TechSpot

Virus cleanup for Win 7 fake antivirus

By jamesc118
Jan 8, 2012
  1. My sister's laptop (Win 7 32bit) got infected by multiple viruses, and after doing what she could to fix it (like running tddskiller), she gave it to me to play with. After doing what I could to fix it (rkill, Malwarebytes, Kaspersky virus removal tool, McAfee), I am asking for help.
    The problems it still has are: Windows security center will not run; McAfee firewall will not stay on; browsers redirect to spam sites randomly.
    I have tried to follow the five steps, with limited success.

    1. Full McAfee scan
    2. Full Malwarebyte's scan
    3. GMER. I did some other stuff after running this scan, and tried again right before posting this. It gave these errors the second time:
    Code:
    LoadDriveer("C:\Users\{user}\AppData\Local\Temp\kxldqpow.sys")
    error 0xC000010E: An instance of the service is already running.
    
    C:\windows\system32\config\system: The process cannot access he file because it is being used by another process.
    
    C:\Users\{user}\ntuser.dat: The process cannot access he file because it is being used by another process.
    
    GMER hasn't found any system modification.
    4. DDS by sUBs. Each time I tried to run this, it froze the computer to the point it had to be reset.

    5. Submitting logs:
    GMER 1.0.15.15641 - http://www.gmer.net
    Rootkit scan 2012-01-01 13:54:56
    Windows 6.1.7600
    Running: gmer.exe; Driver: C:\Users\Sarah\AppData\Local\Temp\kxldqpow.sys


    ---- Registry - GMER 1.0.15 ----

    Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\ec55f942cee4
    Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\ec55f9b4b4dc
    Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\ec55f942cee4 (not active ControlSet)
    Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\ec55f9b4b4dc (not active ControlSet)

    ---- Files - GMER 1.0.15 ----

    File C:\Users\Sarah\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDX0ZY2S\down[1] 0 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022 0 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\@ 2048 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\bckfg.tmp 845 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\cfg.ini 199 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\Desktop.ini 4608 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\keywords 0 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\kwrd.dll 223744 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\L 0 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\L\xadqgnnk 187904 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\lsflt7.ver 5176 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\U 0 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\U\00000001.@ 2048 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\U\00000002.@ 224768 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\U\00000004.@ 1024 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\U\80000000.@ 11264 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\U\80000004.@ 12800 bytes
    File C:\Windows\$NtUninstallKB19606$\1902657022\U\80000032.@ 97792 bytes
    File C:\Windows\$NtUninstallKB19606$\3069654774 0 bytes

    ---- EOF - GMER 1.0.15 ----
     
  2. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    Malwarebyte's log

    Whoops, here's the other log:
    Malwarebytes Anti-Malware 1.60.0.1800
    www.malwarebytes.org

    Database version: v2011.12.24.05

    Windows 7 x86 NTFS
    Internet Explorer 8.0.7600.16385
    Sarah :: WRITER [administrator]

    12/31/2011 11:07:57 AM
    mbam-log-2011-12-31 (11-07-57).txt

    Scan type: Full scan
    Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
    Scan options disabled: P2P
    Objects scanned: 264566
    Time elapsed: 1 hour(s), 35 minute(s), 47 second(s)

    Memory Processes Detected: 0
    (No malicious items detected)

    Memory Modules Detected: 0
    (No malicious items detected)

    Registry Keys Detected: 1
    HKCR\wr (Malware.Trace) -> Quarantined and deleted successfully.

    Registry Values Detected: 9
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|995.exe (Malware.Packer) -> Data: C:\Program Files\LP\A477\995.exe -> Quarantined and deleted successfully.
    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|YgggTXqqjY (Trojan.Dropper.PE4) -> Data: C:\Users\Sarah\AppData\Roaming\dwme.exe -> Quarantined and deleted successfully.
    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|5F9.exe (Trojan.Dropper.PE4) -> Data: C:\Users\Sarah\AppData\Roaming\Microsoft\4DB7\5F9.exe -> Quarantined and deleted successfully.
    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|995.exe (Malware.Packer) -> Data: C:\Users\Sarah\AppData\Roaming\Microsoft\A477\995.exe -> Quarantined and deleted successfully.
    HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows|Load (Backdoor.CycBot) -> Data: C:\Users\Sarah\AppData\Roaming\D6E65\lvvm.exe -> Quarantined and deleted successfully.
    HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon|Shell (Hijack.Shell.Gen) -> Data: explorer.exe,C:\Users\Sarah\AppData\Roaming\78CD6\859A4.exe -> Quarantined and deleted successfully.
    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|ATI (Trojan.Agent) -> Data: C:\Users\Sarah\AppData\Roaming\csrss.exe -> Quarantined and deleted successfully.
    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|jhhTTXwjjUelIrP8234A (Trojan.FakeAlert.CLGen) -> Data: C:\windows\system32\AV Security 2012v121.exe -> Quarantined and deleted successfully.
    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|winupd (Trojan.Agent) -> Data: C:\Users\Sarah\AppData\Local\Temp:winupd.exe -> Quarantined and deleted successfully.

    Registry Data Items Detected: 3
    HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows|Load (Spyware.Password) -> Bad: (C:\Users\Sarah\AppData\Roaming\D6E65\lvvm.exe) Good: () -> Quarantined and repaired successfully.
    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced|Start_ShowMyComputer (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and repaired successfully.
    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced|Start_ShowSearch (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and repaired successfully.

    Folders Detected: 0
    (No malicious items detected)

    Files Detected: 22
    C:\Users\Sarah\AppData\Local\bhy.exe (Trojan.FakeAV) -> No action taken.
    C:\Program Files\LP\A477\995.exe (Malware.Packer) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\dwme.exe (Trojan.Dropper.PE4) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\Microsoft\4DB7\5F9.exe (Trojan.Dropper.PE4) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\Microsoft\A477\995.exe (Malware.Packer) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\D6E65\lvvm.exe (Spyware.Password) -> Quarantined and deleted successfully.
    C:\ProgramData\gfhYdHclcK.exe (Rogue.FakeHDD) -> Quarantined and deleted successfully.
    C:\ProgramData\l6j26BwDtcD5Va.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Local\Temp\ywerrtyerw.exe (Trojan.FakeAV) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\wmplayer.exe (Malware.Packer) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\firefox.exe (Trojan.Dropper.PE4) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\iexplore.exe (Trojan.Dropper.PE4) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\java.exe (Malware.Packer) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\78CD6\859A4.exe (Spyware.Password) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\78CD6\B4B4D.exe (Malware.Packer) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\Microsoft\4DC7\5F9.exe (Trojan.Dropper.PE4) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\Microsoft\A477\E0AD.tmp (Trojan.Dropper.PE4) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\Microsoft\A477\F8C2.exe (Malware.Packer) -> Quarantined and deleted successfully.
    C:\Users\Sarah\Desktop\Privacy Protection.lnk (Malware.Trace) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Local\Temp\wera0.08702821218245271.exe (Exploit.Drop.6) -> Quarantined and deleted successfully.
    C:\Users\Sarah\AppData\Roaming\ldr.ini (Malware.Trace) -> Quarantined and deleted successfully.
    c:\users\sarah\appdata\local\temp:winupd.exe (Trojan.Agent) -> Quarantined and deleted successfully.

    (end)
     
  3. Broni

    Broni Malware Annihilator Posts: 52,892   +344

    Welcome aboard [​IMG]

    Please, observe following rules:
    • Read all of my instructions very carefully. Your mistakes during cleaning process may have very serious consequences, like unbootable computer.
    • If you're stuck, or you're not sure about certain step, always ask before doing anything else.
    • Please refrain from running tools or applying updates other than those I suggest.
    • Never run more than one scan at a time.
    • Keep updating me regarding your computer behavior, good, or bad.
    • The cleaning process, once started, has to be completed. Even if your computer appears to act better, it may still be infected. Once the computer is totally clean, I'll certainly let you know.
    • If you leave the topic without explanation in the middle of a cleaning process, you may not be eligible to receive any more help in malware removal forum.
    • I close my topics if you have not replied in 5 days. If you need more time, simply let me know. If I closed your topic and you need it to be reopened, simply PM me.

    ===============================================================

    Your MBAM version is outdated.
    Update, run new scan and post fresh log.

    When done attempt DDS one more time.
     
  4. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    Nothing new

    It didn't come up with anything new... I'll attempt to run DDS again anyway and let you know. In case you want it, here's the mbam log:
     
  5. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    DDS still freezes the computer. DDS says to disable anything that might block scripts... just in case, I have been disabling McAfee before I run DDS. Is there anything else that I should be turning off?
     
  6. Broni

    Broni Malware Annihilator Posts: 52,892   +344

    Download TDSSKiller and save it to your desktop.
    • Doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
    • If an infected file is detected, the default action will be Cure, click on Continue.
    • If a suspicious file is detected, the default action will be Skip, click on Continue.
    • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
    • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
    • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.
     
  7. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    tddskiller

    It came up clean. Here's the report:
     
  8. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    Here's an older log, from when my sister ran tddskiller and it found something:

     
  9. Broni

    Broni Malware Annihilator Posts: 52,892   +344

    Download aswMBR to your desktop.
    Double click the aswMBR.exe to run it.
    If you see this question: Would you like to download latest Avast! virus definitions?" say "Yes".
    Click the "Scan" button to start scan.
    On completion of the scan click "Save log", save it to your desktop and post in your next reply.

    NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

    ============================================================

    Download Bootkit Remover to your Desktop.

    • Unzip downloaded file to your Desktop.
    • Double-click on boot_cleaner.exe to run the program (Vista/7 users,right click on boot_cleaner.exe and click Run As Administrator).
    • It will show a Black screen with some data on it.
    • Right click on the screen and click Select All.
    • Press CTRL+C
    • Open a Notepad and press CTRL+V
    • Post the output back here.
     
  10. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    Instructions followed. Here is the aswMBR log:
    and here is the boot_cleaner output:

     
  11. Broni

    Broni Malware Annihilator Posts: 52,892   +344

    Looks good :)

    Please download ComboFix from Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    1. Please, never rename Combofix unless instructed.
    2. Close any open browsers.
    3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
      NOTE1. If Combofix asks you to install Recovery Console, please allow it.
      NOTE 2. If Combofix asks you to update the program, always do so.
      • Close any open browsers.
      • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    4. Double click on combofix.exe & follow the prompts.
    5. When finished, it will produce a report for you.
    6. Please post the "C:\ComboFix.txt"
    **Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall
    **Note 2 for AVG and CA Internet Security users: ComboFix will not run until AVG/CA Internet Security is uninstalled as a protective measure against the anti-virus. This is because AVG/CA Internet Security "falsely" detects ComboFix (or its embedded files) as a threat and may remove them resulting in the tool not working correctly which in turn can cause "unpredictable results". Since AVG/CA Internet Security cannot be effectively disabled before running ComboFix, the author recommends you to uninstall AVG/CA Internet Security first.
    Use AppRemover to uninstall it: http://www.appremover.com/
    We can reinstall it when we're done with CF.

    **Note 3: If you receive an error "Illegal operation attempted on a registery key that has been marked for deletion", restart computer to fix the issue.



    Make sure, you re-enable your security programs, when you're done with Combofix.

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    NOTE.
    If, for some reason, Combofix refuses to run, try one of the following:

    1. Run Combofix from Safe Mode (How to...)

    2. Delete Combofix file, download fresh one, but rename combofix.exe to yourname.exe BEFORE saving it to your desktop.
    Do NOT run it yet.

    Please download and run the below tool named Rkill (courtesy of BleepingComputer.com) which may help allow other programs to run.

    There are 4 different versions. If one of them won't run then download and try to run the other one.

    Vista and Win7 users need to right click Rkill and choose Run as Administrator

    You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

    Rkill.com
    Rkill.scr
    Rkill.exe

    • Double-click on the Rkill desktop icon to run the tool.
    • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
    • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
    • If not, delete the file, then download and use the one provided in Link 2.
    • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
    • Do not reboot until instructed.
    • If the tool does not run from any of the links provided, please let me know.

    Once you've gotten one of them to run, immediately run your_name.exe by double clicking on it.

    If normal mode still doesn't work, run BOTH tools from safe mode.

    In case #2, please post BOTH logs, rKill and Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  12. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    ComboFix log

    Here it is:

     
  13. Broni

    Broni Malware Annihilator Posts: 52,892   +344

    1. Please open Notepad (Start>All Programs>Accessories>Notepad).

    2. Now copy/paste the entire content of the codebox below into the Notepad window:

    Code:
    File::
    c:\windows\system32\DRIVERS\11959207.sys
    c:\windows\system32\DRIVERS\84347022.sys
    
    Folder::
    
    Driver::
    11959207
    84347022
    
    Registry::
    
    ClearJavaCache::
    

    3. Save the above as CFScript.txt

    4. Close/disable all anti virus and anti malware programs again, so they do not interfere with the running of ComboFix.

    5. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

    [​IMG]


    6. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
    • Combofix.txt
     
  14. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    Here it is:

     
  15. Broni

    Broni Malware Annihilator Posts: 52,892   +344

    How is computer doing?

    Download OTL to your Desktop.

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Click the Scan All Users checkbox.
    • Under the Custom Scan box paste this in:


    netsvcs
    drivers32
    %SYSTEMDRIVE%\*.*
    %systemroot%\Fonts\*.com
    %systemroot%\Fonts\*.dll
    %systemroot%\Fonts\*.ini
    %systemroot%\Fonts\*.ini2
    %systemroot%\Fonts\*.exe
    %systemroot%\system32\spool\prtprocs\w32x86\*.*
    %systemroot%\REPAIR\*.bak1
    %systemroot%\REPAIR\*.ini
    %systemroot%\system32\*.jpg
    %systemroot%\*.jpg
    %systemroot%\*.png
    %systemroot%\*.scr
    %systemroot%\*._sy
    %APPDATA%\Adobe\Update\*.*
    %ALLUSERSPROFILE%\Favorites\*.*
    %APPDATA%\Microsoft\*.*
    %PROGRAMFILES%\*.*
    %APPDATA%\Update\*.*
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT
    %systemroot%\System32\config\*.sav
    %PROGRAMFILES%\bak. /s
    %systemroot%\system32\bak. /s
    %ALLUSERSPROFILE%\Start Menu\*.lnk /x
    %systemroot%\system32\config\systemprofile\*.dat /x
    %systemroot%\*.config
    %systemroot%\system32\*.db
    %APPDATA%\Microsoft\Internet Explorer\Quick Launch\*.lnk /x
    %USERPROFILE%\Desktop\*.exe
    %PROGRAMFILES%\Common Files\*.*
    %systemroot%\*.src
    %systemroot%\install\*.*
    %systemroot%\system32\DLL\*.*
    %systemroot%\system32\HelpFiles\*.*
    %systemroot%\system32\rundll\*.*
    %systemroot%\winn32\*.*
    %systemroot%\Java\*.*
    %systemroot%\system32\test\*.*
    %systemroot%\system32\Rundll32\*.*
    %systemroot%\AppPatch\Custom\*.*
    %APPDATA%\Roaming\Microsoft\Windows\Recent\*.lnk /x
    %PROGRAMFILES%\PC-Doctor\Downloads\*.*
    %PROGRAMFILES%\Internet Explorer\*.tmp
    %PROGRAMFILES%\Internet Explorer\*.dat
    %USERPROFILE%\My Documents\*.exe
    %USERPROFILE%\*.exe
    %systemroot%\ADDINS\*.*
    %systemroot%\assembly\*.bak2
    %systemroot%\Config\*.*
    %systemroot%\REPAIR\*.bak2
    %systemroot%\SECURITY\Database\*.sdb /x
    %systemroot%\SYSTEM\*.bak2
    %systemroot%\Web\*.bak2
    %systemroot%\Driver Cache\*.*
    %PROGRAMFILES%\Mozilla Firefox\0*.exe
    %ProgramFiles%\Microsoft Common\*.*
    %ProgramFiles%\TinyProxy.
    %USERPROFILE%\Favorites\*.url /x
    %systemroot%\system32\*.bk
    %systemroot%\*.te
    %systemroot%\system32\system32\*.*
    %ALLUSERSPROFILE%\*.dat /x
    %systemroot%\system32\drivers\*.rmv
    dir /b "%systemroot%\system32\*.exe" | find /i " " /c
    dir /b "%systemroot%\*.exe" | find /i " " /c
    %PROGRAMFILES%\Microsoft\*.*
    %systemroot%\System32\Wbem\proquota.exe
    %PROGRAMFILES%\Mozilla Firefox\*.dat
    %USERPROFILE%\Cookies\*.txt /x
    %SystemRoot%\system32\fonts\*.*
    %systemroot%\system32\winlog\*.*
    %systemroot%\system32\Language\*.*
    %systemroot%\system32\Settings\*.*
    %systemroot%\system32\*.quo
    %SYSTEMROOT%\AppPatch\*.exe
    %SYSTEMROOT%\inf\*.exe
    %SYSTEMROOT%\Installer\*.exe
    %systemroot%\system32\config\*.bak2
    %systemroot%\system32\Computers\*.*
    %SystemRoot%\system32\Sound\*.*
    %SystemRoot%\system32\SpecialImg\*.*
    %SystemRoot%\system32\code\*.*
    %SystemRoot%\system32\draft\*.*
    %SystemRoot%\system32\MSSSys\*.*
    %ProgramFiles%\Javascript\*.*
    %systemroot%\pchealth\helpctr\System\*.exe /s
    %systemroot%\Web\*.exe
    %systemroot%\system32\msn\*.*
    %systemroot%\system32\*.tro
    %AppData%\Microsoft\Installer\msupdates\*.*
    %ProgramFiles%\Messenger\*.*
    %systemroot%\system32\systhem32\*.*
    %systemroot%\system\*.exe
    HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Install|LastSuccessTime /rs
    /md5start
    /md5stop


    • Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows: OTL.txt and Extras.txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them back here.
     
  16. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    Scanning...
    As far as I can tell, the redirection problem is gone. The action center can give me security warnings saying that there is no active firewall, spyware, or virus protection enabled, but it can't do anything about it.
    McAfee says that the computer is secure.
     
  17. Broni

    Broni Malware Annihilator Posts: 52,892   +344

    We'll check on it a bit later.
     
  18. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    OTL.txt is too long for one post. Here is part 1:

     
  19. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    part two:

     
  20. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    and Extras.txt:
     
  21. Broni

    Broni Malware Annihilator Posts: 52,892   +344

    Run OTL
    • Under the Custom Scans/Fixes box at the bottom, paste in the following

      Code:
      :OTL
      O2 - BHO: (no name) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - No CLSID value found.
      O2 - BHO: (Java(tm) Plug-In 2 SSV Helper) - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll File not found
      O4 - Startup: C:\Users\Sarah\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OpenOffice.org 3.3.lnk = File not found
      O4 - Startup: C:\Users\Sarah\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uninst_11959207.lnk = File not found
      O4 - Startup: C:\Users\Sarah\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uninst_61472742.lnk = File not found
      O4 - Startup: C:\Users\Sarah\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uninst_84347022.lnk = File not found
      [2011/12/31 10:57:47 | 000,028,682 | -HS- | M] () -- C:\Users\Sarah\AppData\Local\458v73p75ekmqk3f8msv2l
      [2011/12/31 10:57:47 | 000,028,682 | -HS- | M] () -- C:\ProgramData\458v73p75ekmqk3f8msv2l
      [2011/12/30 04:55:48 | 000,027,878 | -HS- | M] () -- C:\Users\Sarah\AppData\Local\sev68fq41yk1qbmnnfrx803860r6kgy265y01qxpow6
      [2011/12/30 04:55:48 | 000,027,878 | -HS- | M] () -- C:\ProgramData\sev68fq41yk1qbmnnfrx803860r6kgy265y01qxpow6
      [2011/12/27 16:34:26 | 000,028,058 | -HS- | M] () -- C:\Users\Sarah\AppData\Local\33tc3173v44sqee43uclq23c54s20c2j
      [2011/12/27 16:34:26 | 000,028,058 | -HS- | M] () -- C:\ProgramData\33tc3173v44sqee43uclq23c54s20c2j
      [2012/01/02 10:27:59 | 000,000,124 | -HS- | C] () -- C:\windows\0711449drv.spi
      [2011/12/31 15:09:43 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\78CD6
      [2011/11/16 12:00:58 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\bpppnGG5aQH6W7
      [2011/11/16 09:58:46 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\BTXXXqjYCekIVzN
      [2011/11/17 20:09:47 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\CG4aQH6sKE9ZYwI
      [2011/11/17 20:09:46 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\crzONxA0ciDp
      [2011/12/31 15:09:43 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\D6E65
      [2011/11/17 12:38:29 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\DA1ivD2on4m
      [2011/12/06 16:21:54 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\DAZ 3D
      [2011/11/16 20:28:34 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\delOBtzP0ciDoFp
      [2011/11/16 20:28:35 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\gH5sQJ7dE8R9YjV
      [2011/11/16 14:54:01 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\GxA0uvSib3n5Q6W
      [2011/11/17 21:49:57 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\HUelIBty2F5ERXj
      [2011/11/20 13:38:32 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\i0ucS2ibDpaHW7T
      [2011/11/17 12:38:29 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\ksQJdEK8g9YwUlB
      [2011/11/16 14:54:01 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\rKfRL9hTXjCkBzN
      [2011/11/16 09:58:46 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\sddWWK77fR9
      [2011/11/16 09:58:29 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\twwjjUVVel
      [2011/11/16 12:00:58 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\vRL9gTXqjCkVzNx
      [2011/11/20 13:33:25 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\VTXqYCekIrOt
      [2011/11/20 13:38:53 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\vVrlOBtxPySiDoF
      [2011/11/17 21:49:58 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\yrzNyxASbpaJ8R9
      [2011/11/16 09:58:30 | 000,000,000 | ---D | M] -- C:\Users\Sarah\AppData\Roaming\zjCeekIBrzOyxAv
      
      :Commands
      [purity]
      [emptytemp]
      [emptyjava]
      [emptyflash]
      [Reboot]
      
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • You will get a log that shows the results of the fix. Please post it.

    ==============================================================

    Last scans...

    1. Download Security Check from HERE, and save it to your Desktop.
    • Double-click SecurityCheck.exe
    • Follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

      NOTE SecurityCheck may produce some false warning(s), so leave the results reading to me.

    2. Please download Farbar Service Scanner and run it on the computer with the issue.
    • Make sure the following options are checked:
      • Internet Services
      • Windows Firewall
      • System Restore
      • Security Center
      • Windows Update
    • Press "Scan".
    • It will create a log (FSS.txt) in the same directory the tool is run.
    • Please copy and paste the log to your reply.


    3. Download Temp File Cleaner (TFC)
    • Double click on TFC.exe to run the program.
    • Click on Start button to begin cleaning process.
    • TFC will close all running programs, and it may ask you to restart computer.


    4. Please run a free online scan with the ESET Online Scanner

    • Disable your antivirus program
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • Accept any security warnings from your browser.
    • Check Scan archives
    • Click Start
    • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    • When the scan completes, click on List of found threats
    • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    • NOTE. If Eset won't find any threats, it won't produce any log.
     
  22. Broni

    Broni Malware Annihilator Posts: 52,892   +344

    OTL fix log is incorrect.
    You clicked on "Scan" button instead of "Fix" button.
    Redo.
     
  23. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    Here is Security Check's checkup.txt:

     
  24. Broni

    Broni Malware Annihilator Posts: 52,892   +344

    Make sure you read my reply #24.
    Please pay attention.
     
  25. jamesc118

    jamesc118 TS Rookie Topic Starter Posts: 21

    Sorry about that. I posted before I refreshed. Redo-ing. Should I redo the Security Check scan as well?
     

Similar Topics

Add New Comment

You need to be a member to leave a comment. Join thousands of tech enthusiasts and participate.
TechSpot Account You may also...