Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

suspicious.cloud.7.ep removed but a few problems remain


  • This topic is locked This topic is locked
15 replies to this topic

#1 ddibowski

ddibowski

  • Members
  • 162 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:38 AM

Posted 18 November 2013 - 11:21 AM

I am helping a friend with this problem.  Her computer was infected by the suspicious.cloud.7.ep virus.  She is running Norton Anti-Virus.  Norton was giving her the messages - "Auto-Protect is processing security risk suspicious.cloud.7.ep" - followed by "Auto-Protect has removed the security risk suspicious.cloud.7.ep".

She was getting these messages repeatedly.  It seemed to me, while Norton was recognizing the problem, it was not getting at the root cause - the virus was regenerating itself.

I ran Maleware Bytes on her system and it found several problems that were removed.  I am assuming suspicious.cloud.7.ep was one of these that was removed because Norton is longer giving the message.

But we are left with two problems - one is when we rebooted, we got a RegSrv32 message that said it could not find the lbpmex.dll.  I found a file C:\Users\Susan\appdata\local\Cpkics\lbpmex.txt.  I copied it and gave it a dll extension.  But now I am getting the message that I have attached.  I have looked on the internet for Cpkics and lbpmex.dll and can't find anything. 

The other problem is the Network Adapter is somtimes loosing its connection with the internet.  When trying to get on the internet she sometimes gets a message that the computer can't make the connection.  There is a link on that page to run diagnostics.  Clicking on that link produces another page that gives her an opportunity to get the Network Adapter to connect.  When we click on that, the Network Adapter connects to the internet.  (Sorry I did not do any screen captures of that but I can if you need them.)  Once the Network Adapter connects, we are then able to use the internet. 

I appreciate your help with this case.  If there is anymore information you need let me know.

 

Thanks

Don

 

Attached Files



BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 39,225 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:38 AM

Posted 23 November 2013 - 11:00 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+
==============

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
thisisujrt.gif Please download
Junkware Removal Tool to your Desktop.
  • Please close your security software to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista or 7, right-mouse click it and select Run as administrator.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete, depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your Desktop and will automatically open.
  • Please post the contents of JRT.txt into your reply.
===

Please download ComboFix from any of the links below, and save it to your desktop. For information regarding this download, please visit this web page: Turorial
Link 1
Link 2

IMPORTANT !!! Save ComboFix.exe to your Desktop

1. Close any open browsers.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
3. Do not install any other programs until this if fixed.


How to : Disable Anti-virus and Firewall...
http://www.bleepingcomputer.com/forums/topic114351.html

Double click on ComboFix.exe and follow the prompts.
  • When finished, it will produce a report for you.
  • Please post the C:\ComboFix.txt
Note: Do not mouse click ComboFix's window while it's running. That may cause it to stall

Note: If you have difficulty properly disabling your protective programs, refer to this link --> http://www.bleepingcomputer.com/forums/topic114351.html

Note: If after running ComboFix you get this error message "Illegal operation attempted on a registry key that has been marked for deletion." when attempting to run a program all you need to do is restart the computer to reset the registry.
===

Please paste the logs in your next reply DO NOT ATTACH THEM.
Let me know what problem persists.

#3 ddibowski

ddibowski
  • Topic Starter

  • Members
  • 162 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:38 AM

Posted 25 November 2013 - 11:33 AM

nasdaq

Thanks for your reply.

I just shutdown the PC and started it again.  It did not have the RegSrv32 error and the the network adapter seemed to work without going through the steps I described in the case above.

I downloaded all scan programs to the desktop before I started. 

 

RougeKiller

I was suprised there was a folder called RK_Quarentine on the desktop.  In it there is 5 registry keys and two other files PhysicalDrive0_User.dat and RogueKiller.ini.  I assume this is normal. 

There were two logfiles created. They are below.

 

RogueKiller V8.7.9 [Nov 25 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.adlice.com/forum/
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version
Started in : Normal mode
User : Susan [Admin rights]
Mode : Scan -- Date : 11/25/2013 09:47:30
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 5 ¤¤¤
[RUN][SUSP PATH] HKCU\[...]\Run : Cpkics Update (regsvr32.exe C:\Users\Susan\AppData\Local\Cpkics\lbpmex.dll [x][-]) -> FOUND
[RUN][SUSP PATH] HKUS\S-1-5-21-1168805994-659560723-3161954433-1000\[...]\Run : Cpkics Update (regsvr32.exe C:\Users\Susan\AppData\Local\Cpkics\lbpmex.dll [x][-]) -> FOUND
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowPrinters (0) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
[Address] SSDT[13] : NtAlertResumeThread @ 0x822C8823 -> HOOKED (Unknown @ 0x87D5B9F8)
[Address] SSDT[14] : NtAlertThread @ 0x8224134F -> HOOKED (Unknown @ 0x87D5BA90)
[Address] SSDT[18] : NtAllocateVirtualMemory @ 0x8227D69D -> HOOKED (Unknown @ 0x87D5A4F0)
[Address] SSDT[21] : NtAlpcConnectPort @ 0x8221F8A7 -> HOOKED (Unknown @ 0x87CFEA00)
[Address] SSDT[42] : NtAssignProcessToJobObject @ 0x821F2B32 -> HOOKED (Unknown @ 0x87D5B470)
[Address] SSDT[67] : NtCreateMutant @ 0x82255993 -> HOOKED (Unknown @ 0x87D5B820)
[Address] SSDT[77] : NtCreateSymbolicLinkObject @ 0x821F5349 -> HOOKED (Unknown @ 0x87D5B268)
[Address] SSDT[78] : NtCreateThread @ 0x822C6E40 -> HOOKED (Unknown @ 0x87D1D4C0)
[Address] SSDT[116] : NtDebugActiveProcess @ 0x82299ED4 -> HOOKED (Unknown @ 0x87D5B508)
[Address] SSDT[129] : NtDuplicateObject @ 0x8222D579 -> HOOKED (Unknown @ 0x87D5A630)
[Address] SSDT[147] : NtFreeVirtualMemory @ 0x820B9E75 -> HOOKED (Unknown @ 0x87D5BF80)
[Address] SSDT[156] : NtImpersonateAnonymousToken @ 0x821EFF3F -> HOOKED (Unknown @ 0x87D5B8C8)
[Address] SSDT[158] : NtImpersonateThread @ 0x82205589 -> HOOKED (Unknown @ 0x87D5B960)
[Address] SSDT[165] : NtLoadDriver @ 0x821A0E12 -> HOOKED (Unknown @ 0x87CFB138)
[Address] SSDT[177] : NtMapViewOfSection @ 0x82245994 -> HOOKED (Unknown @ 0x87D5BEC8)
[Address] SSDT[184] : NtOpenEvent @ 0x8222EDF7 -> HOOKED (Unknown @ 0x87D5B788)
[Address] SSDT[194] : NtOpenProcess @ 0x8225612F -> HOOKED (Unknown @ 0x87D5A780)
[Address] SSDT[195] : NtOpenProcessToken @ 0x82236A58 -> HOOKED (Unknown @ 0x87D5A598)
[Address] SSDT[197] : NtOpenSection @ 0x8224678C -> HOOKED (Unknown @ 0x87D5B658)
[Address] SSDT[201] : NtOpenThread @ 0x8225162B -> HOOKED (Unknown @ 0x87D5A6D8)
[Address] SSDT[210] : NtProtectVirtualMemory @ 0x8224F3E2 -> HOOKED (Unknown @ 0x87D5B3C8)
[Address] SSDT[282] : NtResumeThread @ 0x82250C4A -> HOOKED (Unknown @ 0x87D5BB28)
[Address] SSDT[289] : NtSetContextThread @ 0x822C82CF -> HOOKED (Unknown @ 0x87D5BCF0)
[Address] SSDT[305] : NtSetInformationProcess @ 0x822499E6 -> HOOKED (Unknown @ 0x87D5BD88)
[Address] SSDT[317] : NtSetSystemInformation @ 0x8221BF1E -> HOOKED (Unknown @ 0x87D5B5A0)
[Address] SSDT[330] : NtSuspendProcess @ 0x822C875F -> HOOKED (Unknown @ 0x87D5B6F0)
[Address] SSDT[331] : NtSuspendThread @ 0x821CF945 -> HOOKED (Unknown @ 0x87D5BBC0)
[Address] SSDT[334] : NtTerminateProcess @ 0x8222616B -> HOOKED (Unknown @ 0x87D1D558)
[Address] SSDT[335] : unknown @ 0x82251660 -> HOOKED (Unknown @ 0x87D5BC58)
[Address] SSDT[348] : NtUnmapViewOfSection @ 0x82245C57 -> HOOKED (Unknown @ 0x87D5BE30)
[Address] SSDT[358] : NtWriteVirtualMemory @ 0x82242A27 -> HOOKED (Unknown @ 0x87D5A428)
[Address] SSDT[382] : NtCreateThreadEx @ 0x82251115 -> HOOKED (Unknown @ 0x87D5B310)
[Address] Shadow SSDT[317] : NtUserAttachThreadInput -> HOOKED (Unknown @ 0x887A6910)
[Address] Shadow SSDT[397] : NtUserGetAsyncKeyState -> HOOKED (Unknown @ 0x887388A0)
[Address] Shadow SSDT[428] : NtUserGetKeyboardState -> HOOKED (Unknown @ 0x88738828)
[Address] Shadow SSDT[430] : NtUserGetKeyState -> HOOKED (Unknown @ 0x8877D138)
[Address] Shadow SSDT[442] : NtUserGetRawInputData -> HOOKED (Unknown @ 0x8877FED8)
[Address] Shadow SSDT[479] : NtUserMessageCall -> HOOKED (Unknown @ 0x88715750)
[Address] Shadow SSDT[497] : NtUserPostMessage -> HOOKED (Unknown @ 0x887151E0)
[Address] Shadow SSDT[498] : NtUserPostThreadMessage -> HOOKED (Unknown @ 0x88715158)
[Address] Shadow SSDT[573] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x887A6F48)
[Address] Shadow SSDT[576] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x88780F08)
[Inline] EAT @explorer.exe (FwDoNothingOnObject) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36D18866)
[Inline] EAT @explorer.exe (FwEnableMemTracing) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36D18866)
[Inline] EAT @explorer.exe (FwSetMemLeakPolicy) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36D18866)

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts

127.0.0.1       localhost
::1             localhost

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) Hitachi HDT721032SLA SCSI Disk Device +++++
--- User ---
[MBR] ccb4c547bd51a67319399fa3fe818720
[BSP] c1b19546da1bc2cc6eaed12a866af2d9 : Acer MBR Code
Partition table:
0 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 2048 | Size: 13312 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 27265024 | Size: 291931 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

Finished : << RKreport[0]_S_11252013_094730.txt >>

 

RogueKiller V8.7.9 [Nov 25 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.adlice.com/forum/
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version
Started in : Normal mode
User : Susan [Admin rights]
Mode : Remove -- Date : 11/25/2013 09:48:03
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 5 ¤¤¤
[RUN][SUSP PATH] HKCU\[...]\Run : Cpkics Update (regsvr32.exe C:\Users\Susan\AppData\Local\Cpkics\lbpmex.dll [x][-]) -> DELETED
[RUN][SUSP PATH] HKUS\S-1-5-21-1168805994-659560723-3161954433-1000\[...]\Run : Cpkics Update (regsvr32.exe C:\Users\Susan\AppData\Local\Cpkics\lbpmex.dll [x][-]) -> [0x2] The system cannot find the file specified.
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowPrinters (0) -> REPLACED (1)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
[Address] SSDT[13] : NtAlertResumeThread @ 0x822C8823 -> HOOKED (Unknown @ 0x87D5B9F8)
[Address] SSDT[14] : NtAlertThread @ 0x8224134F -> HOOKED (Unknown @ 0x87D5BA90)
[Address] SSDT[18] : NtAllocateVirtualMemory @ 0x8227D69D -> HOOKED (Unknown @ 0x87D5A4F0)
[Address] SSDT[21] : NtAlpcConnectPort @ 0x8221F8A7 -> HOOKED (Unknown @ 0x87CFEA00)
[Address] SSDT[42] : NtAssignProcessToJobObject @ 0x821F2B32 -> HOOKED (Unknown @ 0x87D5B470)
[Address] SSDT[67] : NtCreateMutant @ 0x82255993 -> HOOKED (Unknown @ 0x87D5B820)
[Address] SSDT[77] : NtCreateSymbolicLinkObject @ 0x821F5349 -> HOOKED (Unknown @ 0x87D5B268)
[Address] SSDT[78] : NtCreateThread @ 0x822C6E40 -> HOOKED (Unknown @ 0x87D1D4C0)
[Address] SSDT[116] : NtDebugActiveProcess @ 0x82299ED4 -> HOOKED (Unknown @ 0x87D5B508)
[Address] SSDT[129] : NtDuplicateObject @ 0x8222D579 -> HOOKED (Unknown @ 0x87D5A630)
[Address] SSDT[147] : NtFreeVirtualMemory @ 0x820B9E75 -> HOOKED (Unknown @ 0x87D5BF80)
[Address] SSDT[156] : NtImpersonateAnonymousToken @ 0x821EFF3F -> HOOKED (Unknown @ 0x87D5B8C8)
[Address] SSDT[158] : NtImpersonateThread @ 0x82205589 -> HOOKED (Unknown @ 0x87D5B960)
[Address] SSDT[165] : NtLoadDriver @ 0x821A0E12 -> HOOKED (Unknown @ 0x87CFB138)
[Address] SSDT[177] : NtMapViewOfSection @ 0x82245994 -> HOOKED (Unknown @ 0x87D5BEC8)
[Address] SSDT[184] : NtOpenEvent @ 0x8222EDF7 -> HOOKED (Unknown @ 0x87D5B788)
[Address] SSDT[194] : NtOpenProcess @ 0x8225612F -> HOOKED (Unknown @ 0x87D5A780)
[Address] SSDT[195] : NtOpenProcessToken @ 0x82236A58 -> HOOKED (Unknown @ 0x87D5A598)
[Address] SSDT[197] : NtOpenSection @ 0x8224678C -> HOOKED (Unknown @ 0x87D5B658)
[Address] SSDT[201] : NtOpenThread @ 0x8225162B -> HOOKED (Unknown @ 0x87D5A6D8)
[Address] SSDT[210] : NtProtectVirtualMemory @ 0x8224F3E2 -> HOOKED (Unknown @ 0x87D5B3C8)
[Address] SSDT[282] : NtResumeThread @ 0x82250C4A -> HOOKED (Unknown @ 0x87D5BB28)
[Address] SSDT[289] : NtSetContextThread @ 0x822C82CF -> HOOKED (Unknown @ 0x87D5BCF0)
[Address] SSDT[305] : NtSetInformationProcess @ 0x822499E6 -> HOOKED (Unknown @ 0x87D5BD88)
[Address] SSDT[317] : NtSetSystemInformation @ 0x8221BF1E -> HOOKED (Unknown @ 0x87D5B5A0)
[Address] SSDT[330] : NtSuspendProcess @ 0x822C875F -> HOOKED (Unknown @ 0x87D5B6F0)
[Address] SSDT[331] : NtSuspendThread @ 0x821CF945 -> HOOKED (Unknown @ 0x87D5BBC0)
[Address] SSDT[334] : NtTerminateProcess @ 0x8222616B -> HOOKED (Unknown @ 0x87D1D558)
[Address] SSDT[335] : unknown @ 0x82251660 -> HOOKED (Unknown @ 0x87D5BC58)
[Address] SSDT[348] : NtUnmapViewOfSection @ 0x82245C57 -> HOOKED (Unknown @ 0x87D5BE30)
[Address] SSDT[358] : NtWriteVirtualMemory @ 0x82242A27 -> HOOKED (Unknown @ 0x87D5A428)
[Address] SSDT[382] : NtCreateThreadEx @ 0x82251115 -> HOOKED (Unknown @ 0x87D5B310)
[Address] Shadow SSDT[317] : NtUserAttachThreadInput -> HOOKED (Unknown @ 0x887A6910)
[Address] Shadow SSDT[397] : NtUserGetAsyncKeyState -> HOOKED (Unknown @ 0x887388A0)
[Address] Shadow SSDT[428] : NtUserGetKeyboardState -> HOOKED (Unknown @ 0x88738828)
[Address] Shadow SSDT[430] : NtUserGetKeyState -> HOOKED (Unknown @ 0x8877D138)
[Address] Shadow SSDT[442] : NtUserGetRawInputData -> HOOKED (Unknown @ 0x8877FED8)
[Address] Shadow SSDT[479] : NtUserMessageCall -> HOOKED (Unknown @ 0x88715750)
[Address] Shadow SSDT[497] : NtUserPostMessage -> HOOKED (Unknown @ 0x887151E0)
[Address] Shadow SSDT[498] : NtUserPostThreadMessage -> HOOKED (Unknown @ 0x88715158)
[Address] Shadow SSDT[573] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x887A6F48)
[Address] Shadow SSDT[576] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x88780F08)
[Inline] EAT @explorer.exe (FwDoNothingOnObject) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36D18866)
[Inline] EAT @explorer.exe (FwEnableMemTracing) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36D18866)
[Inline] EAT @explorer.exe (FwSetMemLeakPolicy) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36D18866)

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts

127.0.0.1       localhost
::1             localhost

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) Hitachi HDT721032SLA SCSI Disk Device +++++
--- User ---
[MBR] ccb4c547bd51a67319399fa3fe818720
[BSP] c1b19546da1bc2cc6eaed12a866af2d9 : Acer MBR Code
Partition table:
0 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 2048 | Size: 13312 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 27265024 | Size: 291931 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

Finished : << RKreport[0]_D_11252013_094803.txt >>
RKreport[0]_S_11252013_094730.txt

 

When I ran AdwCleaner, I wasn't watching closley.  When I looked at it the scan button was gray and there were no items in the lower panel.  After waiting a few minutes, I closed it and ran it as administrator (although the instructions did not indicate to do so, I figured it would be okay to try that.)  I watched it run more closely and saw it go through the steps.  But again there was nothing in the lower panel - there was nothing to check.  I decided to click the clean button anyway.  It eventually rebooted and produced this log.  I was expecting it to be empty but it gave me this log.

# AdwCleaner v3.013 - Report created 25/11/2013 at 10:14:01
# Updated 24/11/2013 by Xplode
# Operating System : Windows Vista ™ Home Premium Service Pack 2 (32 bits)
# Username : Susan - SUSANOLLIERS-PC
# Running from : C:\Users\Susan\Desktop\adwcleaner.exe
# Option : Clean

***** [ Services ] *****

***** [ Files / Folders ] *****

Folder Deleted : C:\Program Files\StartNow Toolbar
Folder Deleted : C:\Users\Susan\AppData\Local\iac
Folder Deleted : C:\Users\Susan\AppData\LocalLow\iac
File Deleted : C:\Users\Public\Desktop\eBay.lnk

***** [ Shortcuts ] *****

***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Classes\AppID\Toolbar.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\ToolbarBroker.EXE
Key Deleted : HKLM\SOFTWARE\Classes\AppID\WLXQuickTimeShellExt.DLL
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho.1
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.BandObject
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.BandObject.1
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.ToolbarHelperObject
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.ToolbarHelperObject.1
Key Deleted : HKLM\SOFTWARE\Classes\ZGClnt.Mngr
Key Deleted : HKLM\SOFTWARE\Classes\ZGClnt.Mngr.1
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{0A18A436-2A7A-49F3-A488-30538A2F6323}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{7E8A36EA-2501-4ED3-A3C8-CFA9143FB169}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{FAA8C612-F1B6-461B-8B60-B54D74D9642E}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{007EFBDF-8A5D-4930-97CC-A4B437CBA777}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{2CBD2A57-2FD5-4F1A-9FC8-90ED48FA4187}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{5911488E-9D1E-40EC-8CBB-06B231CC153F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6E13D095-45C3-4271-9475-F3B48227DD9F}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{1C888195-0160-4883-91B7-294C0CE2F277}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{99ACA0F7-D864-45CB-8C40-FD42A077E7CA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E65F40C8-3CEB-47C2-9E01-BF73323DF4E7}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{38BF9661-BDA0-4A74-BB3B-576EC7AE16DC}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{6857AC4A-95B4-4E2C-B2D2-8A235FCCEF4A}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6E13D095-45C3-4271-9475-F3B48227DD9F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{0BDF6C42-132C-45F5-92DE-DC13F40C6DAB}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{23B38049-323F-443D-9732-F454E5B15B72}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5911488E-9D1E-40EC-8CBB-06B231CC153F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6E13D095-45C3-4271-9475-F3B48227DD9F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{5911488E-9D1E-40EC-8CBB-06B231CC153F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{6E13D095-45C3-4271-9475-F3B48227DD9F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{2CBD2A57-2FD5-4F1A-9FC8-90ED48FA4187}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{09971CEE-01B8-42BC-9D91-456B1FAAD6BE}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{67A2568C-7A0A-4EED-AECC-B5405DE63B64}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFBCB7E0-F91A-4951-9F31-58FEE57A25C4}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{09971CEE-01B8-42BC-9D91-456B1FAAD6BE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{67A2568C-7A0A-4EED-AECC-B5405DE63B64}
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{5911488E-9D1E-40EC-8CBB-06B231CC153F}]
Key Deleted : HKCU\Software\FLEXnet
Key Deleted : HKCU\Software\StartNow Toolbar
Key Deleted : HKCU\Software\Zugo
Key Deleted : HKCU\Software\AppDataLow\Software\iWon
Key Deleted : HKLM\Software\StartNow Toolbar
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\StartNow Toolbar
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\StartNow Toolbar
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\08121C32A9C319F4CB0C11FF059552A4

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16520

-\\ Google Chrome v

[ File : C:\Users\Susan\AppData\Local\Google\Chrome\User Data\Default\preferences ]

*************************

AdwCleaner[R0].txt - [5103 octets] - [25/11/2013 09:56:20]
AdwCleaner[R1].txt - [5163 octets] - [25/11/2013 10:09:34]
AdwCleaner[S0].txt - [5196 octets] - [25/11/2013 10:14:01]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [5256 octets] ##########

 

 

Here is the JRT log

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.8 (11.05.2013:1)
OS: Windows Vista ™ Home Premium x86
Ran by Susan on Mon 11/25/2013 at 10:22:04.44
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

~~~ Services

 

~~~ Registry Values

 

~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{4623A8C4-150D-4983-8982-68C01E7D6541}

 

~~~ Files

 

~~~ Folders

Successfully deleted: [Folder] "C:\Program Files\coupons"
Successfully deleted: [Folder] "C:\Program Files\recipehub_2jei"

 

~~~ Event Viewer Logs were cleared

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Mon 11/25/2013 at 10:27:09.51
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Here is the ComboFix log

ComboFix 13-11-23.02 - Susan 11/25/2013  10:40:45.1.1 - x86
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.2814.1844 [GMT -5:00]
Running from: c:\users\Susan\Desktop\ComboFix.exe
AV: Norton 360 *Disabled/Updated* {63DF5164-9100-186D-2187-8DC619EFD8BF}
FW: Norton 360 *Disabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}
SP: Norton 360 *Enabled/Updated* {D8BEB080-B73A-17E3-1B37-B6B462689202}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\wininit.ini
.
.
(((((((((((((((((((((((((   Files Created from 2013-10-25 to 2013-11-25  )))))))))))))))))))))))))))))))
.
.
2013-11-25 15:50 . 2013-11-25 15:50 -------- d-----w- c:\users\Susan\AppData\Local\temp
2013-11-25 15:22 . 2013-11-25 15:22 -------- d-----w- c:\windows\ERUNT
2013-11-25 14:55 . 2013-11-25 15:14 -------- d-----w- C:\AdwCleaner
2013-11-22 16:05 . 2013-11-22 16:05 -------- d-----w- c:\programdata\Oracle
2013-11-22 16:04 . 2013-11-22 16:04 94632 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2013-11-22 15:20 . 2013-11-22 15:20 -------- d-----r- c:\users\Susan\AppData\Roaming\Brother
2013-11-14 18:48 . 2013-11-14 18:48 -------- d-----w- c:\program files\Macrovision Corporation
2013-11-14 14:40 . 2013-11-14 14:40 -------- d-----w- c:\users\Susan\AppData\Roaming\Malwarebytes
2013-11-14 14:38 . 2013-11-14 14:38 -------- d-----w- c:\programdata\Malwarebytes
2013-11-13 12:50 . 2013-10-03 12:45 993792 ----a-w- c:\windows\system32\crypt32.dll
2013-11-13 12:36 . 2013-10-11 02:08 444928 ----a-w- c:\windows\system32\IKEEXT.DLL
2013-11-13 12:36 . 2013-10-11 02:07 596480 ----a-w- c:\windows\system32\FWPUCLNT.DLL
2013-11-13 12:24 . 2013-10-03 12:45 297984 ----a-w- c:\windows\system32\gdi32.dll
2013-11-03 19:46 . 2013-11-14 18:59 -------- d-----w- c:\users\Susan\AppData\Local\Cpkics
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-11-05 22:18 . 2011-08-04 23:30 86888 ----a-w- c:\windows\system32\LMIRfsClientNP.dll
2013-11-05 22:18 . 2011-08-04 23:30 53064 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\LMIproc.dll
2013-11-05 22:18 . 2011-08-04 23:30 31560 ----a-w- c:\windows\system32\LMIport.dll
2013-11-05 22:18 . 2011-08-04 23:30 85832 ----a-w- c:\windows\system32\LMIinit.dll
2013-08-29 07:36 . 2013-10-11 21:58 2050048 ----a-w- c:\windows\system32\win32k.sys
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2013-11-22 39408]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RtHDVCpl.exe" [2005-12-25 6793760]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
"LogMeIn GUI"="c:\program files\LogMeIn\x86\LogMeInSystray.exe" [2011-01-11 63048]
"Skytel"="c:\program files\Realtek\Audio\HDA\Skytel.exe" [2005-12-25 1833504]
"ControlCenter4"="c:\program files\ControlCenter4\BrCcBoot.exe" [2011-04-20 139264]
"BrStsMon00"="c:\program files\Browny02\Brother\BrStMonW.exe" [2011-05-19 2629632]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-07-02 254336]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Ink Monitor]
2001-10-16 18:10 258118 ----a-w- c:\program files\EPSON\Ink Monitor\InkMonitor.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\msnmsgr]
2008-12-03 05:41 3882312 ----a-w- c:\program files\Windows Live\Messenger\msnmsgr.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ    FontCache
.
Contents of the 'Scheduled Tasks' folder
.
2013-11-25 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-11-22 14:52]
.
2013-11-25 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-11-22 14:52]
.
.
------- Supplementary Scan -------
.
mStart Page = hxxp://homepage.emachines.com/rdr.aspx?b=ACEW&l=0409&s=1&o=vp32&d=0807&m=el1310
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.200.1 192.168.200.1
.
- - - - ORPHANS REMOVED - - - -
.
HKLM-Run-eRecoveryService - (no file)
SafeBoot-WudfPf
SafeBoot-WudfRd
MSConfigStartUp-StartNowToolbarHelper - c:\program files\StartNow Toolbar\ToolbarHelper.exe
AddRemove-Coupon Printer for Windows5.0.0.1 - c:\program files\Coupons\uninstall.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-11-25 10:50
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\N360]
"ImagePath"="\"c:\program files\Norton 360\Engine\20.4.0.40\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files\Norton 360\Engine\20.4.0.40\diMaster.dll\" /prefetch:1"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2013-11-25  10:52:54
ComboFix-quarantined-files.txt  2013-11-25 15:52
.
Pre-Run: 225,875,353,600 bytes free
Post-Run: 225,858,375,680 bytes free
.
- - End Of File - - 42083CDE3A16129E16885A143B2E55FF
EF932EAA6EF4C94E66A7F6CEEC7EB422
 

Thanks for your help on this.  Like I said the RegSrv32 window did not come up.  And the one time I got into IE, it opened without any messages.  I will ask my friend to continue using it the next few days to see if she experiences the problem anymore or any new problems.

 

Thanks for looking at this.

Don



#4 nasdaq

nasdaq

  • Malware Response Team
  • 39,225 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:38 AM

Posted 25 November 2013 - 01:18 PM

The logs are clean.

If all is well:

Time for some housekeeping
  • The following will implement some cleanup procedures as well as reset System Restore points:
  • Click Start > Run and copy/paste the following bold text into the Run box and click OK:
  • ComboFix /Uninstall
===


Please consider using these ideas to help secure your computer. While there is no way to guarantee safety when you use a computer, these steps will make it much less likely that you will need to endure another infection. While we really like to help people, we would rather help you protect yourself so that you won't need that help in the future.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates or get into the habit of checking Windows Update regularly. They usually have security updates every month. You can set Windows to notify you of Updates so that you can choose, but only do this if you believe you are able to understand which ones are needed. This is a crucial security measure.

Having an effective antivirus is a must for everyone.
In addition to many excellent commercial products there are plenty of good free antivirus programs available. I can recommend:

If you are satisfied with your current protection programs you can ignore the instructions on Antivirus or Firewall listed below.In addition to an antivirus I recommend using a firewall. A software firewall is a software program that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. I can recommend one of the following free products:Please note: Many installer offer third-party downloads that are installed automatically when you do not uncheck certain checkboxes. While most of the time not being malicious you usually do not want these on your computer. Be careful during the installation process and you will avoid seeing tons of new unwanted toolbars in your favorite web browser.

Please consider installing and running some of the following programs; they are either free or have free versions of commercial programs:

Malwarebytes Anti-Malware (MBAM)
The free version of MBAM can be used to scan the system for traces of malware. Scanning your system regularly will make it harder for malware to reside on your system.
A tutorial on using MBAM can be found here.
Please Note: Only the paid for version has real time capabilities.

SpywareBlaster
A tutorial on using SpywareBlaster to prevent malware from ever installing on your computer may be found here.

Please keep these programs up-to-date and run them whenever you suspect a problem to prevent malware problems. A number of programs have resident protection and it is a good idea to run the resident protection of one of each type of program to maintain protection. However, it is important to run only one resident program of each type since they can conflict and become less effective. That means only one antivirus, firewall and scanning anti-spyware program at a time. Passive protectors, like SpywareBlaster can be run with any of them.

Note that there are a lot of rogue programs out there that want to scare you into giving them your money and some malware actually claims to be security programs. If you get a popup for a security program that you did not install yourself, do NOT click on it and ask for help immediately. It is very important to run an antivirus and firewall, but you can't always rely on reviews and ads for information. Ask in a security forum that you trust if you are not sure. If you are unsure and looking for anti-spyware programs, you can find out if it is a rogue here:A similar category of programs is now called "scareware." Scareware programs are active infections that will pop-up on your computer and tell you that you are infected. If you look closely, it will usually have a name that looks like it might be legitimate, but it is NOT one of the programs you installed. It tells you to click and install it right away. If you click on any part of it, including the 'X' to close it, you may actually help it infect your computer further. Keeping protection updated and running resident protection can help prevent these infections. If it happens anyway, get offline as quickly as you can. Pull the internet connection cable or shut down the computer if you have to. Contact someone to help by using another computer if possible. These programs are also sometimes called 'rogues', but they are different than the older version of rogues mentioned above.

Please keep your programs up to date. This applies to Java, Adobe Flashplayer, Adobe Reader and your Internet Browsers in particular. Vulnerabilities in these programs are often exploited in order to install malware on your PC. Visiting a prepared web page suffices to infect your system.

In general Firefox, Opera and Google Chrome are considered to be more secure than Internet Explorer. In addition there are many useful addons that can protect you from possible risks:
  • WOT will warn you when you try to visit sites with poor reputation. The reputation is based on user ratings and is usually very accurate.
  • Script Blocker can help blocking many attempts to infect your system via malicious websites by only allowing scripts at sites you trust.
  • NoScript is a popular Firefox addon,
  • ScriptNo a popular Google Chrome addon.
For much more useful information, please also read Tony Klein's excellent article: How did I get infected in the first place

Hopefully these steps will help to keep you error free. If you run into more difficulty, we will certainly do what we can to help.
===

#5 ddibowski

ddibowski
  • Topic Starter

  • Members
  • 162 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:38 AM

Posted 25 November 2013 - 03:11 PM

What is the best way get rid of the other .exe's I copied to the desktop?  I noticed an Uninstall option on at least two of them when they were running the scans.  Is it necessary to open and uninstall them or are they just files on the desktop and can be deleted?   

 

I'll tell my freind that everything looks good on your end and do the cleanup in the next day or so. 

 

She and I had discussed already using one of the free anti virus softwares.  She has been paying for Norton.  So I think she will want to change that soon.

 

I noticed you didn't mention Windows Firewall.  I have been running Windows Firewall on my own PC.  Is that adequate or is there some reason I shouldn't be using it?

 

Thanks for you help

Don



#6 ddibowski

ddibowski
  • Topic Starter

  • Members
  • 162 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:38 AM

Posted 25 November 2013 - 08:40 PM

Nasdac

 

My friend just called and said she had to go through the steps to reconnect the network adapter.  This was her first chance to use it since I left today.  So I guess I have some more work to do. 

 

Any idea why this is happening?  It really did work this morning before I left. 

 

Thanks

Don



#7 nasdaq

nasdaq

  • Malware Response Team
  • 39,225 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:38 AM

Posted 26 November 2013 - 09:11 AM

What is the best way get rid of the other .exe's I copied to the desktop?

If these are files we installed while cleaning the computer they can be deleted.

===


We recommend having a Firewall, your Windows Firewall is ok.

#8 ddibowski

ddibowski
  • Topic Starter

  • Members
  • 162 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:38 AM

Posted 26 November 2013 - 10:47 AM

nasdac

 

Just to be clear, I can just delete RougeKiller.exe, AdwCleaner.exe, and JRT.exe from the desktop.  No uninstalls are necessary for these (just ComboFix as you described before)?

 

Did you see the second post? We are still having trouble with the connection to the internet.  She had to go through the steps described in my original case to get the network adapter to connect.

 

I realize that is probably not related to a virus since we have a clean PC.  Is that something you can help us with?

 

Thanks

Don



#9 nasdaq

nasdaq

  • Malware Response Team
  • 39,225 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:38 AM

Posted 26 November 2013 - 11:32 AM


If you execute AdwCleaner.exe you will have an option to remove it.

JRT.exe just delete the files on your Desktop.

There is not arm to keep these tools and run them when you have too many pop-ups.
===

Did you see the second post? We are still having trouble with the connection to the internet. She had to go through the steps described in my original case to get the network adapter to connect.

Please download MiniToolBox to Desktop and run it.

Check mark the following boxes:

  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • Click Go and copy/paste the log (Result.txt) into your next post.
  • [b]Note: When using "Reset FF Proxy Settings" option Firefox should be closed.
If that fails to keep the connection ative then it would be best if you could start a new topic in the Networking forum
http://www.bleepingcomputer.com/forums/forum21.html

This is not my domain.

#10 ddibowski

ddibowski
  • Topic Starter

  • Members
  • 162 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:38 AM

Posted 27 November 2013 - 11:57 AM

nasdac

 

I ran MiniToolBox.  This is the log that was produced:

MiniToolBox by Farbar  Version: 13-07-2013
Ran by Susan (administrator) on 27-11-2013 at 10:42:16
Running from "C:\Users\Susan\Desktop"
Microsoft® Windows Vista™ Home Premium  Service Pack 2 (X86)
Boot Mode: Normal
***************************************************************************

========================= Flush DNS: ===================================

Windows IP Configuration

Could not flush the DNS Resolver Cache: Function failed during execution.

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.

**** End of log ****

 

I noticed we still have the problem.  When I showed up this morning, before I ran the MiniToolBox, I "woke" the the PC from Sleep mode.  There was a message which I had seen on occasion while working on this PC - Symantic Service Framework stopped working and was closed. 

 

I ran the MiniToolBox.  Rebooted the PC I was able to connect to the internet normally.  I decided to reserach the message above and it led me to updating the Norton software.  I restarted the PC as a result of that.  The internet conrtinued to work normally. 

 

I decided it may have to do with putting it in sleep mode.  I let it sleep for about 10 minutes.  When I woke it, I had the problem with the network adapter.  I had to go through the steps to get it connected. 

 

I am going to open a call in the network forum.  I really appreciate your help on this. 

 

One final question is do think this problem was caused by the virus or it is just a coincidence that it showed at this time?

 

Thanks for you help with this. 

Don



#11 nasdaq

nasdaq

  • Malware Response Team
  • 39,225 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:38 AM

Posted 27 November 2013 - 01:39 PM

One final question is do think this problem was caused by the virus or it is just a coincidence that it showed at this time?

Unable to tell.

Please run the DDS tool one more time and post the log.
I want to compare it to your first post.

p.s.
I have Norton 360 on this HP computer.
I only shut off the display and it's working well.

#12 ddibowski

ddibowski
  • Topic Starter

  • Members
  • 162 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:38 AM

Posted 27 November 2013 - 04:08 PM

nasdac

 

I am away from my firiend's PC for now.  It will be at least Fri before I can get back there to run the DDS.  I'll post the log when I do.

 

Even though you just power down the monitor, wouldn't the computer just put itself to "Sleep" based on the settings in Control Panel > Power Options > Change when the computer sleeps.?  I think (and this isn't based on any real knowledge I have, just my guess at how I think it works) clicking on the Sleep button on the Start Menu just invokes the Sleep Process imediately.  

 

I am not sure what is in her Control Panel > Power Options > Edit Sleep Options.  But changing it to Never may be a solution if it turns out Sleeping is the problem and the Network group does not come up with something better. 

 

Here is the link to my Network case is case you want to follow it.  They had me run the MiniToolBox with everything checked for the original post

http://www.bleepingcomputer.com/forums/t/515582/network-adapter-not-connected/

 

Thanks for your help

Don



#13 nasdaq

nasdaq

  • Malware Response Team
  • 39,225 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:38 AM

Posted 28 November 2013 - 08:37 AM

Control Panel > Power Options > Change when the computer sleeps.?

All I have set is "Turn off the display" 5 mins when on the battery and 15 min. on power.

The other options are set to never.

Make sure you click the Save Change button.

Restart the computer and test it. (just move the mouse cursor when the display is turned off.)

#14 ddibowski

ddibowski
  • Topic Starter

  • Members
  • 162 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:38 AM

Posted 29 November 2013 - 10:39 AM

nasdac

 

I ran the dds tool and have attached the results to this entry.

 

I looked a the power options.  Hers too was set too Never on Put the computer to sleep.  Turn off the display was set to 15 minutes.  I will instruct her to not click the Sleep on the start button and see if she continues to have the problem. 

 

Thanks for your help

Don

Attached Files



#15 nasdaq

nasdaq

  • Malware Response Team
  • 39,225 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:38 AM

Posted 29 November 2013 - 01:35 PM

Your logs are clean.

Remove these old version of Java using the Add/Remove programs.
Java™ 6 Update 22
Java™ 6 Update 5





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users