Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malware has infected every computer on network including cell phones


  • This topic is locked This topic is locked
24 replies to this topic

#1 bknaka

bknaka

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:07:01 PM

Posted 17 September 2013 - 07:03 AM

malware has infected 2 computers and 3 cell phones. Browser redirects. I cant access sites like my bank account because it says that the session has been open for longer than 30 minutes,. This malware has remained on my computer through fresh OS installs. It has corrupted the data that gets burned to cds and also boots up at the same time the bios does.  Also every night someone connects to my computer and does something. not really sure what it is. but he or she stays connected for about 6 hours. I ran combo fix and i have included the results.

 

ComboFix 13-09-16.01 - me 09/17/2013   0:33.1.2 - x64
Microsoft Windows 7 Home Premium   6.1.7601.1.1252.1.1033.18.3039.1957 [GMT -10:00]
Running from: c:\users\me\Desktop\ComboFix.exe
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2013-08-17 to 2013-09-17  )))))))))))))))))))))))))))))))
.
.
2013-09-16 15:44 . 2013-09-16 23:30 -------- d-----w- c:\users\me
2013-09-16 15:44 . 2013-09-16 15:44 -------- d-----w- C:\Recovery
2013-09-16 13:38 . 2013-09-16 15:44 -------- d-----w- c:\windows\Panther
2013-09-16 13:25 . 2013-09-16 13:25 -------- d-----w- C:\Windows.old
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
R3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys;c:\windows\SYSNATIVE\DRIVERS\Rt64win7.sys [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys;c:\windows\SYSNATIVE\drivers\TsUsbGD.sys [x]
S3 netw5v64;Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;c:\windows\system32\DRIVERS\netw5v64.sys;c:\windows\SYSNATIVE\DRIVERS\netw5v64.sys [x]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
.
--------- X64 Entries -----------
.
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
uStart Page = hxxp://www.google.com/
mLocal Page = c:\windows\SysWOW64\blank.htm
uInternet Settings,ProxyOverride = <local>
TCP: DhcpNameServer = 192.168.1.1
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
 

*edited for privacy*.
 

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2013-09-17  00:40:31 - machine was rebooted
ComboFix-quarantined-files.txt  2013-09-17 10:40
.
Pre-Run: 485,480,386,560 bytes free
Post-Run: 485,161,631,744 bytes free
.
- - End Of File - - E6F66740EC492098FC0D7DB9FBD1849E
A36C5E4F47E84449FF07ED3517B43A31
 


Edited by bknaka, 17 September 2013 - 07:09 AM.


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 17 September 2013 - 09:28 PM


Hello bknaka,

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

Create and Run Batch File
  • Open Notepad and copy/paste the entire contents of the codebox below, into Notepad:

@echo off
>Log1.txt (
ipconfig /all
nslookup google.com
nslookup yahoo.com
ping -n 2 google.com
ping -n 2 yahoo.com
route print
)
start Log1.txt
del %0
  • Save this as router.bat Choose to Save type as - All Files and where to save - Desktop - then close the Notepad file.

    It should look like this: batfileicon.gif <--XP
    Double-click on router.bat to run it. it will open notepad when done please post back the results

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 bknaka

bknaka
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:07:01 PM

Posted 17 September 2013 - 09:44 PM

Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : me-PC
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
 
Wireless LAN adapter Wireless Network Connection:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Intel® WiFi Link 5100 AGN
   Physical Address. . . . . . . . . : 00-22-FA-3F-3A-1C
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.1.2(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Tuesday, September 17, 2013 4:02:57 PM
   Lease Expires . . . . . . . . . . : Wednesday, September 18, 2013 4:02:56 PM
   Default Gateway . . . . . . . . . : 192.168.1.1
   DHCP Server . . . . . . . . . . . : 192.168.1.1
   DNS Servers . . . . . . . . . . . : 192.168.1.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Tunnel adapter isatap.{657435F1-1586-484A-9EC5-DD88CEC760CD}:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter Teredo Tunneling Pseudo-Interface:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2001:0:9d38:6abd:34a0:1406:3f57:fefd(Preferred) 
   Link-local IPv6 Address . . . . . : fe80::34a0:1406:3f57:fefd%15(Preferred) 
   Default Gateway . . . . . . . . . : ::
   NetBIOS over Tcpip. . . . . . . . : Disabled
Server:  UnKnown
Address:  192.168.1.1
 
Name:    google.com
Addresses:  2607:f8b0:4007:801::1003
 74.125.239.5
 74.125.239.6
 74.125.239.7
 74.125.239.8
 74.125.239.9
 74.125.239.14
 74.125.239.0
 74.125.239.1
 74.125.239.2
 74.125.239.3
 74.125.239.4
 
Server:  UnKnown
Address:  192.168.1.1
 
Name:    yahoo.com
Addresses:  98.138.253.109
 98.139.183.24
 206.190.36.45
 
 
Pinging google.com [74.125.239.7] with 32 bytes of data:
Reply from 74.125.239.7: bytes=32 time=220ms TTL=53
Reply from 74.125.239.7: bytes=32 time=58ms TTL=53
 
Ping statistics for 74.125.239.7:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 58ms, Maximum = 220ms, Average = 139ms
 
Pinging yahoo.com [98.139.183.24] with 32 bytes of data:
Reply from 98.139.183.24: bytes=32 time=158ms TTL=46
Reply from 98.139.183.24: bytes=32 time=165ms TTL=46
 
Ping statistics for 98.139.183.24:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 158ms, Maximum = 165ms, Average = 161ms
===========================================================================
Interface List
 12...00 22 fa 3f 3a 1c ......Intel® WiFi Link 5100 AGN
  1...........................Software Loopback Interface 1
 16...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
 15...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.1.1      192.168.1.2     25
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      192.168.1.0    255.255.255.0         On-link       192.168.1.2    281
      192.168.1.2  255.255.255.255         On-link       192.168.1.2    281
    192.168.1.255  255.255.255.255         On-link       192.168.1.2    281
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link       192.168.1.2    281
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link       192.168.1.2    281
===========================================================================
Persistent Routes:
  None
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
 15     58 ::/0                     On-link
  1    306 ::1/128                  On-link
 15     58 2001::/32                On-link
 15    306 2001:0:9d38:6abd:34a0:1406:3f57:fefd/128
                                    On-link
 15    306 fe80::/64                On-link
 15    306 fe80::34a0:1406:3f57:fefd/128
                                    On-link
  1    306 ff00::/8                 On-link
 15    306 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None


#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 17 September 2013 - 10:18 PM

Hello

I would like you to go here to see how to change the DNS settings of the router to change them to OPEN DNS - https://store.opendns.com/setup/router/

let me know if this fixes the redirect issues


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 bknaka

bknaka
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:07:01 PM

Posted 18 September 2013 - 05:12 AM

I cant access my router. My brother set up the username as password and he cant remember it. the site info says that the last time i visited the site was yesterday and i have never visited that site before. 



#6 bknaka

bknaka
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:07:01 PM

Posted 18 September 2013 - 05:31 AM

take a look at this. its in my system info under the conflicts/sharing section
 
I/O Port 0x00000000-0x0000001F Direct memory access controller
I/O Port 0x00000000-0x0000001F PCI bus
 
I/O Port 0x000003C0-0x000003DF Mobile Intel® 4 Series Chipset PCI Express Root Port - 2A41
I/O Port 0x000003C0-0x000003DF Standard VGA Graphics Adapter
 
IRQ 20 Intel® ICH9 Family USB Universal Host Controller - 2934
IRQ 20 Intel® ICH9 Family USB2 Enhanced Host Controller - 293A
 
I/O Port 0x00000070-0x00000077 System CMOS/real time clock
I/O Port 0x00000070-0x00000077 Motherboard resources
 
Memory Address 0xDA000000-0xDAFFFFFF Intel® ICH9 Family PCI Express Root Port 5 - 2948
Memory Address 0xDA000000-0xDAFFFFFF 1394 OHCI Compliant Host Controller
 
IRQ 11 Base System Device
IRQ 11 Base System Device
IRQ 11 Base System Device
IRQ 11 Intel® ICH9 Family SMBus Controller - 2930
 
IRQ 22 High Definition Audio Controller
IRQ 22 Intel® ICH9 Family USB Universal Host Controller - 2935
 
IRQ 16 SDA Standard Compliant SD Host Controller
IRQ 16 Mobile Intel® 4 Series Chipset PCI Express Root Port - 2A41
IRQ 16 Intel® ICH9 Family PCI Express Root Port 1 - 2940
IRQ 16 Intel® ICH9 Family USB Universal Host Controller - 2937
IRQ 16 Intel® ICH9 Family PCI Express Root Port 5 - 2948
IRQ 16 1394 OHCI Compliant Host Controller
 
IRQ 17 Intel® ICH9 Family PCI Express Root Port 2 - 2942
IRQ 17 Intel® ICH9 Family USB Universal Host Controller - 2938
 
Memory Address 0xDE000000-0xDEFFFFFF Intel® ICH9 Family PCI Express Root Port 1 - 2940
Memory Address 0xDE000000-0xDEFFFFFF Intel® WiFi Link 5100 AGN
 
Memory Address 0xD0000000-0xD2FFFFFF Mobile Intel® 4 Series Chipset PCI Express Root Port - 2A41
Memory Address 0xD0000000-0xD2FFFFFF Standard VGA Graphics Adapter
 
IRQ 18 Intel® ICH9 Family USB Universal Host Controller - 2936
IRQ 18 Intel® ICH9 Family PCI Express Root Port 3 - 2944
IRQ 18 Intel® ICH9 Family USB2 Enhanced Host Controller - 293C
 
IRQ 19 Intel® ICH9 Family PCI Express Root Port 4 - 2946
IRQ 19 Intel® ICH9 Family USB Universal Host Controller - 2939
 
Memory Address 0xA0000-0xBFFFF Mobile Intel® 4 Series Chipset PCI Express Root Port - 2A41
Memory Address 0xA0000-0xBFFFF PCI bus
Memory Address 0xA0000-0xBFFFF Standard VGA Graphics Adapter
 
Memory Address 0xC0000000-0xCFFFFFFF Mobile Intel® 4 Series Chipset PCI Express Root Port - 2A41
Memory Address 0xC0000000-0xCFFFFFFF PCI bus
Memory Address 0xC0000000-0xCFFFFFFF Standard VGA Graphics Adapter
 
I/O Port 0x000003B0-0x000003BB Mobile Intel® 4 Series Chipset PCI Express Root Port - 2A41
I/O Port 0x000003B0-0x000003BB Standard VGA Graphics Adapter
 
I/O Port 0x00007000-0x00007FFF Mobile Intel® 4 Series Chipset PCI Express Root Port - 2A41
I/O Port 0x00007000-0x00007FFF Standard VGA Graphics Adapter


#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 18 September 2013 - 02:12 PM

Hello

Lets change the DNS settings on the computer and if that stops the redirects then you know you will have to reset the router

You can go here to see how to change the settings for windows 7 - https://store.opendns.com/setup/operatingsystem/windows-7



Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 bknaka

bknaka
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:07:01 PM

Posted 18 September 2013 - 02:26 PM

i did cleared everything however this is still set up in chrome under manage search engines for google search

 

{google:baseURL}search?q=%s&{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:searchClient}{google:sourceId}{google:instantExtendedEnabledParameter}{google:omniboxStartMarginParameter}ie={inputEncoding}



#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 18 September 2013 - 03:05 PM

Hello bknaka

Have you followed my instructions yet? and is the computer still redirecting after following my instructions


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 bknaka

bknaka
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:07:01 PM

Posted 18 September 2013 - 03:39 PM

yes i have followed your instructions and im still being redirected. I have included the reason in my previous post 



#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 18 September 2013 - 06:10 PM



Hello bknaka

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 bknaka

bknaka
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:07:01 PM

Posted 18 September 2013 - 06:33 PM

ran both tools 

 

# AdwCleaner v3.004 - Report created 18/09/2013 at 13:23:20
# Updated 15/09/2013 by Xplode
# Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
# Username : me - ME-PC
# Running from : C:\Users\me\Desktop\AdwCleaner.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v8.0.7601.17514
 
 
-\\ Google Chrome v
 
[ File : C:\Users\me\AppData\Local\Google\Chrome\User Data\Default\preferences ]
 
 
*************************
 
AdwCleaner[R0].txt - [735 octets] - [18/09/2013 13:22:04]
AdwCleaner[S0].txt - [657 octets] - [18/09/2013 13:23:20]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [716 octets] ##########
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.1 (09.15.2013:1)
OS: Windows 7 Home Premium x64
Ran by me on Wed 09/18/2013 at 13:25:51.91
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
 
 
~~~ Files
 
 
 
~~~ Folders
 
 
 
~~~ Event Viewer Logs were cleared
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Wed 09/18/2013 at 13:30:50.76
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 18 September 2013 - 06:38 PM


Hello bknaka

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 bknaka

bknaka
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:07:01 PM

Posted 18 September 2013 - 09:12 PM

ComboFix 13-09-17.01 - me 09/18/2013  16:03:26.2.2 - x64
Microsoft Windows 7 Home Premium   6.1.7601.1.1252.1.1033.18.3039.2343 [GMT -10:00]
Running from: c:\users\me\Desktop\ComboFix.exe
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2013-08-19 to 2013-09-19  )))))))))))))))))))))))))))))))
.
.
2013-09-19 02:06 . 2013-09-19 02:06 -------- d-----w- c:\users\Default\AppData\Local\temp
2013-09-18 23:25 . 2013-09-18 23:25 -------- d-----w- c:\windows\ERUNT
2013-09-18 23:22 . 2013-09-18 23:23 -------- d-----w- C:\AdwCleaner
2013-09-18 22:16 . 2013-09-18 22:16 -------- d-s---w- c:\windows\SysWow64\Microsoft
2013-09-18 22:13 . 2013-08-30 07:47 287840 ----a-w- c:\windows\system32\aswBoot.exe
2013-09-18 22:13 . 2013-09-18 23:40 -------- d-sh--w- c:\windows\Installer
2013-09-18 22:12 . 2013-09-18 22:12 -------- d-----w- c:\program files\AVAST Software
2013-09-18 22:10 . 2013-09-18 22:17 -------- d-----w- c:\programdata\AVAST Software
2013-09-18 22:04 . 2013-09-18 22:18 -------- d-----w- c:\program files\VideoLAN
2013-09-18 15:31 . 2013-09-18 22:18 -------- d-----w- c:\program files\HitmanPro
2013-09-18 15:30 . 2013-09-18 15:35 -------- d-----w- c:\programdata\HitmanPro
2013-09-18 00:30 . 2013-09-18 00:30 -------- d-----w- c:\programdata\Canneverbe Limited
2013-09-16 15:44 . 2013-09-16 23:30 -------- d-----w- c:\users\me
2013-09-16 15:44 . 2013-09-16 15:44 -------- d-----w- C:\Recovery
2013-09-16 13:38 . 2013-09-16 15:44 -------- d-----w- c:\windows\Panther
2013-09-16 13:25 . 2013-09-16 13:25 -------- d-----w- C:\Windows.old
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37.sys]
@=""
.
R3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys;c:\windows\SYSNATIVE\DRIVERS\Rt64win7.sys [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys;c:\windows\SYSNATIVE\drivers\TsUsbGD.sys [x]
S3 netw5v64;Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;c:\windows\system32\DRIVERS\netw5v64.sys;c:\windows\SYSNATIVE\DRIVERS\netw5v64.sys [x]
.
.
Contents of the 'Scheduled Tasks' folder
.
2013-09-19 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2137147522-2486131392-1612494287-1000Core.job
- c:\users\me\AppData\Local\Google\Update\GoogleUpdate.exe [2013-09-18 23:40]
.
2013-09-19 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2137147522-2486131392-1612494287-1000UA.job
- c:\users\me\AppData\Local\Google\Update\GoogleUpdate.exe [2013-09-18 23:40]
.
.
--------- X64 Entries -----------
.
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
uStart Page = hxxp://www.google.com/
mLocal Page = c:\windows\SysWOW64\blank.htm
uInternet Settings,ProxyOverride = <local>
Trusted Zone: fhb.com\www
Trusted Zone: yahoo.com\login
Trusted Zone: yahoo.com\us-mg6.mail
Trusted Zone: yahoo.com\www
TCP: DhcpNameServer = 192.168.1.1
TCP: Interfaces\{657435F1-1586-484A-9EC5-DD88CEC760CD}: NameServer = 208.67.222.222,208.67.220.220
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2013-09-18  16:09:58 - machine was rebooted
ComboFix-quarantined-files.txt  2013-09-19 02:09
ComboFix2.txt  2013-09-17 10:40
.
Pre-Run: 484,706,492,416 bytes free
Post-Run: 484,281,167,872 bytes free
.
- - End Of File - - C1965FA271AE025644D6A2D6CC264BCD
A36C5E4F47E84449FF07ED3517B43A31


#15 bknaka

bknaka
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:07:01 PM

Posted 18 September 2013 - 09:18 PM

anything useful?






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users