New Out of the Box Lenovo Laptop has PUPs, Malware, Conduit and Superfish

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by trisha, Mar 1, 2015.

  1. trisha

    trisha Corporal

    logs attached
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You have both of the below installed. You need to uninstall one of these right now before continuing:

    McAfee LiveSafe - Internet Security
    Webroot SecureAnywhere



    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Users\smitheugene\AppData\Local\Temp\*.*
    C:\windows\system32\VisualDiscoveryOff.ini
    C:\windows\SysWOW64\VisualDiscovery.ini
    C:\windows\SysWOW64\VisualDiscoveryOff.ini
    
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\VisualDiscovery.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{AD063C0E-0FE1-4772-B29B-679ACE94818F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{0FCE4F01-64EC-42F1-83E1-1E08D38605D2}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1A2A195A-A0F9-4006-AF02-3F05EEFDE792}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{2D9DB233-DC4B-4677-946C-5FA5ABCF506B}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{2E5FA7B4-61A2-4662-BBCE-62BBB20FC649}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3AE76A17-C344-4A83-81CE-65EFEE41E42D}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4C0A69B0-CE97-42B7-86FC-08280C99C74D}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4E9EB4D5-C929-4005-AC62-1856B1DA5A24}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{5D7F05E3-075A-43AF-8BC7-21E2F7F38845}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{617E26CE-E6E1-4C75-A68A-A001F2B98491}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{79FBDBEA-A722-4ABD-BEC0-B7D463F6BA0E}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8128586C-DF69-4266-873F-CF4C6F705A7C}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8FAF962C-3EDE-405E-B1D0-62B8235C6044}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C1F5E799-B218-4C32-B189-3C389BA140BB}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C1F9CFCE-A7DC-4072-8B31-1DEA57004C86}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{EA4AD895-2A7F-430E-B973-DEE6C4E743A9}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{EBF4B60F-A863-426F-BE6F-5DFE83BC574F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F60C9408-3110-4C98-A139-ABE1EE1111DD}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{CB6BF8B6-E12B-42FA-A478-91BCCDE475DC}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\VisualDiscovery.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\{AD063C0E-0FE1-4772-B29B-679ACE94818F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{02966FA9-C01A-47E7-A169-C83AEA1FB0BA}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{05FF6A00-76A3-4AA1-A9A4-A782152ABE60}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10A7F29D-4B00-40EC-B07D-8616DF8135E6}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4EECDED2-40FB-4500-85B4-86FB0EBECA68}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{533403E2-6E21-4615-9E28-43F4E97E977B}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5780633B-414C-446F-8EB2-FF1C9A731C99}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{70C7334A-66D9-46DE-A4E2-6B923C7DB94E}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9AD5C084-B6E6-456A-8BA2-A559663780E5}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0FCE4F01-64EC-42F1-83E1-1E08D38605D2}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1A2A195A-A0F9-4006-AF02-3F05EEFDE792}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2D9DB233-DC4B-4677-946C-5FA5ABCF506B}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2E5FA7B4-61A2-4662-BBCE-62BBB20FC649}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3AE76A17-C344-4A83-81CE-65EFEE41E42D}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4C0A69B0-CE97-42B7-86FC-08280C99C74D}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4E9EB4D5-C929-4005-AC62-1856B1DA5A24}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5D7F05E3-075A-43AF-8BC7-21E2F7F38845}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{617E26CE-E6E1-4C75-A68A-A001F2B98491}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{79FBDBEA-A722-4ABD-BEC0-B7D463F6BA0E}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8128586C-DF69-4266-873F-CF4C6F705A7C}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8FAF962C-3EDE-405E-B1D0-62B8235C6044}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C1F5E799-B218-4C32-B189-3C389BA140BB}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C1F9CFCE-A7DC-4072-8B31-1DEA57004C86}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EA4AD895-2A7F-430E-B973-DEE6C4E743A9}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EBF4B60F-A863-426F-BE6F-5DFE83BC574F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F60C9408-3110-4C98-A139-ABE1EE1111DD}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{CB6BF8B6-E12B-42FA-A478-91BCCDE475DC}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\VisualDiscovery]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VDWFP]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VisualDiscovery]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\CltMngSvc]
    [-HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0182621425175804mcinstcleanup]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXT log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  3. trisha

    trisha Corporal

    I know there is both on the machine. I was just setting this computer up and did not realize McAfee was already on the machine before I installed Webroot.

    I didn't mention earlier that I was just setting this computer up for a friend. It is newly purchased. I want to ask you a question. If you had just purchased this computer and while doing the set up you discovered there was all this cr**p installed would you take the computer back to the store? My friend bought it at BestBuy.

    Just wondering if all of this clean up is worth the trouble.:confused:(
     
  4. trisha

    trisha Corporal

    Ran all the things you said to run and uninstalled McAfee.

    Logs attached.

    So far it updated IE to the newest version, which is better. Did not get rid of the Lenovo Home page rolleyes
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just set your home page to what you want. Doesn't that work?

    Is everything else okay?

    Best Buy probably has no idea that Lenovo is puttingt his stuff on the PCs..... that is unless Best Buy is actually installing it after getting the new PCs and if that is the case, Lenovo should stop allowing Best Buy to sell Lenovo PCs.
     
  6. trisha

    trisha Corporal

    Wow. The purchaser has decided to take the computer back to BestBuy and get the Dell laptop that was similar to this one in design and price.

    Yes, everything else is OK. Didn't try resetting the homepage, but, yes I would imagine that would work.

    Now, since it is going back to the store, I am wondering how to wipe out the personal information off the computer. Any suggestions?

    I really do appreciate all of your help with this. I was truly dumbfounded when the AV started finding all this cr*p on the new computer.

    Guess it's time to do the clean up steps?
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Personal info will have to be manually removed from where ever the user save things. Most of the time this defaults to being in the user accounts own fodders, but I cannot predetermine where the user may have stored info. You should erase all cookies for all browsers and possibly it would be good to change the passwords to something not normally used before returning. Even create new admin account and delete the previous one being used and delete the user folder.

    Okay.



    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds