1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Solved Computer Freezing Up; Script errors; etc....

Discussion in 'Malware and Virus Removal Archive' started by Jobin1, 2011/12/01.

  1. 2011/12/02
    Jobin1

    Jobin1 Well-Known Member Thread Starter

    Joined:
    2011/09/17
    Messages:
    75
    Likes Received:
    0
    All processes killed
    Error: Unable to interpret < > in the current context!
    ========== OTL ==========
    Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{02478D38-C3F9-4efb-9B51-7695ECA05670}\ not found.
    Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{465E08E7-F005-4389-980F-1D8764B3486C}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{465E08E7-F005-4389-980F-1D8764B3486C}\ not found.
    Registry value HKEY_USERS\S-1-5-21-682003330-1844237615-839522115-1003\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{6ADB0F93-1AA5-4BCF-9DF4-CEA689A3C111} deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6ADB0F93-1AA5-4BCF-9DF4-CEA689A3C111}\ not found.
    Registry key HKEY_USERS\S-1-5-21-682003330-1844237615-839522115-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\$talisma_url$\ deleted successfully.
    Registry key HKEY_USERS\S-1-5-21-682003330-1844237615-839522115-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\jmagroup.com\ deleted successfully.
    Registry key HKEY_USERS\S-1-5-21-682003330-1844237615-839522115-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\jmfamily.com\ deleted successfully.
    Registry key HKEY_USERS\S-1-5-21-682003330-1844237615-839522115-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\microsoft.com\ deleted successfully.
    Registry key HKEY_USERS\S-1-5-21-682003330-1844237615-839522115-1003\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\microsoft.com\ not found.
    Starting removal of ActiveX control Launcher
    Registry error reading value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\Launcher\DownloadInformation\\INF .
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\Launcher\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Launcher\ not found.
    C:\WINDOWS\~INSX362.EXE moved successfully.
    C:\WINDOWS\~INSX462.EXE moved successfully.
    C:\Documents and Settings\All Users\Application Data\Alwil Software\Avast5\log folder moved successfully.
    C:\Documents and Settings\All Users\Application Data\Alwil Software\Avast5 folder moved successfully.
    C:\Documents and Settings\All Users\Application Data\Alwil Software folder moved successfully.
    C:\Documents and Settings\Joe\Application Data\Panda Security\Panda Cloud Antivirus folder moved successfully.
    C:\Documents and Settings\Joe\Application Data\Panda Security folder moved successfully.
    C:\Documents and Settings\Joe\Application Data\Registry Mechanic folder moved successfully.
    C:\WINDOWS\Tasks\RegSERVO.job moved successfully.
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\\ "RefreshPC_is1" =| /E : value set successfully!
    ========== FILES ==========
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: Administrator
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: All Users

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Guest
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Java cache emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Joe
    ->Temp folder emptied: 494068934 bytes
    ->Temporary Internet Files folder emptied: 9108627 bytes
    ->Java cache emptied: 0 bytes
    ->Google Chrome cache emptied: 0 bytes
    ->Apple Safari cache emptied: 0 bytes
    ->Flash cache emptied: 456 bytes

    User: LocalService
    ->Temp folder emptied: 16384 bytes
    ->Temporary Internet Files folder emptied: 33170 bytes

    User: NetworkService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\dllcache .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 664 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 480.00 mb


    [EMPTYFLASH]

    User: Administrator
    ->Flash cache emptied: 0 bytes

    User: All Users

    User: Default User

    User: Guest
    ->Flash cache emptied: 0 bytes

    User: Joe
    ->Flash cache emptied: 0 bytes

    User: LocalService

    User: NetworkService

    Total Flash Files Cleaned = 0.00 mb


    OTL by OldTimer - Version 3.2.31.0 log created on 12022011_224236

    Files\Folders moved on Reboot...
    C:\Documents and Settings\Joe\Local Settings\Temporary Internet Files\Content.IE5\H5C3ZVQO\101104-active-computer-freezing-up-script-errors-etc-2[1].html moved successfully.
    C:\Documents and Settings\Joe\Local Settings\Temporary Internet Files\Content.IE5\26VUER2J\7407185e[1].txt moved successfully.
    C:\Documents and Settings\Joe\Local Settings\Temporary Internet Files\Content.IE5\26VUER2J\fastbutton[1].htm moved successfully.
    C:\Documents and Settings\Joe\Local Settings\Temporary Internet Files\Content.IE5\26VUER2J\like[1].htm moved successfully.
    C:\Documents and Settings\Joe\Local Settings\Temporary Internet Files\AntiPhishing\2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2.dat moved successfully.
    File\Folder C:\Documents and Settings\LocalService\Local Settings\Temp\Perflib_Perfdata_660.dat not found!

    Registry entries deleted on Reboot...
     
  2. 2011/12/02
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116

  3. to hide this advert.

  4. 2011/12/02
    Jobin1

    Jobin1 Well-Known Member Thread Starter

    Joined:
    2011/09/17
    Messages:
    75
    Likes Received:
    0
    ESET Scan 56% completed. Will post results when finished.
     
  5. 2011/12/03
    Jobin1

    Jobin1 Well-Known Member Thread Starter

    Joined:
    2011/09/17
    Messages:
    75
    Likes Received:
    0
    C:\Documents and Settings\Joe\Application Data\AVG\Rescue\PC Tuneup 2011\101030130851109.rsc multiple threats deleted - quarantined
    C:\Documents and Settings\Joe\Desktop\Downloads\Stephen_Covey_-_First_Things_First.rar a variant of Win32/Injector.AHZ trojan deleted - quarantined
    C:\Program Files\Adobe Photo Downloader Removal Tool[1]\Adobe-Photo-Downloader-Removal-Tool[1].exe a variant of Win32/SecurityStronghold application cleaned by deleting - quarantined
    C:\Qoobox\Quarantine\C\Program Files\Search Toolbar\SearchToolbar.dll.vir Win32/Toolbar.Zugo application cleaned by deleting - quarantined
    C:\System Volume Information\_restore{31682688-A032-4559-B91C-AD5AA080D447}\RP248\A0044473.exe a variant of Win32/InstallCore.D application cleaned by deleting - quarantined
    C:\System Volume Information\_restore{31682688-A032-4559-B91C-AD5AA080D447}\RP280\A0046257.exe a variant of Win32/InstallCore.D application cleaned by deleting - quarantined
    C:\System Volume Information\_restore{31682688-A032-4559-B91C-AD5AA080D447}\RP294\A0046860.dll a variant of Win32/Adware.180Solutions application cleaned by deleting - quarantined
    C:\System Volume Information\_restore{31682688-A032-4559-B91C-AD5AA080D447}\RP294\A0046862.exe a variant of Win32/Adware.HotBar.E application deleted - quarantined
    C:\System Volume Information\_restore{31682688-A032-4559-B91C-AD5AA080D447}\RP304\A0050416.dll Win32/Toolbar.Zugo application cleaned by deleting - quarantined
    C:\System Volume Information\_restore{31682688-A032-4559-B91C-AD5AA080D447}\RP313\A0050775.exe a variant of Win32/SecurityStronghold application cleaned by deleting - quarantined
     
  6. 2011/12/03
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Your computer is clean [​IMG]

    1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

    Run OTL

    • Under the Custom Scans/Fixes box at the bottom, paste in the following:

    Code:
    :OTL
    :Commands
    [purity]
    [emptytemp]
    [EMPTYFLASH]
    [CLEARALLRESTOREPOINTS]
    [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • Post resulting log.

    2. Now, we'll remove all tools, we used during our cleaning process

    Clean up with OTL:

    • Double-click OTL.exe to start the program.
    • Close all other programs apart from OTL as this step will require a reboot
    • On the OTL main screen, press the CLEANUP button
    • Say Yes to the prompt and then allow the program to reboot your computer.

    If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

    3. Make sure, Windows Updates are current.

    4. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

    7. Run Temporary File Cleaner (TFC) weekly.

    8. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

    9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
    The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

    10. (Windows XP only) Run defrag at your convenience.

    11. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

    12. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

    13. Please, let me know, how your computer is doing.
     
  7. 2011/12/03
    Jobin1

    Jobin1 Well-Known Member Thread Starter

    Joined:
    2011/09/17
    Messages:
    75
    Likes Received:
    0
    All processes killed
    Error: Unable to interpret <Code: > in the current context!
    ========== OTL ==========
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: Administrator
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: All Users

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Guest
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Java cache emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Joe
    ->Temp folder emptied: 976135 bytes
    ->Temporary Internet Files folder emptied: 41553439 bytes
    ->Java cache emptied: 0 bytes
    ->Google Chrome cache emptied: 0 bytes
    ->Apple Safari cache emptied: 0 bytes
    ->Flash cache emptied: 566 bytes

    User: LocalService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 33170 bytes

    User: NetworkService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 33170 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\dllcache .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 19225 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 44160 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 41.00 mb


    [EMPTYFLASH]

    User: Administrator
    ->Flash cache emptied: 0 bytes

    User: All Users

    User: Default User

    User: Guest
    ->Flash cache emptied: 0 bytes

    User: Joe
    ->Flash cache emptied: 0 bytes

    User: LocalService

    User: NetworkService

    Total Flash Files Cleaned = 0.00 mb

    Restore points cleared and new OTL Restore Point set!

    OTL by OldTimer - Version 3.2.31.0 log created on 12032011_210116

    Files\Folders moved on Reboot...
    C:\Documents and Settings\Joe\Local Settings\Temporary Internet Files\Content.IE5\IOD0Q700\fastbutton[1].htm moved successfully.
    C:\Documents and Settings\Joe\Local Settings\Temporary Internet Files\Content.IE5\IOD0Q700\like[1].htm moved successfully.
    C:\Documents and Settings\Joe\Local Settings\Temporary Internet Files\Content.IE5\GQ75OSG4\101104-active-computer-freezing-up-script-errors-etc-2[1].html moved successfully.
    C:\Documents and Settings\Joe\Local Settings\Temporary Internet Files\AntiPhishing\2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2.dat moved successfully.

    Registry entries deleted on Reboot...
     
  8. 2011/12/03
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Whenever ready.
     
  9. 2011/12/03
    Jobin1

    Jobin1 Well-Known Member Thread Starter

    Joined:
    2011/09/17
    Messages:
    75
    Likes Received:
    0
    I changed all passwords. I tried to do a microsoft windows update and I a message that said: This website has encountered a problem. I am also noticing a message that comes up everytime I try to install something: Windows Installer cannot access the file or is not installer correctly. I manually have to start the insatller in the services tab. When I re-boot the computer it takes a long time to shut down and restart.
     
  10. 2011/12/03
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    In this forum, we make sure, your computer is free of malware and your computer is clean :)
    Because the access to malware forum is very limited, your best option is to create new topic about your current issue, at Windows section.
    You'll get more attention.
     
  11. 2011/12/03
    Jobin1

    Jobin1 Well-Known Member Thread Starter

    Joined:
    2011/09/17
    Messages:
    75
    Likes Received:
    0
    Thank You Broni for your help in cleaning everything up. I appreciate it.
     
  12. 2011/12/03
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    You're very welcome [​IMG]
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.