TechSpot

How tor remove Win64/Patched.A from Win7 Home

Solved
By Judy Miller
Sep 29, 2012
  1. I have read other solutions and all said clean up is specific to only that pc. AVG finds one threat in "service.exe" file but cannot remove or isolate it. My son needs this HP laptop for work and we need help ASAP. Thank you so much for any assistance you can give us. I followed the instructions to run the Farbar scan and following are the results:

    Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 29-09-2012
    Ran by SYSTEM at 29-09-2012 13:22:42
    Running from I:\Downloads\Dave-0912
    Windows 7 Home Premium (X64) OS Language: English(US)
    The current controlset is ControlSet001

    ==================== Registry (Whitelisted) ===================

    HKLM\...\Run: [SynTPEnh] %ProgramFiles%\Synaptics\SynTP\SynTPEnh.exe [2281256 2012-03-04] (Synaptics Incorporated)
    HKLM\...\Run: [RTHDVCPL] C:\Program Files\Realtek\Audio\HDA\RtkNGUI64.exe -s [6489704 2012-03-24] (Realtek Semiconductor)
    HKLM\...\Run: [HPWirelessAssistant] C:\Program Files\Hewlett-Packard\HP Wireless Assistant\DelayedAppStarter.exe 120 C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWA_Main.exe /hidden [363064 2010-06-18] (Hewlett-Packard Company)
    HKLM-x32\...\Run: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun [98304 2010-06-17] (Advanced Micro Devices, Inc.)
    HKLM-x32\...\Run: [AVG_TRAY] "C:\Program Files (x86)\AVG\AVG2012\avgtray.exe" [2596984 2012-07-31] (AVG Technologies CZ, s.r.o.)
    HKLM-x32\...\Run: [vProt] "C:\Program Files (x86)\AVG Secure Search\vprot.exe" [1107552 2012-07-10] ()
    HKLM-x32\...\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [919008 2012-07-27] (Adobe Systems Incorporated)
    HKLM-x32\...\Run: [ROC_roc_dec12] "C:\Program Files (x86)\AVG Secure Search\ROC_roc_dec12.exe" /PROMPT /CMPID=roc_dec12 [928096 2012-01-29] ()
    HKLM-x32\...\Run: [Norton Online Backup] C:\Program Files (x86)\Symantec\Norton Online Backup\NOBuClient.exe [1155928 2010-06-01] (Symantec Corporation)
    HKLM-x32\...\Run: [HP Quick Launch] C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe [586296 2010-11-09] (Hewlett-Packard Development Company, L.P.)
    HKLM-x32\...\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" [254696 2012-01-18] (Sun Microsystems, Inc.)
    HKU\d\...\Run: [HPAdvisorDock] C:\Program Files (x86)\Hewlett-Packard\HP Advisor\Dock\HPAdvisorDock.exe [1712184 2010-02-09] ()
    HKU\Default\...\Run: [HPAdvisorDock] C:\Program Files (x86)\Hewlett-Packard\HP Advisor\DOCK\HPAdvisorDock.exe [1712184 2010-02-09] ()
    HKU\Guest\...\Run: [HPAdvisorDock] C:\Program Files (x86)\Hewlett-Packard\HP Advisor\Dock\HPAdvisorDock.exe [1712184 2010-02-09] ()
    Tcpip\Parameters: [DhcpNameServer] 66.102.144.5 66.102.145.5

    ==================== Services (Whitelisted) ===================

    2 avgfws; "C:\Program Files (x86)\AVG\AVG2012\avgfws.exe" [2321560 2012-06-13] (AVG Technologies CZ, s.r.o.)
    2 AVGIDSAgent; "C:\Program Files (x86)\AVG\AVG2012\AVGIDSAgent.exe" [5167736 2012-08-13] (AVG Technologies CZ, s.r.o.)
    2 avgwd; "C:\Program Files (x86)\AVG\AVG2012\avgwdsvc.exe" [193288 2012-02-14] (AVG Technologies CZ, s.r.o.)
    2 NOBU; "C:\Program Files (x86)\Symantec\Norton Online Backup\NOBuAgent.exe" SERVICE [2804568 2010-06-01] (Symantec Corporation)
    2 vToolbarUpdater11.2.0; C:\Program Files (x86)\Common Files\AVG Secure Search\vToolbarUpdater\11.2.0\ToolbarUpdater.exe [935008 2012-07-10] ()

    ==================== Drivers (Whitelisted) =====================

    1 Avgfwfd; C:\Windows\System32\DRIVERS\avgfwd6a.sys [48992 2011-05-23] (AVG Technologies CZ, s.r.o.)
    3 AVGIDSDriver; C:\Windows\System32\DRIVERS\avgidsdrivera.sys [124496 2011-12-23] (AVG Technologies CZ, s.r.o. )
    3 AVGIDSFilter; C:\Windows\System32\DRIVERS\avgidsfiltera.sys [29776 2011-12-23] (AVG Technologies CZ, s.r.o. )
    0 AVGIDSHA; C:\Windows\System32\Drivers\AVGIDSHA.sys [28480 2012-04-19] (AVG Technologies CZ, s.r.o. )
    1 Avgldx64; C:\Windows\System32\Drivers\Avgldx64.sys [291680 2012-07-26] (AVG Technologies CZ, s.r.o.)
    1 Avgmfx64; C:\Windows\System32\Drivers\Avgmfx64.sys [47696 2011-12-23] (AVG Technologies CZ, s.r.o.)
    0 Avgrkx64; C:\Windows\System32\Drivers\Avgrkx64.sys [36944 2012-01-31] (AVG Technologies CZ, s.r.o.)
    1 Avgtdia; C:\Windows\System32\Drivers\Avgtdia.sys [384352 2012-08-24] (AVG Technologies CZ, s.r.o.)
    2 mrtRate; C:\Windows\SysWow64\Drivers\mrtRate.sys [34916 1999-08-10] (Marimba, Inc.)
    3 NWUSBModem; C:\Windows\System32\DRIVERS\nwusbmdm.sys [213376 2009-02-23] (Novatel Wireless Inc.)
    3 NWUSBPort; C:\Windows\System32\DRIVERS\nwusbser.sys [213376 2009-02-23] (Novatel Wireless Inc.)
    3 NWUSBPort2; C:\Windows\System32\DRIVERS\nwusbser2.sys [213376 2009-02-23] (Novatel Wireless Inc.)
    ==================== NetSvcs (Whitelisted) ====================


    ==================== One Month Created Files and Folders ========

    2012-09-28 16:52 - 2012-09-28 17:20 - 00054105 ____A C:\Users\d\Desktop\result.7z
    2012-09-28 13:43 - 2012-09-28 13:43 - 00000000 ____D C:\Users\d\AppData\Roaming\U3
    2012-09-22 18:54 - 2012-09-22 18:54 - 00000000 ____D C:\Users\Administrator\AppData\Roaming\Adobe
    2012-09-15 13:51 - 2012-09-28 16:35 - 00000000 ____D C:\Program Files (x86)\Java
    2012-09-15 13:51 - 2012-09-15 13:51 - 00477168 ____A (Sun Microsystems, Inc.) C:\Windows\SysWOW64\npdeployJava1.dll
    2012-09-15 13:51 - 2012-09-15 13:51 - 00157680 ____A (Sun Microsystems, Inc.) C:\Windows\SysWOW64\javaws.exe
    2012-09-15 13:51 - 2012-09-15 13:51 - 00149488 ____A (Sun Microsystems, Inc.) C:\Windows\SysWOW64\javaw.exe
    2012-09-15 13:51 - 2012-09-15 13:51 - 00149488 ____A (Sun Microsystems, Inc.) C:\Windows\SysWOW64\java.exe
    2012-09-14 11:34 - 2012-09-14 11:35 - 00000000 ____D C:\Program Files (x86)\Mozilla Maintenance Service
    2012-09-11 11:32 - 2012-09-11 11:32 - 00000000 __SHD C:\Windows\SysWOW64\%APPDATA%
    2012-09-01 08:05 - 2012-09-01 08:06 - 01001264 ____A (Solid State Networks) C:\Users\d\Downloads\install_flashplayer11x32ax_mssd_au_aih.exe


    ==================== 3 Months Modified Files ==================

    2012-09-29 12:03 - 2009-07-13 20:45 - 00023248 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
    2012-09-29 12:03 - 2009-07-13 20:45 - 00023248 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
    2012-09-29 11:56 - 2012-06-23 12:04 - 00000884 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
    2012-09-29 11:56 - 2012-01-29 12:14 - 00016672 ____A C:\Windows\setupact.log
    2012-09-29 11:56 - 2009-07-13 21:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
    2012-09-29 11:54 - 2012-06-23 12:04 - 00000888 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
    2012-09-29 11:54 - 2012-04-18 07:53 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
    2012-09-29 11:54 - 2012-03-31 15:03 - 00000334 ____A C:\Windows\Tasks\HPCeeScheduleForD-HP$.job
    2012-09-28 18:08 - 2009-07-13 21:13 - 00726142 ____A C:\Windows\System32\PerfStringBackup.INI
    2012-09-28 17:20 - 2012-09-28 16:52 - 00054105 ____A C:\Users\d\Desktop\result.7z
    2012-09-28 15:41 - 2012-06-30 18:45 - 00000316 ____A C:\Windows\Tasks\HPCeeScheduleFord.job
    2012-09-28 07:57 - 2009-07-13 21:08 - 00032642 ____A C:\Windows\Tasks\SCHEDLGU.TXT
    2012-09-22 08:23 - 2012-04-18 07:53 - 00696240 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
    2012-09-22 08:23 - 2012-01-27 12:14 - 00073136 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
    2012-09-15 17:22 - 2012-01-29 12:14 - 00174648 ____A C:\Windows\PFRO.log
    2012-09-15 13:51 - 2012-09-15 13:51 - 00477168 ____A (Sun Microsystems, Inc.) C:\Windows\SysWOW64\npdeployJava1.dll
    2012-09-15 13:51 - 2012-09-15 13:51 - 00157680 ____A (Sun Microsystems, Inc.) C:\Windows\SysWOW64\javaws.exe
    2012-09-15 13:51 - 2012-09-15 13:51 - 00149488 ____A (Sun Microsystems, Inc.) C:\Windows\SysWOW64\javaw.exe
    2012-09-15 13:51 - 2012-09-15 13:51 - 00149488 ____A (Sun Microsystems, Inc.) C:\Windows\SysWOW64\java.exe
    2012-09-15 13:51 - 2010-07-10 21:29 - 00473072 ____A (Sun Microsystems, Inc.) C:\Windows\SysWOW64\deployJava1.dll
    2012-09-11 11:46 - 2012-01-27 02:21 - 00000967 ____A C:\Users\Public\Desktop\AVG 2012.lnk
    2012-09-10 05:26 - 2010-12-01 00:05 - 01348275 ____A C:\Windows\WindowsUpdate.log
    2012-09-05 09:20 - 2012-06-23 12:16 - 00002346 ____A C:\Users\Public\Desktop\Google Chrome.lnk
    2012-09-01 08:06 - 2012-09-01 08:05 - 01001264 ____A (Solid State Networks) C:\Users\d\Downloads\install_flashplayer11x32ax_mssd_au_aih.exe
    2012-08-24 16:06 - 2012-08-15 14:21 - 00057627 ____A C:\alotserviceruntime.log
    2012-08-24 16:06 - 2012-08-15 14:21 - 00023016 ____A C:\INSTALLHELPER.LOG
    2012-08-24 14:43 - 2012-08-24 14:43 - 00384352 ____A (AVG Technologies CZ, s.r.o.) C:\Windows\System32\Drivers\avgtdia.sys
    2012-08-22 18:39 - 2009-07-13 20:45 - 00434608 ____A C:\Windows\System32\FNTCACHE.DAT
    2012-08-22 04:38 - 2012-02-20 15:48 - 62134624 ____A (Microsoft Corporation) C:\Windows\System32\MRT.exe
    2012-08-19 10:02 - 2012-08-19 10:02 - 00000000 ____A C:\Windows\SysWOW64\?w?xlotserviceruntime.log
    2012-08-13 11:11 - 2012-08-13 11:11 - 00116472 ____A C:\Users\Guest\AppData\Local\GDIPFONTCACHEV1.DAT
    2012-08-13 11:08 - 2012-08-13 11:08 - 00000020 ___SH C:\Users\Guest\ntuser.ini
    2012-08-05 19:14 - 2012-08-05 19:14 - 00000692 ____A C:\Users\d\Downloads\pibiview.js
    2012-07-26 02:21 - 2012-07-26 02:21 - 00291680 ____A (AVG Technologies CZ, s.r.o.) C:\Windows\System32\Drivers\avgldx64.sys
    2012-07-18 10:15 - 2012-08-19 15:57 - 03148800 ____A (Microsoft Corporation) C:\Windows\System32\win32k.sys
    2012-07-08 11:44 - 2012-07-08 11:49 - 00143626 ____A C:\Users\d\Desktop\prescription-drug-card.jpeg
    2012-07-08 11:44 - 2012-07-08 11:44 - 00143626 ____A C:\Users\d\Downloads\prescription-drug-card.jpeg
    2012-07-06 19:16 - 2012-07-06 19:16 - 01272776 ____A C:\Users\d\Downloads\ArcadeCandyGames.exe
    2012-07-04 14:16 - 2012-08-19 15:57 - 00073216 ____A (Microsoft Corporation) C:\Windows\System32\netapi32.dll
    2012-07-04 14:13 - 2012-08-19 15:57 - 00136704 ____A (Microsoft Corporation) C:\Windows\System32\browser.dll
    2012-07-04 14:13 - 2012-08-19 15:57 - 00059392 ____A (Microsoft Corporation) C:\Windows\System32\browcli.dll
    2012-07-04 13:16 - 2012-08-19 15:57 - 00057344 ____A (Microsoft Corporation) C:\Windows\SysWOW64\netapi32.dll
    2012-07-04 13:14 - 2012-08-19 15:57 - 00041984 ____A (Microsoft Corporation) C:\Windows\SysWOW64\browcli.dll

    ZeroAccess:
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}\@
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}\L
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}\U
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}\L\00000004.@
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}\L\201d3dde
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}\U\00000004.@
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}\U\00000008.@
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}\U\000000cb.@
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}\U\80000000.@
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}\U\80000032.@
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2}\U\80000064.@

    ZeroAccess:
    C:\Windows\assembly\GAC_32\Desktop.ini

    ZeroAccess:
    C:\Windows\assembly\GAC_64\Desktop.ini

    ==================== Known DLLs (Whitelisted) =================


    ==================== Bamital & volsnap Check =================

    C:\Windows\System32\winlogon.exe => MD5 is legit
    C:\Windows\System32\wininit.exe => MD5 is legit
    C:\Windows\SysWOW64\wininit.exe => MD5 is legit
    C:\Windows\explorer.exe => MD5 is legit
    C:\Windows\SysWOW64\explorer.exe => MD5 is legit
    C:\Windows\System32\svchost.exe => MD5 is legit
    C:\Windows\SysWOW64\svchost.exe => MD5 is legit
    C:\Windows\System32\services.exe 50BEA589F7D7958BDD2528A8F69D05CC ZeroAccess <==== ATTENTION!.
    C:\Windows\System32\User32.dll => MD5 is legit
    C:\Windows\SysWOW64\User32.dll => MD5 is legit
    C:\Windows\System32\userinit.exe => MD5 is legit
    C:\Windows\SysWOW64\userinit.exe => MD5 is legit
    C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

    ==================== EXE ASSOCIATION =====================

    HKLM\...\.exe: exefile => OK
    HKLM\...\exefile\DefaultIcon: %1 => OK
    HKLM\...\exefile\open\command: "%1" %* => OK

    ==================== Restore Points =========================

    Restore point made on: 2012-09-01 09:51:53
    Restore point made on: 2012-09-15 13:50:39
    Restore point made on: 2012-09-15 18:10:23
    Restore point made on: 2012-09-15 18:32:35
    Restore point made on: 2012-09-15 20:03:41
    Restore point made on: 2012-09-15 20:05:28
    Restore point made on: 2012-09-23 20:45:15
    Restore point made on: 2012-09-28 08:08:15

    ==================== Memory info ===========================

    Percentage of memory in use: 18%
    Total physical RAM: 3834.9 MB
    Available physical RAM: 3114.25 MB
    Total Pagefile: 3833.05 MB
    Available Pagefile: 3110.43 MB
    Total Virtual: 8192 MB
    Available Virtual: 8191.9 MB

    ==================== Partitions =============================

    1 Drive c: (OS) (Fixed) (Total:280.47 GB) (Free:228.43 GB) NTFS ==>[System with boot components (obtained from reading drive)]
    2 Drive e: (RECOVERY) (Fixed) (Total:17.33 GB) (Free:0.07 GB) NTFS ==>[System with boot components (obtained from reading drive)]
    3 Drive f: (HP_TOOLS) (Fixed) (Total:0.1 GB) (Free:0.09 GB) FAT32
    5 Drive h: (U3 System) (CDROM) (Total:0.01 GB) (Free:0 GB) CDFS
    6 Drive I: (NEW VOLUME) (Removable) (Total:1.87 GB) (Free:1.03 GB) FAT
    7 Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
    8 Drive y: (SYSTEM) (Fixed) (Total:0.19 GB) (Free:0.15 GB) NTFS ==>[System with boot components (obtained from reading drive)]

    Disk ### Status Size Free Dyn Gpt
    -------- ------------- ------- ------- --- ---
    Disk 0 Online 298 GB 0 B
    Disk 1 Online 1916 MB 0 B

    Partitions of Disk 0:
    ===============

    Partition ### Type Size Offset
    ------------- ---------------- ------- -------
    Partition 1 Primary 199 MB 1024 KB
    Partition 2 Primary 280 GB 200 MB
    Partition 3 Primary 17 GB 280 GB
    Partition 4 Primary 103 MB 297 GB

    ==================================================================================

    Disk: 0
    Partition 1
    Type : 07
    Hidden: No
    Active: Yes

    Volume ### Ltr Label Fs Type Size Status Info
    ---------- --- ----------- ----- ---------- ------- --------- --------
    * Volume 2 Y SYSTEM NTFS Partition 199 MB Healthy

    =========================================================

    Disk: 0
    Partition 2
    Type : 07
    Hidden: No
    Active: No

    Volume ### Ltr Label Fs Type Size Status Info
    ---------- --- ----------- ----- ---------- ------- --------- --------
    * Volume 3 C OS NTFS Partition 280 GB Healthy

    =========================================================

    Disk: 0
    Partition 3
    Type : 07
    Hidden: No
    Active: No

    Volume ### Ltr Label Fs Type Size Status Info
    ---------- --- ----------- ----- ---------- ------- --------- --------
    * Volume 4 E RECOVERY NTFS Partition 17 GB Healthy

    =========================================================

    Disk: 0
    Partition 4
    Type : 0C
    Hidden: No
    Active: No

    Volume ### Ltr Label Fs Type Size Status Info
    ---------- --- ----------- ----- ---------- ------- --------- --------
    * Volume 5 F HP_TOOLS FAT32 Partition 103 MB Healthy

    =========================================================

    Partitions of Disk 1:
    ===============

    Partition ### Type Size Offset
    ------------- ---------------- ------- -------
    Partition 1 Primary 1913 MB 31 KB

    ==================================================================================

    Disk: 1
    Partition 1
    Type : 06
    Hidden: No
    Active: No

    Volume ### Ltr Label Fs Type Size Status Info
    ---------- --- ----------- ----- ---------- ------- --------- --------
    * Volume 6 I NEW VOLUME FAT Removable 1913 MB Healthy

    =========================================================

    Last Boot: 2012-09-25 03:04

    ==================== End Of Log =============================
     
  2. Broni

    Broni Malware Annihilator Posts: 47,668   +267

    Welcome aboard [​IMG]

    Please, observe following rules:
    • Read all of my instructions very carefully. Your mistakes during cleaning process may have very serious consequences, like unbootable computer.
    • If you're stuck, or you're not sure about certain step, always ask before doing anything else.
    • Please refrain from running any tools, fixes or applying any changes to your computer other than those I suggest.
    • Never run more than one scan at a time.
    • Keep updating me regarding your computer behavior, good, or bad.
    • The cleaning process, once started, has to be completed. Even if your computer appears to act better, it may still be infected. Once the computer is totally clean, I'll certainly let you know.
    • If you leave the topic without explanation in the middle of a cleaning process, you may not be eligible to receive any more help in malware removal forum.
    • I close my topics if you have not replied in 5 days. If you need more time, simply let me know. If I closed your topic and you need it to be reopened, simply PM me.

    ==================================

    Re-run FRST again.
    Type the following in the edit box after "Search:".

    services.exe

    Click Search button and post the log (Search.txt) it makes in your reply.
     
  3. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    First, thank you for replying so promptly. I ran the search as you suggested and got the following results:

    Farbar Recovery Scan Tool (x64) Version: 29-09-2012
    Ran by SYSTEM at 2012-09-29 19:06:20
    Running from I:\Downloads\Dave-0912

    ================== Search: "services.exe" ===================

    C:\Windows\winsxs\amd64_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.1.7600.16385_none_2b54b20ee6fa07b1\services.exe
    [2009-07-13 15:19] - [2009-07-13 17:39] - 0328704 ____A (Microsoft Corporation) 24ACB7E5BE595468E3B9AA488B9B4FCB

    C:\Windows\System32\services.exe
    [2009-07-13 15:19] - [2009-07-13 17:39] - 0329216 ____A (Microsoft Corporation) 50BEA589F7D7958BDD2528A8F69D05CC

    ====== End Of Search ======
     
  4. Broni

    Broni Malware Annihilator Posts: 47,668   +267

    Download attached fixlist.txt file and save it to the very same USB flash drive you've been using. Plug the drive back in.

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    On Vista or Windows 7: Now please enter System Recovery Options.
    On Windows XP: Now please boot into the UBCD.
    Run FRST/FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

    Next...

    Restart normally.

    ================================

    Download TDSSKiller and save it to your desktop.
    • Extract (unzip) its contents to your desktop.
    • Open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
    • If an infected file is detected, the default action will be Cure, click on Continue.
    • If a suspicious file is detected, the default action will be Skip, click on Continue.
    • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
    • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
    • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.

    ===============================

    • Download RogueKiller on the desktop
    • Close all the running programs
    • Windows Vista/7 users: right click on RogueKiller.exe, click Run as Administrator
    • Otherwise just double-click on RogueKiller.exe
    • Pre-scan will start. Let it finish.
    • Click on SCAN button.
    • Wait until the Status box shows Scan Finished
    • Click on Delete.
    • Wait until the Status box shows Deleting Finished.
    • Click on Report and copy/paste the content of the Notepad into your next reply.
    • RKreport.txt could also be found on your desktop.
    • If more than one log is produced post all logs.
    • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename it to winlogon.exe (or winlogon.com) and try again

    ===============================

    Download Malwarebytes' Anti-Malware (MBAM): http://www.malwarebytes.org/products/malwarebytes_free to your desktop.
    Alternate download: http://www.filehippo.com/download_malwarebytes_anti_malware/
    NOTE. If you already have MBAM installed, update it before running the scan.

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform quick scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    Be sure to restart the computer IF MBAM asks you to do so.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    ===================================

    Download aswMBR to your desktop.
    Double click the aswMBR.exe to run it.
    If you see this question: Would you like to download latest Avast! virus definitions?" say "Yes".
    Click the "Scan" button to start scan.
    On completion of the scan click "Save log", save it to your desktop and post in your next reply.

    NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.
     

    Attached Files:

  5. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    Fixlog results: Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 29-09-2012
    Ran by SYSTEM at 2012-09-29 19:44:43 Run:1
    Running from I:\Downloads\Dave-0912

    ==============================================

    HKEY_LOCAL_MACHINE\System\ControlSet001\Control\Session Manager\SubSystems\\Windows No ZeroAccess entry found.
    C:\Windows\System32\consrv.dll not found.
    C:\Windows\Installer\{d5fa697f-768e-713f-59b3-04c039cb0df2} moved successfully.
    C:\Windows\assembly\GAC_32\Desktop.ini moved successfully.
    C:\Windows\assembly\GAC_64\Desktop.ini moved successfully.
    C:\Windows\System32\services.exe moved successfully.
    C:\Windows\winsxs\amd64_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.1.7600.16385_none_2b54b20ee6fa07b1\services.exe copied successfully to C:\Windows\System32\services.exe

    ==== End of Fixlog ====

    I ran TDSSKiller but the report wouldn't allow copy/paste when I right-clicked. However the report said "No Threats Found"
     
  6. Broni

    Broni Malware Annihilator Posts: 47,668   +267

    Go on...
     
  7. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    Here's the RogueKiller Report
    RogueKiller V8.1.0 [09/28/2012] by Tigzy
    mail: tigzyRK<at>gmail<dot>com
    Feedback: http://www.geekstogo.com/forum/files/file/413-roguekiller/
    Website: http://tigzy.geekstogo.com/roguekiller.php
    Blog: http://tigzyrk.blogspot.com

    Operating System: Windows 7 (6.1.7601 Service Pack 1) 64 bits version
    Started in : Normal mode
    User : d [Admin rights]
    Mode : Remove -- Date : 09/29/2012 20:33:56

    ¤¤¤ Bad processes : 0 ¤¤¤

    ¤¤¤ Registry Entries : 2 ¤¤¤
    [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
    [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

    ¤¤¤ Particular Files / Folders: ¤¤¤

    ¤¤¤ Driver : [NOT LOADED] ¤¤¤

    ¤¤¤ Infection : Root.MBR ¤¤¤

    ¤¤¤ HOSTS File: ¤¤¤
    --> C:\Windows\system32\drivers\etc\hosts



    ¤¤¤ MBR Check: ¤¤¤

    +++++ PhysicalDrive0: TOSHIBA MK3265GSX SATA Disk Device +++++
    --- User ---
    [MBR] 72db6d4be8cff22242ff4ed7f053c483
    [BSP] f8df6936359b6dfa5af9fba87ac53e9c : Windows Vista/7 MBR Code
    Partition table:
    0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 199 Mo
    1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 287198 Mo
    2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 588591104 | Size: 17743 Mo
    3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 624928768 | Size: 103 Mo
    User = LL1 ... OK!
    User != LL2 ... KO!
    --- LL2 ---
    [MBR] bd84027182eb3fed43cf3582a73923a9
    [BSP] 9cacbabd776791cd60555b7192e1e299 : MBR Code unknown
    Partition table:
    0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 69632 Mo
    1 - [ACTIVE] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 143015936 | Size: 400 Mo

    +++++ PhysicalDrive1: SanDisk Cruzer USB Device +++++
    --- User ---
    [MBR] cc6b96a00774f4396df92f1794ae340c
    [BSP] ba66168ab8823ecbcc8feb9b941093b2 : Windows XP MBR Code
    Partition table:
    0 - [XXXXXX] FAT16 (0x06) [VISIBLE] Offset (sectors): 63 | Size: 1913 Mo
    User = LL1 ... OK!
    Error reading LL2 MBR!

    Finished : << RKreport[2].txt >>
    RKreport[1].txt ; RKreport[2].txt
     
  8. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    Here's the Malwarebytes log. They didn't find the virus. Hooray!!!
    Malwarebytes Anti-Malware 1.65.0.1400
    www.malwarebytes.org

    Database version: v2012.09.29.05

    Windows 7 Service Pack 1 x64 NTFS
    Internet Explorer 9.0.8112.16421
    d :: D-HP [administrator]

    9/29/2012 8:49:05 PM
    mbam-log-2012-09-29 (20-49-05).txt

    Scan type: Quick scan
    Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
    Scan options disabled: P2P
    Objects scanned: 233226
    Time elapsed: 4 minute(s), 6 second(s)

    Memory Processes Detected: 0
    (No malicious items detected)

    Memory Modules Detected: 0
    (No malicious items detected)

    Registry Keys Detected: 2
    HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{65bcd620-07dd-012f-819f-073cf1b8f7c6} (Adware.GamePlayLab) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLab) -> Quarantined and deleted successfully.

    Registry Values Detected: 0
    (No malicious items detected)

    Registry Data Items Detected: 0
    (No malicious items detected)

    Folders Detected: 0
    (No malicious items detected)

    Files Detected: 4
    C:\Users\d\Downloads\IWantThis (1).exe (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
    C:\Users\d\Downloads\IWantThis(1).exe (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
    C:\Users\d\Downloads\IWantThis(2).exe (Adware.GamePlayLabs) -> Quarantined and deleted successfully.
    C:\Users\d\Downloads\IWantThis.exe (Adware.GamePlayLabs) -> Quarantined and deleted successfully.

    (end)
     
  9. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    Here's the saved log from running aswMBR.exe. It looks like the corrupted files were quarantined and later removed. I think the pc is clean now. I want to give you a big hug and thank you for your wonderful assistance. My son is thrilled too because he returns to work on Sunday and needs his laptop. You're so kind to give this free advice.

    aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
    Run date: 2012-09-30 00:27:00
    -----------------------------
    00:27:00.961 OS Version: Windows x64 6.1.7601 Service Pack 1
    00:27:00.961 Number of processors: 2 586 0x603
    00:27:00.962 ComputerName: D-HP UserName: d
    00:27:02.735 Initialize success
    00:27:02.816 AVAST engine defs: 12092901
    00:27:35.181 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\0000005a
    00:27:35.187 Disk 0 Vendor: TOSHIBA_ GJ00 Size: 305245MB BusType: 11
    00:27:35.205 Disk 0 MBR read successfully
    00:27:35.212 Disk 0 MBR scan
    00:27:35.219 Disk 0 unknown MBR code
    00:27:35.236 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 199 MB offset 2048
    00:27:35.258 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 287198 MB offset 409600
    00:27:35.289 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 17743 MB offset 588591104
    00:27:35.309 Disk 0 Partition 4 00 0C FAT32 LBA MSDOS5.0 103 MB offset 624928768
    00:27:35.354 Disk 0 scanning C:\Windows\system32\drivers
    00:27:44.592 Service scanning
    00:28:24.702 Modules scanning
    00:28:24.722 Disk 0 trace - called modules:
    00:28:24.775 ntoskrnl.exe CLASSPNP.SYS disk.sys amdxata.sys storport.sys hal.dll amdsata.sys
    00:28:24.788 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa80042d0730]
    00:28:24.800 3 CLASSPNP.SYS[fffff8800195f43f] -> nt!IofCallDriver -> [0xfffffa80042608a0]
    00:28:24.812 5 amdxata.sys[fffff880010867a8] -> nt!IofCallDriver -> \Device\0000005a[0xfffffa800425e060]
    00:28:25.990 AVAST engine scan C:\Windows
    00:28:28.551 AVAST engine scan C:\Windows\system32
    00:31:02.923 AVAST engine scan C:\Windows\system32\drivers
    00:31:38.617 AVAST engine scan C:\Users\d
    00:38:07.516 Disk 0 MBR has been saved successfully to "C:\Users\d\Desktop\MBR.dat"
    00:38:07.523 The log file has been saved successfully to "C:\Users\d\Desktop\aswMBR.txt"
     
  10. Broni

    Broni Malware Annihilator Posts: 47,668   +267

    Create new restore point before proceeding with the next step....
    How to:
    - Windows 7: http://www.howtogeek.com/howto/3195/create-a-system-restore-point-in-windows-7/
    - Vista: http://www.howtogeek.com/howto/wind...tore-point-for-windows-vistas-system-restore/
    - XP: http://support.microsoft.com/kb/948247

    ======================================

    Please download ComboFix from Here, Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    • Never rename Combofix unless instructed.
    • Close any open browsers.
    • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
      If restarting doesn't help use restore point you created prior to running Combofix.
    • Double click on combofix.exe & follow the prompts.

    • NOTE1. If Combofix asks you to install Recovery Console, please allow it.
      NOTE 2. If Combofix asks you to update the program, always do so.
    • When finished, it will produce a report for you.
    • Please post the "C:\ComboFix.txt"
    **Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall
    **Note 2 for AVG and CA Internet Security (Total Defense Internet Security) users: ComboFix will not run until AVG/CA Internet Security is uninstalled as a protective measure against the anti-virus. This is because AVG/CA Internet Security "falsely" detects ComboFix (or its embedded files) as a threat and may remove them resulting in the tool not working correctly which in turn can cause "unpredictable results". Since AVG/CA Internet Security cannot be effectively disabled before running ComboFix, the author recommends you to uninstall AVG/CA Internet Security first.
    Use AppRemover to uninstall it: http://www.appremover.com/
    We can reinstall it when we're done with CF.
    **Note 3: If you receive an error "Illegal operation attempted on a registery key that has been marked for deletion", restart computer to fix the issue.
    **Note 4: Some infections may take some significant time to be cured. As long as your computer clock is running Combofix is still working. Be patient.


    Make sure, you re-enable your security programs, when you're done with Combofix.

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    NOTE.
    If, for some reason, Combofix refuses to run, try the following...

    Delete Combofix file, download fresh one, but rename combofix.exe to your_name.exe BEFORE saving it to your desktop.
    Do NOT run it yet.
    Download Rkill (courtesy of BleepingComputer.com) to your desktop.
    There are 2 different versions. If one of them won't run then download and try to run the other one.
    You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

    rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
    iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

    Restart computer in safe mode

    • Double-click on the Rkill desktop icon to run the tool.
    • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
    • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
    • If not, delete the file, then download and use the one provided in Link 2.
    • Do not reboot until instructed.
    • If the tool does not run from any of the links provided, please let me know.

    When the scan is done Notepad will open with rKill.txt log.
    NOTE. rKill.txt log will also be present on your desktop.

    Once you've gotten one of them to run, immediately run your_name.exe by double clicking on it.

    IF you had to run rKill post BOTH logs, rKill.txt and Combofix.txt.
     
  11. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    Wow, even more programs to run a complete cleanup!! My son took his laptop when he returned to work today and won't be back until next Thurs. night. At that time or Fri. morning I will be able to run this add'l program. Please don't close out this thread before I have a chance to access his laptop again for this next cleanup step. Meanwhile I'll email him to not do much internet surfing nor opening any suspicious email attachments.
     
     
  12. Broni

    Broni Malware Annihilator Posts: 47,668   +267

    No problem :)
     
  13. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    I have run combofix.exe as you suggested. The program ran fine and got up to 32 scans completed, with no comments. I left the pc alone to complete its scan. When I returned, Win7 had switched to "Login" screen. I logged in again and Windows showed the combofix prog still running but it now said the scan was completed and please wait while it created a log. I waited about 45 mins for the prog to create its log but finally gave up. I think the program stalled because Win7 closed and had to reopen. I finally closed the prog, rebooted, and I'm running it again. Any suggestions to keep Windows from closing while this prog is running? I feel I have to sit here and watch it and keep hitting the spacebar so Win7 will know I'm still working the OS.
     
  14. Broni

    Broni Malware Annihilator Posts: 47,668   +267

    Re-run Combofix.
     
  15. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    Hi Again - I re-ran combofix. This time it ran really fast and printed a log, all within slightly over 5 mins. Here are the results:

    ComboFix 12-10-04.02 - d 10/05/2012 16:02:23.2.2 - x64
    Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.3835.2702 [GMT -7:00]
    Running from: c:\users\d\Desktop\ComboFix.exe
    AV: AVG Internet Security 2012 *Enabled/Updated* {5A2746B1-DEE9-F85A-FBCD-ADB11639C5F0}
    FW: AVG Internet Security 2012 *Disabled* {621CC794-9486-F902-D092-0484E8EA828B}
    SP: AVG Internet Security 2012 *Enabled/Updated* {E146A755-F8D3-F7D4-C17D-96C36DBE8F4D}
    SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
    .
    .
    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    ---- Previous Run -------
    .
    c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Adobe Gamma Loader.exe.lnk
    c:\users\d\AppData\Local\Microsoft\Windows\Temporary Internet Files\{580348FE-6E2D-4151-A24B-A3454F278690}.xps
    c:\users\d\AppData\Local\Microsoft\Windows\Temporary Internet Files\{E079F829-E9EB-44AF-B3E8-50994F957E3D}.xps
    .
    .
    ((((((((((((((((((((((((( Files Created from 2012-09-05 to 2012-10-05 )))))))))))))))))))))))))))))))
    .
    .
    2012-10-05 23:10 . 2012-10-05 23:10 -------- d-----w- c:\users\Guest\AppData\Local\temp
    2012-10-05 23:10 . 2012-10-05 23:10 -------- d-----w- c:\users\Default\AppData\Local\temp
    2012-09-30 04:15 . 2012-08-21 09:13 71600 ----a-w- c:\windows\system32\drivers\aswMonFlt.sys
    2012-09-30 04:15 . 2012-08-21 09:12 285328 ----a-w- c:\windows\system32\aswBoot.exe
    2012-09-30 04:14 . 2012-08-21 09:12 41224 ----a-w- c:\windows\avastSS.scr
    2012-09-30 04:14 . 2012-08-21 09:12 227648 ----a-w- c:\windows\SysWow64\aswBoot.exe
    2012-09-30 04:14 . 2012-09-30 04:14 -------- d-----w- c:\programdata\AVAST Software
    2012-09-30 04:14 . 2012-09-30 04:14 -------- d-----w- c:\program files\AVAST Software
    2012-09-30 03:47 . 2012-09-30 03:47 -------- d-----w- c:\users\d\AppData\Roaming\Malwarebytes
    2012-09-30 03:47 . 2012-09-30 03:47 -------- d-----w- c:\program files (x86)\Malwarebytes' Anti-Malware
    2012-09-30 03:47 . 2012-09-30 03:47 -------- d-----w- c:\programdata\Malwarebytes
    2012-09-30 03:47 . 2012-09-08 00:04 25928 ----a-w- c:\windows\system32\drivers\mbam.sys
    2012-09-29 21:22 . 2012-09-29 21:22 -------- d-----w- C:\FRST
    2012-09-28 21:43 . 2012-09-28 21:43 -------- d-----w- c:\users\d\AppData\Roaming\U3
    2012-09-15 21:51 . 2012-09-29 00:35 -------- d-----w- c:\program files (x86)\Common Files\Java
    2012-09-15 21:51 . 2012-09-15 21:51 477168 ----a-w- c:\windows\SysWow64\npdeployJava1.dll
    2012-09-15 21:51 . 2012-09-29 00:35 -------- d-----w- c:\program files (x86)\Java
    2012-09-14 19:34 . 2012-09-14 19:35 -------- d-----w- c:\program files (x86)\Mozilla Maintenance Service
    2012-09-14 19:34 . 2012-09-14 19:34 157608 ----a-w- c:\program files (x86)\Mozilla Firefox\maintenanceservice_installer.exe
    2012-09-14 19:34 . 2012-09-14 19:34 113120 ----a-w- c:\program files (x86)\Mozilla Firefox\maintenanceservice.exe
    2012-09-14 19:34 . 2012-09-14 19:34 770384 ----a-w- c:\program files (x86)\Mozilla Firefox\msvcr100.dll
    2012-09-14 19:34 . 2012-09-14 19:34 421200 ----a-w- c:\program files (x86)\Mozilla Firefox\msvcp100.dll
    2012-09-11 19:32 . 2012-09-11 19:32 -------- d-sh--w- c:\windows\SysWow64\%APPDATA%
    .
    .
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2012-09-22 16:23 . 2012-04-18 15:53 696240 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
    2012-09-22 16:23 . 2012-01-27 20:14 73136 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
    2012-09-15 21:51 . 2010-07-11 05:29 473072 ----a-w- c:\windows\SysWow64\deployJava1.dll
    2012-08-24 22:43 . 2012-08-24 22:43 384352 ----a-w- c:\windows\system32\drivers\avgtdia.sys
    2012-08-22 12:38 . 2012-02-20 23:48 62134624 ----a-w- c:\windows\system32\MRT.exe
    2012-07-26 10:21 . 2012-07-26 10:21 291680 ----a-w- c:\windows\system32\drivers\avgldx64.sys
    2012-07-18 18:15 . 2012-08-19 23:57 3148800 ----a-w- c:\windows\system32\win32k.sys
    .
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4
    .
    [HKEY_LOCAL_MACHINE\Wow6432Node\~\Browser Helper Objects\{95B7759C-8C7F-4BF1-B163-73684A933233}]
    2012-07-11 04:38 2074208 ----a-w- c:\program files (x86)\AVG Secure Search\11.1.0.12\AVG Secure Search_toolbar.dll
    .
    [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar]
    "{95B7759C-8C7F-4BF1-B163-73684A933233}"= "c:\program files (x86)\AVG Secure Search\11.1.0.12\AVG Secure Search_toolbar.dll" [2012-07-11 2074208]
    .
    [HKEY_CLASSES_ROOT\clsid\{95b7759c-8c7f-4bf1-b163-73684a933233}]
    [HKEY_CLASSES_ROOT\AVG Secure Search.PugiObj.1]
    [HKEY_CLASSES_ROOT\AVG Secure Search.PugiObj]
    .
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "HPAdvisorDock"="c:\program files (x86)\Hewlett-Packard\HP Advisor\Dock\HPAdvisorDock.exe" [2010-02-10 1712184]
    .
    [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
    "StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-06-17 98304]
    "Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-27 919008]
    "ROC_roc_dec12"="c:\program files (x86)\AVG Secure Search\ROC_roc_dec12.exe" [2012-01-29 928096]
    "SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2012-01-18 254696]
    .
    c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
    Billminder.lnk - c:\quickenw\BILLMIND.EXE [2012-5-13 36864]
    Quicken Startup.lnk - c:\quickenw\QWDLLS.EXE [2012-5-13 36864]
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "ConsentPromptBehaviorAdmin"= 5 (0x5)
    "ConsentPromptBehaviorUser"= 3 (0x3)
    "EnableUIADesktopToggle"= 0 (0x0)
    .
    [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]
    "LoadAppInit_DLLs"=0 (0x0)
    .
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
    BootExecute REG_MULTI_SZ autocheck autochk *\0c:\progra~2\AVG\AVG2012\avgrsa.exe /sync /restart
    .
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
    Security Packages REG_MULTI_SZ kerberos msv1_0 schannel wdigest tspkg pku2u livessp
    .
    R2 AVGIDSAgent;AVGIDSAgent;c:\program files (x86)\AVG\AVG2012\AVGIDSAgent.exe [2012-08-13 5167736]
    R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
    R2 gupdate;Google Update Service (gupdate);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-06-23 116648]
    R2 HP Support Assistant Service;HP Support Assistant Service;c:\program files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe [2011-09-10 86072]
    R2 HP Wireless Assistant Service;HP Wireless Assistant Service;c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWA_Service.exe [2010-06-18 103992]
    R2 mrtRate;mrtRate; [x]
    R2 RtVOsdService;RtVOsdService Installer;c:\program files\Realtek\RtVOsd\RtVOsdService.exe [2010-06-24 315392]
    R3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-09-22 250288]
    R3 gupdatem;Google Update Service (gupdatem);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-06-23 116648]
    R3 MozillaMaintenance;Mozilla Maintenance Service;c:\program files (x86)\Mozilla Maintenance Service\maintenanceservice.exe [2012-09-14 113120]
    R3 netw5v64;Intel(R) Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;c:\windows\system32\DRIVERS\netw5v64.sys [2009-06-10 5434368]
    R3 NWUSBCDFIL64;Novatel Wireless Installation CD;c:\windows\system32\DRIVERS\NwUsbCdFil64.sys [2009-04-07 25600]
    R3 NWUSBPort2;Novatel Wireless USB Status2 Port Driver;c:\windows\system32\DRIVERS\nwusbser2.sys [2009-02-24 213376]
    R3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [2010-01-10 4925184]
    R3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;c:\windows\system32\Drivers\RtsUStor.sys [2010-05-07 245792]
    R3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\DRIVERS\VSTAZL6.SYS [2009-06-10 292864]
    R3 SrvHsfV92;SrvHsfV92;c:\windows\system32\DRIVERS\VSTDPV6.SYS [2009-06-10 1485312]
    R3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\DRIVERS\VSTCNXT6.SYS [2009-06-10 740864]
    R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-20 59392]
    R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2012-01-28 1255736]
    R3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x64.sys [2009-06-10 389120]
    S0 AVGIDSHA;AVGIDSHA;c:\windows\system32\DRIVERS\avgidsha.sys [2012-04-19 28480]
    S0 Avgrkx64;AVG Anti-Rootkit Driver;c:\windows\system32\DRIVERS\avgrkx64.sys [2012-01-31 36944]
    S1 Avgfwfd;AVG network filter service;c:\windows\system32\DRIVERS\avgfwd6a.sys [2011-05-23 48992]
    S1 Avgldx64;AVG AVI Loader Driver;c:\windows\system32\DRIVERS\avgldx64.sys [2012-07-26 291680]
    S1 Avgmfx64;AVG Mini-Filter Resident Anti-Virus Shield;c:\windows\system32\DRIVERS\avgmfx64.sys [2011-12-23 47696]
    S1 Avgtdia;AVG TDI Driver;c:\windows\system32\DRIVERS\avgtdia.sys [2012-08-24 384352]
    S1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\DRIVERS\vwififlt.sys [2009-07-14 59904]
    S2 AdobeARMservice;Adobe Acrobat Update Service;c:\program files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe [2012-07-27 63960]
    S2 AERTFilters;Andrea RT Filters Service;c:\program files\Realtek\Audio\HDA\AERTSr64.exe [2009-11-18 98208]
    S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [2010-06-17 202752]
    S2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2012-08-21 71600]
    S2 avgfws;AVG Firewall;c:\program files (x86)\AVG\AVG2012\avgfws.exe [2012-06-13 2321560]
    S2 avgwd;AVG WatchDog;c:\program files (x86)\AVG\AVG2012\avgwdsvc.exe [2012-02-14 193288]
    S2 CinemaNow Service;CinemaNow Service;c:\program files (x86)\CinemaNow\CinemaNow Media Manager\CinemanowSvc.exe [2010-05-21 140272]
    S2 HPDrvMntSvc.exe;HP Quick Synchronization Service;c:\program files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe [2011-03-29 94264]
    S2 HPWMISVC;HPWMISVC;c:\program files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe [2010-11-09 26680]
    S2 IntuitUpdateServiceV4;Intuit Update Service v4;c:\program files (x86)\Common Files\Intuit\Update Service v4\IntuitUpdateService.exe [2011-08-26 13672]
    S2 NOBU;Norton Online Backup;c:\program files (x86)\Symantec\Norton Online Backup\NOBuAgent.exe SERVICE [x]
    S2 vToolbarUpdater11.2.0;vToolbarUpdater11.2.0;c:\program files (x86)\Common Files\AVG Secure Search\vToolbarUpdater\11.2.0\ToolbarUpdater.exe [2012-07-11 935008]
    S3 amdkmdag;amdkmdag;c:\windows\system32\DRIVERS\atipmdag.sys [2010-06-17 6403072]
    S3 amdkmdap;amdkmdap;c:\windows\system32\DRIVERS\atikmpag.sys [2010-06-17 188928]
    S3 AVGIDSDriver;AVGIDSDriver;c:\windows\system32\DRIVERS\avgidsdrivera.sys [2011-12-23 124496]
    S3 AVGIDSFilter;AVGIDSFilter;c:\windows\system32\DRIVERS\avgidsfiltera.sys [2011-12-23 29776]
    S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [2010-03-23 347680]
    S3 usbfilter;AMD USB Filter Driver;c:\windows\system32\DRIVERS\usbfilter.sys [2009-12-22 38456]
    S3 vwifimp;Microsoft Virtual WiFi Miniport Service;c:\windows\system32\DRIVERS\vwifimp.sys [2009-07-14 17920]
    .
    .
    Contents of the 'Scheduled Tasks' folder
    .
    2012-10-05 c:\windows\Tasks\Adobe Flash Player Updater.job
    - c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-18 16:23]
    .
    2012-10-05 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-06-23 20:04]
    .
    2012-10-05 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-06-23 20:04]
    .
    2012-09-29 c:\windows\Tasks\HPCeeScheduleForD-HP$.job
    - c:\program files (x86)\Hewlett-Packard\HP Ceement\HPCEE.exe [2010-09-14 06:15]
    .
    2012-09-28 c:\windows\Tasks\HPCeeScheduleFord.job
    - c:\program files (x86)\Hewlett-Packard\HP Ceement\HPCEE.exe [2010-09-14 06:15]
    .
    .
    --------- X64 Entries -----------
    .
    .
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "RTHDVCPL"="c:\program files\Realtek\Audio\HDA\RtkNGUI64.exe" [2012-03-25 6489704]
    "HPWirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\DelayedAppStarter.exe" [2010-06-18 8192]
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.yahoo.com/
    uLocal Page = c:\windows\system32\blank.htm
    mLocal Page = c:\windows\SysWOW64\blank.htm
    IE: E&xport to Microsoft Excel - c:\progra~2\MICROS~3\Office14\EXCEL.EXE/3000
    IE: Se&nd to OneNote - c:\progra~2\MICROS~3\Office14\ONBttnIE.dll/105
    Trusted Zone: intuit.com\ttlc
    TCP: DhcpNameServer = 66.102.144.5 66.102.145.5
    Handler: viprotocol - {B658800C-F66E-4EF3-AB85-6C0C227862A9} - c:\program files (x86)\Common Files\AVG Secure Search\ViProtocolInstaller\11.2.0\ViProtocol.dll
    FF - ProfilePath - c:\users\d\AppData\Roaming\Mozilla\Firefox\Profiles\8ysdpgph.default\
    FF - prefs.js: browser.search.defaulturl - hxxp://search.babylon.com/web/{searchTerms}?babsrc=browsersearch&AF=17013
    FF - prefs.js: browser.search.selectedEngine - AVG Secure Search
    FF - prefs.js: browser.startup.homepage - /www.yahoo.com/
    FF - prefs.js: keyword.URL - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2724386&SearchSource=2&q=
    .
    - - - - ORPHANS REMOVED - - - -
    .
    URLSearchHooks-{d40b90b4-d3b1-4d6b-a5d7-dc041c1b76c0} - (no file)
    WebBrowser-{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39} - (no file)
    HKLM-Run-SynTPEnh - c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe
    AddRemove-Adobe SVG Viewer - c:\windows\System32\Adobe\SVG Viewer\Uninst.isu
    AddRemove-{6F44AF95-3CDE-4513-AD3F-6D45F17BF324} - c:\program files (x86)\InstallShield Installation Information\{6F44AF95-3CDE-4513-AD3F-6D45F17BF324}\setup.exe
    .
    .
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------
    .
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
    @Denied: (A 2) (Everyone)
    @="FlashBroker"
    "LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_4_402_278_ActiveX.exe,-101"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
    "Enabled"=dword:00000001
    .
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
    @="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_4_402_278_ActiveX.exe"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
    @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
    @Denied: (A 2) (Everyone)
    @="IFlashBroker5"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
    @="{00020424-0000-0000-C000-000000000046}"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
    @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
    "Version"="1.0"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
    @Denied: (A 2) (Everyone)
    @="FlashBroker"
    "LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_4_402_278_ActiveX.exe,-101"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
    "Enabled"=dword:00000001
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
    @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_4_402_278_ActiveX.exe"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
    @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
    @Denied: (A 2) (Everyone)
    @="Shockwave Flash Object"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
    @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_4_402_278.ocx"
    "ThreadingModel"="Apartment"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
    @="0"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
    @="ShockwaveFlash.ShockwaveFlash.11"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
    @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_4_402_278.ocx, 1"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
    @="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
    @="1.0"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
    @="ShockwaveFlash.ShockwaveFlash"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
    @Denied: (A 2) (Everyone)
    @="Macromedia Flash Factory Object"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
    @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_4_402_278.ocx"
    "ThreadingModel"="Apartment"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
    @="FlashFactory.FlashFactory.1"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
    @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_4_402_278.ocx, 1"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
    @="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
    @="1.0"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
    @="FlashFactory.FlashFactory"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
    @Denied: (A 2) (Everyone)
    @="IFlashBroker5"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
    @="{00020424-0000-0000-C000-000000000046}"
    .
    [HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
    @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
    "Version"="1.0"
    .
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\Microsoft\Office\Common\Smart Tag\Actions\{B7EFF951-E52F-45CC-9EF7-57124F2177CC}]
    @Denied: (A) (Everyone)
    "Solution"="{15727DE6-F92D-4E46-ACB4-0E2C58B31A18}"
    .
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\Microsoft\Schema Library\ActionsPane3]
    @Denied: (A) (Everyone)
    .
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\Microsoft\Schema Library\ActionsPane3\0]
    "Key"="ActionsPane3"
    "Location"="c:\\Program Files (x86)\\Common Files\\Microsoft Shared\\VSTO\\ActionsPane3.xsd"
    .
    [HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    "BlindDial"=dword:00000000
    .
    [HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
    @Denied: (Full) (Everyone)
    .
    Completion time: 2012-10-05 16:12:57
    ComboFix-quarantined-files.txt 2012-10-05 23:12
    .
    Pre-Run: 245,330,694,144 bytes free
    Post-Run: 245,175,136,256 bytes free
    .
    - - End Of File - - 982F75A7C3C44A32CA1F1889958EB066
     
  16. Broni

    Broni Malware Annihilator Posts: 47,668   +267

    Looks good.

    Any current issues?

    ===============================

    Download OTL to your Desktop.
    Alternate download: http://www.itxassociates.com/OT-Tools/OTL.exe

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Click the Scan All Users checkbox.
    • Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows: OTL.txt and Extras.txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them back here.
     
  17. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    No current problems noticed. I'm now running OTL but it seems to be hung up on "scanning Firefox settings". Is that supposed to take a long time? (I.e. 20 minutes so far)
     
  18. Broni

    Broni Malware Annihilator Posts: 47,668   +267

    Try safe mode.
     
  19. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    I've tried it 3 times in Safe Mode. The last try was without networking. The program opens okay. After I click on "Quick Scan," nothing more happens. I opened "Task Manager" and the program changed from "running" to "not responding". In "normal" mode the program goes through a partial scan then always gets hung up when it starts to scan "Firefox settings". It doesn't even get that far in "Safe Mode". The last try in "Safe Mode," I let it keep running just to see if it would eventually start scanning. However it's been hung up for about 5 mins. so far. I don't think it's going to run. Any other suggestions?
     
  20. Broni

    Broni Malware Annihilator Posts: 47,668   +267

    We'll skip it.

    1. Download Security Check from HERE, and save it to your Desktop.
    • Double-click SecurityCheck.exe
    • Follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

      NOTE SecurityCheck may produce some false warning(s), so leave the results reading to me.

    2. Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
    • Make sure the following options are checked:
      • Internet Services
      • Windows Firewall
      • System Restore
      • Security Center
      • Windows Update
      • Windows Defender
    • Press "Scan".
    • It will create a log (FSS.txt) in the same directory the tool is run.
    • Please copy and paste the log to your reply.

    3. Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on adwcleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the contents of that logfile with your next reply.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.

    Next...

    • Double click on adwcleaner.exe to run the tool.
    • Click on Uninstall.
    • Confirm with yes.

    4. Download Temp File Cleaner (TFC)
    Alternate download: http://www.itxassociates.com/OT-Tools/TFC.exe
    • Double click on TFC.exe to run the program.
    • Click on Start button to begin cleaning process.
    • TFC will close all running programs, and it may ask you to restart computer.

    5. Please run a free online scan with the ESET Online Scanner

    • Disable your antivirus program
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • Accept any security warnings from your browser.
    • Check Scan archives
    • Click Start
    • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    • When the scan completes, click on List of found threats
    • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    • NOTE. If Eset won't find any threats, it won't produce any log.
     
  21. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    Security check ran fine. Here are the results:
    Results of screen317's Security Check version 0.99.51
    Windows 7 Service Pack 1 x64 (UAC is enabled)
    Internet Explorer 9
    ``````````````Antivirus/Firewall Check:``````````````
    Windows Firewall Disabled!
    AVG Internet Security 2012
    Antivirus up to date!
    `````````Anti-malware/Other Utilities Check:`````````
    Malwarebytes Anti-Malware version 1.65.0.1400
    Java(TM) 6 Update 35
    Java version out of Date!
    Adobe Flash Player 11.4.402.278
    Adobe Reader X (10.1.4)
    Mozilla Firefox 14.0.1 Firefox out of Date!
    Google Chrome 21.0.1180.83
    Google Chrome 21.0.1180.89
    Google Chrome 22.0.1229.79
    ````````Process Check: objlist.exe by Laurent````````
    AVG avgwdsvc.exe
    Symantec Norton Online Backup NOBuAgent.exe
    AVAST Software Avast AvastSvc.exe
    `````````````````System Health check`````````````````
    Total Fragmentation on Drive C: 0%
    ````````````````````End of Log``````````````````````
     
  22. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    Ran FSS scan. Here are the results:

    Farbar Service Scanner Version: 19-09-2012
    Ran by d (administrator) on 05-10-2012 at 20:24:06
    Running from "C:\Users\d\Desktop"
    Microsoft Windows 7 Home Premium Service Pack 1 (X64)
    Boot Mode: Normal
    ****************************************************************

    Internet Services:
    ============

    Connection Status:
    ==============
    Localhost is accessible.
    LAN connected.
    Google IP is accessible.
    Google.com is accessible.
    Yahoo IP is accessible.
    Yahoo.com is accessible.


    Windows Firewall:
    =============

    Firewall Disabled Policy:
    ==================
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
    "EnableFirewall"=DWORD:0


    System Restore:
    ============

    System Restore Disabled Policy:
    ========================


    Action Center:
    ============

    Windows Update:
    ============

    Windows Autoupdate Disabled Policy:
    ============================


    Windows Defender:
    ==============
    WinDefend Service is not running. Checking service configuration:
    The start type of WinDefend service is set to Demand. The default start type is Auto.
    The ImagePath of WinDefend service is OK.
    The ServiceDll of WinDefend service is OK.


    Windows Defender Disabled Policy:
    ==========================
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender]
    "DisableAntiSpyware"=DWORD:1


    Other Services:
    ==============


    File Check:
    ========
    C:\Windows\System32\nsisvc.dll => MD5 is legit
    C:\Windows\System32\drivers\nsiproxy.sys => MD5 is legit
    C:\Windows\System32\dhcpcore.dll => MD5 is legit
    C:\Windows\System32\drivers\afd.sys => MD5 is legit
    C:\Windows\System32\drivers\tdx.sys => MD5 is legit
    C:\Windows\System32\Drivers\tcpip.sys => MD5 is legit
    C:\Windows\System32\dnsrslvr.dll => MD5 is legit
    C:\Windows\System32\mpssvc.dll => MD5 is legit
    C:\Windows\System32\bfe.dll => MD5 is legit
    C:\Windows\System32\drivers\mpsdrv.sys => MD5 is legit
    C:\Windows\System32\SDRSVC.dll => MD5 is legit
    C:\Windows\System32\vssvc.exe => MD5 is legit
    C:\Windows\System32\wscsvc.dll => MD5 is legit
    C:\Windows\System32\wbem\WMIsvc.dll => MD5 is legit
    C:\Windows\System32\wuaueng.dll => MD5 is legit
    C:\Windows\System32\qmgr.dll => MD5 is legit
    C:\Windows\System32\es.dll => MD5 is legit
    C:\Windows\System32\cryptsvc.dll => MD5 is legit
    C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit
    C:\Windows\System32\svchost.exe => MD5 is legit
    C:\Windows\System32\rpcss.dll => MD5 is legit


    **** End of log ****
     
  23. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    Ran AdwCleaner and got the following results:

    # AdwCleaner v2.003 - Logfile created 10/05/2012 at 20:30:11
    # Updated 23/09/2012 by Xplode
    # Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
    # User : d - D-HP
    # Boot Mode : Normal
    # Running from : C:\Users\d\Desktop\adwcleaner.exe
    # Option [Delete]


    ***** [Services] *****

    Stopped & Deleted : vToolbarUpdater11.2.0

    ***** [Files / Folders] *****

    File Deleted : C:\Program Files (x86)\Mozilla Firefox\searchplugins\avg-secure-search.xml
    File Deleted : C:\Program Files (x86)\Mozilla Firefox\searchplugins\babylon.xml
    File Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\eBay.lnk
    File Deleted : C:\Users\d\Appdata\Roaming\Mozilla\Firefox\Profiles\8ysdpgph.default\searchplugins\MyStart Search.xml
    File Deleted : C:\Users\d\Appdata\Roaming\Mozilla\Firefox\Profiles\8ysdpgph.default\searchplugins\my-web-search.xml
    Folder Deleted : C:\Program Files (x86)\AVG Secure Search
    Folder Deleted : C:\Program Files (x86)\Babylon
    Folder Deleted : C:\Program Files (x86)\Common Files\AVG Secure Search
    Folder Deleted : C:\Program Files (x86)\Conduit
    Folder Deleted : C:\Program Files\Babylon
    Folder Deleted : C:\ProgramData\AVG Secure Search
    Folder Deleted : C:\ProgramData\Babylon
    Folder Deleted : C:\Users\d\Appdata\Local\AVG Secure Search
    Folder Deleted : C:\Users\d\Appdata\Local\Babylon
    Folder Deleted : C:\Users\d\Appdata\Local\Conduit
    Folder Deleted : C:\Users\d\Appdata\LocalLow\AVG Secure Search
    Folder Deleted : C:\Users\d\Appdata\LocalLow\BabylonToolbar
    Folder Deleted : C:\Users\d\Appdata\LocalLow\Conduit
    Folder Deleted : C:\Users\d\Appdata\Roaming\Babylon
    Folder Deleted : C:\Users\d\Appdata\Roaming\Mozilla\Firefox\Profiles\8ysdpgph.default\ConduitCommon
    Folder Deleted : C:\Users\d\Appdata\Roaming\Mozilla\Firefox\Profiles\8ysdpgph.default\CT2724386
    Folder Deleted : C:\Users\d\Appdata\Roaming\Mozilla\Firefox\Profiles\8ysdpgph.default\extensions\{d40b90b4-d3b1-4d6b-a5d7-dc041c1b76c0}
    Folder Deleted : C:\Users\d\Appdata\Roaming\Mozilla\Firefox\Profiles\8ysdpgph.default\extensions\ffxtlbr@babylon.com

    ***** [Registry] *****

    Key Deleted : HKCU\Software\AppDataLow\Software\Crossrider
    Key Deleted : HKCU\Software\AVG Secure Search
    Key Deleted : HKCU\Software\Babylon
    Key Deleted : HKCU\Software\IM
    Key Deleted : HKCU\Software\ImInstaller
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{6F6A5334-78E9-4D9B-8182-8B41EA8C39EF}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{CCB69577-088B-4004-9ED8-FF5BCC83A039}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{2EECD738-5844-4A99-B4B6-146BF802613B}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{95B7759C-8C7F-4BF1-B163-73684A933233}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2EECD738-5844-4A99-B4B6-146BF802613B}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{8736C681-37A0-40C6-A0F0-4C083409151C}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{95B7759C-8C7F-4BF1-B163-73684A933233}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{CC99A798-FD3D-4AB4-969E-6071612524F9}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F25AF245-4A81-40DC-92F9-E9021F207706}
    Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}
    Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}
    Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
    Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}
    Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{CFF4DB9B-135F-47C0-9269-B4C6572FD61A}
    Key Deleted : HKLM\Software\AVG Secure Search
    Key Deleted : HKLM\Software\Babylon
    Key Deleted : HKLM\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947}
    Key Deleted : HKLM\SOFTWARE\Classes\AppID\{1FDFF5A2-7BB1-48E1-8081-7236812B12B2}
    Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BB711CB0-C70B-482E-9852-EC05EBD71DBB}
    Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB}
    Key Deleted : HKLM\SOFTWARE\Classes\AppID\escort.DLL
    Key Deleted : HKLM\SOFTWARE\Classes\AppID\ScriptHelper.EXE
    Key Deleted : HKLM\SOFTWARE\Classes\AppID\ViProtocol.DLL
    Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.BrowserWndAPI
    Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.BrowserWndAPI.1
    Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.PugiObj
    Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.PugiObj.1
    Key Deleted : HKLM\SOFTWARE\Classes\BabyDict
    Key Deleted : HKLM\SOFTWARE\Classes\BabyGloss
    Key Deleted : HKLM\SOFTWARE\Classes\BabyOptFile
    Key Deleted : HKLM\SOFTWARE\Classes\PROTOCOLS\Handler\viprotocol
    Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.ScriptHelperApi
    Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.ScriptHelperApi.1
    Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT2724386
    Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{74FB6AFD-DD77-4CEB-83BD-AB2B63E63C93}
    Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
    Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{C2AC8A0E-E48E-484B-A71C-C7A937FAAB94}
    Key Deleted : HKLM\SOFTWARE\Classes\ViProtocol.ViProtocolOLE
    Key Deleted : HKLM\SOFTWARE\Classes\ViProtocol.ViProtocolOLE.1
    Key Deleted : HKLM\Software\Conduit
    Key Deleted : HKLM\Software\ImInstaller
    Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\Babylon_RASAPI32
    Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\Babylon_RASMANCS
    Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{6F6A5334-78E9-4D9B-8182-8B41EA8C39EF}
    Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{C6FDD0C3-266A-4DC3-B459-28C697C44CDC}
    Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{CCB69577-088B-4004-9ED8-FF5BCC83A039}
    Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{F25AF245-4A81-40DC-92F9-E9021F207706}
    Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@avg.com/AVG SiteSafety plugin,version=11.0.0.1,application/x-avg-sitesafety-plugin
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{2EECD738-5844-4A99-B4B6-146BF802613B}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{95B7759C-8C7F-4BF1-B163-73684A933233}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{B658800C-F66E-4EF3-AB85-6C0C227862A9}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{CC5AD34C-6F10-4CB3-B74A-C2DD4D5060A3}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{CC99A798-FD3D-4AB4-969E-6071612524F9}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{E46C8196-B634-44A1-AF6E-957C64278AB1}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{F25AF245-4A81-40DC-92F9-E9021F207706}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{C401D2CE-DC27-45C7-BC0C-8E6EA7F085D6}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F25AF245-4A81-40DC-92F9-E9021F207706}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{95B7759C-8C7F-4BF1-B163-73684A933233}
    Key Deleted : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
    Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
    Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
    Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C401D2CE-DC27-45C7-BC0C-8E6EA7F085D6}
    Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}
    Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D7E97865-918F-41E4-9CD0-25AB1C574CE8}]
    Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}]
    Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{D3D233D5-9F6D-436C-B6C7-E63F77503B30}]
    Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow [*.crossrider.com]
    Value Deleted : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [Avg@toolbar]
    Value Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar [{95B7759C-8C7F-4BF1-B163-73684A933233}]

    ***** [Internet Browsers] *****

    -\\ Internet Explorer v9.0.8112.16421

    Restored : [HKCU\Software\Wow6432Node\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
    Restored : [HKCU\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
    Restored : [HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
    Restored : [HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
    Restored : [HKU\S-1-5-18\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
    Restored : [HKU\S-1-5-19\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope]
    Restored : [HKU\S-1-5-20\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope]

    -\\ Mozilla Firefox v14.0.1 (en-US)

    Profile name : default
    File : C:\Users\d\Appdata\Roaming\Mozilla\Firefox\Profiles\8ysdpgph.default\prefs.js

    Deleted : user_pref("CT2724386..clientLogIsEnabled", false);
    Deleted : user_pref("CT2724386..clientLogServiceUrl", "hxxp://clientlog.users.conduit.com/ClientDiagnostics.as[...]
    Deleted : user_pref("CT2724386..uninstallLogServiceUrl", "hxxp://uninstall.users.conduit.com/Uninstall.asmx/Re[...]
    Deleted : user_pref("CT2724386.ALLOW_SHOWING_HIDDEN_TOOLBAR", false);
    Deleted : user_pref("CT2724386.AboutPrivacyUrl", "hxxp://www.conduit.com/privacy/Default.aspx");
    Deleted : user_pref("CT2724386.BrowserCompStateIsOpen_129464706887642629", true);
    Deleted : user_pref("CT2724386.BrowserCompStateIsOpen_129723002078767475", true);
    Deleted : user_pref("CT2724386.BrowserCompStateIsOpen_129847484031223416", true);
    Deleted : user_pref("CT2724386.BrowserCompStateIsOpen_129851871904280954", true);
    Deleted : user_pref("CT2724386.BrowserCompStateIsOpen_129904362604336829", true);
    Deleted : user_pref("CT2724386.CTID", "CT2724386");
    Deleted : user_pref("CT2724386.CurrentServerDate", "6-10-2012");
    Deleted : user_pref("CT2724386.DSInstall", false);
    Deleted : user_pref("CT2724386.DialogsAlignMode", "LTR");
    Deleted : user_pref("CT2724386.DialogsGetterLastCheckTime", "Fri Oct 05 2012 13:33:39 GMT-0700 (Pacific Daylig[...]
    Deleted : user_pref("CT2724386.DownloadReferralCookieData", "");
    Deleted : user_pref("CT2724386.FirstServerDate", "21-3-2012");
    Deleted : user_pref("CT2724386.FirstTime", true);
    Deleted : user_pref("CT2724386.FirstTimeFF3", true);
    Deleted : user_pref("CT2724386.FixPageNotFoundErrors", false);
    Deleted : user_pref("CT2724386.GroupingServerCheckInterval", 1440);
    Deleted : user_pref("CT2724386.GroupingServiceUrl", "hxxp://grouping.services.conduit.com/");
    Deleted : user_pref("CT2724386.HPInstall", false);
    Deleted : user_pref("CT2724386.HasUserGlobalKeys", true);
    Deleted : user_pref("CT2724386.HomePageProtectorEnabled", false);
    Deleted : user_pref("CT2724386.HomepageBeforeUnload", "hxxp://mystart.incredimail.com/?a=ICfiA99JOz");
    Deleted : user_pref("CT2724386.Initialize", true);
    Deleted : user_pref("CT2724386.InitializeCommonPrefs", true);
    Deleted : user_pref("CT2724386.InstallationAndCookieDataSentCount", 3);
    Deleted : user_pref("CT2724386.InstallationId", "ConduitNSISIntegration");
    Deleted : user_pref("CT2724386.InstallationType", "ConduitXPEIntegration");
    Deleted : user_pref("CT2724386.InstalledDate", "Wed Mar 21 2012 12:47:46 GMT-0700 (Pacific Daylight Time)");
    Deleted : user_pref("CT2724386.InvalidateCache", false);
    Deleted : user_pref("CT2724386.IsAlertDBUpdated", true);
    Deleted : user_pref("CT2724386.IsGrouping", false);
    Deleted : user_pref("CT2724386.IsInitSetupIni", true);
    Deleted : user_pref("CT2724386.IsMulticommunity", false);
    Deleted : user_pref("CT2724386.IsOpenThankYouPage", false);
    Deleted : user_pref("CT2724386.IsOpenUninstallPage", true);
    Deleted : user_pref("CT2724386.LanguagePackLastCheckTime", "Fri Oct 05 2012 13:33:32 GMT-0700 (Pacific Dayligh[...]
    Deleted : user_pref("CT2724386.LanguagePackReloadIntervalMM", 1440);
    Deleted : user_pref("CT2724386.LanguagePackServiceUrl", "hxxp://translation.users.conduit.com/Translation.ashx[...]
    Deleted : user_pref("CT2724386.LastLogin_3.10.0.1", "Sun May 20 2012 14:53:56 GMT-0700 (Pacific Daylight Time)[...]
    Deleted : user_pref("CT2724386.LastLogin_3.12.2.3", "Sun Jun 10 2012 07:35:12 GMT-0700 (Pacific Daylight Time)[...]
    Deleted : user_pref("CT2724386.LastLogin_3.13.0.6", "Sun Jul 29 2012 17:45:57 GMT-0700 (Pacific Daylight Time)[...]
    Deleted : user_pref("CT2724386.LastLogin_3.14.1.0", "Fri Aug 24 2012 14:28:02 GMT-0700 (Pacific Daylight Time)[...]
    Deleted : user_pref("CT2724386.LastLogin_3.15.1.0", "Fri Oct 05 2012 20:08:30 GMT-0700 (Pacific Daylight Time)[...]
    Deleted : user_pref("CT2724386.LatestVersion", "3.14.1.0");
    Deleted : user_pref("CT2724386.Locale", "en");
    Deleted : user_pref("CT2724386.MCDetectTooltipHeight", "83");
    Deleted : user_pref("CT2724386.MCDetectTooltipShow", false);
    Deleted : user_pref("CT2724386.MCDetectTooltipUrl", "hxxp://@EB_INSTALL_LINK@/rank/tooltip/?version=1");
    Deleted : user_pref("CT2724386.MCDetectTooltipWidth", "295");
    Deleted : user_pref("CT2724386.MyStuffEnabledAtInstallation", true);
    Deleted : user_pref("CT2724386.OriginalFirstVersion", "3.10.0.1");
    Deleted : user_pref("CT2724386.RadioIsPodcast", false);
    Deleted : user_pref("CT2724386.RadioLastCheckTime", "Sat Sep 29 2012 19:47:07 GMT-0700 (Pacific Daylight Time)[...]
    Deleted : user_pref("CT2724386.RadioLastUpdateIPServer", "3");
    Deleted : user_pref("CT2724386.RadioLastUpdateServer", "129249036863500000");
    Deleted : user_pref("CT2724386.RadioMediaID", "21080102");
    Deleted : user_pref("CT2724386.RadioMediaType", "Media Player");
    Deleted : user_pref("CT2724386.RadioMenuSelectedID", "EBRadioMenu_CT272438621080102");
    Deleted : user_pref("CT2724386.RadioShrinked", "shrinked");
    Deleted : user_pref("CT2724386.RadioShrinkedFromSetup", true);
    Deleted : user_pref("CT2724386.RadioStationName", "Mix%201620%20Am");
    Deleted : user_pref("CT2724386.RadioStationURL", "hxxp://69.115.65.9:8000");
    Deleted : user_pref("CT2724386.SHRINK_TOOLBAR", 0);
    Deleted : user_pref("CT2724386.SearchCaption", "IncrediMail MediaBar 2 Customized Web Search");
    Deleted : user_pref("CT2724386.SearchEngineBeforeUnload", "AVG Secure Search");
    Deleted : user_pref("CT2724386.SearchFromAddressBarIsInit", true);
    Deleted : user_pref("CT2724386.SearchFromAddressBarUrl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT272[...]
    Deleted : user_pref("CT2724386.SearchInNewTabEnabled", true);
    Deleted : user_pref("CT2724386.SearchInNewTabIntervalMM", 1440);
    Deleted : user_pref("CT2724386.SearchInNewTabLastCheckTime", "Fri Oct 05 2012 13:33:29 GMT-0700 (Pacific Dayli[...]
    Deleted : user_pref("CT2724386.SearchInNewTabServiceUrl", "hxxp://newtab.conduit-hosting.com/newtab/?ctid=EB_T[...]
    Deleted : user_pref("CT2724386.SearchProtectorEnabled", false);
    Deleted : user_pref("CT2724386.SearchProtectorToolbarDisabled", false);
    Deleted : user_pref("CT2724386.SendProtectorDataViaLogin", true);
    Deleted : user_pref("CT2724386.ServiceMapLastCheckTime", "Fri Oct 05 2012 13:33:29 GMT-0700 (Pacific Daylight [...]
    Deleted : user_pref("CT2724386.SettingsLastCheckTime", "Fri Oct 05 2012 20:08:29 GMT-0700 (Pacific Daylight Ti[...]
    Deleted : user_pref("CT2724386.SettingsLastUpdate", "1348502557");
    Deleted : user_pref("CT2724386.TBHomePageUrl", "hxxp://search.conduit.com/?ctid=CT2724386&SearchSource=13");
    Deleted : user_pref("CT2724386.ThirdPartyComponentsInterval", 504);
    Deleted : user_pref("CT2724386.ThirdPartyComponentsLastCheck", "Sat Sep 15 2012 08:10:36 GMT-0700 (Pacific Day[...]
    Deleted : user_pref("CT2724386.ThirdPartyComponentsLastUpdate", "1331805997");
    Deleted : user_pref("CT2724386.ToolbarShrinkedFromSetup", true);
    Deleted : user_pref("CT2724386.TrusteLinkUrl", "hxxp://trust.conduit.com/CT2724386");
    Deleted : user_pref("CT2724386.TrustedApiDomains", "conduit.com,conduit-hosting.com,conduit-services.com,clien[...]
    Deleted : user_pref("CT2724386.UserID", "UN78419322680298533");
    Deleted : user_pref("CT2724386.ValidationData_Toolbar", 2);
    Deleted : user_pref("CT2724386.WeatherNetwork", "");
    Deleted : user_pref("CT2724386.WeatherPollDate", "Sat Sep 29 2012 20:17:08 GMT-0700 (Pacific Daylight Time)");
    Deleted : user_pref("CT2724386.WeatherUnit", "F");
    Deleted : user_pref("CT2724386.alertChannelId", "1116652");
    Deleted : user_pref("CT2724386.approveUntrustedApps", false);
    Deleted : user_pref("CT2724386.autoDisableScopes", -1);
    Deleted : user_pref("CT2724386.backendstorage.cb_experience_000", "3131");
    Deleted : user_pref("CT2724386.backendstorage.cb_firstuse0100", "31");
    Deleted : user_pref("CT2724386.backendstorage.cb_user_id_000", "43423934363333383233383933385F46697265666F78")[...]
    Deleted : user_pref("CT2724386.backendstorage.cbcountry_000", "5553");
    Deleted : user_pref("CT2724386.backendstorage.cbcountry_001", "5553");
    Deleted : user_pref("CT2724386.backendstorage.cbfirsttime", "576564204D617220323120323031322031323A34383A30362[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api15_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api16_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api18_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api19_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api20_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api21_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api22_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api25_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api26_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api28_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api30_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api31_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api32_thetrafficstat_net.pid2", "653861313437633966353363[...]
    Deleted : user_pref("CT2724386.backendstorage.hxxp://api6_thetrafficstat_net.pid2", "6538613134376339663533633[...]
    Deleted : user_pref("CT2724386.backendstorage.shoppingapp.gk.exipres", "576564204F637420303320323031322031373A[...]
    Deleted : user_pref("CT2724386.backendstorage.shoppingapp.gk.geolocation", "756E6974656420737461746573");
    Deleted : user_pref("CT2724386.backendstorage.url_history0001", "687474703A2F2F6D61696C2E7961686F6F2E636F6D2F3[...]
    Deleted : user_pref("CT2724386.components.1000", true);
    Deleted : user_pref("CT2724386.components.1001", true);
    Deleted : user_pref("CT2724386.components.1002", true);
    Deleted : user_pref("CT2724386.components.1003", true);
    Deleted : user_pref("CT2724386.components.1004", true);
    Deleted : user_pref("CT2724386.components.1007", true);
    Deleted : user_pref("CT2724386.components.1008", true);
    Deleted : user_pref("CT2724386.components.1009", true);
    Deleted : user_pref("CT2724386.components.1010", true);
    Deleted : user_pref("CT2724386.components.1011", true);
    Deleted : user_pref("CT2724386.generalConfigFromLogin", "{\"ApiMaxAlerts\":\"12\",\"SocialDomains\":\"social.c[...]
    Deleted : user_pref("CT2724386.globalFirstTimeInfoLastCheckTime", "Fri Sep 28 2012 17:18:24 GMT-0700 (Pacific [...]
    Deleted : user_pref("CT2724386.homepageProtectorEnableByLogin", true);
    Deleted : user_pref("CT2724386.initDone", true);
    Deleted : user_pref("CT2724386.isAppTrackingManagerOn", false);
    Deleted : user_pref("CT2724386.isFirstRadioInstallation", false);
    Deleted : user_pref("CT2724386.myStuffEnabled", true);
    Deleted : user_pref("CT2724386.myStuffPublihserMinWidth", 400);
    Deleted : user_pref("CT2724386.myStuffSearchUrl", "hxxp://Apps.conduit.com/search?q=SEARCH_TERM&SearchSourceOr[...]
    Deleted : user_pref("CT2724386.myStuffServiceIntervalMM", 1440);
    Deleted : user_pref("CT2724386.myStuffServiceUrl", "hxxp://mystuff.conduit-services.com/MyStuffService.ashx?Co[...]
    Deleted : user_pref("CT2724386.navigateToUrlOnSearch", false);
    Deleted : user_pref("CT2724386.oldAppsList", "129248961427290040,129248961427290041,111,129681805661586396,129[...]
    Deleted : user_pref("CT2724386.revertSettingsEnabled", false);
    Deleted : user_pref("CT2724386.searchProtectorDialogDelayInSec", 10);
    Deleted : user_pref("CT2724386.searchProtectorEnableByLogin", true);
    Deleted : user_pref("CT2724386.testingCtid", "");
    Deleted : user_pref("CT2724386.toolbarAppMetaDataLastCheckTime", "Fri Oct 05 2012 13:33:30 GMT-0700 (Pacific D[...]
    Deleted : user_pref("CT2724386.toolbarContextMenuLastCheckTime", "Fri Sep 28 2012 17:18:27 GMT-0700 (Pacific D[...]
    Deleted : user_pref("CT2724386.usagesFlag", 2);
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://Settings.toolbar.search.conduit.com/root/CT2724386/CT2724386[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://alerts.conduit-services.com/root/1116652/1112356/US", "\"0\"[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://appsmetadata.toolbar.conduit-services.com/?ctid=CT2724386", [...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://contextmenu.toolbar.conduit-services.com/?name=GottenApps&lo[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://contextmenu.toolbar.conduit-services.com/?name=OtherApps&loc[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://contextmenu.toolbar.conduit-services.com/?name=SharedApps&lo[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://contextmenu.toolbar.conduit-services.com/?name=Toolbar&local[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.alert.conduit-services.com/alert/dlg.pkg", "\[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.toolbar.conduit-services.com/DLG.pkg?ver=3.10[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.toolbar.conduit-services.com/DLG.pkg?ver=3.12[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.toolbar.conduit-services.com/DLG.pkg?ver=3.13[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.toolbar.conduit-services.com/DLG.pkg?ver=3.14[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://dynamicdialogs.toolbar.conduit-services.com/DLG.pkg?ver=3.15[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://servicemap.conduit-services.com/Toolbar/?ownerId=CT2724386",[...]
    Deleted : user_pref("CommunityToolbar.ETag.hxxp://translation.toolbar.conduit-services.com/?locale=en", "\"abd[...]
    Deleted : user_pref("CommunityToolbar.LatestLibsPath", "file:///C:\\Users\\d\\AppData\\Roaming\\Mozilla\\Firef[...]
    Deleted : user_pref("CommunityToolbar.LatestToolbarVersionInstalled", "3.15.1.0");
    Deleted : user_pref("CommunityToolbar.SearchFromAddressBarSavedUrl", "hxxp://isearch.avg.com/search?cid=%7B92d[...]
    Deleted : user_pref("CommunityToolbar.ToolbarsList", "CT2724386");
    Deleted : user_pref("CommunityToolbar.ToolbarsList2", "CT2724386");
    Deleted : user_pref("CommunityToolbar.ToolbarsList4", "CT2724386");
    Deleted : user_pref("CommunityToolbar.facebook.settingsLastCheckTime", "Sat Jun 09 2012 20:55:20 GMT-0700 (Pac[...]
    Deleted : user_pref("CommunityToolbar.globalUserId", "7f7dd70b-42d6-47d5-8370-a581691f63c5");
    Deleted : user_pref("CommunityToolbar.isAlertUrlAddedToFeedItemTable", true);
    Deleted : user_pref("CommunityToolbar.isClickActionAddedToFeedItemTable", true);
    Deleted : user_pref("CommunityToolbar.keywordURLSelectedCTID", "CT2724386");
    Deleted : user_pref("CommunityToolbar.notifications.alertDialogsGetterLastCheckTime", "Fri Sep 28 2012 17:18:3[...]
    Deleted : user_pref("CommunityToolbar.notifications.alertInfoInterval", 1440);
    Deleted : user_pref("CommunityToolbar.notifications.alertInfoLastCheckTime", "Sat Sep 29 2012 19:47:16 GMT-070[...]
    Deleted : user_pref("CommunityToolbar.notifications.clientsServerUrl", "hxxp://alert.client.conduit.com");
    Deleted : user_pref("CommunityToolbar.notifications.locale", "en");
    Deleted : user_pref("CommunityToolbar.notifications.loginIntervalMin", 1440);
    Deleted : user_pref("CommunityToolbar.notifications.loginLastCheckTime", "Sat Sep 29 2012 19:47:09 GMT-0700 (P[...]
    Deleted : user_pref("CommunityToolbar.notifications.loginLastUpdateTime", "1313487611");
    Deleted : user_pref("CommunityToolbar.notifications.messageShowTimeSec", 20);
    Deleted : user_pref("CommunityToolbar.notifications.servicesServerUrl", "hxxp://alert.services.conduit.com");
    Deleted : user_pref("CommunityToolbar.notifications.showTrayIcon", false);
    Deleted : user_pref("CommunityToolbar.notifications.userCloseIntervalMin", 300);
    Deleted : user_pref("CommunityToolbar.notifications.userId", "2573bd0d-caee-4708-833a-2f3bda9cdd8c");
    Deleted : user_pref("CommunityToolbar.originalHomepage", "hxxp://mystart.incredimail.com/?a=ICfiA99JOz");
    Deleted : user_pref("CommunityToolbar.originalSearchEngine", "AVG Secure Search");
    Deleted : user_pref("avg.install.installDirPath", "C:\\ProgramData\\AVG Secure Search\\11.1.0.12");
    Deleted : user_pref("avg.install.userKUSettings", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2724386&Se[...]
    Deleted : user_pref("browser.babylon.HPOnNewTab", "search.babylon.com");
    Deleted : user_pref("browser.search.defaultenginename", "AVG Secure Search");
    Deleted : user_pref("browser.search.defaulturl", "hxxp://search.babylon.com/web/{searchTerms}?babsrc=browserse[...]
    Deleted : user_pref("browser.search.order.1", "Search the web (Babylon)");
    Deleted : user_pref("browser.search.selectedEngine", "AVG Secure Search");
    Deleted : user_pref("extensions.sahtb.alerts.menu", "[{\"text\":\"[c=0000ff]Double Cash Back and Free Shipp[...]
    Deleted : user_pref("extensions.sahtb.url.merchants.data", "<?xml version=\"1.0\" ?><MerchantSettings><v n=\"2[...]
    Deleted : user_pref("extensions.sahtb.url.prefs.data", "<ToolbarPrefs>\r\n <XMLVersion Number=\"{bdd09e8b-8dee[...]
    Deleted : user_pref("extensions.toolbar.mindspark._39Members_.homepage", "hxxp://home.mywebsearch.com/index.jh[...]
    Deleted : user_pref("keyword.URL", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2724386&SearchSource=2&q=[...]

    -\\ Google Chrome v [Unable to get version]

    File : C:\Users\d\Appdata\Local\Google\Chrome\User data\default\Preferences

    [OK] File is clean.

    *************************

    AdwCleaner[S1].txt - [27870 octets] - [05/10/2012 20:30:11]

    ########## EOF - C:\AdwCleaner[S1].txt - [27931 octets] ##########
     
  24. Judy Miller

    Judy Miller TS Rookie Topic Starter Posts: 18

    Well Eset found 4 threats but they don't all look like threats to me. Here are the results:

    C:\Users\d\AppData\Local\Google\Chrome\User Data\Default\Default\aadddddddfgedhdadidigggbdedggfdh\ContentScript.js Win32/BHO.OEI trojan cleaned by deleting - quarantined
    C:\Users\d\Downloads\Advanced_SystemCare.exe MSIL/Solimba application cleaned by deleting - quarantined
    C:\Users\d\Downloads\asc-setup(1).exe a variant of Win32/ELEX application cleaned by deleting - quarantined
    C:\Users\d\Downloads\PCPerformer_GN.exe a variant of Win32/InstallBrain application cleaned by deleting - quarantined
     
  25. Broni

    Broni Malware Annihilator Posts: 47,668   +267

    1. Update your Java version here: http://www.java.com/en/download/installed.jsp

    Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

    Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

    2. Now, we need to remove old Java version and its remnants...

    Download JavaRa to your desktop and unzip it.
    • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
    • Accept any prompts.
    • Do NOT post JavaRa log.

    =================================

    Your computer is clean [​IMG]

    1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

    Run OTL

    • Under the Custom Scans/Fixes box at the bottom, paste in the following:

    Code:
    :OTL
    :Commands
    [purity]
    [emptytemp]
    [EMPTYFLASH]
    [emptyjava]
    [CLEARALLRESTOREPOINTS]
    [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • Post resulting log.

    2. Now, we'll remove all tools, we used during our cleaning process

    Clean up with OTL:

    • Double-click OTL.exe to start the program.
    • Close all other programs apart from OTL as this step will require a reboot
    • On the OTL main screen, press the CLEANUP button
    • Say Yes to the prompt and then allow the program to reboot your computer.

    If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

    3. Make sure, Windows Updates are current.

    4. If any trojans, rootkits or bootkits were listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

    7. Run Temporary File Cleaner (TFC) weekly.

    8. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

    9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
    The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

    10. (Windows XP only) Run defrag at your convenience.

    11. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

    12. Read:
    How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html
    Simple and easy ways to keep your computer safe and secure on the Internet: http://www.bleepingcomputer.com/tutorials/keep-your-computer-safe-online/

    13. Please, let me know, how your computer is doing.
     


Add New Comment

TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...


Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.