Jump to content

Outgoing connections blocked, but no infections found.


Recommended Posts

I have some out-going connections that are being blocked quite frequently. I used netstat to scan the connections and find the source and it is Iexplore.exe. However, no browser is open at the time of the connections. I attempted to run DDS but my computer would simply freeze and a reboot was required. Instead I have run OLT and included the logs from that. In addition, I have included a sample protection-log from Malware Bytes.

 

After looking through OLT's output, I removed SecurityNetHelper.dll, its directory, and its registry value. This did not improve my results with DDS nor did it remove the outgoing connections.

Extras.Txt

OTL.Txt

protection-log-2014-01-16.txt

Link to post
Share on other sites

  • Staff

Hello MWB_Tim

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.

Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[s1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.

  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo

Link to post
Share on other sites

# AdwCleaner v3.017 - Report created 22/01/2014 at 12:16:18
# Updated 12/01/2014 by Xplode
# Operating System : Microsoft Windows XP Service Pack 3 (32 bits)
# Username : Receiving - RCVCOMPTT
# Running from : H:\Documents and Settings\Receiving\Desktop\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****

***** [ Files / Folders ] *****

Folder Deleted : H:\Documents and Settings\All Users\Application Data\apn

***** [ Shortcuts ] *****

***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{A8E5842E-102B-4289-9D57-3B3F5B5E15D3}
Key Deleted : HKCU\Software\OCS
Key Deleted : HKLM\Software\InstallIQ

***** [ Browsers ] *****

-\\ Internet Explorer v8.0.6001.18702

*************************

AdwCleaner[R0].txt - [880 octets] - [22/01/2014 12:15:30]
AdwCleaner[s0].txt - [812 octets] - [22/01/2014 12:16:18]

########## EOF - H:\AdwCleaner\AdwCleaner[s0].txt - [871 octets] ##########

Link to post
Share on other sites

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.0 (01.07.2014:1)
OS: Microsoft Windows XP x86
Ran by Receiving on Wed 01/22/2014 at 12:19:22.59
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

~~~ Services

 

~~~ Registry Values

Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\DisplayName
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\URL

 

~~~ Registry Keys

 

~~~ Files

 

~~~ Folders

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Wed 01/22/2014 at 12:21:51.70
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Link to post
Share on other sites

The system has been running slow for the past few weeks, I was then infected by a scareware fake anti-virus. I then cleaned up my PC using Rkill and MWB. That's when I began getting the blocked out-going connections. As previously mentioned I cleaned up one item, reset the computer and still had the problem. The outgoing connections seem to have since disappeared (with no action taken). The PC is still running slower than normal.

Link to post
Share on other sites

  • Staff

Hello MWB_Tim

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.

1. Close any open browsers or any other programs that are open.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.

When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
Link to post
Share on other sites

  • Staff

Hello MWB_Tim

Ok lets try this, I want you to run the combofix script in safe mode but it is very important that when combofix reboots the computer for you to direct it back into safe mode so it can finish the scan.

Boot into Safe Mode

Reboot your computer in Safe Mode.

  • If the computer is running, shut down Windows, and then turn off the power.
  • Wait 30 seconds, and then turn the computer on.
  • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again.
  • Ensure that the Safe Mode option is selected.
  • Press Enter. The computer then begins to start in Safe mode.
  • Login on your usual account.
Now run the script just like we did before

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache:: 
Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe

CFScriptB-4.gif

This will let ComboFix run again.

Restart if you have to.

Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
Link to post
Share on other sites

While this went better, it was still unable to complete. I moved to safe-mode and used the script-text to start combofix, it went through, it installed the recovery console, and then it began saying it should take about 10 minutes. An hour later I attempted to cancel and the entire PC froze.

Link to post
Share on other sites

  • Staff

Hello MWB_Tim

Malwarebytes Anti-Rootkit

1.Download Malwarebytes Anti-Rootkit

2.Unzip the contents to a folder in a convenient location.

3.Open the folder where the contents were unzipped and run mbar.exe

4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.

5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.

6.Wait while the system shuts down and the cleanup process is performed.

7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.

8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:

  • •Internet access

    •Windows Update

    •Windows Firewall

9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.

10.Verify that your system is now functioning normally.

--RogueKiller--

Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit

  • Quit all programs that you may have started.
  • Please disconnect any external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • the scan will make two reports the one I would like to see is called RKreport[2].txt on your Desktop
  • Exit/Close RogueKiller+
send me the reports made from MBAR and Roguekiller and also let me know how the computer is doing at this time.

Gringo

When you are complete please send me both reports

Gringo

Link to post
Share on other sites

RogueKiller V8.8.4 [Jan 27 2014] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.adlice.com/forum/
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User : Receiving [Admin rights]
Mode : Scan -- Date : 01/29/2014 06:51:27
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 1 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> FOUND

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
[Address] SSDT[122] : NtOpenProcess @ 0x8057F956 -> HOOKED (H:\WINDOWS\system32\drivers\mbamchameleon.sys @ 0xA9885184)
[Address] SSDT[128] : NtOpenThread @ 0x805E4867 -> HOOKED (H:\WINDOWS\system32\drivers\mbamchameleon.sys @ 0xA98852D0)
[inline] SSDT[199] : NtRequestPort @ 0x805E6B17 -> HOOKED (Unknown @ 0xF7A9A480)
[inline] SSDT[200] : NtRequestWaitReplyPort @ 0x8057D153 -> HOOKED (Unknown @ 0xF7A9A520)

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts

127.0.0.1 localhost

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST3160815AS +++++
--- User ---
[MBR] d007d5ea564f8f2ea798e61a57819e81
[bSP] 8b563244d5c448430ea066430a6cbc8b : Windows XP MBR Code
Partition table:
0 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 16065 | Size: 50030 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 102478635 | Size: 102589 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_S_01292014_065127.txt >>

 

 

 

 

RogueKiller V8.8.4 [Jan 27 2014] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.adlice.com/forum/
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User : Receiving [Admin rights]
Mode : Remove -- Date : 01/29/2014 06:59:23
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 1 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> DELETED

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
[Address] SSDT[122] : NtOpenProcess @ 0x8057F956 -> HOOKED (H:\WINDOWS\system32\drivers\mbamchameleon.sys @ 0xA9885184)
[Address] SSDT[128] : NtOpenThread @ 0x805E4867 -> HOOKED (H:\WINDOWS\system32\drivers\mbamchameleon.sys @ 0xA98852D0)
[inline] SSDT[199] : NtRequestPort @ 0x805E6B17 -> HOOKED (Unknown @ 0xF7A9A480)
[inline] SSDT[200] : NtRequestWaitReplyPort @ 0x8057D153 -> HOOKED (Unknown @ 0xF7A9A520)

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts

127.0.0.1 localhost

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST3160815AS +++++
--- User ---
[MBR] d007d5ea564f8f2ea798e61a57819e81
[bSP] 8b563244d5c448430ea066430a6cbc8b : Windows XP MBR Code
Partition table:
0 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 16065 | Size: 50030 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 102478635 | Size: 102589 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_D_01292014_065923.txt >>
RKreport[0]_S_01292014_065127.txt

Link to post
Share on other sites

My trial for MWB has expired so I am not certain. They had stopped for a day, so I can assume they have, but when they stopped was at an odd time. No scan/fix/system startup had completed prior to the blocks stopping. That is, the last scan/fix/system startup had occurred, outgoing requests were later blocked, then suddenly they stopped for at least 24 hours. At this time MWB expired, so I cannot be certain if they stopped longer.

Link to post
Share on other sites

  • Staff

Hello MWB_Tim

Lets get a deeper look into the system and lets see if something shows up.

Download and run OTL

Download OTL by Old Timer and save it to your Desktop.

  • Double click on OTL.exe to run it.
  • Under Output, ensure that Minimal Output is selected.
  • Under Extra Registry section, select Use SafeList.
  • Click the Scan All Users checkbox.
  • Click on Run Scan at the top left hand corner.
  • When done, two Notepad files will open.
    • OTL.txt <-- Will be opened and the that I need posted back here
    • Extra.txt <-- Will be minimized - save this one on your desktop in case I ask for it later
  • Please post the contents of OTL.txt in your next reply.
Gringo
Link to post
Share on other sites

OTL logfile created on: 2/3/2014 5:54:33 AM - Run 2
OTL by OldTimer - Version 3.2.69.0     Folder = H:\Documents and Settings\Receiving\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy
 
1.99 Gb Total Physical Memory | 1.48 Gb Available Physical Memory | 74.26% Memory free
4.99 Gb Paging File | 4.68 Gb Available in Paging File | 93.93% Paging File free
Paging file location(s): C:\pagefile.sys 3250 4096 [binary data]
 
%SystemDrive% = H: | %SystemRoot% = H:\WINDOWS | %ProgramFiles% = H:\Program Files
Drive C: | 100.18 Gb Total Space | 48.31 Gb Free Space | 48.22% Space Free | Partition Type: NTFS
Drive F: | 465.75 Gb Total Space | 352.58 Gb Free Space | 75.70% Space Free | Partition Type: NTFS
Drive H: | 48.86 Gb Total Space | 35.26 Gb Free Space | 72.17% Space Free | Partition Type: NTFS
Drive I: | 31.81 Mb Total Space | 0.00 Mb Free Space | 0.00% Space Free | Partition Type: UDF
 
Computer Name: RCVCOMPTT | User Name: Receiving | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days
 
========== Processes (SafeList) ==========
 
PRC - H:\Documents and Settings\Receiving\Desktop\OTL.exe (OldTimer Tools)
PRC - H:\Program Files\Malwarebytes Anti-Exploit\mbae.exe (Malwarebytes Corporation)
PRC - C:\Program Files\Sandboxie\SbieCtrl.exe (Sandboxie Holdings, LLC)
PRC - C:\Program Files\Sandboxie\SbieSvc.exe (Sandboxie Holdings, LLC)
PRC - C:\WordWeb\wweb32.exe ()
PRC - H:\Program Files\Epson Software\Event Manager\EEventManager.exe (SEIKO EPSON CORPORATION)
PRC - H:\WINDOWS\explorer.exe (Microsoft Corporation)
 
 
========== Modules (No Company Name) ==========
 
MOD - C:\Program Files\QuicklyTech\QSContextMenu32.dll ()
MOD - H:\WINDOWS\system32\wweb32.dll ()
MOD - C:\WordWeb\WUCNT.dll ()
MOD - H:\Program Files\Notepad++\NppShell_05.dll ()
MOD - C:\WordWeb\wweb32.exe ()
MOD - H:\WINDOWS\system32\cpwmon2k.dll ()
MOD - H:\Program Files\Epson Software\Event Manager\Assistants\Scan Assistant\ScanEngine.dll ()
MOD - H:\Program Files\Epson Software\Event Manager\Assistants\Scan Assistant\Satwain.dll ()
 
 
========== Services (SafeList) ==========
 
SRV - (AdobeFlashPlayerUpdateSvc) -- H:\WINDOWS\system32\Macromed\Flash\FlashPlayerUpdateService.exe (Adobe Systems Incorporated)
SRV - (SbieSvc) -- C:\Program Files\Sandboxie\SbieSvc.exe (Sandboxie Holdings, LLC)
SRV - (PEVSystemStart) -- H:\ComboFix\pev.3XE ()
SRV - (BrYNSvc) -- H:\Program Files\Browny02\BrYNSvc.exe (Brother Industries, Ltd.)
 
 
========== Driver Services (SafeList) ==========
 
DRV - (PCIDump) --  File not found
DRV - (ESProtectionDriver) -- H:\Program Files\Malwarebytes Anti-Exploit\mbae.sys ()
DRV - (SbieDrv) -- C:\Program Files\Sandboxie\SbieDrv.sys (Sandboxie Holdings, LLC)
DRV - (pwdrvio) -- H:\WINDOWS\system32\pwdrvio.sys ()
DRV - (pwdspio) -- H:\WINDOWS\system32\pwdspio.sys ()
DRV - (RTLE8023xp) -- H:\WINDOWS\system32\drivers\Rtenicxp.sys (Realtek Semiconductor Corporation                           )
DRV - (nvata) -- H:\WINDOWS\system32\drivers\nvata.sys (NVIDIA Corporation)
DRV - (FETNDISB) -- H:\WINDOWS\system32\drivers\dlkfet5b.sys (D-Link                              )
DRV - (BrPar) -- H:\WINDOWS\system32\drivers\BRPAR.SYS (Brother Industries Ltd.)
 
 
========== Standard Registry (SafeList) ==========
 
 
========== Internet Explorer ==========
 
IE - HKLM\..\SearchScopes,DefaultScope =
IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
 
 
IE - HKU\.DEFAULT\..\SearchScopes,DefaultScope =
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
IE - HKU\S-1-5-18\..\SearchScopes,DefaultScope =
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
IE - HKU\S-1-5-19\..\SearchScopes,DefaultScope =
IE - HKU\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
IE - HKU\S-1-5-20\..\SearchScopes,DefaultScope =
IE - HKU\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
IE - HKU\S-1-5-21-448539723-343818398-839522115-1006\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com/
IE - HKU\S-1-5-21-448539723-343818398-839522115-1006\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = http://www.msn.com/?ocid=iehp
IE - HKU\S-1-5-21-448539723-343818398-839522115-1006\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = en-us
IE - HKU\S-1-5-21-448539723-343818398-839522115-1006\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = F8 19 E9 20 19 50 CE 01  [binary data]
IE - HKU\S-1-5-21-448539723-343818398-839522115-1006\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKU\S-1-5-21-448539723-343818398-839522115-1006\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search
IE - HKU\S-1-5-21-448539723-343818398-839522115-1006\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
 
========== FireFox ==========
 
FF - HKLM\Software\MozillaPlugins\@foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/pdf: H:\Program Files\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll (Foxit Corporation)
FF - HKLM\Software\MozillaPlugins\@foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/vnd.fdf: H:\Program Files\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll (Foxit Corporation)
FF - HKLM\Software\MozillaPlugins\@java.com/DTPlugin,version=10.2.1: H:\WINDOWS\system32\npDeployJava1.dll (Oracle Corporation)
FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin,version=10.2.1: H:\Program Files\Oracle\JavaFX 2.0 Runtime\bin\new_plugin\npjp2.dll (Oracle Corporation)
FF - HKLM\Software\MozillaPlugins\@microsoft.com/WPF,version=3.5: H:\WINDOWS\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@videolan.org/vlc,version=2.0.4: H:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN)
 
FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\wcapturex@deskperience.com: C:\WordWeb\WCaptureMoz [2012/07/27 06:00:06 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Thunderbird 24.2.0\extensions\\Components: C:\Program Files\Mozilla Thunderbird\components
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Thunderbird 24.2.0\extensions\\Plugins: C:\Program Files\Mozilla Thunderbird\plugins
 
[2013/05/03 11:54:23 | 000,000,000 | ---D | M] (No name found) -- H:\Documents and Settings\Receiving\Application Data\Mozilla\Extensions
 
O1 HOSTS File: ([2014/01/21 06:12:39 | 000,000,741 | ---- | M]) - H:\WINDOWS\system32\drivers\etc\Hosts
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (no name) - AutorunsDisabled - No CLSID value found.
O4 - HKLM..\Run: [EEventManager] H:\Program Files\Epson Software\Event Manager\EEventManager.exe (SEIKO EPSON CORPORATION)
O4 - HKLM..\Run: [WordWeb] C:\WordWeb\wweb32.exe ()
O4 - HKU\S-1-5-21-448539723-343818398-839522115-1006..\Run: [sandboxieControl] C:\Program Files\Sandboxie\SbieCtrl.exe (Sandboxie Holdings, LLC)
O4 - Startup: H:\Documents and Settings\Kitting\Start Menu\Programs\Startup\AutorunsDisabled [2012/11/16 06:17:41 | 000,000,000 | -H-D | M]
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: SoftwareSASGeneration = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: EnableVirtualization = 0
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-21-448539723-343818398-839522115-1006\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 255
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} http://download.microsoft.com/download/E/5/6/E5611B10-0D6D-4117-8430-A67417AA88CD/LegitCheckControl.cab (Windows Genuine Advantage Validation Tool)
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1195414133424 (WUWebControl Class)
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1360794149562 (MUWebControl Class)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.7.0/jinstall-1_7_0_02-windows-i586.cab (Java Plug-in 1.7.0_02)
O16 - DPF: {CAFEEFAC-0017-0000-0002-ABCDEFFEDCBA} http://java.sun.com/update/1.7.0/jinstall-1_7_0_02-windows-i586.cab (Java Plug-in 1.7.0_02)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.7.0/jinstall-1_7_0_02-windows-i586.cab (Java Plug-in 1.7.0_02)
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab (Shockwave Flash Object)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 10.0.0.100
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{3E3C9C14-D2A0-43F9-BC6D-05C42817DB0A}: DhcpNameServer = 64.60.0.17 64.60.0.18 10.0.0.100
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{698AA78B-4026-4B15-B069-EC9C42FB1710}: DhcpNameServer = 10.0.0.100
O20 - HKLM Winlogon: Shell - (Explorer.exe) - H:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (H:\WINDOWS\system32\userinit.exe) - H:\WINDOWS\system32\userinit.exe (Microsoft Corporation)
O20 - Winlogon\Notify\AutorunsDisabled: DllName - (Reg Error: Value error.) - Reg Error: Value error. File not found
O24 - Desktop Components:0 () - C:\Weather.htm
O24 - Desktop WallPaper: H:\WINDOWS\Web\Wallpaper\Bliss.bmp
O24 - Desktop BackupWallPaper: H:\WINDOWS\Web\Wallpaper\Bliss.bmp
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2013/04/10 05:49:16 | 000,000,000 | ---D | M] - C:\Autodesk -- [ NTFS ]
O32 - AutoRun File - [2006/09/18 13:43:36 | 000,000,024 | ---- | M] () - C:\autoexec.bat -- [ NTFS ]
O33 - MountPoints2\{035eb98f-4e02-11e3-a66b-002522f1438a}\Shell - "" = AutoRun
O33 - MountPoints2\{035eb98f-4e02-11e3-a66b-002522f1438a}\Shell\AutoRun - "" = Auto&Play
O33 - MountPoints2\{035eb98f-4e02-11e3-a66b-002522f1438a}\Shell\AutoRun\command - "" = G:\VZW_Software_upgrade_assistant_installer.exe
O34 - HKLM BootExecute: (autocheck autochk *)
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*
O38 - SubSystems\\Windows: (ServerDll=winsrv:UserServerDllInitialization,3)
O38 - SubSystems\\Windows: (ServerDll=winsrv:ConServerDllInitialization,2)
 
========== Files/Folders - Created Within 30 Days ==========
 
[2014/02/03 05:53:44 | 000,602,112 | ---- | C] (OldTimer Tools) -- H:\Documents and Settings\Receiving\Desktop\OTL.exe
[2014/01/30 07:54:35 | 000,000,000 | -HSD | C] -- H:\RECYCLER
[2014/01/29 06:14:26 | 000,000,000 | ---D | C] -- H:\Documents and Settings\All Users\Application Data\Malwarebytes' Anti-Malware (portable)
[2014/01/29 06:10:46 | 000,052,312 | ---- | C] (Malwarebytes Corporation) -- H:\WINDOWS\System32\drivers\mbamchameleon.sys
[2014/01/28 06:40:07 | 000,518,144 | ---- | C] (SteelWerX) -- H:\WINDOWS\SWREG.exe
[2014/01/28 06:40:07 | 000,406,528 | ---- | C] (SteelWerX) -- H:\WINDOWS\SWSC.exe
[2014/01/28 06:40:07 | 000,212,480 | ---- | C] (SteelWerX) -- H:\WINDOWS\SWXCACLS.exe
[2014/01/28 06:40:07 | 000,060,416 | ---- | C] (NirSoft) -- H:\WINDOWS\NIRCMD.exe
[2014/01/28 06:40:02 | 000,000,000 | --SD | C] -- H:\ComboFix
[2014/01/28 06:39:59 | 000,000,000 | ---D | C] -- H:\Qoobox
[2014/01/27 06:00:24 | 000,000,000 | ---D | C] -- H:\WINDOWS\erdnt
[2014/01/22 12:19:20 | 000,000,000 | ---D | C] -- H:\WINDOWS\ERUNT
[2014/01/22 12:15:24 | 000,000,000 | ---D | C] -- H:\AdwCleaner
[2014/01/21 06:17:27 | 000,000,000 | ---D | C] -- H:\Program Files\HitmanPro
[2014/01/21 06:17:15 | 000,000,000 | ---D | C] -- H:\Documents and Settings\All Users\Application Data\HitmanPro
[2014/01/21 06:07:27 | 001,498,960 | ---- | C] (Microsoft Corporation) -- H:\WINDOWS\System32\msvcr100d.dll
[2014/01/21 06:07:27 | 000,743,248 | ---- | C] (Microsoft Corporation) -- H:\WINDOWS\System32\msvcp100d.dll
[2014/01/21 06:07:27 | 000,000,000 | ---D | C] -- H:\Program Files\Malwarebytes Anti-Exploit
[2014/01/21 06:07:27 | 000,000,000 | ---D | C] -- H:\Documents and Settings\All Users\Start Menu\Programs\Malwarebytes Anti-Exploit
[2014/01/16 08:22:22 | 000,000,000 | ---D | C] -- H:\Documents and Settings\All Users\Start Menu\Programs\Sandboxie
[2014/01/14 10:20:42 | 000,000,000 | ---D | C] -- H:\Documents and Settings\Receiving\Application Data\Malwarebytes
[2014/01/14 10:20:29 | 000,000,000 | ---D | C] -- H:\Documents and Settings\All Users\Start Menu\Programs\Malwarebytes' Anti-Malware
[2014/01/14 10:20:29 | 000,000,000 | ---D | C] -- H:\Documents and Settings\All Users\Application Data\Malwarebytes
[2014/01/14 10:20:28 | 000,022,856 | ---- | C] (Malwarebytes Corporation) -- H:\WINDOWS\System32\drivers\mbam.sys
[2014/01/14 10:20:28 | 000,000,000 | ---D | C] -- H:\Program Files\Malwarebytes' Anti-Malware
[2014/01/14 09:47:58 | 000,003,584 | ---- | C] (Microsoft Corporation) -- H:\WINDOWS\System32\Copy of regedt32.bat
[2014/01/14 09:40:18 | 000,000,000 | ---D | C] -- H:\Documents and Settings\Receiving\Start Menu\Programs\Smart Guard Protection
[2014/01/14 09:35:19 | 000,000,000 | ---D | C] -- H:\Documents and Settings\Receiving\Local Settings\Application Data\Afworks
[2014/01/14 09:35:00 | 000,000,000 | ---D | C] -- H:\Documents and Settings\All Users\Application Data\D7i7a33g
[1998/12/08 18:53:54 | 000,186,368 | ---- | C] (Symantec Corp., Peter Norton Computing Group) -- H:\Program Files\Common Files\IRAREG.DLL
[1998/12/08 18:53:54 | 000,099,840 | ---- | C] (Symantec Corp.) -- H:\Program Files\Common Files\IRAABOUT.DLL
[1998/12/08 18:53:54 | 000,070,144 | ---- | C] (Symantec Corp., Peter Norton Computing Group) -- H:\Program Files\Common Files\IRAMDMTR.DLL
[1998/12/08 18:53:54 | 000,048,640 | ---- | C] (Symantec Corp., Peter Norton Computing Group) -- H:\Program Files\Common Files\IRALPTTR.DLL
[1998/12/08 18:53:54 | 000,031,744 | ---- | C] (Symantec Corp., Peter Norton Computing Group) -- H:\Program Files\Common Files\IRAWEBTR.DLL
[1998/12/08 18:53:54 | 000,017,920 | ---- | C] (Symantec Corp.) -- H:\Program Files\Common Files\IRASRIAL.DLL
[2 H:\WINDOWS\*.tmp files -> H:\WINDOWS\*.tmp -> ]
[1 H:\WINDOWS\System32\*.tmp files -> H:\WINDOWS\System32\*.tmp -> ]
 
========== Files - Modified Within 30 Days ==========
 
[2014/02/03 05:53:56 | 000,000,200 | ---- | M] () -- H:\WINDOWS\tasks\QSStarter.job
[2014/02/03 05:53:46 | 000,602,112 | ---- | M] (OldTimer Tools) -- H:\Documents and Settings\Receiving\Desktop\OTL.exe
[2014/02/03 05:51:00 | 000,000,830 | ---- | M] () -- H:\WINDOWS\tasks\Adobe Flash Player Updater.job
[2014/01/31 08:58:05 | 000,000,332 | ---- | M] () -- H:\WINDOWS\tasks\Alert Consignment.job
[2014/01/31 08:58:02 | 000,000,258 | ---- | M] () -- H:\WINDOWS\tasks\Meeting.job
[2014/01/31 07:00:00 | 000,000,198 | ---- | M] () -- H:\WINDOWS\tasks\QSKiller.job
[2014/01/31 06:02:40 | 000,000,470 | ---- | M] () -- H:\WINDOWS\tasks\Malwarebytes Anti-Exploit.job
[2014/01/31 06:02:11 | 000,012,598 | ---- | M] () -- H:\WINDOWS\System32\wpa.dbl
[2014/01/31 05:58:54 | 000,002,048 | --S- | M] () -- H:\WINDOWS\bootstat.dat
[2014/01/30 09:11:19 | 000,000,230 | ---- | M] () -- H:\WINDOWS\tasks\Alert Meeting.job
[2014/01/29 06:10:46 | 000,052,312 | ---- | M] (Malwarebytes Corporation) -- H:\WINDOWS\System32\drivers\mbamchameleon.sys
[2014/01/21 06:12:39 | 000,000,741 | ---- | M] () -- H:\WINDOWS\System32\drivers\etc\Hosts
[2014/01/21 06:06:15 | 000,692,616 | ---- | M] (Adobe Systems Incorporated) -- H:\WINDOWS\System32\FlashPlayerApp.exe
[2014/01/21 06:06:15 | 000,071,048 | ---- | M] (Adobe Systems Incorporated) -- H:\WINDOWS\System32\FlashPlayerCPLApp.cpl
[2014/01/16 13:11:04 | 000,000,666 | ---- | M] () -- H:\Documents and Settings\Receiving\Application Data\Microsoft\Internet Explorer\Quick Launch\Shortcut to pcmrpw.lnk
[2014/01/16 08:34:39 | 000,001,926 | ---- | M] () -- H:\WINDOWS\Sandboxie.ini
[2014/01/14 12:12:25 | 000,001,945 | ---- | M] () -- H:\WINDOWS\epplauncher.mif
[2014/01/14 10:20:29 | 000,000,839 | ---- | M] () -- H:\Documents and Settings\Receiving\Application Data\Microsoft\Internet Explorer\Quick Launch\Malwarebytes Anti-Malware.lnk
[2014/01/13 08:19:43 | 000,000,218 | ---- | M] () -- H:\Documents and Settings\Receiving\.recently-used.xbel
[2014/01/08 08:57:59 | 000,000,410 | ---- | M] () -- H:\WINDOWS\tasks\2-28-14.job
[2 H:\WINDOWS\*.tmp files -> H:\WINDOWS\*.tmp -> ]
[1 H:\WINDOWS\System32\*.tmp files -> H:\WINDOWS\System32\*.tmp -> ]
 
========== Files Created - No Company Name ==========
 
[2014/01/28 06:40:07 | 000,256,000 | ---- | C] () -- H:\WINDOWS\PEV.exe
[2014/01/28 06:40:07 | 000,208,896 | ---- | C] () -- H:\WINDOWS\MBR.exe
[2014/01/28 06:40:07 | 000,098,816 | ---- | C] () -- H:\WINDOWS\sed.exe
[2014/01/28 06:40:07 | 000,080,412 | ---- | C] () -- H:\WINDOWS\grep.exe
[2014/01/28 06:40:07 | 000,068,096 | ---- | C] () -- H:\WINDOWS\zip.exe
[2014/01/21 06:07:27 | 000,000,470 | ---- | C] () -- H:\WINDOWS\tasks\Malwarebytes Anti-Exploit.job
[2014/01/21 06:06:16 | 000,000,830 | ---- | C] () -- H:\WINDOWS\tasks\Adobe Flash Player Updater.job
[2014/01/14 10:20:29 | 000,000,839 | ---- | C] () -- H:\Documents and Settings\Receiving\Application Data\Microsoft\Internet Explorer\Quick Launch\Malwarebytes Anti-Malware.lnk
[2014/01/13 08:19:43 | 000,000,218 | ---- | C] () -- H:\Documents and Settings\Receiving\.recently-used.xbel
[2013/12/05 06:01:34 | 000,139,152 | ---- | C] () -- H:\Documents and Settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
[2013/11/07 13:35:39 | 000,003,584 | ---- | C] () -- H:\Documents and Settings\Receiving\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2013/07/22 07:31:22 | 000,384,382 | ---- | C] () -- H:\Documents and Settings\LocalService\Local Settings\Application Data\WPFFontCache_v0400-S-1-5-21-448539723-343818398-839522115-1006-0.dat
[2013/05/02 06:27:13 | 000,000,063 | ---- | C] () -- H:\WINDOWS\mdm.ini
[2013/05/02 06:27:09 | 000,000,000 | ---- | C] () -- H:\WINDOWS\NSREX.INI
[2013/04/11 05:01:05 | 000,454,936 | ---- | C] () -- H:\Documents and Settings\LocalService\Local Settings\Application Data\WPFFontCache_v0400-S-1-5-21-448539723-343818398-839522115-1005-0.dat
[2012/09/24 05:03:45 | 000,244,086 | ---- | C] () -- H:\Documents and Settings\LocalService\Local Settings\Application Data\WPFFontCache_v0400-System.dat
[2012/09/10 12:29:18 | 000,001,926 | ---- | C] () -- H:\WINDOWS\Sandboxie.ini
[2012/07/27 06:00:07 | 002,216,480 | ---- | C] () -- H:\WINDOWS\System32\wweb32.dll
[2012/06/05 05:51:36 | 000,065,793 | ---- | C] () -- H:\WINDOWS\System32\esfw8b.bin
[2012/04/12 05:56:13 | 000,088,656 | ---- | C] () -- H:\WINDOWS\System32\cpwmon2k.dll
[2012/02/21 05:02:11 | 000,147,456 | R--- | C] () -- H:\WINDOWS\System32\igfxCoIn_v4990.dll
[2012/02/20 14:04:51 | 000,003,072 | ---- | C] () -- H:\WINDOWS\System32\iacenc.dll
[2012/02/14 07:38:07 | 002,888,384 | ---- | C] () -- H:\WINDOWS\System32\pwNative.exe
[2012/02/14 07:38:07 | 000,015,576 | ---- | C] () -- H:\WINDOWS\System32\pwdrvio.sys
[2012/02/14 07:38:07 | 000,010,200 | ---- | C] () -- H:\WINDOWS\System32\pwdspio.sys
[2012/02/10 08:30:24 | 000,049,152 | R--- | C] () -- H:\WINDOWS\System32\ChCfg.exe
 
========== ZeroAccess Check ==========
 
[2009/03/11 05:54:00 | 000,000,227 | RHS- | M] () -- H:\WINDOWS\assembly\Desktop.ini
 
[HKEY_CURRENT_USER\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32]
 
[HKEY_CURRENT_USER\Software\Classes\clsid\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32]
 
[HKEY_LOCAL_MACHINE\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32]
"" = %SystemRoot%\System32\shdocvw.dll -- [2008/04/13 16:12:05 | 001,499,136 | ---- | M] (Microsoft Corporation)
"ThreadingModel" = Apartment
 
[HKEY_LOCAL_MACHINE\Software\Classes\clsid\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InProcServer32]
"" = %systemroot%\system32\wbem\fastprox.dll -- [2009/02/09 04:10:48 | 000,473,600 | ---- | M] (Microsoft Corporation)
"ThreadingModel" = Free
 
[HKEY_LOCAL_MACHINE\Software\Classes\clsid\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32]
"" = %systemroot%\system32\wbem\wbemess.dll -- [2008/04/13 16:12:08 | 000,273,920 | ---- | M] (Microsoft Corporation)
"ThreadingModel" = Both

< End of report >

Link to post
Share on other sites

  • Staff

Now I would like you to rerun malwarebytes antimalware (MBAM) for me

Double-click the Malwarebytes icon

go to the update tab at the top

click on check for updates

If an update is found, it will download and install the latest version.

Once the program has loaded, select Perform quick scan, then click Scan.

When the scan is complete, click OK, If anything is found then click Show Results to view the results.

Be sure that everything is Checked (ticked)

When completed, a log will open in Notepad. please copy and paste the log into your next reply

If you accidentally close it, the log file is saved here and will be named like this:

C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.

Click OK to either and let MBAM proceed with the disinfection process.

If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

------------------------------------------------

And last I would like you to run an Online scan for me

Eset Online Scanner

best when IE is used

Go to http://www.eset.com/onlinescan/ to run an online scanner from ESET.

Turn off the real time scanner of any existing antivirus program while performing the online scan

click on the Run ESET Online Scanner button

Tick the box next to YES, I accept the Terms of Use.

Click Start

When asked, allow the add/on to be installed

Click Start

Make sure that the option Remove found threats is unticked

Click on Advanced Settings, ensure the options

Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.

Click Scan

wait for the virus definitions to be downloaded

Wait for the scan to finish

When the scan is complete

If no threats were found

put a checkmark in "Uninstall application on close"

close program

report to me that nothing was found

If threats were found

click on "list of threats found"

click on "export to text file" and save it as ESET SCAN and save to the desktop

Click on back

put a checkmark in "Uninstall application on close"

click on finish

close program

copy and paste the report here

When you reply back to me please attach the MBAM and Eset report and let me know how the computer is doing at this time

Link to post
Share on other sites

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2014.02.04.07

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Receiving :: RCVCOMPTT [administrator]

2/4/2014 5:55:18 AM
mbam-log-2014-02-04 (05-55-18).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 264033
Time elapsed: 7 minute(s), 19 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

 

 

______________________

H:\AdwCleaner\Quarantine\H\Documents and Settings\All Users\Application Data\apn\APN-Stub\W3IV6-G\APNIC.dll.vir Win32/Bundled.Toolbar.Ask.B application
H:\Documents and Settings\Kitting\Local Settings\Temp\fox10F.tmp\Foxit Reader Setup.exe a variant of Win32/Bundled.Toolbar.Ask.D application

 

The system appears to be running decent, however, links which open internet explorer must be clicked twice to open. If only clicked once internet explorer will open but never load the page. If IE is already open it will run just fine. Also, for the ESET scan it requested me to download the active-x control. When telling IE to accept this, it would simply reload a partial page and not download. In order to run I had to use Chrome and download the scan that way.

Link to post
Share on other sites

  • Staff

Hello MWB_Tim

Let me know if this helps IE

first I would like you to go here and click on the fixit button - http://support.microsoft.com/kb/923737

Then I want you to do the following

  • Start Internet Explorer.
  • click on "safety"
  • click on "Delete Browsing History"
  • make sure all boxes are checked
  • click on "Delete"
  • click on "Tools",
  • click "Internet Options".
  • On the "Advanced" tab, click "Reset"
  • put a check mark next to "Delete Personal Settings"
  • click "Reset" to confirm
  • when complete click the "Close" button
  • restart IE
Gringo
Link to post
Share on other sites

  • Staff

Hello

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

Clean Out Temp Files

  • This small application you may want to keep and use once a week to keep the computer clean.

    Download CCleaner from here CCleaner

    • Run the installer to install the application.
    • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
    • Run CCleaner. default settings are fine
    • Click Run Cleaner.
    • Close CCleaner.
: Malwarebytes' Anti-Malware :

I see that you have MBAM installed - That is great!! and at this time I would like you to update it and run me a quick scan

  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.

Click OK to either and let MBAM proceed with the disinfection process.

If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

Download HijackThis

  • Go Here to download HijackThis program
  • Save HijackThis to your desktop.
  • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
  • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
  • copy and paste hijackthis report into the topic
"information and logs"
  • In your next post I need the following
    • Log From MBAM
    • report from Hijackthis
    • let me know of any problems you may have had
    • How is the computer doing now?
Gringo
Link to post
Share on other sites

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2014.02.10.03

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Receiving :: RCVCOMPTT [administrator]

2/10/2014 5:54:38 AM
mbam-log-2014-02-10 (05-54-38).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 263276
Time elapsed: 6 minute(s), 23 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

 

 

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 6:02:33 AM, on 2/10/2014
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
H:\WINDOWS\System32\smss.exe
H:\WINDOWS\system32\winlogon.exe
H:\WINDOWS\system32\services.exe
H:\WINDOWS\system32\lsass.exe
H:\WINDOWS\system32\svchost.exe
C:\Program Files\Sandboxie\SbieSvc.exe
H:\WINDOWS\System32\svchost.exe
H:\WINDOWS\system32\spoolsv.exe
H:\WINDOWS\Explorer.EXE
H:\WINDOWS\System32\svchost.exe
H:\PROGRA~1\EPSONS~1\EVENTM~1\EEventManager.exe
C:\WordWeb\wweb32.exe
C:\Program Files\Sandboxie\SbieCtrl.exe
H:\WINDOWS\system32\ctfmon.exe
H:\Program Files\Malwarebytes Anti-Exploit\mbae.exe
H:\WINDOWS\system32\svchost.exe
C:\Program Files\Sandboxie\SbieSvc.exe
H:\Program Files\Internet Explorer\iexplore.exe
H:\Program Files\Internet Explorer\iexplore.exe
H:\Documents and Settings\Receiving\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O4 - HKLM\..\Run: [EEventManager] H:\PROGRA~1\EPSONS~1\EVENTM~1\EEventManager.exe
O4 - HKLM\..\Run: [WordWeb] "C:\WordWeb\wweb32.exe" -startup
O4 - HKCU\..\Run: [sandboxieControl] "C:\Program Files\Sandboxie\SbieCtrl.exe"
O4 - HKCU\..\Run: [ctfmon.exe] H:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "H:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "H:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')
O9 - Extra button: (no name) - AutorunsDisabled - (no file)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - H:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - H:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1195414133424
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1360794149562
O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - http://download.eset.com/special/eos/OnlineScanner.cab
O20 - Winlogon Notify: AutorunsDisabled - Invalid registry found
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - H:\WINDOWS\System32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - H:\WINDOWS\System32\browseui.dll
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - H:\WINDOWS\system32\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: BrYNSvc - Brother Industries, Ltd. - H:\Program Files\Browny02\BrYNSvc.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - H:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - H:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - H:\WINDOWS\System32\nvsvc32.exe
O23 - Service: PEVSystemStart - Unknown owner - H:\ComboFix\pev.3XE
O23 - Service: Sandboxie Service (SbieSvc) - Sandboxie Holdings, LLC - C:\Program Files\Sandboxie\SbieSvc.exe
O24 - Desktop Component 0: (no name) - C:\Weather.htm

--
End of file - 4127 bytes

 

I did not notice a point at which to follow this instruction:

  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.

Also, please note that C:\Weather.htm is a self-created weather widget.

 

The PC is still running the same.

Link to post
Share on other sites

  • Staff

Greetings

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded start-up entries:

This part of the fix is purely optional

These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

  • Run HijackThis (rightclick and run as admin)
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):
    • O4 - HKLM\..\Run: [WordWeb] "C:\WordWeb\wweb32.exe" -startup

      O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "H:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')

      O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "H:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')

  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

    • NOTE**You can research each of those lines >here< and see if you want to keep them or not

      just copy the name between the brackets and paste into the search space

      O4 - HKLM\..\Run: [IntelliPoint]

Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scanner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the Run ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the add/on to be installed
    • Click Start
  • Make sure that the option Remove found threats is unticked
  • Click on Advanced Settings, ensure the options
    • Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • wait for the virus definitions to be downloaded
  • Wait for the scan to finish
When the scan is complete
  • If no threats were found
    • put a checkmark in "Uninstall application on close"
    • close program
    • report to me that nothing was found
  • If threats were found
    • click on "list of threats found"
    • click on "export to text file" and save it as ESET SCAN and save to the desktop
    • Click on back
    • put a checkmark in "Uninstall application on close"
    • click on finish
    • close program
    • copy and paste the report here
Gringo
Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.