based device management"="c:\windows\WindowsMobile\wmdSync.exe" [2008-01-21 215552]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-06-06 937920]
"hpqSRMon"="c:\program files\HP\Digital Imaging\bin\hpqSRMon.exe" [2008-06-02 81920]
.
c:\users\Brandon C Sheehan\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2008-3-25 214360]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=""
"FirewallOverride"=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=dword:00000001
.
R2 0277611336926510mcinstcleanup;McAfee Application Installer Cleanup (0277611336926510);c:\users\BRANDO~1\AppData\Local\Temp\027761~1.EXE [x]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - 13040700
*NewlyCreated* - 73736852
*Deregistered* - 13040700
*Deregistered* - 73736852
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ   PLA DPS BFE mpssvc
HPZ12 REG_MULTI_SZ   Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ   hpqcxs08 hpqddsvc
WindowsMobile REG_MULTI_SZ   wcescomm rapimgr
LocalServiceRestricted REG_MULTI_SZ   WcesComm RapiMgr
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-05-29 17:09 1165776 ----a-w- c:\program files\Google\Chrome\Application\27.0.1453.94\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-06-01 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-30 20:08]
.
2013-06-01 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-30 20:08]
.
2011-01-21 c:\windows\Tasks\User_Feed_Synchronization-{02644410-2685-40C9-94BF-EFDF72E973C6}.job
- c:\windows\system32\msfeedssync.exe [2011-06-18 04:32]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 209.18.47.61 209.18.47.62 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
SafeBoot-13040700.sys
SafeBoot-28789030.sys
SafeBoot-65469011.sys
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-06-03 02:44
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ... 
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 6.0.6002 Disk: WDC_WD2500AAJS-00VTA0 rev.01.01B01 -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP4T0L0-4 
.
device: opened successfully
user: MBR read successfully
kernel: MBR read successfully
user != kernel MBR !!! 
sectors 488397164 (+253): user != kernel
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3417664244-2787471360-2270125920-1000\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:e9,39,88,e4,6b,88,23,58,79,78,6d,94,3f,01,6a,48,a3,9d,60,79,e3,64,4b,
   25,62,96,53,c3,13,f0,66,1b,b1,71,54,66,51,da,9d,ad,54,1f,92,cb,9e,da,3a,3e,\
"??"=hex:5d,2e,bc,00,9b,07,bc,9c,34,34,87,88,c9,ab,ca,0d
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2013-06-03  02:45:42
ComboFix-quarantined-files.txt  2013-06-03 06:45
ComboFix2.txt  2013-05-30 05:30
.
Pre-Run: 185,152,897,024 bytes free
Post-Run: 185,275,150,336 bytes free
.
- - End Of File - - 2A04887294BA521134F0808F2AEEB62B


#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:28 PM

Posted 05 June 2013 - 11:16 AM


Hello

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (Revo does allot better of a job)
  • Programs to remove

    • Adobe Reader X (10.1.0)
      PriceGong 2.1.0
      PureDef Music Toolbar
      RegCure
      Shop to Win 2


  • Please download and install Revo Uninstaller Free
  • Double click Revo Uninstaller to run it.
  • From the list of programs double click on The Program to remove
  • When prompted if you want to uninstall click Yes.
  • Be sure the Moderate option is selected then click Next.
  • The program will run, If prompted again click Yes
  • when the built-in uninstaller is finished click on Next.
  • Once the program has searched for leftovers click Next.
  • Check/tick the bolded items only on the list then click Delete
  • when prompted click on Yes and then on next.
  • put a check on any folders that are found and select delete
  • when prompted select yes then on next
  • Once done click Finish.
.



Update Adobe reader
  • Recently there have been vulnerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

    You can download it from http://www.adobe.com/products/acrobat/readstep2.html
    After installing the latest Adobe Reader, uninstall all previous versions.
    If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.
    • If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

      Note: When installing FoxitReader, be careful not to install anything to do with AskBar.

Clean Out Temp Files
  • This small application you may want to keep and use once a week to keep the computer clean.

    Download CCleaner from here CCleaner
    • Run the installer to install the application.
    • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
    • Run CCleaner. (make sure under Windows tab all the boxes of Internet Explorer and Windows explorer are checked. Under System check Empty Recycle Bin and Temporary Files. Under Application tab all the boxes should be checked).
    • Click Run Cleaner.
    • Close CCleaner.
: Malwarebytes' Anti-Malware :


I see You have MBAM installed on the computer - that is great!! it is a very good program! I would like you to run a quick scan for me now
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.



Download HijackThis
  • Go Here to download HijackThis program
  • Save HijackThis to your desktop.
  • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
  • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
  • copy and paste hijackthis report into the topic
"information and logs"
  • In your next post I need the following
    • Log From MBAM
    • report from Hijackthis
    • let me know of any problems you may have had
    • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 nbrad4d

nbrad4d
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 05 June 2013 - 02:48 PM

Malwarebytes Anti-Malware (Trial) 1.75.0.1300
www.malwarebytes.org
 
Database version: v2013.06.05.08
 
Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 8.0.6001.19088
Brandon C Sheehan :: BRANDONCSHEE-PC [administrator]
 
Protection: Enabled
 
6/5/2013 3:20:56 PM
mbam-log-2013-06-05 (15-20-56).txt
 
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 214084
Time elapsed: 4 minute(s), 47 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
(end)
 

 

 

 

Malwarebytes Anti-Malware (Trial) 1.75.0.1300
www.malwarebytes.org
 
Database version: v2013.06.05.08
 
Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 8.0.6001.19088
Brandon C Sheehan :: BRANDONCSHEE-PC [administrator]
 
Protection: Enabled
 
6/5/2013 3:20:56 PM
mbam-log-2013-06-05 (15-20-56).txt
 
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 214084
Time elapsed: 4 minute(s), 47 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
(end)





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users