Virus/Spyware

Discussion in 'Malware Help (A Specialist Will Reply)' started by octron2008, Jan 12, 2015.

  1. octron2008

    octron2008 Private E-2

    Hi

    I was given a PC by a friend as had virus Spyware, I install Symantec Endpoint Protection that found 23 files infected. But still getting the home page as http://www.delta-homes.com even that I change the default homepage to google.

    I also run the files mention on the Vista, Win 7 and Win 8 Malware Removal/Cleaning Procedure

    Below are the logs

    I added TDSSKiller log as zip as I cannot attach as txt, I get "TDSSKiller.3.0.0.42_12.01.2015_12.51.04_log.txt:
    Your file of 405.1 KB bytes exceeds the forum's limit of 375.0 KB for this filetype".

    Using Windows 7
    Fujitsu PC

    Does it look like clear as per the logs.

    Something else strange that happened was, I tried to install AVG internet security, but as soon as I do the wireless stops working and I get Limited Access only, as soon as I uninstall internet works ok.

    Any ideas?

    Thanks in advance
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Uninstall the below programs. If you do not find them or they will not uninstall, just keep going.
    Spybot << I don't recommend running this with Symantec or with AVG
    AVG Web TuneUp
    Coupon Printer for Windows
    Rich Media View


    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:


    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://mysearch.avg.com?cid={C1DF3E40-2AB3-47D4-B39A-EEE4CE7239D3}&mid=88ad69b08fb447cd84296feafc0aecb0-09f891afb8185413d86f6c1a2dfd965b4eda97eb&lang=en&ds=AVG&coid=avgtbavg&cmpid=&pr=fr&d=2015-01-11 20:08:00&v=4.0.5.7&pid=wtu&sg=&sap=hp
    O2 - BHO: AVG Web TuneUp - {95B7759C-8C7F-4BF1-B163-73684A933233} - C:\Program Files (x86)\AVG Web TuneUp\4.0.5.7\AVG Web TuneUp.dll
    O4 - HKLM\..\Run: [vProt] "C:\Program Files (x86)\AVG Web TuneUp\vprot.exe"
    O4 - HKCU\..\Run: [iLivid] "C:\Users\Patrick\AppData\Local\iLivid\iLivid.exe" -autorun
    O18 - Protocol: viprotocol - {B658800C-F66E-4EF3-AB85-6C0C227862A9} - C:\Program Files (x86)\Common Files\AVG Secure Search\ViProtocolInstaller\18.2.0\ViProtocol.dll
    O23 - Service: vToolbarUpdater18.2.0 - Unknown owner - C:\Program Files (x86)\Common Files\AVG Secure Search\vToolbarUpdater\18.2.0\ToolbarUpdater.exe


    After clicking Fix, exit HJT.


    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
    
    
    :Services
    vToolbarUpdater18.2.0
    
     
    :Files
    C:\Users\Patrick\AppData\Local\Temp\tu17p84.exe
    C:\Users\Patrick\Downloads\Vintage.flv.exe
    C:\Program Files (x86)\Mozilla Firefox\browser\searchplugins\Ask.xml
    C:\ProgramData\APN
    C:\Users\Patrick\AppData\Roaming\Mozilla\Firefox\Profiles\s50ijz2f.default\searchplugins\ask-search.xml
    C:\Users\Patrick\AppData\Roaming\Mozilla\Firefox\Profiles\s50ijz2f.default\searchplugins\Ask.xml
    C:\Program Files (x86)\AVG Web TuneUp
    C:\Users\Patrick\AppData\Local\iLivid
    C:\Program Files (x86)\Common Files\AVG Secure Search
    C:\\Program Files (x86)\\Movies Toolbar
    C:\ProgramData\34BE82C4-E596-4e99-A191-52C6199EBF69
    C:\ProgramData\Avg
    C:\ProgramData\AVG Secure Search
    C:\ProgramData\AVG Security Toolbar
    C:\ProgramData\AVG Web TuneUp
    C:\ProgramData\ParetoLogic
    C:\ProgramData\Tarma Installer
    C:\Program Files (x86)\AVG Web TuneUp
    C:\Program Files (x86)\globalUpdate
    C:\Program Files (x86)\RichMediaViewV1
    C:\Program Files (x86)\YTDownloader
    C:\Program Files (x86)\Common Files\AVG Secure Search
    C:\1.txt
    C:\awh*.tmp
    C:\Windows\SysNative\drivers\avgtpx64.sys
    C:\Windows\TEMP\*.*
    C:\Users\Patrick\AppData\Local\Temp\*.*
    
    
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\iLivid.torrent]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{0510789C-5E5D-4FA3-A3EF-2D56FDE5090A}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1E34EA93-600B-4CBC-9858-59BE04C1A581}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{32CC4D2E-999C-4853-9D3E-5DE4C02D57C6}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{34A117AD-7F43-4859-BF97-ADC46488953F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{42CB7963-EFE0-4737-A927-CE076FAA3BA0}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4B8E39FD-ED07-4A41-9681-3D78DAFCEE66}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4E7F49ED-8C94-4AAA-A407-3010D099B11A}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{59837716-8E20-4C39-A271-EE29B629278C}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{5A06A37E-F036-42EC-9D51-E738FACBFEB5}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{7007FA4C-E372-4485-ADFA-213B9E38D87F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{7AE769DF-F151-4541-B820-031726E76E06}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{844C2331-94DF-431E-9A67-426ED861D27F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8684A596-308C-4872-ACA7-FF6093BBEEF7}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{934063FB-A81D-4849-B02C-478446DF3219}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{93A55DA3-83ED-4090-91B6-904C44647639}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{966430CC-2097-45CA-8626-2C3F454C3297}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{96C5CF2E-7AA7-4A3E-A8CC-7CF4AB1E9A4A}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{993161E3-CF87-46CF-A702-3FD05D3DEDDD}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9989BC14-9B5B-4B3B-8040-478FD1685E34}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9DFFAA5F-44C6-4FF2-80EE-76368D0A2E75}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AA8714C4-294D-47FB-BCE0-BC12445CFBD4}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B34A6A15-1F6F-4A19-A9DD-8B44C874A20B}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B57F17D0-F1A5-48F6-AFA4-B4A44556D30A}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B8445FED-900C-4137-AD15-DDD2F6306B62}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BB27DF2F-6F05-4A42-9FFD-14696D795750}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C00F4B2B-A33C-40FC-8E47-4D18DCD4B01E}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C242AC08-2AE7-46A5-A62D-E7F1B9BE489C}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F3EC3AFF-8FD8-4253-ABA2-F2ABE0A5524A}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F85503FF-ED21-4493-9A4A-B6765EB45D94}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{FEEAF56C-C91B-4D1C-9FC8-BAFD85F5F2B3}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Prod.cap]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\s]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\speedupmypc]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\Safari.exe\shell\open\command]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitguard.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bprotect.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bpsvc.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\browserdefender.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\browserprotect.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\browsersafeguard.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dprotectsvc.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jumpflip]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\protectedsearch.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchinstaller.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchprotection.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchprotector.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchsettings.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchsettings64.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\snapdo.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\stinst32.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\stinst64.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\umbrella.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utiljumpflip.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\volaro]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vonteera]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\websteroids.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\websteroidsservice.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\YTDownloader]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\YTDownloaderUpd]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Clients\StartMenuInternet\Safari.exe\shell\open\command]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Funmoods]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\hdcode]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitguard.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bprotect.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bpsvc.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\browserdefender.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\browserprotect.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\browsersafeguard.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dprotectsvc.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jumpflip]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\protectedsearch.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchinstaller.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchprotection.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchprotector.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchsettings.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchsettings64.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\snapdo.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\stinst32.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\stinst64.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\umbrella.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utiljumpflip.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\volaro]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vonteera]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\websteroids.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\websteroidsservice.exe]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{2ff49ed5-a3ef-410b-918e-97deceb5996d}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\winzipersvc]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\eventlog\Application\winzipersvc]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_SBMNTR]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\eventlog\Application\winzipersvc]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\sbmntr]
    [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\eventlog\Application\winzipersvc]
    [-HKEY_USERS\.DEFAULT\Software\AskPartnerNetwork]
    [-HKEY_USERS\S-1-5-18\Software\AskPartnerNetwork]
    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000\Software\Classes\.torrent\iLivid.torrent_backup]
    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000\Software\Classes\iLivid.torrent]
    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000\Software\iLivid]
    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{4D2D3B0F-69BE-477A-90F5-FDDB05357975}]
    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{A40DC6C5-79D0-4CA8-A185-8FF989AF1115}]
    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\superfish.com]
    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}]
    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000\Software\Microsoft\Internet Explorer\SearchScopes\{D63D39B1-C0FD-4E08-A64F-C13F95B1739F}]
    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000_Classes\.torrent\iLivid.torrent_backup]
    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000_Classes\iLivid.torrent]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{95B7759C-8C7F-4BF1-B163-73684A933233}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E3F1CA13-EA0E-4617-8D03-3EAA6A94A7E0}]
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "iLivid"=-
    
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
    "vProt"=-
    
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\microsoft\windows\currentVersion\Run]
    "vProt"=-
    
    [HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000\Software\Microsoft\Windows\CurrentVersion\run]
    "iLivid"=-
    
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{23088cf8-eaf8-4bb3-a251-9ba61557ac75}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{23088cf8-eaf8-4bb3-a251-9ba61557ac75}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{D63D39B1-C0FD-4E08-A64F-C13F95B1739F}]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXT log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  3. octron2008

    octron2008 Private E-2

    Hi chaslang

    After doing all you asked I noticed all the browsers do start with the home page http://www.delta-homes.com so something still there as I have the home page as google.

    When running analyse.exe couple of the lines were not found maybe because I already uninstall the programs you mention.

    When running OTM I had to do it a few times as was freezing at 1 point, I could see on top Not Responding, even after leaving it for 1 hour. tried it a couple of times but the same, I started on safe mode to test but same results,

    I did do a manual reboot after waiting and logs on reboot will be empty.

    I manage to find out that 1 of the lines causing the freeze could be:

    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000_Classes\.torrent\iLivid.torrent_backup]
    [-HKEY_USERS\S-1-5-21-1477186258-1879470388-963611817-1000_Classes\iLivid.torrent]

    After removing them for the code, I run OTM again that completed OK, I removed manually iLivid.torrent_backup but not iLivid.torrent as was not in registry. Log attach

    JRT tool completed ok, but the problem was after I run OTM 1st time I run JRT too, it worked ok, after I manage to get OTM to run correctly I decided to run JRT too, so now log shows as empty SORRY

    Thanks again
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Last edited: Jan 15, 2015
  5. octron2008

    octron2008 Private E-2

    Hi

    Thanks for the help.

    I checked all the start pages in the browsers as I had done that already and all had something else as home page, even on the home page there was a link to uninstall that I follow but was still happening.

    I did as per the 3 links below to reset each browser, it fixed Chrome but for some reason still coming up every time I open Internet Explorer and Firefox.

    I restarted pc a few times but was still having the same issue.

    I run ADWCLEANER DOWNLOAD listed on the "Reset Internet Explorer" that looked like for some reason fixed the issue with the homepage on IE and Firefox.

    Looks like all fix now, will use it for the day and see how it runs today.

    Thanks
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds