malware logs attached for browser redirect popup ads

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by clemen54, Dec 30, 2014.

  1. clemen54

    clemen54 Private E-2

    Hello,

    Attached are the following logs:
    1) RKreport[1].txt from RogueKiller
    2) Malwarebytes' Anti-Malware log
    3) TDSSKiller log
    4) HitmanPro log
    5) GooredFix

    I ran MGtools, but there doesn't appear to be MGlogs.zip in C [only MGlogsR.zip in the MGtools folder]. This is for Windows 7 64-bit.

    Apologies for mbam file (the scan showed no threats, but the log was saved in XML format for some reason so this file is cut and paste from the original information). Also ran GooredFix (log attached) and MBR Check (this one said no threats).

    The issues: I started to have problems on Chrome -- redirecting to ad pages, etc. Noticed that Chrome had following strange extensions:
    Domain to IP 114 Permissions Details Enable
    FREE MP3 Search 189 Permissions Details Enable
    GNotes Extension 239 Permissions Details Enable

    Was able to disable then removed them, and Chrome seems to be okay for now.

    Then when I used IE to get the malware removal instructions from Majorgeeks started to have major issues there as well (Hotdeals tabs appear on side of browser for Walmart, etc; right-clicking link seems to take it to different page; when click links on Majorgeeks site for downloading malware removal tools, background would turn white instead of the majorgeeks website colors; pages would take long time to load and download links would go to webpages for mcafee or adobe flash update, etc).

    Noticed these strange extensions on IE "TicTaaCOupon" and "ClickForSale" but cannot remove them (no disable button - please see details below).

    Many thanks in advance!

    In C> Program Data there are strange folders for "TicTaaCOupon" / "ClickaForSale"/ "CliCKForSALee."

    From IE Managing Tools/ Extensions tab:
    Name: TicTaaCOupon
    Publisher: Not Available
    Type: Browser Helper Object
    Architecture: 32-bit and 64-bit
    Version: 1.8.0.0
    File date: ?Today, ?December ?30, ?2014, ??27 minutes ago
    Date last accessed: ?Today, ?December ?30, ?2014, ??3 minutes ago
    Class ID: {C4C1C345-E066-447D-80D4-98E3142BC748}
    Use count: 24
    Block count: 0
    File: VbZ7SBNLYSFX7F.x64.dll
    Folder: C:\ProgramData\TicTaaCOupon

    Name: ClickaForSale
    Publisher: Not Available
    Type: Browser Helper Object
    Architecture: 32-bit and 64-bit
    Version: 1.8.0.0
    File date: ?Today, ?December ?30, ?2014, ??33 minutes ago
    Date last accessed: ?Today, ?December ?30, ?2014, ??4 minutes ago
    Class ID: {F807C018-5EE3-47FC-8681-D15362821110}
    Use count: 32
    Block count: 0
    File: rjR5oyBehIM8sg.x64.dll
    Folder: C:\ProgramData\ClickaForSale
     

    Attached Files:

  2. clemen54

    clemen54 Private E-2

    MGtools log Re: malware logs attached for browser redirect popup ads

    PS: The Mgtools said that "the zip file was created in C:/Mgtools/MGlogsR.zip"
    Hopefully this is the correct Mgtools log.

    The MBRCheck log is also attached.

    Thank you!
     

    Attached Files:

  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there. :)

    I presume you're not deliberately set up to use a proxy?
     
  4. clemen54

    clemen54 Private E-2

    Thank you for your reply!

    That's correct. I'm not deliberately set up to use a proxy. :(

    When I tried Firefox, I noticed that it kept closing on its own, so I checked the Extensions/Add-ons on it as well and saw that it had strange new Extensions like on Chrome and IE. I disabled and removed them.["BaetttueorPpriCeChecc 2.3"; "BettterPriceCheac 2.3"; "FlashCoouppon 1.6" "KinnGCoupon 1.3"; "savEItkeEp.15."] However, I did notice that on Chrome that a new strange Extension appeared ["Favicon Changer"] even though I'd disabled and removed strange Extensions from it yesterday.

    I also noticed the following strange programs under the "Programs" section in the Control Panel: "DisscountLocator," "SaalesMagnet," and "TicTaaCOupon."

    Thank you!
     
