Jump to content

FBI virus - computer not working in safe mode


z_man

Recommended Posts

Please forgive my slowness, as I am new to writing in forums.

My computer was hijacked today by the FBI moneypack virus. Have been searching solutions and came upon this forum.

Background info:

  • Cannot login to my computer - even in safe mode or safe mode with networking. (Currently writing from a second computer)
  • OS: Windows 7, 32 bit
  • Do not have any anti-malware software installed (but just purchased malwarebytes and have it ready to install from a flash drive)
  • Using ESET for my anti-virus.

Can you please help me?

Link to post
Share on other sites

  • Staff

Please do the following:

Download the appropriate version for your system of the Farbar Recovery Scan Tool and save it to a flash drive.

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:

  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Choose your language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.

To enter System Recovery Options by using Windows installation disc:

  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Choose your language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.

On the System Recovery Options menu you will get the following options:


    • Startup Repair
      System Restore
      Windows Complete PC Restore
      Windows Memory Diagnostic Tool
      Command Prompt

[*]Select Command Prompt

[*]In the command window type in notepad and press Enter.

[*]The notepad opens. Under File menu select Open.

[*]Select "Computer" and find your flash drive letter and close the notepad.

[*]In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter

Note: Replace letter e with the drive letter of your flash drive.

[*]The tool will start to run.

[*]When the tool opens click Yes to the disclaimer.

[*]Place a check next to List Drivers MD5 as well as the default check marks that are already there

[*]Press Scan button.

[*]type exit and reboot the computer normally

[*]FRST will make a log (FRST.txt) on the flash drive, please copy and paste the log in your reply.

Link to post
Share on other sites

Here is the log. (Infected computer still has the virus - showing the FBI Moneypack screen upon login).

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 21-01-2013

Ran by SYSTEM at 20-01-2013 21:59:35

Running from G:\

Windows 7 Home Premium Service Pack 1 (X86) OS Language: English(US)

The current controlset is ControlSet001

==================== Registry (Whitelisted) ===================

HKLM\...\Run: [soundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe [1314816 2009-05-18] (Analog Devices, Inc.)

HKLM\...\Run: [synTPEnh] %ProgramFiles%\Synaptics\SynTP\SynTPEnh.exe [1725736 2010-04-22] (Synaptics Incorporated)

HKLM\...\Run: [egui] "C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe" /hide /waitservice [3080264 2011-09-22] (ESET)

HKLM\...\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [946352 2012-12-02] (Adobe Systems Incorporated)

HKLM\...\Run: [cwcptray] C:\Program Files\ContentWatch\Internet Protection\cwtray.exe [676416 2012-02-09] (ContentWatch, Inc.)

HKLM\...\Run: [sunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe" [252848 2012-07-03] (Sun Microsystems, Inc.)

HKU\Brian\...\Run: [Google Update] "C:\Users\Brian\AppData\Local\Google\Update\GoogleUpdate.exe" /c [116648 2012-07-28] (Google Inc.)

HKU\Brian\...\Run: [nehlt] rundll32.exe "C:\Users\Brian\AppData\Roaming\nehlt.dll",HrByteToStream [176128 2013-01-20] (Pmode)

HKU\Brian\...\Winlogon: [shell] explorer.exe,C:\Users\Brian\AppData\Roaming\skype.dat [56832 2011-11-16] ()

Tcpip\Parameters: [DhcpNameServer] 192.168.5.1

Tcpip\..\Interfaces\{EB7EEF1E-C973-4374-95EF-EB35839E4582}: [NameServer]68.87.64.196,8.8.8.8

==================== Services (Whitelisted) ===================

2 CwAltaService20; C:\Program Files\ContentWatch\Internet Protection\cwsvc.exe [3074624 2012-02-09] (ContentWatch, Inc.)

2 ekrn; "C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe" [974944 2011-09-22] (ESET)

==================== Drivers (Whitelisted) ====================

2 eamonm; C:\Windows\System32\DRIVERS\eamonm.sys [163424 2011-08-09] (ESET)

1 ehdrv; C:\Windows\System32\DRIVERS\ehdrv.sys [118104 2011-08-04] (ESET)

2 epfwwfpr; C:\Windows\System32\DRIVERS\epfwwfpr.sys [103112 2011-08-04] (ESET)

==================== NetSvcs (Whitelisted) ===================

==================== One Month Created Files and Folders ========

2013-01-20 21:59 - 2013-01-20 21:59 - 00000000 ____D C:\FRST

2013-01-20 08:25 - 2013-01-20 08:47 - 00000004 ____A C:\Users\Brian\AppData\Roaming\skype.ini

2013-01-20 08:19 - 2013-01-20 08:19 - 00176128 ____A (Pmode) C:\Users\Brian\AppData\Roaming\nehlt.dll

2013-01-20 08:19 - 2013-01-20 08:19 - 00000000 ____D C:\Users\Brian\AppData\Local\ESET

2013-01-08 19:25 - 2012-11-22 18:56 - 02345984 ____A (Microsoft Corporation) C:\Windows\System32\win32k.sys

2013-01-08 19:25 - 2012-11-19 20:51 - 00220160 ____A (Microsoft Corporation) C:\Windows\System32\ncrypt.dll

2013-01-08 19:25 - 2012-11-08 20:43 - 00492032 ____A (Microsoft Corporation) C:\Windows\System32\win32spl.dll

2013-01-08 19:25 - 2012-10-31 20:47 - 01389568 ____A (Microsoft Corporation) C:\Windows\System32\msxml6.dll

2013-01-08 19:24 - 2012-12-07 04:26 - 00308736 ____A (Microsoft Corporation) C:\Windows\System32\Wpc.dll

2013-01-08 19:24 - 2012-12-07 04:20 - 02576384 ____A (Microsoft Corporation) C:\Windows\System32\gameux.dll

2013-01-08 19:24 - 2012-12-07 02:46 - 00055296 ____A (Microsoft) C:\Windows\System32\cero.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00051712 ____A (Microsoft) C:\Windows\System32\esrb.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00046592 ____A (Microsoft) C:\Windows\System32\fpb.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00045568 ____A (Microsoft) C:\Windows\System32\oflc-nz.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00044544 ____A (Microsoft) C:\Windows\System32\pegibbfc.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00043520 ____A (Microsoft) C:\Windows\System32\csrr.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00040960 ____A (Microsoft) C:\Windows\System32\cob-au.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00030720 ____A (Microsoft) C:\Windows\System32\usk.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00023552 ____A (Microsoft) C:\Windows\System32\oflc.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00021504 ____A (Microsoft) C:\Windows\System32\grb.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00020480 ____A (Microsoft) C:\Windows\System32\pegi-pt.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00020480 ____A (Microsoft) C:\Windows\System32\pegi-fi.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00020480 ____A (Microsoft) C:\Windows\System32\pegi.rs

2013-01-08 19:24 - 2012-12-07 02:46 - 00015360 ____A (Microsoft) C:\Windows\System32\djctq.rs

2013-01-08 19:24 - 2012-11-29 20:53 - 00169984 ____A (Microsoft Corporation) C:\Windows\System32\winsrv.dll

2013-01-08 19:24 - 2012-11-29 20:47 - 00868352 ____A (Microsoft Corporation) C:\Windows\System32\kernel32.dll

2013-01-08 19:24 - 2012-11-29 20:47 - 00293376 ____A (Microsoft Corporation) C:\Windows\System32\KernelBase.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00005120 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-file-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00004608 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-processthreads-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00004096 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-sysinfo-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00004096 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-synch-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00004096 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-misc-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00004096 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-localregistry-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00004096 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-localization-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003584 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-processenvironment-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003584 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-namedpipe-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003584 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-memory-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003584 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-libraryloader-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003584 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-interlocked-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003584 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-heap-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-string-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-rtlsupport-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-profile-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-io-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-handle-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-fibers-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-errorhandling-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-delayload-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-debug-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-datetime-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 20:45 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-console-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 18:55 - 00271360 ____A (Microsoft Corporation) C:\Windows\System32\conhost.exe

2013-01-08 19:24 - 2012-11-29 18:38 - 00006144 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-security-base-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 18:38 - 00004608 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-threadpool-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 18:38 - 00003584 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-xstate-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 18:38 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-util-l1-1-0.dll

2013-01-08 19:24 - 2012-11-29 15:17 - 00420064 ____A C:\Windows\System32\locale.nls

2013-01-08 19:24 - 2012-11-22 18:48 - 00049152 ____A (Microsoft Corporation) C:\Windows\System32\taskhost.exe

2013-01-08 19:24 - 2012-11-21 20:45 - 00626688 ____A (Microsoft Corporation) C:\Windows\System32\usp10.dll

2012-12-22 05:18 - 2012-12-16 06:13 - 00295424 ____A (Adobe Systems Incorporated) C:\Windows\System32\atmfd.dll

2012-12-22 05:18 - 2012-12-16 06:13 - 00034304 ____A (Adobe Systems) C:\Windows\System32\atmlib.dll

==================== One Month Modified Files and Folders ========

2013-01-20 21:59 - 2013-01-20 21:59 - 00000000 ____D C:\FRST

2013-01-20 18:54 - 2009-07-13 20:53 - 00000006 ___AH C:\Windows\Tasks\SA.DAT

2013-01-20 18:54 - 2009-07-13 20:39 - 00046692 ____A C:\Windows\setupact.log

2013-01-20 17:10 - 2012-07-05 20:08 - 01814747 ____A C:\Windows\WindowsUpdate.log

2013-01-20 17:09 - 2012-07-28 11:53 - 00000908 ____A C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2271790301-717659772-3139975214-1000UA.job

2013-01-20 17:09 - 2012-07-28 11:53 - 00000856 ____A C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2271790301-717659772-3139975214-1000Core.job

2013-01-20 15:04 - 2009-07-13 20:34 - 00021888 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0

2013-01-20 15:04 - 2009-07-13 20:34 - 00021888 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0

2013-01-20 15:01 - 2010-11-20 13:01 - 00726316 ____A C:\Windows\System32\PerfStringBackup.INI

2013-01-20 12:59 - 2009-07-13 20:53 - 00032594 ____A C:\Windows\Tasks\SCHEDLGU.TXT

2013-01-20 08:47 - 2013-01-20 08:25 - 00000004 ____A C:\Users\Brian\AppData\Roaming\skype.ini

2013-01-20 08:19 - 2013-01-20 08:19 - 00176128 ____A (Pmode) C:\Users\Brian\AppData\Roaming\nehlt.dll

2013-01-20 08:19 - 2013-01-20 08:19 - 00000000 ____D C:\Users\Brian\AppData\Local\ESET

2013-01-14 15:15 - 2009-07-13 18:37 - 00000000 ____D C:\Windows\rescache

2013-01-14 14:38 - 2009-07-13 18:37 - 00000000 ____D C:\Windows\Microsoft.NET

2013-01-13 10:13 - 2012-07-28 11:55 - 00002364 ____A C:\Users\Brian\Desktop\Google Chrome.lnk

2013-01-12 08:11 - 2012-07-14 09:43 - 00000000 ____D C:\Program Files\Common Files\Adobe

2013-01-08 19:54 - 2009-07-13 20:33 - 00409096 ____A C:\Windows\System32\FNTCACHE.DAT

2013-01-08 19:25 - 2012-07-07 10:02 - 65273848 ____A (Microsoft Corporation) C:\Windows\System32\MRT.exe

ZeroAccess:

C:\$Recycle.Bin\S-1-5-21-2271790301-717659772-3139975214-1000\$f80af7d67d1667e30257ad34eee60db3

==================== Known DLLs (Whitelisted) =================

==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => MD5 is legit

C:\Windows\System32\winlogon.exe => MD5 is legit

C:\Windows\System32\wininit.exe => MD5 is legit

C:\Windows\System32\svchost.exe => MD5 is legit

C:\Windows\System32\services.exe => MD5 is legit

C:\Windows\System32\User32.dll => MD5 is legit

C:\Windows\System32\userinit.exe => MD5 is legit

C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK

HKLM\...\exefile\DefaultIcon: %1 => OK

HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points =========================

Restore point made on: 2013-01-20 05:28:33

==================== Memory info ===========================

Percentage of memory in use: 19%

Total physical RAM: 2006.3 MB

Available physical RAM: 1617.07 MB

Total Pagefile: 2006.3 MB

Available Pagefile: 1615.07 MB

Total Virtual: 2047.88 MB

Available Virtual: 1962.29 MB

==================== Partitions =============================

1 Drive c: () (Fixed) (Total:34.58 GB) (Free:18.33 GB) NTFS

2 Drive e: (SW_Preload) (Fixed) (Total:263.41 GB) (Free:166.73 GB) NTFS ==>[system with boot components (obtained from reading drive)]

4 Drive g: (KINGSTON) (Removable) (Total:7.26 GB) (Free:7.25 GB) FAT32

5 Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS

6 Drive y: (System Reserved) (Fixed) (Total:0.1 GB) (Free:0.07 GB) NTFS ==>[system with boot components (obtained from reading drive)]

Disk ### Status Size Free Dyn Gpt

-------- ------------- ------- ------- --- ---

Disk 0 Online 298 GB 1024 KB

Disk 1 Online 7441 MB 0 B

Partitions of Disk 0:

===============

Disk ID: 175A1160

Partition ### Type Size Offset

------------- ---------------- ------- -------

Partition 1 Primary 100 MB 1024 KB

Partition 2 Primary 34 GB 101 MB

Partition 3 Primary 263 GB 34 GB

=========================================================

Disk: 0

Partition 1

Type : 07

Hidden: No

Active: Yes

Volume ### Ltr Label Fs Type Size Status Info

---------- --- ----------- ----- ---------- ------- --------- --------

* Volume 1 Y System Rese NTFS Partition 100 MB Healthy

=========================================================

Disk: 0

Partition 2

Type : 07

Hidden: No

Active: No

Volume ### Ltr Label Fs Type Size Status Info

---------- --- ----------- ----- ---------- ------- --------- --------

* Volume 2 C NTFS Partition 34 GB Healthy

=========================================================

Disk: 0

Partition 3

Type : 07

Hidden: No

Active: No

Volume ### Ltr Label Fs Type Size Status Info

---------- --- ----------- ----- ---------- ------- --------- --------

* Volume 3 E SW_Preload NTFS Partition 263 GB Healthy

=========================================================

Partitions of Disk 1:

===============

Disk ID: C3072E18

Partition ### Type Size Offset

------------- ---------------- ------- -------

Partition 1 Primary 7437 MB 4032 KB

=========================================================

Disk: 1

Partition 1

Type : 0C

Hidden: No

Active: Yes

Volume ### Ltr Label Fs Type Size Status Info

---------- --- ----------- ----- ---------- ------- --------- --------

* Volume 4 G KINGSTON FAT32 Removable 7437 MB Healthy

=========================================================

Last Boot: 2013-01-14 15:07

==================== End Of Log ============================

Link to post
Share on other sites

  • Staff

Please do the following:

Open notepad (Start =>All Programs => Accessories => Notepad). Please copy the entire contents of the code box below. (To do this highlight the contents of the box, right click on it and select copy. Right-click in the open notepad and select Paste). Save it on the flashdrive as fixlist.txt

start
HKU\Brian\...\Run: [nehlt] rundll32.exe "C:\Users\Brian\AppData\Roaming\nehlt.dll",HrByteToStream [176128 2013-01-20] (Pmode)
HKU\Brian\...\Winlogon: [Shell] explorer.exe,C:\Users\Brian\AppData\Roaming\skype.dat [56832 2011-11-16] ()
2013-01-20 08:47 - 2013-01-20 08:25 - 00000004 ____A C:\Users\Brian\AppData\Roaming\skype.ini
2013-01-20 08:19 - 2013-01-20 08:19 - 00176128 ____A (Pmode) C:\Users\Brian\AppData\Roaming\nehlt.dll
C:\$Recycle.Bin\S-1-5-21-2271790301-717659772-3139975214-1000\$f80af7d67d1667e30257ad34eee60db3
end

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

Now please enter System Recovery Options then select Command Prompt

Run FRST (or FRST64 if you have the 64bit version) and press the Fix button just once and wait.

The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

Reboot Normally.

NEXT

Refer to the ComboFix User's Guide

  1. Download ComboFix from the following location:
    Link
    * IMPORTANT !!! Place ComboFix.exe on your Desktop
  2. Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with ComboFix.
    You can get help on disabling your protection programs here
  3. Double click on ComboFix.exe & follow the prompts.
  4. Your desktop may go blank. This is normal. It will return when ComboFix is done. ComboFix may reboot your machine. This is normal.
  5. When finished, it shall produce a log for you. Post that log in your next reply
    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.
    ---------------------------------------------------------------------------------------------
  6. Ensure your AntiVirus and AntiSpyware applications are re-enabled.
    ---------------------------------------------------------------------------------------------

NOTE: If you encounter a message "illegal operation attempted on registry key that has been marked for deletion" and no programs will run - please just reboot and that will resolve that error.

Link to post
Share on other sites

Here are the results from fixlog.txt:

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 21-01-2013

Ran by SYSTEM at 2013-01-21 09:40:00 Run:1

Running from G:\

==============================================

HKEY_USERS\Brian\Software\Microsoft\Windows\CurrentVersion\Run\\nehlt Value deleted successfully.

HKEY_USERS\Brian\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell Value deleted successfully.

C:\Users\Brian\AppData\Roaming\skype.ini moved successfully.

C:\Users\Brian\AppData\Roaming\nehlt.dll moved successfully.

C:\$Recycle.Bin\S-1-5-21-2271790301-717659772-3139975214-1000\$f80af7d67d1667e30257ad34eee60db3 moved successfully.

==== End of Fixlog ====

and here are the results from combofix.exe:

ComboFix 13-01-21.01 - Brian 01/21/2013 10:04:51.1.2 - x86

Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.2006.1151 [GMT -5:00]

Running from: c:\users\Brian\Desktop\ComboFix.exe

AV: ESET NOD32 Antivirus 5.0 *Disabled/Updated* {77DEAFED-8149-104B-25A1-21771CA47CD1}

SP: ESET NOD32 Antivirus 5.0 *Disabled/Updated* {CCBF4E09-A773-1FC5-1F11-1A056723366C}

SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\users\Brian\AppData\Roaming\skype.dat

c:\users\Brian\g2mdlhlpx.exe

.

.

((((((((((((((((((((((((( Files Created from 2012-12-21 to 2013-01-21 )))))))))))))))))))))))))))))))

.

.

2013-01-21 15:12 . 2013-01-21 15:12 -------- d-----w- c:\users\Brian\AppData\Local\temp

2013-01-21 15:12 . 2013-01-21 15:12 -------- d-----w- c:\users\Default\AppData\Local\temp

2013-01-21 05:59 . 2013-01-21 05:59 -------- d-----w- C:\FRST

2013-01-20 16:19 . 2013-01-20 16:19 -------- d-----w- c:\users\Brian\AppData\Local\ESET

2013-01-20 13:28 . 2013-01-08 04:57 6991832 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{057377C5-040D-4390-B6CD-D3F0AB6F3D35}\mpengine.dll

2013-01-09 03:25 . 2012-11-01 04:47 1389568 ----a-w- c:\windows\system32\msxml6.dll

2013-01-09 03:25 . 2012-11-23 02:56 2345984 ----a-w- c:\windows\system32\win32k.sys

2013-01-09 03:25 . 2012-11-20 04:51 220160 ----a-w- c:\windows\system32\ncrypt.dll

2013-01-09 03:25 . 2012-11-09 04:43 492032 ----a-w- c:\windows\system32\win32spl.dll

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2012-12-16 14:13 . 2012-12-22 13:18 295424 ----a-w- c:\windows\system32\atmfd.dll

2012-12-16 14:13 . 2012-12-22 13:18 34304 ----a-w- c:\windows\system32\atmlib.dll

2012-11-26 01:20 . 2012-07-11 23:21 73656 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl

2012-11-26 01:20 . 2012-07-11 23:21 697272 ----a-w- c:\windows\system32\FlashPlayerApp.exe

2012-11-14 02:09 . 2012-12-12 00:03 1800704 ----a-w- c:\windows\system32\jscript9.dll

2012-11-14 01:58 . 2012-12-12 00:03 1427968 ----a-w- c:\windows\system32\inetcpl.cpl

2012-11-14 01:57 . 2012-12-12 00:03 1129472 ----a-w- c:\windows\system32\wininet.dll

2012-11-14 01:49 . 2012-12-12 00:03 142848 ----a-w- c:\windows\system32\ieUnatt.exe

2012-11-14 01:48 . 2012-12-12 00:03 420864 ----a-w- c:\windows\system32\vbscript.dll

2012-11-14 01:44 . 2012-12-12 00:03 2382848 ----a-w- c:\windows\system32\mshtml.tlb

2012-11-09 04:42 . 2012-12-12 00:00 2048 ----a-w- c:\windows\system32\tzres.dll

2012-11-02 05:11 . 2012-12-12 00:00 376832 ----a-w- c:\windows\system32\dpnet.dll

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"IgfxTray"="c:\windows\system32\igfxtray.exe" [2009-08-06 141848]

"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-08-06 173592]

"Persistence"="c:\windows\system32\igfxpers.exe" [2009-08-06 150552]

"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2009-05-18 1314816]

"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2010-04-23 1725736]

"egui"="c:\program files\ESET\ESET NOD32 Antivirus\egui.exe" [2011-09-22 3080264]

"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-03 946352]

"cwcptray"="c:\program files\ContentWatch\Internet Protection\cwtray.exe" [2012-02-09 676416]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"ConsentPromptBehaviorAdmin"= 5 (0x5)

"ConsentPromptBehaviorUser"= 3 (0x3)

"EnableUIADesktopToggle"= 0 (0x0)

.

R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [x]

R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [x]

R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [x]

S1 ehdrv;ehdrv;c:\windows\system32\DRIVERS\ehdrv.sys [x]

S2 CwAltaService20;ContentWatch;c:\program files\ContentWatch\Internet Protection\cwsvc.exe [x]

S2 eamonm;eamonm;c:\windows\system32\DRIVERS\eamonm.sys [x]

S2 ekrn;ESET Service;c:\program files\ESET\ESET NOD32 Antivirus\ekrn.exe [x]

S2 epfwwfpr;epfwwfpr;c:\windows\system32\DRIVERS\epfwwfpr.sys [x]

S3 netw5v32;Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 32 Bit;c:\windows\system32\DRIVERS\netw5v32.sys [x]

S3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\DRIVERS\VSTAZL3.SYS [x]

S3 SrvHsfV92;SrvHsfV92;c:\windows\system32\DRIVERS\VSTDPV3.SYS [x]

S3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\DRIVERS\VSTCNXT3.SYS [x]

.

.

Contents of the 'Scheduled Tasks' folder

.

2013-01-21 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2271790301-717659772-3139975214-1000Core.job

- c:\users\Brian\AppData\Local\Google\Update\GoogleUpdate.exe [2012-07-28 19:53]

.

2013-01-21 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2271790301-717659772-3139975214-1000UA.job

- c:\users\Brian\AppData\Local\Google\Update\GoogleUpdate.exe [2012-07-28 19:53]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.yahoo.com/

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office14\EXCEL.EXE/3000

IE: Se&nd to OneNote - c:\progra~1\MICROS~2\Office14\ONBttnIE.dll/105

LSP: c:\windows\system32\cwalsp.dll

TCP: DhcpNameServer = 192.168.5.1

TCP: Interfaces\{EB7EEF1E-C973-4374-95EF-EB35839E4582}: NameServer = 68.87.64.196,8.8.8.8

TCP: Interfaces\{EB7EEF1E-C973-4374-95EF-EB35839E4582}\2375942554434333: NameServer = 68.87.64.196,8.8.8.8

TCP: Interfaces\{EB7EEF1E-C973-4374-95EF-EB35839E4582}\35743323: NameServer = 68.87.64.196,8.8.8.8

TCP: Interfaces\{EB7EEF1E-C973-4374-95EF-EB35839E4582}\35C65656070294E6E6: NameServer = 68.87.64.196,8.8.8.8

TCP: Interfaces\{EB7EEF1E-C973-4374-95EF-EB35839E4582}\75F47512039383430373: NameServer = 68.87.64.196,8.8.8.8

.

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_110_ActiveX.exe,-101"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]

"Enabled"=dword:00000001

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]

@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_110_ActiveX.exe"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="IFlashBroker5"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

.

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]

@Denied: (Full) (Everyone)

.

Completion time: 2013-01-21 10:18:44

ComboFix-quarantined-files.txt 2013-01-21 15:18

.

Pre-Run: 19,360,817,152 bytes free

Post-Run: 19,638,910,976 bytes free

.

- - End Of File - - 26C23C1B1E64460EB7922BB52BAA00C6

Link to post
Share on other sites

  • Staff

Please run the following:

Please download Junkware Removal Tool to your desktop.

  • Shutdown your antivirus to avoid any conflicts.
  • Right-mouse click JRT.exe and select Run as administrator
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message

NEXT

Download AdwCleaner from here and save it to your desktop.

  • Run AdwCleaner and select Delete
  • Once done it will ask to reboot, allow the reboot
  • On reboot a log will be produced, please attach the content of the log to your next reply

NEXT

  • Please open your MalwareBytes AntiMalware Program
  • Click the Update Tab and search for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.

NEXT

Go here to run an online scanner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Link to post
Share on other sites

Accomplished all the above, except running the online scan from ESET. ActiveX control did not come up. Not sure why.

I have ESET installed on my computer. Should I run that. If so, do you have specific instructions?

Here are the logs from each of other three programs.

Junkware Removal Tool:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Junkware Removal Tool (JRT) by Thisisu

Version: 4.4.6 (01.20.2013:1)

OS: Windows 7 Home Premium x86

Ran by Brian on Mon 01/21/2013 at 10:57:44.76

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

~~~ Services

~~~ Registry Values

~~~ Registry Keys

~~~ Files

Successfully deleted: [File] "C:\Windows\couponprinter.ocx"

~~~ Folders

Successfully deleted: [Folder] "C:\Program Files\coupons"

~~~ Event Viewer Logs were cleared

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Scan was completed on Mon 01/21/2013 at 11:00:45.14

End of JRT log

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

AdwCleaner:

# AdwCleaner v2.107 - Logfile created 01/21/2013 at 11:07:52

# Updated 21/01/2013 by Xplode

# Operating system : Windows 7 Home Premium Service Pack 1 (32 bits)

# User : Brian - BRIAN-PC

# Boot Mode : Normal

# Running from : C:\Users\Brian\Desktop\adwcleaner.exe

# Option [Delete]

***** [services] *****

***** [Files / Folders] *****

***** [Registry] *****

***** [internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16457

[OK] Registry is clean.

-\\ Google Chrome v24.0.1312.52

File : C:\Users\Brian\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[s1].txt - [656 octets] - [21/01/2013 11:07:52]

########## EOF - C:\AdwCleaner[s1].txt - [715 octets] ##########

MalwareBytes:

Malwarebytes Anti-Malware 1.70.0.1100

www.malwarebytes.org

Database version: v2013.01.21.06

Windows 7 Service Pack 1 x86 NTFS

Internet Explorer 9.0.8112.16421

Brian :: BRIAN-PC [administrator]

1/21/2013 11:13:44 AM

mbam-log-2013-01-21 (11-13-44).txt

Scan type: Quick scan

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM

Scan options disabled: P2P

Objects scanned: 196453

Time elapsed: 3 minute(s), 56 second(s)

Memory Processes Detected: 0

(No malicious items detected)

Memory Modules Detected: 0

(No malicious items detected)

Registry Keys Detected: 0

(No malicious items detected)

Registry Values Detected: 0

(No malicious items detected)

Registry Data Items Detected: 0

(No malicious items detected)

Folders Detected: 0

(No malicious items detected)

Files Detected: 0

(No malicious items detected)

(end)

Link to post
Share on other sites

  • Staff

update the ESET definitions and run a normal scan, let me know if it finds anything that isn't already in quarantine

please let me know if there are any outstanding issues

NEXT

  • Please download MiniToolBox and save it to your desktop and run it.
    Checkmark following checkboxes:
    • Flush DNS
    • Report IE Proxy Settings
    • Report FF Proxy Settings
    • List content of Hosts
    • List installed programs.

    Click Go and post the result (Result.txt) that pops up. A copy of result.txt will be saved in the same directory the tool is run.

NEXT

Please download Farbar Service Scanner to your desktop and run it.

  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center
    • Windows Update
    • Windows Defender

    [*]Press "Scan".

    [*]It will create a log (FSS.txt) in the same directory the tool is run.

    [*]Please copy and paste the log to your reply.

Link to post
Share on other sites

Completed ESET's Smart Scan and it found a couple more viruses. It placed them in quarantine and cleaned them.

The log is very lengthy, so I will show you the two viruses it found:

C:\FRST\Quarantine\nehlt.dll - a variant of Win32/Medfos.IR trojan - cleaned by deleting - quarantined [1]

C:\Qoobox\Quarantine\C\Users\Brian\AppData\Roaming\skype.dat.vir - a variant of Win32/Kryptik.ASON trojan - cleaned by deleting - quarantined [1]

I will wait until I hear back before proceeding further ....

Link to post
Share on other sites

Those are now done. Here are the logs:

Minitool:

MiniToolBox by Farbar Version:10-01-2013

Ran by Brian (administrator) on 21-01-2013 at 14:26:02

Running from "C:\Users\Brian\Desktop"

Windows 7 Home Premium Service Pack 1 (X86)

Boot Mode: Normal

***************************************************************************

========================= Flush DNS: ===================================

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

========================= IE Proxy Settings: ==============================

Proxy is not enabled.

No Proxy Server is set.

========================= Hosts content: =================================

127.0.0.1 localhost

=========================== Installed Programs ============================

Adobe Flash Player 11 ActiveX (Version: 11.5.502.110)

Adobe Reader X (10.1.5) (Version: 10.1.5)

Coupon Printer for Windows (Version: 5.0.0.2)

Definition update for Microsoft Office 2010 (KB982726)

ESET NOD32 Antivirus (Version: 5.0.95.0)

Google Chrome (Version: 24.0.1312.52)

GoToMeeting 5.3.0.977 (Version: 5.3.0.977)

Intel® Graphics Media Accelerator Driver (Version: 8.15.10.1930)

Intel® TV Wizard

Java 7 Update 9 (Version: 7.0.90)

Java Auto Updater (Version: 2.1.9.0)

JavaFX 2.1.1 (Version: 2.1.1)

Malwarebytes Anti-Malware version 1.70.0.1100 (Version: 1.70.0.1100)

Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)

Microsoft Office Access MUI (English) 2010 (Version: 14.0.4763.1000)

Microsoft Office Access Setup Metadata MUI (English) 2010 (Version: 14.0.4763.1000)

Microsoft Office Excel MUI (English) 2010 (Version: 14.0.4763.1000)

Microsoft Office OneNote MUI (English) 2010 (Version: 14.0.4763.1000)

Microsoft Office Outlook MUI (English) 2010 (Version: 14.0.4763.1000)

Microsoft Office PowerPoint MUI (English) 2010 (Version: 14.0.4763.1000)

Microsoft Office Professional 2010 (Version: 14.0.4763.1000)

Microsoft Office Proof (English) 2010 (Version: 14.0.4763.1000)

Microsoft Office Proof (French) 2010 (Version: 14.0.4763.1000)

Microsoft Office Proof (Spanish) 2010 (Version: 14.0.4763.1000)

Microsoft Office Proofing (English) 2010 (Version: 14.0.4763.1000)

Microsoft Office Publisher MUI (English) 2010 (Version: 14.0.4763.1000)

Microsoft Office Shared MUI (English) 2010 (Version: 14.0.4763.1000)

Microsoft Office Shared Setup Metadata MUI (English) 2010 (Version: 14.0.4763.1000)

Microsoft Office Single Image 2010 (Version: 14.0.4763.1000)

Microsoft Office Word MUI (English) 2010 (Version: 14.0.4763.1000)

Microsoft Outlook Social Connector (KB2289116) ªº§ó·s

Microsoft Visual C++ 2005 Redistributable (Version: 8.0.56336)

Net Nanny Parental Controls (Version: 6.5)

ThinkPad Power Management Driver (Version: 1.43)

ThinkPad UltraNav Driver (Version: 15.0.18.0)

Update for Microsoft .NET Framework 4 Client Profile (KB2468871) (Version: 1)

Update for Microsoft .NET Framework 4 Client Profile (KB2533523) (Version: 1)

Update for Microsoft .NET Framework 4 Client Profile (KB2600217) (Version: 1)

Update for Microsoft Office 2010 (KB2202188)

Update for Microsoft Office 2010 (KB2413186)

Update for Microsoft OneNote 2010 (KB2433299)

Update for Microsoft Outlook Social Connector (KB2289116)

**** End of log ****

Farber:

Farbar Service Scanner Version: 16-01-2013

Ran by Brian (administrator) on 21-01-2013 at 14:28:14

Running from "C:\Users\Brian\Desktop"

Windows 7 Home Premium Service Pack 1 (X86)

Boot Mode: Normal

****************************************************************

Internet Services:

============

Connection Status:

==============

Localhost is accessible.

LAN connected.

Attempt to access Google IP returned error. Google IP is offline

Google.com is accessible.

Yahoo IP is accessible.

Yahoo.com is accessible.

Windows Firewall:

=============

Firewall Disabled Policy:

==================

System Restore:

============

System Restore Disabled Policy:

========================

Action Center:

============

Windows Update:

============

Windows Autoupdate Disabled Policy:

============================

Windows Defender:

==============

Other Services:

==============

File Check:

========

C:\Windows\system32\nsisvc.dll => MD5 is legit

C:\Windows\system32\Drivers\nsiproxy.sys => MD5 is legit

C:\Windows\system32\dhcpcore.dll => MD5 is legit

C:\Windows\system32\Drivers\afd.sys => MD5 is legit

C:\Windows\system32\Drivers\tdx.sys => MD5 is legit

C:\Windows\system32\Drivers\tcpip.sys => MD5 is legit

C:\Windows\system32\dnsrslvr.dll => MD5 is legit

C:\Windows\system32\mpssvc.dll => MD5 is legit

C:\Windows\system32\bfe.dll => MD5 is legit

C:\Windows\system32\Drivers\mpsdrv.sys => MD5 is legit

C:\Windows\system32\SDRSVC.dll => MD5 is legit

C:\Windows\system32\vssvc.exe => MD5 is legit

C:\Windows\system32\wscsvc.dll => MD5 is legit

C:\Windows\system32\wbem\WMIsvc.dll => MD5 is legit

C:\Windows\system32\wuaueng.dll => MD5 is legit

C:\Windows\system32\qmgr.dll => MD5 is legit

C:\Windows\system32\es.dll => MD5 is legit

C:\Windows\system32\cryptsvc.dll => MD5 is legit

C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit

C:\Windows\system32\svchost.exe => MD5 is legit

C:\Windows\system32\rpcss.dll => MD5 is legit

**** End of log ****

Link to post
Share on other sites

  • Staff

please run the following:

Visit ADOBE and download the latest version of Acrobat Reader (version XI)

Having the latest updates ensures there are no security vulnerabilities in your system.

NEXT

javaicon.gif

Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system.

Please follow these steps to remove older version of Java components and upgrade the application.

Upgrading Java:

  • Go to this site and click on "Do I have Java"
  • It will check your current version and then offer to update to the latest version
  • Watch for and make sure you untick the box next to whatever free program they prompt you to install during the installation, unless you want it.

Note: Check in Programs and Features (or Add/Remove Programs if you are an XP user) to make certain there are no old versions of Java still installed, if there are - remove them.

NEXT

Please advise how the computer is running now and if there are any outstanding issues

Link to post
Share on other sites

Successfully updated Acrobat Reader & Java.

Question - I have "JavaFX" installed on my computer. Looks to be different from Java 7; but I really don't know. Is this an older version that should be removed?

Rebooted computer and looks like everything is working well. No obvious issues right now.

Link to post
Share on other sites

  • Staff

You don't need Java FX unless you use it specifically. It is a developer tool.

also, we are recommending that Java be disabled in your browser(s)

there's more info as to why here: (it's very easily exploited)

http://www.techsupportforum.com/forums/f50/disable-java-in-browsers-683721.html

we just have some housekeeping to do now, please do the following:

You can delete the JRT and all the Farbar logs and programs from your desktop.

NEXT

Follow these steps to uninstall Combofix

  • Make sure your security programs are totally disabled.
  • Press the WinKey +R to open a run box
  • Now copy/paste Combofix /uninstall into the runbox and click OK. Note the space between the ..X and the /U, it needs to be there.

Combofix_uninstall_image.jpg

NEXT

  • Double click on adwcleaner.exe to run the tool.
  • Click on Uninstall.
  • Confirm with yes.

If there are any logs/tools remaining on your desktop > right click and delete them.

NEXT

Below I have included a number of recommendations for how to protect your computer against malware infections.

  • It is good security practice to change your passwords to all your online accounts on a fairly regular basis, this is especially true after an infection. Refer to this Microsoft article
    Strong passwords: How to create and use them
    Then consider a password keeper, to keep all your passwords safe. KeePass is a small utility that allows you to manage all your passwords.
  • Keep Windows updated by regularly checking their website at :
    http://windowsupdate.microsoft.com/
    This will ensure your computer has always the latest security updates available installed on your computer.
  • Make Internet Explorer more secure
    • Click Start > Run
    • Type Inetcpl.cpl & click OK
    • Click on the Security tab
    • Click Reset all zones to default level
    • Make sure the Internet Zone is selected & Click Custom level
    • In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
    • Next Click OK, then Apply button and then OK to exit the Internet Properties page.

    [*]Download TFC to your desktop

    • Close any open windows.
    • Double click the TFC icon to run the program
    • TFC will close all open programs itself in order to run,
    • Click the Start button to begin the process.
    • Allow TFC to run uninterrupted.
    • The program should not take long to finish it's job
    • Once its finished it should automatically reboot your machine,
    • if it doesn't, manually reboot to ensure a complete clean

    It's normal after running TFC cleaner that the PC will be slower to boot the first time.

    [*]WOT, Web of Trust, warns you about risky websites that try to scam visitors, deliver malware or send spam. Protect your computer against online threats by using WOT as your front-line layer of protection when browsing or searching in unfamiliar territory. WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites:

    • Green to go
    • Yellow for caution
    • Red to stop

    WOT has an addon available for both Firefox and IE

    [*]Keep a backup of your important files - Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.

    [*]ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.

    [*]In light of your recent issue, I'm sure you'd like to avoid any future infections. Please take a look at these well written articles:

    PC Safety and Security--What Do I Need?.

    [*]Simple and easy ways to keep your computer safe and secure on the Internet

Thank you for your patience, and performing all of the procedures requested.

Please respond one last time so we can consider the thread resolved and close it, thank-you.

Link to post
Share on other sites

Thank you very much for your help! Very appreciated.

One last question:

I do access a website for work that uses Java, but I'm starting to use Google Chrome more than IE. Any suggestions on how Java should be configured? Should I not access the website using Chrome?

Thanks again!

Link to post
Share on other sites

  • Staff

use chrome and java as you normally would to access the work website, it's random surfing that can cause issues.

If you use the Web of Trust that I linked to, that will help warn against suspicious websites. I'm sure Oracle will figure out the issues soon, so keep Java updated so you are installing the latest security patches.

Link to post
Share on other sites

  • 2 weeks later...

Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.