Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Searching on Browser


  • This topic is locked This topic is locked
16 replies to this topic

#1 c0lossus

c0lossus

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:05:08 AM

Posted 20 December 2012 - 05:05 PM

Hello,

Any time I search something in google, the search results come up but the once I click on one of the links it takes me to some random website which was unrelated to the link.

DDS (Ver_2012-11-20.01) - NTFS_AMD64
Internet Explorer: 8.0.7600.16385 BrowserJavaVersion: 10.4.1
Run by Colossus at 15:59:03 on 2012-12-20
Microsoft Windows 7 Ultimate 6.1.7600.0.1252.1.1033.18.2014.999 [GMT -8:00]
.
SP: Windows Defender *Enabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\NVIDIA Corporation\Display\nvxdsync.exe
C:\Windows\system32\nvvsvc.exe
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\MySQL\MySQL Server 5.5\bin\mysqld.exe
C:\Program Files (x86)\NVIDIA Corporation\nTune\nTuneService.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files (x86)\NVIDIA Corporation\System Update\UpdateCenterService.exe
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\system32\taskhost.exe
C:\Windows\system32\sppsvc.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files (x86)\Skype\Phone\Skype.exe
C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files\NVIDIA Corporation\Display\nvtray.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Users\Colossus\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Colossus\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Colossus\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Colossus\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Colossus\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Colossus\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\daemonu.exe
C:\Users\Colossus\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\SysWOW64\dxdiag.exe
C:\Users\Colossus\AppData\Local\Google\Chrome\Application\chrome.exe
\\.\globalroot\systemroot\svchost.exe -netsvcs
C:\Users\Colossus\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\System32\cscript.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Oracle\JavaFX 2.1 Runtime\bin\ssv.dll
BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files (x86)\Google\GoogleToolbarNotifier\5.7.7725.1624\swg.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Oracle\JavaFX 2.1 Runtime\bin\jp2ssv.dll
TB: Google Toolbar: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
uRun: [Skype] "C:\Program Files (x86)\Skype\Phone\Skype.exe" /minimized /regrun
uRun: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
uRun: [Apple] rundll32.exe "C:\Users\Colossus\AppData\Local\Apple Computer\Apple\dutip.dll",CreateInstance
uRun: [Pando Media Booster] C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe
uRun: [NVIDIA nTune] C:\Program Files (x86)\NVIDIA Corporation\nTune\nTuneCmd.exe resetprofile
mRun: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
mRun: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe"
mRun: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime
mRun: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
uPolicies-Explorer: NoDrives = dword:0
mPolicies-Explorer: NoDrives = dword:0
mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableUIADesktopToggle = dword:0
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: NameServer = 75.75.76.76 75.75.75.75
TCP: Interfaces\{FEFD4EC3-0BF2-4AB5-870B-0D8B9978DD0B} : DHCPNameServer = 75.75.76.76 75.75.75.75
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll
x64-BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll
x64-BHO: Google Toolbar Notifier BHO: {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.7.7725.1624\swg64.dll
x64-TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll
x64-Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - <orphaned>
.
============= SERVICES / DRIVERS ===============
.
S2 SkypeUpdate;Skype Updater;C:\Program Files (x86)\Skype\Updater\Updater.exe [2012-2-29 158856]
S3 Revoflt;Revoflt;C:\Windows\System32\drivers\revoflt.sys [2012-5-5 31800]
.
=============== Created Last 30 ================
.
2012-12-19 12:45:27 -------- d-----w- C:\Users\Colossus\AppData\Roaming\.minecraft
2012-12-19 11:35:44 -------- d-----w- C:\Riot Games
2012-12-19 10:45:11 891240 ----a-w- C:\Windows\System32\nvvsvc.exe
2012-12-19 10:45:11 63336 ----a-w- C:\Windows\System32\nvshext.dll
2012-12-19 10:45:11 6200680 ----a-w- C:\Windows\System32\nvcpl.dll
2012-12-19 10:45:11 3293544 ----a-w- C:\Windows\System32\nvsvc64.dll
2012-12-19 10:45:11 118120 ----a-w- C:\Windows\System32\nvmctray.dll
2012-12-19 10:44:33 60776 ----a-w- C:\Windows\System32\OpenCL.dll
2012-12-19 10:44:33 52584 ----a-w- C:\Windows\SysWow64\OpenCL.dll
2012-12-19 10:44:04 -------- d-----w- C:\ProgramData\NVIDIA Corporation
2012-12-18 14:06:35 388640 ----a-w- C:\Windows\System32\nvexpBar.dll
2012-12-18 14:06:35 1071136 ----a-w- C:\Windows\System32\nvcplUIR.dll
2012-12-18 14:06:33 2088992 ----a-w- C:\Windows\System32\nvcplUI.exe
2012-12-18 14:06:29 410656 ----a-w- C:\Windows\System32\nvcpl.cpl
2012-12-18 14:06:28 520192 ----a-w- C:\Windows\System32\msvcr71.dll
2012-12-18 14:06:26 978944 ----a-w- C:\Windows\System32\msvcp71.dll
2012-12-18 14:06:23 1524736 ----a-w- C:\Windows\System32\MFC71.dll
2012-12-18 14:05:36 -------- d-----w- C:\Users\Colossus\AppData\Local\NVIDIA Corporation
2012-12-18 14:05:24 -------- d-----w- C:\Program Files (x86)\NVIDIA Corporation
2012-12-18 14:04:12 501280 ----a-w- C:\Windows\System32\NVUNINST.EXE
2012-12-18 14:03:59 -------- d-----w- C:\NVIDIA
2012-12-18 13:42:30 -------- d-----w- C:\Program Files (x86)\ATITool
2012-12-18 13:32:25 -------- d-----w- C:\Program Files\CPUID
2012-12-18 13:21:40 -------- d-----w- C:\Users\Colossus\.swt
2012-12-18 13:16:44 20480 ----a-w- C:\Windows\svchost.exe
2012-12-18 13:16:24 -------- d-sh--w- C:\$RECYCLE.BIN
.
==================== Find3M ====================
.
2012-12-12 16:07:21 73656 ----a-w- C:\Windows\SysWow64\FlashPlayerCPLApp.cpl
2012-12-12 16:07:21 697272 ----a-w- C:\Windows\SysWow64\FlashPlayerApp.exe
.
============= FINISH: 15:59:40.73 ===============

BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:05:08 AM

Posted 20 December 2012 - 06:29 PM

Hello c0lossus,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • In the upper right hand corner of the topic you will see a button called Watch Topic.I suggest you click it and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

  • Finally, please reply using the ADD REPLY button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.
  • I will be analyzing your log. I will get back to you with instructions.


DO you have a USB Flash Drive you can use?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 c0lossus

c0lossus
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:05:08 AM

Posted 20 December 2012 - 07:12 PM

Yes, I do have a USB flash drive. I wanted to add one more note, my computer has been crashing lately and keeps saying memory dump on a blue screen.

Regards,

C0lossus

#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:05:08 AM

Posted 20 December 2012 - 11:27 PM

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.

To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.

On the System Recovery Options menu you will get the following options:Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt
[*]Select Command Prompt[*]In the command window type in notepad and press Enter.[*]The notepad opens. Under File menu select Open.[*]Select "Computer" and find your flash drive letter and close the notepad.[*]In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
Note: Replace letter e with the drive letter of your flash drive.[*]The tool will start to run.[*]When the tool opens click Yes to disclaimer.[*]Press Scan button.[*]It will make a log (FRST.txt) on the flash drive. Please copy and paste it to your reply.[/list]

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 c0lossus

c0lossus
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:05:08 AM

Posted 21 December 2012 - 12:01 AM

Here is my FRST log

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 18-12-2012
Ran by SYSTEM at 20-12-2012 22:56:13
Running from F:\
Windows 7 Ultimate (X64) OS Language: English(US)
The current controlset is ControlSet001

==================== Registry (Whitelisted) ===================

HKLM-x32\...\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [937920 2011-06-06] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [59240 2011-09-27] (Apple Inc.)
HKLM-x32\...\Run: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime [421888 2011-10-24] (Apple Inc.)
HKLM-x32\...\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" [252296 2012-01-17] (Sun Microsystems, Inc.)
HKU\Colossus\...\Run: [Skype] "C:\Program Files (x86)\Skype\Phone\Skype.exe" /minimized /regrun [17148552 2012-02-29] (Skype Technologies S.A.)
HKU\Colossus\...\Run: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [39408 2012-05-06] (Google Inc.)
HKU\Colossus\...\Run: [Apple] rundll32.exe "C:\Users\Colossus\AppData\Local\Apple Computer\Apple\dutip.dll",CreateInstance [x]
HKU\Colossus\...\Run: [Pando Media Booster] C:\Program Files (x86)\Pando Networks\Media Booster\PMB.exe [3093624 2012-12-18] ()
HKU\Colossus\...\Run: [NVIDIA nTune] C:\Program Files (x86)\NVIDIA Corporation\nTune\nTuneCmd.exe resetprofile [145408 2008-08-18] (NVIDIA)
Tcpip\Parameters: [DhcpNameServer] 75.75.76.76 75.75.75.75

==================== Services (Whitelisted) ===================

2 nTuneService; C:\Program Files (x86)\NVIDIA Corporation\nTune\nTuneService.exe /StartService [222208 2008-08-18] (NVIDIA)
2 UpdateCenterService; C:\Program Files (x86)\NVIDIA Corporation\System Update\UpdateCenterService.exe /StartService [158208 2008-08-01] (NVIDIA)

==================== Drivers (Whitelisted) =====================

3 ATITool; C:\Windows\System32\DRIVERS\ATITool64.sys [30720 2006-11-10] ()
2 MySQL; "C:\Program Files\MySQL\MySQL Server 5.5\bin\mysqld" --defaults-file="C:\Program Files\MySQL\MySQL Server 5.5\my.ini" MySQL [8917 2011-12-23] ()
3 NVR0Dev; \??\C:\Windows\nvoclk64.sys [40480 2008-08-18] (NVidia Corp.)
2 NVR0FLASHDev; \??\C:\Windows\nvflsh64.sys [40480 2008-08-01] (NVidia Corp.)
3 catchme; \??\C:\ComboFix\catchme.sys [x]

