mom's computer - again

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by gregdil, Aug 9, 2014.

  1. gregdil

    gregdil Private E-2

    sorry guys but my parents are getting on their 70s and try as i might i just can't seem to educate them on how to safely use the internet; they've managed to download the "cosstminn 2.0" adware which had flooded their browsers with pop ups.

    running read and run me first scans has helped with the pop ups but the "cosstminn 2.0" extension still appears in "settings" every time google chrome is opened...

    hope you guys can help me remove it once and for all
    (doesn't mean that i won't be back - but at least it will mean another donation!)

    log files are attached - thanks always for the help!

    greg
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there. :)

    Why did you not have Malware Bytes fix all that it found?? Please do so now if you didn't already afterwards, then rescan again from fresh and attach for me the NEW log. Thanks. :)

    What is inside of these folders?
    • C:\ProgramData\9feddf5e5ad97441
    • C:\Program Files (x86)\predm



    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [Suspicious.Path] \\PC HealthFix Desktop Alert -- C:\ProgramData\PC HealthFix\PCHealthFix.exe (/alert) -> FOUND
    • [Suspicious.Path] \\PC HealthFix Desktop Alert -- C:\ProgramData\PC HealthFix\PCHealthFix.exe (/alert) -> FOUND
    • [Suspicious.Path] \\PC HealthFix Desktop Warning -- C:\ProgramData\PC HealthFix\PCHealthFix.exe (/warning) -> FOUND
    • [Suspicious.Path] \\PC HealthFix Malware Alert -- C:\ProgramData\PC HealthFix\PCHealthFix.exe (/malware) -> FOUND
    • [Suspicious.Path] \\PC HealthFix Scan Results Alert -- C:\ProgramData\PC HealthFix\PCHealthFix.exe (/results) -> FOUND
    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\Program Files (x86)\globalUpdate
    C:\Users\diluzio\AppData\Local\Temp\__tmp_34480006
    C:\Users\diluzio\AppData\Local\Temp\is45637729
    C:\Users\teresa\AppData\Local\Temp\A870tmp
    C:\Users\teresa\Downloads\Player (1).exe
    C:\Users\teresa\Downloads\Player.exe
    C:\Program Files (x86)\SupTab
    C:\Users\teresa\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup
    C:\Users\teresa\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup\MyPC Backup.lnk 
    C:\Users\teresa\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup\Uninstall.lnk 
    C:\Users\teresa\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPC Backup.lnk 
    C:\Users\teresa\Desktop\MyPC Backup.lnk
    C:\Users\teresa\Desktop\Sync Folder.lnk
    C:\Users\teresa\Documents\Optimizer Pro
    C:\ProgramData\PC HealthFix
    C:\Program Files (x86)\ver3BlockAndSurf
    C:\Program Files (x86)\AnyProtectEx
    C:\Windows\tasks\APSnotifierPP1.job
    C:\Windows\tasks\APSnotifierPP2.job
    C:\Windows\tasks\APSnotifierPP3.job
    
    :reg
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
    "BlockAndSurf"=-
    "AnyProtect Scanner"=-
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\microsoft\windows\currentVersion\Run]
    "BlockAndSurf"=-
    "AnyProtect Scanner"=-
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Optimizer Pro Schedule]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\optprosetup_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\optprosetup_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\OptProStart_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\OptProStart_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\PluginService_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\PluginService_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\supTab]
    [-HKLM\SOFTWARE\Wow6432Node\supWPM]
    [-HKLM\SOFTWARE\Wow6432Node\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKLM\SOFTWARE\Wow6432Node\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}]
    [-HKLM\SOFTWARE\Wow6432Node\{5F189DF5-2D05-472B-9091-84D9848AE48B}]
    [-HKLM\SOFTWARE\Wow6432Node\{6791A2F3-FC80-475C-A002-C014AF797E9C}]
    [-HKLM\SOFTWARE\Wow6432Node\{77D46E27-0E41-4478-87A6-AABE6FBCF252}]
    [-HKU\.DEFAULT\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKU\.DEFAULT\Software\AppDataLow\{5F189DF5-2D05-472B-9091-84D9848AE48B}]
    [-HKU\S-1-5-18\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKU\S-1-5-18\Software\AppDataLow\{5F189DF5-2D05-472B-9091-84D9848AE48B}]
    [-HKU\S-1-5-19\Software\AppDataLow\{5F189DF5-2D05-472B-9091-84D9848AE48B}]
    [-HKU\S-1-5-20\Software\AppDataLow\{5F189DF5-2D05-472B-9091-84D9848AE48B}]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1000\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1000\Software\AppDataLow\{5F189DF5-2D05-472B-9091-84D9848AE48B}]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1003\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1003\Software\AppDataLow\{5F189DF5-2D05-472B-9091-84D9848AE48B}]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1003\Software\Microsoft\Windows\CurrentVersion\Run\Optimizer Pro]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1003\Software\Optimizer Pro]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1004\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1004\Software\AppDataLow\{5F189DF5-2D05-472B-9091-84D9848AE48B}]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1003\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1003\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache]
    [-HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}]
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.



    Download Cleano 0.61

    Download it to your desktop, Right click the cleano.exe file and run as admin > and place check marks in the boxes as follows (click on link below to see image)

    View attachment 148092
    Click clean now and exit the program.


    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.



    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Don't forget the Malware Bytes log and to let me know about those folders.
    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  3. gregdil

    gregdil Private E-2

    hi kestrel,

    thanks for your reply...

    sorry i did not have MB fix all after the 1st scan; was rushing through it and just plain forgot. i remembered the 2nd time - new log is attached.

    contents of folders:
    C:\ProgramDate\9feddf5e5ad97441
    {CE681A67-9477-CBE6-EB9D-FE534875F98D}.20140808065717
    {CE681A67-9477-CBE6-EB9D-FE534875F98D}.20140808114005

    C:\Program Files (x86)\predm
    this folder is empty

    Rogue Killer log is attached;
    the detections you listed for deletion were actually located under the "TASKS" tab, not the "Registry" tab - just for information

    OTM log file is attached

    JRT log file is attached

    MG Logs file is attached


    computer is running better now - no pop ups
    however the "cosstminn 2.0" extension still loads into chrome at startup
    when logged in as "donald" or "teresa".
    the "cosstminn 2.0" extension does not load into chrome when logged in as user "diluzio".

    thanks again for your help!

    greg
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You can delete these:

    • C:\ProgramDate\9feddf5e5ad97441
    • C:\Program Files (x86)\predm

    You should run the scans on both of those accounts too. (One at a time)

    Attach the logs for me to check.
     
  5. gregdil

    gregdil Private E-2

    hi kestrel

    i deleted those folders

    ran scans in both donald and teresa profiles

    looks like cosstminn is sticking around.
    also, having some fishing problems with a bogus "java update" pop-up -
    see screen shot attached

    could not run TDS killer in the donald profile so skipped it

    "teresa" profile logs attached

    thanks,

    greg
     

    Attached Files:

  6. gregdil

    gregdil Private E-2

    hi,

    MG logs from "teresa" profile

    thanks,

    greg
     

    Attached Files:

  7. gregdil

    gregdil Private E-2

    hello again,

    log files from the scans of "donald" profile

    as mentioned could not get through tds killer in this profile so skipped it

    thanks,

    greg
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Teresa Fix


    Please tell me which browser is being affected on this account. Is it Google Chrome or other browsers?



    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [PUM.SearchPage] (X64) HKEY_USERS\S-1-5-21-3325609208-3778994624-886355486-1003\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.istart123.com/web/?type=ds&ts=1407495461&from=tugs&uid=TOSHIBAXMK6476GSX_X1SLS69KSXXX1SLS69KS&q={searchTerms} -> FOUND
    • [PUM.SearchPage] (X86) HKEY_USERS\S-1-5-21-3325609208-3778994624-886355486-1003\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.istart123.com/web/?type=ds&ts=1407495461&from=tugs&uid=TOSHIBAXMK6476GSX_X1SLS69KSXXX1SLS69KS&q={searchTerms} -> FOUND
    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.



    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\Users\teresa\Desktop\AnyProtect.lnk
    C:\Users\teresa\AppData\Local\nsd2BAB.tmp
    C:\Users\teresa\AppData\Local\nsh924E.tmp
    C:\Windows\System32\Tasks\Optimizer Pro Schedule 
    C:\Users\teresa\AppData\Local\Temp\sv1fpil.tmp
    
    :reg
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Optimizer Pro Schedule]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1003\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1003\Software\AppDataLow\{5F189DF5-2D05-472B-9091-84D9848AE48B}]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1003\Software\Microsoft\Windows\CurrentVersion\Run\Optimizer Pro]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1003\Software\Optimizer Pro]
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "Optimizer Pro"=-
    [HKEY_USERS\S-1-5-21-3325609208-3778994624-886355486-1003\Software\Microsoft\Windows\CurrentVersion\run]
    "Optimizer Pro"=-
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.


    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.



    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now on the Teresa account!
     
  9. gregdil

    gregdil Private E-2

    hi kestrel,

    all users on this computer are using google chrome

    new log files for profile Teresa are attached

    i noticed two suspicious files in the "downloads" folder of the Teresa profile:
    setup.exe
    java_installer.exe

    both have "date modified" as august 8, 2014 - the day that this latest trouble started...

    things seem fine today; no re-directs, no "java update" pop-up

    thanks,

    greg
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    For Teresa account.

    Just delete these:

    • C:\Users\teresa\AppData\Roaming\aps.scan.quick.results
    • C:\Users\teresa\AppData\Roaming\aps.scan.results
    • C:\Users\teresa\AppData\Roaming\aps.uninstall.scan.results

    Now, just going to make a coffee and I'll check the Donald logs... :)
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    For Donald account....


    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [PUM.SearchPage] (X64) HKEY_USERS\S-1-5-21-3325609208-3778994624-886355486-1003\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.istart123.com/web/?type=ds&ts=1407495461&from=tugs&uid=TOSHIBAXMK6476GSX_X1SLS69KSXXX1SLS69KS&q={searchTerms} -> FOUND
    • [PUM.SearchPage] (X86) HKEY_USERS\S-1-5-21-3325609208-3778994624-886355486-1003\Software\Microsoft\Internet Explorer\Main | Search Page : http://www.istart123.com/web/?type=ds&ts=1407495461&from=tugs&uid=TOSHIBAXMK6476GSX_X1SLS69KSXXX1SLS69KS&q={searchTerms} -> FOUND
    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\Users\donald\AppData\Roaming\aps.scan.quick.results
    C:\Users\donald\AppData\Roaming\aps.scan.results
    C:\Users\donald\AppData\Roaming\aps.uninstall.scan.results
    
    :reg
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1004\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKU\S-1-5-21-3325609208-3778994624-886355486-1004\Software\AppDataLow\{5F189DF5-2D05-472B-9091-84D9848AE48B}]
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.


    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.


    Have the pop ups now gone from the Donald account? :)
     
  12. gregdil

    gregdil Private E-2

    hi kestrel,

    attached are logs from the Donald account

    no sign of pop ups or cosstminn

    thanks for your help

    greg
     

    Attached Files:

  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Final steps then for all accounts. :)

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.

    7. After doing the above, you should work thru the below link:
     
  14. gregdil

    gregdil Private E-2

    thanks kestrel

    paypal donation on the way

    greg
     
  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Thankyou very much indeed. We appreciate your support! :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds