Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virus from email


  • Please log in to reply
11 replies to this topic

#1 Jordan91

Jordan91

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 17 July 2011 - 07:08 AM

I got an email from "Customer Service 833" (manager_080@isiwesternunion.com)
from western union.
I normally don't even look at these but there was a file attached to the email , so my curiosity jumped in , the email scanner showed that the file was clean.
The name of the file was "wu_personal-0509611.pif" ( the numbers are random , i know it cause i got a 2nd email now )
So i downloaded it , and tried to open it ( i now see its a *.pif file , i actually thought it was a *.pdf , anyway i don't think that changes a thing )
and nothing happened , then suddenly a program started scanning my computer , i don't remember the exact name but it was something like "Windows 7 scanner/defender" , after that activated , i couldn't open any pages , that program claimed that its too dangerous to browse until i buy it.
So i had no internet access.

From then on i tried to restart my PC , did that , but then the program started up again , no internet again , and i couldn't open *.exe files.
Then I right clicked on the task bar and pressed "start task manager" , and it said that it couldn't find tskmngr.exe , by then i was going bananas.
But i am using windows 7 , so i pressed CTRL+ALT+DEL , and the menu with sleep/shutdown/hibernate/task manager showed , this time i had luck and the task manager actually ran. I found a program ll?.exe ( the ? is for a letter , i just don't remember the letter , something like lle.exe or something ).
I stopped the process, but after 5 seconds it restarted , i right clicked and found the path of the ll?.exe file , deleted it , and the program didn't start again.

I have my internet back but i don't think i am clear of this virus or what ever it was.
The scan with nod32 didn't find a thing but that doesn't guarantee me anything , cause i scanned during the infection , and it was the same .

PS , here is a picture i found on the internet , i think its closest to the program that started on my pc
http://www.precisesecurity.com/wp-content/uploads/2010/11/vista-security-2011.jpg but instead of "Vista" it said "Windows 7".

EDIT : and i forgot to mention , in safe mode with internet , the program still stared , heck in safe mode only if i remember right it started too. And i also tried to rollback the pc but all rollback/restore points were deleted.

Edited by Jordan91, 17 July 2011 - 07:22 AM.


BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:30 PM

Posted 17 July 2011 - 11:01 AM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 Jordan91

Jordan91
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 18 July 2011 - 07:11 AM

checkup
---------------------------------------------------------------------------------------------------------------------------

Results of screen317's Security Check version 0.99.7
Windows 7 Service Pack 1 (UAC is disabled!)
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Windows Firewall Enabled!
ESET NOD32 Antivirus
WMI entry may not exist for antivirus; attempting automatic update.
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
TuneUp Utilities 2011
TuneUp Utilities Language Pack (en-US)
TuneUp Utilities 2011
Java™ 6 Update 23
Out of date Java installed!
Adobe Flash Player 10.3.181.26
Adobe Reader 8.1.1
Out of date Adobe Reader installed!
````````````````````````````````
Process Check:
objlist.exe by Laurent

``````````End of Log````````````
----------------------------------------------------------------------------------------------------------------------------





Result
-----------------------------------------------------------------------------------------------------------------------------
MiniToolBox by Farbar
Ran by ForTheWind (administrator) on 18-07-2011 at 14:54:48
Windows 7 Ultimate Service Pack 1 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.
========================= Hosts content: =================================

# Copyright © 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

# localhost name resolution is handled within DNS itself.
# 127.0.0.1 localhost
# ::1 localhost

========================= IP Configuration: ================================

# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled
add route prefix=0.0.0.0/0 interface="Wireless Network Connection 3" nexthop=192.168.1.1 publish=Yes
add route prefix=0.0.0.0/0 interface="Hamachi" nexthop=5.0.0.1 publish=Yes
add route prefix=0.0.0.0/0 interface="Local Area Connection" nexthop=192.168.1.1 publish=Yes
set interface interface="Hamachi" forwarding=disabled advertise=disabled metric=9000 siteprefixlength=0 nud=disabled routerdiscovery=disabled managedaddress=disabled otherstateful=disabled weakhostsend=disabled weakhostreceive=disabled ignoredefaultroutes=disabled advertisedrouterlifetime=0 advertisedefaultroute=disabled currenthoplimit=0 forcearpndwolpattern=disabled enabledirectedmacwolpattern=disabled
add address name="Wireless Network Connection 3" address=192.168.1.6 mask=255.255.255.0
add address name="VirtualBox Host-Only Network" address=192.168.56.1 mask=255.255.255.0
add address name="Local Area Connection" address=192.168.1.213 mask=255.255.255.0


popd
# End of IPv4 configuration



Windows IP Configuration

Host Name . . . . . . . . . . . . : ForTheWind-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Tunngle:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : TAP-Win32 Adapter V9 (Tunngle)
Physical Address. . . . . . . . . : 00-FF-5D-2A-FE-A8
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Wireless Network Connection 2:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft Virtual WiFi Miniport Adapter
Physical Address. . . . . . . . . : 1C-65-9D-78-1D-2F
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Local Area Connection 2:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Broadcom Virtual Wireless Adapter
Physical Address. . . . . . . . . : 1C-65-9D-78-1D-2F
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Wireless Network Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : DW1501 Wireless-N WLAN Half-Mini Card
Physical Address. . . . . . . . . : 1C-65-9D-78-1D-2F
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek PCIe FE Family Controller
Physical Address. . . . . . . . . : F0-4D-A2-AA-87-61
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::5cdc:416d:9921:bd52%10(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.213(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 250629538
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-14-B7-BE-F4-F0-4D-A2-AA-87-61
DNS Servers . . . . . . . . . . . : 192.168.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter VirtualBox Host-Only Network:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : VirtualBox Host-Only Ethernet Adapter
Physical Address. . . . . . . . . : 08-00-27-00-08-27
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::d11b:ad4b:53e7:6b18%21(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.56.1(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . :
DHCPv6 IAID . . . . . . . . . . . : 973602855
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-14-B7-BE-F4-F0-4D-A2-AA-87-61
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Hamachi:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Hamachi Network Interface
Physical Address. . . . . . . . . : 7A-79-F7-90-8D-DC
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::2d4c:6dd1:abb7:6d8c%30(Preferred)
IPv4 Address. . . . . . . . . . . : 5.135.186.67(Preferred)
Subnet Mask . . . . . . . . . . . : 255.0.0.0
Lease Obtained. . . . . . . . . . : Monday, July 18, 2011 2:40:03 PM
Lease Expires . . . . . . . . . . : Tuesday, July 17, 2012 2:42:10 PM
Default Gateway . . . . . . . . . : 5.0.0.1
DHCP Server . . . . . . . . . . . : 5.0.0.1
DHCPv6 IAID . . . . . . . . . . . : 1064991223
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-14-B7-BE-F4-F0-4D-A2-AA-87-61
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter isatap.{3F4A205D-7A56-4CD2-B3DF-3AAC7A3FB750}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{FB2F01D0-AAD3-45B7-BF72-C24B2771DC69}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter 6TO4 Adapter:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft 6to4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2002:587:ba43::587:ba43(Preferred)
Default Gateway . . . . . . . . . : 2002:c058:6301::c058:6301
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Disabled

Tunnel adapter isatap.{5D2AFEA8-3DD3-4F82-BE23-816733BB73AB}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #3
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{456C208A-1065-4743-BDBF-74B37CC044D6}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #4
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Teredo Tunneling Pseudo-Interface:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{3CC261BD-D589-4E32-9797-FD4BFBD8A0F1}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #5
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{BFC8B907-767C-447D-8808-2316061EABE3}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #6
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{E0365524-DD5A-4209-ABC5-EF9224BB6D18}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #7
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Server: UnKnown
Address: 192.168.1.1

Name: google.com
Addresses: 209.85.148.147
209.85.148.99
209.85.148.103
209.85.148.104
209.85.148.105
209.85.148.106


Pinging google.com [209.85.148.147] with 32 bytes of data:
Reply from 209.85.148.147: bytes=32 time=45ms TTL=56
Reply from 209.85.148.147: bytes=32 time=42ms TTL=56

Ping statistics for 209.85.148.147:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 42ms, Maximum = 45ms, Average = 43ms
Server: UnKnown
Address: 192.168.1.1

DNS request timed out.
timeout was 2 seconds.
Name: yahoo.com
Addresses: 67.195.160.76
69.147.125.65
72.30.2.43
98.137.149.56
209.191.122.70


Pinging yahoo.com [67.195.160.76] with 32 bytes of data:
Reply from 67.195.160.76: bytes=32 time=143ms TTL=55
Reply from 67.195.160.76: bytes=32 time=145ms TTL=55

Ping statistics for 67.195.160.76:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 143ms, Maximum = 145ms, Average = 144ms

Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
16...00 ff 5d 2a fe a8 ......TAP-Win32 Adapter V9 (Tunngle)
15...1c 65 9d 78 1d 2f ......Microsoft Virtual WiFi Miniport Adapter
13...1c 65 9d 78 1d 2f ......Broadcom Virtual Wireless Adapter
12...1c 65 9d 78 1d 2f ......DW1501 Wireless-N WLAN Half-Mini Card
10...f0 4d a2 aa 87 61 ......Realtek PCIe FE Family Controller
21...08 00 27 00 08 27 ......VirtualBox Host-Only Ethernet Adapter
30...7a 79 f7 90 8d dc ......Hamachi Network Interface
1...........................Software Loopback Interface 1
38...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
36...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2
11...00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter
32...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3
34...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #4
14...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
37...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #5
35...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #6
33...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #7
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 5.0.0.1 5.135.186.67 9256
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.213 276
5.0.0.0 255.0.0.0 On-link 5.135.186.67 9256
5.135.186.67 255.255.255.255 On-link 5.135.186.67 9256
5.255.255.255 255.255.255.255 On-link 5.135.186.67 9256
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.1.0 255.255.255.0 On-link 192.168.1.213 276
192.168.1.213 255.255.255.255 On-link 192.168.1.213 276
192.168.1.255 255.255.255.255 On-link 192.168.1.213 276
192.168.56.0 255.255.255.0 On-link 192.168.56.1 276
192.168.56.1 255.255.255.255 On-link 192.168.56.1 276
192.168.56.255 255.255.255.255 On-link 192.168.56.1 276
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 5.135.186.67 9256
224.0.0.0 240.0.0.0 On-link 192.168.56.1 276
224.0.0.0 240.0.0.0 On-link 192.168.1.213 276
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 5.135.186.67 9256
255.255.255.255 255.255.255.255 On-link 192.168.56.1 276
255.255.255.255 255.255.255.255 On-link 192.168.1.213 276
===========================================================================
Persistent Routes:
Network Address Netmask Gateway Address Metric
0.0.0.0 0.0.0.0 192.168.1.1 Default
0.0.0.0 0.0.0.0 5.0.0.1 Default
0.0.0.0 0.0.0.0 192.168.1.1 Default
===========================================================================

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
11 1125 ::/0 2002:c058:6301::c058:6301
1 306 ::1/128 On-link
11 1025 2002::/16 On-link
11 281 2002:587:ba43::587:ba43/128
On-link
30 276 fe80::/64 On-link
21 276 fe80::/64 On-link
10 276 fe80::/64 On-link
30 276 fe80::2d4c:6dd1:abb7:6d8c/128
On-link
10 276 fe80::5cdc:416d:9921:bd52/128
On-link
21 276 fe80::d11b:ad4b:53e7:6b18/128
On-link
1 306 ff00::/8 On-link
30 276 ff00::/8 On-link
21 276 ff00::/8 On-link
10 276 ff00::/8 On-link
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/18/2011 02:35:39 PM) (Source: RasClient) (User: )
Description: CoId={EF3DA94A-116E-4384-992B-85F1280CE6B2}: The user ForTheWind-PC\ForTheWind dialed a connection named rad which has failed. The error code returned on failure is 651.

Error: (07/18/2011 02:34:18 PM) (Source: RasClient) (User: )
Description: CoId={DBB4AFBD-F109-4F0C-AD82-6655ACFF587A}: The user ForTheWind-PC\ForTheWind dialed a connection named rad which has failed. The error code returned on failure is 651.

Error: (07/18/2011 02:33:57 PM) (Source: RasClient) (User: )
Description: CoId={B4D8FC58-A9CD-4CA6-BB04-B45F55183C53}: The user ForTheWind-PC\ForTheWind dialed a connection named rad which has failed. The error code returned on failure is 0.

Error: (07/18/2011 02:32:44 PM) (Source: RasClient) (User: )
Description: CoId={29CCFA26-656B-4299-A54B-C797B599A398}: The user ForTheWind-PC\ForTheWind dialed a connection named rad which has failed. The error code returned on failure is 0.

Error: (07/18/2011 10:09:24 AM) (Source: RasClient) (User: )
Description: CoId={2D152414-3CBE-46BA-8A4F-8B46C7D76697}: The user ForTheWind-PC\ForTheWind dialed a connection named rad which has failed. The error code returned on failure is 651.

Error: (07/18/2011 10:08:03 AM) (Source: RasClient) (User: )
Description: CoId={776AFC3C-F636-44A6-8BEF-40C59903A547}: The user ForTheWind-PC\ForTheWind dialed a connection named rad which has failed. The error code returned on failure is 651.

Error: (07/18/2011 10:06:42 AM) (Source: RasClient) (User: )
Description: CoId={A7798D20-8432-469D-84F0-5D32661A673E}: The user ForTheWind-PC\ForTheWind dialed a connection named rad which has failed. The error code returned on failure is 651.

Error: (07/18/2011 10:05:21 AM) (Source: RasClient) (User: )
Description: CoId={4F3105A1-C95C-41A3-BF64-7F1357F953D0}: The user ForTheWind-PC\ForTheWind dialed a connection named rad which has failed. The error code returned on failure is 651.

Error: (07/18/2011 09:52:56 AM) (Source: RasClient) (User: )
Description: CoId={9904F569-7F9C-488B-9D25-1CFB3B44663F}: The user ForTheWind-PC\ForTheWind dialed a connection named rad which has failed. The error code returned on failure is 0.

Error: (07/18/2011 09:48:38 AM) (Source: RasClient) (User: )
Description: CoId={99399FC5-4AF6-42FB-BFCA-63FFB1F8AE7B}: The user ForTheWind-PC\ForTheWind dialed a connection named rad which has failed. The error code returned on failure is 0.


System errors:
=============
Error: (07/18/2011 02:40:53 PM) (Source: Service Control Manager) (User: )
Description: The HomeGroup Provider service depends on the Function Discovery Provider Host service which failed to start because of the following error:
%%1058

Error: (07/18/2011 02:40:53 PM) (Source: Service Control Manager) (User: )
Description: The HomeGroup Provider service depends on the Function Discovery Provider Host service which failed to start because of the following error:
%%1058

Error: (07/18/2011 02:40:47 PM) (Source: Service Control Manager) (User: )
Description: The HomeGroup Provider service depends on the Function Discovery Provider Host service which failed to start because of the following error:
%%1058

Error: (07/18/2011 02:40:46 PM) (Source: Service Control Manager) (User: )
Description: The HomeGroup Provider service depends on the Function Discovery Provider Host service which failed to start because of the following error:
%%1058

Error: (07/18/2011 02:37:59 PM) (Source: Service Control Manager) (User: )
Description: The HomeGroup Provider service depends on the Function Discovery Provider Host service which failed to start because of the following error:
%%1058

Error: (07/18/2011 02:37:58 PM) (Source: Service Control Manager) (User: )
Description: The HomeGroup Provider service depends on the Function Discovery Provider Host service which failed to start because of the following error:
%%1058

Error: (07/18/2011 02:33:34 PM) (Source: Service Control Manager) (User: )
Description: The HomeGroup Provider service depends on the Function Discovery Provider Host service which failed to start because of the following error:
%%1058

Error: (07/18/2011 02:33:30 PM) (Source: Service Control Manager) (User: )
Description: The HomeGroup Provider service depends on the Function Discovery Provider Host service which failed to start because of the following error:
%%1058

Error: (07/18/2011 02:31:51 PM) (Source: Service Control Manager) (User: )
Description: The HomeGroup Provider service depends on the Function Discovery Provider Host service which failed to start because of the following error:
%%1058

Error: (07/18/2011 02:31:47 PM) (Source: Service Control Manager) (User: )
Description: The HomeGroup Provider service depends on the Function Discovery Provider Host service which failed to start because of the following error:
%%1058


Microsoft Office Sessions:
=========================
Error: (07/18/2011 02:35:39 PM) (Source: RasClient)(User: )
Description: {EF3DA94A-116E-4384-992B-85F1280CE6B2}ForTheWind-PC\ForTheWindrad651

Error: (07/18/2011 02:34:18 PM) (Source: RasClient)(User: )
Description: {DBB4AFBD-F109-4F0C-AD82-6655ACFF587A}ForTheWind-PC\ForTheWindrad651

Error: (07/18/2011 02:33:57 PM) (Source: RasClient)(User: )
Description: {B4D8FC58-A9CD-4CA6-BB04-B45F55183C53}ForTheWind-PC\ForTheWindrad0

Error: (07/18/2011 02:32:44 PM) (Source: RasClient)(User: )
Description: {29CCFA26-656B-4299-A54B-C797B599A398}ForTheWind-PC\ForTheWindrad0

Error: (07/18/2011 10:09:24 AM) (Source: RasClient)(User: )
Description: {2D152414-3CBE-46BA-8A4F-8B46C7D76697}ForTheWind-PC\ForTheWindrad651

Error: (07/18/2011 10:08:03 AM) (Source: RasClient)(User: )
Description: {776AFC3C-F636-44A6-8BEF-40C59903A547}ForTheWind-PC\ForTheWindrad651

Error: (07/18/2011 10:06:42 AM) (Source: RasClient)(User: )
Description: {A7798D20-8432-469D-84F0-5D32661A673E}ForTheWind-PC\ForTheWindrad651

Error: (07/18/2011 10:05:21 AM) (Source: RasClient)(User: )
Description: {4F3105A1-C95C-41A3-BF64-7F1357F953D0}ForTheWind-PC\ForTheWindrad651

Error: (07/18/2011 09:52:56 AM) (Source: RasClient)(User: )
Description: {9904F569-7F9C-488B-9D25-1CFB3B44663F}ForTheWind-PC\ForTheWindrad0

Error: (07/18/2011 09:48:38 AM) (Source: RasClient)(User: )
Description: {99399FC5-4AF6-42FB-BFCA-63FFB1F8AE7B}ForTheWind-PC\ForTheWindrad0


========================= Memory info: ===================================

Percentage of memory in use: 38%
Total physical RAM: 3062.69 MB
Available physical RAM: 1889.11 MB
Total Pagefile: 6123.66 MB
Available Pagefile: 4686.51 MB
Total Virtual: 2047.88 MB
Available Virtual: 1934.55 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:97.56 GB) (Free:27.58 GB) NTFS
2 Drive d: () (Fixed) (Total:498.51 GB) (Free:179.16 GB) NTFS

========================= Users: ========================================

User accounts for \\FORTHEWIND-PC

Administrator ForTheWind Guest


== End of log ==
---------------------------------------------------------------------------------------------------------------------------------



mbam-log-2011-07-18(13-40-40)
---------------------------------------------------------------------------------------------------------------------------------
Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7189

Windows 6.1.7601 Service Pack 1
Internet Explorer 9.0.8112.16421

7/18/2011 1:40:40 PM
mbam-log-2011-07-18 (13-40-40).txt

Scan type: Quick scan
Objects scanned: 184726
Time elapsed: 11 minute(s), 44 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 7
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3620626167 (Trojan.FakeAlert) -> Value: 3620626167 -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
c:\program files\funwebproducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\screensaver (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\funwebproducts\screensaver\Images (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\1.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Settings (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Files Infected:
c:\Users\forthewind\Desktop\tuneup utilities 2011 keygen.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
c:\Windows\box_cfostask.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
c:\program files\mywebsearch\bar\Settings\s_pid.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.

#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:30 PM

Posted 18 July 2011 - 11:26 AM

...and GMER...

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 Jordan91

Jordan91
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 18 July 2011 - 11:58 AM

gmer


GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-07-18 14:31:35
Windows 6.1.7601 Service Pack 1 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 ST9640320AS rev.0001DEM1
Running: g168ttoz.exe; Driver: C:\Users\FORTHE~1\AppData\Local\Temp\awlirfoc.sys


---- System - GMER 1.0.15 ----

SSDT \SystemRoot\system32\drivers\PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwCreateProcess [0x8B234CDE]
SSDT \SystemRoot\system32\drivers\PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwCreateProcessEx [0x8B234ED0]
SSDT \SystemRoot\system32\drivers\PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwCreateUserProcess [0x8B2350D8]
SSDT \SystemRoot\system32\drivers\PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwTerminateProcess [0x8B234984]

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!ZwSaveKey + 13C1 82E94339 1 Byte [06]
.text ntkrnlpa.exe!KiDispatchInterrupt + 5A2 82ECDD52 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
.text ntkrnlpa.exe!KeRemoveQueueEx + 11E3 82ED4ED8 8 Bytes [DE, 4C, 23, 8B, D0, 4E, 23, ...]
.text ntkrnlpa.exe!KeRemoveQueueEx + 121B 82ED4F10 1 Byte [D8]
.text ntkrnlpa.exe!KeRemoveQueueEx + 121B 82ED4F10 4 Bytes [D8, 50, 23, 8B]
.text ntkrnlpa.exe!KeRemoveQueueEx + 166F 82ED5364 4 Bytes [84, 49, 23, 8B]
.text C:\Windows\system32\DRIVERS\atikmdag.sys section is writeable [0x94031000, 0x38E905, 0xE8000020]

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe[492] kernel32.dll!SetUnhandledExceptionFilter 75F4F4FB 4 Bytes [C2, 04, 00, 00]
.text C:\Program Files\OO Software\Defrag\oodag.exe[2172] kernel32.dll!SetUnhandledExceptionFilter 75F4F4FB 5 Bytes JMP 00402FB0 C:\Program Files\OO Software\Defrag\oodag.exe (O&O Defrag Agent (Win32)/O&O Software GmbH)
.text C:\Program Files\Tunngle\TnglCtrl.exe[2408] ntdll.dll!DbgBreakPoint 771640F0 1 Byte [90]
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] kernel32.dll!IsDebuggerPresent 75F47DD2 5 Bytes JMP 0060794C C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] kernel32.dll!DeviceIoControl 75F4B925 5 Bytes JMP 0060800C C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] ole32.dll!CoCreateInstance 75CB9D0B 5 Bytes JMP 00606EF4 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] USER32.dll!ChangeDisplaySettingsExA 7566627A 5 Bytes JMP 00607FB4 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] USER32.dll!ChangeDisplaySettingsExW 7568FA39 5 Bytes JMP 00607FE0 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegOpenKeyA 75E6CC15 5 Bytes JMP 00607C38 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegCreateKeyA 75E6CD01 5 Bytes JMP 00607998 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegQueryValueA 75E6CE12 7 Bytes JMP 00607D98 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegDeleteValueW 75E6CF31 5 Bytes JMP 00607AFC C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegEnumValueA 75E6CF49 5 Bytes JMP 00607BB0 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegQueryInfoKeyA 75E6E143 5 Bytes JMP 00607D00 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegDeleteKeyW 75E71272 2 Bytes JMP 00607AA4 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegDeleteKeyW + 3 75E71275 4 Bytes [79, 8A, CC, CC] {JNS 0xffffffffffffff8c; INT 3 ; INT 3 }
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegCreateKeyExA 75E71469 5 Bytes JMP 006079F0 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegEnumKeyExA 75E71481 5 Bytes JMP 00607B28 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegSetValueExA 75E714B3 5 Bytes JMP 00607EE8 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegSetValueExW 75E714D6 5 Bytes JMP 00607F24 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegCreateKeyW 75E71514 5 Bytes JMP 006079C4 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegOpenKeyW 75E72459 5 Bytes JMP 00607C64 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegCreateKeyExW 75E740FE 5 Bytes JMP 00607A34 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegQueryValueW 75E744B4 7 Bytes JMP 00607DCC C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegOpenKeyExW 75E7468D 5 Bytes JMP 00607CC8 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegCloseKey 75E7469D 5 Bytes JMP 00607950 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegQueryValueExW 75E746AD 5 Bytes JMP 00607E3C C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegEnumKeyExW 75E746C8 5 Bytes JMP 00607B6C C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegQueryInfoKeyW 75E746E7 5 Bytes JMP 00607D4C C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegEnumValueW 75E748CC 5 Bytes JMP 00607BF4 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegQueryValueExA 75E748EF 5 Bytes JMP 00607E00 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegOpenKeyExA 75E74907 5 Bytes JMP 00607C90 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegFlushKey 75E8773F 5 Bytes JMP 00607974 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegDeleteValueA 75E8A4EA 5 Bytes JMP 00607AD0 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegSetValueW 75E8A68A 5 Bytes JMP 00607EB0 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegDeleteKeyA 75E8A8B7 5 Bytes JMP 00607A78 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)
.text C:\Program Files\The KMPlayer\KMPlayer.exe[4484] advapi32.dll!RegSetValueA 75EC0E41 5 Bytes JMP 00607E78 C:\Program Files\The KMPlayer\KMPlayer.exe (The KMPlayer/Pandora.TV)

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe[280] @ C:\Windows\system32\USER32.dll [KERNEL32.dll!GetProcAddress] [7520FFF6] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe[280] @ C:\Windows\system32\GDI32.dll [KERNEL32.dll!GetProcAddress] [7520FFF6] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe[280] @ C:\Windows\system32\ADVAPI32.dll [KERNEL32.dll!GetProcAddress] [7520FFF6] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe[280] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!GetProcAddress] [7520FFF6] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Program Files\Spyware Doctor\BDT\BDTUpdateService.exe[280] @ C:\Windows\system32\WININET.dll [KERNEL32.dll!GetProcAddress] [7520FFF6] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (Kernel Mode Driver Framework Runtime/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (Kernel Mode Driver Framework Runtime/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 rdyboost.sys (ReadyBoost Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 rdyboost.sys (ReadyBoost Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume3 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume3 rdyboost.sys (ReadyBoost Driver/Microsoft Corporation)

Device \Driver\ACPI_HAL \Device\00000066 halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation)

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\c0cb38af2efc
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\c0cb38af2efc@0021fc3563c0 0xDE 0xFA 0x42 0xDC ...
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\c0cb38af2efc@d875333b2387 0xA3 0x40 0x5B 0x37 ...
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\c0cb38af2efc (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\c0cb38af2efc@0021fc3563c0 0xDE 0xFA 0x42 0xDC ...
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\c0cb38af2efc@d875333b2387 0xA3 0x40 0x5B 0x37 ...
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\System
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\System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
Reg HKLM\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Servers\E0B24744-E51C-40F8-9DC4-F7014710D60C@IPAddress ::1

---- EOF - GMER 1.0.15 ----


sry , forgot that

#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:30 PM

Posted 18 July 2011 - 12:02 PM

Download SUPERAntiSpyware Free for Home Users:
http://www.superantispyware.com/


  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
  • Close SUPERAntiSpyware.
Restart computer in Safe Mode.
To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; pick Safe Mode; you'll see "Safe Mode" in all four corners of your screen

  • Open SUPERAntiSpyware.
  • Under "Configuration and Preferences", click the Preferences button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Post SUPERAntiSpyware log.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 Jordan91

Jordan91
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 18 July 2011 - 10:17 PM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/19/2011 at 04:23 AM

Application Version : 4.55.1000

Core Rules Database Version : 7421
Trace Rules Database Version: 5233

Scan type : Complete Scan
Total Scan Time : 01:07:22

Memory items scanned : 350
Memory threats detected : 0
Registry items scanned : 8751
Registry threats detected : 2
File items scanned : 149543
File threats detected : 0

System.BrokenFileAssociation
HKCR\.exe

Malware.Trace
HKU\S-1-5-21-3346626422-3282573262-1349253441-1000\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON#SHELL

#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:30 PM

Posted 18 July 2011 - 10:55 PM

Any current issues?

Download Temp File Cleaner (TFC)
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

=============================================================================

Please run a free online scan with the ESET Online Scanner

  • Disable your antivirus program
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Click Start
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push List of found threats
  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 Jordan91

Jordan91
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 18 July 2011 - 11:32 PM

I am scanning right now ,and no , no issues for the moment.
As i described earlier , i wanted to check if there was something going under the radar that i didn't know.
Will post results when the scan is finished.

#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:30 PM

Posted 18 July 2011 - 11:33 PM

Very well :)

Bed time here, so I'll check on you tomorrow....

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#11 Jordan91

Jordan91
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:30 PM

Posted 20 July 2011 - 01:40 AM

Well it found just a winrar keygen and an old rar file of starcraft i had , so i guess my pc is fine :)

Ty for all the help and support.

#12 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:30 PM

Posted 20 July 2011 - 05:57 PM

1. Update your Java version here: http://www.java.com/en/download/installed.jsp

Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

2. Now, we need to remove old Java version and its remnants...

Download JavaRa to your desktop and unzip it to its own folder
  • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
  • Accept any prompts.

=================================================================

Update Adobe Reader

You can download it from http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions.
Note. If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

Alternatively, you can uninstall Adobe Reader (33.5 MB), download and install Foxit PDF Reader(3.5MB) from HERE.
It's a much smaller file to download and uses a lot less resources than Adobe Reader.
Note: When installing FoxitReader, make sure to UN-check any pre-checked toolbar, or any other garbage.

===============================================================

Your computer is clean Posted Image

1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll remove all old restore points and create fresh, clean restore point.

Turn system restore off.
Restart computer.
Turn system restore back on.

If you don't know how to do it...
Windows XP: http://support.microsoft.com/kb/310405
Vista and Windows 7: http://www.howtogeek.com/howto/windows-vista/disable-system-restore-in-windows-vista/

2. Make sure, Windows Updates are current.

3. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

4. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

5. Run Temporary File Cleaner (TFC) weekly.

6. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

7. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

8. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

9. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users