Jump to content

Misdirected on Firefox


baaa

Recommended Posts

My homepage is set to Google. However, when I open Firefox, or redirect to my homepage, I receive the following error message from Comodo Trust Online -- "Sorry, "www.s.com" does not exist or could not be found" . See attached file.

When I open a new tab in Firefox I am misdirected to Hao 123.

I have run Malware, Commodo, and Spybot to remove malware yet the problem persists.

Please help cause it's really bugging me!

hao123-ท่องเน็ตสะดวกปลอดภัย.htm

Desktop.zip

Link to post
Share on other sites

  • Staff

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your malware problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us


  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.

    [*]Please do not attach logs or use code boxes, just copy and paste the text.

    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.

    [*]Please read every post completely before doing anything.

    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.

    [*]Please provide feedback about your experience as we go.

    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.

NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-

  • Download Security Check by screen317 from
here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

-AdwCleaner-

  • Please download
AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[s1].txt as well.

--RogueKiller--

  • Download & SAVE to your Desktop RogueKiller or from here
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+

Gringo

Link to post
Share on other sites

  • Staff

Greetings

I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools

Gringo

Link to post
Share on other sites

Hello Gringo,

I have run the programs you clearly instructed. Logs are pasted below.

Both problems persist.

Results of screen317's Security Check version 0.99.56

Windows 7 Service Pack 1 x64 (UAC is enabled)

Internet Explorer 9

``````````````Antivirus/Firewall Check:``````````````

Windows Firewall Disabled!

COMODO Antivirus

Antivirus up to date!

`````````Anti-malware/Other Utilities Check:`````````

Spybot - Search & Destroy

Malwarebytes Anti-Malware version 1.65.1.1000

Adobe Flash Player 11.5.502.135

Adobe Reader 10.1.4 Adobe Reader out of Date!

Mozilla Firefox (17.0.1)

Mozilla Thunderbird (17.0.)

Google Chrome 20.0.1132.47

Google Chrome 22.0.1229.79

Google Chrome 22.0.1229.92

Google Chrome 22.0.1229.94

````````Process Check: objlist.exe by Laurent````````

Spybot Teatimer.exe is disabled!

Comodo Firewall cmdagent.exe

Comodo Firewall cfp.exe

Malwarebytes' Anti-Malware mbamscheduler.exe

`````````````````System Health check`````````````````

Total Fragmentation on Drive C: 0%

````````````````````End of Log``````````````````````

# AdwCleaner v2.101 - Logfile created 12/21/2012 at 09:15:12

# Updated 16/12/2012 by Xplode

# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)

# User : smart - HOME

# Boot Mode : Normal

# Running from : C:\Users\smart\Downloads\adwcleaner.exe

# Option [Delete]

***** [services] *****

***** [Files / Folders] *****

File Deleted : \END

Folder Deleted : C:\Program Files (x86)\Conduit

Folder Deleted : C:\Program Files (x86)\Hotspot_Shield

Folder Deleted : C:\Program Files (x86)\Mozilla Firefox\Extensions\afurladvisor@anchorfree.com

Folder Deleted : C:\Program Files (x86)\Vuze_Remote

Folder Deleted : C:\Users\smart\AppData\Local\Conduit

Folder Deleted : C:\Users\smart\AppData\LocalLow\Conduit

Folder Deleted : C:\Users\smart\AppData\LocalLow\Hotspot_Shield

Folder Deleted : C:\Users\smart\AppData\LocalLow\PriceGong

Folder Deleted : C:\Users\smart\AppData\LocalLow\Vuze_Remote

***** [Registry] *****

Key Deleted : HKCU\Software\AppDataLow\Software\Conduit

Key Deleted : HKCU\Software\AppDataLow\Software\PriceGong

Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar

Key Deleted : HKCU\Software\AppDataLow\Software\Vuze_Remote

Key Deleted : HKCU\Software\AppDataLow\Toolbar

Key Deleted : HKCU\Software\Conduit

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BA14329E-9550-4989-B3F2-9732E92D17CC}

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{BA14329E-9550-4989-B3F2-9732E92D17CC}

Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}

Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap

Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT2504091

Key Deleted : HKLM\Software\Conduit

Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{E30ED111-BD63-48C2-A6CB-AB3C9FFFB07C}

Key Deleted : HKLM\Software\Vuze_Remote

Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}

Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{BA14329E-9550-4989-B3F2-9732E92D17CC}

Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{E30ED111-BD63-48C2-A6CB-AB3C9FFFB07C}

Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{867C8CA8-92DF-45D4-BB79-E4C94D81FA45}

Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A6D9C8B1-342A-4339-853E-41AF75200DA5}

Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BA14329E-9550-4989-B3F2-9732E92D17CC}

Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Vuze_Remote Toolbar

Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{BA14329E-9550-4989-B3F2-9732E92D17CC}]

Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D4027C7F-154A-4066-A1AD-4243D8127440}]

Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{BA14329E-9550-4989-B3F2-9732E92D17CC}]

Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks [{BA14329E-9550-4989-B3F2-9732E92D17CC}]

Value Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar [{BA14329E-9550-4989-B3F2-9732E92D17CC}]

***** [internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16457

[OK] Registry is clean.

-\\ Mozilla Firefox v17.0.1 (en-US)

Profile name : default

File : C:\Users\smart\AppData\Roaming\Mozilla\Firefox\Profiles\6kvsh3lr.default\prefs.js

Deleted : user_pref("CT2504091_Firefox.csv", "[{\"from\":\"Abs Layer\",\"action\":\"loading toolbar\",\"time\"[...]

Deleted : user_pref("Smartbar.ConduitHomepagesList", "");

Deleted : user_pref("Smartbar.ConduitSearchEngineList", "");

Deleted : user_pref("Smartbar.ConduitSearchUrlList", "");

Deleted : user_pref("Smartbar.SearchFromAddressBarSavedUrl", "hxxp://search.babylon.com/?affID=114218&tt=4412_[...]

Deleted : user_pref("Smartbar.keywordURLSelectedCTID", "CT2504091");

Deleted : user_pref("browser.search.defaultenginename", "Search the web (Babylon)");

Deleted : user_pref("browser.search.order.1", "Search the web (Babylon)");

Deleted : user_pref("extensions.BabylonToolbar_i.newTab", true);

Deleted : user_pref("extensions.BabylonToolbar_i.newTabUrl", "hxxp://th.hao123.com/?tn=bbl_hp_hao123_th&babsrc[...]

Deleted : user_pref("keyword.URL", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2504091&SearchSource=2&q=[...]

-\\ Google Chrome v22.0.1229.94

File : C:\Users\smart\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[s1].txt - [4674 octets] - [21/12/2012 09:15:12]

########## EOF - C:\AdwCleaner[s1].txt - [4734 octets] ##########

RogueKiller V8.4.0 [Dec 14 2012] by Tigzy

mail : tigzyRK<at>gmail<dot>com

Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/

Website : http://tigzy.geekstogo.com/roguekiller.php

Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version

Started in : Normal mode

User : smart [Admin rights]

Mode : Scan -- Date : 12/21/2012 09:22:32

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 8 ¤¤¤

[DNS] HKLM\[...]\ControlSet001\Services\Interfaces\{1E378A71-B192-4D75-A1FA-683CCD6DA9B5} : NameServer (8.26.56.26,156.154.70.22) -> FOUND

[DNS] HKLM\[...]\ControlSet001\Services\Interfaces\{B744C010-787D-4DCF-B48C-BA72349F83E4} : NameServer (8.26.56.26,156.154.70.22) -> FOUND

[DNS] HKLM\[...]\ControlSet002\Services\Interfaces\{1E378A71-B192-4D75-A1FA-683CCD6DA9B5} : NameServer (8.26.56.26,156.154.70.22) -> FOUND

[DNS] HKLM\[...]\ControlSet002\Services\Interfaces\{B744C010-787D-4DCF-B48C-BA72349F83E4} : NameServer (8.26.56.26,156.154.70.22) -> FOUND

[HJ DESK] HKCU\[...]\ClassicStartMenu : {59031A47-3F72-44A7-89C5-5595FE6B30EE} (1) -> FOUND

[HJ DESK] HKCU\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND

[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND

[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤

--> C:\Windows\system32\drivers\etc\hosts

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: Hitachi HDS721075CLA332 ATA Device +++++

--- User ---

[MBR] 49301bef0ac0f346d46076502448076d

[bSP] e55280b6f3e7116f230f66ad249f713b : MBR Code unknown

Partition table:

0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo

1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 156007 Mo

2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 319709565 | Size: 559286 Mo

User = LL1 ... OK!

User = LL2 ... OK!

Finished : << RKreport[1]_S_12212012_02d0922.txt >>

RKreport[1]_S_12212012_02d0922.txt

Link to post
Share on other sites

  • Staff

Hello

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.

Link 1
Link 2
Link 3

1. Close any open browsers or any other programs that are open.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.

When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

Link to post
Share on other sites

  • Staff

Greetings

I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools

Gringo

Link to post
Share on other sites

Happy Holidays,

I have followed your instructions - closing security software and open windows -- however after I run combofix I can not find any evidence of a log. When I run the program a window opens, its runs through several processes, another window opens with three levels/processes and then the program ends. I have tried to run it, as an administrator, several times, each following a restart. Please advise.

Link to post
Share on other sites

  • Staff

Greetings

I want you to run these next,

Please download the latest version of TDSSKiller from here and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Please download aswMBR to your desktop.

  • Double click the aswMBR.exe icon to run it
  • it will ask to download extra definitions - ALLOW IT
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and aswMBR

Gringo

Link to post
Share on other sites

Hello,

The TDS log is too long to post according to the website, so I have attached it. The aswMBR is below - I ran the default quickscan. I am re-running the scan on the C drive now, and will post it upon completion. Should I scan all drives?

aswMBR version 0.9.9.1707 Copyright© 2011 AVAST Software

Run date: 2012-12-27 12:01:52

-----------------------------

12:01:52.043 OS Version: Windows x64 6.1.7601 Service Pack 1

12:01:52.043 Number of processors: 4 586 0x1E05

12:01:52.043 ComputerName: HOME UserName:

12:01:53.681 Initialize success

12:14:49.361 AVAST engine defs: 12122601

12:19:52.126 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0

12:19:52.126 Disk 0 Vendor: Hitachi_HDS721075CLA332 JP3OA3BF Size: 715404MB BusType: 11

12:19:52.142 Disk 0 MBR read successfully

12:19:52.142 Disk 0 MBR scan

12:19:52.173 Disk 0 unknown MBR code

12:19:52.189 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 2048

12:19:52.204 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 156007 MB offset 206848

12:19:52.235 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 559286 MB offset 319709565

12:19:52.298 Disk 0 scanning C:\Windows\system32\drivers

12:20:02.375 Service scanning

12:20:26.961 Modules scanning

12:20:26.977 Disk 0 trace - called modules:

12:20:26.992 ntoskrnl.exe fltsrv.sys tdrpman.sys CLASSPNP.SYS disk.sys vsflt67.sys ACPI.sys ataport.SYS PCIIDEX.SYS hal.dll msahci.sys

12:20:27.507 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa8004b90060]

12:20:27.507 3 CLASSPNP.SYS[fffff88001b5a43f] -> nt!IofCallDriver -> [0xfffffa8004a31890]

12:20:27.523 5 vsflt67.sys[fffff88000c457cd] -> nt!IofCallDriver -> [0xfffffa800489f1e0]

12:20:27.538 7 ACPI.sys[fffff88000d8b7a1] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-0[0xfffffa80048a5060]

12:20:29.551 AVAST engine scan C:\Windows

12:20:33.123 AVAST engine scan C:\Windows\system32

12:24:37.473 AVAST engine scan C:\Windows\system32\drivers

12:24:50.951 AVAST engine scan C:\Users\smart

12:27:33.238 AVAST engine scan C:\ProgramData

12:29:15.595 Scan finished successfully

12:35:23.865 Disk 0 MBR has been saved successfully to "C:\Users\smart\Desktop\MBR.dat"

12:35:23.880 The log file has been saved successfully to "C:\Users\smart\Desktop\aswMBR.txt"

TDS Killer.txt

Link to post
Share on other sites

C Drive Log

aswMBR version 0.9.9.1707 Copyright© 2011 AVAST Software

Run date: 2012-12-27 12:37:44

-----------------------------

12:37:44.663 OS Version: Windows x64 6.1.7601 Service Pack 1

12:37:44.663 Number of processors: 4 586 0x1E05

12:37:44.663 ComputerName: HOME UserName:

12:37:45.662 Initialize success

12:37:53.134 AVAST engine defs: 12122601

12:37:59.983 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0

12:37:59.983 Disk 0 Vendor: Hitachi_HDS721075CLA332 JP3OA3BF Size: 715404MB BusType: 11

12:38:00.029 Disk 0 MBR read successfully

12:38:00.029 Disk 0 MBR scan

12:38:00.029 Disk 0 unknown MBR code

12:38:00.045 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 2048

12:38:00.061 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 156007 MB offset 206848

12:38:00.076 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 559286 MB offset 319709565

12:38:00.139 Disk 0 scanning C:\Windows\system32\drivers

12:38:12.041 Service scanning

12:38:35.613 Modules scanning

12:38:35.613 Disk 0 trace - called modules:

12:38:35.629 ntoskrnl.exe fltsrv.sys tdrpman.sys CLASSPNP.SYS disk.sys vsflt67.sys ACPI.sys ataport.SYS PCIIDEX.SYS hal.dll msahci.sys

12:38:35.629 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa8004b90060]

12:38:35.629 3 CLASSPNP.SYS[fffff88001b5a43f] -> nt!IofCallDriver -> [0xfffffa8004a31890]

12:38:35.629 5 vsflt67.sys[fffff88000c457cd] -> nt!IofCallDriver -> [0xfffffa800489f1e0]

12:38:35.629 7 ACPI.sys[fffff88000d8b7a1] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-0[0xfffffa80048a5060]

12:38:36.565 AVAST engine scan C:\

14:02:44.472 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\0354F060-3048-4289-9ED1-6FEAED1C0B7E.data **HIDDEN**

14:02:45.018 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\05C68FB4-B8C2-404E-9068-38BA3BB2218E.data **HIDDEN**

14:02:45.627 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\0C4526B4-AB17-430D-8A1A-36210167FDFB.data **HIDDEN**

14:02:46.204 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\12E58126-E2FD-4BD7-823E-897CD17A9C12.data **HIDDEN**

14:04:08.779 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\1C58C0FA-3B56-4B49-BA9D-641914062824.data **HIDDEN**

14:04:16.459 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\3AECB3AE-2284-457B-8F78-8139D2D70EDF.data **HIDDEN**

14:04:20.109 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\3D61A0BD-B8FE-4C3E-B0B8-5F6BA20C7F6E.data **HIDDEN**

14:04:20.671 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\44D242FF-E39C-4DF8-BE2C-03F4F67D7239.data **HIDDEN**

14:04:21.045 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\4ACD889F-20E8-402A-AC8E-2BB1EB7EA63C.data **HIDDEN**

14:04:21.420 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\4B7B0DF7-DB4F-4DB8-A8D7-64D10F045C85.data **HIDDEN**

14:04:24.758 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\4D5A02CD-3DF8-44E0-BE6E-4F09A5466536.data **HIDDEN**

14:04:25.257 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\52C9518B-5E43-4B17-A4C5-98CF7B89AA1C.data **HIDDEN**

14:04:25.679 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\583BFF90-8FC7-429C-9919-EB9C5D7F8AFC.data **HIDDEN**

14:04:25.944 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\5EB3C577-9149-4186-814D-61AC09224D45.data **HIDDEN**

14:04:26.365 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\692DC887-96AA-4164-9CD8-07DE9C6FF69C.data **HIDDEN**

14:04:29.828 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\764A8982-5BB7-4BBA-BD3E-6A4A1C77180D.data **HIDDEN**

14:04:30.343 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\83B55A7D-0CB5-447A-B93D-B9357A31614E.data **HIDDEN**

14:04:30.593 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\9BBBA086-66DD-475A-B894-C22B6EB77398.data **HIDDEN**

14:04:30.920 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\A52155A0-D962-46B1-BF7F-C7C952004A91.data **HIDDEN**

14:04:31.217 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\BB49CA78-68DF-4F56-8275-0BFD688BA5CD.data **HIDDEN**

14:04:31.841 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\CE31E377-2290-4518-8722-D1B35D65B965.data **HIDDEN**

14:04:32.137 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\EBD38452-0F83-4910-9CA4-F571A72FDB28.data **HIDDEN**

14:04:35.507 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\ED4F1C02-8BBB-493E-8780-709349DF3353.data **HIDDEN**

14:04:36.084 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\F4E45CC2-2ACF-4A65-B40C-5D361FF1607F.data **HIDDEN**

14:04:39.641 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\F808AADB-07B0-43D1-9A8B-9C260CE0DF66.data **HIDDEN**

14:04:40.077 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\F862424C-7273-4722-B4B0-0D5230293ED0.data **HIDDEN**

14:04:40.514 File: C:\Program Files\COMODO\COMODO Internet Security\Quarantine\FF5B72ED-FC30-418F-9BB0-693CD739A322.data **HIDDEN**

14:04:41.138 Scan finished successfully

15:10:19.797 Disk 0 MBR has been saved successfully to "C:\Users\smart\Desktop\MBR.dat"

15:10:19.797 The log file has been saved successfully to "C:\Users\smart\Desktop\aswMBR2.txt"

Link to post
Share on other sites

This is the data drive log

aswMBR version 0.9.9.1707 Copyright© 2011 AVAST Software

Run date: 2012-12-27 15:12:30

-----------------------------

15:12:30.745 OS Version: Windows x64 6.1.7601 Service Pack 1

15:12:30.745 Number of processors: 4 586 0x1E05

15:12:30.745 ComputerName: HOME UserName:

15:12:31.619 Initialize success

15:12:39.216 AVAST engine defs: 12122601

15:12:49.762 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0

15:12:49.777 Disk 0 Vendor: Hitachi_HDS721075CLA332 JP3OA3BF Size: 715404MB BusType: 11

15:12:49.793 Disk 0 MBR read successfully

15:12:49.809 Disk 0 MBR scan

15:12:49.809 Disk 0 unknown MBR code

15:12:49.855 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 2048

15:12:49.871 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 156007 MB offset 206848

15:12:49.902 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 559286 MB offset 319709565

15:12:49.965 Disk 0 scanning C:\Windows\system32\drivers

15:13:11.898 Service scanning

15:13:38.902 Modules scanning

15:13:38.902 Disk 0 trace - called modules:

15:13:38.917 ntoskrnl.exe fltsrv.sys tdrpman.sys CLASSPNP.SYS disk.sys vsflt67.sys ACPI.sys ataport.SYS PCIIDEX.SYS hal.dll msahci.sys

15:13:38.917 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa8004b90060]

15:13:38.917 3 CLASSPNP.SYS[fffff88001b5a43f] -> nt!IofCallDriver -> [0xfffffa8004a31890]

15:13:38.917 5 vsflt67.sys[fffff88000c457cd] -> nt!IofCallDriver -> [0xfffffa800489f1e0]

15:13:38.917 7 ACPI.sys[fffff88000d8b7a1] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-0[0xfffffa80048a5060]

15:13:40.368 AVAST engine scan G:\

17:16:21.112 Disk 0 MBR has been saved successfully to "C:\Users\smart\Desktop\MBR.dat"

17:16:21.112 The log file has been saved successfully to "C:\Users\smart\Desktop\aswMBRD.txt

Link to post
Share on other sites

  • Staff

Hello

I want you to try this for firefox and give me a quick update to how things are

I want you to reset firefox back to defaults, to do this I need you to do this

  • At the top of the Firefox window, click the "Firefox" button,
  • go over to the "Help" sub-menu
    • (on Windows XP, click the Help menu at the top of the Firefox window) and select "Troubleshooting Information".

[*]Click the "Reset Firefox" button in the upper-right corner of the Troubleshooting Information page.

[*]click "Reset Firefox" in the confirmation window that opens.

[*]Firefox will close and be reset. When it's done. Click "Finish" and Firefox will open.

restart the computer and check firefox for me now

Gringo

Link to post
Share on other sites

  • Staff

Greetings

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

 ClearJavaCache:: 

Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe

CFScriptB-4.gif

This will let ComboFix run again.

Restart if you have to.

Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  1. report from Combofix
  2. let me know of any problems you may have had
  3. How is the computer doing now after running the script?

Gringo

Link to post
Share on other sites

Here you are:

ComboFix 12-12-27.03 - smart 12/28/2012 9:57.1.4 - x64

Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.4055.2217 [GMT 7:00]

Running from: c:\users\smart\Desktop\ComboFix.exe

Command switches used :: c:\users\smart\Desktop\CFScript.txt

AV: COMODO Antivirus *Enabled/Updated* {458BB331-2324-0753-3D5F-1472EB102AC0}

FW: COMODO Firewall *Enabled* {7DB03214-694B-060B-1600-BD4715C36DBB}

SP: COMODO Defense+ *Enabled/Updated* {FEEA52D5-051E-08DD-07EF-2F009097607D}

SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

* Created a new restore point

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\users\smart\AppData\Local\Microsoft\Windows\Temporary Internet Files\{AA86149F-6D66-4982-B274-D0114651BDCE}.xps

c:\windows\wininit.ini

.

.

((((((((((((((((((((((((( Files Created from 2012-11-28 to 2012-12-28 )))))))))))))))))))))))))))))))

.

.

2012-12-28 03:08 . 2012-12-28 03:08 -------- d-----w- c:\users\Default\AppData\Local\temp

2012-12-28 03:02 . 2012-12-28 03:02 76232 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{BBBECB78-28BD-4579-BC39-3F7CF8C4D9AF}\offreg.dll

2012-12-26 14:35 . 2012-12-26 14:35 -------- d-----w- c:\program files\7-Zip

2012-12-26 09:40 . 2012-12-26 09:40 -------- d-----w- C:\BlackBerryDesktop

2012-12-25 07:07 . 2012-11-08 17:24 9125352 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{BBBECB78-28BD-4579-BC39-3F7CF8C4D9AF}\mpengine.dll

2012-12-21 03:29 . 2012-12-16 17:11 46080 ----a-w- c:\windows\system32\atmlib.dll

2012-12-21 03:29 . 2012-12-16 14:45 367616 ----a-w- c:\windows\system32\atmfd.dll

2012-12-21 03:29 . 2012-12-16 14:13 295424 ----a-w- c:\windows\SysWow64\atmfd.dll

2012-12-21 03:29 . 2012-12-16 14:13 34304 ----a-w- c:\windows\SysWow64\atmlib.dll

2012-12-13 14:15 . 2012-12-13 14:15 -------- d-----w- c:\users\smart\AppData\Roaming\PC-FAX TX

2012-12-13 04:08 . 2012-11-09 05:45 2048 ----a-w- c:\windows\system32\tzres.dll

2012-12-13 04:08 . 2012-11-09 04:42 2048 ----a-w- c:\windows\SysWow64\tzres.dll

2012-12-13 03:41 . 2012-11-22 03:26 3149824 ----a-w- c:\windows\system32\win32k.sys

2012-12-13 03:40 . 2012-11-02 05:59 478208 ----a-w- c:\windows\system32\dpnet.dll

2012-12-13 03:40 . 2012-11-02 05:11 376832 ----a-w- c:\windows\SysWow64\dpnet.dll

2012-12-05 09:24 . 2012-12-06 02:15 -------- d-----w- c:\program files (x86)\Mozilla Thunderbird

2012-12-01 03:26 . 2012-12-01 03:37 -------- d-----w- c:\users\smart\AppData\Roaming\Raptr

2012-12-01 03:26 . 2012-12-01 03:34 -------- d-----w- c:\program files (x86)\Raptr

2012-11-29 02:48 . 2004-03-08 17:00 212240 ----a-w- c:\windows\SysWow64\RICHTX32.OCX

2012-11-29 02:48 . 2012-11-29 02:48 -------- d-----w- c:\program files (x86)\Kernel Outlook PST Viewer

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2012-12-13 15:14 . 2012-06-30 20:18 67413224 ----a-w- c:\windows\system32\MRT.exe

2012-12-12 15:06 . 2012-07-01 23:30 73656 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl

2012-12-12 15:06 . 2012-07-01 23:30 697272 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe

2012-10-16 08:38 . 2012-11-28 23:59 135168 ----a-w- c:\windows\apppatch\AppPatch64\AcXtrnal.dll

2012-10-16 08:38 . 2012-11-28 23:59 350208 ----a-w- c:\windows\apppatch\AppPatch64\AcLayers.dll

2012-10-16 07:39 . 2012-11-28 23:59 561664 ----a-w- c:\windows\apppatch\AcLayers.dll

2012-10-11 13:35 . 2012-10-11 13:35 47016 ----a-w- c:\windows\system32\AcSignIcon.dll

2012-10-11 13:35 . 2012-10-11 13:35 435624 ----a-w- c:\windows\system32\AcSignOpt.exe

2012-10-11 13:35 . 2012-10-11 13:35 35240 ----a-w- c:\windows\system32\AcSignExt.dll

2012-10-11 13:35 . 2012-10-11 13:35 94208 ----a-w- c:\windows\SysWow64\msstkprp.dll

2012-10-11 13:34 . 2012-10-11 13:34 2312616 ----a-w- c:\windows\system32\plotman.cpl

2012-10-11 13:34 . 2012-10-11 13:34 16808 ----a-w- c:\windows\system32\AcSignExtRes.dll

2012-10-09 18:17 . 2012-11-14 20:40 55296 ----a-w- c:\windows\system32\dhcpcsvc6.dll

2012-10-09 18:17 . 2012-11-14 20:40 226816 ----a-w- c:\windows\system32\dhcpcore6.dll

2012-10-09 17:40 . 2012-11-14 20:40 44032 ----a-w- c:\windows\SysWow64\dhcpcsvc6.dll

2012-10-09 17:40 . 2012-11-14 20:40 193536 ----a-w- c:\windows\SysWow64\dhcpcore6.dll

2012-10-04 16:40 . 2012-12-13 04:21 44032 ----a-w- c:\windows\apppatch\acwow64.dll

2012-10-03 17:56 . 2012-11-14 21:29 1914248 ----a-w- c:\windows\system32\drivers\tcpip.sys

2012-10-03 17:44 . 2012-11-14 21:29 70656 ----a-w- c:\windows\system32\nlaapi.dll

2012-10-03 17:44 . 2012-11-14 21:29 303104 ----a-w- c:\windows\system32\nlasvc.dll

2012-10-03 17:44 . 2012-11-14 21:29 246272 ----a-w- c:\windows\system32\netcorehc.dll

2012-10-03 17:44 . 2012-11-14 21:29 18944 ----a-w- c:\windows\system32\netevent.dll

2012-10-03 17:44 . 2012-11-14 21:29 216576 ----a-w- c:\windows\system32\ncsi.dll

2012-10-03 17:42 . 2012-11-14 21:29 569344 ----a-w- c:\windows\system32\iphlpsvc.dll

2012-10-03 16:42 . 2012-11-14 21:29 18944 ----a-w- c:\windows\SysWow64\netevent.dll

2012-10-03 16:42 . 2012-11-14 21:29 175104 ----a-w- c:\windows\SysWow64\netcorehc.dll

2012-10-03 16:42 . 2012-11-14 21:29 156672 ----a-w- c:\windows\SysWow64\ncsi.dll

2012-10-03 16:07 . 2012-11-14 21:29 45568 ----a-w- c:\windows\system32\drivers\tcpipreg.sys

2012-09-29 12:54 . 2012-06-30 18:51 25928 ----a-w- c:\windows\system32\drivers\mbam.sys

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt1]

@="{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}"

[HKEY_CLASSES_ROOT\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}]

2012-06-30 04:19 94208 ----a-w- c:\users\smart\AppData\Roaming\Dropbox\bin\DropboxExt.14.dll

.

[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt2]

@="{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}"

[HKEY_CLASSES_ROOT\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}]

2012-06-30 04:19 94208 ----a-w- c:\users\smart\AppData\Roaming\Dropbox\bin\DropboxExt.14.dll

.

[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt3]

@="{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}"

[HKEY_CLASSES_ROOT\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}]

2012-06-30 04:19 94208 ----a-w- c:\users\smart\AppData\Roaming\Dropbox\bin\DropboxExt.14.dll

.

[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt4]

@="{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}"

[HKEY_CLASSES_ROOT\CLSID\{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}]

2012-06-30 04:19 94208 ----a-w- c:\users\smart\AppData\Roaming\Dropbox\bin\DropboxExt.14.dll

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Skype"="c:\program files (x86)\Skype\Phone\Skype.exe" [2012-06-14 17424048]

"HPAdvisorDock"="c:\program files (x86)\Hewlett-Packard\HP Advisor\DOCK\HPAdvisorDock.exe" [2010-09-28 1715768]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]

"TrueImageMonitor.exe"="c:\program files (x86)\Acronis\TrueImageHome\TrueImageMonitor.exe" [2012-04-27 5955000]

"PPort12reminder"="c:\program files (x86)\Nuance\PaperPort\Ereg\Ereg.exe" [2010-02-09 328992]

"PaperPort PTD"="c:\program files (x86)\Nuance\PaperPort\pptd40nt.exe" [2010-03-08 29984]

"IndexSearch"="c:\program files (x86)\Nuance\PaperPort\IndexSearch.exe" [2010-03-08 46368]

"ControlCenter4"="c:\program files (x86)\ControlCenter4\BrCcBoot.exe" [2011-04-20 139264]

"BrStsMon00"="c:\program files (x86)\Browny02\Brother\BrStMonW.exe" [2010-12-23 2629632]

"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-27 919008]

"AcronisTimounterMonitor"="c:\program files (x86)\Acronis\TrueImageHome\TimounterMonitor.exe" [2012-04-27 1171304]

"RIMBBLaunchAgent.exe"="c:\program files (x86)\Common Files\Research In Motion\USB Drivers\RIMBBLaunchAgent.exe" [2011-11-01 90448]

.

c:\users\smart\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\

Dropbox.lnk - c:\users\smart\AppData\Roaming\Dropbox\bin\Dropbox.exe [2012-8-27 26924984]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"ConsentPromptBehaviorAdmin"= 5 (0x5)

"ConsentPromptBehaviorUser"= 3 (0x3)

"EnableUIADesktopToggle"= 0 (0x0)

"EnableLinkedConnections"= 1 (0x1)

.

[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]

"LoadAppInit_DLLs"=1 (0x1)

"AppInit_DLLs"=c:\windows\SysWOW64\guard32.dll

.

R1 SBRE;SBRE;c:\windows\system32\drivers\SBREdrv.sys [x]

R2 CLKMSVC10_C6F09094;CyberLink Product - 2012/07/01 11:51;c:\program files (x86)\Hewlett-Packard\Media\DVD\Kernel\HDDVD\NavFilter\kmsvc.exe [2011-03-22 241648]

R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]

R2 MBAMService;MBAMService;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2012-09-29 676936]

R2 SBSDWSCService;SBSD Security Center Service;c:\program files (x86)\Spybot - Search & Destroy\SDWinSec.exe [2009-01-26 1153368]

R3 epmntdrv;epmntdrv;c:\windows\system32\epmntdrv.sys [2011-07-29 16776]

R3 EuGdiDrv;EuGdiDrv;c:\windows\system32\EuGdiDrv.sys [2011-07-29 9096]

R3 LVRS64;Logitech RightSound Filter Driver;c:\windows\system32\DRIVERS\lvrs64.sys [2012-01-17 351136]

R3 LVUVC64;Logitech Webcam 500(UVC);c:\windows\system32\DRIVERS\lvuvc64.sys [2012-01-17 4865568]

R3 PSMounter;Macrium Reflect Image Explorer Service;c:\windows\system32\drivers\psmounter.sys [2012-06-12 57536]

R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-21 59392]

R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [2010-11-21 31232]

R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2012-06-30 1255736]

R3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\DRIVERS\wdcsam64.sys [2008-05-06 14464]

R4 ReflectService.exe;Macrium Reflect Image Mounting Service;c:\program files\Macrium\Reflect\ReflectService.exe [2012-06-12 301760]

S0 fltsrv;Acronis Storage Filter Management;c:\windows\system32\DRIVERS\fltsrv.sys [2012-07-02 137312]

S0 vididr;Acronis Virtual Disk;c:\windows\system32\DRIVERS\vididr.sys [2012-07-02 211552]

S0 vidsflt67;Acronis Disk Storage Filter (67);c:\windows\system32\DRIVERS\vsflt67.sys [2012-07-02 146528]

S1 cmderd;COMODO Internet Security Eradication Driver;c:\windows\system32\DRIVERS\cmderd.sys [2012-03-11 22696]

S1 cmdGuard;COMODO Internet Security Sandbox Driver;c:\windows\system32\DRIVERS\cmdguard.sys [2012-03-11 577824]

S1 cmdHlp;COMODO Internet Security Helper Driver;c:\windows\system32\DRIVERS\cmdhlp.sys [2012-03-11 43248]

S2 afcdpsrv;Acronis Nonstop Backup Service;c:\program files (x86)\Common Files\Acronis\CDP\afcdpsrv.exe [2012-07-02 3459024]

S2 Akamai;Akamai NetSession Interface;c:\windows\System32\svchost.exe [2009-07-14 27136]

S2 CLPSLauncher;COMODO LPS Launcher;c:\program files (x86)\Common Files\Comodo\launcher_service.exe [2012-10-05 70352]

S2 GeekBuddyRSP;GeekBuddy Remote Screen Protocol;c:\program files (x86)\Common Files\Comodo\GeekBuddyRSP.exe [2012-09-28 1815040]

S2 MBAMScheduler;MBAMScheduler;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe [2012-09-29 399432]

S2 PDFProFiltSrvPP;PDFProFiltSrvPP;c:\program files (x86)\Nuance\PaperPort\PDFProFiltSrvPP.exe [2010-03-08 144672]

S2 syncagentsrv;Acronis Sync Agent Service;c:\program files (x86)\Common Files\Acronis\SyncAgent\syncagentsrv.exe [2012-04-27 5914912]

S2 UMVPFSrv;UMVPFSrv;c:\program files (x86)\Common Files\logishrd\LVMVFM\UMVPFSrv.exe [2012-01-17 450848]

S2 UNS;Intel® Management & Security Application User Notification Service;c:\program files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe [2009-09-30 2320920]

S3 afcdp;afcdp;c:\windows\system32\DRIVERS\afcdp.sys [2012-07-02 367200]

S3 AVER_H193;AVerMedia H193 Video Capture;c:\windows\system32\drivers\AVer888RC_64.sys [2009-11-12 543616]

S3 BrYNSvc;BrYNSvc;c:\program files (x86)\Browny02\BrYNSvc.exe [2010-01-25 245760]

S3 CXCIR;AVerMedia Consumer Infrared Receiver;c:\windows\system32\DRIVERS\AVer888RCIR_64.sys [2009-11-12 39936]

S3 HECIx64;Intel® Management Engine Interface;c:\windows\system32\DRIVERS\HECIx64.sys [2009-09-18 56344]

S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2012-09-29 25928]

S3 netr28x;Ralink 802.11n Extensible Wireless Driver;c:\windows\system32\DRIVERS\netr28x.sys [2010-12-30 1177440]

S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [2010-11-30 412264]

S3 WSDScan;WSD Scan Support via UMB;c:\windows\system32\DRIVERS\WSDScan.sys [2009-07-14 25088]

.

.

--- Other Services/Drivers In Memory ---

.

*Deregistered* - CLKMDRV10_C6F09094

.

[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\svchost]

Akamai REG_MULTI_SZ Akamai

.

Contents of the 'Scheduled Tasks' folder

.

2012-12-28 c:\windows\Tasks\Adobe Flash Player Updater.job

- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-07-01 15:06]

.

2012-12-28 c:\windows\Tasks\FreeFileViewerUpdateChecker.job

- c:\program files (x86)\FreeFileViewer\FFVCheckForUpdates.exe [2012-07-05 07:24]

.

2012-12-28 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-07-01 06:06]

.

2012-12-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-07-01 06:06]

.

2012-12-27 c:\windows\Tasks\ParetoLogic Registration.job

- c:\windows\system32\rundll32.exe [2009-07-13 01:14]

.

2012-12-10 c:\windows\Tasks\ParetoLogic Update Version2.job

- c:\program files (x86)\Common Files\ParetoLogic\UUS2\Pareto_Update.exe [2008-02-22 05:25]

.

.

--------- X64 Entries -----------

.

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt1]

@="{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}"

[HKEY_CLASSES_ROOT\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}]

2012-06-30 04:19 97792 ----a-w- c:\users\smart\AppData\Roaming\Dropbox\bin\DropboxExt64.14.dll

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt2]

@="{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}"

[HKEY_CLASSES_ROOT\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}]

2012-06-30 04:19 97792 ----a-w- c:\users\smart\AppData\Roaming\Dropbox\bin\DropboxExt64.14.dll

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt3]

@="{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}"

[HKEY_CLASSES_ROOT\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}]

2012-06-30 04:19 97792 ----a-w- c:\users\smart\AppData\Roaming\Dropbox\bin\DropboxExt64.14.dll

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt4]

@="{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}"

[HKEY_CLASSES_ROOT\CLSID\{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}]

2012-06-30 04:19 97792 ----a-w- c:\users\smart\AppData\Roaming\Dropbox\bin\DropboxExt64.14.dll

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"COMODO Internet Security"="c:\program files\COMODO\COMODO Internet Security\cfp.exe" [2012-03-11 9569096]

"Acronis Scheduler2 Service"="c:\program files (x86)\Common Files\Acronis\Schedule2\schedhlp.exe" [2012-04-27 403112]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]

"AppInit_DLLs"=c:\windows\System32\guard64.dll

.

------- Supplementary Scan -------

.

uLocal Page = c:\windows\system32\blank.htm

uStart Page = hxxp://th.hao123.com/?tn=bbl_hp_hao123_th

mLocal Page = c:\windows\SysWOW64\blank.htm

uInternet Settings,ProxyOverride = <local>

IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200

IE: Download all with Free Download Manager - file://c:\program files (x86)\Free Download Manager\dlall.htm

IE: Download selected with Free Download Manager - file://c:\program files (x86)\Free Download Manager\dlselected.htm

IE: Download video with Free Download Manager - file://c:\program files (x86)\Free Download Manager\dlfvideo.htm

IE: Download with Free Download Manager - file://c:\program files (x86)\Free Download Manager\dllink.htm

IE: E&xport to Microsoft Excel - c:\progra~2\MICROS~1\Office14\EXCEL.EXE/3000

IE: Se&nd to OneNote - c:\progra~2\MICROS~1\Office14\ONBttnIE.dll/105

TCP: DhcpNameServer = 176.9.26.139 64.120.208.106

TCP: Interfaces\{1E378A71-B192-4D75-A1FA-683CCD6DA9B5}: NameServer = 8.26.56.26,156.154.70.22

TCP: Interfaces\{B744C010-787D-4DCF-B48C-BA72349F83E4}: NameServer = 8.26.56.26,156.154.70.22

FF - ProfilePath - c:\users\smart\AppData\Roaming\Mozilla\Firefox\Profiles\cdvkv1sc.default-1356658694632\

FF - prefs.js: browser.startup.homepage - hxxps://www.google.com

FF - ExtSQL: 2012-12-06 18:01; {CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA}; c:\program files (x86)\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA}

.

- - - - ORPHANS REMOVED - - - -

.

SafeBoot-17764322.sys

SafeBoot-79439735.sys

ShellIconOverlayIdentifiers- - (no file)

ShellIconOverlayIdentifiers- - (no file)

ShellIconOverlayIdentifiers- - (no file)

.

.

.

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Akamai]

"ServiceDll"="c:\program files (x86)\common files\akamai/netsession_win_ce5ba24.dll"

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Environment*]

"v5Licence0"="15-HHGE-GK8K-HWEZ-KH7T-KEQS-AW3XNTH"

"Activated"="Y"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Office\Common\Smart Tag\Actions\{B7EFF951-E52F-45CC-9EF7-57124F2177CC}]

@Denied: (A) (Everyone)

"Solution"="{15727DE6-F92D-4E46-ACB4-0E2C58B31A18}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Schema Library\ActionsPane3]

@Denied: (A) (Everyone)

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Schema Library\ActionsPane3\0]

"Key"="ActionsPane3"

"Location"="c:\\Program Files (x86)\\Common Files\\Microsoft Shared\\VSTO\\ActionsPane3.xsd"

.

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

.

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]

@Denied: (Full) (Everyone)

.

Completion time: 2012-12-28 10:15:00

ComboFix-quarantined-files.txt 2012-12-28 03:15

.

Pre-Run: 79,753,994,240 bytes free

Post-Run: 79,786,082,304 bytes free

.

- - End Of File - - F9C3D16085BEDC950000558533FEF4D4

Link to post
Share on other sites

  • Staff

Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scanner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the Run ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start

    [*]When asked, allow the add/on to be installed

    • Click Start

    [*]Make sure that the option Remove found threats is unticked

    [*]Click on Advanced Settings, ensure the options

    • Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.

    [*]Click Scan

    [*]wait for the virus definitions to be downloaded

    [*]Wait for the scan to finish

When the scan is complete

  • If no threats were found
    • put a checkmark in "Uninstall application on close"
    • close program
    • report to me that nothing was found

  • If threats were found
    • click on "list of threats found"
    • click on "export to text file" and save it as ESET SCAN and save to the desktop
    • Click on back
    • put a checkmark in "Uninstall application on close"
    • click on finish
    • close program
    • copy and paste the report here

Gringo

Link to post
Share on other sites

Gringo,

Yuck what's this?

C:\Program Files (x86)\Vuze\.install4j\i4j_extf_27_5p83tu.dll a variant of Win32/Bunndle application

C:\ProgramData\Spybot - Search & Destroy\Recovery\WiIQfraud11.zip Win32/Bagle.gen.zip worm

C:\Users\All Users\Spybot - Search & Destroy\Recovery\WiIQfraud11.zip Win32/Bagle.gen.zip worm

Link to post
Share on other sites

Gringo --

I posted a reply about an hour ago but somehow it's not here.

The log - with something bad I think - is below.

Unfortunately I am leaving for the airport. Can we continue around 14 January? Sorry to drag it on. I definitely want my computer clean.

C:\Program Files (x86)\Vuze\.install4j\i4j_extf_27_5p83tu.dll a variant of Win32/Bunndle application

C:\ProgramData\Spybot - Search & Destroy\Recovery\WiIQfraud11.zip Win32/Bagle.gen.zip worm

C:\Users\All Users\Spybot - Search & Destroy\Recovery\WiIQfraud11.zip Win32/Bagle.gen.zip worm

Link to post
Share on other sites

  • Staff

Hello

There are some minor things in your online scan that should be removed.

delete files

  • Copy all text in the quote box (below)...to Notepad.
    @echo off
    del /f /s /q "C:\Program Files (x86)\Vuze\.install4j\i4j_extf_27_5p83tu.dll"
    rd /s /q "C:\ProgramData\Spybot - Search & Destroy\Recovery\"
    rd /s /q "C:\Users\All Users\Spybot - Search & Destroy\Recovery\"
    del %0
  • Save the Notepad file on your desktop...as delfile.bat... save type as "All Files"
    It should look like this: batfileicon.gif<--XPvista_bat_icon.png<--vista
  • Double click on delfile.bat to execute it.
    A black CMD window will flash, then disappear...this is normal.
  • The files and folders, if found...will have been deleted and the "delfile.bat" file will also be deleted.

The rest of the Online scan is only reporting backups created during the course of this fix C:\Qoobox\Quarantine\, and/or items located in System Restore's cache C:\System Volume Information\, Whatever is in these folders can't harm you unless you choose to perform a manual restore. the following steps will remove these backups.

Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.

:Why we need to remove some of our tools:

  • Some of the tools we have used to clean your computer were made by fellow malware fighters and are very powerful and if used incorrectly or at the wronge time can make the computer an expensive paper weight.
    They are updated all the time and some of them more than once a day so by the time you are ready to use them again they will already be outdated.
    The following procedures will implement some cleanup procedures to remove these tools. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.

:DeFogger:

Note** Defogger only needs to be run if it was run when we first started. If you have not already run it then skip this.

  • To re-enable your Emulation drivers, double click DeFogger to run the tool.
    • The application window will appear
    • Click the Re-enable button to re-enable your CD Emulation drivers
    • Click Yes to continue
    • A 'Finished!' message will appear
    • Click OK
    • DeFogger will now ask to reboot the machine - click OK.

Your Emulation drivers are now re-enabled.

:Uninstall ComboFix:

  • turn off all active protection software
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.
  • CF-Uninstall.png

:Remove the rest of our tools:

Please download OTCleanIt and save it to desktop. This tool will remove all the tools we used to clean your pc.

  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.
  • If asked to restart the computer, please do so

Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.

:The programs you can keep:

Some of the programs that we have used would be a good idea to keep and used often in helping to keep the computer clean. I use these programs on my computer.

Revo Uninstaller Free - this is the uninstaller that I had you download and works allot better than add/remove in windows and has saved me more than once from corrupted installs and uninstalls
CCleaner - This is a good program to clean out temp files, I would use this once a week or before any malware scan to remove unwanted temp files - It has a built in registry cleaner but I would leave that alone and not use any registry cleaner
Malwarebytes' Anti-Malware The Gold standerd today in antimalware scanners

:Security programs:

One of the questions I am asked all the time is "What programs do you use" I have at this time 4 computers in my home and I have this setup on all 4 of them.

  • Microsoft Security Essentials - provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.
  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often. (I have upgraded to the paid version of MBAM and I am glad I did)
    Note** If you decide to install MSE you will need to uninstall your present Antivirus

:Security awareness:

The other question I am asked all the time is "How can I prevent this from happening again." and the short answer to that is to be aware of what is out there and how to start spotting dangers.

Here are some articles that are must reads and should be read by everybody in your household that uses the internet

internetsafety
Internet Safety for Kids

Here is some more reading for you from some of my colleges

PC Safety and Security - What Do I Need? from my friends at Tech Support Forum
COMPUTER SECURITY - a short guide to staying safer online from my friends at Malware Removal

quoted from Tech Support Forum

Conclusion

There is no such thing as ‘perfect security’. This applies to many things, not just computer systems. Using the above guide you should be able to take all the reasonable steps you can to prevent infection. However, the most important part of all this is you, the user. Surf sensibly and think before you download a file or click on a link. Take a few moments to assess the possible risks and you should be able to enjoy all the internet has to offer.

I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Gringo

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.