  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Uninstall this, it shows: TicTaaCOupon

    Delete these:
    • C:\ProgramData\6614833735ace9b
    • C:\ProgramData\ClickaForSale
    • C:\ProgramData\CliCKForSALee
    • C:\ProgramData\TicTaaCOupon
    • C:\Program Files (x86)\Optimizer Pro


    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\70e6ca8c ("C:\Windows\system32\rundll32.exe" "c:\progra~2\optimi~1\OptProCrashSvc.dll",ServiceMain) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\70e6ca8c ("C:\Windows\system32\rundll32.exe" "c:\progra~2\optimi~1\OptProCrashSvc.dll",ServiceMain) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\70e6ca8c ("C:\Windows\system32\rundll32.exe" "c:\progra~2\optimi~1\OptProCrashSvc.dll",ServiceMain) -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:49478;https=127.0.0.1:49478 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:49478;https=127.0.0.1:49478 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:49478;https=127.0.0.1:49478 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:49478;https=127.0.0.1:49478 -> Found

    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.


    • Re run Hitman Pro and have it remove all that it finds...
    • Re run Malware Bytes and attach a proper log from it please.
    • Re run a scan only with RogueKiller and attach log.

    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.



    Please download AdwCleaner by Xplode and save to your Desktop.

    • Double click on AdwCleaner.exe to run the tool.
    • Vista/Windows 7/8 users right-click and select Run As Administrator
    • Click on the Scan button.
    • AdwCleaner will begin...be patient as the scan may take some time to complete.
    • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
    • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
    • Attach the logfile to your next next reply.
    • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.


    Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  6. clemen54

    clemen54 Private E-2

    Thank you so much for your reply. I really appreciate all your help. :)

    Attached are the requested logs. The MalwareBytes log is in a separate reply.

    I uninstalled "TicTaaCOupon" from Control Panel > Programs. There still seem to be 2 other strange programs: "DisscountLocator" and "SaalesMagnet." Do these need to be uninstalled as well? [Also, not sure if this is related, but two "desktop.ini" files suddenly appeared on the desktop today. One dated Nov 25, 2014 and another dated July 13, 2009.]

    The MalwareBytes log will be attached in a separate reply.

    Thank you again for your help!
     

    Attached Files:

  7. clemen54

    clemen54 Private E-2

    MalwareBytes log.
     

    Attached Files:

  8. clemen54

    clemen54 Private E-2

    Apologies for the multiple posts! :-o

    Forgot to add earlier: One of the strange Extensions on IE is gone now. But IE still shows 2 remaining strange Extensions: "SaalesMagnet" and "ClickaForSale," which can't seem to be disabled and/or removed within IE.

    Thank you!
     
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  10. clemen54

    clemen54 Private E-2

    I reset Internet Explorer 11 to defaults, but the strange Extensions are still appearing under the Add-on list with no way to disable/remove them. :cry
    The details information from IE from the Manage Add-ons are below.

    I forgot to mention in my original post that just before the browsers started to act up there had been a couple of "Blue Screen" incidents - the Blue screen suddenly appeared and then restarted/rebooted the laptop.

    I also tried uninstalling "DisscountLocator" and "SaalesMagnet" that are still appearing under Programs (under Control Panel), but it said that "An error occurred while trying to uninstall SaalesMagnet/ DisscountLocator. It may have already been uninstalled. Would you like to remove from the Programs list?" I didn't remove them because I thought I should ask first.

    Thank you! Happy New Year! :)

    Name: SaalesMagnet
    Publisher: Not Available
    Type: Browser Helper Object
    Architecture: 32-bit and 64-bit
    Version: Not available
    File date: Not available
    Date last accessed: ‎Today, ‎January ‎01, ‎2015, ‏‎1 minute ago
    Class ID: {BDA3845E-328E-447C-93E5-655EFDEB63C5}
    Use count: 5
    Block count: 0
    File: Ii22YG9Akru5uZ.x64.dll
    Folder: C:\ProgramData\SaalesMagnet


    Name: ClickaForSale
    Publisher: Not Available
    Type: Browser Helper Object
    Architecture: 32-bit and 64-bit
    Version: Not available
    File date: Not available
    Date last accessed: ‎Today, ‎January ‎01, ‎2015, ‏‎4 minutes ago
    Class ID: {F807C018-5EE3-47FC-8681-D15362821110}
    Use count: 5
    Block count: 0
    File: rjR5oyBehIM8sg.x64.dll
    Folder: C:\ProgramData\ClickaForSale
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\ProgramData\ClickaForSale
    C:\ProgramData\SaalesMagnet
    
    :reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3119AFD3-545C-0955-573A-494F62E61990}]
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.


    Now are they gone?
     
    Last edited by a moderator: Jan 2, 2015
  12. clemen54

    clemen54 Private E-2

    Thank you for your reply. I really appreciate your help with all this. Attached is the OTM log.

    "SaalesMagnet" no longer appears under Programs in the Control Panel. :)
    However, "DisscountLocator" is still there. :cry
    Also, under Internet Explorer "SaalesMagnet" "ClickaForSale" still appear in the Add-ons/Extensions list as "Enabled." :cry
    Would they still show up if one tries to re-install IE?

    Name: SaalesMagnet
    Publisher: Not Available
    Type: Browser Helper Object
    Architecture: 32-bit and 64-bit
    Version: Not available
    File date: Not available
    Date last accessed: ‎Today, ‎January ‎02, ‎2015, ‏‎6 minutes ago
    Class ID: {BDA3845E-328E-447C-93E5-655EFDEB63C5}
    Use count: 14
    Block count: 0
    File: Ii22YG9Akru5uZ.x64.dll
    Folder: C:\ProgramData\SaalesMagnet

    Name: ClickaForSale
    Publisher: Not Available
    Type: Browser Helper Object
    Architecture: 32-bit and 64-bit
    Version: Not available
    File date: Not available
    Date last accessed: ‎Today, ‎January ‎02, ‎2015, ‏‎7 minutes ago
    Class ID: {F807C018-5EE3-47FC-8681-D15362821110}
    Use count: 14
    Block count: 0
    File: rjR5oyBehIM8sg.x64.dll
    Folder: C:\ProgramData\ClickaForSale
     

    Attached Files:

  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Try and uninstall any remaining nonsense with Revo Uninstaller. Hopefully it shows up in there.
     
  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Also do this:

    SystemLook

    Please download SystemLook from one of the links below appropriate for your operating system and save it to your Desktop.
    Download 32 Bit
    Download 64 Bit

    • Double-click SystemLook.exe to run it.
    • Copy the content of the following codebox into the main textfield:
      Code:
      :regfind
      SaalesMagnet
      ClickaForSale
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
    Note: The log can also be found on your Desktop entitled SystemLook.txt
     
  15. clemen54

    clemen54 Private E-2

    Attached is the log for SystemLook.

    I used Revo Uninstaller to look for "DisscountLocator" using the "advanced" mode.
    At first it stated: "Running the application's uninstaller failed! Possible invalid command!"
    But then it continued and found ~12 items and I hit the "delete" all button. Then the following message appeared: "Revo Unistaller completed the uninstall procedure successfully!"
    "DisscountLocator" no longer appers under Programs in the Control Panel! :-D
    Does this mean that it's finally been deleted once and for all?

    Thank you!
     

    Attached Files:

  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\ProgramData\SaalesMagnet\Ii22YG9Akru5uZ.x64.dll
    C:\ProgramData\SaalesMagnet\Ii22YG9Akru5uZ.dll
    C:\ProgramData\ClickaForSale\rjR5oyBehIM8sg.x64.dll
    C:\ProgramData\ClickaForSale\rjR5oyBehIM8sg.dll
    
    :reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\..9]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{bda3845e-328e-447c-93e5-655efdeb63c5}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{bda3845e-328e-447c-93e5-655efdeb63c5}\InprocServer32]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{bda3845e-328e-447c-93e5-655efdeb63c5}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{bda3845e-328e-447c-93e5-655efdeb63c5}\InprocServer32]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bda3845e-328e-447c-93e5-655efdeb63c5}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{bda3845e-328e-447c-93e5-655efdeb63c5}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{bda3845e-328e-447c-93e5-655efdeb63c5}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{bda3845e-328e-447c-93e5-655efdeb63c5}\InprocServer32]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f807c018-5ee3-47fc-8681-d15362821110}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f807c018-5ee3-47fc-8681-d15362821110}\InprocServer32]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f807c018-5ee3-47fc-8681-d15362821110}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f807c018-5ee3-47fc-8681-d15362821110}\InprocServer32]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f807c018-5ee3-47fc-8681-d15362821110}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{f807c018-5ee3-47fc-8681-d15362821110}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{f807c018-5ee3-47fc-8681-d15362821110}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{f807c018-5ee3-47fc-8681-d15362821110}\InprocServer32]
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.


    How are things running now? :)
     
  17. clemen54

    clemen54 Private E-2

    Attached is the OTM log.

    I tried surfing to a couple of news sites on Internet Explorer and it appears to be okay (no strange re-directing or ads). But "SaalesMagnet" "ClickaForSale" still appear in the Internet Explorer Add-ons/Extensions list as being "Enabled." :cry

    Name: SaalesMagnet
    Publisher: Not Available
    Type: Browser Helper Object
    Architecture: 64-bit
    Version: Not available
    File date: Not available
    Date last accessed: ‎Yesterday, ‎January ‎02, ‎2015, ‏‎2:57 PM
    Class ID: {BDA3845E-328E-447C-93E5-655EFDEB63C5}
    Use count: 16
    Block count: 0
    File: Ii22YG9Akru5uZ.x64.dll
    Folder: C:\ProgramData\SaalesMagnet


    Name: ClickaForSale
    Publisher: Not Available
    Type: Browser Helper Object
    Architecture: 64-bit
    Version: Not available
    File date: Not available
    Date last accessed: ‎Yesterday, ‎January ‎02, ‎2015, ‏‎2:57 PM
    Class ID: {F807C018-5EE3-47FC-8681-D15362821110}
    Use count: 16
    Block count: 0
    File: rjR5oyBehIM8sg.x64.dll
    Folder: C:\ProgramData\ClickaForSale
     

    Attached Files:

  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Consulting with colleagues hang in there. I won't be able to post back until later on tomorrow as I need to go out somewhere for a few hours.
     
  19. clemen54

    clemen54 Private E-2

    Thank you for letting me know and keeping me posted. :)
    I really appreciate the update!
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I want to double check a few scans to see what really was cleaned up and what was not.

    Please rerun the same SystemLook scan that Kestrel13! had you run previously and attach the new log.

    Also run another scan with AdwCleaner just like you did previously ( just a scan ) and attach this new log too.

    Also please run the below new scan.

    Please download OTL by OldTimer.
    • Save it to your desktop.
    • Double-click on the OTL icon on your desktopto run it. (Note: if using Vista, Win7 or Win8 use right-click and select Run as Administrator)
    • Check the "Scan All Users" checkbox.
    • Check the "Standard Output".
    • Change the setting of "Drivers" and "Services" to "All"
    • Copy the text in the code box below and paste it into the [​IMG] text-field.
      Code:
      activex
      netsvcs
      drives
      
    • Now click the [​IMG] button.
    • One report will be created:
      • OTL.txt <-- Will be opened
    • Attach OTL.txt to your next message. (How to attach)
     
  21. clemen54

    clemen54 Private E-2

    Hello Chaslang,

    Thank you for looking into this. Any help is much appreciated.

    Attached are the requested files. The OTL log was too big to upload, so it's in the zip file "OTL."
    It looks like OTL also produced a 2nd log (?) named "Extras" so I'm attaching that as well, just in case.

    Thank you so much! :)
     

    Attached Files:

  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.


    Now shut down your protection software (antivirus, antispyware...etc) to avoid possible conflicts.
    • Double-click OTL.exe to run. (Note: if using Vista, Win7 or Win8 use right-click and select Run as Administrator)
    • Copy the text in the code box below and paste it into the [​IMG] text-field.
    Code:
    :OTL
    IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 1
    IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = <-loopback>
    IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = http=127.0.0.1:49478;https=127.0.0.1:49478
    IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 1
    IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = <-loopback>
    IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = http=127.0.0.1:49478;https=127.0.0.1:49478
    O2:[b]64bit:[/b] - BHO: (SaalesMagnet) - {bda3845e-328e-447c-93e5-655efdeb63c5} - C:\ProgramData\SaalesMagnet\Ii22YG9Akru5uZ.x64.dll File not found
    O2:[b]64bit:[/b] - BHO: (ClickaForSale) - {f807c018-5ee3-47fc-8681-d15362821110} - C:\ProgramData\ClickaForSale\rjR5oyBehIM8sg.x64.dll File not found
    O3:[b]64bit:[/b] - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found.
    O3 - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found.
    [2014/12/31 14:24:17 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\TicTaaCOupon
    
    :Files
    C:\ProgramData\SaalesMagnet
    C:\ProgramData\ClickaForSale
    C:\Program Files (x86)\TicTaaCOupon
    C:\Windows\TEMP\*.*
    C:\Users\m\AppData\Local\Temp\*.*
    
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3119AFD3-545C-0955-573A-494F62E61990}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{c4c1c345-e066-447d-80d4-98e3142bc748}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{c4c1c345-e066-447d-80d4-98e3142bc748}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\AVG Secure Search]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\AVG Security Toolbar]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c4c1c345-e066-447d-80d4-98e3142bc748}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\GlobalUpdate]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{c4c1c345-e066-447d-80d4-98e3142bc748}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c4c1c345-e066-447d-80d4-98e3142bc748}]
    
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=""
    
    [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{bda3845e-328e-447c-93e5-655efdeb63c5}\InprocServer32]
    @=-
    [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{bda3845e-328e-447c-93e5-655efdeb63c5}]
    @=-
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bda3845e-328e-447c-93e5-655efdeb63c5}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{bda3845e-328e-447c-93e5-655efdeb63c5}]
    
    [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f807c018-5ee3-47fc-8681-d15362821110}\InprocServer32]
    @=-
    [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f807c018-5ee3-47fc-8681-d15362821110}]
    @=-
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f807c018-5ee3-47fc-8681-d15362821110}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f807c018-5ee3-47fc-8681-d15362821110}]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
    "{27CE42EA-6ED5-4F98-B119-2D5F5977B043}"=-
    "{495F55A9-B63C-4B39-9F3B-089EB1317823}"=-
    "{8A7C6062-39C4-42F3-9E97-CFB7364DB937}"=-
    "{CF834C80-2D1C-4182-8E8F-8D3085B7BADE}"=-
    :Commands
    [PURITY]
    [EMPTYTEMP] 
    [EMPTYFLASH]
    [REBOOT]
    • Now click the [​IMG] button.
    • If the fix needed a reboot please do it.
    • Click the OK button (upon reboot).
    • When OTL is finished, Notepad will open. Close Notepad.
    • A log file will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.
    • Attach this log to your next message. (See: How to attach)

    Now rerun the SystemLook and AdwCleaner scans to get new logs to attach.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the log from OTL
    • the log from AdwCleaner
    • the log from SystemLook
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  23. clemen54

    clemen54 Private E-2

    Attached are the requested logs.

    Wow! The strange "SaalesMagnet" and "ClickaForSale" Extensions no longer appear in the IE add-ons list. :-D
    i just did some random surfing to a few sites on Internet Explorer and it seems to be okay with no strange re-directing.

    Thank you so much!
    Does this mean that everything is finally clear?
     

    Attached Files:

  24. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    The logs look great. Chas has done a top notch job as always. :) You can re run Adwcleaner and have it remove what it finds. Ready for final steps?
     
  25. clemen54

    clemen54 Private E-2

    You're both great! ;)

    Thank you so much. I really appreciate all your help (and Chaslang, too)! :-D

    I'll be sure re-run AdAware again and remove whatever's left.

    Please let me know what the final steps are.
     
  26. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:

    • Please double-click OTL.exe to run it.
    • Click on the CleanUp! button at upper Right corner. When you do this a text file named cleanup.txt will be downloaded from the internet. If you get a warning from your firewall or other security programs regarding OTL attempting to contact the internet you should allow it to do so. After the list has been download you'll be asked if you want to Begin cleanup process? Select Yes.
    • This step removes the files, folders, and shortcuts created by the tools I had you download and run.


    You can also delete JRT and Adwcleaner once done, and any files/folders they generated.
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    FYI to Kestrel13! You cannot add those instructions to run OTL at the end. It will already be gone after running MGclean.bat. This is the purpose of MGclean.bat and why we have been using it for years. ;)
     
  28. clemen54

    clemen54 Private E-2

    Can't say it enough, but just wanted to say thank you again (and Chaslang also)! ;)
     
  29. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    No problem, you are most welcome. Thanks Chas. ;)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds