
Ran LSP-Fix on Win7 64x - Now Unable to Load Any Webpage [Solved]
#16
Posted 04 January 2012 - 03:39 AM

#17
Posted 04 January 2012 - 03:41 AM

#18
Posted 04 January 2012 - 03:52 AM

#19
Posted 04 January 2012 - 04:02 AM

#20
Posted 04 January 2012 - 07:58 AM

Okay, thanks for that information.
We still have quite a bit of work to do. I would really like to try and get you back up and connected to the internet before we continue removing the malware as it'll give us more options.
I need to have you download and run another tool for me.
Farbar Service Scanner
Please download Farbar Service Scanner and run it on the computer with the issue.
- Make sure the following options are checked:
- Internet Services
- Windows Firewall
- System Restore
- Security Center
- Windows Update
- Press "Scan".
- It will create a log (FSS.txt) in the same directory the tool is run.
- Please copy and paste the log to your reply.
#21
Posted 04 January 2012 - 01:58 PM

Farbar Service Scanner
Ran by Mafu (administrator) on 04-01-2012 at 11:53:50
Microsoft Windows 7 Ultimate (X64)
Boot Mode: Normal
****************************************************************
Internet Services:
============
Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Yahoo IP is accessible.
Windows Firewall:
=============
MpsSvc Service is not running. Checking service configuration:
Checking Start type: Attention! Unable to retrieve start type of MpsSvc. The value does not exist.
Checking ImagePath: Attention! Unable to retrieve ImagePath of MpsSvc. The value does not exist.
Unable to retrieve ServiceDll of MpsSvc. The value does not exist.
mpsdrv Service is not running. Checking service configuration:
The start type of mpsdrv service is OK.
The ImagePath of mpsdrv service is OK.
Firewall Disabled Policy:
==================
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]
"EnableFirewall"=DWORD:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall"=DWORD:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile]
"EnableFirewall"=DWORD:0
System Restore:
============
SDRSVC Service is not running. Checking service configuration:
The start type of SDRSVC service is OK.
The ImagePath of SDRSVC service is OK.
The ServiceDll of SDRSVC service is OK.
VSS Service is not running. Checking service configuration:
The start type of VSS service is OK.
The ImagePath of VSS service is OK.
System Restore Disabled Policy:
========================
Security Center:
============
Windows Update:
===========
wuauserv Service is not running. Checking service configuration:
The start type of wuauserv service is OK.
The ImagePath of wuauserv service is OK.
The ServiceDll of wuauserv service is OK.
File Check:
========
C:\Windows\System32\nsisvc.dll => MD5 is legit
C:\Windows\System32\drivers\nsiproxy.sys => MD5 is legit
C:\Windows\System32\dhcpcore.dll => MD5 is legit
C:\Windows\System32\drivers\afd.sys => MD5 is legit
C:\Windows\System32\drivers\tdx.sys => MD5 is legit
C:\Windows\System32\Drivers\tcpip.sys => MD5 is legit
C:\Windows\System32\dnsrslvr.dll => MD5 is legit
C:\Windows\System32\mpssvc.dll
[2009-07-13 16:09] - [2009-07-13 17:41] - 0824832 ____A (Microsoft Corporation) AECAB449567D1846DAD63ECE49E893E3
C:\Windows\System32\bfe.dll
[2009-07-13 16:09] - [2009-07-13 17:40] - 0703488 ____A (Microsoft Corporation) 4992C609A6315671463E30F6512BC022
C:\Windows\System32\drivers\mpsdrv.sys => MD5 is legit
C:\Windows\System32\SDRSVC.dll
[2009-07-13 15:36] - [2009-07-13 17:41] - 0170496 ____A (Microsoft Corporation) 765A27C3279CE11D14CB9E4F5869FCA5
C:\Windows\System32\vssvc.exe
[2009-07-13 15:39] - [2009-07-13 17:39] - 1598976 ____A (Microsoft Corporation) 787898BF9FB6D7BD87A36E2D95C899BA
C:\Windows\System32\wscsvc.dll
[2011-04-03 22:30] - [2010-12-20 22:16] - 0097280 ____A (Microsoft Corporation) 8F9F3969933C02DA96EB0F84576DB43E
C:\Windows\System32\wbem\WMIsvc.dll => MD5 is legit
C:\Windows\System32\wuaueng.dll
[2009-07-13 16:36] - [2009-07-13 17:41] - 2418176 ____A (Microsoft Corporation) 38340204A2D0228F1E87740FC5E554A7
C:\Windows\System32\qmgr.dll
[2009-07-13 15:46] - [2009-07-13 17:41] - 0848384 ____A (Microsoft Corporation) 7F0C323FE3DA28AA4AA1BDA3F575707F
C:\Windows\System32\es.dll => MD5 is legit
C:\Windows\System32\cryptsvc.dll
[2009-07-13 15:49] - [2009-07-13 17:40] - 0175104 ____A (Microsoft Corporation) 8C57411B66282C01533CB776F98AD384
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit
**** End of log ****
#22
Posted 05 January 2012 - 01:39 AM

Back-Up Registry
First, we need to backup your registry:
Please go to Start > Run
Paste in the following line:
regedit /e c:\registrybackup.reg
Click OK.
It won't appear to be doing anything, that's normal.
Your mouse pointer may turn to an hour glass for a minute.
Please continue when it no longer has the hour glass.
NEXT:
Registry Export
I need some more information on a key in your registry. Please do the following.
You'll need to launch an elevated command prompt.
Press the Start button. type in cmd.exe and right click on it selecting Run as Administrator.
Copy/Paste the command below into the run dialog box and press OK:
reg export "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc" "%userprofile%\desktop\look.txt"
You should see a new file on your Desktop named look.txt. Please double click on the file to open it, and then post the contents of look.txt in this thread.
#23
Posted 05 January 2012 - 08:57 PM

Registry:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc\Parameters]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc\Parameters\PortKeywords]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc\Parameters\PortKeywords\DHCP]
"Collection"=hex:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc\Parameters\PortKeywords\RPC-EPMap]
"Collection"=hex:87,00,01,00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc\Parameters\PortKeywords\Teredo]
"Collection"=hex:
#24
Posted 05 January 2012 - 08:57 PM

#25
Posted 06 January 2012 - 12:25 AM

That's definitely interesting.Well my internet just kicked back in out of nowhere.. Haven't done anything but do what you told me to with the programs. Here's the log. Still getting redirected though.
Can you just confirm that you backed up your registry as instructed in my previous post?
#26
Posted 06 January 2012 - 12:51 AM

#27
Posted 06 January 2012 - 01:04 AM

#28
Posted 06 January 2012 - 01:08 AM

#29
Posted 06 January 2012 - 01:10 AM

Your logs seem to indicate that you are/were infected at one point with an infection known as ZAccess. This infection is known for causing issues with connecting to the internet.
ZeroAccess (Max++) Rootkit (aka: Sirefef) is a sophisticated rootkit that uses advanced technology to hide its presence in a system and can infect both x86 and x64 platforms. ZeroAccess is similar to the TDSS rootkit but has more self-protection mechanisms that can be used to disable anti-virus software resulting in "Access Denied" messages whenever you run a security application. For more specific information about this infection, please refer to:
- Dissecting the ZeroAccess Rootkit
- ZeroAccess / Max++ / Smiscer Crimeware Rootkit
- MAX++ sets its sights on x64 platforms
- ZeroAccess (Max++) Rootkit
- ZeroAccess Gets Another Update
- ZeroAccess – an advanced kernel mode rootkit
NEXT:

This type of infection allows hackers to access and remotely control your computer, log keystrokes, steal critical system information, and download and execute files without your knowledge.
If you do any banking or other financial transactions on the PC or if it contains any other sensitive information, then from a clean computer, change all passwords where applicable.
It would also be wise to contact those same financial institutions to appraise them of your situation.
I highly suggest you take a look at the two links provided below:
1. How Do I Handle Possible Identify Theft, Internet Fraud, and CC Fraud?
2. When should I re-format? How should I reinstall?
We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.
NEXT:
ZAccess messes with a bunch of settings, one of them can be the internet connection. Among many things this infection can do it appears it has messed with some of the settings for key items required for the use of the Windows Firewall.
The Farbar Service Scanner scan you ran seems to indicate an issue with a service named: MpsSvc
I suspect if you were to attempt to access the Windows Firewall you'd receive an error message about trying to do such. I'd actually like for you to try doing that now and see what happens when you try to do so.
I'm going to first ask that you try and run this Microsoft Fix It and see if that takes care of the issue with that key. I have a feeling it may not work properly, so I have an alternative route already planned in the event we need to utilize it.
After you run the Microsoft Fix It above, I need for you to reboot your computer, run a new OTL scan for me (i'll post instructions below) and then we'll see where we stand then. You should be aware you do have some malicious files still on your computer.
Registry Export
I need some more information on a key in your registry. Please do the following.
You'll need to launch an elevated command prompt.
Press the Start button. type in cmd.exe and right click on it selecting Run as Administrator.
Copy/Paste the command below into the run dialog box and press OK:
reg export "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc" "%userprofile%\desktop\look.txt"
You should see a new file on your Desktop named look.txt. Please double click on the file to open it, and then post the contents of look.txt in this thread.
NEXT:
OTL Custom Scan
We need to run an OTL Custom Scan
- Please reopen
on your desktop.
- Copy and Paste the following code into the
textbox.
netsvcs
drivers32
"%WinDir%\$NtUninstallKB*$."
hklm\software\clients\startmenuinternet|command /rs
hklm\software\clients\startmenuinternet|command /64 /rs
%USERPROFILE%\AppData\Local\Google\Chrome\User Data\*.* /s
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Install|LastSuccessTime /rs
- Push the Quick Scan button.
- A report will open. Copy and Paste that report in your next reply.
NEXT:
Farbar Service Scanner
Please re-run Farbar Service Scanner and run it on the computer with the issue.
- Make sure the following options are checked:
- Internet Services
- Windows Firewall
- System Restore
- Security Center
- Windows Update
- Press "Scan".
- It will create a log (FSS.txt) in the same directory the tool is run.
- Please copy and paste the log to your reply.
#30
Posted 06 January 2012 - 01:22 AM

The Microsoft fix failed with an error.
Here's the log of the Key export:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc\Parameters]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc\Parameters\PortKeywords]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc\Parameters\PortKeywords\DHCP]
"Collection"=hex:22,02,01,00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc\Parameters\PortKeywords\RPC-EPMap]
"Collection"=hex:87,00,01,00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MpsSvc\Parameters\PortKeywords\Teredo]
"Collection"=hex:
Similar Topics
1 user(s) are reading this topic
0 members, 1 guests, 0 anonymous users
As Featured On:






