Problem after Removing Xvidly Browser Hijacker

Dezbot

New Member
Thread author
Aug 9, 2013
11
Went to use Project Free TV, didn't know I didn't need to download the suggested viewer, wound up with Xvidly/VAF player/Search by Conduit. I scanned with Malware Bites and AVG and the file came up uninfected, so I installed. Found out after it was malware and started the removal process. I used the removal instructions from this site to get rid of everything, which why I dl'd AdwCleaner and HitmanPro (I also got the Junkyard Removal Tool, but HitmanPro took it off!).

Anyway, now my computer starts very slowly (takes almost 10 minutes to fully load up) and I get a RunDLL error for Conduit: "Error loading C:\Program Files\Conduit\CT3295549\plugins\TBVerifier.dll - The specified module cannot be found." How do I fix this new problem and get my computer to start faster? Thank you!
 

Attachments

  • OTL.Txt
    114.6 KB · Views: 120

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Hi and welcome to the malwaretips.com forums!

I'm Kuttus and I am going to try to assist you with your problem. Please take note of the below:
  • I will start working on your malware issues, this may or may not, solve other issues you have with your machine.
  • The fixes are specific to your problem and should only be used for this issue on this machine!
  • The process is not instant. Please continue to review my answers until I tell you your machine is clear. Absence of symptoms does not mean that everything is clear.
  • If you don't know, stop and ask! Don't keep going on.
  • Please reply to this thread. Do not start a new topic.
  • Refrain from running self fixes as this will hinder the malware removal process.
  • It may prove beneficial if you print of the following instructions or save them to notepad as I post them.
Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.


Before we start:
Please be aware that removing malware is a potentially hazardous undertaking. I will take care not to knowingly suggest courses of action that might damage your computer. However it is impossible for me to foresee all interactions that may happen between the software on your computer and those we'll use to clear you of infection, and I cannot guarantee the safety of your system. It is possible that we might encounter situations where the only recourse is to re-format and re-install your operating system, or to necessitate you taking your computer to a repair shop.

Because of this, I advise you to backup any personal files and folders before you start.
<hr />
STEP 1: Run the below OTL fix
<ol><li>Start <>OTL.exe</></li>
<li>Copy/paste the following text written <>inside of the code box</> into the <>Custom Scans/Fixes</> box located at the bottom of OTL
Code:
:OTL
DRV - (catchme) -- C:\DOCUME~1\Desiree\LOCALS~1\Temp\catchme.sys File not found
IE - HKLM\..\URLSearchHook: {03402f96-3dc7-4285-bc50-9e81fefafe43} - C:\Program Files\AIM Toolbar\aimtb.dll (AOL LLC.)
IE - HKLM\..\URLSearchHook: {f0e98552-8e47-4c6c-9b3a-11ab0549f94d} - SOFTWARE\Classes\CLSID\{f0e98552-8e47-4c6c-9b3a-11ab0549f94d}\InprocServer32 File not found
IE - HKLM\..\SearchScopes,DefaultScope = 
[2009/06/19 21:16:42 | 000,000,000 | ---D | M] ("Ask Toolbar for Firefox") -- C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\extensions\{E9A1DEE0-C623-4439-8932-001E7D17607D}
[2013/08/06 19:41:06 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\4shtxonn.default\extensions
[2013/08/06 20:02:01 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\extensions
[2013/07/03 20:58:01 | 000,000,000 | ---D | M] (Default) -- C:\Program Files\Mozilla Firefox\browser\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
CHR - plugin: downloadUpdater (Enabled) = C:\Program Files\Mozilla Firefox\plugins\npdnu.dll
CHR - plugin: downloadUpdater2 (Enabled) = C:\Program Files\Mozilla Firefox\plugins\npdnupdater2.dll
O2 - BHO: (Zonealarm Helper Object) - {2A841F7A-A014-4DA5-B6D9-8B913DFB7A8C} - C:\Program Files\Check Point Software Technologies LTD\zonealarm\1.8.11.11\bh\zonealarm.dll (Check Point Software Technologies LTD)
O2 - BHO: (RealNetworks Download and Record Plugin for Internet Explorer) - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Documents and Settings\All Users\Application Data\RealNetworks\RealDownloader\BrowserPlugins\IE\rndlbrowserrecordplugin.dll (RealDownloader)
O2 - BHO: (Java(tm) Plug-In SSV Helper) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
O2 - BHO: (ZoneAlarm Security Engine Registrar) - {8A4A36C2-0535-4D2C-BD3D-496CB7EED6E3} - C:\Program Files\CheckPoint\ZAForceField\Trustchecker\bin\TrustCheckerIEPlugin.dll (Check Point Software Technologies)
O2 - BHO: (Google Toolbar Notifier BHO) - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.7.8313.1002\swg.dll (Google Inc.)
O2 - BHO: (AIM Toolbar Loader) - {b0cda128-b425-4eef-a174-61a11ac5dbf8} - C:\Program Files\AIM Toolbar\aimtb.dll (AOL LLC.)
O2 - BHO: (Bing Bar Helper) - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files\Microsoft\BingBar\BingExt.dll (Microsoft Corporation.)
O2 - BHO: (Java(tm) Plug-In 2 SSV Helper) - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
O3 - HKLM\..\Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No CLSID value found.
O3 - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found.
O4 - HKCU..\Run: [ConduitFloatingPlugin_kbemlhjodpfopddibpbppifmogphpmil] "C:\WINDOWS\system32\Rundll32.exe" "C:\Program Files\Conduit\CT3295549\plugins\TBVerifier.dll",RunConduitFloatingPlugin kbemlhjodpfopddibpbppifmogphpmil File not found
[2012/08/19 18:24:10 | 000,027,520 | ---- | C] () -- C:\Documents and Settings\Desiree\Local Settings\Application Data\dt.dat
[2012/02/10 21:41:46 | 001,437,180 | ---- | C] () -- C:\Documents and Settings\LocalService\Local Settings\Application Data\WPFFontCache_v0400-S-1-5-21-1177238915-1965331169-725345543-1003-0.dat
[2012/02/10 21:41:45 | 000,202,666 | ---- | C] () -- C:\Documents and Settings\LocalService\Local Settings\Application Data\WPFFontCache_v0400-System.dat
[2012/02/10 10:47:50 | 000,000,744 | ---- | C] () -- C:\Documents and Settings\All Users\Application Data\Microsoft.SqlServer.Compact.400.32.bc
[2011/04/18 21:58:55 | 000,000,000 | ---- | C] () -- C:\Documents and Settings\Desiree\Local Settings\Application Data\prvlcl.dat
[2009/06/21 21:33:02 | 000,107,520 | ---- | C] () -- C:\Documents and Settings\Desiree\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini


:commands
[emptytemp]
[reboot]
<>NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system</></li>
<li>Then click the <>Run Fix</> button at the top</li>
<li>Let the program run unhindered, reboot when it is done</li>
<li>Attach the new log produced by OTL (C:\_OTL)</li>
</ol>

<hr />
 
Last edited by a moderator:

Dezbot

New Member
Thread author
Aug 9, 2013
11
Hi, kuttus, I ran the script and it got rid of the error (doesn't really help the start-up time--I think it's because of HitmanPro running a scan on start-up). Thank you!! :)

I can't load the new OTL file because I can't find it on my computer (I used Search and couldn't find it at all). Any suggestions?

Thanks again for the assistance! I really appreciate it :)
 

Dezbot

New Member
Thread author
Aug 9, 2013
11
Thanks! The forum won't let me post the file (says it's the wrong type), so I sent you a PM with the contents of the OTL log for you to look at.
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
I got it..... :)

Dezbot said:
The forum won't let me post the file (it says it's not the right type), so here is what the log shows. Let me know if there is something else I need to do. Thank you!

All processes killed
========== OTL ==========
Service catchme stopped successfully!
Service catchme deleted successfully!
File C:\DOCUME~1\Desiree\LOCALS~1\Temp\catchme.sys File not found not found.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\\{03402f96-3dc7-4285-bc50-9e81fefafe43} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{03402f96-3dc7-4285-bc50-9e81fefafe43}\ deleted successfully.
C:\Program Files\AIM Toolbar\aimtb.dll moved successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\\{f0e98552-8e47-4c6c-9b3a-11ab0549f94d} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f0e98552-8e47-4c6c-9b3a-11ab0549f94d}\ deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\extensions\{E9A1DEE0-C623-4439-8932-001E7D17607D}\META-INF folder moved successfully.
C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\extensions\{E9A1DEE0-C623-4439-8932-001E7D17607D}\defaults\preferences folder moved successfully.
C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\extensions\{E9A1DEE0-C623-4439-8932-001E7D17607D}\defaults folder moved successfully.
C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\extensions\{E9A1DEE0-C623-4439-8932-001E7D17607D}\chrome folder moved successfully.
C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\extensions\{E9A1DEE0-C623-4439-8932-001E7D17607D} folder moved successfully.
C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\4shtxonn.default\extensions folder moved successfully.
C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\extensions folder moved successfully.
C:\Program Files\Mozilla Firefox\browser\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd} folder moved successfully.
File C:\Program Files\Mozilla Firefox\plugins\npdnu.dll not found.
File C:\Program Files\Mozilla Firefox\plugins\npdnupdater2.dll not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2A841F7A-A014-4DA5-B6D9-8B913DFB7A8C}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2A841F7A-A014-4DA5-B6D9-8B913DFB7A8C}\ deleted successfully.
C:\Program Files\Check Point Software Technologies LTD\zonealarm\1.8.11.11\bh\zonealarm.dll moved successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3049C3E9-B461-4BC5-8870-4C09146192CA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3049C3E9-B461-4BC5-8870-4C09146192CA}\ deleted successfully.
C:\Documents and Settings\All Users\Application Data\RealNetworks\RealDownloader\BrowserPlugins\IE\rndlbrowserrecordplugin.dll moved successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\ deleted successfully.
C:\Program Files\Java\jre7\bin\ssv.dll moved successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8A4A36C2-0535-4D2C-BD3D-496CB7EED6E3}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8A4A36C2-0535-4D2C-BD3D-496CB7EED6E3}\ deleted successfully.
C:\Program Files\CheckPoint\ZAForceField\Trustchecker\bin\TrustCheckerIEPlugin.dll moved successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AF69DE43-7D58-4638-B6FA-CE66B5AD205D}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{AF69DE43-7D58-4638-B6FA-CE66B5AD205D}\ deleted successfully.
C:\Program Files\Google\GoogleToolbarNotifier\5.7.8313.1002\swg.dll moved successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b0cda128-b425-4eef-a174-61a11ac5dbf8}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b0cda128-b425-4eef-a174-61a11ac5dbf8}\ deleted successfully.
File C:\Program Files\AIM Toolbar\aimtb.dll not found.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{d2ce3e00-f94a-4740-988e-03dc2f38c34f}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d2ce3e00-f94a-4740-988e-03dc2f38c34f}\ deleted successfully.
C:\Program Files\Microsoft\BingBar\BingExt.dll moved successfully.
Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DBC80044-A445-435b-BC74-9C25C1C588A9}\ deleted successfully.
C:\Program Files\Java\jre7\bin\jp2ssv.dll moved successfully.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{CCC7A320-B3CA-4199-B1A6-9F516DD69829} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CCC7A320-B3CA-4199-B1A6-9F516DD69829}\ not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\Locked deleted successfully.
Registry value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\\ConduitFloatingPlugin_kbemlhjodpfopddibpbppifmogphpmil deleted successfully.
C:\Documents and Settings\Desiree\Local Settings\Application Data\dt.dat moved successfully.
C:\Documents and Settings\LocalService\Local Settings\Application Data\WPFFontCache_v0400-S-1-5-21-1177238915-1965331169-725345543-1003-0.dat moved successfully.
C:\Documents and Settings\LocalService\Local Settings\Application Data\WPFFontCache_v0400-System.dat moved successfully.
C:\Documents and Settings\All Users\Application Data\Microsoft.SqlServer.Compact.400.32.bc moved successfully.
C:\Documents and Settings\Desiree\Local Settings\Application Data\prvlcl.dat moved successfully.
C:\Documents and Settings\Desiree\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini moved successfully.
========== COMMANDS ==========

[EMPTYTEMP]

User: All Users
->Flash cache emptied: 149 bytes

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes
->Flash cache emptied: 56504 bytes

User: Desiree
->Temp folder emptied: 2029599586 bytes
->Temporary Internet Files folder emptied: 94325499 bytes
->Java cache emptied: 1 bytes
->FireFox cache emptied: 134144162 bytes
->Google Chrome cache emptied: 6719595 bytes
->Opera cache emptied: 41951094 bytes
->Flash cache emptied: 397843 bytes

User: LocalService
->Temp folder emptied: 2046888 bytes
->Temporary Internet Files folder emptied: 15383671 bytes

User: NetworkService
->Temp folder emptied: 1980600 bytes
->Temporary Internet Files folder emptied: 334310532 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 2162283 bytes
%systemroot%\System32 .tmp files removed: 866833 bytes
%systemroot%\System32\dllcache .tmp files removed: 240640 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 301504594 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 376189949 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 33170 bytes
RecycleBin emptied: 0 bytes

Total Files Cleaned = 3,187.00 mb


OTL by OldTimer - Version 3.2.69.0 log created on 08092013_172020

Files\Folders moved on Reboot...
File\Folder C:\Documents and Settings\Desiree\Local Settings\Temp\Perflib_Perfdata_16c.dat not found!
File\Folder C:\Documents and Settings\Desiree\Local Settings\Temp\tmp8F4.tmp not found!
File\Folder C:\Documents and Settings\Desiree\Local Settings\Temp\tmp904.tmp not found!
File\Folder C:\Documents and Settings\Desiree\Local Settings\Temp\tmpA72.tmp not found!
File\Folder C:\Documents and Settings\Desiree\Local Settings\Temp\tmpA85.tmp not found!
C:\Documents and Settings\Desiree\Local Settings\Temp\~DF142B.tmp moved successfully.
C:\Documents and Settings\Desiree\Local Settings\Temporary Internet Files\Content.IE5\7VM5EXF3\i[1] moved successfully.
C:\WINDOWS\temp\ZLT06b94.TMP moved successfully.

PendingFileRenameOperations files...

Registry entries deleted on Reboot...


STEP 1: Run a scan with AdwCleaner

<ol><li>Download AdwCleaner from the below link.
<><a href="http://general-changelog-team.fr/fr/downloads/finish/20-outils-de-xplode/2-adwcleaner" target="_blank">ADWCLEANER DOWNLAOD LINK</a></> (This link will automatically download Security Check on your computer)</li>

<li>Close all open programs and internet browsers.</li>
<li>Double click on <>adwcleaner.exe</> to run the tool.</li>
<li>Click on <>Delete</>,then confirm each time with <>Ok</>.</li>
<li>Your computer will be rebooted automatically. A text file will open after the restart.</li>
<li>Please post the contents of that logfile with your next reply.</li>
<li>You can find the logfile at <>C:\AdwCleaner[S1].txt</> as well.</li>
</ol>
<hr/>

STEP 2: Run a scan with Junkware Removal Tool

Please download Junkware Removal Tool to your desktop from here
  • Turn off your antivirus software now to avoid potential conflicts
  • Double-click to run the tool. For Windows Vista or 7 users, right-click the file and select Run as Administrator
  • The tool will open and start scanning your system
  • Please be patient as this can take a while to complete depending on your system's specifications
  • On completion, a log (JRT.txt) will be saved to your desktop and will automatically open
  • Post the contents of JRT.txt into your next reply




Download Malwarebytes Anti-Rootkit from here to your Desktop
  • Unzip the contents to a folder on your Desktop.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Make sure there is a check next to Create Restore Point and click the Cleanup button to remove any threats. Reboot if prompted to do so.
  • After the reboot, perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If there are threats, click Cleanup once more and reboot.
  • When done, please post the two logs in the MBAR folder(mbar-log.txt and system-log.txt)



Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes' Anti-Malware
    • and Launch Malwarebytes' Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.
  • When it prompts you to try their 30-day trail, click decline
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt


 
Last edited by a moderator:

Dezbot

New Member
Thread author
Aug 9, 2013
11
I'm confused--do I need to run those programs again? I already did that when I first removed xvidly from my computer. Thank you!
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Please do this 3 steps


STEP 1: Run a scan with AdwCleaner

<ol><li>Download AdwCleaner from the below link.
<><a href="http://general-changelog-team.fr/fr/downloads/finish/20-outils-de-xplode/2-adwcleaner" target="_blank">ADWCLEANER DOWNLAOD LINK</a></> (This link will automatically download Security Check on your computer)</li>

<li>Close all open programs and internet browsers.</li>
<li>Double click on <>adwcleaner.exe</> to run the tool.</li>
<li>Click on <>Delete</>,then confirm each time with <>Ok</>.</li>
<li>Your computer will be rebooted automatically. A text file will open after the restart.</li>
<li>Please post the contents of that logfile with your next reply.</li>
<li>You can find the logfile at <>C:\AdwCleaner[S1].txt</> as well.</li>
</ol>
<hr/>

STEP 2: Run a scan with Junkware Removal Tool

Please download Junkware Removal Tool to your desktop from here
  • Turn off your antivirus software now to avoid potential conflicts
  • Double-click to run the tool. For Windows Vista or 7 users, right-click the file and select Run as Administrator
  • The tool will open and start scanning your system
  • Please be patient as this can take a while to complete depending on your system's specifications
  • On completion, a log (JRT.txt) will be saved to your desktop and will automatically open
  • Post the contents of JRT.txt into your next reply




Download Malwarebytes Anti-Rootkit from here to your Desktop
  • Unzip the contents to a folder on your Desktop.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Make sure there is a check next to Create Restore Point and click the Cleanup button to remove any threats. Reboot if prompted to do so.
  • After the reboot, perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If there are threats, click Cleanup once more and reboot.
  • When done, please post the two logs in the MBAR folder(mbar-log.txt and system-log.txt)



Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes' Anti-Malware
    • and Launch Malwarebytes' Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.
  • When it prompts you to try their 30-day trail, click decline
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt


 
Last edited by a moderator:

Dezbot

New Member
Thread author
Aug 9, 2013
11
Hi, Kuttus, here are the first two logs:

Adw:

# AdwCleaner v2.306 - Logfile created 08/12/2013 at 20:01:06
# Updated 19/07/2013 by Xplode
# Operating system : Microsoft Windows XP Service Pack 3 (32 bits)
# User : Desiree - HOME-PC
# Boot Mode : Normal
# Running from : C:\Documents and Settings\Desiree\My Documents\Downloads\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****

Deleted on reboot : C:\Program Files\Common Files\AVG Secure Search
Folder Deleted : C:\Documents and Settings\Desiree\Application Data\CheckPoint\ZoneAlarm LTD Toolbar

***** [Registry] *****


***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18702

[OK] Registry is clean.

-\\ Mozilla Firefox v22.0 (en-US)

File : C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\prefs.js

Deleted : user_pref("plugin.blocklisted.npviewpoint", true);

-\\ Google Chrome v28.0.1500.95

File : C:\Documents and Settings\Desiree\Local Settings\Application Data\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

-\\ Opera v12.2.1578.0

File : C:\Documents and Settings\Desiree\Application Data\Opera\Opera\operaprefs.ini

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [25439 octets] - [06/08/2013 20:09:05]
AdwCleaner[S1].txt - [25643 octets] - [06/08/2013 20:10:51]
AdwCleaner[S2].txt - [1383 octets] - [12/08/2013 20:01:06]

########## EOF - C:\AdwCleaner[S2].txt - [1443 octets] ##########


JRT:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 5.4.4 (08.12.2013:1)
OS: Microsoft Windows XP x86
Ran by Desiree on Mon 08/12/2013 at 20:33:30.78
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys



~~~ Files

Successfully deleted: [File] "C:\WINDOWS\wininit.ini"



~~~ Folders

Successfully deleted: [Folder] "C:\Documents and Settings\Desiree\Application Data\xvidly"
Successfully deleted: [Folder] "C:\Documents and Settings\Desiree\Local Settings\Application Data\cre"





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Mon 08/12/2013 at 20:54:02.56
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

Dezbot

New Member
Thread author
Aug 9, 2013
11
Here's the rest (sorry, scan was taking a long time and I had to go to bed) :) The anti-rootkit logs are attached, and here's the anti-malware log:

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2013.08.11.06

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Desiree :: HOME-PC [administrator]

8/13/2013 4:47:13 AM
mbam-log-2013-08-13 (04-47-13).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 220173
Time elapsed: 26 minute(s), 37 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)
 

Attachments

  • system-log.txt
    19.1 KB · Views: 96
  • mbar-log-2013-08-12 (21-00-10).txt
    2.1 KB · Views: 103

kuttus

Level 2
Verified
Oct 5, 2012
2,697
STEP 1: Run a HitmanPro scan
<ol>
<li><>Download the latest official version of HitmanPro</>.
<a href="http://www.surfright.nl/en/hitmanpro/" rel="nofollow" target="_blank"> <>HITMANPRO DOWNLOAD LINK</></a> <em>(This link will open a download page in a new window from where you can download HitmanPro)</em></li>
<li>Start HitmanPro by <>double clicking on the previously downloaded file.</> and then following the prompts.
<img src="http://malwaretips.com/images/removalguide/hpro4.png" alt="[Image: hitmanproscan4.png]" border="0" /></li>
<li>Once the scan is complete, a screen displaying all the malicious files that the program found will be shown as seen in the image below.After reviewing each malicious object click <>Next</> .
<img src="http://malwaretips.com/blogs/wp-content/uploads/2012/02/rsz_hpro5.png" alt="[Image: hitmanproscan5.png]" border="0" /></li>
<li>Click <>Activate free license</> to start the free 30 days trial and remove the malicious files.
<img src="http://malwaretips.com/images/removalguide/hpro6.png" alt="[Image: hitmanproscan6.png]" border="0" /></li>
<li>HitmanPro will now start removing the infected objects, and in some instances, may suggest a reboot in order to completely remove the malware from your system. In this scenario, always confirm the reboot action to be on the safe side.
</ol>
Add to your next reply, any log that HitmanPro might generate.
<hr />

STEP 2: Run a scan with ESET Online Scanner
<ol>
<li>Download ESET Online Scanner utility from the below link
<><a title="External link" href="http://download.eset.com/special/eos/esetsmartinstaller_enu.exe" rel="nofollow">ESET ONLINE SCANNER DOWNLOAD LINK</a></> <em>(This link will automatically download ESET Online Scanner on your computer.)</em></li>
<li>Double click on the Eset installer program (esetsmartinstaller_enu.exe).</li>
<li>Check <>Yes, I accept the Terms of Use</></li>
<li>Click the <>Start</> button.</li>
<li>Check <>Scan archives</></li>
<li>Push the <>Start</> button.</li>
<li>ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.</li>
<li>When the scan completes, push <>List of found threats</></li>
<li>Push <>Export to Text file </> and save the file to your desktop using a unique name, such as <>ESET Scan</>. Include the contents of this report in your next reply.Note - when ESET doesn't find any threats, no report will be created.</li>
<li>Push the <>back</> button.</li>
<li>Push <>Finish</></li>
</ol>
<hr />

STEP 3: Run a scan with Kaspersky Virus Removal Tool
<ol><li>Download Kaspersky Virus Removal Tool from the below link and then double click on it to start this utility.
<><a title="External link" href="http://www.kaspersky.com/antivirus-removal-tool?form=1" rel="nofollow">KASPERSKY VIRUS REMOVAL TOOL</a></> <em>(This link open an new webpage from where you can download Kaspersky Virus Removal Tool on your computer.)</em></li>
<li>Follow the onscreen prompts until it is installed</li>
<li>Click the Options button (the 'Gear' icon), then make sure only the following are ticked:
<ul>
<li><span style="color: #ff0000;">System Memory</span></li>
<li><span style="color: #ff0000;">Hidden startup objects</span></li>
<li><span style="color: #ff0000;">Disk boot sectors</span></li>
<li><span style="color: #ff0000;">Local Disk (C: )</span></li>
<li><span style="color: #ff0000;">Also any other drives (Removable that you may have)</span></li>
</ul>
</li>
<li>Then click on <>Actions</> on the left hand side</li>
<li>Click <>Select Action</>, then make sure both <>Disinfect</> and <>Delete if disinfection fails</> are ticked</li>
<li>Click on <>Automatic Scan</></li>
<li>Now click the <>Start Scanning</> button, to run the scan</li>
<li>After the scan is complete, click the reports button ('Paper icon', next to the 'Gear' icon) on the right hand side</li>
<li>Click <>Detected threats</> on the left</li>
<li>Now click the <>Save</> button, and save it as <>kaslog.txt</> to your <>Desktop</></li>
<li>Please attach kaslog.txt in your next reply.</li>
</ol>
<hr />
 
Last edited by a moderator:

Dezbot

New Member
Thread author
Aug 9, 2013
11
Hi, Kuttus, I am just now seeing this, as I was busy with visiting family. Will run as soon as I can. In addition to the browser hijacker, now one of the fans in my computer is dying, and I need to figure out which one before I can do any of this stuff (also need to make sure the HD is not dying). Will not be able to try any of this until my friend can come over this weekend and help me with the fan issue, as he recommends not running the computer much for the next week. Thank you for your patience and for all the help!! :)
 

Dezbot

New Member
Thread author
Aug 9, 2013
11
kuttus said:
Take your time. :)

Here are the first two. Eset is attached as a file (that scan took over 10 hours, yikes!), but it wouldn't let me attach the HitmanPro file, so here is the copy & paste (see note about Kapersky after the HitmanPro info):

Code:
HitmanPro 3.7.7.203
www.hitmanpro.com

   Computer name . . . . : HOME-PC
   Windows . . . . . . . : 5.1.3.2600.X86/2
   User name . . . . . . : HOME-PC\Desiree
   License . . . . . . . : Trial (10 days left)

   Scan date . . . . . . : 2013-08-27 13:53:04
   Scan mode . . . . . . : Normal
   Scan duration . . . . : 27m 29s
   Disk access mode  . . : Direct disk access (SRB)
   Cloud . . . . . . . . : Internet
   Reboot  . . . . . . . : No

   Threats . . . . . . . : 0
   Traces  . . . . . . . : 327

   Objects scanned . . . : 1,050,800
   Files scanned . . . . : 39,285
   Remnants scanned  . . : 420,113 files / 591,402 keys

Potential Unwanted Programs _________________________________________________

   HKLM\SOFTWARE\Classes\c\ (Claro) -> Deleted

Cookies _____________________________________________________________________

   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:ad.360yield.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:ad.auditude.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:ad.mlnadvertising.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:ads.glispa.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:ads.p161.net
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:ads.pubmatic.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:ads.undertone.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:adtechus.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:advertising.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:apmebf.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:ar.atwola.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:at.atwola.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:atdmt.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:atwola.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:bs.serving-sys.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:collective-media.net
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:doubleclick.net
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:interclick.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:invitemedia.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:media6degrees.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:revsci.net
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:ru4.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:serving-sys.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:statcounter.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:stats.paypal.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:tacoda.at.atwola.com
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:track.adform.net
   C:\Documents and Settings\Desiree\Application Data\Mozilla\Firefox\Profiles\gob53kom.default-1375844361031\cookies.sqlite:www.googleadservices.com
   C:\Documents and Settings\Desiree\Cookies\4P43E8OC.txt
   C:\Documents and Settings\Desiree\Cookies\8JLBJ5PT.txt
   C:\Documents and Settings\Desiree\Cookies\BCK28MI4.txt
   C:\Documents and Settings\Desiree\Cookies\D7331ZG6.txt
   C:\Documents and Settings\Desiree\Cookies\FPX078LS.txt
   C:\Documents and Settings\Desiree\Cookies\NPF0EL0D.txt
   C:\Documents and Settings\Desiree\Cookies\NTS9S0TD.txt
   C:\Documents and Settings\Desiree\Cookies\PCWBFR2X.txt
   C:\Documents and Settings\Desiree\Cookies\PULRB65L.txt
   C:\Documents and Settings\Desiree\Cookies\TL69T7ST.txt
   C:\Documents and Settings\Desiree\Cookies\UQDTFY5Q.txt
   C:\Documents and Settings\Desiree\Cookies\VKOYHXX3.txt

--------------------------------------
When I tried to run Kapersky, my firewall (Zone Alarm) prevented it from setting "GrpCnv" (I think that was the name) to run on start-up and also prevented it from accessing the internet. I then got an error message that the installation failed and then my computer abruptly rebooted. Microsoft reports that it was a "blue screen" error:

>>Stop (blue screen) error caused by a device or driver

You received this message because a hardware device, its driver, or related software has caused a stop error, also called a blue screen error. This type of error means the computer has shut down abruptly to protect itself from potential data corruption or loss. In this case, we were unable to detect the specific device or driver that caused the problem. <<

What should I do? A friend came by this weekend and did extensive tests on the hard drive to see why it takes 20 minutes to boot fully (we got it down to 14 minutes now, yeesh), and the hard drive tests showed that the drive is in good shape and operating normally. He suggested a clean install and start from scratch, as apparently, my hard drive is churning away and something's constantly running, but he couldn't find what it was (we're assuming it's my anti-virus and firewall). As you can see from the number of files I have, that is a daunting prospect! OTOH, I would be rid of all malware :) Thank you for your assistance and any advice you have on this.
 

Attachments

  • EsetScan.txt
    639 bytes · Views: 89

kuttus

Level 2
Verified
Oct 5, 2012
2,697
All this Log files seems good Only.........

STEP 1: Download and Run Windows Repair (all in one)

Download Windows Repair (all in one)

  • Install the program then run it.
  • Go to step 2 and allow it to run Disc check by clicking Do It
  • Go to step 3 and allow it to run SFC
  • Go to start repairs tab select advanced mode and click start.
  •  Check the box next to "Restart/Shutdown system when finished" and ensure the following is checked along with the default checks
    1. Reset File Permissions
    2. Register System Files
    3. Repair WMI
    4. Remove Policies Set By Infections
    5. Remove Temp Files
  •   Then click Start.
 

Dezbot

New Member
Thread author
Aug 9, 2013
11
kuttus said:
All this Log files seems good Only.........

STEP 1: Download and Run Windows Repair (all in one)

I don't know that it worked. Same probs booting up as before. I guess I need a clean install (or maybe to dump all the old programs I no longer use?).

Thanks again for helping me get the malware off!!
 

Attachments

  • _Windows_Repair_Log.txt
    11.5 KB · Views: 98

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top