Solved From Rootkits to now browser redirects

Security Check take 2

Results of screen317's Security Check version 0.99.24
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Windows Firewall Enabled!
Microsoft Security Essentials
Antivirus up to date! (On Access scanning disabled!)
```````````````````````````````
Well, I figured I would include this anyway and It looks like I have to manually update the Flash player.

I am going to run the TFC again and then move on to ESET, I will post any results.


Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
CCleaner
Java(TM) 6 Update 29
Adobe Flash Player ( 10.3.183.10) Flash Player Out of Date!
Mozilla Firefox (x86 en-US..)
````````````````````````````````
Process Check:
objlist.exe by Laurent

Windows Defender MSMpEng.exe
Malwarebytes' Anti-Malware mbamservice.exe
Microsoft Security Essentials msseces.exe
Microsoft Security Client Antimalware MsMpEng.exe
``````````End of Log````````````
 
Concerning the previous post, where is the face-palm smilie for the boneheaded manuever of posting right in the middle of the log. :rolleyes:
 
ESET Results

And here is what ESET found.

C:\Documents and Settings\doreen\Local Settings\Application Data\WMTools Downloaded Files\WMToolsUpdate\WMToolsup.dll a variant of Win32/Kryptik.UPZ trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\doreen\Application Data\Mozilla\Firefox\Profiles\cnbcfbib.default\extensions\{4da31c5b-48a2-4fdd-9b16-a5490be18473}\chrome.manifest.vir Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\doreen\Application Data\Mozilla\Firefox\Profiles\cnbcfbib.default\extensions\{4da31c5b-48a2-4fdd-9b16-a5490be18473}\chrome\xulcache.jar.vir JS/Agent.NDO trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{5267AF8C-3CD9-4FE3-9F18-7322BBC788E4}\RP1\A0000050.dll a variant of Win32/Kryptik.UPZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{5267AF8C-3CD9-4FE3-9F18-7322BBC788E4}\RP1\A0000054.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{5267AF8C-3CD9-4FE3-9F18-7322BBC788E4}\RP2\A0000456.dll a variant of Win32/Kryptik.UPZ trojan cleaned by deleting - quarantined
 
Your computer is clean

1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

Run OTL

  • Under the Custom Scans/Fixes box at the bottom, paste in the following:

Code:
:OTL
:Commands
[purity]
[emptytemp]
[EMPTYFLASH]
[CLEARALLRESTOREPOINTS]
[Reboot]

  • Then click the Run Fix button at the top
  • Let the program run unhindered, reboot the PC when it is done
  • Post resulting log.

2. Now, we'll remove all tools, we used during our cleaning process

Clean up with OTL:

  • Double-click OTL.exe to start the program.
  • Close all other programs apart from OTL as this step will require a reboot
  • On the OTL main screen, press the CLEANUP button
  • Say Yes to the prompt and then allow the program to reboot your computer.

If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

3. Make sure, Windows Updates are current.

4. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

7. Run Temporary File Cleaner (TFC) weekly.

8. Download and install Secunia Personal Software Inspector (PSI): https://www.techspot.com/downloads/4898-secunia-personal-software-inspector-psi.html. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

10. (Windows XP only) Run defrag at your convenience.

11. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

12. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

13. Please, let me know, how your computer is doing.
 
OTL log again

Here is the log for OTL and once the system starts getting used again, I will let you know how everything is doing.

Thank you again



All processes killed
========== OTL ==========
========== COMMANDS ==========

[EMPTYTEMP]

User: All Users

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: doreen
->Temp folder emptied: 671663 bytes
->Temporary Internet Files folder emptied: 9528095 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 0 bytes
->Flash cache emptied: 456 bytes

User: LocalService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes
->Flash cache emptied: 0 bytes

User: NetworkService
->Temp folder emptied: 2302 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Java cache emptied: 0 bytes
->Flash cache emptied: 0 bytes

User: owner
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 0 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32\dllcache .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 2121 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
RecycleBin emptied: 0 bytes

Total Files Cleaned = 10.00 mb


[EMPTYFLASH]

User: All Users

User: Default User

User: doreen
->Flash cache emptied: 0 bytes

User: LocalService
->Flash cache emptied: 0 bytes

User: NetworkService
->Flash cache emptied: 0 bytes

User: owner
->Flash cache emptied: 0 bytes

Total Flash Files Cleaned = 0.00 mb

Restore points cleared and new OTL Restore Point set!

OTL by OldTimer - Version 3.2.31.0 log created on 11102011_155640

Files\Folders moved on Reboot...
File\Folder C:\Documents and Settings\doreen\Local Settings\Temp\~DFC662.tmp not found!
File\Folder C:\Documents and Settings\doreen\Local Settings\Temp\~DFC66D.tmp not found!
File\Folder C:\Documents and Settings\doreen\Local Settings\Temp\~DFC6D0.tmp not found!
File\Folder C:\Documents and Settings\doreen\Local Settings\Temp\~DFC6DB.tmp not found!
C:\Documents and Settings\doreen\Local Settings\Temporary Internet Files\Content.IE5\LC224JRD\topic173223-2[1].html moved successfully.
C:\Documents and Settings\doreen\Local Settings\Temporary Internet Files\AntiPhishing\2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2.dat moved successfully.

Registry entries deleted on Reboot...
 
Besides the Java update scheduler constantly crashing and wanting to send an error report, everything else is working just fine. There are no browser redirects that I have seen (a trigger that usually works is to search for antivirus solutions by name).
 
Disable jusched.exe as a startup: http://www.howtogeek.com/howto/windows-vista/what-is-juschedexe-and-why-is-it-running/

Way to go!!
p4193510.gif

Good luck and stay safe :)
 
Back