This 2nd hand laptop I just got is all the way messed up

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by goliano, Jan 30, 2015.

  1. goliano

    goliano Corporal

    Logs attached:
     
  2. goliano

    goliano Corporal

    edit
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please attach the correct MBAM log.

    Rerun RogueKiller and have it fix these items:
    Code:
    ¤¤¤ Registry : 111 ¤¤¤
    [PUP] HKEY_CLASSES_ROOT\CLSID\{00000000-6E41-4FD3-8538-502F5495E5FC} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{00fb52b5-0779-46dd-afc6-c6eb55f21a26} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{02478D38-C3F9-4efb-9B51-7695ECA05670} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{02A96331-0CA6-40E2-A87D-C224601985EB} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{051E9166-B275-4683-907B-372FAE22BC7C} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{058F0E48-61CA-4964-9FBA-1978A1BB060D} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{076a9b45-de24-4cdf-89be-716c279b3b55} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{13119113-0854-469d-807A-171568457991} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{148dcaec-c91d-441d-a0e7-519a0673e7f5} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{18F33C35-8EF2-40D7-8BA4-932B0121B472} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{27488090-768a-4d20-a938-f223f71c344c} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{291BCCC1-6890-484a-89D3-318C928DAC1B} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{2EECD738-5844-4a99-B4B6-146BF802613B} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{3033124f-06bf-4829-873a-310a125b4d4c} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{315c7727-2b4d-4ef9-95fa-ea6cda9aeb9d} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{31AD400D-1B06-4E33-A59A-90C2C140CBA0} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{3278F5CF-48F3-4253-A6BB-004CE84AF492} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{33119133-0854-469d-807A-171568457991} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{35dab87a-026f-4503-b5f1-6774e16eaffa} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{3B5702BA-7F4C-4D1A-B026-1E9A01D43978} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{43769158-3B03-4932-8D8A-8F0F344BF024} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{4a75066c-e359-4ce6-830c-e09830a3cd2d} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{5645E0E7-FC12-43BF-A6E4-F9751942B298} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{56561B2A-FB5D-363A-9631-4C03D6054209} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{577975B8-C40E-43E6-B0DE-4C6B44088B52} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{5E89ACE9-E16B-499A-87B4-0DBF742404C1} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{61789f17-b8ed-4867-ba4a-dc19dac8ef5b} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{69F256DF-BA98-45E9-86EA-FC3CFECF9D30} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{6E87FC94-9866-49B9-8E93-5736D6DE3DD7} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{70658616-d7ae-4f31-bd19-4f1775792e9b} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{7e0ae9c4-366b-43f2-91ff-329d170bc335} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{7E49F793-B3CD-4BF7-8419-B34B8BD30E61} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{834469E3-CA2B-4F21-A5CA-4F6F4DBCDE87} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{8529FAA3-5BFD-43C1-AB35-B53C4B96C6E5} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{8c775dbe-2382-4eab-a48a-6859c3b9ef29} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{97F2FF5B-260C-4ccf-834A-2DDA4E29E39E} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{98889811-442D-49dd-99D7-DC866BE87DBC} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{A00289B5-2C16-4EC7-9780-2B56977ADC65} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{A2DF06F9-A21A-44A8-8A99-8B9C84F29160} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{A717364F-69F3-3A24-ADD5-3901A57F880E} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{ADBC39BE-3D20-4333-8D99-E91EB1B62474} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{B8276A94-891D-453C-9FF3-715C042A2575} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{bd3ea7c2-3af8-4463-9a9c-6eb8e136cb02} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{c6a7154f-ea0e-4de3-afb9-144fc620e780} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{C7BF8F4B-7BC7-4F42-B944-3D28A3A86D8A} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{cc2e2b99-14d3-4516-883c-9ea147f594ef} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{CCB08265-B35D-30B2-A6AF-6986CA957358} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{CD92622E-49B9-33B7-98D1-EC51049457D7} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{CFC47BB5-5FB5-4AD0-8427-6AA04334A3FC} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{D4027C7F-154A-4066-A1AD-4243D8127440} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{d675a74c-29f6-4aa7-a098-66373d746cb9} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{da4ebfa0-6ba0-4e18-817f-304b4192c393} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{E041E037-FA4B-364A-B440-7A1051EA0301} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{E06CA7F5-BA34-4FF6-8D24-B1BDC594D91F} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{E0ADB535-D7B5-4D8B-B15D-578BDD20D76A} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{E5A7A645-8318-4895-B85C-EDC606B80DB6} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{EF99BD32-C1FB-11D2-892F-0090271D4F88} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{f2e03adb-a325-4084-ba22-2f2260f6a90f} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{f346cf98-fa03-4e7a-81b6-eb19b718f9c1} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{F6421EE5-A5BE-4D31-81D5-C16B7BF48E4C} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{f90eaf3d-6a09-4faf-a84c-e6e91f97561b} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{fbc663ed-1560-421b-bd71-f5b94dcea09c} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{FC36B0BD-27F0-4cdd-8AB1-50651EFC3EFD} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{FD8E81D0-F5FE-4CB1-9AEA-1E163D2BAB78} -> Found
    [PUP] HKEY_CLASSES_ROOT\CLSID\{FFB9ADCB-8C79-4C29-81D3-74D46A93D370} -> Found
    [PUP] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670} -> Found
    [PUP] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27488090-768a-4d20-a938-f223f71c344c} -> Found
    [PUP] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2EECD738-5844-4a99-B4B6-146BF802613B} -> Found
    [PUP] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31ad400d-1b06-4e33-a59a-90c2c140cba0} -> Found
    [PUP] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bd3ea7c2-3af8-4463-9a9c-6eb8e136cb02} -> Found
    [PUP] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440} -> Found
    [PUP] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FC36B0BD-27F0-4cdd-8AB1-50651EFC3EFD} -> Found
    [PUP] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | ApnUpdater : "C:\Program Files\Ask.com\Updater\Updater.exe"  -> Found
    [PUP] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | BService : C:\Program Files\Bench\BService\1.1\bservice.exe  -> Found
    [PUP] HKEY_USERS\S-1-5-21-3780011886-1008373717-738689934-1000\Software\Microsoft\Windows\CurrentVersion\Run | Browser Infrastructure Helper : C:\Users\Renee\AppData\Local\Smartbar\Application\SnapDo.exe startup  -> Found
    [PUP] HKEY_USERS\S-1-5-21-3780011886-1008373717-738689934-1000\Software\Microsoft\Windows\CurrentVersion\Run | Optimizer Pro : C:\Program Files\Optimizer Pro\OptProLauncher.exe  -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce | protectedsurf-repairJob : wscript.exe "C:\Users\Renee\AppData\Local\protectedsurf\repair.js" "protectedsurf-repairJob"  -> Found
    [Suspicious.Path] HKEY_USERS\S-1-5-21-3780011886-1008373717-738689934-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce | ArcadeParlor357.000000 : cmd.exe /c rmdir "C:\Users\Renee\AppData\Local\ArcadeParlor" /s /q  -> Found
    [Suspicious.Path] HKEY_USERS\S-1-5-21-3780011886-1008373717-738689934-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce | ArcadeParlor619.000000 : cmd.exe /c rmdir "C:\Users\Renee\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ArcadeParlor\" /s /q  -> Found
    [Suspicious.Path] HKEY_USERS\S-1-5-21-3780011886-1008373717-738689934-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce | ArcadeParlor909.000000 : cmd.exe /c rmdir "C:\Users\Renee\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{F32E7E42-9AFA-47CA-A0C4-D07EE651D404}" /s /q  -> Found
    [Suspicious.Path] HKEY_USERS\S-1-5-21-3780011886-1008373717-738689934-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce | ArcadeParlor221.000000 : cmd.exe /c rmdir "C:\Users\Renee\AppData\Roaming\Mozilla\Firefox\Profiles\dz9t7wni.default\extensions\{F32E7E42-9AFA-47CA-A0C4-D07EE651D404}" /s /q  -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\qjKLKiC ("C:\ProgramData\mvnQcuyTP\qjKLKiC.exe") -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\RGMUpdater (C:\Users\Renee\AppData\Local\RGMService\RGMUpdater.exe) -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\vtany (\??\C:\Windows\vtany.sys) -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\xhunter1 (\??\C:\Windows\xhunter1.sys) -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\qjKLKiC ("C:\ProgramData\mvnQcuyTP\qjKLKiC.exe") -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\RGMUpdater (C:\Users\Renee\AppData\Local\RGMService\RGMUpdater.exe) -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\vtany (\??\C:\Windows\vtany.sys) -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\xhunter1 (\??\C:\Windows\xhunter1.sys) -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qjKLKiC ("C:\ProgramData\mvnQcuyTP\qjKLKiC.exe") -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\RGMUpdater (C:\Users\Renee\AppData\Local\RGMService\RGMUpdater.exe) -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\vtany (\??\C:\Windows\vtany.sys) -> Found
    [Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\xhunter1 (\??\C:\Windows\xhunter1.sys) -> Found
    Now rerun Hitman and have it fix everything it finds.

