Numerous rogue programs, pop-ups, and thousands of infections

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by mondola, Oct 25, 2014.

  1. mondola

    mondola Specialist

    Pretty pants really. Cleaned once before, but not been kept up to date by the user.

    Logs attached.
     

    Attached Files:

  2. mondola

    mondola Specialist

    Remaining logs...
     

    Attached Files:

  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Uninstall the below using Revo Uninsaller.

    • AnyProtect
    • AVG PC TuneUp 2014 (en-US)
    • AVG PC TuneUp 2014
    • AVG PC TuneUp Language Pack (en-US)
    • FastPlayer
    • Norton PC Checkup
    • Optimizer Pro v3.2
    • PepperZip 1.0
    • Search App by Ask
    • SpeedUpMyPC
    • Super Optimizer


    • Now re run Hitman Pro again and attach the scan log.
    • Same for RogueKiller

    Will see what's left after this:
    Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  4. mondola

    mondola Specialist

    Thanks. That tool a while to remove the programs.

    New logs attached.

    :)
     

    Attached Files:

  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Good evening, mondola. Is this system deliberately set up to use a proxy?
     
  6. mondola

    mondola Specialist

    Good evening.

    No. It's not configured to use a proxy.

    Cheers.
     
  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    MyPC Backup <<<Uninstall this garbage too:

    Uninstall Google Chrome with Revo Uninstaller.

    Also uninstall all these Google components:

    • Google SketchUp 8
    • Google Toolbar for Internet Explorer
    • Google Update Helper



    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{042DA63B-0933-403D-9395-B49307691690} -> Found
    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{4AA46D49-459F-4358-B4D1-169048547C23} -> Found
    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52} -> Found
    • [PUP] (X64) HKEY_USERS\S-1-5-21-624153006-676611898-2557710091-1000\Software\Microsoft\Windows\CurrentVersion\Run | Driver Pro : C:\Program Files (x86)\Driver Pro\DPLauncher.exe -> Found
    • [PUP] (X86) HKEY_USERS\S-1-5-21-624153006-676611898-2557710091-1000\Software\Microsoft\Windows\CurrentVersion\Run | Driver Pro : C:\Program Files (x86)\Driver Pro\DPLauncher.exe -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BackupStack (C:\Program Files (x86)\MyPC Backup\BackupStack.exe) -> Found
    • [Hidden.From.SCM] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\htji (System32\drivers\abgpbj.sys) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\BackupStack (C:\Program Files (x86)\MyPC Backup\BackupStack.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\APNMCP ("C:\Program Files (x86)\AskPartnerNetwork\Toolbar\apnmcp.exe") -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\BackupStack (C:\Program Files (x86)\MyPC Backup\BackupStack.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\CltMngSvc (C:\PROGRA~2\SearchProtect\Main\bin\CltMngSvc.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\globalUpdate (C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe /svc) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\globalUpdatem (C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe /medsvc) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\PCTechHotlineSvc (C:\Program Files (x86)\PCTechHotline\PCTechHotlineSvc.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\RelevantKnowledge (C:\Program Files (x86)\RelevantKnowledge\rlservice.exe /service) -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found
    • [PUM.HomePage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : about:newtab -> Found
    • [PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-624153006-676611898-2557710091-1000\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.search.ask.com/?tpid=ORJ...196&itbv=12.18.0.82&doi=2014-10-20&psv=&pt=tb -> Found
    • [PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-624153006-676611898-2557710091-1000\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.search.ask.com/?tpid=ORJ...196&itbv=12.18.0.82&doi=2014-10-20&psv=&pt=tb -> Found
    • [PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.search.ask.com/?tpid=ORJ...196&itbv=12.18.0.82&doi=2014-10-20&psv=&pt=tb -> Found
    • [PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.search.ask.com/?tpid=ORJ...196&itbv=12.18.0.82&doi=2014-10-20&psv=&pt=tb -> Found

    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.

    ...and the same for these items on the Tasks tab please...

    • [Suspicious.Path] FCQSK.job -- C:\Users\milkybru\AppData\Roaming\FCQSK.exe -> Found
    • [Suspicious.Path] LMWLJKY.job -- C:\Users\milkybru\AppData\Roaming\LMWLJKY.exe -> Found
    ...and finally, same for these on files/folder tab...

    • [Suspicious.Path][File] StormWatch.lnk -- C:\Users\milkybru\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StormWatch.lnk [LNK@] C:\Users\milkybru\AppData\Local\STORMW~1\STORMW~3.EXE /restart -> Found
    • [Suspicious.Path][File] StormWatchApp.lnk -- C:\Users\milkybru\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StormWatchApp.lnk [LNK@] C:\Users\milkybru\AppData\Local\STORMW~1\STORMW~1.EXE -> Found


    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\Users\milkybru\AppData\Local\Weather_Protector_LLC
    C:\Users\milkybru\AppData\LocalLow\mystarttb
    C:\Users\milkybru\AppData\Local\Temp\HD_Quality_UK_setup.exe
    C:\Program Files (x86)\MyPC Backup
    C:\ProgramData\APN
    C:\ProgramData\EmailNotifier
    C:\Users\milkybru\AppData\Local\StormWatch
    C:\Users\milkybru\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StormWatch
    C:\Users\milkybru\AppData\LocalLow\SimplyTech
    C:\Users\milkybru\AppData\Roaming\VOPackage
    C:\Users\milkybru\Desktop\LiveSupport.lnk 
    C:\Users\milkybru\Desktop\MyPC Backup.lnk 
    C:\Users\milkybru\Desktop\Sync Folder.lnk 
    C:\Windows\System32\ARFC
    C:\Windows\system32\dmwu.exe 
    C:\Program Files (x86)\AskPartnerNetwork
    C:\Windows\System32\drivers\abgpbj.sys
    C:\Program Files (x86)\globalUpdate
    C:\PROGRA~2\SearchProtect
    C:\Program Files (x86)\PCTechHotline
    
    :reg
    [-HKLM\SYSTEM\CurrentControlSet\Services\BackupStack]
    [-HKLM\SOFTWARE\Classes\CLSID\{4AA46D49-459F-4358-B4D1-169048547C23}]
    [-HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}]
    [-HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{4AA46D49-459F-4358-B4D1-169048547C23}]
    [-HKLM\SOFTWARE\Classes\Installer\UpgradeCodes\A97CEC23332751B47BA4B95BAA50C9D0]
    [-HKLM\SOFTWARE\Classes\Interface\{EEE6C358-6118-11DC-9C72-001320C79847}]
    [-HKLM\SOFTWARE\Classes\Interface\{EEE6C359-6118-11DC-9C72-001320C79847}]
    [-HKLM\SOFTWARE\Classes\Interface\{EEE6C35A-6118-11DC-9C72-001320C79847}]
    [-HKLM\SOFTWARE\Classes\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}]
    [-HKLM\SOFTWARE\Classes\speedupmypc]
    [-HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{459DD0F7-0D55-D3DC-67BC-E6BE37E9D762}]
    [-HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{EEE6C359-6118-11DC-9C72-001320C79847}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C5365B7-358F-402d-A440-F1270AEF1175}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{607b689f-7600-45e4-b8e5-887f72dab15c}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{62155D33-3CE2-401E-8967-5A270628A3D5}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A2159D33-3CE2-401B-8967-1B270628A311}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{cfd485f0-96bd-47cd-bb6d-cd7dda95f102}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0D4A4BC-F7CD-436E-B1FA-25637BA0F5BE}]
    [-HKLM\SOFTWARE\Microsoft\Tracing\dmwu_RASAPI32]
    [-HKLM\SOFTWARE\Microsoft\Tracing\dmwu_RASMANCS]
    [-HKLM\SOFTWARE\Microsoft\Tracing\StormWatch_RASAPI32]
    [-HKLM\SOFTWARE\Microsoft\Tracing\StormWatch_RASMANCS]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\MyPC Backup]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\A97CEC23332751B47BA4B95BAA50C9D0]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02F47BF73B948514FAACADD8CBBDF37D]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\080D9F5E1E95FEE4794CE438E635239E]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1E264E0A5959A1C46BA9175A878B12EA]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2E6768B6932D112438F047C54D180635]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\351716A953E21214898904032EAE2E81]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\397C771A7BCAC904697C3EC629ED33ED]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\69D6A6B2ED56AF24EA6335EAD6E91CA4]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7FFA128C2B0FF414D805FC5627883401]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\86EDC790504E1834DBC20C9A04328FD2]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\97C3D0F82E712E241A2F969F45E3351C]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\98CC8BF5A4A6E6C4ABF7051DDAB8B058]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9E7F556BF224D804D96A96F0F6344789]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A189D17A469616C4688D23E192996267]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BF4F885EDEE45644EB1E0C99E0162399]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CE21F3FD57B244142880EF15A165A156]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D15DAF33C220F91468A1D7D57C31ACD7]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D3BA76A44C779424889063D5098ED2D6]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D6D0EB9FDBD90C04D92A7E729058F10D]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E4748F9A4181FCE46A23C13B517B9420]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyPC Backup]
    [-HKLM\SOFTWARE\WNLT]
    [-HKLM\SOFTWARE\Wow6432Node\Conduit]
    [-HKLM\SOFTWARE\Wow6432Node\Email Notifier]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C5365B7-358F-402d-A440-F1270AEF1175}]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{607b689f-7600-45e4-b8e5-887f72dab15c}]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{62155D33-3CE2-401E-8967-5A270628A3D5}]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A2159D33-3CE2-401B-8967-1B270628A311}]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{cfd485f0-96bd-47cd-bb6d-cd7dda95f102}]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0D4A4BC-F7CD-436E-B1FA-25637BA0F5BE}]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\LiveSupport_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\LiveSupport_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\mystarttb_5_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\mystarttb_5_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\OptimizerPro_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\OptimizerPro_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\OptProStart_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\OptProStart_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\PepperZip_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\PepperZip_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegCleanPro_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\RegCleanPro_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\rkinstaller_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\rkinstaller_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\rlvknlg_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\rlvknlg_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\speedupmypc_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\speedupmypc_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\StormUpdater_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\StormUpdater_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\StormWatchApp_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\StormWatchApp_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\TBNotifier_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\TBNotifier_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\vopackage_RASAPI32]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\vopackage_RASMANCS]
    [-HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\MyPC Backup]
    [-HKLM\SOFTWARE\Wow6432Node\{4A0F38A9-FE55-4B89-B73F-E60FDC0F72E9}]
    [-HKLM\SYSTEM\ControlSet001\services\BackupStack]
    [-HKLM\SYSTEM\ControlSet002\services\APNMCP]
    [-HKLM\SYSTEM\ControlSet002\services\BackupStack]
    [-HKLM\SYSTEM\ControlSet002\services\CltMngSvc]
    [-HKLM\SYSTEM\ControlSet002\services\eventlog\Application\FastPlayerUpdaterService]
    [-HKLM\SYSTEM\ControlSet002\services\FastPlayerUpdaterService]
    [-HKLM\SYSTEM\ControlSet002\services\RelevantKnowledge]
    [-HKLM\SYSTEM\CurrentControlSet\services\BackupStack]
    [-HKU\.DEFAULT\Software\ImInstaller]
    [-HKU\.DEFAULT\Software\WNLT]
    [-HKU\S-1-5-18\Software\ImInstaller]
    [-HKU\S-1-5-18\Software\WNLT]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\AppDataLow\Software\mystarttb]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\AppDataLow\{4A0F38A9-FE55-4B89-B73F-E60FDC0F72E9}]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\Conduit]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\LiveSupport]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\Microsoft\Internet Explorer\Main\featurecontrol\FEATURE_BROWSER_EMULATION\StormWatchApp.exe]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\Microsoft\Internet Explorer\MAIN\Start Page]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\StormWatch]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\SimplyTech]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\StormWatch]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\StormWatchApp]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Internet Explorer\MAIN\Start Page]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Internet Explorer\SearchScopes\{F4432998-56AF-4568-B676-A3C57C3E18EA}]
    
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.


    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.




    Reboot the machine and reinstall all the Google components we previously uninstalled.

    Now re run RogueKiller (just a scan) and attach log.
    Same for Hitman.

    Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running!
     
  8. mondola

    mondola Specialist

    Laptop is a lot better, a lot less pop ups now. Two issues still though:

    • It is unable to install some Windows Updates, one of which is Internet Explorer 11
    • There's an annoying program at start up that tries to connect to a server and gets a server busy response

    Logs attached. OTM crashed halfway through the clearing out of directories, so I started it and ran again. Hence why there are two logs.

    Regards,
     

    Attached Files:

  9. mondola

    mondola Specialist

    Last 2 logs
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hitman Pro is still showing garbage...
    RogueKiller still showing proxy...




    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\Windows\System32\ARFC
    C:\Windows\system32\dmwu.exe
    
    :reg
    [-HKLM\SOFTWARE\Classes\CLSID\{4AA46D49-459F-4358-B4D1-169048547C23}]
    [-HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}]
    [-HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{4AA46D49-459F-4358-B4D1-169048547C23}]
    [-HKLM\SOFTWARE\Classes\Interface\{EEE6C358-6118-11DC-9C72-001320C79847}]
    [-HKLM\SOFTWARE\Classes\Interface\{EEE6C359-6118-11DC-9C72-001320C79847}]
    [-HKLM\SOFTWARE\Classes\Interface\{EEE6C35A-6118-11DC-9C72-001320C79847}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C5365B7-358F-402d-A440-F1270AEF1175}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{607b689f-7600-45e4-b8e5-887f72dab15c}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{62155D33-3CE2-401E-8967-5A270628A3D5}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A2159D33-3CE2-401B-8967-1B270628A311}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{cfd485f0-96bd-47cd-bb6d-cd7dda95f102}]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0D4A4BC-F7CD-436E-B1FA-25637BA0F5BE}]
    [-HKLM\SOFTWARE\Microsoft\Tracing\dmwu_RASAPI32]
    [-HKLM\SOFTWARE\Microsoft\Tracing\dmwu_RASMANCS]
    [-HKLM\SOFTWARE\Microsoft\Tracing\StormWatch_RASAPI32]
    [-HKLM\SOFTWARE\Microsoft\Tracing\StormWatch_RASMANCS]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\A97CEC23332751B47BA4B95BAA50C9D0]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02F47BF73B948514FAACADD8CBBDF37D]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\080D9F5E1E95FEE4794CE438E635239E]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1E264E0A5959A1C46BA9175A878B12EA]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2E6768B6932D112438F047C54D180635]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\351716A953E21214898904032EAE2E81]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\397C771A7BCAC904697C3EC629ED33ED]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\69D6A6B2ED56AF24EA6335EAD6E91CA4]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7FFA128C2B0FF414D805FC5627883401]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\86EDC790504E1834DBC20C9A04328FD2]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\97C3D0F82E712E241A2F969F45E3351C]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\98CC8BF5A4A6E6C4ABF7051DDAB8B058]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9E7F556BF224D804D96A96F0F6344789]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A189D17A469616C4688D23E192996267]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BF4F885EDEE45644EB1E0C99E0162399]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CE21F3FD57B244142880EF15A165A156]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D15DAF33C220F91468A1D7D57C31ACD7]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D3BA76A44C779424889063D5098ED2D6]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D6D0EB9FDBD90C04D92A7E729058F10D]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E4748F9A4181FCE46A23C13B517B9420]
    [-HKLM\SOFTWARE\WNLT]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\Microsoft\Internet Explorer\Main\featurecontrol\FEATURE_BROWSER_EMULATION\StormWatchApp.exe]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Internet Explorer\MAIN\Start Page]
    [-HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Internet Explorer\SearchScopes\{F4432998-56AF-4568-B676-A3C57C3E18EA}]
    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
    "ProxyEnable"=dword:00000000
    "ProxyServer"=-
    [HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
    "ProxyEnable"=dword:00000000
    "ProxyServer"=-
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.






    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{4AA46D49-459F-4358-B4D1-169048547C23} -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found
    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Please follow the below instructions:

    Proxy Server - Changing Settings.




    This next part takes a long time to run, so best to go off and do something for a while as it does so....


    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Repair Windows Firewall
      • Remove Policies Set By Infections
      • Repair Winsock & DNS Cache
      • Repair Proxy Settings
      • Repair Windows Updates
      • Set Windows Services To Default Startup
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished.





    • Now rerun Hitman and attach log
    • Same for RogueKiller.
    • Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  11. mondola

    mondola Specialist

    Logs attached. I keep doing the deletes you say, and they seem to go, but then they come back.

    :cry

    When Roguekiller runs, it keeps popping up this website:

    Code:
    http://www.adlice.com/userland-rootkits-part-1-iat-hooks/
    
    New logs attached. Like I say, the clutter still seems to be there, along with the proxy infections.

