Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

PUM.hijack.regedit/taskbar


  • This topic is locked This topic is locked
13 replies to this topic

#1 krgtri

krgtri

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:59 PM

Posted 12 October 2013 - 10:54 AM

Hi there Bleeping Computer folks!

 

I've been holding back from posting here for a week now and hoping I could solve the problem on my own. The only good I've done so far though is clean my machine from unused programs. The thing is still there.

 

I got it about a week ago from a friend's external hardrive and after that, my pc started acting up. Regedit got disabled, the taskmanager too and a bunch of other security features from windows.

 

I tried scanning it with malwarebytes then and found the jerks but they kept coming back. Tried a whole bunch of other malware scanners but the same thing happened. They just kept coming back. So far, aside from the task manager and regedit, the machine is working well. I want to remove it though.

 

Another thing is I've been seeing these .exe files with random filenames like the one in my d:\ drive right now for example: rxukp.exe. I tried deleting them but they kept comming back. Found out that there's an autorun.inf on the same drive and tried deleting it but process explorer said it was being used by a program or something. I killed the program, deleted the autorun.inf and randomly-named .exe file successfully but after a few while autorun.inf came back and there was a new randomly-named .exe file with it. Found out too that it was now using another different program this time when I tried to delete it. It's like it's attaching itself to a new process everytime the other gets killed. I'm not sure if that's a part of the same malware as the one disabling my regedit but it's there.

 

So yeah, I think that's the most detailed account of my situation I can do right now. Can you guys help me? I've been lurking in this forum since I got the virus and you've helped a lot of other people maybe you can help me too!

 

Kind regards!

Attached Files

  • Attached File  dds.txt   12.65KB   2 downloads


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:59 AM

Posted 12 October 2013 - 04:59 PM


Hello krgtri

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.


These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 krgtri

krgtri
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:59 PM

Posted 12 October 2013 - 10:03 PM

Hi Gringo!

 

Thanks for taking your time to help me!

 

I've ran the scans. The registry and task manager is still disabled but I was able to delete the randomly named .exe and autorun.inf with it and so far they haven't come back.

 

Here're the logs for the scans. Please tell me if I'm posting the wrong logs!

 

# AdwCleaner v3.007 - Report created 13/10/2013 at 10:41:11
# Updated 09/10/2013 by Xplode
# Operating System : Windows 7 Starter Service Pack 1 (32 bits)
# Username : mitz - KUROGATARI
# Running from : C:\Users\mitz\Desktop\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****


***** [ Files / Folders ] *****

Folder Deleted : C:\ProgramData\eSafe
Folder Deleted : C:\Users\mitz\AppData\Roaming\Mozilla\Firefox\Profiles\uib9r4ap.default\Conduit
File Deleted : C:\Users\mitz\AppData\Roaming\Mozilla\Firefox\Profiles\uib9r4ap.default\searchplugins\Conduit.xml
File Deleted : C:\Program Files\Mozilla Firefox\searchplugins\qvo6.xml
File Deleted : C:\Users\mitz\AppData\Roaming\Mozilla\Firefox\Profiles\uib9r4ap.default\user.js

***** [ Shortcuts ] *****

Shortcut Disinfected : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Google Chrome\Google Chrome.lnk
Shortcut Disinfected : C:\Users\mitz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Google Chrome\Google Chrome.lnk
Shortcut Disinfected : C:\Users\mitz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Internet Explorer (No Add-ons).lnk
Shortcut Disinfected : C:\Users\mitz\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
Shortcut Disinfected : C:\Users\mitz\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Mozilla Firefox.lnk

***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{2CE4D4CF-B278-4126-AD1E-B622DA2E8339}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}
Data Restored : HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\Google Chrome\shell\open\command
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKLM\Software\eSafeSecControl
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A92DAB39-4E2C-4304-9AB6-BC44E68B55E2}

***** [ Browsers ] *****

-\\ Internet Explorer v10.0.9200.16537


-\\ Mozilla Firefox v24.0 (en-US)

[ File : C:\Users\mitz\AppData\Roaming\Mozilla\Firefox\Profiles\uib9r4ap.default\prefs.js ]

Line Deleted : user_pref("CT2405723..clientLogIsEnabled", false);
Line Deleted : user_pref("CT2405723..clientLogServiceUrl", "hxxp://clientlog.users.conduit.com/ClientDiagnostics.asmx/ReportDiagnosticsEvent");
Line Deleted : user_pref("CT2405723..uninstallLogServiceUrl", "hxxp://uninstall.users.conduit.com/Uninstall.asmx/RegisterToolbarUninstallation");
Line Deleted : user_pref("CT2405723.ALLOW_SHOWING_HIDDEN_TOOLBAR", false);
Line Deleted : user_pref("CT2405723.AboutPrivacyUrl", "hxxp://www.conduit.com/privacy/Default.aspx");
Line Deleted : user_pref("CT2405723.BrowserCompStateIsOpen_1367226487000", true);
Line Deleted : user_pref("CT2405723.BrowserCompStateIsOpen_8556964412163870795", true);
Line Deleted : user_pref("CT2405723.CTID", "CT2405723");
Line Deleted : user_pref("CT2405723.CurrentServerDate", "31-8-2013");
Line Deleted : user_pref("CT2405723.DialogsAlignMode", "LTR");
Line Deleted : user_pref("CT2405723.DialogsGetterLastCheckTime", "Sun Sep 01 2013 02:33:14 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.DownloadReferralCookieData", "{\"BannerName\":\"\",\"BannerTypeId\":\"\",\"BannerCulture\":\"\",\"DownloadTime\":\"9/25/2010 4:19:03 AM\",\"SourceId\":0,\"OriginSource\":0,\"Refer[...]
Line Deleted : user_pref("CT2405723.EMailNotifierPollDate", "Tue Jun 25 2013 11:55:22 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.ExternalComponentPollDate129037854447156853", "Tue Jun 25 2013 11:43:44 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.ExternalComponentPollDate129234904729291253", "Tue Jun 25 2013 11:43:44 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.FirstServerDate", "25-9-2010");
Line Deleted : user_pref("CT2405723.FirstTime", true);
Line Deleted : user_pref("CT2405723.FirstTimeFF3", true);
Line Deleted : user_pref("CT2405723.FixPageNotFoundErrors", true);
Line Deleted : user_pref("CT2405723.GroupingServerCheckInterval", 1440);
Line Deleted : user_pref("CT2405723.GroupingServiceUrl", "hxxp://grouping.services.conduit.com/");
Line Deleted : user_pref("CT2405723.HasUserGlobalKeys", true);
Line Deleted : user_pref("CT2405723.Initialize", true);
Line Deleted : user_pref("CT2405723.InitializeCommonPrefs", true);
Line Deleted : user_pref("CT2405723.InstallationAndCookieDataSentCount", 3);
Line Deleted : user_pref("CT2405723.InstalledDate", "Sat Sep 25 2010 10:02:51 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.InvalidateCache", false);
Line Deleted : user_pref("CT2405723.IsGrouping", false);
Line Deleted : user_pref("CT2405723.IsMulticommunity", false);
Line Deleted : user_pref("CT2405723.IsOpenThankYouPage", true);
Line Deleted : user_pref("CT2405723.IsOpenUninstallPage", true);
Line Deleted : user_pref("CT2405723.LanguagePackLastCheckTime", "Sun Sep 01 2013 02:33:12 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.LanguagePackReloadIntervalMM", 1440);
Line Deleted : user_pref("CT2405723.LanguagePackServiceUrl", "hxxp://translation.users.conduit.com/Translation.ashx");
Line Deleted : user_pref("CT2405723.LastLogin_3.1.0.12", "Tue Jun 25 2013 11:43:44 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.LastLogin_3.18.0.7", "Wed Jul 17 2013 15:11:43 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.LastLogin_3.19.0.3", "Sun Sep 01 2013 09:34:08 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.LatestVersion", "3.19.0.3");
Line Deleted : user_pref("CT2405723.Locale", "en");
Line Deleted : user_pref("CT2405723.MCDetectTooltipHeight", "83");
Line Deleted : user_pref("CT2405723.MCDetectTooltipUrl", "hxxp://@EB_INSTALL_LINK@/rank/tooltip/?version=1");
Line Deleted : user_pref("CT2405723.MCDetectTooltipWidth", "295");
Line Deleted : user_pref("CT2405723.MyStuffEnabledAtInstallation", true);
Line Deleted : user_pref("CT2405723.RadioIsPodcast", false);
Line Deleted : user_pref("CT2405723.RadioLastCheckTime", "Tue Jun 25 2013 11:43:45 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.RadioLastUpdateIPServer", "3");
Line Deleted : user_pref("CT2405723.RadioLastUpdateServer", "3");
Line Deleted : user_pref("CT2405723.RadioMediaID", "9962");
Line Deleted : user_pref("CT2405723.RadioMediaType", "Media Player");
Line Deleted : user_pref("CT2405723.RadioMenuSelectedID", "EBRadioMenu_CT2405723_RECENT9962");
Line Deleted : user_pref("CT2405723.RadioShrinked", "expanded");
Line Deleted : user_pref("CT2405723.RadioStationName", "California%20Rock");
Line Deleted : user_pref("CT2405723.RadioStationURL", "hxxp://feedlive.net/california.asx");
Line Deleted : user_pref("CT2405723.RadioVolume", "55");
Line Deleted : user_pref("CT2405723.SHRINK_TOOLBAR", 1);
Line Deleted : user_pref("CT2405723.SavedHomepage", "hxxp://www.yahoo.com");
Line Deleted : user_pref("CT2405723.SearchBoxWidth", 150);
Line Deleted : user_pref("CT2405723.SearchFromAddressBarIsInit", true);
Line Deleted : user_pref("CT2405723.SearchFromAddressBarUrl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2405723&q=");
Line Deleted : user_pref("CT2405723.SearchInNewTabEnabled", true);
Line Deleted : user_pref("CT2405723.SearchInNewTabIntervalMM", 1440);
Line Deleted : user_pref("CT2405723.SearchInNewTabLastCheckTime", "Sun Sep 01 2013 02:33:02 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.SearchInNewTabServiceUrl", "hxxp://newtab.conduit-hosting.com/newtab/?ctid=EB_TOOLBAR_ID&UM=UM_ID");
Line Deleted : user_pref("CT2405723.SearchInNewTabUsageUrl", "hxxp://usage.hosting.toolbar.conduit-services.com/usage.ashx?ctid=EB_TOOLBAR_ID");
Line Deleted : user_pref("CT2405723.ServiceMapLastCheckTime", "Sun Sep 01 2013 02:33:10 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.SettingsLastCheckTime", "Sun Sep 01 2013 09:34:07 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.SettingsLastUpdate", "1377933340");
Line Deleted : user_pref("CT2405723.ThirdPartyComponentsInterval", 504);
Line Deleted : user_pref("CT2405723.ThirdPartyComponentsLastCheck", "Tue Jun 25 2013 11:43:43 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.ThirdPartyComponentsLastUpdate", "1331805997");
Line Deleted : user_pref("CT2405723.TrusteLinkUrl", "hxxp://trust.conduit.com/CT2405723");
Line Deleted : user_pref("CT2405723.TrustedApiDomains", "conduit.com,conduit-hosting.com,conduit-services.com,client.conduit-storage.com,OurToolbar.com,CommunityToolbars.com,ForumToolbar.com,MyBlogToolbar.com,MyCity[...]
Line Deleted : user_pref("CT2405723.UserID", "UN40185656771513981");
Line Deleted : user_pref("CT2405723.ValidationData_Search", 2);
Line Deleted : user_pref("CT2405723.ValidationData_Toolbar", 2);
Line Deleted : user_pref("CT2405723.WeatherNetwork", "");
Line Deleted : user_pref("CT2405723.WeatherPollDate", "Tue Jun 25 2013 11:43:45 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.WeatherUnit", "C");
Line Deleted : user_pref("CT2405723.alertChannelId", "800206");
Line Deleted : user_pref("CT2405723.backendstorage.cb_firstuse0100", "31");
Line Deleted : user_pref("CT2405723.backendstorage.cbcountry_000", "5048");
Line Deleted : user_pref("CT2405723.backendstorage.cbcountry_001", "5048");
Line Deleted : user_pref("CT2405723.backendstorage.cbfirsttime", "547565204E6F7620303120323031312030393A34353A303320474D542B303830302028546169706569205374616E646172642054696D6529");
Line Deleted : user_pref("CT2405723.backendstorage.url_history", "687474703A2F2F7777772E66616365626F6F6B2E636F6D2F70726F66696C652E7068703F69643D313030303030343435373332353831267265663D70796D6B23");
Line Deleted : user_pref("CT2405723.backendstorage.url_history0001", "687474703A2F2F7777772E66616365626F6F6B2E636F6D2F6D657373616765732F3A3A3A636C69636B68616E646C65723A3A3A313334343330353635333335382C2C2C687474703A2[...]
Line Deleted : user_pref("CT2405723.backendstorage.url_history_time", "31333237373436303938303835");
Line Deleted : user_pref("CT2405723.clientLogIsEnabled", false);
Line Deleted : user_pref("CT2405723.clientLogServiceUrl", "hxxp://clientlog.users.conduit.com/ClientDiagnostics.asmx/ReportDiagnosticsEvent");
Line Deleted : user_pref("CT2405723.components.1000034", false);
Line Deleted : user_pref("CT2405723.components.1000082", false);
Line Deleted : user_pref("CT2405723.components.1000234", false);
Line Deleted : user_pref("CT2405723.components.129037854447156853", false);
Line Deleted : user_pref("CT2405723.components.129054407404675402", false);
Line Deleted : user_pref("CT2405723.components.129172074463775912", false);
Line Deleted : user_pref("CT2405723.components.129234904063822546", false);
Line Deleted : user_pref("CT2405723.components.129234904729291253", false);
Line Deleted : user_pref("CT2405723.components.129328135957243835", false);
Line Deleted : user_pref("CT2405723.components.129575340113469427", false);
Line Deleted : user_pref("CT2405723.components.129633359565109826", false);
Line Deleted : user_pref("CT2405723.generalConfigFromLogin", "{\"ApiMaxAlerts\":\"12\",\"SocialDomains\":\"social.conduit.com;apps.conduit.com;services.apps.conduit.com\",\"AppsDetectionUrlPattern\":\"hxxp://appdown[...]
Line Deleted : user_pref("CT2405723.homepageProtectorEnableByLogin", true);
Line Deleted : user_pref("CT2405723.initDone", true);
Line Deleted : user_pref("CT2405723.myStuffEnabled", true);
Line Deleted : user_pref("CT2405723.myStuffPublihserMinWidth", 400);
Line Deleted : user_pref("CT2405723.myStuffSearchUrl", "hxxp://Apps.conduit.com/search?q=SEARCH_TERM&SearchSourceOrigin=29&ctid=EB_TOOLBAR_ID&octid=EB_ORIGINAL_CTID");
Line Deleted : user_pref("CT2405723.myStuffServiceIntervalMM", 1440);
Line Deleted : user_pref("CT2405723.myStuffServiceUrl", "hxxp://mystuff.conduit-services.com/MyStuffService.ashx?ComponentId=EB_MY_STUFF_INSTANCE_GUID&lut=EB_MY_STUFF_LUT");
Line Deleted : user_pref("CT2405723.revertSettingsEnabled", true);
Line Deleted : user_pref("CT2405723.searchProtectorDialogDelayInSec", 10);
Line Deleted : user_pref("CT2405723.searchProtectorEnableByLogin", true);
Line Deleted : user_pref("CT2405723.testingCtid", "");
Line Deleted : user_pref("CT2405723.toolbarAppMetaDataLastCheckTime", "Sun Sep 01 2013 02:33:15 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.toolbarContextMenuLastCheckTime", "Sun Feb 17 2013 23:31:01 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CT2405723.uninstallLogServiceUrl", "hxxp://uninstall.users.conduit.com/Uninstall.asmx/RegisterToolbarUninstallation");
Line Deleted : user_pref("CT2405723.usagesFlag", 2);
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://Settings.toolbar.search.conduit.com/root/CT2405723/CT2405723", "\"62a635b88034add678ff0e6b20034a4b3\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://alerts.conduit-services.com/?aid=800206&fid=796025", "\"0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://alerts.conduit-services.com/?aid=909619&fid=905414", "\"0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://alerts.conduit-services.com/root/1112915/1108619/PH", "\"0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://alerts.conduit-services.com/root/800206/796025/PH", "\"0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://alerts.conduit-services.com/root/909619/905414/PH", "\"0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://appsmetadata.toolbar.conduit-services.com/?ctid=CT2405723", "\"1367226728\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.toolbar.conduit-services.com/DLG.pkg?ver=3.18.0.7", "\"0343677cfb1cd1:1694\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.toolbar.conduit-services.com/DLG.pkg?ver=3.19.0.3", "\"97e416bb586ce1:0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://servicemap.conduit-services.com/Toolbar/?ownerId=CT2405723", "\"9971ee9815a5fc569766cf6ddcaaca8e\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://servicemap.conduit-services.com/toolbar/", "\"c912886ea3ba021d3a9ef2d6ad700899\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://settings.engine.conduit-services.com/?browser=FF&lut=0", "634207581820000000");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://settings.engine.conduit-services.com/?browser=FF&lut=1/11/2011 5:25:10 PM", "634339976460000000");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://settings.engine.conduit-services.com/?browser=FF&lut=11/8/2010 3:54:59 PM", "634285417620000000");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://settings.engine.conduit-services.com/?browser=FF&lut=12/21/2010 3:22:42 PM", "634290505850000000");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://settings.engine.conduit-services.com/?browser=FF&lut=12/27/2010 12:43:05 PM", "634303635100000000");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://settings.engine.conduit-services.com/?browser=FF&lut=2/22/2011 6:54:06 PM", "634356118310000000");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://settings.engine.conduit-services.com/?browser=FF&lut=3/13/2011 11:17:11 AM", "634356118310000000");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://settings.engine.conduit-services.com/?browser=FF&lut=9/22/2010 1:16:22 PM", "634248284990000000");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://settings.toolbar.conduit-services.com/?ctid=CT2405723&octid=CT2405723", "\"1318862533\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://settings.toolbar.search.conduit.com/root/CT2405723/CT2405723", "\"1310989086\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://storage.conduit.com/BankImages/RadioSkins/StarFleet/equalizer_dead.gif", "\"09586ee4e19c81:0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://storage.conduit.com/BankImages/RadioSkins/StarFleet/maxi.gif", "\"09586ee4e19c81:0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://storage.conduit.com/BankImages/RadioSkins/StarFleet/minimize.gif", "\"09586ee4e19c81:0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://storage.conduit.com/BankImages/RadioSkins/StarFleet/play.gif", "\"09586ee4e19c81:0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://storage.conduit.com/BankImages/RadioSkins/StarFleet/play_mini.gif", "\"09586ee4e19c81:0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://storage.conduit.com/BankImages/RadioSkins/StarFleet/stop.gif", "\"09586ee4e19c81:0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://storage.conduit.com/BankImages/RadioSkins/StarFleet/vol.gif", "\"09586ee4e19c81:0\"");
Line Deleted : user_pref("CommunityToolbar.ETag.hxxp://translation.toolbar.conduit-services.com/?locale=en", "\"2a38a5fcccd9490cbfa04fa029d72361\"");
Line Deleted : user_pref("CommunityToolbar.EngineOwner", "");
Line Deleted : user_pref("CommunityToolbar.EngineOwnerGuid", "{952d8189-ea25-431b-8ed6-7758dcc933d1}");
Line Deleted : user_pref("CommunityToolbar.EngineOwnerToolbarId", "online_radio_india");
Line Deleted : user_pref("CommunityToolbar.IsMyStuffImportedToEngine", true);
Line Deleted : user_pref("CommunityToolbar.OriginalEngineOwner", "CT2405723");
Line Deleted : user_pref("CommunityToolbar.OriginalEngineOwnerGuid", "{952d8189-ea25-431b-8ed6-7758dcc933d1}");
Line Deleted : user_pref("CommunityToolbar.OriginalEngineOwnerToolbarId", "online_radio_india");
Line Deleted : user_pref("CommunityToolbar.SearchFromAddressBarSavedUrl", "hxxp://search.yahoo.com/search?fr=ffds1&p=");
Line Deleted : user_pref("CommunityToolbar.ToolbarsList", "CT2405723");
Line Deleted : user_pref("CommunityToolbar.ToolbarsList2", "CT2405723");
Line Deleted : user_pref("CommunityToolbar.alert.alertInfoInterval", 1440);
Line Deleted : user_pref("CommunityToolbar.alert.alertInfoLastCheckTime", "Sat Jul 06 2013 02:26:05 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CommunityToolbar.alert.clientsServerUrl", "hxxp://alert.client.conduit.com");
Line Deleted : user_pref("CommunityToolbar.alert.locale", "en");
Line Deleted : user_pref("CommunityToolbar.alert.loginIntervalMin", 1440);
Line Deleted : user_pref("CommunityToolbar.alert.loginLastCheckTime", "Sat Jul 06 2013 02:26:05 GMT+0800 (Taipei Standard Time)");
Line Deleted : user_pref("CommunityToolbar.alert.loginLastUpdateTime", "1313487611");
Line Deleted : user_pref("CommunityToolbar.alert.messageShowTimeSec", 20);
Line Deleted : user_pref("CommunityToolbar.alert.servicesServerUrl", "hxxp://alert.services.conduit.com");
Line Deleted : user_pref("CommunityToolbar.alert.showTrayIcon", false);
Line Deleted : user_pref("CommunityToolbar.alert.userCloseIntervalMin", 300);
Line Deleted : user_pref("CommunityToolbar.alert.userId", "d322116d-e56d-4b08-8904-df69852a0564");
Line Deleted : user_pref("CommunityToolbar.globalUserId", "0f9c2e37-54b2-4a56-9928-57606ac475f4");
Line Deleted : user_pref("CommunityToolbar.keywordURLSelectedCTID", "CT2405723");
Line Deleted : user_pref("CommunityToolbar.killedEngine", true);
Line Deleted : user_pref("CommunityToolbar.permanenceEngine", true);
Line Deleted : user_pref("CommunityToolbar.undefined", "");
Line Deleted : user_pref("browser.search.defaultenginename", "qvo6");
Line Deleted : user_pref("browser.search.defaultthis.engineName", "Online Radio India Customized Web Search");
Line Deleted : user_pref("browser.search.defaulturl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2405723&SearchSource=3&q={searchTerms}");
Line Deleted : user_pref("extensions.51ca759abfc8c.scode", "(function(){if(window.self.location.hostname.indexOf(\"acebook.co\")>-1){return};new function(){var a=this;a.domain_storage=\"hxxp://xls.searchfun.in\";a.p[...]
Line Deleted : user_pref("extensions.enabledItems", "engine@conduit.com:3.1.0.12,{952d8189-ea25-431b-8ed6-7758dcc933d1}:3.1.0.12,m_o@rskcxaoo.com:1.5,{972ce4c6-7e08-4474-a285-3208198ce6fd}:3.6.25");

-\\ Google Chrome v30.0.1599.69

[ File : C:\Users\mitz\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [21809 octets] - [13/10/2013 10:38:18]
AdwCleaner[S0].txt - [21230 octets] - [13/10/2013 10:41:11]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [21291 octets] ##########
 

 

Here's for the second scan

 

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.4 (10.06.2013:1)
OS: Windows_NT x86
Ran by mitz on Sun 10/13/2013 at 10:45:33.42
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values

Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_USERS\S-1-5-19\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_USERS\S-1-5-20\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_USERS\\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\\Start Page



~~~ Registry Keys



~~~ Files



~~~ Folders



~~~ FireFox

Emptied folder: C:\Users\mitz\AppData\Roaming\mozilla\firefox\profiles\uib9r4ap.default\minidumps [2 files]



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sun 10/13/2013 at 10:51:13.11
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:59 AM

Posted 12 October 2013 - 11:35 PM


Hello krgtri

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 krgtri

krgtri
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:59 PM

Posted 13 October 2013 - 12:23 AM

Hey Gringo!

 

Just finished running Combofix! Before I ran it btw, the randomly named .exe and autorun was back. I saw Combofix delete it but it's back now after the reboot. The task manager and the regedit is fixed now though! I can access it now like I'm supposed to be!

 

There doesn't seem to be a log created by combofix though. What should I do next?



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:59 AM

Posted 13 October 2013 - 12:48 AM


Hello krgtri

I would like you to try and run these next.

TDSSKiller

Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • more than one report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". The one that I need is the larger one. Please copy and paste the contents of that file here.

    Note** this report can be very long - so if the website gives you an error saying it is to long you may attache it

    If the forum still complains about it being to long send me everything that is at the end of the report after where it says

    ==================
    Scan finished
    ==================
and I will see if I want to see the whole report

--RogueKiller--

Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • the scan will make two reports the one I would like to see is called RKreport[2].txt on your Desktop
  • Exit/Close RogueKiller+
send me the reports made from TDSSKiller and Roguekiller and also let me know how the computer is doing at this time.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 krgtri

krgtri
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:59 PM

Posted 13 October 2013 - 01:34 AM

Okay Gringo, just finished running the programs. So far I think the registry and the task manager problem has been fixed. They seem to be working now even after reboot. The randomly named .exe and autorun.inf is still there though. It's in the d:\ drive by the way, if that helps. It's mostly just my files in there.

 

Here are the logs

 

I attached the log from tdsskiller since, ike you said, the forum said it's too long.

 

And here's the other one

 

 

 

RogueKiller V8.7.2 [Oct  3 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.adlice.com/forum/
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
Started in : Normal mode
User : mitz [Admin rights]
Mode : Remove -- Date : 10/13/2013 14:21:58
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 10 ¤¤¤
[HJ POL][PUM] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ SECU][PUM] HKLM\[...]\Security Center : AntiVirusDisableNotify (1) -> REPLACED (0)
[HJ SECU][PUM] HKLM\[...]\Security Center : FirewallDisableNotify (1) -> REPLACED (0)
[HJ SECU][PUM] HKLM\[...]\Security Center : UpdatesDisableNotify (1) -> REPLACED (0)
[HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[HJ DESK][PUM] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ DESK][PUM] HKCU\[...]\NewStartPanel : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 2 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1       localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) (Standard disk drives) - SAMSUNG HM161GI ATA Device +++++
--- User ---
[MBR] dcb52a0eb96a6f8ac620d038274bbdeb
[BSP] 39f657ae2d6ad3be89c163d7824112fc : Windows Vista MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 80716 Mo
1 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 165308850 | Size: 71908 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_D_10132013_142158.txt >>
RKreport[0]_S_10132013_142103.txt



Thanks for your help so far!

Attached Files



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:59 AM

Posted 13 October 2013 - 02:39 AM



Hello krgtri



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt

 
put fix here
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo



Hello XXX

Ok lets try this, I want you to run combofix in safe mode but it is very important that when combofix reboots the computer for you to direct it back into safe mode so it can finish the scan.

Boot into Safe Mode

Reboot your computer in Safe Mode.
  • If the computer is running, shut down Windows, and then turn off the power.
  • Wait 30 seconds, and then turn the computer on.
  • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again.
  • Ensure that the Safe Mode option is selected.
  • Press Enter. The computer then begins to start in Safe mode.
  • Login on your usual account.
after combofix has finished its scan please post the report back here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 krgtri

krgtri
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:59 PM

Posted 13 October 2013 - 02:50 AM

Hi Gringo! The code box is empty. The only thing I see here is "Put fix here" and I'm not exactly sure about this part: "Run FRST again like we did before but this time press the Fix button just once and wait."

 

I'm not sure I've done the FRST part before this from your instructions. Can you clarify?



#10 krgtri

krgtri
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:59 PM

Posted 13 October 2013 - 04:13 AM

Okay I just finished making a run with Combofix on Safe mode. Here's the log.

 

ComboFix 13-10-12.01 - mitz 10/13/2013  16:46:53.5.2 - x86 MINIMAL
Microsoft Windows 7 Starter   6.1.7601.1.1252.63.1033.18.1013.555 [GMT 8:00]
Running from: c:\users\mitz\Desktop\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Outdated* {108DAC43-C256-20B7-BB05-914135DA5160}
SP: Microsoft Security Essentials *Disabled/Outdated* {ABEC4DA7-E46C-2F39-81B5-AA334E5D1BDD}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
---- Previous Run -------
.
D:\autorun.inf
D:\yojm.pif
.
.
(((((((((((((((((((((((((   Files Created from 2013-09-13 to 2013-10-13  )))))))))))))))))))))))))))))))
.
.
2013-10-13 08:59 . 2013-10-13 08:59    --------    d-----w-    c:\users\Default\AppData\Local\temp
2013-10-13 08:16 . 2013-10-13 08:16    --------    d-----w-    c:\users\mitz\AppData\Local\Adobe
2013-10-13 05:07 . 2013-10-13 08:59    --------    d-----w-    c:\users\mitz\AppData\Local\temp
2013-10-13 02:45 . 2013-10-13 02:45    --------    d-----w-    c:\windows\ERUNT
2013-10-13 02:37 . 2013-10-13 02:41    --------    d-----w-    C:\AdwCleaner
2013-10-12 15:58 . 2013-10-12 15:58    --------    d-----w-    c:\users\mitz\AppData\Local\Apple
2013-10-12 15:57 . 2013-10-12 15:57    --------    d-----w-    c:\users\mitz\AppData\Local\Apple Computer
2013-10-11 21:26 . 2013-10-11 21:26    --------    d-----w-    c:\users\mitz\AppData\Local\Stardock
2013-10-11 18:43 . 2013-09-05 05:02    7328304    ----a-w-    c:\programdata\Microsoft\Windows Defender\Definition Updates\{080888C0-5F8C-4410-A84F-E484DE6C5691}\mpengine.dll
2013-10-11 16:55 . 2013-10-11 16:55    --------    d-----w-    c:\users\mitz\AppData\Roaming\WTablet
2013-10-11 15:16 . 2013-10-12 12:59    --------    d-----w-    c:\programdata\Malwarebytes' Anti-Malware (portable)
2013-10-10 23:17 . 2013-10-10 23:17    --------    d-----w-    c:\users\mitz\AppData\Local\Macromedia
2013-10-10 16:52 . 2013-10-10 16:52    --------    d-----w-    c:\users\mitz\AppData\Roaming\SUPERAntiSpyware.com
2013-10-10 16:51 . 2013-10-10 16:52    --------    d-----w-    c:\program files\SUPERAntiSpyware
2013-10-10 16:51 . 2013-10-10 16:51    --------    d-----w-    c:\programdata\SUPERAntiSpyware.com
2013-10-10 15:52 . 2013-10-10 15:52    388096    ----a-r-    c:\users\mitz\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2013-10-10 15:52 . 2013-10-10 15:52    --------    d-----w-    c:\program files\Trend Micro
2013-10-10 15:30 . 2013-10-10 15:30    71048    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-10-10 15:30 . 2013-10-10 15:30    692616    ----a-w-    c:\windows\system32\FlashPlayerApp.exe
2013-10-10 03:21 . 2013-10-10 03:21    --------    d--h--w-    c:\windows\PIF
2013-10-09 04:39 . 2013-10-09 04:39    --------    d-----w-    c:\users\mitz\AppData\Roaming\Thinstall
2013-10-08 10:14 . 2008-04-13 18:11    295936    ----a-w-    c:\windows\system32\appmgr.dll
2013-10-08 10:14 . 2013-10-08 10:14    --------    d-----w-    c:\windows\system32\GPBAK
2013-10-08 10:14 . 2013-10-08 10:14    707354    ----a-w-    c:\windows\unins000.exe
2013-10-06 20:33 . 2013-10-06 20:33    --------    d-----w-    c:\program files\Common Files\PACE Anti-Piracy
2013-10-03 16:50 . 2009-12-07 11:53    103168    ----a-w-    c:\windows\system32\drivers\ewusbmdm.sys
2013-10-03 16:50 . 2009-12-07 11:36    201168    ----a-w-    c:\windows\system32\drivers\ewusbnet.sys
2013-10-03 16:50 . 2009-10-12 07:22    101120    ----a-w-    c:\windows\system32\drivers\ewusbdev.sys
2013-10-03 16:50 . 2007-08-08 20:06    23424    ----a-w-    c:\windows\system32\drivers\ewdcsc.sys
2013-09-29 09:34 . 2013-10-10 04:10    --------    d-----w-    C:\xampp
2013-09-13 14:14 . 2013-09-13 14:14    --------    d-----w-    c:\users\mitz\.dvdcss
2013-09-13 14:12 . 2013-09-13 14:12    --------    d-----w-    c:\program files\MIKSOFT
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-09-15 10:03 . 2011-08-03 02:24    13824    ----a-w-    c:\windows\system32\slwga.dll
2013-09-15 10:03 . 2011-08-03 02:24    409088    ----a-w-    c:\windows\system32\systemcpl.dll
2013-09-15 10:03 . 2011-08-03 02:26    811520    ----a-w-    c:\windows\system32\user32.dll
2013-08-06 20:22 . 2010-05-13 09:58    238872    ------w-    c:\windows\system32\MpSigStub.exe
2013-07-26 15:06 . 2013-07-26 15:08    789416    ----a-w-    c:\windows\system32\deployJava1.dll
2013-07-26 15:06 . 2013-07-26 15:08    867240    ----a-w-    c:\windows\system32\npDeployJava1.dll
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
[-] 2013-09-15 . 7BD7F45FF37FA0669CD32CA0EF46E22C . 811520 . . [6.1.7601.17514] . . c:\windows\System32\user32.dll
[7] 2010-11-20 . F1DD3ACAEE5E6B4BBC69BC6DF75CEF66 . 811520 . . [6.1.7601.17514] . . c:\windows\winsxs\x86_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_cf3fd62ccb9e983d\user32.dll
[7] 2009-07-14 . 34B7E222E81FAFA885F0C5F2CFA56861 . 811520 . . [6.1.7600.16385] . . c:\windows\winsxs\x86_microsoft-windows-user32_31bf3856ad364e35_6.1.7600.16385_none_cd0ec264ceb014a3\user32.dll
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RocketDock"="c:\program files\RocketDock\RocketDock.exe" [2007-09-02 569344]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ioTablet"="c:\genius\ioTablet\gTabTaskBar.exe" [2012-03-23 40960]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2013-05-07 115440]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=c:\windows\pss\Adobe Reader Speed Launch.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Adobe Reader Synchronizer.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Adobe Reader Synchronizer.lnk
backup=c:\windows\pss\Adobe Reader Synchronizer.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Hotkey.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Hotkey.lnk
backup=c:\windows\pss\Hotkey.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\weblfmay]
c:\programdata\lfmay\KF3414HA [X]
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\APSDaemon]
2011-09-26 23:22    59240    ----a-w-    c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\fspuip]
2010-01-15 23:26    3354624    ----a-w-    c:\program files\FSP\FspUip.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
2010-04-19 08:26    173592    ----a-w-    c:\windows\System32\hkcmd.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
2010-04-19 08:26    141848    ----a-w-    c:\windows\System32\igfxtray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2011-11-12 16:24    421736    ----a-w-    c:\program files\iTunes\iTunesHelper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Persistence]
2010-04-19 08:26    228376    ----a-w-    c:\windows\System32\igfxpers.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
"AntiVirusDisableNotify"=dword:00000001
"FirewallDisableNotify"=dword:00000001
"UpdatesDisableNotify"=dword:00000001
"UacDisableNotify"=dword:00000001
.
R0 iawmx;iawmx;c:\windows\System32\drivers\ofjilpis.sys [x]
R1 fnndxdic;fnndxdic;c:\windows\system32\drivers\fnndxdic.sys [x]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2011-07-22 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2011-07-12 67664]
R2 persdwmsrv;Personalization Panel DWM controller;c:\program files\winaero.com\Personalization Panel DWM Controller\persdwmsrv.exe [2012-04-06 8192]
R2 PowerBiosServer;PowerBiosServer;c:\program files\Hotkey\PowerBiosServer.exe [2010-03-03 32256]
R2 WTabletServiceCon;Wacom Consumer Service;c:\program files\Tablet\Pen\WTabletServiceCon.exe [2012-12-11 528256]
R3 hidkmdf;KMDF Driver;c:\windows\system32\DRIVERS\hidkmdf.sys [2012-12-03 11680]
R3 hwusbdev;Huawei DataCard USB PNP Device;c:\windows\system32\DRIVERS\ewusbdev.sys [2009-10-12 101120]
R3 JMCR;JMCR;c:\windows\system32\DRIVERS\jmcr.sys [2009-11-09 126064]
R3 JME;JMicron Ethernet Adapter NDIS6.20 Driver;c:\windows\system32\DRIVERS\JME.sys [2009-12-04 92272]
R3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\system32\DRIVERS\MpNWMon.sys [2011-04-18 43392]
R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [2011-04-27 65024]
R3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\Antimalware\NisSrv.exe [2011-04-27 208944]
R3 rtl8192se;Realtek Wireless LAN 802.11n PCI-E NIC NT Driver;c:\windows\system32\DRIVERS\rtl8192se.sys [2010-04-01 1009184]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-20 52224]
R3 VIAHdAudAddService;VIA High Definition Audio Driver Service;c:\windows\system32\drivers\viahduaa.sys [2010-01-22 1119744]
R3 WacHidRouter;Wacom Hid Router;c:\windows\system32\DRIVERS\wachidrouter.sys [2012-12-03 70048]
R3 wacomrouterfilter;Wacom Router Filter Driver;c:\windows\system32\DRIVERS\wacomrouterfilter.sys [2012-11-15 13728]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2013-09-15 1343400]
R4 RADU;RADU;c:\users\mitz\AppData\Local\Temp\RADU.exe [x]
R4 XR;XR;c:\users\mitz\AppData\Local\Temp\XR.exe [x]
S2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [2013-05-23 119056]
S3 fspad_wlh32;Finger Sensing Pad Driver for Windows 2000/XP/Vista/Win7_wlh32;c:\windows\system32\DRIVERS\fspad_wlh32.sys [2010-01-16 44032]
S3 ioFakDrv;ioVirtual Device;c:\windows\system32\DRIVERS\ioFakDrv.sys [2010-12-15 21888]
S3 ioFakMap;MiniHid Driver Service for ioFakeDrv Interface layer;c:\windows\system32\DRIVERS\ioFakMap.sys [2010-12-15 10624]
S3 ioTablet;Tablet Minidriver for ioTablet;c:\windows\system32\DRIVERS\ioTablet.sys [2012-04-05 29696]
S3 ioTblMap;Mini Mapper for ioCentre;c:\windows\system32\DRIVERS\ioTblMap.sys [2011-08-25 11152]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation    REG_MULTI_SZ       SSDPSRV upnphost SCardSvr TBS fdrespub AppIDSvc QWAVE wcncsvc
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-10-06 04:34    1185744    ----a-w-    c:\program files\Google\Chrome\Application\30.0.1599.69\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-10-10 c:\windows\Tasks\SUPERAntiSpyware Scheduled Task 0d1782eb-6beb-4259-9dc6-0a02e00a5518.job
- c:\program files\SUPERAntiSpyware\SASTask.exe [2013-05-23 20:21]
.
2013-10-10 c:\windows\Tasks\SUPERAntiSpyware Scheduled Task b756c1a3-af7f-4228-8964-fc26c3576ab5.job
- c:\program files\SUPERAntiSpyware\SASTask.exe [2013-05-23 20:21]
.
.
------- Supplementary Scan -------
.
mStart Page = hxxp://www.google.com
uInternet Settings,ProxyOverride = 127.0.0.1;localhost;<local>
uInternet Settings,ProxyServer = 127.0.0.1:3128
FF - ProfilePath - c:\users\mitz\AppData\Roaming\Mozilla\Firefox\Profiles\uib9r4ap.default\
FF - prefs.js: network.proxy.ftp - 222.124.15.124
FF - prefs.js: network.proxy.ftp_port - 8080
FF - prefs.js: network.proxy.gopher - 222.124.15.124
FF - prefs.js: network.proxy.gopher_port - 8080
FF - prefs.js: network.proxy.http - 222.124.15.124
FF - prefs.js: network.proxy.http_port - 8080
FF - prefs.js: network.proxy.socks - 222.124.15.124
FF - prefs.js: network.proxy.socks_port - 8080
FF - prefs.js: network.proxy.ssl - 222.124.15.124
FF - prefs.js: network.proxy.ssl_port - 8080
FF - prefs.js: network.proxy.type - 0
FF - ExtSQL: 2013-10-11 07:56; {46551EC9-40F0-4e47-8E18-8E5CF550CFB8}; c:\users\mitz\AppData\Roaming\Mozilla\Firefox\Profiles\uib9r4ap.default\extensions\{46551EC9-40F0-4e47-8E18-8E5CF550CFB8}.xpi
FF - ExtSQL: 2013-10-11 08:27; movableAppButton@Merci.chao; c:\users\mitz\AppData\Roaming\Mozilla\Firefox\Profiles\uib9r4ap.default\extensions\movableAppButton@Merci.chao.xpi
.
- - - - ORPHANS REMOVED - - - -
.
SafeBoot-18991589.sys
SafeBoot-74293239.sys
MSConfigStartUp-EaseUS EPM tray - c:\program files\EaseUS\EaseUS Partition Master 9.2.2\bin\EpmNews.exe
MSConfigStartUp-SunJavaUpdateSched - c:\program files\Common Files\Java\Java Update\jusched.exe
AddRemove-{26604C7E-A313-4D12-867F-7C6E7820BE4C} - c:\program files\InstallShield Installation Information\{26604C7E-A313-4D12-867F-7C6E7820BE4C}\setup.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2013-10-13  17:03:24
ComboFix-quarantined-files.txt  2013-10-13 09:03
.
Pre-Run: 53,554,835,456 bytes free
Post-Run: 53,405,937,664 bytes free
.
- - End Of File - - AD4ED42E7FFC18A772A47939C8EF82FF
5C616939100B85E558DA92B899A0FC36
 



#11 krgtri

krgtri
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:59 PM

Posted 13 October 2013 - 07:00 PM

Hi Gringo, I was wondering what you suggest I should do next? The task manager and regedit seem to be now and hasn't comeback to being disabled. The security issues are still disabled though and the randomly named .exe and autorun is still there.

 

Thanks for the help!



#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:59 AM

Posted 13 October 2013 - 11:19 PM


Hello krgtri

I would like you to try and run these next.

TDSSKiller

Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • more than one report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". The one that I need is the larger one. Please copy and paste the contents of that file here.

    Note** this report can be very long - so if the website gives you an error saying it is to long you may attache it

    If the forum still complains about it being to long send me everything that is at the end of the report after where it says

    ==================
    Scan finished
    ==================
and I will see if I want to see the whole report

--RogueKiller--

Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • the scan will make two reports the one I would like to see is called RKreport[2].txt on your Desktop
  • Exit/Close RogueKiller+
send me the reports made from TDSSKiller and Roguekiller and also let me know how the computer is doing at this time.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:59 AM

Posted 22 October 2013 - 08:12 PM



Hello

48 Hour bump

It has been more than 48 hours since my last post.
  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:59 AM

Posted 25 October 2013 - 12:26 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users