    Reboot and rescan with both RogueKiller and Hitman.

    Then run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Attach the new C:\MGLogs.zip. along with the RogueKiller and Hitman logs.
     
  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Next, please use Add/Remove programs to uninstall:
    Ask Toolbar
    Babylon toolbar
    Blitz Media Player
    ChocolateBar by We-Care.com v1.0.1.0
    Optimizer Pro v3.2

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    After clicking Fix, exit HJT.

    Now copy just the bold text below to notepad (Do not include any space above the word REGEDIT). Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Now Download OTM by Old Timer and save it to your Desktop.


    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Paste the following code under the [​IMG] area. Do not include the word Code.


    Code:
    :Processes
    explorer.exe
    
    :files
    C:\Program Files\Shop For Rewards\vbsprn.exe
    C:\Program Files\Optimizer Pro\OptProReminder.exe
    C:\Program Files\Zwinky_5q\bar\1.bin\5qbrmon.exe
    C:\Program Files\HeadlineAlley_29\bar\1.bin\29brmon.exe
    C:\Program Files\TotalRecipeSearch_14\bar\1.bin\14brmon.exe
    C:\Users\Renee\AppData\Local\Smartbar\Application\SnapDo.exe
    C:\Program Files\Converter Free Online\Taskbar.exe
    C:\Program Files\ChocolateBar\ChocolateBar.exe
    C:\Users\Renee\AppData\Local\Smartbar\Application\Lrcnta.exe
    C:\Users\Renee\AppData\Roaming\Optimizer Pro
    C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ChocolateBar
    C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Optimizer Pro v3.2
    C:\Users\Renee\AppData\Local\Temp\*.*
    :Commands
    [purity]
    [ResetHosts]
    [emptytemp]
    [start explorer]
    [Reboot]

    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach that document back here in your next post.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Attach the OTM log and a new C:\MGLogs.zip.
     
  5. goliano

    goliano Corporal

    fixME.reg was successful.

    Had to reboot during OTM run so could copy-n-paste Results.

    Logs attached.
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Can I assume that you had MBAM fix what it found?

    Do this:
    Reset Firefox to Defaults

    Make sure you tell me how things are running now.
     
  7. goliano

    goliano Corporal

    I don't remember cleaning anything. Couldn't find the 1st MBAM log so I ran it again.

    A speed browser short-cut popped up on my desktop.

    Avast icon has a red x on it and it won't start.
     
    Last edited: Jan 31, 2015
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Did you reset Firefox to defaults? Are you having popups with other browsers?
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    FYI: In the most recent logs I see both Avast and Microsoft Security Client running.
     
  10. goliano

    goliano Corporal

    I used the avast cleanup tool, reinstalled it and now it's working.

    All of the other browser short-cuts were linking to a file that's no longer available. Firefox is working fine after I reinstalled and reset it to default.

    What's Microsoft Security Client?
     
  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    It is an Anti-Virus program. If you are running Avast, you need to uninstall MSC.

    So everything is running ok? Are you ready for final cleanup?
     
  12. goliano

    goliano Corporal

    Yes. Everything's running ok.
     
  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now go to the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.

    8. After doing the above, you should work thru the below link:

     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds