Win64/Patched.A in Services.exe and no Internet

Solved
By Levka
Oct 26, 2012
  1. Levka

    Levka Newcomer, in training Topic Starter Posts: 23

    # AdwCleaner v2.005 - Logfile created 10/28/2012 at 01:45:44
    # Updated 14/10/2012 by Xplode
    # Operating system : Windows 7 Ultimate Service Pack 1 (64 bits)
    # User : Home - HOME-PC
    # Boot Mode : Normal
    # Running from : C:\Users\Home\Desktop\adwcleaner.exe
    # Option [Delete]


    ***** [Services] *****


    ***** [Files / Folders] *****

    File Deleted : C:\Users\Home\Desktop\Search The Web.url
    File Deleted : C:\Users\Home\Desktop\sweetpcfix.url
    Folder Deleted : C:\Program Files (x86)\Common Files\AVG Secure Search
    Folder Deleted : C:\Program Files (x86)\SweetIM
    Folder Deleted : C:\ProgramData\Anti-phishing Domain Advisor
    Folder Deleted : C:\ProgramData\blekko toolbars
    Folder Deleted : C:\ProgramData\SweetIM
    Folder Deleted : C:\Users\Home\AppData\Local\Google\Chrome\User Data\Default\Extensions\jcdgjdiieiljkfkdcloehkohchhpekkn

    ***** [Registry] *****

    Key Deleted : HKCU\Software\IGearSettings
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{95B7759C-8C7F-4BF1-B163-73684A933233}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EEE6C35B-6118-11DC-9C72-001320C79847}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EEE6C35C-6118-11DC-9C72-001320C79847}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{95B7759C-8C7F-4BF1-B163-73684A933233}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EEE6C35B-6118-11DC-9C72-001320C79847}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EEE6C35C-6118-11DC-9C72-001320C79847}
    Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F25AF245-4A81-40DC-92F9-E9021F207706}
    Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}
    Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{3BD44F0E-0596-4008-AEE0-45D47E3A8F0E}
    Key Deleted : HKLM\SOFTWARE\Classes\MediaPlayer.GraphicsUtils
    Key Deleted : HKLM\SOFTWARE\Classes\MediaPlayer.GraphicsUtils.1
    Key Deleted : HKLM\SOFTWARE\Classes\MgMediaPlayer.GifAnimator
    Key Deleted : HKLM\SOFTWARE\Classes\MgMediaPlayer.GifAnimator.1
    Key Deleted : HKLM\SOFTWARE\Classes\sim-packages
    Key Deleted : HKLM\SOFTWARE\Classes\SWEETIE.IEToolbar
    Key Deleted : HKLM\SOFTWARE\Classes\SWEETIE.IEToolbar.1
    Key Deleted : HKLM\SOFTWARE\Classes\sweetim_urlsearchhook.toolbarurlsearchhook
    Key Deleted : HKLM\SOFTWARE\Classes\sweetim_urlsearchhook.toolbarurlsearchhook.1
    Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.sweetie
    Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.sweetie.1
    Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{4D3B167E-5FD8-4276-8FD7-9DF19C1E4D19}
    Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
    Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{EEE6C35E-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{EEE6C35F-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\SweetIM.exe
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{82AC53B4-164C-4B07-A016-437A8388B81A}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{A4A0CB15-8465-4F58-A7E5-73084EA2A064}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{EEE6C35B-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{EEE6C35C-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{EEE6C35D-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{A439801C-961D-452C-AB42-7848E9CBD289}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{EEE6C358-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{EEE6C359-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{EEE6C35A-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{F4EBB1E2-21F3-4786-8CF4-16EC5925867F}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\jcdgjdiieiljkfkdcloehkohchhpekkn
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{EEE6C367-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EEE6C35C-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Anti-phishing Domain Advisor
    Key Deleted : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
    Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
    Key Deleted : HKLM\SOFTWARE\Classes\Interface\{EEE6C358-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Classes\Interface\{EEE6C359-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Classes\Interface\{EEE6C35A-6118-11DC-9C72-001320C79847}
    Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}
    Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [SweetIM]
    Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [Sweetpacks Communicator]
    Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs [C:\Program Files (x86)\SweetIM\Toolbars\Internet Explorer\mgHelperApp.exe]
    Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs [C:\Program Files (x86)\SweetIM\Toolbars\Internet Explorer\mgToolbarProxy.dll]
    Value Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar [{EEE6C35B-6118-11DC-9C72-001320C79847}]

    ***** [Internet Browsers] *****

    -\\ Internet Explorer v9.0.8112.16421

    Replaced : [HKCU\Software\Microsoft\Internet Explorer\Main - Start Page] = hxxp://blekko.com/ws/?source=c3348dd4&toolbarid=blekkotb_031&u=73449B05B68520BFFDE9DC50557433B8&tbp=homepage --> hxxp://www.google.com

    -\\ Google Chrome v [Unable to get version]

    File : C:\Users\Home\AppData\Local\Google\Chrome\User Data\Default\Preferences

    Deleted [l.11] : homepage = "hxxp://start.facemoods.com/?a=ddrnw",
    Deleted [l.15] : urls_to_restore_on_startup = [ "hxxp://www.google.com", "hxxp://blekko.com/ws/?source=c3348dd4&toolbarid=blekkotb_031&u=73449B05B68520BFFDE9DC50557433B8&tbp=homepage" ]
    Deleted [l.1457] : homepage = "hxxp://start.facemoods.com/?a=ddrnw",
    Deleted [l.2117] : urls_to_restore_on_startup = [ "hxxp://www.google.com", "hxxp://blekko.com/ws/?source=c3348dd4&toolbarid=blekkotb_031&u=73449B05B68520BFFDE9DC50557433B8&tbp=homepage" ]

    *************************

    AdwCleaner[S1].txt - [7114 octets] - [28/10/2012 01:45:44]

    ########## EOF - C:\AdwCleaner[S1].txt - [7174 octets] ##########
  2. Levka

    Levka Newcomer, in training Topic Starter Posts: 23

    Wow... it found lots of threats...
    C:\Qoobox\Quarantine\C\Windows\Installer\{a0330169-c0e7-0c91-77ff-0fe27956ee83}\U\00000004.@.virWin64/Conedex.C trojancleaned by deleting - quarantined
    C:\Qoobox\Quarantine\C\Windows\Installer\{a0330169-c0e7-0c91-77ff-0fe27956ee83}\U\80000032.@.virprobably a variant of Win32/Sirefef.FD trojancleaned by deleting - quarantined
    C:\Qoobox\Quarantine\C\Windows\Installer\{a0330169-c0e7-0c91-77ff-0fe27956ee83}\U\80000064.@.virWin64/Sirefef.AN trojancleaned by deleting - quarantined
    C:\Users\Home\Downloads\THOMSON_REUTERS_REFERENCE_keygen_by_EDGEISO.zipa variant of Win32/Kryptik.ANTY trojandeleted - quarantined
    C:\_OTL\MovedFiles\10282012_013713\C_FRST\Quarantine\{a0330169-c0e7-0c91-77ff-0fe27956ee83}\U\00000004.@Win64/Conedex.C trojancleaned by deleting - quarantined
    C:\_OTL\MovedFiles\10282012_013713\C_FRST\Quarantine\{a0330169-c0e7-0c91-77ff-0fe27956ee83}\U\00000008.@Win64/Agent.BA trojancleaned by deleting - quarantined
    C:\_OTL\MovedFiles\10282012_013713\C_FRST\Quarantine\{a0330169-c0e7-0c91-77ff-0fe27956ee83}\U\000000cb.@Win64/Conedex.B trojancleaned by deleting - quarantined
    C:\_OTL\MovedFiles\10282012_013713\C_FRST\Quarantine\{a0330169-c0e7-0c91-77ff-0fe27956ee83}\U\80000000.@Win64/Sirefef.AP trojancleaned by deleting - quarantined
    D:\Documents and Settings\All Users.WINDOWS\Application Data\Spybot - Search & Destroy\Recovery\WinKoobface1.zipWin32/Bagle.gen.zip wormcleaned by deleting - quarantined
    D:\Documents and Settings\Lev.HOME\My Documents\Downloads\etypesetup.exea variant of Win32/Somoto.A applicationcleaned by deleting - quarantined
    D:\Documents and Settings\Lev.HOME\My Documents\Downloads\FFSetup295.zipa variant of Win32/ELEX applicationdeleted - quarantined
    D:\Documents and Settings\Lev.HOME\My Documents\Downloads\SoftonicDownloader_for_oscar.exeWin32/SoftonicDownloader.D applicationcleaned by deleting - quarantined
    D:\Documents and Settings\Lev.HOME\My Documents\Downloads\SoftonicDownloader_for_spss (1).exea variant of Win32/SoftonicDownloader.A applicationcleaned by deleting - quarantined
    D:\Documents and Settings\Lev.HOME\My Documents\Downloads\SoftonicDownloader_for_spss (2).exea variant of Win32/SoftonicDownloader.A applicationcleaned by deleting - quarantined
    D:\Documents and Settings\Lev.HOME\My Documents\Downloads\SoftonicDownloader_for_spss (3).exea variant of Win32/SoftonicDownloader.A applicationcleaned by deleting - quarantined
    D:\Documents and Settings\Lev.HOME\My Documents\Downloads\SoftonicDownloader_for_spss (4).exea variant of Win32/SoftonicDownloader.A applicationcleaned by deleting - quarantined
    D:\Documents and Settings\Lev.HOME\My Documents\Downloads\SoftonicDownloader_for_spss.exea variant of Win32/SoftonicDownloader.A applicationcleaned by deleting - quarantined
    D:\Documents and Settings\Lev.HOME\My Documents\Downloads\soundcrank_398.exea variant of Win32/InstallIQ applicationcleaned by deleting - quarantined
    D:\Documents and Settings\Lev.HOME\My Documents\Downloads\unconfirmed 39971.crdownloada variant of Win32/SoftonicDownloader.A applicationcleaned by deleting - quarantined
    D:\Documents and Settings\Lev.HOME\My Documents\Downloads\unconfirmed 77593.crdownloada variant of Win32/SoftonicDownloader.A applicationcleaned by deleting - quarantined
  3. Broni

    Broni Malware Annihilator Posts: 46,433   +252

    1. Update your Java version here: http://www.java.com/en/download/installed.jsp

    Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

    Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

    2. Now, we need to remove old Java version and its remnants...

    Download JavaRa to your desktop and unzip it.
    • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
    • Accept any prompts.
    • Do NOT post JavaRa log.

    ==================================

    Your computer is clean [​IMG]

    1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

    Run OTL

    • Under the Custom Scans/Fixes box at the bottom, paste in the following:

    Code:
    :OTL
    :Commands
    [purity]
    [emptytemp]
    [EMPTYFLASH]
    [emptyjava]
    [CLEARALLRESTOREPOINTS]
    [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • Post resulting log.

    2. Now, we'll remove all tools, we used during our cleaning process

    Clean up with OTL:

    • Double-click OTL.exe to start the program.
    • Close all other programs apart from OTL as this step will require a reboot
    • On the OTL main screen, press the CLEANUP button
    • Say Yes to the prompt and then allow the program to reboot your computer.

    If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

    3. Make sure, Windows Updates are current.

    4. If any trojans, rootkits or bootkits were listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    5. Check if your browser plugins are up to date.
    Firefox - https://www.mozilla.org/en-US/plugincheck/
    other browsers: https://browsercheck.qualys.com/ (click on "Launch a quick scan now" link)

    6. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    7. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

    8. Run Temporary File Cleaner (TFC) weekly.

    9. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

    10. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
    The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

    11. (Windows XP only) Run defrag at your convenience.

    12. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

    13. Read:
    How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html
    Simple and easy ways to keep your computer safe and secure on the Internet: http://www.bleepingcomputer.com/tutorials/keep-your-computer-safe-online/

    14. Please, let me know, how your computer is doing.
  4. Levka

    Levka Newcomer, in training Topic Starter Posts: 23

    All processes killed
    ========== OTL ==========
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Home
    ->Temp folder emptied: 11906444 bytes
    ->Temporary Internet Files folder emptied: 7052857 bytes
    ->Java cache emptied: 589827 bytes
    ->Google Chrome cache emptied: 26944113 bytes

    User: moran
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32 (64bit) .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 0 bytes
    %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 0 bytes
    RecycleBin emptied: 6052811131 bytes

    Total Files Cleaned = 5,817.00 mb


    [EMPTYFLASH]

    User: All Users

    User: Default

    User: Default User

    User: Home

    User: moran

    User: Public

    Total Flash Files Cleaned = 0.00 mb


    [EMPTYJAVA]

    User: All Users

    User: Default

    User: Default User

    User: Home
    ->Java cache emptied: 0 bytes

    User: moran

    User: Public

    Total Java Files Cleaned = 0.00 mb

    Restore point Set: OTL Restore Point

    OTL by OldTimer - Version 3.2.69.0 log created on 10282012_123927

    Files\Folders moved on Reboot...
    C:\Users\Home\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.

    PendingFileRenameOperations files...

    Registry entries deleted on Reboot...
  5. Broni

    Broni Malware Annihilator Posts: 46,433   +252

  6. Levka

    Levka Newcomer, in training Topic Starter Posts: 23

    I'm not at home today.
    Thank you very very much.
    I'll let you know tomorrow as soon as I'll get home
  7. Broni

    Broni Malware Annihilator Posts: 46,433   +252

  8. Levka

    Levka Newcomer, in training Topic Starter Posts: 23

    The computer is going fine
    thank you so much!!!

    Do I have to change all my passwords? Or is it fine to keep them?
  9. Broni

    Broni Malware Annihilator Posts: 46,433   +252

    You're very welcome [​IMG]

    Passwords change is a must. You had a rootkit.

    Good luck and stay safe :)


Add New Comment

TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...


Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.