Malware Affecting Internet Connectivity

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by crazy_lazy_bear, Sep 15, 2015.

  1. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    Hello,

    This is for a friend. He had no internet connectivity. I ran all the diagnostics suggested by Major Geeks. After removing threats, Malwarebytes said it needed to repair network connectivity and to run a second scan. I did. It came back clean. Attached are all logs (minus the second Malwarebytes log due to a max of 5 file uploads). Please let me know if you need more info. Thank you.

    Jay
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Just reviewing those logs, will be back with a fix soon. :)
     
  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    FindingDiscount <<< Unistall this. If you cannot find it to uninstall just continue on with instructions ;)

    Re run Hitman Pro and have it fix the item on the REPAIRS tab.


    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [PUP] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | VideoDownloadConverter Search Scope Monitor : "C:\PROGRA~2\VIDEOD~2\bar\1.bin\4zsrchmn.exe" /m=2 /w /h -> Found
    • [PUP] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | Defender Pro : C:\Program Files (x86)\Defender Pro\DefenderPro.exe [x] -> Found
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-2263876187-3912078216-3253532516-1001\Software\Microsoft\Windows\CurrentVersion\Run | BingSvc : C:\Users\Patricia\AppData\Local\Microsoft\BingSvc\BingSvc.exe [7] -> Found
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-2263876187-3912078216-3253532516-1001\Software\Microsoft\Windows\CurrentVersion\Run | BingSvc : C:\Users\Patricia\AppData\Local\Microsoft\BingSvc\BingSvc.exe [7] -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\cherimoya (system32\drivers\cherimoya.sys) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CoupoonService64 (C:\Program Files (x86)\coupoon\iiwjljrnpc64.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\FindingDiscount (C:\Program Files (x86)\Windows Discount\FindingDiscount\FindingDiscount.exe -service) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\globalUpdate (C:\Program Files (x86)\globalUpdate\Update\globalupdate.exe /svc) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\globalUpdatem (C:\Program Files (x86)\globalUpdate\Update\globalupdate.exe /medsvc) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RuntimeManager (C:\Program Files (x86)\Windows NT\Accessories\RuntimeManager\runtimemanager.exe -service) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TelevisionFanaticService (C:\PROGRA~2\TELEVI~2\bar\3.bin\64barsvc.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\UpdateCheck (C:\Program Files (x86)\Coupoon\UpdateCheck.exe run ) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\vicoqudu (C:\Users\Patricia\AppData\Roaming\31444335-1436879434-4330-535A-101F74BADB22\hnstFFB4.tmp) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VideoDownloadConverter_4zService (C:\PROGRA~2\VIDEOD~2\bar\1.bin\4zbarsvc.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\zejytose (C:\Users\Patricia\AppData\Roaming\31444335-1436879434-4330-535A-101F74BADB22\jnsyE7BF.tmp) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\cherimoya (system32\drivers\cherimoya.sys) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\CoupoonService64 (C:\Program Files (x86)\coupoon\iiwjljrnpc64.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\FindingDiscount (C:\Program Files (x86)\Windows Discount\FindingDiscount\FindingDiscount.exe -service) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\globalUpdate (C:\Program Files (x86)\globalUpdate\Update\globalupdate.exe /svc) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\globalUpdatem (C:\Program Files (x86)\globalUpdate\Update\globalupdate.exe /medsvc) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\RuntimeManager (C:\Program Files (x86)\Windows NT\Accessories\RuntimeManager\runtimemanager.exe -service) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\TelevisionFanaticService (C:\PROGRA~2\TELEVI~2\bar\3.bin\64barsvc.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\UpdateCheck (C:\Program Files (x86)\Coupoon\UpdateCheck.exe run ) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\vicoqudu (C:\Users\Patricia\AppData\Roaming\31444335-1436879434-4330-535A-101F74BADB22\hnstFFB4.tmp) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\VideoDownloadConverter_4zService (C:\PROGRA~2\VIDEOD~2\bar\1.bin\4zbarsvc.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\zejytose (C:\Users\Patricia\AppData\Roaming\31444335-1436879434-4330-535A-101F74BADB22\jnsyE7BF.tmp) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\AntivirusAgentSvc (C:\Program Files (x86)\Defender Pro\AntivirusAgent.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\AntivirusUpdateSvc (C:\Program Files (x86)\Defender Pro\AntivirusUpdater.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\AntivirusWatcher (C:\Program Files (x86)\Defender Pro\AntivirusWatcher.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\cherimoya (system32\drivers\cherimoya.sys) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\CoupoonService64 (C:\Program Files (x86)\coupoon\iiwjljrnpc64.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\FindingDiscount (C:\Program Files (x86)\Windows Discount\FindingDiscount\FindingDiscount.exe -service) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\globalUpdate (C:\Program Files (x86)\globalUpdate\Update\globalupdate.exe /svc) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\globalUpdatem (C:\Program Files (x86)\globalUpdate\Update\globalupdate.exe /medsvc) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\RuntimeManager (C:\Program Files (x86)\Windows NT\Accessories\RuntimeManager\runtimemanager.exe -service) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\TelevisionFanaticService (C:\PROGRA~2\TELEVI~2\bar\3.bin\64barsvc.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\UpdateCheck (C:\Program Files (x86)\Coupoon\UpdateCheck.exe run ) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\vicoqudu (C:\Users\Patricia\AppData\Roaming\31444335-1436879434-4330-535A-101F74BADB22\hnstFFB4.tmp) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\VideoDownloadConverter_4zService (C:\PROGRA~2\VIDEOD~2\bar\1.bin\4zbarsvc.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\zejytose (C:\Users\Patricia\AppData\Roaming\31444335-1436879434-4330-535A-101F74BADB22\jnsyE7BF.tmp) -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyEnable : 1 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:47574 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:47574 -> Found
    • [PUM.Proxy] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:47574 -> Found
    • [PUM.Proxy] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings | ProxyServer : http=127.0.0.1:47574 -> Found

    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.

    ...and the same for these items on the TASKS tab please.... (basically everything in the tasks tab needs to go)

    • [Suspicious.Path] %WINDIR%\Tasks\0urzP3Ee58J.job -- C:\Users\Patricia\AppData\Roaming\0urzP3Ee58J.exe (--c=RX4/2sF/WD9wJZFlXYBTM99wCU1IfxiH/rDgR4UW7D6QHZ8FdWUORlLVhRGt0jHf4wUnatTOF99+AqMtLl4m+nE0OjRYrEDf074fuVmsD2ThtVK7+MGamF3XEaAboaJDdI6emDXfIpZ4fclCU0irNzgGlTCWyAw4lP3srSmIy80CfDKEsUH572hdmD00NVPmluO9l4QJSd9jc0wXHi2Sn9Il/bDkoWj+50t7GTIGd5lGasyInDG7eMrrR83QSRpITFSUjcaz6/YgVscI7GE4DktSUH376Ub87xVELc6kC4wahCwV/tkfuMnf6hD3RwU3OZBWF/2x2nd+PfQ+ePJX4A==) -> Found
    • [Suspicious.Path] %WINDIR%\Tasks\4NZZudxvVUiTlz.job -- C:\Users\Patricia\AppData\Roaming\4NZZudxvVUiTlz.exe (--c=XXbE8UmaUGwfm6tCg7T6ihXO3bACl4Ue9gp2QDLhgfB8X2+qtcUbZI0QtLYRiuN/fnJTD0Ocoyxuvt+Y5R5kaafXrbhKPkGfOHzT6qAmUl99wg7JV6vZ7D3rOCwZIwSJVsBal3uxp2DvfuuUNweKPfndUQIf02hsfB+P1OX4h0u47mNymVyAgnCw3flWgXhZmEeF19R4i5DACw4pAMcOi7ObPWRNSsNqgVjbL098ZucMYKys2gULZPJFehzOtYcVfiuShKlso5nu8oJ+XT6nZjK3zPYZ2REfptbSWqx3jMjgHfeXE4ZynEuoxGMciyu5D9UmCS7lI3ZiC6e9+1Leew==) -> Found
    • [Suspicious.Path] %WINDIR%\Tasks\cvC5s7GfRTkCKx7Noj1gBdeDP9.job -- C:\Users\Patricia\AppData\Roaming\cvC5s7GfRTkCKx7Noj1gBdeDP9.exe (--c=AysMub0s+gnK9goQw2SfTbUYEm6Bnb2ezBQ6ibnK2D3ZhOMafZ23XTJrqgFb0WG400lONGLBgqeh4NfVmkCEnJliAf8WXPkFyhM8Sydan9iE8A2pD0g+9yOFbPq8/DyxYn8Cb3DSNT55YbjWM+XZPIwljmEl5X9Ro4HHmXW4wVyWEFzFqJpmAzv2M9jYBMudne0aGxiKrNUTcOVKT6xSmNbOMuL4QwVs0wGA4svhFhkzQCOrV+9MemL0W3diZGOboENKCnP3kAqWD2iQt10M0t2Ql+0oERk84mnuTalS91j+tnwtL3fKP4KEpNKe9HxqximLYVPX8Dhw2G5rv+6w3A==) -> Found
    • [PUP] %WINDIR%\Tasks\globalUpdateUpdateTaskMachineCore.job -- C:\Program Files (x86)\globalUpdate\Update\globalupdate.exe (/c) -> Found
    • [PUP] %WINDIR%\Tasks\globalUpdateUpdateTaskMachineUA.job -- C:\Program Files (x86)\globalUpdate\Update\globalupdate.exe (/ua /installsource scheduler) -> Found
    • [Suspicious.Path] %WINDIR%\Tasks\KQCHYMORFPAYVSBU.job -- C:\ProgramData\Service1291\Service1291.exe -> Found
    • [Suspicious.Path] %WINDIR%\Tasks\ocxOOz1i88ys79ZreK.job -- C:\Users\Patricia\AppData\Roaming\ocxOOz1i88ys79ZreK.exe (--c=cvhUgDyLN9vEI0NAmC3yz8Q5tTjUus6Tn5Gf6Dijzb9wpemQkv1wqeXrUaq4WFCKqokYsNTxo1V2aYIE4gJw4Z8IHf99Z1fshvxdi7a6uAwc16Q2KoYe7gkcx4LNmCP+4XwdHirz+ZIw1LTySLLqW5xQ8Bv5J7XYaIMlhEadLmY2XEydDCPWI2uxwCgquxU2pjtaua7JpJz1pfczrqUk4C/U3lxs4GSxlc3Imtxwn9bvZm9RJg3NWjmiIjy1o2BK7G4zj6BVPM6dbci/C1I3aAgfP0BD23Fi//pSnIDPnXlspTDlxKB1JvEu+TlMmrIH39gYWmp1jLeS6TzBOwLz2Q==) -> Found
    • [PUP] %WINDIR%\Tasks\TDKVXKLRK1.job -- C:\ProgramData\FlashBeat\FlashBeat.exe -> Found
    • [Suspicious.Path] %WINDIR%\Tasks\YHuqvd82AtIO4oI2.job -- C:\Users\Patricia\AppData\Roaming\YHuqvd82AtIO4oI2.exe (--c=gEgm4VindzbmeKmAFPhEymmF3ijGd8fIQDyRergoImhFzRxq8MXNC6yeQN++3Ld5WpZahTfAnxkVyegtzTlG/2hqOOsZrC1XP1zEHBleWo+EQ1ZSOyiJb6cr59LxBr95qAL3ua3wYKlfDaAdLDSpMhSinczsUMwa9oziJ2W9CH1mf0Rcqx5ka8yO37d0bKc8WskRFZrX6WADiMTjwZci17OGQIZD+irupDxr2biT0yylypaozCsvg4LVoaH1BqLgi9CbKbYlFAccmO/iuNDOj1T8RkrS9abqR6xe9qBqRmcNZ1da+HW0QSk1wvjUpMf9gaOM3sy6kIbooq8KM659hg==) -> Found
    • [Suspicious.Path] \0urzP3Ee58J -- C:\Users\Patricia\AppData\Roaming\0urzP3Ee58J.exe (--c=RX4/2sF/WD9wJZFlXYBTM99wCU1IfxiH/rDgR4UW7D6QHZ8FdWUORlLVhRGt0jHf4wUnatTOF99+AqMtLl4m+nE0OjRYrEDf074fuVmsD2ThtVK7+MGamF3XEaAboaJDdI6emDXfIpZ4fclCU0irNzgGlTCWyAw4lP3srSmIy80CfDKEsUH572hdmD00NVPmluO9l4QJSd9jc0wXHi2Sn9Il/bDkoWj+50t7GTIGd5lGasyInDG7eMrrR83QSRpITFSUjcaz6/YgVscI7GE4DktSUH376Ub87xVELc6kC4wahCwV/tkfuMnf6hD3RwU3OZBWF/2x2nd+PfQ+ePJX4A==) -> Found
    • [Suspicious.Path] \4NZZudxvVUiTlz -- C:\Users\Patricia\AppData\Roaming\4NZZudxvVUiTlz.exe (--c=XXbE8UmaUGwfm6tCg7T6ihXO3bACl4Ue9gp2QDLhgfB8X2+qtcUbZI0QtLYRiuN/fnJTD0Ocoyxuvt+Y5R5kaafXrbhKPkGfOHzT6qAmUl99wg7JV6vZ7D3rOCwZIwSJVsBal3uxp2DvfuuUNweKPfndUQIf02hsfB+P1OX4h0u47mNymVyAgnCw3flWgXhZmEeF19R4i5DACw4pAMcOi7ObPWRNSsNqgVjbL098ZucMYKys2gULZPJFehzOtYcVfiuShKlso5nu8oJ+XT6nZjK3zPYZ2REfptbSWqx3jMjgHfeXE4ZynEuoxGMciyu5D9UmCS7lI3ZiC6e9+1Leew==) -> Found
    • [Suspicious.Path] \7A2621B8-295F-4735-BCC2-9AD06FCA7EBA -- C:\Users\Patricia\AppData\Local\7A2621B8-295F-4735-BCC2-9AD06FCA7EBA\7A2621B8-295F-4735-BCC2-9AD06FCA7EBA.exe (/asru /reinstalltask) -> Found
    • [Suspicious.Path] \cvC5s7GfRTkCKx7Noj1gBdeDP9 -- C:\Users\Patricia\AppData\Roaming\cvC5s7GfRTkCKx7Noj1gBdeDP9.exe (--c=AysMub0s+gnK9goQw2SfTbUYEm6Bnb2ezBQ6ibnK2D3ZhOMafZ23XTJrqgFb0WG400lONGLBgqeh4NfVmkCEnJliAf8WXPkFyhM8Sydan9iE8A2pD0g+9yOFbPq8/DyxYn8Cb3DSNT55YbjWM+XZPIwljmEl5X9Ro4HHmXW4wVyWEFzFqJpmAzv2M9jYBMudne0aGxiKrNUTcOVKT6xSmNbOMuL4QwVs0wGA4svhFhkzQCOrV+9MemL0W3diZGOboENKCnP3kAqWD2iQt10M0t2Ql+0oERk84mnuTalS91j+tnwtL3fKP4KEpNKe9HxqximLYVPX8Dhw2G5rv+6w3A==) -> Found
    • [PUP] \DPLiveAgent1 -- "C:\Program Files (x86)\Defender Pro\DefenderLiveAgent.exe" -> Found
    • [PUP] \DPLiveAgent2 -- "C:\Program Files (x86)\Defender Pro\DefenderLiveAgent.exe" -> Found
    • [PUP] \globalUpdateUpdateTaskMachineCore -- C:\Program Files (x86)\globalUpdate\Update\globalupdate.exe (/c) -> Found
    • [PUP] \globalUpdateUpdateTaskMachineUA -- C:\Program Files (x86)\globalUpdate\Update\globalupdate.exe (/ua /installsource scheduler) -> Found
    • [Suspicious.Path] \ocxOOz1i88ys79ZreK -- C:\Users\Patricia\AppData\Roaming\ocxOOz1i88ys79ZreK.exe (--c=cvhUgDyLN9vEI0NAmC3yz8Q5tTjUus6Tn5Gf6Dijzb9wpemQkv1wqeXrUaq4WFCKqokYsNTxo1V2aYIE4gJw4Z8IHf99Z1fshvxdi7a6uAwc16Q2KoYe7gkcx4LNmCP+4XwdHirz+ZIw1LTySLLqW5xQ8Bv5J7XYaIMlhEadLmY2XEydDCPWI2uxwCgquxU2pjtaua7JpJz1pfczrqUk4C/U3lxs4GSxlc3Imtxwn9bvZm9RJg3NWjmiIjy1o2BK7G4zj6BVPM6dbci/C1I3aAgfP0BD23Fi//pSnIDPnXlspTDlxKB1JvEu+TlMmrIH39gYWmp1jLeS6TzBOwLz2Q==) -> Found
    • [Suspicious.Path] \SmartWeb Upgrade Trigger Task -- C:\Users\Patricia\AppData\Local\SmartWeb\SmartWebHelper.exe -> Found
    • [PUP] \TDKVXKLRK1 -- C:\ProgramData\FlashBeat\FlashBeat.exe -> Found
    • [Suspicious.Path] \YHuqvd82AtIO4oI2 -- C:\Users\Patricia\AppData\Roaming\YHuqvd82AtIO4oI2.exe (--c=gEgm4VindzbmeKmAFPhEymmF3ijGd8fIQDyRergoImhFzRxq8MXNC6yeQN++3Ld5WpZahTfAnxkVyegtzTlG/2hqOOsZrC1XP1zEHBleWo+EQ1ZSOyiJb6cr59LxBr95qAL3ua3wYKlfDaAdLDSpMhSinczsUMwa9oziJ2W9CH1mf0Rcqx5ka8yO37d0bKc8WskRFZrX6WADiMTjwZci17OGQIZD+irupDxr2biT0yylypaozCsvg4LVoaH1BqLgi9CbKbYlFAccmO/iuNDOj1T8RkrS9abqR6xe9qBqRmcNZ1da+HW0QSk1wvjUpMf9gaOM3sy6kIbooq8KM659hg==) -> Found
    • [PUP] \{F5ADEE5E-190E-463F-BC8A-3608F2F285BD} -- C:\Program Files (x86)\Defender Pro\DefenderPro.exe -> Found
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\Users\Patricia\AppData\Local\nsi8B65.tmp
    C:\ProgramData\28341ff220e0446c9fff27c4493d622e
    C:\ProgramData\Y45Q68xE.dat
    C:\Program Files (x86)\1b57f704-9966-49b5-8d53-0c95de75639c
    C:\Program Files (x86)\globalUpdate
    C:\AI_RecycleBin
    C:\Windows\SysWOW64\029B560A371F4E00AB32838EBC01B9E7
    C:\Windows\SysWOW64\?@?Dlotserviceruntime.log
    C:\Windows\SysWOW64\?7?8lotserviceruntime.log
    C:\Windows\TEMP\ACLM_GeneratedProxy.cs
    C:\Windows\tasks\0urzP3Ee58J.job
    C:\Windows\tasks\4NZZudxvVUiTlz.job
    C:\Windows\tasks\cvC5s7GfRTkCKx7Noj1gBdeDP9.job
    C:\Windows\tasks\KQCHYMORFPAYVSBU.job
    C:\Windows\tasks\ocxOOz1i88ys79ZreK.job
    C:\Windows\tasks\YHuqvd82AtIO4oI2.job
    C:\Windows\system32\tasks\0urzP3Ee58J
    C:\Windows\system32\tasks\4NZZudxvVUiTlz
    C:\Windows\system32\tasks\7A2621B8-295F-4735-BCC2-9AD06FCA7EBA
    C:\Windows\system32\tasks\cvC5s7GfRTkCKx7Noj1gBdeDP9
    C:\Windows\system32\tasks\KQCHYMORFPAYVSBU
    C:\Windows\system32\tasks\ocxOOz1i88ys79ZreK
    C:\Windows\system32\tasks\YHuqvd82AtIO4oI2
    
    :reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "BingSvc"=-
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
    "Defender Pro"=-
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\microsoft\windows\currentVersion\Run]
    "Defender Pro"=-
    [HKEY_USERS\S-1-5-21-2263876187-3912078216-3253532516-1001\Software\Microsoft\Windows\CurrentVersion\run]
    "BingSvc"=-
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{09405546-CD4F-40B4-9D07-5C8A30A398F7}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{A531D99C-5A22-449b-83DA-872725C6D0ED}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FindingDiscount]
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.




    Re run Malware Bytes and have it remove anything else it may find.



    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.


    Re run RogueKiller (just a scan and attach log)
    Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running!
     
  4. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    Hell, yeah! Awesome! Everything is running as it should. I was able to install Norton and run Windows updates. I'm not charging my friend any money, but I'm going to send him the donation page for Major Geeks and ask him to send you something. This is the second time you've helped me. I am an amateur chef. If you're ever in Worcester, MA, let me know what your favorite meal is and I'll make it for you. Thank you!

    Jay
     

    Attached Files:

  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    After clicking Fix exit HJT.




    Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    The proxy is still in place... :( If you are not deliberately set up to use it then please continue with the below instructions too:


    Please download the latest version of Farbar Recovery Scan Tool and save it to your desktop.

    Note: Make sure you download the correct version for your PC. Only the correct version will work.
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.


    Thankyou very much indeed! I am in Worcester UK :-D
     
  6. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    I was able to import the registry keys and values. Attached are the logs.

    Sister cities, that's funny! We speak Portuguese at home, but my 3 year old daughter likes the cartoons from England (Thomas, Peppa, etc.). When she speaks English, she doesn't have an American accent. For us, it's really cute.

    Thanks again for your help.

    Jay
     

    Attached Files:

  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You are most welcome. :)

    • Save the attached (fixlist.txt) to your desktop.
    • Right click FRST and run it as admin.
    • Click the FIX button.
    • A report should pop up, please attach it here in your next reply.
    • Ensure a reboot has been done.
    • Re run RogueKiller and attach latest log from that also.
     

    Attached Files:

  8. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    Attached are the logs. Just an FYI: I'm connecting via wireless at work and I have to accept an eula at a portal. I'm not sure if that's the proxy that you see. Maybe not, I just thought to mention it. Thank you.

    Jay
     

    Attached Files:

  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Can you find out?
     
  10. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    I'm not exactly sure how to check if the portal at work is the proxy so here's what I did: I ran Ccleaner, restarted, checked to make sure the portal acceptance cleared from earlier (the portal acceptance is good for the day, even if you restart your computer) by trying google.com. The portal came up, so I knew the acceptance cleared from earlier. (I cancelled the acceptance.) I then turned off wifi. I ran RogueKiller. Attached is the log. The proxy is still there. I also attached the URL for the portal and the portal's page source. I don't know enough about the registry to know if the portal resides dormant in the background - if that makes any sense - even if there is no current acceptance. I'm really sorry about all the work. My friend is really appreciative. Thank you.

    Jay
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I am seeking assistance from colleagues, hang in there. :)
     
  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Chaslang is away until Sunday evening, so hang in there, and we'll try a couple things in the mean time.

    Try to follow the instructions here for each browser (if installed) : Proxy Server - Changing Settings

    Once done, re run Roguekiller and attach log.
     
  13. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    OK. The proxy settings in Chrome and IE (the PC doesn't have Firefox) look good. All settings are as they should be (no proxy enabled). I disabled Norton Identity Safe Extension and Norton Search Bar, restarted, and ran RogueKiller. Attached is the log. The proxy is still there. I don't know enough about this level of malware, but I am not noticing any lag in the browsers. It's actually pretty snappy. I have no idea where the proxy is coming from or if it's affecting the computer at all. No worries if you can't can't respond soon. I won't have access to the computer until Monday, anyway. Again, thanks for your help. Have a great weekend!

    Jay
     

    Attached Files:

  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    We get alot of cases come in like yours where a proxy in place is being stubborn about being removed.

    Excellent, soon as you're back on monday just make a post to let me know you've got access again. You are most welcome for the help. Enjoy your weekend, too. :)
     
  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you're still there do this:

    Download Rkill

    Right click and run as admin > it will not take long to run, a box will pop up when it's finished and you can attach the log it produces here.
     
  16. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    Good Morning,

    I hope you had a good weekend. Attached is the log. Thank you.

    Jay
     

    Attached Files:

  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Download OTL to your desktop.

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

    When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    Attach both of these logs into your next reply.
     
  18. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    Attached are the logs. I noticed that OTL has a setting to select the age of the files to scan for. Here's a little background: both my friend and I work for a school. Before September 1, we hadn't seen each other since June. When I first looked at his computer, I noticed that the last time it checked for Windows Updates was on July 14. Skype was installed on July 14. Also, there were a lot of programs that looked like malware that were installed on July 14. (The first thing I did was to remove them.) My friend said that it was probably his wife and that he hadn't been able to connect to the Internet for awhile. I suspect that whatever website she got Skype from, she got an .exe file that bundled Skype with a bunch of malware. Let me know if you would like me to rerun OTL with a file age of 90 days. Thanks.

    Jay
     

    Attached Files:

  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OTL does not show the proxy. Hmm

    Norton maybe interfering with our fixes. Can you uninstall it for a while while we try the fix again?

    Re run the fix using Roguekiller like before, have it fix all the proxy entries.
    Reboot, then rescan and let me know whether it still finds proxy entries.
     
  20. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    OK. Will do. I'll let you know tomorrow. Something came up at work. Have a good night.

    Jay
     
  21. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Thanks Jay. You too. Catch you tomorrow. :)
     
  22. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    OK. I uninstalled Norton, ran RogueKiller, and deleted all proxy listings. I restarted the computer, and ran RogueKiller again. The proxy is still there. Listen, I would like you to know that I really appreciate all your help. I would not be disappointed if you felt that we've done all we can. I would be OK telling my friend that we've done the best we could. I'm just throwing that out there. I don't know where this falls on your scale of "worst I've ever seen", but for me this is, by far the worst I've ever seen. Thank you.

    Jay

    P.S. I don't understand how people think they can click on anything on a website, download anything, and most importantly, not have anti-virus. This might be mean of me, but sometimes I think that some people need to suffer the consequences of their actions. Much of what I do now is a result of screwing up in the past and learning from it.
     

    Attached Files:

  23. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Chaslang is back, and I am sure he would come and take a look at this. Everything seems great for this machine EXCEPT that proxy being in place. :)
     
  24. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    OK. If you guys don't mind to keep going, I don't mind. There's no rush for me nor my friend. Thank you.

    Jay

    P.S. There's no need to respond to this question if you don't have time. We used to buy clothes for my daughter from gymboree.com all the time. Recently, in Firefox, when I click on "My Account", I get the "This Connection is Untrusted" window. The reason it gives is that the website uses an invalid security certificate. Chrome doesn't display this warning. Why does Firefox display it and not Chrome? Is it safe to continue to purchase items on gymboree.com, or is it better to wait until the website corrects the certificate? Thanks.
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Since anti-virus and anti-malware protection programs can frequently get in the way of making fixes/changes to a PC, I suggest that you first uninstall Norton that you recently installed and do not reinstall it until we have been able to complete cleanup.

    After uninstalling Norton reboot the PC and then run the same steps with RogueKiller again to try and fix the Proxy Settings. Then reboot again and see if it comes back. If it does come back then do the below.

    Be patient while doing the below. The fixes can sometimes take quite awhile to run. Especially the permissions repairs. It may be best to kick it off and goto bed or do something else. It is better not to run anything while the repairs are going on.

    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Remove Policies Set By Infections
      • Repair Proxy Settings
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished. If it does not then reboot it yourself.


    Now please run a new full scan with FRST like you did the very first time you used it and attach the new log.



    Now please download AdwCleaner by Xplode and save to your Desktop.
    • Double click on AdwCleaner.exe to run the tool.
      Vista/Windows 7/8 users right-click and select Run As Administrator
    • Click on the Scan button.
    • AdwCleaner will begin...be patient as the scan may take some time to complete.
    • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
    • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
    • Attach the logfile to your next next reply.
    • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.
     
  26. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    Thank you. I had previously already uninstalled Norton. I ran RogueKiller and deleted the proxies. I restarted and ran RogueKiller. The proxies were still there. I ran Windows Repair. It restarted the PC. I scanned with FRST. I ran ADWCleaner. There are no entries that I want to keep. Attached are the requested logs. BTW, you have a kick-azz team. Thank you.

    Jay
     

    Attached Files:

  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay as long as it is still uninstalled now then continue with below.

    Okay then run ADWCleaner again and have it fix all that it finds. Then immediately reboot before continuing.

    Thanks!



    Download this >> View attachment fixlist.txt


    Save fixlist.txt on your Desktop. Make sure you save it as a txt file.
    • You should now have both fixlist.txt and FRST64.exe on your Desktop.
    • Now I want you to disconnect your PC connection to the internet by unplugging the cable ( if it is wireless then temporarily shutdown the wireless network ).
    • Run FRST64.exe by right clicking on it and selecting Run As Adminstrator
    • Click the Fix button just once and wait.
    • Your computer should reboot after the fix runs.
    • Reconnect your internet connection after reboot so you can come back here to continue.
    • The tool will make a log on the Desktop (Fixlog.txt) please attach this new log to your next reply (attach or paste)
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • Fixlog.txt
    • C:\MGlogs.zip
    Please attach the above two log first before you continue with the below.


    Also at this point, I want to double check the status of the fixes by having you run another scan with FRST like in my last message and attach the new FRST.txt log
     
  28. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    Attached are the logs. Just and FYI: FRST64 did not restart the PC. I restarted it anyway before continuing. Thank you.

    Jay
     

    Attached Files:

  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You forgot the new follow up log from FRST. See the last line of my previous message. I have a feeling the proxy issue is still there and that we will need to use another different fix with FRST.
     
  30. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    Ooops. Sorry. It's attached. Thank you.
     

    Attached Files:

  31. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    Just wanted to let you know that I won't have access to the PC until Monday, so there's no rush to move to the next step. Thanks for all your help. Have a good weekend.

    Jay
     
  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Next step is below.


    Download this >> View attachment fixlist.txt

    Save fixlist.txt on your Desktop. Make sure you save it as a txt file.
    • You should now have both fixlist.txt and FRST64.exe on your Desktop.
    • Now I want you to disconnect your PC connection to the internet by unplugging the cable ( if it is wireless then temporarily shutdown the wireless network ).
    • Run FRST64.exe by right clicking on it and selecting Run As Adminstrator
    • Click the Fix button just once and wait.
    • Your computer should reboot after the fix runs.
    • Reconnect your internet connection after reboot so you can come back here to continue.
    • The tool will make a log on the Desktop (Fixlog.txt) please attach this new log to your next reply (attach or paste)
    Now also rerun a scan with RogueKiller and attach the new log from it.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • Fixlog.txt
    • the new RogueKiller log
    • C:\MGlogs.zip
     
  33. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    OK. If I'm reading the RogueKiller log correctly did we (really you) get rid of the proxy? Wow! Thank you.

    Jay
     

    Attached Files:

  34. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Yes it looks good. Give it one more reboot and check with another RogueKiller scan to be sure it does not come back. If still good then continue on with the below final instructions.



    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    7. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    8. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • For Windows 8 and 8.1 system restore see this link: Win 8 System Restore - How to enable/disable
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  35. crazy_lazy_bear

    crazy_lazy_bear Private E-2

    Hey,

    I just wanted to say "thank you" one last time. You and Kestrel13 were a huge help with this. I want you to know how much I appreciate it. I returned the computer to my friend and emailed him the link to your donation page. You guys rock!

    Wishing you the best,

    Jay
     
  36. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    On behalf of us both, you are *most* welcome!! :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds