Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Help, I have the FBI/Police Ransom Virus on my Laptop


  • This topic is locked This topic is locked
3 replies to this topic

#1 gwhitfi

gwhitfi

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:01:43 PM

Posted 21 January 2014 - 08:45 PM

I gave my laptop to my roommate a year or so ago, and when he moved out he left it and I was going to start it up and use it again.  Unfortunately, it has the FBI/Police ransom virus on it.  When I start windows normally it gets to the desktop, then the screen goes black, the webcam comes on and I get the usual virus screen.  When I try to start up in safemode (normal, networking or w/ command prompt) it automatically restarts as soon as it gets to the desktop, so I can't do anything from there.

 

 

I ran Farbar Recovery Scan Tool and received this log:

 

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 21-01-2014
Ran by SYSTEM on MINWINPC on 21-01-2014 20:21:02
Running from F:\
Windows Vista ™ Home Premium Service Pack 1 (X64) OS Language: English(US)
Internet Explorer Version 7
Boot Mode: Recovery

The current controlset is ControlSet001
ATTENTION!:=====> If the system is bootable FRST could be run from normal or Safe mode to create a complete log.


The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Registry (Whitelisted) ==================

HKLM\...\Run: [] - [x]
HKLM-x32\...\Run: [EEventManager] - C:\Program Files (x86)\Epson Software\Event Manager\EEventManager.exe [669520 2009-01-12] (SEIKO EPSON CORPORATION)
HKLM-x32\...\Run: [FUFAXSTM] - C:\Program Files (x86)\Epson Software\FAX Utility\FUFAXSTM.exe [843776 2009-02-05] (SEIKO EPSON CORPORATION)
HKLM-x32\...\Run: [WinampAgent] - "C:\Program Files (x86)\Winamp\winampa.exe"
HKLM-x32\...\Run: [IObitBar Browser Plugin Loader] - C:\Program Files (x86)\IObitBar\toolbar\1.bin\i0brmon.exe [20480 2010-07-21] (IObit)
HKLM-x32\...\Run: [HP Software Update] - C:\Program Files (x86)\HP\HP Software Update\HPWuSchd2.exe [49152 2007-10-14] (Hewlett-Packard)
HKLM-x32\...\Run: [hpqSRMon] - C:\Program Files (x86)\HP\Digital Imaging\bin\hpqSRMon.exe [80896 2007-08-22] (Hewlett-Packard)
HKLM-x32\...\Run: [DivXUpdate] - C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe [1164584 2010-09-16] ()
HKLM-x32\...\Run: [AppleSyncNotifier] - C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleSyncNotifier.exe [58656 2011-04-20] (Apple Inc.)
HKLM-x32\...\Run: [QuickTime Task] - C:\Program Files (x86)\QuickTime\QTTask.exe [421888 2010-11-29] (Apple Inc.)
HKLM-x32\...\Run: [iTunesHelper] - C:\Program Files (x86)\iTunes\iTunesHelper.exe [421736 2011-07-19] (Apple Inc.)
HKLM-x32\...\Run: [SunJavaUpdateSched] - C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe [254696 2011-06-09] (Sun Microsystems, Inc.)
HKLM-x32\...\Run: [TkBellExe] - c:\program files (x86)\real\realplayer\Update\realsched.exe [295072 2013-01-04] (RealNetworks, Inc.)
Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation)
HKU\Default\...\Run: [WindowsWelcomeCenter] - rundll32.exe oobefldr.dll,ShowWelcomeCenter
HKU\Default User\...\Run: [WindowsWelcomeCenter] - rundll32.exe oobefldr.dll,ShowWelcomeCenter
HKU\Justin\...\Run: [WorkForce 610(Network)] - C:\Windows\system32\spool\DRIVERS\x64\3\E_IATIFJA.EXE [223232 2009-01-25] (SEIKO EPSON CORPORATION)
HKU\Justin\...\Run: [googletalk] - C:\Users\Justin\AppData\Roaming\Google\Google Talk\googletalk.exe [3739648 2007-01-01] (Google)
HKU\Justin\...\Run: [SpybotSD TeaTimer] - C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe [2144088 2009-01-26] (Safer Networking Limited)
HKU\Justin\...\Run: [DAEMON Tools Pro Agent] - C:\Program Files (x86)\DAEMON Tools Pro\DTAgent.exe [427328 2010-04-15] (DT Soft Ltd)
HKU\Justin\...\Run: [Steam] - C:\Program Files (x86)\Steam\Steam.exe [1354736 2012-12-20] (Valve Corporation)
HKU\Justin\...\Run: [Adobe CS Manager] - C:\Users\Justin\AppData\Roaming\9c1b82d3-ced1-47ac-97eb-cc88913ba9a779\cbdcedacebccbaa.exe
HKU\Justin\...\Run: [OpenOffice.org] - C:\Users\Justin\AppData\Roaming\BDDB96\BDDB96.exe
HKU\Justin\...\Run: [Ubotc] - C:\Users\Justin\AppData\Roaming\Gylyub\ydru.exe
HKU\Justin\...\CurrentVersion\Windows: [Load] C:\Users\Justin\LOCALS~1\Temp\msvmooxvi.pif <===== ATTENTION
HKU\Justin\...\Winlogon: [Shell] explorer.exe,C:\Users\Justin\AppData\Roaming\skype.dat [47104 2010-10-15] () <==== ATTENTION
Startup: C:\Users\Justin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epson all-in-one Registration.lnk
ShortcutTarget: Epson all-in-one Registration.lnk ->  (No File)
Startup: C:\Users\Justin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OpenOffice.org 3.1.lnk
ShortcutTarget: OpenOffice.org 3.1.lnk -> C:\Program Files (x86)\OpenOffice.org 3\program\quickstart.exe ()
Startup: C:\Users\Justin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PdaNet Desktop.lnk
ShortcutTarget: PdaNet Desktop.lnk -> C:\Program Files (x86)\PdaNet for iPhone\PdaNetPC.exe ()

==================== Services (Whitelisted) =================

S2 camsvc; C:\Program Files (x86)\TOSHIBA\TOSHIBA Web Camera Application\TWebCameraSrv.exe [20544 2009-04-16] (TOSHIBA)
S2 IObitBarService; C:\Program Files (x86)\IObitBar\toolbar\1.bin\i0barsvc.exe [28766 2010-07-21] (IObit)
S2 PCPitstop Scheduling; C:\Program Files (x86)\PCPitstop\PCPitstopScheduleService.exe [90352 2009-04-26] (PC Pitstop LLC)
S2 PnkBstrA; C:\Windows\SysWOW64\PnkBstrA.exe [75064 2010-10-31] ()
S2 RealNetworks Downloader Resolver Service; C:\Program Files (x86)\RealNetworks\RealDownloader\rndlresolversvc.exe [38608 2012-11-29] ()
S2 SBSDWSCService; C:\Program Files (x86)\Spybot - Search & Destroy\SDWinSec.exe [1153368 2009-01-26] (Safer Networking Ltd.)
S2 TNaviSrv; C:\Program Files (x86)\TOSHIBA\TOSHIBA DVD PLAYER\TNaviSrv.exe [83312 2009-03-30] (TOSHIBA Corporation)
S2 Viewpoint Manager Service; C:\Program Files (x86)\Viewpoint\Common\ViewpointService.exe [24652 2007-01-04] (Viewpoint Corporation)

==================== Drivers (Whitelisted) ====================

S3 NWUSBModem; C:\Windows\System32\DRIVERS\nwusbmdm.sys [213120 2008-05-09] (Novatel Wireless Inc.)
S3 NWUSBPort; C:\Windows\System32\DRIVERS\nwusbser.sys [213120 2008-05-09] (Novatel Wireless Inc.)
S3 NWUSBPort2; C:\Windows\System32\DRIVERS\nwusbser2.sys [213120 2008-05-09] (Novatel Wireless Inc.)
S3 SMSIVZAM5X64; C:\Program Files (x86)\Verizon Wireless\VZAccess Manager\SMSIVZAM5X64.sys [43032 2009-03-20] (Smith Micro Inc.)
S0 sptd; C:\Windows\System32\Drivers\sptd.sys [828912 2010-07-20] (Duplex Secure Ltd.)
S3 IpInIp; system32\DRIVERS\ipinip.sys [x]
S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [x]
S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [x]
S0x01000000 papycpu; \SystemRoot\system32\drivers\papycpu.sys [x]
S0x01000000 papyjoy; \SystemRoot\system32\drivers\papyjoy.sys [x]

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2014-01-21 20:20 - 2014-01-21 20:20 - 00000000 ____D C:\FRST

==================== One Month Modified Files and Folders =======

2014-01-21 20:20 - 2014-01-21 20:20 - 00000000 ____D C:\FRST
2014-01-21 16:06 - 2010-02-05 13:26 - 00000894 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2014-01-21 16:05 - 2006-11-02 07:42 - 00000006 ____H C:\Windows\Tasks\SA.DAT
2014-01-21 16:05 - 2006-11-02 07:22 - 00003616 ____H C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2014-01-21 16:05 - 2006-11-02 07:22 - 00003616 ____H C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2014-01-21 15:49 - 2006-11-02 07:42 - 00032568 _____ C:\Windows\Tasks\SCHEDLGU.TXT
2014-01-21 15:36 - 2013-01-25 15:12 - 00000004 _____ C:\Users\Justin\AppData\Roaming\skype.ini
2014-01-21 15:10 - 2010-07-03 13:28 - 00000000 ____D C:\ProgramData\PCPitstop

ZeroAccess:
C:\$Recycle.Bin\S-1-5-21-2209945049-3539941562-1186619252-1000\$c75d2e208295c66ce7dbdd1ad177b5eb

Files to move or delete:
====================
C:\Users\Justin\AppData\Roaming\skype.dat
C:\Users\Justin\AppData\Roaming\skype.ini
C:\ProgramData\gvjq.exe
C:\ProgramData\ms02BADB2F.dat
C:\ProgramData\okqp.exe
C:\ProgramData\phxzbypky.exe
C:\ProgramData\qqng.exe
C:\ProgramData\rbwd.exe


Some content of TEMP:
====================
C:\Users\Justin\AppData\Local\Temp\1jfuweif.exe
C:\Users\Justin\AppData\Local\Temp\2jfuweif.exe
C:\Users\Justin\AppData\Local\Temp\67YrlvB.exe
C:\Users\Justin\AppData\Local\Temp\firefoxjre_exe.exe
C:\Users\Justin\AppData\Local\Temp\fp_pl_pfs_installer.exe
C:\Users\Justin\AppData\Local\Temp\InstallFlashPlayer.exe
C:\Users\Justin\AppData\Local\Temp\lowproc.exe
C:\Users\Justin\AppData\Local\Temp\setup.exe


==================== Known DLLs (Whitelisted) ================


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\rpcss.dll
[2009-07-29 15:08] - [2009-03-02 20:57] - 0718336 ____A (Microsoft Corporation) 52CDADE8289FF21F1F2215FF51A5F36C

 ATTENTION ======> If the system is having audio adware rpcss.dll is patched. Google the MD5, if the MD5 is unique the file is infected.
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points  =========================

Restore point made on: 2013-01-11 07:45:32
Restore point made on: 2013-01-11 19:57:15
Restore point made on: 2013-01-12 21:37:39
Restore point made on: 2013-01-14 22:42:54
Restore point made on: 2013-01-15 16:02:42
Restore point made on: 2013-01-16 21:28:01
Restore point made on: 2013-01-18 02:52:10
Restore point made on: 2013-01-18 21:00:04
Restore point made on: 2013-01-21 19:13:48
Restore point made on: 2013-01-21 23:14:28

==================== Memory info ===========================

Percentage of memory in use: 14%
Total physical RAM: 3963.05 MB
Available physical RAM: 3393.49 MB
Total Pagefile: 3714.91 MB
Available Pagefile: 3372.56 MB
Total Virtual: 8192 MB
Available Virtual: 8191.9 MB

==================== Drives ================================

Drive c: (TI100343V0F) (Fixed) (Total:286.38 GB) (Free:110.83 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
Drive e: (TOSHIBA SYSTEM VOLUME) (Fixed) (Total:1.46 GB) (Free:1.31 GB) NTFS
Drive f: () (Fixed) (Total:7.45 GB) (Free:7.45 GB) FAT32
Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or Vista) (Size: 298 GB) (Disk ID: CC4608EA)
Partition 1: (Not Active) - (Size=1 GB) - (Type=27)
Partition 2: (Active) - (Size=286 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=10 GB) - (Type=17)

========================================================
Disk: 1 (Size: 7 GB) (Disk ID: 3D857041)
Partition 1: (Not Active) - (Size=7 GB) - (Type=0B)


LastRegBack: 2013-01-27 16:19

==================== End Of Log ============================

 

Help would be appreciated

Attached Files

  • Attached File  FRST.txt   11.26KB   0 downloads


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:43 PM

Posted 22 January 2014 - 12:41 AM


Hello gwhitfi

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt

 
HKU\Justin\...\Run: [Adobe CS Manager] - C:\Users\Justin\AppData\Roaming\9c1b82d3-ced1-47ac-97eb-cc88913ba9a779\cbdcedacebccbaa.exe
HKU\Justin\...\Run: [Ubotc] - C:\Users\Justin\AppData\Roaming\Gylyub\ydru.exe
HKU\Justin\...\CurrentVersion\Windows: [Load] C:\Users\Justin\LOCALS~1\Temp\msvmooxvi.pif <===== ATTENTION
HKU\Justin\...\Winlogon: [Shell] explorer.exe,C:\Users\Justin\AppData\Roaming\skype.dat [47104 2010-10-15] () <==== ATTENTION
C:\$Recycle.Bin\S-1-5-21-2209945049-3539941562-1186619252-1000\$c75d2e208295c66ce7dbdd1ad177b5eb
C:\Users\Justin\AppData\Roaming\skype.dat
C:\Users\Justin\AppData\Roaming\skype.ini
C:\ProgramData\gvjq.exe
C:\ProgramData\ms02BADB2F.dat
C:\ProgramData\okqp.exe
C:\ProgramData\phxzbypky.exe
C:\ProgramData\qqng.exe
C:\ProgramData\rbwd.exe
C:\Users\Justin\AppData\Local\Temp\1jfuweif.exe
C:\Users\Justin\AppData\Local\Temp\2jfuweif.exe
C:\Users\Justin\AppData\Local\Temp\67YrlvB.exe
C:\Users\Justin\AppData\Local\Temp\firefoxjre_exe.exe
C:\Users\Justin\AppData\Local\Temp\fp_pl_pfs_installer.exe
C:\Users\Justin\AppData\Local\Temp\InstallFlashPlayer.exe
C:\Users\Justin\AppData\Local\Temp\lowproc.exe
C:\Users\Justin\AppData\Local\Temp\setup.exe
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:43 PM

Posted 27 January 2014 - 09:26 PM


Hello

48 Hour bump

It has been more than 48 hours since my last post.
  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:43 PM

Posted 30 January 2014 - 03:35 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users