Jump to content

etadpug & Google Folder "access denied"


vern5
 Share

Recommended Posts

I've run several scans and have used numerous other anti-malware programs but I have'nt gotten rid of it yet.

 

I've been able to change some things (Binary) in the Registry but still have that dang Google folder with "0 bytes" in my Local Application folder.

 

Any thoughts?

 

I have a screenshot of it but don't see any way to post it :(

 

 

post-144932-0-20138500-1377994586_thumb.

Link to post
Share on other sites

  • Staff

Hello vern5

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.

Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

I would like you to run this program for me.

Please download Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

  • Double-click to run it. When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
Gringo
Link to post
Share on other sites

Thank you for your reply Gringo.

 

Here they are.

 

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 01-09-2013
Ran by Dufus (administrator) on ME on 01-09-2013 09:41:50
Running from C:\Documents and Settings\Dufus\Desktop
Microsoft Windows XP Professional Service Pack 3 (X86) OS Language: English(US)
Internet Explorer Version 8
Boot Mode: Normal

==================== Processes (Whitelisted) ===================

(Intel Corporation) C:\WINDOWS\system32\hkcmd.exe
(Intel Corporation) C:\WINDOWS\system32\igfxpers.exe
(Analog Devices, Inc.) C:\Program Files\Analog Devices\Core\smax4pnp.exe
(Intel Corporation) C:\WINDOWS\system32\igfxsrvc.exe
(Microsoft Corporation) C:\WINDOWS\system32\taskmgr.exe
(Mozilla Corporation) C:\Program Files\Mozilla Firefox\Firefox\firefox.exe

==================== Registry (Whitelisted) ==================

HKLM\...\Run: [soundMAXPnP] - C:\Program Files\Analog Devices\Core\smax4pnp.exe [1044480 2009-08-03] (Analog Devices, Inc.)
HKLM\...\Run: [MSConfig] - C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe [169984 2008-04-14] (Microsoft Corporation)
HKLM\...\Run: [sDTray] - C:\Program Files\SpyBot S&D\SDTray.exe [5624784 2013-07-25] (Safer-Networking Ltd.)
HKLM\...\RunOnce: [wdl] - C:\Program Files\Dell\Chipset Software Installer\setup.exe -S  [120040 2006-07-25] (InstallShield Software Corporation)
Winlogon\Notify\SDWinLogon: SDWinLogon.dll [X]
HKCU\...\Run: [Google Update*] -  [x] <===== ATTENTION (ZeroAccess rootkit hidden path)
HKU\Administrator.ME\...\RunOnce: [Report] - C:\AdwCleaner\AdwCleaner[s0].txt [ 2013-08-31] ()
BootExecute: autocheck autochk * sdnclean.exe

==================== Internet (Whitelisted) ====================

HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://geo.craigslist.org/iso/us/mn
HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
SearchScopes: HKLM - DefaultScope value is missing.
SearchScopes: HKCU - DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://search.live.com/results.aspx?q={searchTerms}&src=IE-SearchBox&Form=IE8SRC
SearchScopes: HKCU - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://search.live.com/results.aspx?q={searchTerms}&src=IE-SearchBox&Form=IE8SRC
DPF: {E7DA7F8D-27AB-4EE9-8FC0-3FEC9ECFE758} https://access.wisconsin.gov/access/DynamicWebTWAIN.cab
Hosts: There are more than one entry in Hosts. See Hosts section of Addition.txt
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1 192.168.1.1

FireFox:
========
FF ProfilePath: C:\Documents and Settings\Dufus\Application Data\Mozilla\Firefox\Profiles\dbvyvy0e.default

FF Extension: No Name - C:\Documents and Settings\Dufus\Application Data\Mozilla\Firefox\Profiles\dbvyvy0e.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
FF StartMenuInternet: FIREFOX.EXE - C:\Program Files\Mozilla Firefox\Firefox\firefox.exe

========================== Services (Whitelisted) =================

S2 SDScannerService; C:\Program Files\SpyBot S&D\SDFSSvc.exe [1817560 2013-05-16] (Safer-Networking Ltd.)
S2 SDUpdateService; C:\Program Files\SpyBot S&D\SDUpdSvc.exe [1033688 2013-05-16] (Safer-Networking Ltd.)
S2 SDWSCService; C:\Program Files\SpyBot S&D\SDWSCSvc.exe [171928 2013-05-15] (Safer-Networking Ltd.)
S4 HidServ; %SystemRoot%\System32\hidserv.dll [x]

==================== Drivers (Whitelisted) ====================

R3 b57w2k; C:\Windows\System32\DRIVERS\b57xp32.sys [161792 2007-06-06] (Broadcom Corporation)
S3 cpudrv; C:\Program Files\SystemRequirementsLab\cpudrv.sys [11336 2011-06-02] ()
S3 dfg; C:\WINDOWS\system32\drivers\dfg.sys [23552 2012-07-02] (defrag Development Team)
S3 mbamchameleon; C:\WINDOWS\system32\drivers\mbamchameleon.sys [48728 2013-08-31] (MalwareBytes)
S0 esoq; System32\drivers\flnb.sys [x]
S4 IntelIde; No ImagePath
S1 SASDIFSV; \??\C:\DOCUME~1\Dufus\LOCALS~1\Temp\SAS_SelfExtract\SASDIFSV.SYS [x]
S1 SASKUTIL; \??\C:\DOCUME~1\Dufus\LOCALS~1\Temp\SAS_SelfExtract\SASKUTIL.SYS [x]
U3 TrueSight; \??\C:\WINDOWS\system32\TrueSight.sys [x]
U1 WS2IFSL;

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2013-08-31 18:20 - 2013-08-31 18:20 - 00001285 _____ C:\Documents and Settings\Administrator.ME\Desktop\08-31-2013-1AdwCleaner[R0].txt
2013-08-31 18:16 - 2013-08-31 18:21 - 00000000 ____D C:\AdwCleaner
2013-08-31 18:15 - 2013-08-31 18:15 - 00994642 _____ C:\Documents and Settings\Administrator.ME\Desktop\AdwCleaner.exe
2013-08-31 18:01 - 2013-08-31 18:01 - 00002708 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[0]_S_08312013_180117.txt
2013-08-31 17:10 - 2013-08-31 17:10 - 00002675 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[0]_S_08312013_171032.txt
2013-08-31 17:01 - 2013-08-31 17:01 - 00000000 ____D C:\Documents and Settings\Administrator.ME\Application Data\Safer Networking
2013-08-31 16:48 - 2013-08-31 16:48 - 00014256 _____ C:\Documents and Settings\Administrator.ME\Desktop\08-31-2013-2Addition.txt
2013-08-31 16:46 - 2013-08-31 16:46 - 00027161 _____ C:\Documents and Settings\Administrator.ME\Desktop\FRST.txt
2013-08-31 16:46 - 2013-08-31 16:46 - 00014256 _____ C:\Documents and Settings\Administrator.ME\Desktop\Addition.txt
2013-08-31 16:45 - 2013-08-31 16:45 - 00002639 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[0]_S_08312013_164502.txt
2013-08-31 16:43 - 2013-08-31 16:43 - 00002965 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[0]_D_08312013_164336.txt
2013-08-31 16:42 - 2013-08-31 16:42 - 00002900 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[0]_S_08312013_164235.txt
2013-08-31 16:40 - 2013-08-31 16:40 - 01085269 _____ (Farbar) C:\Documents and Settings\Administrator.ME\Desktop\FRST.exe
2013-08-31 16:40 - 2013-08-31 16:40 - 00358571 _____ (Farbar) C:\Documents and Settings\Administrator.ME\Desktop\FSS.exe
2013-08-31 15:32 - 2013-08-31 16:16 - 00000000 ____D C:\Documents and Settings\All Users.WINDOWS\Application Data\Spybot - Search & Destroy
2013-08-31 15:31 - 2013-08-31 15:31 - 00001683 _____ C:\Documents and Settings\All Users.WINDOWS\Desktop\Spybot-S&D Start Center.lnk
2013-08-31 15:18 - 2013-08-31 16:20 - 00000000 ____D C:\Program Files\SpyBot S&D
2013-08-31 15:12 - 2013-08-31 15:12 - 00001938 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[1]_S_08312013_02d1512.txt
2013-08-31 15:11 - 2013-08-31 16:45 - 00000000 ____D C:\Documents and Settings\Administrator.ME\Desktop\RK_Quarantine
2013-08-31 14:54 - 2013-08-31 14:54 - 00012881 _____ C:\Documents and Settings\Administrator.ME\Desktop\08-31-2013-1FRST.txt
2013-08-31 14:52 - 2013-08-31 14:53 - 00000000 ____D C:\FRST
2013-08-31 14:51 - 2013-08-31 16:36 - 00913408 _____ C:\Documents and Settings\Administrator.ME\Desktop\RogueKiller.exe
2013-08-31 14:51 - 2013-02-24 18:27 - 00078160 _____ (Microsoft Corporation) C:\Documents and Settings\Administrator.ME\Desktop\AutoFix.exe
2013-08-31 14:32 - 2013-08-31 18:27 - 00000000 ____D C:\Documents and Settings\All Users.WINDOWS\Application Data\Malwarebytes' Anti-Malware (portable)
2013-08-31 14:28 - 2013-08-31 14:45 - 00000000 ____D C:\Documents and Settings\Administrator.ME\Desktop\mbar
2013-08-31 14:28 - 2013-08-31 14:28 - 00048728 _____ (MalwareBytes) C:\WINDOWS\system32\Drivers\mbamchameleon.sys
2013-08-31 14:24 - 2013-08-31 14:27 - 12907592 _____ (Malwarebytes Corp.) C:\Documents and Settings\Administrator.ME\Desktop\mbar-1.07.0.1005.exe
2013-08-30 18:00 - 2013-08-30 17:59 - 00090112 _____ C:\WINDOWS\Minidump\Mini083013-01.dmp
2013-08-30 17:59 - 2013-08-30 17:59 - 00034816 _____ C:\WINDOWS\system32\Drivers\rootrepeal.sys
2013-08-30 17:57 - 2013-08-30 18:36 - 00000510 _____ C:\WINDOWS\Tasks\RegSERVO.job
2013-08-30 17:57 - 2013-08-30 17:57 - 00000000 ____D C:\Documents and Settings\All Users.WINDOWS\Application Data\RegSERVO
2013-08-30 17:52 - 2013-08-30 17:55 - 00000000 ____D C:\Program Files\RegZooka
2013-08-30 17:52 - 2013-08-30 17:52 - 00021412 _____ C:\Documents and Settings\Dufus\Desktop\Extras.Txt
2013-08-30 17:52 - 2013-08-30 17:52 - 00000732 _____ C:\Documents and Settings\Administrator.ME\Desktop\RegZooka.lnk
2013-08-30 17:48 - 2013-08-30 17:48 - 00000000 ____D C:\Program Files\HitmanPro
2013-08-30 17:48 - 2013-08-30 17:48 - 00000000 ____D C:\Documents and Settings\All Users.WINDOWS\Application Data\HitmanPro
2013-08-30 17:07 - 2013-08-30 17:07 - 00000000 ____D C:\MGTools
2013-08-30 17:05 - 2013-08-30 17:05 - 00012714 _____ C:\Documents and Settings\Dufus\Desktop\Attach.txt
2013-08-30 17:05 - 2013-08-30 17:05 - 00003704 _____ C:\Documents and Settings\Dufus\Desktop\DDS.txt
2013-08-30 16:58 - 2013-08-30 16:58 - 00000000 ____D C:\Program Files\HijackThis
2013-08-29 12:51 - 2013-08-29 13:03 - 00000319 _____ C:\Documents and Settings\Dufus\Desktop\anna.txt
2013-08-29 12:46 - 2013-08-29 12:46 - 00001552 _____ C:\WINDOWS\setupapi.log
2013-08-28 13:02 - 2013-08-28 13:02 - 00000086 _____ C:\Documents and Settings\Dufus\Desktop\boob.txt
2013-08-26 17:48 - 2013-08-26 17:48 - 00000113 _____ C:\Documents and Settings\Dufus\Desktop\HI.txt
2013-08-25 11:37 - 2013-08-25 11:37 - 00000044 _____ C:\Documents and Settings\Dufus\Desktop\creme.txt
2013-08-21 18:28 - 2013-08-21 18:55 - 00000200 _____ C:\Documents and Settings\Dufus\Desktop\nar.txt
2013-08-18 19:13 - 2013-08-18 19:13 - 00000216 _____ C:\Documents and Settings\Dufus\Desktop\sys.txt
2013-08-17 17:19 - 2013-08-17 17:19 - 00000090 _____ C:\Documents and Settings\Dufus\Desktop\yah-gone.txt
2013-08-14 09:23 - 2013-08-14 09:23 - 00000000 ____D C:\Program Files\mmm
2013-08-14 09:23 - 2013-08-14 09:23 - 00000000 ____D C:\Documents and Settings\Dufus\Local Settings\Application Data\Google
2013-08-12 19:08 - 2013-08-12 19:08 - 00000019 _____ C:\Documents and Settings\Dufus\Desktop\norris.txt
2013-08-08 13:08 - 2013-08-08 13:08 - 00000642 _____ C:\Documents and Settings\Dufus\Desktop\SumatraPDF.lnk
2013-08-08 08:42 - 2013-08-08 08:42 - 00022582 _____ C:\Documents and Settings\Dufus\My Documents\8 Delicious Cooking Oils You Aren't Using.txt
2013-08-08 08:40 - 2013-08-22 18:32 - 00000313 _____ C:\Documents and Settings\Dufus\Desktop\fb.txt
2013-08-05 19:58 - 2013-08-05 19:58 - 00000049 _____ C:\Documents and Settings\Dufus\Desktop\nnnn.txt
2013-08-03 09:33 - 2013-08-03 09:33 - 00000000 __SHD C:\Documents and Settings\Administrator.ME\IECompatCache
2013-08-03 09:32 - 2013-08-03 09:32 - 00000000 __SHD C:\Documents and Settings\Administrator.ME\PrivacIE

==================== One Month Modified Files and Folders =======

2013-09-01 09:40 - 2013-02-24 17:05 - 01085571 _____ (Farbar) C:\Documents and Settings\Dufus\Desktop\FRST.exe
2013-09-01 09:25 - 2013-02-23 06:24 - 00000159 _____ C:\WINDOWS\wiadebug.log
2013-09-01 09:25 - 2013-02-23 06:24 - 00000048 _____ C:\WINDOWS\wiaservc.log
2013-09-01 07:22 - 2013-05-11 07:29 - 00032566 _____ C:\WINDOWS\SchedLgU.Txt
2013-09-01 07:22 - 2013-02-23 14:36 - 00000006 ____H C:\WINDOWS\Tasks\SA.DAT
2013-09-01 07:22 - 2011-02-04 12:29 - 00000310 ___SH C:\boot.ini
2013-09-01 07:22 - 2008-04-14 05:00 - 00000541 _____ C:\WINDOWS\win.ini
2013-09-01 07:22 - 2008-04-14 05:00 - 00000227 _____ C:\WINDOWS\system.ini
2013-09-01 07:21 - 2013-06-03 17:39 - 00101098 _____ C:\WINDOWS\KB921411.log
2013-08-31 19:37 - 2013-03-02 10:00 - 00001528 _____ C:\Documents and Settings\Dufus\Desktop\chmuz.txt
2013-08-31 19:18 - 2013-08-31 19:18 - 00000157 _____ C:\Documents and Settings\Dufus\Desktop\mwb.txt
2013-08-31 18:32 - 2013-02-23 14:30 - 01226620 _____ C:\WINDOWS\WindowsUpdate.log
2013-08-31 18:27 - 2013-08-31 14:32 - 00000000 ____D C:\Documents and Settings\All Users.WINDOWS\Application Data\Malwarebytes' Anti-Malware (portable)
2013-08-31 18:25 - 2013-02-23 17:52 - 00524288 _____ C:\WINDOWS\system32\config\SpybotSD.evt
2013-08-31 18:25 - 2013-02-23 15:55 - 00000178 ___SH C:\Documents and Settings\Administrator.ME\ntuser.ini
2013-08-31 18:21 - 2013-08-31 18:16 - 00000000 ____D C:\AdwCleaner
2013-08-31 18:20 - 2013-08-31 18:20 - 00001285 _____ C:\Documents and Settings\Administrator.ME\Desktop\08-31-2013-1AdwCleaner[R0].txt
2013-08-31 18:15 - 2013-08-31 18:15 - 00994642 _____ C:\Documents and Settings\Administrator.ME\Desktop\AdwCleaner.exe
2013-08-31 18:01 - 2013-08-31 18:01 - 00002708 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[0]_S_08312013_180117.txt
2013-08-31 17:10 - 2013-08-31 17:10 - 00002675 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[0]_S_08312013_171032.txt
2013-08-31 17:01 - 2013-08-31 17:01 - 00000000 ____D C:\Documents and Settings\Administrator.ME\Application Data\Safer Networking
2013-08-31 16:48 - 2013-08-31 16:48 - 00014256 _____ C:\Documents and Settings\Administrator.ME\Desktop\08-31-2013-2Addition.txt
2013-08-31 16:46 - 2013-08-31 16:46 - 00027161 _____ C:\Documents and Settings\Administrator.ME\Desktop\FRST.txt
2013-08-31 16:46 - 2013-08-31 16:46 - 00014256 _____ C:\Documents and Settings\Administrator.ME\Desktop\Addition.txt
2013-08-31 16:45 - 2013-08-31 16:45 - 00002639 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[0]_S_08312013_164502.txt
2013-08-31 16:45 - 2013-08-31 15:11 - 00000000 ____D C:\Documents and Settings\Administrator.ME\Desktop\RK_Quarantine
2013-08-31 16:45 - 2013-02-23 06:20 - 00000000 ___HD C:\Documents and Settings\Default User.WINDOWS
2013-08-31 16:43 - 2013-08-31 16:43 - 00002965 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[0]_D_08312013_164336.txt
2013-08-31 16:42 - 2013-08-31 16:42 - 00002900 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[0]_S_08312013_164235.txt
2013-08-31 16:40 - 2013-08-31 16:40 - 01085269 _____ (Farbar) C:\Documents and Settings\Administrator.ME\Desktop\FRST.exe
2013-08-31 16:40 - 2013-08-31 16:40 - 00358571 _____ (Farbar) C:\Documents and Settings\Administrator.ME\Desktop\FSS.exe
2013-08-31 16:36 - 2013-08-31 14:51 - 00913408 _____ C:\Documents and Settings\Administrator.ME\Desktop\RogueKiller.exe
2013-08-31 16:20 - 2013-08-31 15:18 - 00000000 ____D C:\Program Files\SpyBot S&D
2013-08-31 16:16 - 2013-08-31 15:32 - 00000000 ____D C:\Documents and Settings\All Users.WINDOWS\Application Data\Spybot - Search & Destroy
2013-08-31 15:31 - 2013-08-31 15:31 - 00001683 _____ C:\Documents and Settings\All Users.WINDOWS\Desktop\Spybot-S&D Start Center.lnk
2013-08-31 15:12 - 2013-08-31 15:12 - 00001938 _____ C:\Documents and Settings\Administrator.ME\Desktop\RKreport[1]_S_08312013_02d1512.txt
2013-08-31 15:07 - 2013-02-23 17:51 - 00000000 ____D C:\Program Files\Spybot
2013-08-31 14:54 - 2013-08-31 14:54 - 00012881 _____ C:\Documents and Settings\Administrator.ME\Desktop\08-31-2013-1FRST.txt
2013-08-31 14:53 - 2013-08-31 14:52 - 00000000 ____D C:\FRST
2013-08-31 14:45 - 2013-08-31 14:28 - 00000000 ____D C:\Documents and Settings\Administrator.ME\Desktop\mbar
2013-08-31 14:28 - 2013-08-31 14:28 - 00048728 _____ (MalwareBytes) C:\WINDOWS\system32\Drivers\mbamchameleon.sys
2013-08-31 14:27 - 2013-08-31 14:24 - 12907592 _____ (Malwarebytes Corp.) C:\Documents and Settings\Administrator.ME\Desktop\mbar-1.07.0.1005.exe
2013-08-31 13:13 - 2012-01-02 13:40 - 00000000 ____D C:\Program Files\SuperAntiSpyware
2013-08-31 13:04 - 2011-03-02 18:24 - 00000000 __SHD C:\WINDOWS\CSC
2013-08-31 13:01 - 2011-02-04 12:24 - 00000000 ____D C:\WINDOWS\pchealth
2013-08-31 12:53 - 2013-02-23 14:37 - 00000178 ___SH C:\Documents and Settings\Dufus\ntuser.ini
2013-08-30 18:36 - 2013-08-30 17:57 - 00000510 _____ C:\WINDOWS\Tasks\RegSERVO.job
2013-08-30 18:00 - 2011-09-22 21:01 - 00000000 ____D C:\WINDOWS\Minidump
2013-08-30 17:59 - 2013-08-30 18:00 - 00090112 _____ C:\WINDOWS\Minidump\Mini083013-01.dmp
2013-08-30 17:59 - 2013-08-30 17:59 - 00034816 _____ C:\WINDOWS\system32\Drivers\rootrepeal.sys
2013-08-30 17:57 - 2013-08-30 17:57 - 00000000 ____D C:\Documents and Settings\All Users.WINDOWS\Application Data\RegSERVO
2013-08-30 17:57 - 2013-02-25 10:03 - 00000850 _____ C:\Documents and Settings\Dufus\Desktop\Shortcut to Chris.lnk
2013-08-30 17:55 - 2013-08-30 17:52 - 00000000 ____D C:\Program Files\RegZooka
2013-08-30 17:52 - 2013-08-30 17:52 - 00021412 _____ C:\Documents and Settings\Dufus\Desktop\Extras.Txt
2013-08-30 17:52 - 2013-08-30 17:52 - 00000732 _____ C:\Documents and Settings\Administrator.ME\Desktop\RegZooka.lnk
2013-08-30 17:48 - 2013-08-30 17:48 - 00000000 ____D C:\Program Files\HitmanPro
2013-08-30 17:48 - 2013-08-30 17:48 - 00000000 ____D C:\Documents and Settings\All Users.WINDOWS\Application Data\HitmanPro
2013-08-30 17:07 - 2013-08-30 17:07 - 00000000 ____D C:\MGTools
2013-08-30 17:07 - 2008-04-14 05:00 - 00013646 _____ C:\WINDOWS\system32\wpa.dbl
2013-08-30 17:05 - 2013-08-30 17:05 - 00012714 _____ C:\Documents and Settings\Dufus\Desktop\Attach.txt
2013-08-30 17:05 - 2013-08-30 17:05 - 00003704 _____ C:\Documents and Settings\Dufus\Desktop\DDS.txt
2013-08-30 16:58 - 2013-08-30 16:58 - 00000000 ____D C:\Program Files\HijackThis
2013-08-29 13:03 - 2013-08-29 12:51 - 00000319 _____ C:\Documents and Settings\Dufus\Desktop\anna.txt
2013-08-29 12:46 - 2013-08-29 12:46 - 00001552 _____ C:\WINDOWS\setupapi.log
2013-08-28 13:02 - 2013-08-28 13:02 - 00000086 _____ C:\Documents and Settings\Dufus\Desktop\boob.txt
2013-08-26 17:48 - 2013-08-26 17:48 - 00000113 _____ C:\Documents and Settings\Dufus\Desktop\HI.txt
2013-08-25 11:37 - 2013-08-25 11:37 - 00000044 _____ C:\Documents and Settings\Dufus\Desktop\creme.txt
2013-08-22 18:32 - 2013-08-08 08:40 - 00000313 _____ C:\Documents and Settings\Dufus\Desktop\fb.txt
2013-08-21 18:55 - 2013-08-21 18:28 - 00000200 _____ C:\Documents and Settings\Dufus\Desktop\nar.txt
2013-08-18 19:13 - 2013-08-18 19:13 - 00000216 _____ C:\Documents and Settings\Dufus\Desktop\sys.txt
2013-08-18 11:31 - 2013-02-25 18:41 - 00000000 ____D C:\Documents and Settings\Dufus\Application Data\Applian FLV and Media Player
2013-08-17 17:19 - 2013-08-17 17:19 - 00000090 _____ C:\Documents and Settings\Dufus\Desktop\yah-gone.txt
2013-08-16 19:11 - 2013-04-04 09:17 - 00000000 ____D C:\Program Files\Mozilla Maintenance Service
2013-08-16 19:11 - 2013-03-19 11:55 - 00000000 ____D C:\Program Files\Mozilla Firefox
2013-08-14 09:23 - 2013-08-14 09:23 - 00000000 ____D C:\Program Files\mmm
2013-08-14 09:23 - 2013-08-14 09:23 - 00000000 ____D C:\Documents and Settings\Dufus\Local Settings\Application Data\Google
2013-08-12 19:08 - 2013-08-12 19:08 - 00000019 _____ C:\Documents and Settings\Dufus\Desktop\norris.txt
2013-08-08 13:25 - 2011-04-03 11:00 - 00000000 ____D C:\Program Files\SumatraPDF
2013-08-08 13:08 - 2013-08-08 13:08 - 00000642 _____ C:\Documents and Settings\Dufus\Desktop\SumatraPDF.lnk
2013-08-08 13:08 - 2013-03-08 16:24 - 00000000 ____D C:\Documents and Settings\Dufus\Application Data\SumatraPDF
2013-08-08 08:42 - 2013-08-08 08:42 - 00022582 _____ C:\Documents and Settings\Dufus\My Documents\8 Delicious Cooking Oils You Aren't Using.txt
2013-08-07 11:27 - 2013-02-25 12:51 - 00000000 ____D C:\Documents and Settings\Dufus\My Documents\2011
2013-08-05 19:58 - 2013-08-05 19:58 - 00000049 _____ C:\Documents and Settings\Dufus\Desktop\nnnn.txt
2013-08-03 09:33 - 2013-08-03 09:33 - 00000000 __SHD C:\Documents and Settings\Administrator.ME\IECompatCache
2013-08-03 09:33 - 2013-02-23 15:55 - 00000000 ____D C:\Documents and Settings\Administrator.ME
2013-08-03 09:32 - 2013-08-03 09:32 - 00000000 __SHD C:\Documents and Settings\Administrator.ME\PrivacIE

==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => MD5 is legit
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== End Of Log ============================

 

 

Addition.txt

Link to post
Share on other sites

  • Staff

Hello vern5

I need you to download this script I have made for you --> fixlist.txt

It needs to be saved Next to the "Farbar Recovery Scan Tool" (FRST) program (If asked to overwrite existing one please allow)

Run FRST again but this time press the Fix button just once and wait.

When finished, it will make a log (fixlog.txt) next to FRST. Please copy and paste the content of this file to your reply.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Gringo

Link to post
Share on other sites

Here it is.

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 01-09-2013
Ran by Dufus at 2013-09-01 11:59:41 Run:1
Running from C:\Documents and Settings\Dufus\Desktop
Boot Mode: Normal

==============================================

Content of fixlist:
*****************
HKCU\...\Run: [Google Update*] -  [x] <===== ATTENTION (ZeroAccess rootkit hidden path)
S1 SASDIFSV; \??\C:\DOCUME~1\Dufus\LOCALS~1\Temp\SAS_SelfExtract\SASDIFSV.SYS [x]
S1 SASKUTIL; \??\C:\DOCUME~1\Dufus\LOCALS~1\Temp\SAS_SelfExtract\SASKUTIL.SYS [x]





*****************

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\\Google Update* => Value deleted successfully.
SASDIFSV => Service deleted successfully.
SASKUTIL => Service deleted successfully.

==== End of Fixlog ====

Link to post
Share on other sites

  • Staff

Hello vern5

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[s1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.

  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo

Link to post
Share on other sites

Here are the 2 logs.

 

Operationally no difference (I wasn't having any real problems before) but the Google folder in the screenshot up above is still there :(

 

# AdwCleaner v3.001 - Report created 01/09/2013 at 13:01:34
# Updated 24/08/2013 by Xplode
# Operating System : Microsoft Windows XP Service Pack 3 (32 bits)
# Username : Dufus - ME
# Running from : C:\Documents and Settings\Dufus\Desktop\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****


***** [ Files / Folders ] *****

Folder Deleted : C:\Documents and Settings\Dufus\IECompatCache
Folder Deleted : C:\Documents and Settings\Administrator.ME\IECompatCache

***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\grusskartencenter.com
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\EscDomains\grusskartencenter.com
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EF99BD32-C1FB-11D2-892F-0090271D4F88}

***** [ Browsers ] *****

-\\ Internet Explorer v8.0.6001.18702


-\\ Mozilla Firefox v23.0.1 (en-US)

[ File : C:\Documents and Settings\Dufus\Application Data\Mozilla\Firefox\Profiles\dbvyvy0e.default\prefs.js ]


[ File : C:\Documents and Settings\Administrator.ME\Application Data\Mozilla\Firefox\Profiles\xouh30s3.default\prefs.js ]


*************************

AdwCleaner[R0].txt - [1285 octets] - [31/08/2013 18:16:47]
AdwCleaner[R1].txt - [1856 octets] - [01/09/2013 12:59:45]
AdwCleaner[s0].txt - [1360 octets] - [31/08/2013 18:21:01]
AdwCleaner[s1].txt - [1797 octets] - [01/09/2013 13:01:34]

########## EOF - C:\AdwCleaner\AdwCleaner[s1].txt - [1857 octets] ##########
 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 5.5.6 (08.30.2013:1)
OS: Microsoft Windows XP x86
Ran by Dufus on Sun 09/01/2013 at 13:04:01.79
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values

Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\DisplayName
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\URL



~~~ Registry Keys



~~~ Files



~~~ Folders

Successfully deleted: [Folder] "C:\Program Files\regzooka"





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sun 09/01/2013 at 13:07:27.85
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

Link to post
Share on other sites

  • Staff

Hello vern5

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.

1. Close any open browsers or any other programs that are open.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.

When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
Link to post
Share on other sites

I had to install the Recovery Console.

 

Here's the log from ComboFix. The Google folder still remains...and I see I have another one in Program Files that's the same. (screenshot)

 

ComboFix 13-09-01.02 - Dufus 09/01/2013  16:06:48.1.2 - x86
Microsoft Windows XP Professional  5.1.2600.3.1252.1.1033.18.2038.1703 [GMT -7:00]
Running from: c:\documents and settings\Dufus\Desktop\ComboFix.exe
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\program files\Google\Desktop\Install
c:\program files\Google\Desktop\Install\{2a6c4bcb-b0ef-c7b7-d0d2-3ae9e7762a0f}\0103~1\0103~1\CFFE~1\{2a6c4bcb-b0ef-c7b7-d0d2-3ae9e7762a0f}\@
.
.
(((((((((((((((((((((((((   Files Created from 2013-08-01 to 2013-09-01  )))))))))))))))))))))))))))))))
.
.
2013-09-01 20:42 . 2013-09-01 20:53    --------    d-----w-    c:\program files\Spybot - Search & Destroy 2
2013-09-01 20:04 . 2013-09-01 20:04    --------    d-----w-    c:\windows\ERUNT
2013-09-01 01:16 . 2013-09-01 20:01    --------    d-----w-    C:\AdwCleaner
2013-09-01 00:01 . 2013-09-01 00:01    --------    d-----w-    c:\documents and settings\Administrator.ME\Application Data\Safer Networking
2013-08-31 22:32 . 2013-08-31 23:16    --------    d-----w-    c:\documents and settings\All Users.WINDOWS\Application Data\Spybot - Search & Destroy
2013-08-31 22:18 . 2013-09-01 20:38    --------    d-----w-    c:\program files\SpyBot S&D
2013-08-31 21:52 . 2013-08-31 21:53    --------    d-----w-    C:\FRST
2013-08-31 21:32 . 2013-09-01 01:27    --------    d-----w-    c:\documents and settings\All Users.WINDOWS\Application Data\Malwarebytes' Anti-Malware (portable)
2013-08-31 21:28 . 2013-08-31 21:28    48728    ----a-w-    c:\windows\system32\drivers\mbamchameleon.sys
2013-08-31 00:59 . 2013-08-31 00:59    34816    ----a-w-    c:\windows\system32\drivers\rootrepeal.sys
2013-08-31 00:57 . 2013-08-31 00:57    --------    d-----w-    c:\documents and settings\All Users.WINDOWS\Application Data\RegSERVO
2013-08-31 00:48 . 2013-08-31 00:48    --------    d-----w-    c:\program files\HitmanPro
2013-08-31 00:48 . 2013-08-31 00:48    --------    d-----w-    c:\documents and settings\All Users.WINDOWS\Application Data\HitmanPro
2013-08-31 00:07 . 2013-08-31 00:07    --------    d-----w-    C:\MGTools
2013-08-17 02:10 . 2013-03-07 14:30    2106216    ----a-w-    c:\program files\Mozilla Firefox\Firefox\D3DCompiler_43.dll
2013-08-17 02:10 . 2013-03-07 14:30    770384    ----a-w-    c:\program files\Mozilla Firefox\Firefox\msvcr100.dll
2013-08-17 02:10 . 2013-03-07 14:30    421200    ----a-w-    c:\program files\Mozilla Firefox\Firefox\msvcp100.dll
2013-08-17 02:10 . 2013-08-17 02:11    74136    ----a-w-    c:\program files\Mozilla Firefox\Firefox\breakpadinjector.dll
2013-08-17 02:10 . 2013-08-17 02:11    19352    ----a-w-    c:\program files\Mozilla Firefox\Firefox\AccessibleMarshal.dll
2013-08-14 16:23 . 2013-08-14 16:23    --------    d-----w-    c:\program files\Google
2013-08-14 16:23 . 2013-08-14 16:23    --------    d-----w-    c:\documents and settings\Dufus\Local Settings\Application Data\Google
2013-08-03 16:32 . 2013-08-03 16:32    --------    d-sh--w-    c:\documents and settings\Administrator.ME\PrivacIE
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-05-30 150040]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-05-30 170520]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-05-30 141848]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2009-08-03 1044480]
"SDTray"="c:\program files\Spybot - Search & Destroy 2\SDTray.exe" [2013-07-25 5624784]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wdl"="c:\program files\Dell\Chipset Software Installer\setup.exe" [2006-07-25 120040]
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute    REG_MULTI_SZ       autocheck autochk *\0\0sdnclean.exe
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro36]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro36.sys]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoundMAXPnP]
2009-08-03 21:59    1044480    ----a-w-    c:\program files\Analog Devices\Core\smax4pnp.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"wuauserv"=2 (0x2)
"srservice"=2 (0x2)
"Spooler"=3 (0x3)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Spybot - Search & Destroy 2\\SDTray.exe"=
"c:\\Program Files\\Spybot - Search & Destroy 2\\SDFSSvc.exe"=
"c:\\Program Files\\Spybot - Search & Destroy 2\\SDUpdate.exe"=
"c:\\Program Files\\Spybot - Search & Destroy 2\\SDUpdSvc.exe"=
.
R2 SDUpdateService;Spybot-S&D 2 Updating Service;c:\program files\Spybot - Search & Destroy 2\SDUpdSvc.exe [9/1/2013 1:42 PM 1033688]
S0 esoq;esoq;c:\windows\system32\drivers\flnb.sys --> c:\windows\system32\drivers\flnb.sys [?]
S2 SDScannerService;Spybot-S&D 2 Scanner Service;c:\program files\Spybot - Search & Destroy 2\SDFSSvc.exe [9/1/2013 1:42 PM 1817560]
S2 SDWSCService;Spybot-S&D 2 Security Center Service;c:\program files\Spybot - Search & Destroy 2\SDWSCSvc.exe [9/1/2013 1:42 PM 171928]
S3 cpudrv;cpudrv;c:\program files\SystemRequirementsLab\cpudrv.sys [6/2/2011 11:08 AM 11336]
S3 dfg;dfg;c:\windows\system32\drivers\dfg.sys [7/2/2012 11:43 AM 23552]
S3 mbamchameleon;mbamchameleon;c:\windows\system32\drivers\mbamchameleon.sys [8/31/2013 2:28 PM 48728]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - SDSCANNERSERVICE
*NewlyCreated* - SDUPDATESERVICE
*NewlyCreated* - SDWSCSERVICE
.
Contents of the 'Scheduled Tasks' folder
.
2013-09-01 c:\windows\Tasks\Check for updates (Spybot - Search & Destroy).job
- c:\program files\Spybot - Search & Destroy 2\SDUpdate.exe [2013-09-01 17:58]
.
2013-09-01 c:\windows\Tasks\Refresh immunization (Spybot - Search & Destroy).job
- c:\program files\Spybot - Search & Destroy 2\SDImmunize.exe [2013-09-01 17:57]
.
.
------- Supplementary Scan -------
.

uInternet Settings,ProxyServer = localhost:21320
Trusted Zone: wisconsin.gov\access
TCP: DhcpNameServer = 192.168.1.1 192.168.1.1

FF - ProfilePath - c:\documents and settings\Dufus\Application Data\Mozilla\Firefox\Profiles\dbvyvy0e.default\

.
- - - - ORPHANS REMOVED - - - -
.
Notify-SDWinLogon - SDWinLogon.dll
SafeBoot-mbamchameleon
MSConfigStartUp-SDTray - c:\program files\Spybot\SDTray.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-09-01 16:09
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ...
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Completion time: 2013-09-01  16:11:09
ComboFix-quarantined-files.txt  2013-09-01 23:11
.
Pre-Run: 71,730,610,176 bytes free
Post-Run: 71,696,379,904 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
[spybotsd]
timeout.old=30
.
- - End Of File - - E6BB745CD0BCAE6EECE184551704DD9E
8F558EB6672622401DA993E1E865C861
 

 

 

post-144932-0-97389200-1378070848_thumb.

Link to post
Share on other sites

  • Staff

Hello vern5

I need you to download this script I have made for you --> fixlist.txt

It needs to be saved Next to the "Farbar Recovery Scan Tool" (FRST) program (If asked to overwrite existing one please allow)

Run FRST again but this time press the Fix button just once and wait.

When finished, it will make a log (fixlog.txt) next to FRST. Please copy and paste the content of this file to your reply.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Gringo

Link to post
Share on other sites

I took a look at your fixlist after I downloaded it.

 

Since it mentioned only the Google folder in my "Applications" folder, I made a copy of it.

 

After I did the 1st FRST fix I noticed that the Google folder in my Program was still there, so I modified you original fixlist.txt to show the path for that one.

 

Both have been "moved" (FRST logs below). :)

 

I hope you aren't angry with what I did. :wacko:

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 01-09-2013
Ran by Dufus at 2013-09-01 17:31:30 Run:2
Running from C:\Documents and Settings\Dufus\Desktop
Boot Mode: Normal

==============================================

Content of fixlist:
*****************
2013-08-14 09:23 - 2013-08-14 09:23 - 00000000 ____D C:\Documents and Settings\Dufus\Local Settings\Application Data\Google




*****************

C:\Documents and Settings\Dufus\Local Settings\Application Data\Google => Moved successfully.

==== End of Fixlog ====

 

 

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 01-09-2013
Ran by Dufus at 2013-09-01 17:35:56 Run:3
Running from C:\Documents and Settings\Dufus\Desktop
Boot Mode: Normal

==============================================

Content of fixlist:
*****************
2013-08-14 09:23 - 2013-08-14 09:23 - 00000000 ____D C:\Program Files\Google




*****************

C:\Program Files\Google => Moved successfully.

==== End of Fixlog ====

Link to post
Share on other sites

  • Staff

Hello vern5

I would like to see a report that combofix makes.

extra combofix report

  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box
C:\Qoobox\Add-Remove Programs.txt
  • click ok
copy and paste the report into this topic for me to review

Gringo

Link to post
Share on other sites

Here it is...looks good to me. Thank you for your help.

 

Applian FLV and Media Player 3.1.1.12
Broadcom Gigabit Integrated Controller
Broadcom Management Programs
High Definition Audio Driver Package - KB835221
Hotfix for Windows XP (KB2779562)
Hotfix for Windows XP (KB952287)
Intel® Graphics Media Accelerator Driver
K-Lite Codec Pack 9.7.5 (Standard)
Malwarebytes Anti-Malware version 1.75.0.1300
Microsoft Compression Client Pack 1.0 for Windows XP
Microsoft User-Mode Driver Framework Feature Pack 1.0
Mozilla Firefox 23.0.1 (x86 en-US)
Mozilla Maintenance Service
PlanMaker Viewer
Realtek AC'97 Audio
Realtek High Definition Audio Driver
RegAlyzer
Security Update for Windows Internet Explorer 8 (KB2618444)
Security Update for Windows Internet Explorer 8 (KB2744842)
Security Update for Windows Internet Explorer 8 (KB2792100)
Security Update for Windows Internet Explorer 8 (KB982381)
Security Update for Windows Media Player (KB2378111)
Security Update for Windows Media Player (KB952069)
Security Update for Windows Media Player (KB954155)
Security Update for Windows Media Player (KB973540)
Security Update for Windows Media Player (KB975558)
Security Update for Windows Media Player (KB978695)
Security Update for Windows XP (KB2229593)
Security Update for Windows XP (KB2296011)
Security Update for Windows XP (KB2360937)
Security Update for Windows XP (KB2393802)
Security Update for Windows XP (KB2423089)
Security Update for Windows XP (KB2440591)
Security Update for Windows XP (KB2485663)
Security Update for Windows XP (KB2535512)
Security Update for Windows XP (KB2536276-v2)
Security Update for Windows XP (KB2566454)
Security Update for Windows XP (KB2570947)
Security Update for Windows XP (KB2592799)
Security Update for Windows XP (KB2603381)
Security Update for Windows XP (KB2618451)
Security Update for Windows XP (KB2661637)
Security Update for Windows XP (KB2686509)
Security Update for Windows XP (KB2698365)
Security Update for Windows XP (KB2723135-v2)
Security Update for Windows XP (KB2753842-v2)
Security Update for Windows XP (KB923561)
Security Update for Windows XP (KB950762)
Security Update for Windows XP (KB956572)
Security Update for Windows XP (KB956744)
Security Update for Windows XP (KB956844)
Security Update for Windows XP (KB972270)
Security Update for Windows XP (KB973869)
Security Update for Windows XP (KB973904)
Security Update for Windows XP (KB979309)
Security Update for Windows XP (KB981997)
SoundMAX
Spybot - Search & Destroy
System Requirements Lab for Intel
TextMaker Viewer
Update for Windows Internet Explorer 8 (KB2598845)
Update for Windows XP (KB2467659)
Update for Windows XP (KB2736233)
Update for Windows XP (KB898461)
Update for Windows XP (KB955759)
WebFldrs XP
Windows Internet Explorer 8
Windows Media Format 11 runtime
Windows Media Player 11
 

Link to post
Share on other sites

  • Staff

Hello

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

Clean Out Temp Files

  • This small application you may want to keep and use once a week to keep the computer clean.

    Download CCleaner from here CCleaner

    • Run the installer to install the application.
    • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
    • Run CCleaner. default settings are fine
    • Click Run Cleaner.
    • Close CCleaner.
: Malwarebytes' Anti-Malware :

I see that you have MBAM installed - That is great!! and at this time I would like you to update it and run me a quick scan

  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.

Click OK to either and let MBAM proceed with the disinfection process.

If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

Download HijackThis

  • Go Here to download HijackThis program
  • Save HijackThis to your desktop.
  • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
  • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
  • copy and paste hijackthis report into the topic
"information and logs"
  • In your next post I need the following
    • Log From MBAM
    • report from Hijackthis
    • let me know of any problems you may have had
    • How is the computer doing now?
Gringo
Link to post
Share on other sites

Here they are. Mouse cursor locks up from time to time, but it's been doing that for months.

 

No other issues.

 

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 3:21:01 PM, on 9/2/2013
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe
C:\Documents and Settings\Dufus\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://geo.craigslist.org/iso/us/mn
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = localhost:21320
O4 - HKLM\..\Run: [igfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [soundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe
O4 - HKLM\..\Run: [sDTray] "C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe"
O4 - HKLM\..\RunOnce: [wdl] C:\Program Files\Dell\Chipset Software Installer\setup.exe -S
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {E7DA7F8D-27AB-4EE9-8FC0-3FEC9ECFE758} (DynamicWebTwain Class) - https://access.wisconsin.gov/access/DynamicWebTWAIN.cab
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Mozilla Maintenance Service (MozillaMaintenance) - Mozilla Foundation - C:\Program Files\Mozilla Maintenance Service\maintenanceservice.exe
O23 - Service: Spybot-S&D 2 Scanner Service (SDScannerService) - Safer-Networking Ltd. - C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe
O23 - Service: Spybot-S&D 2 Updating Service (SDUpdateService) - Safer-Networking Ltd. - C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe
O23 - Service: Spybot-S&D 2 Security Center Service (SDWSCService) - Safer-Networking Ltd. - C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe

--
End of file - 3434 bytes
 

 

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

 

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2013.09.02.08

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Dufus :: ME [administrator]

9/2/2013 3:10:00 PM
mbam-log-2013-09-02 (15-10-00).txt

Scan type: Full scan (C:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM | P2P
Scan options disabled:
Objects scanned: 240507
Time elapsed: 10 minute(s), 6 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)
 

Link to post
Share on other sites

  • Staff

Greetings

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded start-up entries:

This part of the fix is purely optional

These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

  • Run HijackThis (rightclick and run as admin)
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):
    • O4 - HKLM\..\Run: [igfxTray] C:\WINDOWS\system32\igfxtray.exe
  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

    • NOTE**You can research each of those lines >here< and see if you want to keep them or not

      just copy the name between the brackets and paste into the search space

      O4 - HKLM\..\Run: [IntelliPoint]

Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scanner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the Run ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the add/on to be installed
    • Click Start
  • Make sure that the option Remove found threats is unticked
  • Click on Advanced Settings, ensure the options
    • Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • wait for the virus definitions to be downloaded
  • Wait for the scan to finish
When the scan is complete
  • If no threats were found
    • put a checkmark in "Uninstall application on close"
    • close program
    • report to me that nothing was found
  • If threats were found
    • click on "list of threats found"
    • click on "export to text file" and save it as ESET SCAN and save to the desktop
    • Click on back
    • put a checkmark in "Uninstall application on close"
    • click on finish
    • close program
    • copy and paste the report here
Gringo
Link to post
Share on other sites

Here's the ESET log.

 

C:\Program Files\FLV Player 3\flvplayer-setup.exe    Win32/DownloadAdmin.G application    cleaned by deleting - quarantined
C:\Program Files\SWF\cbsidlm-cbsi5_3_0_96-SWF__FLV_Player-ORG-170532.exe    probably a variant of Win32/CNETInstaller.A application    cleaned by deleting - quarantined
 

Link to post
Share on other sites

  • Staff

Hello vern5

Eset cleaned what was found.

Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.

:Why we need to remove some of our tools:

  • Some of the tools we have used to clean your computer were made by fellow malware fighters and are very powerful and if used incorrectly or at the wronge time can make the computer an expensive paper weight.

    They are updated all the time and some of them more than once a day so by the time you are ready to use them again they will already be outdated.

    The following procedures will implement some cleanup procedures to remove these tools. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.

:DeFogger:

Note** Defogger only needs to be run if it was run when we first started. If you have not already run it then skip this.

  • To re-enable your Emulation drivers, double click DeFogger to run the tool.
    • The application window will appear
    • Click the Re-enable button to re-enable your CD Emulation drivers
    • Click Yes to continue
    • A 'Finished!' message will appear
    • Click OK
    • DeFogger will now ask to reboot the machine - click OK.
    Your Emulation drivers are now re-enabled.
:Uninstall ComboFix:
  • turn off all active protection software
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.
  • CF-Uninstall.png
:Remove the rest of our tools:

Please download OTCleanIt and save it to desktop. This tool will remove all the tools we used to clean your pc.

  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.
  • If asked to restart the computer, please do so
Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.

:The programs you can keep:

Some of the programs that we have used would be a good idea to keep and used often in helping to keep the computer clean. I use these programs on my computer.

  • Revo Uninstaller Free - this is the uninstaller that I had you download and works allot better than add/remove in windows and has saved me more than once from corrupted installs and uninstalls

    CCleaner - This is a good program to clean out temp files, I would use this once a week or before any malware scan to remove unwanted temp files - It has a built in registry cleaner but I would leave that alone and not use any registry cleaner

    Malwarebytes' Anti-Malware The Gold standerd today in antimalware scanners

:Security programs:

One of the questions I am asked all the time is "What programs do you use" I have at this time 4 computers in my home and I have this setup on all 4 of them.

  • Microsoft Security Essentials - provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.
  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is

    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often. (I have upgraded to the paid version of MBAM and I am glad I did)

    Note** If you decide to install MSE you will need to uninstall your present Antivirus

:Security awareness:

It is good security practice to change your passwords to all your online accounts on a fairly regular basis, this is especially true after an infection. Refer to this Microsoft article

Strong passwords: How to create and use them Then consider a password keeper, to keep all your passwords safe. KeePass is a small utility that allows you to manage all your passwords.

As Java seems to get exploited on a daily basis I advise to disable java in your web browsers - How to disable java in your web browsers - Disable Java

The other question I am asked all the time is "How can I prevent this from happening again." and the short answer to that is to be aware of what is out there and how to start spotting dangers.

Here are some articles that are must reads and should be read by everybody in your household that uses the internet

Here is some more reading for you from some of my collegesquoted from Tech Support Forum

Conclusion

There is no such thing as ‘perfect security’. This applies to many things, not just computer systems. Using the above guide you should be able to take all the reasonable steps you can to prevent infection. However, the most important part of all this is you, the user. Surf sensibly and think before you download a file or click on a link. Take a few moments to assess the possible risks and you should be able to enjoy all the internet has to offer.

I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Gringo

Link to post
Share on other sites

Thanks again for your help Gringo.

 

This was a strange one.

 

I wasn't having any issues with my computer....just ran across the Google folder by accident. It didn't look right since I don't have any Google software downloaded. I tried to delete it but it said "Access Denied".

 

My 1st scan with MalwareBytes caught and supposedly deleted it on reboot (so the log showed).

 

I did a 2nd MB scan and then caught the 2 Registry Keys...they were supposedly fixed after that scan.

 

Both scans were done in Safe mode.

 

When I rebooted into normal mode the Google folder was still there. Nothing else I tried scanning it with would get rid of it.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.