==================== NetSvcs (Whitelisted) ====================


==================== One Month Created Files and Folders ========

2012-12-20 15:59 - 2012-12-20 15:59 - 00000000 ____D C:\Users\Colossus\Desktop\New folder
2012-12-20 15:58 - 2012-12-20 15:59 - 00688992 ____R (Swearware) C:\Users\Colossus\Desktop\dds.com
2012-12-19 14:55 - 2012-12-19 14:55 - 00290696 ____A C:\Windows\Minidump\121912-24414-01.dmp
2012-12-19 04:45 - 2012-12-19 04:45 - 00263186 ____A C:\Users\Colossus\Desktop\Minecraft.exe
2012-12-19 04:45 - 2012-12-19 04:45 - 00000000 ____D C:\Users\Colossus\AppData\Roaming\.minecraft
2012-12-19 03:42 - 2012-12-19 03:42 - 00001720 ____A C:\Users\Public\Desktop\Play League of Legends.lnk
2012-12-19 03:35 - 2012-12-19 03:35 - 00000000 ____D C:\Riot Games
2012-12-19 02:56 - 2012-12-19 02:57 - 00000000 ____D C:\Users\Colossus\Desktop\mbar
2012-12-19 02:45 - 2012-12-19 02:45 - 00000020 ___SH C:\Users\UpdatusUser\ntuser.ini
2012-12-19 02:45 - 2012-12-19 02:45 - 00000000 ____D C:\Users\All Users\NVIDIA
2012-12-19 02:45 - 2012-10-02 11:51 - 06200680 ____A (NVIDIA Corporation) C:\Windows\System32\nvcpl.dll
2012-12-19 02:45 - 2012-10-02 11:51 - 03293544 ____A (NVIDIA Corporation) C:\Windows\System32\nvsvc64.dll
2012-12-19 02:45 - 2012-10-02 11:50 - 00891240 ____A (NVIDIA Corporation) C:\Windows\System32\nvvsvc.exe
2012-12-19 02:45 - 2012-10-02 11:50 - 00118120 ____A (NVIDIA Corporation) C:\Windows\System32\nvmctray.dll
2012-12-19 02:45 - 2012-10-02 11:50 - 00063336 ____A (NVIDIA Corporation) C:\Windows\System32\nvshext.dll
2012-12-19 02:45 - 2011-08-24 19:52 - 00000000 ____D C:\Users\UpdatusUser\AppData\Roaming\Macromedia
2012-12-19 02:44 - 2012-12-19 02:44 - 00000000 ____D C:\Users\All Users\NVIDIA Corporation
2012-12-19 02:44 - 2012-10-02 14:21 - 00060776 ____A (Khronos Group) C:\Windows\System32\OpenCL.dll
2012-12-19 02:44 - 2012-10-02 14:21 - 00052584 ____A (Khronos Group) C:\Windows\SysWOW64\OpenCL.dll
2012-12-19 02:42 - 2012-12-19 02:45 - 00000000 ____D C:\Program Files\NVIDIA Corporation
2012-12-19 02:42 - 2012-10-02 14:21 - 26331496 ____A (NVIDIA Corporation) C:\Windows\System32\nvoglv64.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 25256296 ____A (NVIDIA Corporation) C:\Windows\System32\nvcompiler.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 19906920 ____A (NVIDIA Corporation) C:\Windows\SysWOW64\nvoglv32.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 17559912 ____A (NVIDIA Corporation) C:\Windows\SysWOW64\nvcompiler.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 13443944 ____A (NVIDIA Corporation) C:\Windows\System32\Drivers\nvlddmkm.sys
2012-12-19 02:42 - 2012-10-02 14:21 - 09146728 ____A (NVIDIA Corporation) C:\Windows\System32\nvcuda.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 07697768 ____A (NVIDIA Corporation) C:\Windows\SysWOW64\nvcuda.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 07414632 ____A (NVIDIA Corporation) C:\Windows\System32\nvopencl.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 06127464 ____A (NVIDIA Corporation) C:\Windows\SysWOW64\nvopencl.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 02747240 ____A (NVIDIA Corporation) C:\Windows\System32\nvcuvid.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 02731880 ____A (NVIDIA Corporation) C:\Windows\System32\nvapi64.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 02574696 ____A (NVIDIA Corporation) C:\Windows\SysWOW64\nvcuvid.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 02428776 ____A (NVIDIA Corporation) C:\Windows\SysWOW64\nvapi.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 02218344 ____A (NVIDIA Corporation) C:\Windows\System32\nvcuvenc.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 01867112 ____A (NVIDIA Corporation) C:\Windows\SysWOW64\nvcuvenc.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 01760104 ____A (NVIDIA Corporation) C:\Windows\System32\nvdispco64.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 01482600 ____A (NVIDIA Corporation) C:\Windows\System32\nvdispgenco64.dll
2012-12-19 02:42 - 2012-10-02 14:21 - 00016127 ____A C:\Windows\System32\nvinfo.pb
2012-12-18 06:13 - 2012-12-18 06:13 - 00001819 ____A C:\Users\Colossus\Desktop\Install SpeedFan.lnk
2012-12-18 06:11 - 2012-12-18 06:11 - 00001141 ____A C:\Users\Colossus\Desktop\Continue SpeedFan Installation.lnk
2012-12-18 06:06 - 2008-08-01 08:48 - 02088992 ____A (NVIDIA Corporation) C:\Windows\System32\nvcplUI.exe
2012-12-18 06:06 - 2008-08-01 08:48 - 01071136 ____A (NVIDIA Corporation) C:\Windows\System32\nvcplUIR.dll
2012-12-18 06:06 - 2008-08-01 08:48 - 00410656 ____A (NVIDIA Corporation) C:\Windows\System32\nvcpl.cpl
2012-12-18 06:06 - 2008-08-01 08:48 - 00388640 ____A (NVIDIA Corporation) C:\Windows\System32\nvexpBar.dll
2012-12-18 06:06 - 2008-06-19 16:43 - 01524736 ____A (Microsoft Corporation) C:\Windows\System32\MFC71.dll
2012-12-18 06:06 - 2008-06-19 16:43 - 00978944 ____A (Microsoft Corporation) C:\Windows\System32\msvcp71.dll
2012-12-18 06:06 - 2008-06-19 16:43 - 00520192 ____A (Microsoft Corporation) C:\Windows\System32\msvcr71.dll
2012-12-18 06:05 - 2012-12-19 02:45 - 00000000 ____D C:\Program Files (x86)\NVIDIA Corporation
2012-12-18 06:05 - 2012-12-18 06:09 - 00000000 ____D C:\Users\Colossus\AppData\Local\NVIDIA Corporation
2012-12-18 06:04 - 2008-09-12 05:56 - 00501280 ____A (NVIDIA Corporation) C:\Windows\System32\NVUNINST.EXE
2012-12-18 06:03 - 2012-12-19 02:24 - 00000000 ____D C:\NVIDIA
2012-12-18 05:42 - 2012-12-18 06:21 - 00000000 ____D C:\Program Files (x86)\ATITool
2012-12-18 05:32 - 2012-12-18 05:32 - 00000000 ____D C:\Program Files\CPUID
2012-12-18 05:22 - 2012-12-18 05:56 - 00000000 ____D C:\Users\Colossus\Desktop\League of Legends
2012-12-18 05:21 - 2012-12-18 05:21 - 00000000 ____D C:\Users\Colossus\.swt
2012-12-18 05:16 - 2009-07-13 17:14 - 00020480 ____A (Microsoft Corporation) C:\Windows\svchost.exe
2012-12-18 04:29 - 2012-12-18 04:29 - 00009290 ____A C:\ComboFix.txt
2012-12-18 04:12 - 2012-12-18 04:12 - 00290248 ____A C:\Windows\Minidump\121812-18657-01.dmp
2012-12-12 18:10 - 2012-12-20 18:09 - 177000402 ____A C:\Windows\MEMORY.DMP
2012-12-12 18:10 - 2012-12-12 18:10 - 00292640 ____A C:\Windows\Minidump\121212-17565-01.dmp
2012-12-11 00:31 - 2012-12-11 00:31 - 00000000 ____D C:\Users\Colossus\Desktop\FSA
2012-11-25 14:59 - 2012-11-25 14:59 - 00082448 ____A C:\Users\Colossus\Desktop\Copy of Macys Valuation.xlsx
2012-11-24 23:06 - 2012-11-24 23:06 - 00021581 ____A C:\Users\Colossus\Desktop\cashflow Proj(1).xlsx


==================== One Month Modified Files and Folders =======

2012-12-20 22:53 - 2011-03-14 17:22 - 00678079 ____A C:\Windows\WindowsUpdate.log
2012-12-20 22:53 - 2009-07-13 20:45 - 00013584 ____A C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2012-12-20 22:53 - 2009-07-13 20:45 - 00013584 ____A C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2012-12-20 22:52 - 2009-07-13 21:13 - 00713888 ____A C:\Windows\System32\PerfStringBackup.INI
2012-12-20 22:36 - 2012-05-06 17:42 - 00000902 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2012-12-20 22:07 - 2012-05-06 17:42 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2012-12-20 22:06 - 2012-02-03 18:57 - 00000920 ____A C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-680097895-1281761434-3568893497-1000UA.job
2012-12-20 21:36 - 2012-05-06 17:42 - 00000898 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2012-12-20 21:27 - 2011-06-17 18:09 - 00000000 ____D C:\Users\Colossus\AppData\Local\PMB Files
2012-12-20 21:27 - 2011-06-17 18:08 - 00000000 ____D C:\Users\All Users\PMB Files
2012-12-20 18:09 - 2012-12-20 18:09 - 00262144 ____A C:\Windows\Minidump\122012-18470-01.dmp
2012-12-20 18:09 - 2012-12-12 18:10 - 177000402 ____A C:\Windows\MEMORY.DMP
2012-12-20 18:09 - 2012-05-13 00:00 - 00005543 ____A C:\Windows\setupact.log
2012-12-20 18:09 - 2012-04-26 01:50 - 00000000 ____D C:\Windows\Minidump
2012-12-20 18:09 - 2009-07-13 21:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2012-12-20 16:30 - 2012-03-25 14:05 - 00000000 ____D C:\Users\Colossus\AppData\Roaming\Skype
2012-12-20 15:59 - 2012-12-20 15:59 - 00000000 ____D C:\Users\Colossus\Desktop\New folder
2012-12-20 15:59 - 2012-12-20 15:58 - 00688992 ____R (Swearware) C:\Users\Colossus\Desktop\dds.com
2012-12-20 15:59 - 2012-07-19 08:52 - 00005030 ____A C:\Users\Colossus\Desktop\Attach.txt
2012-12-20 15:59 - 2012-07-19 08:51 - 00008470 ____A C:\Users\Colossus\Desktop\DDS.txt
2012-12-19 14:55 - 2012-12-19 14:55 - 00290696 ____A C:\Windows\Minidump\121912-24414-01.dmp
2012-12-19 05:06 - 2011-10-03 20:55 - 00003439 ____A C:\Users\Colossus\Desktop\Week 6.txt
2012-12-19 04:45 - 2012-12-19 04:45 - 00263186 ____A C:\Users\Colossus\Desktop\Minecraft.exe
2012-12-19 04:45 - 2012-12-19 04:45 - 00000000 ____D C:\Users\Colossus\AppData\Roaming\.minecraft
2012-12-19 03:42 - 2012-12-19 03:42 - 00001720 ____A C:\Users\Public\Desktop\Play League of Legends.lnk
2012-12-19 03:35 - 2012-12-19 03:35 - 00000000 ____D C:\Riot Games
2012-12-19 03:35 - 2011-06-17 16:14 - 00000000 ___HD C:\Program Files (x86)\InstallShield Installation Information
2012-12-19 02:57 - 2012-12-19 02:56 - 00000000 ____D C:\Users\Colossus\Desktop\mbar
2012-12-19 02:45 - 2012-12-19 02:45 - 00000020 ___SH C:\Users\UpdatusUser\ntuser.ini
2012-12-19 02:45 - 2012-12-19 02:45 - 00000000 ____D C:\Users\All Users\NVIDIA
2012-12-19 02:45 - 2012-12-19 02:42 - 00000000 ____D C:\Program Files\NVIDIA Corporation
2012-12-19 02:45 - 2012-12-18 06:05 - 00000000 ____D C:\Program Files (x86)\NVIDIA Corporation
2012-12-19 02:44 - 2012-12-19 02:44 - 00000000 ____D C:\Users\All Users\NVIDIA Corporation
2012-12-19 02:24 - 2012-12-18 06:03 - 00000000 ____D C:\NVIDIA
2012-12-19 01:06 - 2012-02-03 18:57 - 00000868 ____A C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-680097895-1281761434-3568893497-1000Core.job
2012-12-18 06:21 - 2012-12-18 05:42 - 00000000 ____D C:\Program Files (x86)\ATITool
2012-12-18 06:13 - 2012-12-18 06:13 - 00001819 ____A C:\Users\Colossus\Desktop\Install SpeedFan.lnk
2012-12-18 06:13 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\Resources
2012-12-18 06:11 - 2012-12-18 06:11 - 00001141 ____A C:\Users\Colossus\Desktop\Continue SpeedFan Installation.lnk
2012-12-18 06:09 - 2012-12-18 06:05 - 00000000 ____D C:\Users\Colossus\AppData\Local\NVIDIA Corporation
2012-12-18 06:05 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\Help
2012-12-18 05:56 - 2012-12-18 05:22 - 00000000 ____D C:\Users\Colossus\Desktop\League of Legends
2012-12-18 05:32 - 2012-12-18 05:32 - 00000000 ____D C:\Program Files\CPUID
2012-12-18 05:21 - 2012-12-18 05:21 - 00000000 ____D C:\Users\Colossus\.swt
2012-12-18 05:21 - 2011-03-14 19:18 - 00000000 ____D C:\users\Colossus
2012-12-18 05:15 - 2012-05-16 22:21 - 00004760 ____A C:\Windows\PFRO.log
2012-12-18 04:29 - 2012-12-18 04:29 - 00009290 ____A C:\ComboFix.txt
2012-12-18 04:29 - 2012-04-26 01:52 - 00000000 ____D C:\Qoobox
2012-12-18 04:27 - 2009-07-13 18:34 - 00000215 ____A C:\Windows\system.ini
2012-12-18 04:19 - 2012-08-07 17:50 - 05012571 ____R (Swearware) C:\Users\Colossus\Desktop\ComboFix.exe
2012-12-18 04:12 - 2012-12-18 04:12 - 00290248 ____A C:\Windows\Minidump\121812-18657-01.dmp
2012-12-18 04:10 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\registration
2012-12-12 19:10 - 2012-02-03 18:57 - 00002460 ____A C:\Users\Colossus\Desktop\Google Chrome.lnk
2012-12-12 18:10 - 2012-12-12 18:10 - 00292640 ____A C:\Windows\Minidump\121212-17565-01.dmp
2012-12-12 08:07 - 2012-05-06 17:42 - 00697272 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2012-12-12 08:07 - 2011-06-17 16:14 - 00073656 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2012-12-11 00:31 - 2012-12-11 00:31 - 00000000 ____D C:\Users\Colossus\Desktop\FSA
2012-12-07 15:21 - 2012-04-27 02:28 - 07821158 ____A C:\Users\Colossus\Desktop\Joomla_2.5.4-Stable-Full_Package.zip
2012-12-01 13:26 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\sysprep
2012-11-26 23:05 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\NDF
2012-11-25 14:59 - 2012-11-25 14:59 - 00082448 ____A C:\Users\Colossus\Desktop\Copy of Macys Valuation.xlsx
2012-11-24 23:06 - 2012-11-24 23:06 - 00021581 ____A C:\Users\Colossus\Desktop\cashflow Proj(1).xlsx


ZeroAccess:
C:\Users\Colossus\AppData\Local\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}
C:\Users\Colossus\AppData\Local\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}\L
C:\Users\Colossus\AppData\Local\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}\U
C:\Users\Colossus\AppData\Local\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}\VirtualStore

ATTENTION: ========> Check for possible partition/boot infection:
C:\Windows\svchost.exe

==================== Known DLLs (Whitelisted) =================


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points =========================

Restore point made on: 2012-12-19 03:13:41
Restore point made on: 2012-12-19 03:35:40

==================== Memory info ===========================

Percentage of memory in use: 23%
Total physical RAM: 2013.6 MB
Available physical RAM: 1547.99 MB
Total Pagefile: 2013.6 MB
Available Pagefile: 1530.87 MB
Total Virtual: 8192 MB
Available Virtual: 8191.9 MB

==================== Partitions =============================

1 Drive c: () (Fixed) (Total:148.91 GB) (Free:111.07 GB) NTFS
3 Drive f: (WINKEY) (Removable) (Total:1.87 GB) (Free:1.1 GB) FAT32
4 Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
5 Drive y: (System Reserved) (Fixed) (Total:0.1 GB) (Free:0.07 GB) NTFS ==>[System with boot components (obtained from reading drive)]

Disk ### Status Size Free Dyn Gpt
-------- ------------- ------- ------- --- ---
Disk 0 Online 149 GB 0 B
Disk 1 Online 1928 MB 0 B

Partitions of Disk 0:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 100 MB 1024 KB
Partition 2 Primary 148 GB 101 MB

==================================================================================

Disk: 0
Partition 1
Type : 07
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 1 Y System Rese NTFS Partition 100 MB Healthy

=========================================================

Disk: 0
Partition 2
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 2 C NTFS Partition 148 GB Healthy

=========================================================

Partitions of Disk 1:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 1921 MB 31 KB

==================================================================================

Disk: 1
Partition 1
Type : 0B
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 3 F WINKEY FAT32 Removable 1921 MB Healthy

=========================================================

Last Boot: 2012-12-15 03:27

==================== End Of Log =============================

#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:05:08 AM

Posted 21 December 2012 - 10:58 AM

1.
Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flashdrive as fixlist.txt

HKU\Colossus\...\Run: [Apple] rundll32.exe "C:\Users\Colossus\AppData\Local\Apple Computer\Apple\dutip.dll",CreateInstance [x]
C:\Users\Colossus\AppData\Local\Apple Computer\Apple\dutip.dll
C:\Users\Colossus\AppData\Local\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}
C:\Windows\svchost.exe

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.
On Windows XP: Now please boot into the BartPE CD.
Run FRST64 and press the Fix button just once and wait.
The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.


2.
Please download Listparts64
Run the tool, click Scan and post the log (Result.txt) it makes.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 c0lossus

c0lossus
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:05:08 AM

Posted 21 December 2012 - 04:25 PM

Fixlog

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 18-12-2012
Ran by SYSTEM at 2012-12-21 15:20:02 Run:2
Running from F:\

==============================================

HKEY_USERS\Colossus\Software\Microsoft\Windows\CurrentVersion\Run\\Apple Value deleted successfully.
C:\Users\Colossus\AppData\Local\Apple Computer\Apple\dutip.dll not found.
C:\Users\Colossus\AppData\Local\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0} moved successfully.
C:\Windows\svchost.exe moved successfully.

==== End of Fixlog ====

Listparts log

ListParts by Farbar Version: 30-10-2012
Ran by Colossus (administrator) on 21-12-2012 at 15:22:12
Windows 7 (X64)
Running From: C:\Users\Colossus\Desktop
Language: 0409
************************************************************

========================= Memory info ======================

Percentage of memory in use: 48%
Total physical RAM: 2013.6 MB
Available physical RAM: 1033.91 MB
Total Pagefile: 4027.2 MB
Available Pagefile: 2836.95 MB
Total Virtual: 8192 MB
Available Virtual: 8191.9 MB

======================= Partitions =========================

1 Drive c: () (Fixed) (Total:148.91 GB) (Free:110.84 GB) NTFS
3 Drive e: (WINKEY) (Removable) (Total:1.87 GB) (Free:1.1 GB) FAT32

Disk ### Status Size Free Dyn Gpt
-------- ------------- ------- ------- --- ---
Disk 0 Online 149 GB 0 B
Disk 1 Online 1928 MB 0 B

Partitions of Disk 0:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 100 MB 1024 KB
Partition 2 Primary 148 GB 101 MB

======================================================================================================

Disk: 0
Partition 1
Type : 07
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 1 System Rese NTFS Partition 100 MB Healthy System (partition with boot components)

======================================================================================================

Disk: 0
Partition 2
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 2 C NTFS Partition 148 GB Healthy Boot

======================================================================================================

Partitions of Disk 1:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 1921 MB 31 KB

======================================================================================================

Disk: 1
Partition 1
Type : 0B
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 3 E WINKEY FAT32 Removable 1921 MB Healthy

======================================================================================================

****** End Of Log ******

#8 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:05:08 AM

Posted 21 December 2012 - 04:43 PM

How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#9 c0lossus

c0lossus
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:05:08 AM

Posted 21 December 2012 - 10:41 PM

So far so good fireman, if any issues arise I will post a reply in the next 2 days. To be honest I have not really used the computer much today.

Thank you for your expertise and time.

Regards,
c0lossus

#10 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:05:08 AM

Posted 22 December 2012 - 02:20 AM

Hello,

Lets run a couple other tools to make sure no leftovers.

1.
Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.


2.
I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image
      icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.

Things to include in your next reply::
MBAM log
Eset log
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#11 c0lossus

c0lossus
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:05:08 AM

Posted 29 December 2012 - 05:39 AM

Mbam log

Malwarebytes Anti-Malware 1.65.1.1000
www.malwarebytes.org

Database version: v2012.12.25.01

Windows 7 x64 NTFS
Internet Explorer 8.0.7600.16385
Colossus :: COLOSSUS-PC [administrator]

12/24/2012 8:20:05 PM
mbam-log-2012-12-24 (20-24-11).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 232026
Time elapsed: 3 minute(s), 20 second(s)

Memory Processes Detected: 1
C:\Windows\svchost.exe (Trojan.Agent) -> 3912 -> No action taken.

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 1
C:\Windows\svchost.exe (Trojan.Agent) -> No action taken.

(end)


ESET Log

:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2UN06NTM\cat-and-dolphin-playing-together[1].txt HTML/ScrInject.B.Gen virus unable to clean
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ALTAOO1Z\categories[1].txt HTML/Iframe.B.Gen virus unable to clean
C:\FRST\Quarantine\services.exe Win64/Patched.B.Gen trojan deleted - quarantined
C:\Qoobox\Quarantine\C\ProgramData\CaDnEfvBuqSxk.exe.vir Win32/TrojanDownloader.Prodatect.BL trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\ProgramData\CPmPE9PLageYWx.exe.vir Win32/Adware.HDDRescue.AB application cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\Colossus\AppData\Local\Apple Computer\Apple\dutip.dll.vir Win32/BHO.OEI trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\Colossus\AppData\Local\PMB Files\Microsoft\uygwkews.dll.vir Win32/Kryptik.AMNF trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\Colossus\AppData\Local\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}\n.vir Win64/Sirefef.W trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Windows\assembly\GAC_32\Desktop.ini.vir Win32/Sirefef.EZ trojan deleted - quarantined
C:\Qoobox\Quarantine\C\Windows\assembly\GAC_64\Desktop.ini.vir Win64/Sirefef.AD trojan deleted - quarantined
C:\Qoobox\Quarantine\C\Windows\Installer\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}\n.vir Win64/Sirefef.W trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Windows\Installer\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}\U\00000004.@.vir Win64/Conedex.C trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Windows\Installer\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}\U\00000008.@.vir Win64/Agent.BA trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Windows\Installer\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}\U\000000cb.@.vir Win64/Conedex.B trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Windows\Installer\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}\U\80000000.@.vir Win64/Sirefef.AE trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Windows\Installer\{c60d4dc0-ead9-33f8-f9a2-c11bee219dc0}\U\80000064.@.vir Win64/Sirefef.AN trojan cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\26.04.2012_18.36.03\mbr0000\tdlfs0000\tsk0001.dta Win64/Olmarik.AK trojan cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\26.04.2012_18.36.03\mbr0000\tdlfs0000\tsk0003.dta Win64/Olmarik.AK trojan cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\26.04.2012_18.36.03\mbr0000\tdlfs0000\tsk0007.dta Win32/Olmarik.AFK trojan cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\26.04.2012_18.36.03\mbr0000\tdlfs0000\tsk0008.dta Win64/Olmarik.AK trojan cleaned by deleting - quarantined
C:\Users\Colossus\AppData\Local\Google\Chrome\User Data\Default\Default\aadebfgemmolndckjleegndnpkinmnan\background.html Win32/BHO.OEI trojan cleaned by deleting - quarantined
C:\Users\Colossus\AppData\Local\Google\Chrome\User Data\Default\Default\aagddedadcgfdidfgbgfggdededjdddc\background.html Win32/BHO.OEI trojan cleaned by deleting - quarantined
C:\Users\Colossus\AppData\Local\Temp\is1705941228\Yontoo-C4.exe Win32/Adware.Yontoo application cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2UN06NTM\cat-and-dolphin-playing-together[1].txt HTML/ScrInject.B.Gen virus deleted - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ALTAOO1Z\categories[1].txt HTML/Iframe.B.Gen virus deleted - quarantined

#12 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:05:08 AM

Posted 29 December 2012 - 11:14 AM

Hello,

I see no action taken in the Malwarebytes log. Please run Malwarebytes again and make sure those entries have a check mark by them. Then choose Remove Selected. Then please post that log.


  • Download RogueKiller on the desktop
  • Close all the running processes
  • Under Vista/Seven, right click -> Run as Administrator
  • Otherwise just double-click on RogueKiller.exe
  • When prompted, Click Scan
  • A report should open, give its content to your helper. (RKreport could also be found next to the executable)
  • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename in winlogon.exe (or winlogon.com) and try again

Edited by fireman4it, 29 December 2012 - 11:14 AM.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#13 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:05:08 AM

Posted 31 December 2012 - 12:22 PM

Hello.

Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 3-5 days the topic will need to be closed.

Thanks for understanding :)

With Regards,
fireman4it

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#14 c0lossus

c0lossus
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:05:08 AM

Posted 02 January 2013 - 05:17 AM

Malwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org

Database version: v2013.01.02.03

Windows 7 x64 NTFS
Internet Explorer 8.0.7600.16385
Colossus :: COLOSSUS-PC [administrator]

1/2/2013 4:10:21 AM
mbam-log-2013-01-02 (04-10-21).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 232647
Time elapsed: 2 minute(s), 21 second(s)

Memory Processes Detected: 1
C:\Windows\svchost.exe (Trojan.Agent) -> 4576 -> Delete on reboot.

Memory Modules Detected: 1
C:\Users\Colossus\AppData\Local\Temp\PMB Files\yanebnbcc.dll (Trojan.Tracur) -> Delete on reboot.

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|PMB Files (Trojan.Tracur) -> Data: rundll32 "C:\Users\Colossus\AppData\Local\Temp\PMB Files\yanebnbcc.dll",DllRegisterServerW -> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 4
C:\Users\Colossus\AppData\Local\Temp\PMB Files\yanebnbcc.dll (Trojan.Tracur) -> Delete on reboot.
C:\Users\Colossus\AppData\Local\Temp\0.5771259260585327 (Trojan.Happili) -> Quarantined and deleted successfully.
C:\Users\Colossus\AppData\Local\Temp\yanebnbcc\yanebnbcc.dll (Trojan.Tracur) -> Quarantined and deleted successfully.
C:\Windows\svchost.exe (Trojan.Agent) -> Delete on reboot.

(end)


RogueKiller V8.4.2 [Dec 31 2012] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7600 ) 64 bits version
Started in : Normal mode
User : Colossus [Admin rights]
Mode : Scan -- Date : 01/02/2013 04:19:33

¤¤¤ Bad processes : 1 ¤¤¤
[SVCHOST] svchost.exe -- \\.\globalroot\systemroot\svchost.exe -> KILLED [TermProc]

¤¤¤ Registry Entries : 7 ¤¤¤
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
[HJPOL] HKLM\[...]\Wow6432Node\System : DisableRegistryTools (0) -> FOUND
[HJ DESK] HKCU\[...]\ClassicStartMenu : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[HJ DESK] HKCU\[...]\ClassicStartMenu : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1 localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: ST3160815AS ATA Device +++++
--- User ---
[MBR] c4ab20c510a07a54c71f3f4c59712277
[BSP] cf42810ed9eb59b389d280cc8e4491c9 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 152485 Mo
User = LL1 ... OK!
User != LL2 ... KO!
--- LL2 ---
[MBR] 70148074f1584933dcf4047c431b6619
[BSP] cf42810ed9eb59b389d280cc8e4491c9 : Windows 7/8 MBR Code
Partition table:
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 152485 Mo

+++++ PhysicalDrive1: USB007 mini-USB2BU USB Device +++++
--- User ---
[MBR] 891d54330f80fff02aa34e919a23522d
[BSP] 339bf20e410bdc6979ade62eadf7f2d0 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] FAT32 (0x0b) [VISIBLE] Offset (sectors): 63 | Size: 1921 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

Finished : << RKreport[1]_S_01022013_02d0419.txt >>
RKreport[1]_S_01022013_02d0419.txt

Edited by c0lossus, 02 January 2013 - 05:20 AM.


#15 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:05:08 AM

Posted 02 January 2013 - 12:53 PM

Please run the following tools and post there logs.

1.
Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
    Posted Image
  • Put a checkmark beside loaded modules.
    Posted Image
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
    Posted Image
  • Click the Start Scan button.
    Posted Image
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
    Posted Image
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Posted Image
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

2.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


Things to include in your next reply::
TDSSkiller log
Combofix.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users