    :cry
     

    Attached Files:

  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Nothing is being fixed, even with OTM. Got to wonder if Avast isn't getting in the way. This next step is going to require it being disabled at any rate...

    Please download Combofix to your desktop. Please refer to these instructions prior to running. Attach log once done.
     
  13. mondola

    mondola Specialist

    Combo Fix Log attached.
     

    Attached Files:

  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    Driver::
    afuvtscn
    bwdoqcvh
    bxuaisjk
    ceovpket
    djqubptk
    dmjfrzng
    eduofkqe
    etbawoij
    fcualhnl
    hoeicjej
    igainhxl
    ivoicqds
    jevybweu
    jnrvzsif
    jqbjmlcn
    meubnwoe
    ozooysfp
    paonpdis
    pvbdiilo
    qbknnlxl
    qmxmcbyc
    suwmramr
    
    File::
    c:\windows\system32\drivers\afuvtscn.sys
    c:\windows\SYSNATIVE\drivers\afuvtscn.sys
    c:\windows\system32\drivers\bwdoqcvh.sys
    c:\windows\SYSNATIVE\drivers\bwdoqcvh.sys
    c:\windows\system32\drivers\bxuaisjk.sys
    c:\windows\SYSNATIVE\drivers\bxuaisjk.sys
    c:\windows\system32\drivers\ceovpket.sys
    c:\windows\SYSNATIVE\drivers\ceovpket.sys
    c:\windows\system32\drivers\djqubptk.sys
    c:\windows\SYSNATIVE\drivers\dmjfrzng.sys
    c:\windows\system32\drivers\dmjfrzng.sys
    c:\windows\system32\drivers\eduofkqe.sys
    c:\windows\SYSNATIVE\drivers\eduofkqe.sys
    c:\windows\system32\drivers\etbawoij.sys
    c:\windows\SYSNATIVE\drivers\etbawoij.sys
    c:\windows\system32\drivers\fcualhnl.sys
    c:\windows\SYSNATIVE\drivers\fcualhnl.sys
    c:\windows\system32\drivers\hoeicjej.sys
    c:\windows\SYSNATIVE\drivers\hoeicjej.sys
    c:\windows\system32\drivers\igainhxl.sys
    c:\windows\SYSNATIVE\drivers\igainhxl.sys
    c:\windows\system32\drivers\ivoicqds.sys
    c:\windows\SYSNATIVE\drivers\ivoicqds.sys
    c:\windows\system32\drivers\jevybweu.sys
    c:\windows\SYSNATIVE\drivers\jevybweu.sys
    c:\windows\system32\drivers\jnrvzsif.sys
    c:\windows\SYSNATIVE\drivers\jnrvzsif.sys
    c:\windows\system32\drivers\jqbjmlcn.sys
    c:\windows\SYSNATIVE\drivers\jqbjmlcn.sys
    c:\windows\system32\drivers\meubnwoe.sys
    c:\windows\SYSNATIVE\drivers\meubnwoe.sys
    c:\windows\system32\drivers\ozooysfp.sys
    c:\windows\SYSNATIVE\drivers\ozooysfp.sy
    c:\windows\system32\drivers\paonpdis.sys
    c:\windows\SYSNATIVE\drivers\paonpdis.sys
    c:\windows\system32\drivers\pvbdiilo.sys
    c:\windows\SYSNATIVE\drivers\pvbdiilo.sys
    c:\windows\system32\drivers\qbknnlxl.sys
    c:\windows\SYSNATIVE\drivers\qbknnlxl.sys
    c:\windows\system32\drivers\qmxmcbyc.sys
    c:\windows\SYSNATIVE\drivers\qmxmcbyc.sys
    c:\windows\system32\drivers\suwmramr.sys
    c:\windows\SYSNATIVE\drivers\suwmramr.sys
    
    Folder::
    c:\users\milkybru\AppData\Roaming\AnyProtectEx
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      [​IMG]

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.


    Now ensure the machine's been rebooted.

    Run Combofix again like you did the first time and attach new log as well.
     
  15. mondola

    mondola Specialist

    ComboFix Log Files as requested.

    Thanks!
     

    Attached Files:

  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OK. Now I'm sorry about this but can you re run all of the following and attach logs:

    • Malware Bytes
    • Rogue Killer
    • Hitman Pro
    • MGTools
    Also...

    Please download AdwCleaner by Xplode and save to your Desktop.

    • Double click on AdwCleaner.exe to run the tool.
    • Vista/Windows 7/8 users right-click and select Run As Administrator
    • Click on the Scan button.
    • AdwCleaner will begin...be patient as the scan may take some time to complete.
    • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
    • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
    • Attach the logfile to your next next reply.
    • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.
     
  17. mondola

    mondola Specialist

    Logs attached.
     

    Attached Files:

  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi mondola. We may have to do this in stages. I don't know what is keeping that proxy in place, but it might be one of the items Hitman is showing.

    How do you feel about going into the Windows Registry and manually deleting some keys/values? :confused
     
  19. mondola

    mondola Specialist

    Not a problem. Just let me know what to do ( as ever)
     
  20. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Delete these:

    • HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\{07B18EA9-A523-4961-B6BB-170DE4475CCA}
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00A6FAF1-072E-44CF-8957-5838F569A31D}
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA1-A523-4961-B6BB-170DE4475CCA}
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EA9-A523-4961-B6BB-170DE4475CCA}
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EAB-A523-4961-B6BB-170DE4475CCA}
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{3DC201FB-E9C9-499C-A11F-23C360D7C3F8}
    • HKLM\SOFTWARE\Classes\Interface\{EEE6C358-6118-11DC-9C72-001320C79847}
    • HKLM\SOFTWARE\Classes\Interface\{EEE6C359-6118-11DC-9C72-001320C79847}
    • HKLM\SOFTWARE\Classes\Interface\{EEE6C35A-6118-11DC-9C72-001320C79847}
    • HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C5365B7-358F-402d-A440-F1270AEF1175}
    • HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{607b689f-7600-45e4-b8e5-887f72dab15c}
    • HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{62155D33-3CE2-401E-8967-5A270628A3D5}
    • HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A2159D33-3CE2-401B-8967-1B270628A311}
    • HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{cfd485f0-96bd-47cd-bb6d-cd7dda95f102}
    • HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0D4A4BC-F7CD-436E-B1FA-25637BA0F5BE}
    • HKLM\SOFTWARE\Microsoft\Tracing\dmwu_RASAPI32
    • HKLM\SOFTWARE\Microsoft\Tracing\dmwu_RASMANCS
    • HKLM\SOFTWARE\Microsoft\Tracing\StormWatch_RASAPI32
    • HKLM\SOFTWARE\Microsoft\Tracing\StormWatch_RASMANCS
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\A97CEC23332751B47BA4B95BAA50C9D0
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\02F47BF73B948514FAACADD8CBBDF37D
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\080D9F5E1E95FEE4794CE438E635239E
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1E264E0A5959A1C46BA9175A878B12EA
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2E6768B6932D112438F047C54D180635
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\351716A953E21214898904032EAE2E81
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\397C771A7BCAC904697C3EC629ED33ED
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\69D6A6B2ED56AF24EA6335EAD6E91CA4
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7FFA128C2B0FF414D805FC5627883401
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\86EDC790504E1834DBC20C9A04328FD2
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\97C3D0F82E712E241A2F969F45E3351C
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\98CC8BF5A4A6E6C4ABF7051DDAB8B058
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9E7F556BF224D804D96A96F0F6344789
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A189D17A469616C4688D23E192996267
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\BF4F885EDEE45644EB1E0C99E0162399
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CE21F3FD57B244142880EF15A165A156
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D15DAF33C220F91468A1D7D57C31ACD7
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D3BA76A44C779424889063D5098ED2D6
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D6D0EB9FDBD90C04D92A7E729058F10D
    • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E4748F9A4181FCE46A23C13B517B9420
    • HKLM\SOFTWARE\WNLT
    • HKU\S-1-5-21-624153006-676611898-2557710091-1000\Software\Microsoft\Internet Explorer\Main\featurecontrol\FEATURE_BROWSER_EMULATION\StormWatchApp.exe
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\AppDataLow\Software\mystarttb
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\AppDataLow\{4A0F38A9-FE55-4B89-B73F-E60FDC0F72E9}
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Internet Explorer\SearchScopes\{F4432998-56AF-4568-B676-A3C57C3E18EA}
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EEE6C35B-6118-11DC-9C72-001320C79847}
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EEE6C35B-6118-11DC-9C72-001320C79847}
    • HKU\S-1-5-21-624153006-676611898-2557710091-1001\Software\PepperZip

    Delete these directories away too:

    • C:\Windows\System32\ARFC
    • C:\Windows\system32\dmwu.exe


    Now re run Hitman Pro and attach log. Let's see what remains if anything...
     
  21. mondola

    mondola Specialist

    Hello,

    I did the actions, and then there were a few things left (see the first Hitman Pro log).

    I then rebooted, and loads of things came back (see the 2nd Hitman Pro log).

    I was gutted, but I went through again with the actions. There were only a couple of things showing up in Hitman Pro (see attached 3rd log).

    Then I rebooted. Still only a couple of things showing up in Hitman Pro (see 4th log).

    So seems like it finally worked?
     

    Attached Files:

    Last edited: Nov 14, 2014
  22. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Ok, mondola, re run RogueKiller at this point and attach log.
     
  23. mondola

    mondola Specialist

    Log attached.

    Thanks...
     

    Attached Files:

  24. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi mondola. All these entries shown with RogueKiller need to go

    (Reg tab)

    • [PUM.Proxy] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:13081 -> Found

    Do it in normal mode. Then rescan, if they are still there, reboot into safe mode to try and fix those entries, then rescan in normal mode again and see if they re crop up. Let me know.
     
  25. mondola

    mondola Specialist

    They keep coming back, even after safe mode.

    :cry
     

    Attached Files:

  26. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I may have to have a word with Chaslang about this.

    Do this for now:

    Now please download OTL by OldTimer.
    • Save it to your desktop.
    • Double-click on the OTL icon on your desktopto run it. (Note: if using Vista, Win7 or Win8 use right-click and select Run as Administrator)
    • Check the "Scan All Users" checkbox.
    • Check the "Standard Output".
    • Change the setting of "Drivers" and "Services" to "All"
    • Copy the text in the code box below and paste it into the [​IMG] text-field.
      Code:
      activex
      netsvcs
      drives
      
    • Now click the [​IMG] button.
    • One report will be created:
      • OTL.txt <-- Will be opened
    • Attach OTL.txt to your next message. (How to attach)
     
  27. mondola

    mondola Specialist

    2 log files popped up...
     

    Attached Files:

    Last edited: Nov 16, 2014
  28. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi mondola.

    We need to run an OTL Fix

    • Right-click OTL.exe to run it. If Windows UAC prompts you, please allow it.
    • Copy and Paste the following code into the textbox. Do not include the word Code

    Code:
    
    :files
    C:\ProgramData\xgneqrwu.hrx
    
    :otl
    IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 1
    IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = <-loopback>
    IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = http=127.0.0.1:13081
    IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 1
    IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = <-loopback>
    IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = http=127.0.0.1:13081
    IE - HKU\S-1-5-21-624153006-676611898-2557710091-1001\..\SearchScopes\{5a15c091-f3c2-4c8f-8964-e3434a2a4a95}: "URL" = http://search.mywebsearch.com/mywebsearch/GGmain.jhtml?id=ZJxdm348YYgb&ptnrS=ZJxdm348YYgb&si=CNn81MWBzLECFYQKfAod23UA-w&ptb=7917F8D0-E50E-4F32-858F-5D569F5AACBB&ind=2012080313&n=77ede8b9&psa=&st=sb&searchfor={searchTerms}
    IE - HKU\S-1-5-21-624153006-676611898-2557710091-1001\..\SearchScopes\{CFF4DB9B-135F-47c0-9269-B4C6572FD61A}: "URL" = http://mystart.incredibar.com/mb185/?search={searchTerms}&loc=IB_DS&a=6OyUFtAcvd&i=26
     @Alternate Data Stream - 134 bytes -> C:\ProgramData\TEMP:2CB9631F
    @Alternate Data Stream - 133 bytes -> C:\ProgramData\TEMP:FF9C44FE
    @Alternate Data Stream - 119 bytes -> C:\ProgramData\TEMP:5C321E34
    @Alternate Data Stream - 118 bytes -> C:\ProgramData\TEMP:373E1720
    @Alternate Data Stream - 112 bytes -> C:\ProgramData\TEMP:D1B5B4F1
      
    :commands
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    • Then click the Run Fix button at the top.
    • Click Image.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. ATTACH that report in your next reply.



    Now re run RogueKiller and attach log.
     
  29. mondola

    mondola Specialist

    First time didn't appear to work, and no log popped up. Ran it again, log popped up at the end, but Rogue Killer still reports they are there.

    :cry
     

    Attached Files:

  30. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there. I have pointed Chaslang in your direction. Please be patient, I'm sure he will untangle the mystery.
     
  31. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Also please do the below.


    Please download MiniToolBox.exe and save it to your Desktop.
    • Right click MiniToolBox and select " Run as administrator " to run it.
    • Check the following in the list:
      • Reset IE proxy settings.
      • Reset FireFox proxy settings.
    • Click Go.
    • A file name Result.txt will be created in the same location where you downloaded MiniToolBox.exe
    • Please attach the Result.txt log to your next Reply.
    Now reboot your PC. After reboot, run a new scan with RogueKiller and attach the new log.
     
  33. mondola

    mondola Specialist

    Thanks.

    DDS logs attached.

    Regards,
     

    Attached Files:

  34. mondola

    mondola Specialist

    Mini Tool Result.

    :)
     

    Attached Files:

  35. mondola

    mondola Specialist

    New RogueKiller Log.
     

    Attached Files:

  36. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please follow the instructions below in the order written.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files". We are only saving this to your Desktop at this time. We will use it later. Make sure that it shows up on your desktop as a registry patch. Notice the icon.

    Now please uninstall your Avast antivirus program and then reboot your PC info safe boot mode. Keep Avast uninstall until requested to reinstall.





    Once in safe boot mode, click Start, and type regedit into the search box.
    • You should see a regedit.exe and icon appear in the Programs area of the Start Menu.
    • Right click on regedit.exe and select Run As Administrator
    • Then in the Registry Editor menu click File and select Import.
    • Navigate to the fixme.reg file saved to your Desktop and double click it. Allow it to be added to the registry. Please observe whether you receive a success message.
    Now right click on RogueKiller.exe and Select Run As Administrator and run a scan. After it finishes the scan, select the Registry tab and then select any of the below that exist and then click the Delete button.

    Then immediately reboot your PC. But this time reboot into normal boot mode.

    After reboot, run a new scan with RogueKiller and save a log as in original instructions and attach the new log.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).



    Then attach the below logs:
    • the new RogueKiller log
    • C:\MGlogs.zip
     
    Last edited: Nov 22, 2014
  37. mondola

    mondola Specialist

    I get the message:

    • fixme.reg saved with "Save As" set to "All Files".
    • Registry editor run as administrator within Safe Mode

    Didn't continue with anything else, as figured it's best not to unless you determine next steps.

    Regards,
     
  38. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please start the fix over again and recreate the fixme.reg file as I made one small change to it.
    • Make sure that you used notepad to create the fix.
    • Make sure the file is really named fixme.reg and not fixme.reg.txt
    • Make sure that you have no blank lines or any other lines above the Windows Registry Editor Version 5.00
      line
    • Make sure the file contents looks exactly as I posted inside the quote box. The Quote: line is not part of the fix
     
  39. mondola

    mondola Specialist

    Hello

    • Definitely used notepad to create the fix.
    • File is really named fixme.reg and not fixme.reg.txt
    • There are no blank lines or any other lines above the Windows Registry Editor Version 5.00 line. It is included, and there is the one blank line below it
    • The file contents look exactly as you posted inside the quote box. The Quote: line is not part of the fix, and I did not include it
     

    Attached Files:

    • fix.jpg
      fix.jpg
      File size:
      85.4 KB
      Views:
      5
  40. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    See my last instructions which asked you to create the file again. You still have the old one per your post.
     
  41. mondola

    mondola Specialist

    Oops, sorry. I missed that you had changed the file.

    I get the same error message with the new file though. Tried numerous times. Even tried to import it in normal mode and get the same error.

    :(
     
  42. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay just continue on anyway with the next steps of the instructions. The next part was to uninstall Avast.
     
    Last edited: Nov 23, 2014
  43. mondola

    mondola Specialist

    Logs attached. Don't advertise it too loudly, but I think it looks better?

    :confused
     

    Attached Files:

  44. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes, looks good now.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Press and hold the Windows key [​IMG] and then press the letter R on your keyboard. This opens the Run dialog box.
      • Copy and paste the below into the Run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    4. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    5. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    8. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    9. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds