Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

help remove webhp google redirect on windows 7


  • This topic is locked This topic is locked
13 replies to this topic

#1 TerryAK

TerryAK

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:34 AM

Posted 31 January 2013 - 02:19 PM

When I try to get to google my browser re-directs me to a url with the string webhp in it. The browser is slow and I've read this rootkit virus can cause a lot of problems so I want to remove it. I have a norton firewall and anti-virus installed and malware bytes but apparently they did not stop me from becoming infected. I have updated the definition files for those programs and ran several other programs to try to get rid of this problem to no avail.

Thank you for this forum and for your willingness to help strangers with these nasty viruses.

DDS (Ver_2012-11-20.01) - NTFS_AMD64
Internet Explorer: 9.0.8112.16421 BrowserJavaVersion: 1.6.0_22
Run by Terry at 10:55:29 on 2013-01-31
Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.5887.3997 [GMT -8:00]
.
AV: Norton Security Suite *Enabled/Updated* {63DF5164-9100-186D-2187-8DC619EFD8BF}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: Norton Security Suite *Enabled/Updated* {D8BEB080-B73A-17E3-1B37-B6B462689202}
FW: Norton Security Suite *Enabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}
.
============== Running Processes ===============
.
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\LSI SoftModem\agr64svc.exe
C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe
c:\Program Files (x86)\Common Files\LightScribe\LSSrvc.exe
C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe
C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe
C:\Program Files (x86)\Norton Security Suite\Engine\20.2.0.19\ccSvcHst.exe
C:\Program Files (x86)\RealNetworks\RealDownloader\rndlresolversvc.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\system32\WUDFHost.exe
C:\Windows\system32\taskhost.exe
C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files (x86)\Norton Security Suite\Engine\20.2.0.19\ccSvcHst.exe
C:\Windows\system32\taskeng.exe
C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
c:\Program Files (x86)\Hewlett-Packard\Media\DVD\DVDAgent.exe
c:\Program Files (x86)\Hewlett-Packard\TouchSmart\Media\Kernel\CLML\CLMLSvc.exe
C:\QUICKENW\QWDLLS.EXE
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\System32\svchost.exe -k LocalServicePeerNet
C:\Program Files (x86)\Hewlett-Packard\HP Health Check\hphc_service.exe
C:\Program Files (x86)\Common Files\Intuit\Update Service\IntuitUpdateService.exe
C:\Program Files (x86)\Common Files\Intuit\Update Service v4\IntuitUpdateService.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Windows\system32\wuauclt.exe
C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbarUser_32.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Windows\system32\svchost.exe -k SDRSVC
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Program Files (x86)\Microsoft Office\Office12\OUTLOOK.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\PC-Doctor for Windows\pcdr5cuiw32.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Windows\system32\LogonUI.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\System32\cscript.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = file:///C:/Users/Terry/OldDrive/Inetpub/HomePageFiles/indexmine.htm
mStart Page = hxxp://websearch.good-results.info/
mDefault_Page_URL = hxxp://ie.redirect.hp.com/svs/rdr?

TYPE=3&tp=iehome&locale=en_US&c=94&bd=Pavilion&pf=cndt
mWinlogon: Userinit = userinit.exe,
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common

Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO: Skype add-on (mastermind): {22BF413B-C6D2-4d91-82A9-A0F997BA588C} - C:\Program Files (x86)\Skype

\Toolbars\Internet Explorer\SkypeIEPlugin.dll
BHO: {2EECD738-5844-4a99-B4B6-146BF802613B} - <orphaned>
BHO: RealNetworks Download and Record Plugin for Internet Explorer: {3049C3E9-B461-4BC5-8870-

4C09146192CA} - C:\ProgramData\RealNetworks\RealDownloader\BrowserPlugins\IE\rndlbrowserrecordplugin.dll
BHO: Norton Identity Protection: {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files (x86)\Norton

Security Suite\Engine\20.2.0.19\coieplg.dll
BHO: Norton Vulnerability Protection: {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files

(x86)\Norton Security Suite\Engine\20.2.0.19\ips\ipsbho.dll
BHO: Groove GFS Browser Helper: {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files

(x86)\Microsoft Office\Office12\GrooveShellExtensions.dll
BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google

\Google Toolbar\GoogleToolbar_32.dll
BHO: Microsoft Live Search Toolbar Helper: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\Program Files

(x86)\MSN\Toolbar\3.0.0560.0\msneshellx.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files

(x86)\Java\jre6\bin\jp2ssv.dll
TB: Google Toolbar: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google

Toolbar\GoogleToolbar_32.dll
TB: Norton Toolbar: {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files (x86)\Norton Security

Suite\Engine\20.2.0.19\coieplg.dll
TB: Microsoft Live Search Toolbar: {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - c:\Program Files (x86)\MSN

\Toolbar\3.0.0560.0\msneshellx.dll
TB: <No Name>: - LocalServer32 - <no file>
TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google

Toolbar\GoogleToolbar_32.dll
TB: Norton Toolbar: {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files (x86)\Norton Security

Suite\Engine\20.2.0.19\coieplg.dll
uRun: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
StartupFolder: C:\Users\Terry\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\IMPULS~1.LNK -

C:\Program Files (x86)\Stardock\Impulse\Now\ImpulseNow.exe
StartupFolder: C:\PROGRA~3\MICROS~1\Windows\STARTM~1\Programs\Startup\BILLMI~1.LNK - C:\QUICKENW

\BILLMIND.EXE
StartupFolder: C:\PROGRA~3\MICROS~1\Windows\STARTM~1\Programs\Startup\MICROS~1.LNK - C:\Program Files

(x86)\Microsoft Office\Office10\OSA.EXE
StartupFolder: C:\PROGRA~3\MICROS~1\Windows\STARTM~1\Programs\Startup\QUICKE~1.LNK - C:\QUICKENW

\QWDLLS.EXE
mPolicies-Explorer: NoActiveDesktop = dword:1
mPolicies-Explorer: NoActiveDesktopChanges = dword:1
mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: E&xport to Microsoft Excel - C:\PROGRA~2\MICROS~2\Office12\EXCEL.EXE/3000
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - C:\Program Files

(x86)\Microsoft Office\Office12\ONBttnIE.dll
IE: {5067A26B-1337-4436-8AFE-EE169C2DA79F} - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\Program Files

(x86)\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll
IE: {77BF5300-1474-4EC7-9980-D32B190E9B07} - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\Program Files

(x86)\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
DPF: {149E45D8-163E-4189-86FC-45022AB2B6C9} - file:///C:/Program%20Files%20(x86)/Bejeweled

%202/Images/stg_drm.ocx
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-

windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-

windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-

windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-

windows-i586.cab
DPF: {CC450D71-CC90-424C-8638-1F2DBAC87A54} - file:///C:/Program%20Files%20(x86)/Bejeweled

%202/Images/armhelper.ocx
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} -

hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: NameServer = 75.75.75.75 75.75.76.76
TCP: Interfaces\{A296B9DA-F08B-4CDC-9FE1-1F5592267412} : DHCPNameServer = 75.75.75.75 75.75.76.76
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files (x86)\Microsoft

Office\Office12\GrooveSystemServices.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype

\Skype4COM.dll
SSODL: WebCheck - <orphaned>
SEH: Groove GFS Stub Execution Hook - {B5A7F190-DDA6-4420-B3BA-52453494E6CD} - C:\Program Files

(x86)\Microsoft Office\Office12\GrooveShellExtensions.dll
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "C:\Program Files (x86)\Google\Chrome\Application

\24.0.1312.56\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --

multi-install --chrome
x64-mStart Page = hxxp://ie.redirect.hp.com/svs/rdr?

TYPE=3&tp=iehome&locale=en_US&c=94&bd=Pavilion&pf=cndt
x64-mDefault_Page_URL = hxxp://ie.redirect.hp.com/svs/rdr?

TYPE=3&tp=iehome&locale=en_US&c=94&bd=Pavilion&pf=cndt
x64-BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google

\Google Toolbar\GoogleToolbar_64.dll
x64-TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google

Toolbar\GoogleToolbar_64.dll
x64-Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - <orphaned>
x64-Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - <orphaned>
x64-SSODL: WebCheck - <orphaned>
.
================= FIREFOX ===================
.
FF - ProfilePath - C:\Users\Terry\AppData\Roaming\Mozilla\Firefox\Profiles\ejysji0z.default\
FF - prefs.js: browser.search.selectedEngine - WebSearch
FF - prefs.js: browser.startup.homepage - hxxp://websearch.good-results.info/
FF - prefs.js: browser.search.defaulturl - hxxp://websearch.good-results.info/?l=1&q=
FF - prefs.js: keyword.URL - hxxp://websearch.good-results.info/?l=1&q=
FF - component: C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-

85EF591126E7}\N360_4.0.0.127\coFFPlgn_2010_9_0_6\components\coFFPlgn.dll
FF - component: C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_4.0.0.127\IPSFFPlgn

\components\IPSFFPl.dll
FF - component: C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext\components

\nprpffbrowserrecordext.dll
FF - component: C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext\components

\nprpffbrowserrecordlegacyext.dll
FF - plugin: C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\nppdf32.dll
FF - plugin: C:\Program Files (x86)\Google\Update\1.3.21.123\npGoogleUpdate3.dll
FF - plugin: C:\Program Files (x86)\Java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\Program Files (x86)\Microsoft Silverlight\4.1.10111.0\npctrlui.dll
FF - plugin: C:\Program Files (x86)\Mozilla Firefox\plugins\npdeployJava1.dll
FF - plugin: C:\Program Files (x86)\Mozilla Firefox\plugins\nprpplugin.dll
FF - plugin: c:\program files (x86)\real\realplayer\Netscape6\nprpplugin.dll
FF - plugin: C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins

\nprpchromebrowserrecordext.dll
FF - plugin: C:\ProgramData\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprphtml5videoshim.dll
FF - plugin: C:\Users\Terry\AppData\LocalLow\Unity\WebPlayer\loader\npUnity3D32.dll
FF - plugin: C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_11_5_502_146.dll
.
---- FIREFOX POLICIES ----
FF - user.js: extensions.autoDisableScopes - 14);//iBryteuser_pref(extensions.BabylonToolbar_i.babTrack,

affID=110795&tt=140812_bandext_3312_7
FF - user.js: extensions.BabylonToolbar_i.babExt -
FF - user.js: extensions.BabylonToolbar_i.srcExt - ss
FF - user.js: extensions.BabylonToolbar.tlbrSrchUrl - hxxp://www.google.com/search?babsrc=TB_ggl&q=
FF - user.js: extensions.BabylonToolbar.id - c8dfa64500000000000090e6ba3e3292
FF - user.js: extensions.BabylonToolbar.instlDay - 15568
FF - user.js: extensions.BabylonToolbar.vrsn - 1.6.4.6
FF - user.js: extensions.BabylonToolbar.vrsni - 1.6.4.6
FF - user.js: extensions.BabylonToolbar_i.vrsnTs - 1.6.4.619:35:39
FF - user.js: extensions.BabylonToolbar.prtnrId - babylon
FF - user.js: extensions.BabylonToolbar.prdct - BabylonToolbar
FF - user.js: extensions.BabylonToolbar.aflt - babsst
FF - user.js: extensions.BabylonToolbar_i.smplGrp - none
FF - user.js: extensions.BabylonToolbar.tlbrId - tb9
FF - user.js: extensions.BabylonToolbar.instlRef - sst
FF - user.js: extensions.BabylonToolbar.dfltLng - en
FF - user.js: extensions.BabylonToolbar.excTlbr - false
FF - user.js: extensions.BabylonToolbar.admin - false
.
============= SERVICES / DRIVERS ===============
.
R0 SymDS;Symantec Data Store;C:\Windows\System32\drivers\N360x64\1402000.013\symds64.sys [2013-1-11

493216]
R0 SymEFA;Symantec Extended File Attributes;C:\Windows\System32\drivers\N360x64\1402000.013\symefa64.sys

[2013-1-11 1133216]
R1 A2DDA;A2 Direct Disk Access Support Driver;C:\Users\Terry\Downloads\EmsisoftEmergencyKit\Run

\a2ddax64.sys [2012-8-14 23208]
R1 BHDrvx64;BHDrvx64;C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-

85EF591126E7}\N360_20.1.0.24\Definitions\BASHDefs\20130116.013\BHDrvx64.sys [2013-1-15 1388120]
R1 ccSet_N360;Norton Security Suite Settings Manager;C:\Windows\System32\drivers

\N360x64\1402000.013\ccsetx64.sys [2013-1-11 168096]
R1 IDSVia64;IDSVia64;C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-

85EF591126E7}\N360_20.1.0.24\Definitions\IPSDefs\20130130.001\IDSviA64.sys [2013-1-30 513184]
R1 SymIRON;Symantec Iron Driver;C:\Windows\System32\drivers\N360x64\1402000.013\ironx64.sys [2013-1-11

224416]
R1 SymNetS;Symantec Network Security WFP Driver;C:\Windows\System32\drivers

\N360x64\1402000.013\symnets.sys [2013-1-11 432800]
R2 HPDrvMntSvc.exe;HP Quick Synchronization Service;C:\Program Files (x86)\Hewlett-Packard\Shared

\HPDrvMntSvc.exe [2010-10-14 92216]
R2 IntuitUpdateServiceV4;Intuit Update Service v4;C:\Program Files (x86)\Common Files\Intuit\Update

Service v4\IntuitUpdateService.exe [2011-8-25 13672]
R2 MBAMScheduler;MBAMScheduler;C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe

[2012-9-16 398184]
R2 MBAMService;MBAMService;C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2012-9-16

682344]
R2 N360;Norton Security Suite;C:\Program Files (x86)\Norton Security Suite\Engine\20.2.0.19\ccsvchst.exe

[2013-1-11 143928]
R2 RealNetworks Downloader Resolver Service;RealNetworks Downloader Resolver Service;C:\Program Files

(x86)\RealNetworks\RealDownloader\rndlresolversvc.exe [2012-11-29 38608]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE

\EraserUtilRebootDrv.sys [2013-1-11 138912]
R3 MBAMProtector;MBAMProtector;C:\Windows\System32\drivers\mbam.sys [2012-8-17 24176]
R3 PCDSRVC{F36B3A4C-F95654BD-06000000}_0;PCDSRVC{F36B3A4C-F95654BD-06000000}_0 - PCDR Kernel Mode

Service Helper Driver;C:\Program Files\PC-Doctor for Windows\pcdsrvc_x64.pkms [2009-6-10 23536]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;C:\Windows\Microsoft.NET

\Framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;C:\Windows\Microsoft.NET

\Framework64\v4.0.30319\mscorsvw.exe [2010-3-18 138576]
S2 gupdate1ca716e711884f0;Google Update Service (gupdate1ca716e711884f0);C:\Program Files (x86)\Google

\Update\GoogleUpdate.exe [2009-11-29 133104]
S2 WajamUpdater;WajamUpdater;"C:\Program Files (x86)\Wajam\Updater\WajamUpdater.exe" --> C:\Program

Files (x86)\Wajam\Updater\WajamUpdater.exe [?]
S3 McComponentHostService;McAfee Security Scan Component Host Service;C:\Program Files (x86)\McAfee

Security Scan\2.0.181\McCHSvc.exe [2010-1-15 227232]
S3 TsUsbFlt;TsUsbFlt;C:\Windows\System32\drivers\TsUsbFlt.sys [2011-6-8 59392]
S3 USBAAPL64;Apple Mobile USB Driver;C:\Windows\System32\drivers\usbaapl64.sys [2012-4-25 52736]
S3 WatAdminSvc;Windows Activation Technologies Service;C:\Windows\System32\Wat\WatAdminSvc.exe [2010-5-

12 1255736]
.
=============== File Associations ===============
.
ShellExec: FRONTPG.EXE: edit=C:\PROGRA~2\MICROS~2\Office10\FRONTPG.EXE
.
=============== Created Last 30 ================
.
2013-01-31 18:01:30 -------- d-----w- C:\Users\Terry\AppData\Roaming\RealNetworks
2013-01-31 08:50:24 -------- d-----w- C:\latestbackup
2013-01-31 08:38:49 -------- d-----w- C:\Users\Terry\latest backups
2013-01-30 23:03:21 -------- d-----w- C:\Users\Terry\AppData\Local\Programs
2013-01-30 07:31:06 -------- d-----w- C:\Windows\pss
2013-01-30 03:40:30 -------- d-----w- C:\Program Files (x86)\RealNetworks
2013-01-30 03:40:28 -------- d-----w- C:\ProgramData\RealNetworks
2013-01-30 03:40:13 -------- d-----w- C:\Program Files (x86)\Common Files\xing shared
2013-01-30 03:40:07 153296 ----a-w- C:\Program Files (x86)\Mozilla Firefox\plugins

\nppl3260.dll
2013-01-30 03:40:01 124056 ----a-w- C:\Program Files (x86)\Mozilla Firefox\plugins

\nprpplugin.dll
2013-01-28 23:34:58 -------- d-----w- C:\ProgramData\Search-NewTab
2013-01-28 23:34:58 -------- d-----w- C:\ProgramData\ClickIT
2013-01-28 23:34:41 -------- d-----w- C:\Users\Terry\AppData\Local\SwvUpdater
2013-01-28 23:34:29 -------- d-----w- C:\Program Files (x86)\Conduit
2013-01-28 23:33:17 -------- d-----w- C:\Users\Terry\AppData\Local\Conduit
2013-01-28 23:32:29 -------- d-----w- C:\ProgramData\SaveAs
2013-01-28 23:31:34 -------- d-----w- C:\ProgramData\InstallMate
2013-01-25 01:08:55 -------- d-----w- C:\ProgramData\34BE82C4-E596-4e99-A191-

52C6199EBF69
2013-01-25 01:08:55 -------- d-----w- C:\Program Files\iTunes
2013-01-25 01:08:55 -------- d-----w- C:\Program Files\iPod
2013-01-25 01:08:55 -------- d-----w- C:\Program Files (x86)\iTunes
2013-01-19 05:10:07 96224 ----a-w- C:\Program Files (x86)\Mozilla Firefox\webapprt-stub.exe
2013-01-19 05:10:07 73696 ----a-w- C:\Program Files (x86)\Mozilla Firefox

\breakpadinjector.dll
2013-01-19 05:10:07 157272 ----a-w- C:\Program Files (x86)\Mozilla Firefox\webapp-

uninstaller.exe
2013-01-13 02:54:35 -------- d-----w- C:\Users\Terry\AppData\Local\Respironics
2013-01-13 02:53:54 -------- d-----w- C:\Program Files (x86)\Respironics
2013-01-13 00:24:25 -------- d-----w- C:\ProgramData\ResMed
2013-01-13 00:23:01 -------- d-----w- C:\Program Files (x86)\ResMed
2013-01-13 00:19:56 -------- d-----w- C:\ProgramData\{740DA5E1-87B3-47BF-9A61-

33426D495341}
2013-01-12 19:51:57 43680 ----a-r- C:\Windows\System32\drivers\SymIMV.sys
2013-01-11 21:49:33 776864 ----a-w- C:\Windows\System32\drivers

\N360x64\1402000.013\srtsp64.sys
2013-01-11 21:49:33 493216 ----a-w- C:\Windows\System32\drivers

\N360x64\1402000.013\symds64.sys
2013-01-11 21:49:33 432800 ----a-r- C:\Windows\System32\drivers

\N360x64\1402000.013\symnets.sys
2013-01-11 21:49:33 37496 ----a-r- C:\Windows\System32\drivers

\N360x64\1402000.013\srtspx64.sys
2013-01-11 21:49:33 23448 ----a-r- C:\Windows\System32\drivers

\N360x64\1402000.013\symelam.sys
2013-01-11 21:49:33 224416 ----a-r- C:\Windows\System32\drivers

\N360x64\1402000.013\ironx64.sys
2013-01-11 21:49:33 168096 ----a-w- C:\Windows\System32\drivers

\N360x64\1402000.013\ccsetx64.sys
2013-01-11 21:49:33 1133216 ----a-w- C:\Windows\System32\drivers

\N360x64\1402000.013\symefa64.sys
2013-01-11 21:49:05 -------- d-----w- C:\Windows\System32\drivers\N360x64\1402000.013
2013-01-11 20:02:50 -------- d-----w- C:\sleepdata
2013-01-11 19:48:11 177312 ----a-w- C:\Windows\System32\drivers\SYMEVENT64x86.SYS
2013-01-11 19:48:11 -------- d-----w- C:\Program Files\Symantec
2013-01-11 19:48:11 -------- d-----w- C:\Program Files\Common Files\Symantec Shared
2013-01-11 19:46:25 -------- d-----w- C:\Windows\System32\drivers\N360x64
2013-01-11 19:46:23 -------- d-----w- C:\Program Files (x86)\Norton Security Suite
2013-01-11 19:45:05 -------- d-----w- C:\Program Files (x86)\NortonInstaller
.
==================== Find3M ====================
.
2013-01-09 00:57:15 74248 ----a-w- C:\Windows\SysWow64\FlashPlayerCPLApp.cpl
2013-01-09 00:57:15 697864 ----a-w- C:\Windows\SysWow64\FlashPlayerApp.exe
2012-12-15 00:49:28 24176 ----a-w- C:\Windows\System32\drivers\mbam.sys
.
============= FINISH: 10:56:21.09 ===============

BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:04:34 AM

Posted 31 January 2013 - 02:26 PM

Hello TerryAK,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • In the upper right hand corner of the topic you will see a button called Watch Topic.I suggest you click it and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

  • Finally, please reply using the ADD REPLY button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.
  • I will be analyzing your log. I will get back to you with instructions.


Do you have a Usb Flash Drive you can use?

1.
Download AdwCleaner
  • Double click on AdwCleaner.exe to run the tool.
    ***Note: Windows Vista and Windows 7 users:
    Right click in the adwCleaner.exe and select
    Posted Image
  • Click the Delete button.
  • A logfile will automatically open after the scan has finished.
  • Please post the content of that logfile in your next reply.
  • Or you can find the logfile at C:\AdwCleaner[R1].txt.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 TerryAK

TerryAK
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:34 AM

Posted 31 January 2013 - 02:45 PM

Thank you for your fast response fireman!

Yes, I have a flash drive.

I followed your directions, here is the log file

# AdwCleaner v2.109 - Logfile created 01/31/2013 at 11:36:04
# Updated 26/01/2013 by Xplode
# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
# User : Terry - SWEETHEART
# Boot Mode : Normal
# Running from : C:\Users\Terry\Desktop\adwcleaner.exe
# Option [Delete]


***** [Services] *****

Stopped & Deleted : WajamUpdater

***** [Files / Folders] *****

File Deleted : C:\END
File Deleted : C:\Program Files (x86)\Mozilla Firefox\searchplugins\babylon.xml
File Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\eBay.lnk
File Deleted : C:\user.js
File Deleted : C:\Users\Terry\AppData\Roaming\Mozilla\Firefox\Profiles\ejysji0z.default\BrowserMngr_extensions.sqlite
File Deleted : C:\Users\Terry\AppData\Roaming\Mozilla\Firefox\Profiles\ejysji0z.default\browsermngr_prefs.js
File Deleted : C:\Users\Terry\AppData\Roaming\Mozilla\Firefox\Profiles\ejysji0z.default\searchplugins\BabylonMngr.xml
File Deleted : C:\Users\Terry\AppData\Roaming\Mozilla\Firefox\Profiles\ejysji0z.default\searchplugins\WebSearch.xml
Folder Deleted : C:\Program Files (x86)\Conduit
Folder Deleted : C:\ProgramData\Babylon
Folder Deleted : C:\ProgramData\Browser Manager
Folder Deleted : C:\ProgramData\InstallMate
Folder Deleted : C:\ProgramData\SaveAs
Folder Deleted : C:\ProgramData\Trymedia
Folder Deleted : C:\Users\Terry\AppData\Local\Conduit
Folder Deleted : C:\Users\Terry\AppData\Local\Google\Chrome\User Data\Default\Extensions\jpmbfleldcgkldadpdinhjjopdfpjfjp
Folder Deleted : C:\Users\Terry\AppData\Local\SwvUpdater
Folder Deleted : C:\Users\Terry\AppData\Local\Temp\boost_interprocess
Folder Deleted : C:\Users\Terry\AppData\Local\Wajam
Folder Deleted : C:\Users\Terry\AppData\LocalLow\BabylonToolbar
Folder Deleted : C:\Users\Terry\AppData\LocalLow\Conduit
Folder Deleted : C:\Users\Terry\AppData\LocalLow\PriceGong
Folder Deleted : C:\Users\Terry\AppData\LocalLow\SaveAs
Folder Deleted : C:\Users\Terry\AppData\Roaming\Babylon
Folder Deleted : C:\Users\Terry\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Browser Manager
Folder Deleted : C:\Users\Terry\AppData\Roaming\Mozilla\Firefox\Profiles\ejysji0z.default\extensions\staged

***** [Registry] *****

Key Deleted : HKCU\Software\AppDataLow\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\ConduitSearchScopes
Key Deleted : HKCU\Software\AppDataLow\Software\PriceGong
Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar
Key Deleted : HKCU\Software\AppDataLow\SProtector
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\DataMngr
Key Deleted : HKCU\Software\DataMngr_Toolbar
Key Deleted : HKCU\Software\InstallCore
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{98889811-442D-49DD-99D7-DC866BE87DBC}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Deleted : HKCU\Software\Wajam
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}
Key Deleted : HKLM\Software\Babylon
Key Deleted : HKLM\Software\BrowserMngr
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{D616A4A2-7B38-4DBC-9093-6FE7A4A21B17}
Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT3272810
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}
Key Deleted : HKLM\Software\Conduit
Key Deleted : HKLM\Software\DataMngr
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\ConduitInstaller_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\ConduitInstaller_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\WajamUpdater_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\WajamUpdater_RASMANCS
Key Deleted : HKLM\Software\SP Global
Key Deleted : HKLM\Software\SProtector
Key Deleted : HKLM\Software\Wajam
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\jpmbfleldcgkldadpdinhjjopdfpjfjp
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Deleted : HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Application\WajamUpdater
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9EDC0C90-2B5B-4512-953E-35767BAD5C67}
Key Deleted : HKLM\SOFTWARE\Software
Key Deleted : HKU\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Main [BrowserMngr Start Page]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes [BrowserMngrDefaultScope]
Value Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar [{98889811-442D-49DD-99D7-DC866BE87DBC}]

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16421

Replaced : [HKLM\SOFTWARE\Microsoft\Internet Explorer\AboutURls - Tabs] = hxxp://search.babylon.com/?affID=110795&tt=140812_bandext_3312_7&babsrc=NT_ss&mntrId=c8dfa64500000000000090e6ba3e3292 --> hxxp://www.google.com
Replaced : [HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main - Start Page] = hxxp://websearch.good-results.info/ --> hxxp://www.google.com

-\\ Mozilla Firefox v16.0.2 (en-US)

File : C:\Users\Terry\AppData\Roaming\Mozilla\Firefox\Profiles\ejysji0z.default\prefs.js

C:\Users\Terry\AppData\Roaming\Mozilla\Firefox\Profiles\ejysji0z.default\user.js ... Deleted !

Deleted : user_pref("browser.newtab.url", "hxxp://search.babylon.com/?affID=110795&tt=140812_bandext_3312_7&ba[...]
Deleted : user_pref("browser.search.defaultenginename", "WebSearch");
Deleted : user_pref("browser.search.order.1", "WebSearch");
Deleted : user_pref("browser.search.selectedEngine", "WebSearch");
Deleted : user_pref("browser.startup.homepage", "hxxp://websearch.good-results.info/");
Deleted : user_pref("extensions.BabylonToolbar.admin", false);
Deleted : user_pref("extensions.BabylonToolbar.aflt", "babsst");
Deleted : user_pref("extensions.BabylonToolbar.dfltLng", "en");
Deleted : user_pref("extensions.BabylonToolbar.excTlbr", false);
Deleted : user_pref("extensions.BabylonToolbar.id", "c8dfa64500000000000090e6ba3e3292");
Deleted : user_pref("extensions.BabylonToolbar.instlDay", "15568");
Deleted : user_pref("extensions.BabylonToolbar.instlRef", "sst");
Deleted : user_pref("extensions.BabylonToolbar.prdct", "BabylonToolbar");
Deleted : user_pref("extensions.BabylonToolbar.prtnrId", "babylon");
Deleted : user_pref("extensions.BabylonToolbar.tlbrId", "tb9");
Deleted : user_pref("extensions.BabylonToolbar.tlbrSrchUrl", "hxxp://www.google.com/search?babsrc=TB_ggl&q=");
Deleted : user_pref("extensions.BabylonToolbar.vrsn", "1.6.4.6");
Deleted : user_pref("extensions.BabylonToolbar.vrsni", "1.6.4.6");
Deleted : user_pref("extensions.BabylonToolbar_i.babExt", "");
Deleted : user_pref("extensions.BabylonToolbar_i.newTab", true);
Deleted : user_pref("extensions.BabylonToolbar_i.newTabUrl", "hxxp://search.babylon.com/?affID=110795&tt=14081[...]
Deleted : user_pref("extensions.BabylonToolbar_i.smplGrp", "none");
Deleted : user_pref("extensions.BabylonToolbar_i.srcExt", "ss");
Deleted : user_pref("extensions.BabylonToolbar_i.vrsnTs", "1.6.4.619:35:39");
Deleted : user_pref("browser.search.defaulturl", "hxxp://websearch.good-results.info/?l=1&q=");
Deleted : user_pref("browser.search.order.1,S", "WebSearch");
Deleted : user_pref("browser.search.defaultenginename,S", "WebSearch");
Deleted : user_pref("browser.search.selectedEngine,S", "WebSearch");
Deleted : user_pref("keyword.URL", "hxxp://websearch.good-results.info/?l=1&q=");

-\\ Google Chrome v24.0.1312.56

File : C:\Users\Terry\AppData\Local\Google\Chrome\User Data\Default\Preferences

Deleted [l.11] : homepage = "hxxp://websearch.good-results.info/",
Deleted [l.15] : urls_to_restore_on_startup = [ "hxxp://websearch.good-results.info/" ]
Deleted [l.270] : homepage = "hxxp://websearch.good-results.info/",
Deleted [l.331] : urls_to_restore_on_startup = [ "hxxp://websearch.good-results.info/" ]

*************************

AdwCleaner[S1].txt - [8530 octets] - [31/01/2013 11:36:04]

########## EOF - C:\AdwCleaner[S1].txt - [8590 octets] ##########

#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:04:34 AM

Posted 31 January 2013 - 06:19 PM

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.

To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.

On the System Recovery Options menu you will get the following options:Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt
[*]Select Command Prompt[*]In the command window type in notepad and press Enter.[*]The notepad opens. Under File menu select Open.[*]Select "Computer" and find your flash drive letter and close the notepad.[*]In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
Note: Replace letter e with the drive letter of your flash drive.[*]The tool will start to run.[*]When the tool opens click Yes to disclaimer.[*]Press Scan button.[*]It will make a log (FRST.txt) on the flash drive. Please copy and paste it to your reply.[/list]

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 TerryAK

TerryAK
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:34 AM

Posted 31 January 2013 - 07:44 PM

Thanks. here is the log.

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 01-02-2013 03
Ran by SYSTEM at 31-01-2013 16:38:28
Running from G:\
Windows 7 Home Premium (X64) OS Language: English(US)
The current controlset is ControlSet001

==================== Registry (Whitelisted) ===================

HKLM-x32\...\Run: [] [x]
HKU\Default\...\Run: [HPADVISOR] [x]
HKU\Default User\...\Run: [HPADVISOR] [x]
HKU\Terry\...\Run: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [39408 2009-11-17] (Google Inc.)
Tcpip\Parameters: [DhcpNameServer] 75.75.75.75 75.75.76.76
Startup: C:\Users\All Users\Start Menu\Programs\Startup\Billminder.lnk
ShortcutTarget: Billminder.lnk -> C:\QUICKENW\BILLMIND.EXE (Intuit)
Startup: C:\Users\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk
ShortcutTarget: Microsoft Office.lnk -> C:\Program Files (x86)\Microsoft Office\Office10\OSA.EXE (Microsoft Corporation)
Startup: C:\Users\All Users\Start Menu\Programs\Startup\Quicken Startup.lnk
ShortcutTarget: Quicken Startup.lnk -> C:\QUICKENW\QWDLLS.EXE (Intuit)
Startup: C:\Users\Terry\Start Menu\Programs\Startup\Impulse Now.lnk
ShortcutTarget: Impulse Now.lnk -> C:\Program Files (x86)\Stardock\Impulse\Now\ImpulseNow.exe (No File)

==================== Services (Whitelisted) ===================

2 gupdate1ca716e711884f0; "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc [133104 2009-11-29] (Google Inc.)
2 MBAMScheduler; "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe" [398184 2012-12-14] (Malwarebytes Corporation)
2 MBAMService; "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe" [682344 2012-12-14] (Malwarebytes Corporation)
3 McComponentHostService; "C:\Program Files (x86)\McAfee Security Scan\2.0.181\McCHSvc.exe" [227232 2010-01-15] (McAfee, Inc.)
2 N360; "C:\Program Files (x86)\Norton Security Suite\Engine\20.2.0.19\ccSvcHst.exe" /s "N360" /m "C:\Program Files (x86)\Norton Security Suite\Engine\20.2.0.19\diMaster.dll" /prefetch:1 [535416 2012-10-11] (Symantec Corporation)
2 RealNetworks Downloader Resolver Service; "C:\Program Files (x86)\RealNetworks\RealDownloader\rndlresolversvc.exe" [38608 2012-11-29] ()

==================== Drivers (Whitelisted) =====================

1 A2DDA; \??\C:\Users\Terry\Downloads\EmsisoftEmergencyKit\Run\a2ddax64.sys [23208 2012-08-13] (Emsi Software GmbH)
1 BHDrvx64; \??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\BASHDefs\20130116.013\BHDrvx64.sys [1388120 2013-01-15] (Symantec Corporation)
1 ccSet_N360; C:\Windows\system32\drivers\N360x64\1402000.013\ccSetx64.sys [168096 2012-10-03] (Symantec Corporation)
1 eeCtrl; \??\C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\eeCtrl64.sys [484512 2013-01-11] (Symantec Corporation)
3 EraserUtilRebootDrv; \??\C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [138912 2013-01-11] (Symantec Corporation)
1 IDSVia64; \??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\IPSDefs\20130130.001\IDSvia64.sys [513184 2013-01-11] (Symantec Corporation)
3 MBAMProtector; \??\C:\Windows\system32\drivers\mbam.sys [24176 2012-12-14] (Malwarebytes Corporation)
3 NAVENG; \??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\VirusDefs\20130131.007\ENG64.SYS [126192 2013-01-15] (Symantec Corporation)
3 NAVEX15; \??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\VirusDefs\20130131.007\EX64.SYS [2087664 2013-01-15] (Symantec Corporation)
3 SRTSP; C:\Windows\System32\Drivers\N360x64\1402000.013\SRTSP64.SYS [776864 2012-10-08] (Symantec Corporation)
1 SRTSPX; C:\Windows\system32\drivers\N360x64\1402000.013\SRTSPX64.SYS [37496 2012-05-24] (Symantec Corporation)
0 SymDS; C:\Windows\System32\drivers\N360x64\1402000.013\SYMDS64.SYS [493216 2012-10-03] (Symantec Corporation)
0 SymEFA; C:\Windows\System32\drivers\N360x64\1402000.013\SYMEFA64.SYS [1133216 2012-10-03] (Symantec Corporation)
3 SymEvent; \??\C:\Windows\system32\Drivers\SYMEVENT64x86.SYS [177312 2013-01-11] (Symantec Corporation)
1 SymIM; C:\Windows\System32\DRIVERS\SymIMv.sys [43680 2012-08-08] (Symantec Corporation)
1 SymIRON; C:\Windows\system32\drivers\N360x64\1402000.013\Ironx64.SYS [224416 2012-07-27] (Symantec Corporation)
1 SymNetS; C:\Windows\System32\Drivers\N360x64\1402000.013\SYMNETS.SYS [432800 2012-07-22] (Symantec Corporation)
3 PCDSRVC{F36B3A4C-F95654BD-06000000}_0; \??\c:\program files\pc-doctor for windows\pcdsrvc_x64.pkms [x]

==================== NetSvcs (Whitelisted) ====================


==================== One Month Created Files and Folders ========

2013-01-31 16:38 - 2013-01-31 16:38 - 00000000 ____D C:\FRST
2013-01-31 16:06 - 2013-01-31 16:06 - 00001136 ____A C:\Users\Terry\Desktop\FRST64.exe - Shortcut.lnk
2013-01-31 15:58 - 2013-01-31 15:58 - 01464583 ____A (Farbar) C:\Users\Terry\Downloads\FRST64.exe
2013-01-31 11:36 - 2013-01-31 11:37 - 00008653 ____A C:\AdwCleaner[S1].txt
2013-01-31 11:34 - 2013-01-31 11:34 - 00580235 ____A C:\Users\Terry\Desktop\adwcleaner.exe
2013-01-31 11:04 - 2013-01-31 11:04 - 00003041 ____A C:\Users\Terry\Desktop\attach.zip
2013-01-31 10:56 - 2013-01-31 10:57 - 00020753 ____A C:\Users\Terry\Desktop\dds.txt
2013-01-31 10:56 - 2013-01-31 10:57 - 00008468 ____A C:\Users\Terry\Desktop\attach.txt
2013-01-31 10:47 - 2013-01-31 10:47 - 00688992 ___RA (Swearware) C:\Users\Terry\Desktop\dds.com
2013-01-31 10:01 - 2013-01-31 10:01 - 00000000 ____D C:\Users\Terry\AppData\Roaming\RealNetworks
2013-01-31 00:50 - 2013-01-31 00:51 - 00000000 ____D C:\latestbackup
2013-01-31 00:38 - 2013-01-31 00:38 - 00000000 ____D C:\Users\Terry\latest backups
2013-01-30 21:29 - 2013-01-30 21:39 - 00015831 ____A C:\Users\Terry\Downloads\1chjkxur.exe.8xpq4qx.partial
2013-01-30 21:02 - 2013-01-30 21:02 - 00000000 ____D C:\Users\Terry\Downloads\backups
2013-01-30 20:46 - 2013-01-30 20:46 - 00012311 ____A C:\Users\Terry\Desktop\hijackthis.log
2013-01-30 20:33 - 2013-01-30 20:33 - 00388608 ____A (Trend Micro Inc.) C:\Users\Terry\Downloads\HijackThis (2).exe
2013-01-30 20:32 - 2013-01-30 20:32 - 00388608 ____A (Trend Micro Inc.) C:\Users\Terry\Downloads\HijackThis (1).exe
2013-01-30 20:31 - 2013-01-30 20:31 - 00388608 ____A (Trend Micro Inc.) C:\Users\Terry\Desktop\HijackThis.exe
2013-01-29 23:31 - 2013-01-29 23:31 - 00000000 ____D C:\Windows\pss
2013-01-29 22:57 - 2013-01-29 22:57 - 768070920 ____A C:\Windows\MEMORY.DMP
2013-01-29 22:57 - 2013-01-29 22:57 - 00293576 ____A C:\Windows\Minidump\012913-24975-01.dmp
2013-01-29 22:57 - 2013-01-29 22:57 - 00000000 ____D C:\Windows\Minidump
2013-01-29 19:40 - 2013-01-29 19:40 - 00201424 ____A (RealNetworks, Inc.) C:\Windows\SysWOW64\rmoc3260.dll
2013-01-29 19:40 - 2013-01-29 19:40 - 00001046 ____A C:\Users\Public\Desktop\RealPlayer.lnk
2013-01-29 19:40 - 2013-01-29 19:40 - 00000000 ____D C:\Users\All Users\RealNetworks
2013-01-29 19:40 - 2013-01-29 19:40 - 00000000 ____D C:\Program Files (x86)\RealNetworks
2013-01-29 19:39 - 2013-01-29 19:39 - 00272896 ____A (Progressive Networks) C:\Windows\SysWOW64\pncrt.dll
2013-01-29 19:39 - 2013-01-29 19:39 - 00006656 ____A (RealNetworks, Inc.) C:\Windows\SysWOW64\pndx5016.dll
2013-01-29 19:39 - 2013-01-29 19:39 - 00005632 ____A (RealNetworks, Inc.) C:\Windows\SysWOW64\pndx5032.dll
2013-01-28 15:34 - 2013-01-28 16:38 - 00000000 ____D C:\Users\All Users\Search-NewTab
2013-01-28 15:34 - 2013-01-28 15:34 - 00000000 ____D C:\Users\All Users\ClickIT
2013-01-27 20:47 - 2013-01-27 20:47 - 00000000 ____D C:\Users\Terry\Desktop\cpap data
2013-01-24 17:09 - 2013-01-24 17:09 - 00001745 ____A C:\Users\Public\Desktop\iTunes.lnk
2013-01-24 17:08 - 2013-01-24 17:09 - 00000000 ____D C:\Users\All Users\34BE82C4-E596-4e99-A191-52C6199EBF69
2013-01-24 17:08 - 2013-01-24 17:09 - 00000000 ____D C:\Program Files\iTunes
2013-01-24 17:08 - 2013-01-24 17:09 - 00000000 ____D C:\Program Files (x86)\iTunes
2013-01-24 17:08 - 2013-01-24 17:08 - 00000000 ____D C:\Program Files\iPod
2013-01-12 18:54 - 2013-01-12 18:54 - 00001989 ____A C:\Users\Public\Desktop\EncoreBasic.lnk
2013-01-12 18:54 - 2013-01-12 18:54 - 00000000 ____D C:\Users\Terry\AppData\Local\Respironics
2013-01-12 18:54 - 2013-01-12 18:54 - 00000000 ____D C:\Users\Public\Documents\Respironics
2013-01-12 18:53 - 2013-01-12 18:53 - 00000000 ____D C:\Program Files (x86)\Respironics
2013-01-12 16:24 - 2013-01-12 16:24 - 00000000 ____D C:\Users\All Users\ResMed
2013-01-12 16:23 - 2013-01-14 10:15 - 00000000 ____D C:\Program Files (x86)\ResMed
2013-01-12 16:23 - 2013-01-12 16:23 - 00000000 ____D C:\Users\Public\Documents\ResMed
2013-01-12 16:19 - 2013-01-12 16:19 - 00000000 ____D C:\Users\All Users\{740DA5E1-87B3-47BF-9A61-33426D495341}
2013-01-12 16:14 - 2013-01-12 16:17 - 99889591 ____A (ResMed Ltd ) C:\Users\Terry\Downloads\31302_ResScan_3.16_SP1.exe
2013-01-12 11:51 - 2012-08-08 17:50 - 00043680 ___RA (Symantec Corporation) C:\Windows\System32\Drivers\SymIMV.sys
2013-01-11 12:02 - 2013-01-11 14:22 - 00000000 ____D C:\sleepdata
2013-01-11 12:01 - 2013-01-12 11:39 - 00000000 ____D C:\Users\Terry\Documents\SleepyHeadData
2013-01-11 11:48 - 2013-01-11 11:48 - 00177312 ____A (Symantec Corporation) C:\Windows\System32\Drivers\SYMEVENT64x86.SYS
2013-01-11 11:48 - 2013-01-11 11:48 - 00007466 ____A C:\Windows\System32\Drivers\SYMEVENT64x86.CAT
2013-01-11 11:48 - 2013-01-11 11:48 - 00000000 ____D C:\Program Files\Symantec
2013-01-11 11:48 - 2013-01-11 11:48 - 00000000 ____D C:\Program Files\Common Files\Symantec Shared
2013-01-11 11:46 - 2013-01-12 14:46 - 00000000 ____D C:\Windows\System32\Drivers\N360x64
2013-01-11 11:46 - 2013-01-11 11:46 - 00000000 ____D C:\Program Files (x86)\Norton Security Suite
2013-01-11 11:29 - 2013-01-11 11:29 - 00001368 ____A C:\Users\Terry\Desktop\Norton Installation Files.lnk
2013-01-11 11:17 - 2013-01-11 11:17 - 01653440 ____A (W3i, LLC) C:\Users\Terry\Downloads\7zip_installer_d162802.exe
2013-01-06 23:17 - 2013-01-06 23:17 - 00001246 ____A C:\Users\Terry\Documents\NEWSOFT

==================== One Month Modified Files and Folders =======

2013-01-31 16:25 - 2009-11-29 19:46 - 00000894 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2013-01-31 16:24 - 2009-09-23 16:46 - 01636674 ____A C:\Windows\WindowsUpdate.log
2013-01-31 16:24 - 2009-07-13 21:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-01-31 16:24 - 2009-07-13 20:51 - 00086459 ____A C:\Windows\setupact.log
2013-01-31 16:24 - 2009-07-13 20:45 - 00015792 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-01-31 16:24 - 2009-07-13 20:45 - 00015792 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-01-31 16:06 - 2013-01-31 16:06 - 00001136 ____A C:\Users\Terry\Desktop\FRST64.exe - Shortcut.lnk
2013-01-31 16:05 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\NDF
2013-01-31 15:58 - 2013-01-31 15:58 - 01464583 ____A (Farbar) C:\Users\Terry\Downloads\FRST64.exe
2013-01-31 15:58 - 2009-07-13 21:13 - 00726316 ____A C:\Windows\System32\PerfStringBackup.INI
2013-01-31 15:57 - 2012-04-14 18:25 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-01-31 15:19 - 2009-11-29 19:46 - 00000898 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2013-01-31 11:37 - 2013-01-31 11:36 - 00008653 ____A C:\AdwCleaner[S1].txt
2013-01-31 11:36 - 2009-11-14 19:33 - 00000552 ____A C:\Windows\Tasks\PCDRScheduledMaintenance.job
2013-01-31 11:34 - 2013-01-31 11:34 - 00580235 ____A C:\Users\Terry\Desktop\adwcleaner.exe
2013-01-31 11:04 - 2013-01-31 11:04 - 00003041 ____A C:\Users\Terry\Desktop\attach.zip
2013-01-31 10:57 - 2013-01-31 10:56 - 00020753 ____A C:\Users\Terry\Desktop\dds.txt
2013-01-31 10:57 - 2013-01-31 10:56 - 00008468 ____A C:\Users\Terry\Desktop\attach.txt
2013-01-31 10:47 - 2013-01-31 10:47 - 00688992 ___RA (Swearware) C:\Users\Terry\Desktop\dds.com
2013-01-31 10:01 - 2013-01-31 10:01 - 00000000 ____D C:\Users\Terry\AppData\Roaming\RealNetworks
2013-01-31 10:01 - 2009-11-19 18:21 - 00000000 ____D C:\Users\All Users\Adobe
2013-01-31 00:57 - 2009-11-14 18:50 - 00000000 ____D C:\Users\Terry\AppData\Local\VirtualStore
2013-01-31 00:51 - 2013-01-31 00:50 - 00000000 ____D C:\latestbackup
2013-01-31 00:38 - 2013-01-31 00:38 - 00000000 ____D C:\Users\Terry\latest backups
2013-01-31 00:38 - 2009-11-14 18:43 - 00000000 ____D C:\users\Terry
2013-01-30 23:50 - 2009-08-14 18:17 - 01162940 ____A C:\Windows\PFRO.log
2013-01-30 21:39 - 2013-01-30 21:29 - 00015831 ____A C:\Users\Terry\Downloads\1chjkxur.exe.8xpq4qx.partial
2013-01-30 21:02 - 2013-01-30 21:02 - 00000000 ____D C:\Users\Terry\Downloads\backups
2013-01-30 20:46 - 2013-01-30 20:46 - 00012311 ____A C:\Users\Terry\Desktop\hijackthis.log
2013-01-30 20:33 - 2013-01-30 20:33 - 00388608 ____A (Trend Micro Inc.) C:\Users\Terry\Downloads\HijackThis (2).exe
2013-01-30 20:32 - 2013-01-30 20:32 - 00388608 ____A (Trend Micro Inc.) C:\Users\Terry\Downloads\HijackThis (1).exe
2013-01-30 20:31 - 2013-01-30 20:31 - 00388608 ____A (Trend Micro Inc.) C:\Users\Terry\Desktop\HijackThis.exe
2013-01-30 18:52 - 2012-08-15 18:40 - 00000000 ____D C:\Users\Terry\AppData\Local\NPE
2013-01-30 17:24 - 2009-11-29 19:37 - 00000000 ____D C:\Users\Terry\AppData\Roaming\Skype
2013-01-30 16:00 - 2009-11-29 19:41 - 00000000 ____D C:\Users\Terry\AppData\Roaming\skypePM
2013-01-30 15:03 - 2012-09-16 22:55 - 00001075 ____A C:\Users\Terry\Desktop\Malwarebytes Anti-Malware.lnk
2013-01-30 15:03 - 2012-08-17 10:19 - 00000000 ____D C:\Program Files (x86)\Malwarebytes' Anti-Malware
2013-01-29 23:31 - 2013-01-29 23:31 - 00000000 ____D C:\Windows\pss
2013-01-29 22:57 - 2013-01-29 22:57 - 768070920 ____A C:\Windows\MEMORY.DMP
2013-01-29 22:57 - 2013-01-29 22:57 - 00293576 ____A C:\Windows\Minidump\012913-24975-01.dmp
2013-01-29 22:57 - 2013-01-29 22:57 - 00000000 ____D C:\Windows\Minidump
2013-01-29 19:41 - 2009-11-17 18:23 - 00000000 ____D C:\Users\Terry\AppData\Roaming\Real
2013-01-29 19:40 - 2013-01-29 19:40 - 00201424 ____A (RealNetworks, Inc.) C:\Windows\SysWOW64\rmoc3260.dll
2013-01-29 19:40 - 2013-01-29 19:40 - 00001046 ____A C:\Users\Public\Desktop\RealPlayer.lnk
2013-01-29 19:40 - 2013-01-29 19:40 - 00000000 ____D C:\Users\All Users\RealNetworks
2013-01-29 19:40 - 2013-01-29 19:40 - 00000000 ____D C:\Program Files (x86)\RealNetworks
2013-01-29 19:40 - 2011-10-26 14:16 - 00000000 ____D C:\Program Files (x86)\real
2013-01-29 19:40 - 2009-11-17 18:23 - 00000000 ____D C:\Users\All Users\Real
2013-01-29 19:39 - 2013-01-29 19:39 - 00272896 ____A (Progressive Networks) C:\Windows\SysWOW64\pncrt.dll
2013-01-29 19:39 - 2013-01-29 19:39 - 00006656 ____A (RealNetworks, Inc.) C:\Windows\SysWOW64\pndx5016.dll
2013-01-29 19:39 - 2013-01-29 19:39 - 00005632 ____A (RealNetworks, Inc.) C:\Windows\SysWOW64\pndx5032.dll
2013-01-29 11:14 - 2012-02-06 10:26 - 00000332 ____A C:\Windows\Tasks\HPCeeScheduleForTerry.job
2013-01-28 16:41 - 2009-08-14 18:26 - 00000000 ___HD C:\Program Files (x86)\InstallShield Installation Information
2013-01-28 16:40 - 2009-08-14 18:28 - 00000000 ____D C:\Users\All Users\CyberLink
2013-01-28 16:40 - 2009-08-14 18:28 - 00000000 ____D C:\Program Files (x86)\Cyberlink
2013-01-28 16:38 - 2013-01-28 15:34 - 00000000 ____D C:\Users\All Users\Search-NewTab
2013-01-28 16:37 - 2012-04-27 16:10 - 00000000 ____D C:\Users\Terry\AppData\Local\Unity
2013-01-28 15:34 - 2013-01-28 15:34 - 00000000 ____D C:\Users\All Users\ClickIT
2013-01-28 10:17 - 2009-11-15 10:39 - 00000052 ____A C:\Windows\SysWOW64\DOErrors.log
2013-01-28 10:15 - 2009-11-15 10:14 - 00000000 ____D C:\Users\Terry\AppData\Roaming\HpUpdate
2013-01-27 20:47 - 2013-01-27 20:47 - 00000000 ____D C:\Users\Terry\Desktop\cpap data
2013-01-24 17:09 - 2013-01-24 17:09 - 00001745 ____A C:\Users\Public\Desktop\iTunes.lnk
2013-01-24 17:09 - 2013-01-24 17:08 - 00000000 ____D C:\Users\All Users\34BE82C4-E596-4e99-A191-52C6199EBF69
2013-01-24 17:09 - 2013-01-24 17:08 - 00000000 ____D C:\Program Files\iTunes
2013-01-24 17:09 - 2013-01-24 17:08 - 00000000 ____D C:\Program Files (x86)\iTunes
2013-01-24 17:08 - 2013-01-24 17:08 - 00000000 ____D C:\Program Files\iPod
2013-01-21 10:15 - 2009-11-15 10:14 - 00000000 ____D C:\Users\Terry\AppData\Roaming\HP Support Assistant
2013-01-20 13:49 - 2012-07-11 13:32 - 00000000 ____D C:\Program Files (x86)\Mozilla Maintenance Service
2013-01-18 21:10 - 2009-12-22 08:01 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox
2013-01-15 12:28 - 2009-11-16 09:42 - 01363968 ____A C:\Users\Terry\Documents\Database1.accdb
2013-01-14 10:15 - 2013-01-12 16:23 - 00000000 ____D C:\Program Files (x86)\ResMed
2013-01-13 13:09 - 2010-08-17 19:38 - 00000000 ____D C:\Users\Terry\AppData\Local\CrashDumps
2013-01-12 18:54 - 2013-01-12 18:54 - 00001989 ____A C:\Users\Public\Desktop\EncoreBasic.lnk
2013-01-12 18:54 - 2013-01-12 18:54 - 00000000 ____D C:\Users\Terry\AppData\Local\Respironics
2013-01-12 18:54 - 2013-01-12 18:54 - 00000000 ____D C:\Users\Public\Documents\Respironics
2013-01-12 18:53 - 2013-01-12 18:53 - 00000000 ____D C:\Program Files (x86)\Respironics
2013-01-12 16:24 - 2013-01-12 16:24 - 00000000 ____D C:\Users\All Users\ResMed
2013-01-12 16:23 - 2013-01-12 16:23 - 00000000 ____D C:\Users\Public\Documents\ResMed
2013-01-12 16:19 - 2013-01-12 16:19 - 00000000 ____D C:\Users\All Users\{740DA5E1-87B3-47BF-9A61-33426D495341}
2013-01-12 16:17 - 2013-01-12 16:14 - 99889591 ____A (ResMed Ltd ) C:\Users\Terry\Downloads\31302_ResScan_3.16_SP1.exe
2013-01-12 14:46 - 2013-01-11 11:46 - 00000000 ____D C:\Windows\System32\Drivers\N360x64
2013-01-12 11:39 - 2013-01-11 12:01 - 00000000 ____D C:\Users\Terry\Documents\SleepyHeadData
2013-01-11 14:22 - 2013-01-11 12:02 - 00000000 ____D C:\sleepdata
2013-01-11 11:49 - 2009-08-14 19:03 - 00000000 ____D C:\Users\All Users\Norton
2013-01-11 11:48 - 2013-01-11 11:48 - 00177312 ____A (Symantec Corporation) C:\Windows\System32\Drivers\SYMEVENT64x86.SYS
2013-01-11 11:48 - 2013-01-11 11:48 - 00007466 ____A C:\Windows\System32\Drivers\SYMEVENT64x86.CAT
2013-01-11 11:48 - 2013-01-11 11:48 - 00000000 ____D C:\Program Files\Symantec
2013-01-11 11:48 - 2013-01-11 11:48 - 00000000 ____D C:\Program Files\Common Files\Symantec Shared
2013-01-11 11:46 - 2013-01-11 11:46 - 00000000 ____D C:\Program Files (x86)\Norton Security Suite
2013-01-11 11:29 - 2013-01-11 11:29 - 00001368 ____A C:\Users\Terry\Desktop\Norton Installation Files.lnk
2013-01-11 11:29 - 2010-04-22 08:55 - 00000000 ____D C:\Users\Public\Downloads\Norton
2013-01-11 11:17 - 2013-01-11 11:17 - 01653440 ____A (W3i, LLC) C:\Users\Terry\Downloads\7zip_installer_d162802.exe
2013-01-08 16:57 - 2012-04-14 18:25 - 00697864 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2013-01-08 16:57 - 2011-07-08 17:16 - 00074248 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2013-01-07 11:00 - 2011-05-09 09:25 - 00001854 ____A C:\Users\Terry\AppData\Roaming\GhostObjGAFix.xml
2013-01-06 23:17 - 2013-01-06 23:17 - 00001246 ____A C:\Users\Terry\Documents\NEWSOFT
2013-01-06 15:08 - 2009-11-16 19:24 - 00000187 ____A C:\Windows\5ORMORE.INI
2013-01-06 15:08 - 2009-07-13 18:34 - 00000506 ____A C:\Windows\win.ini


==================== Known DLLs (Whitelisted) =================


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points =========================

Restore point made on: 2013-01-12 00:49:24
Restore point made on: 2013-01-12 16:22:52
Restore point made on: 2013-01-12 18:53:41
Restore point made on: 2013-01-14 10:13:48
Restore point made on: 2013-01-22 00:00:10
Restore point made on: 2013-01-28 16:39:31

==================== Memory info ===========================

Percentage of memory in use: 14%
Total physical RAM: 5887.23 MB
Available physical RAM: 5056.64 MB
Total Pagefile: 5885.38 MB
Available Pagefile: 5036.27 MB
Total Virtual: 8192 MB
Available Virtual: 8191.9 MB

==================== Partitions =============================

1 Drive c: (HP) (Fixed) (Total:584.06 GB) (Free:479.58 GB) NTFS
2 Drive e: (FACTORY_IMAGE) (Fixed) (Total:12.01 GB) (Free:2.18 GB) NTFS ==>[System with boot components (obtained from reading drive)]
3 Drive f: (NVUS2000) (CDROM) (Total:0.47 GB) (Free:0 GB) CDFS
4 Drive g: (USB DISK) (Fixed) (Total:0.93 GB) (Free:0.93 GB) FAT32
9 Drive x: (Boot) (Fixed) (Total:0.08 GB) (Free:0.07 GB) NTFS
10 Drive y: (SYSTEM) (Fixed) (Total:0.1 GB) (Free:0.07 GB) NTFS ==>[System with boot components (obtained from reading drive)]

Disk ### Status Size Free Dyn Gpt
-------- ------------- ------- ------- --- ---
Disk 0 Online 596 GB 0 B
Disk 1 Online 956 MB 0 B
Disk 2 No Media 0 B 0 B
Disk 3 No Media 0 B 0 B
Disk 4 No Media 0 B 0 B
Disk 5 No Media 0 B 0 B

Partitions of Disk 0:
===============

Disk ID: 1549F232

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 100 MB 1024 KB
Partition 2 Primary 584 GB 101 MB
Partition 3 Primary 12 GB 584 GB

==================================================================================

Disk: 0
Partition 1
Type : 07
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 1 Y SYSTEM NTFS Partition 100 MB Healthy

=========================================================

Disk: 0
Partition 2
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 2 C HP NTFS Partition 584 GB Healthy

=========================================================

Disk: 0
Partition 3
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 3 E FACTORY_IMA NTFS Partition 12 GB Healthy

=========================================================

Partitions of Disk 1:
===============

Disk ID: 57079394

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 955 MB 48 KB

==================================================================================

Disk: 1
Partition 1
Type : 0B
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 4 G USB DISK FAT32 Partition 955 MB Healthy

=========================================================

Last Boot: 2013-01-24 02:10

==================== End Of Log =============================

#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:04:34 AM

Posted 31 January 2013 - 11:21 PM

Still getting redirects?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 TerryAK

TerryAK
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:34 AM

Posted 31 January 2013 - 11:31 PM

Yes unfortunately.

The address bar in IE no longer changes to show the current url when going to google so I can't look in the address bar for the url but when I look at the properties of the page this is what is shown.
http://www.google.com/webhp?sourceid=toolbar-instant&hl=en&ion=1&qscrl=1&rlz=1T4RNTN_enUS354US354#hl=en&tbo=d&qscrl=1&rlz=1T4RNTN_enUS354US354&output=search&sclient=psy-ab&q=dect%20eco&oq=&gs_l=&pbx=1&fp=4f87d28683822bd8&ion=1&bav=on.2,or.r_gc.r_pw.r_qf.&bvm=bv.41867550,d.cGE&biw=912&bih=616

I'm assuming I shouldn't open the program I use to pay bills until I get this off my system. What do you think?

Thanks,
Terry

#8 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:04:34 AM

Posted 31 January 2013 - 11:49 PM

Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#9 TerryAK

TerryAK
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:34 AM

Posted 01 February 2013 - 12:50 AM

Thank you.

Here is the log.

ComboFix 13-01-31.03 - Terry 01/31/2013 21:38:01.1.4 - x64
Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.5887.4604 [GMT -8:00]
Running from: c:\users\Terry\Desktop\ComboFix.exe
AV: Norton Security Suite *Disabled/Updated* {63DF5164-9100-186D-2187-8DC619EFD8BF}
FW: Norton Security Suite *Disabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}
SP: Norton Security Suite *Enabled/Updated* {D8BEB080-B73A-17E3-1B37-B6B462689202}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Terry\AppData\Local\dealcabby
c:\windows\security\Database\tmp.edb
.
.
((((((((((((((((((((((((( Files Created from 2013-01-01 to 2013-02-01 )))))))))))))))))))))))))))))))
.
.
2013-02-01 05:44 . 2013-02-01 05:44 -------- d-----w- c:\users\Default\AppData\Local\temp
2013-02-01 00:38 . 2013-02-01 00:38 -------- d-----w- C:\FRST
2013-01-31 18:01 . 2013-01-31 18:01 -------- d-----w- c:\users\Terry\AppData\Roaming\RealNetworks
2013-01-31 08:50 . 2013-01-31 08:51 -------- d-----w- C:\latestbackup
2013-01-31 08:38 . 2013-01-31 08:38 -------- d-----w- c:\users\Terry\latest backups
2013-01-30 23:03 . 2013-01-30 23:03 -------- d-----w- c:\users\Terry\AppData\Local\Programs
2013-01-30 03:40 . 2013-01-30 03:40 -------- d-----w- c:\program files (x86)\RealNetworks
2013-01-30 03:40 . 2013-01-30 03:40 -------- d-----w- c:\programdata\RealNetworks
2013-01-30 03:40 . 2013-01-30 03:40 -------- d-----w- c:\program files (x86)\Common Files\xing shared
2013-01-30 03:40 . 2013-01-30 03:40 153296 ----a-w- c:\program files (x86)\Mozilla Firefox\plugins\nppl3260.dll
2013-01-30 03:40 . 2013-01-30 03:40 124056 ----a-w- c:\program files (x86)\Mozilla Firefox\plugins\nprpplugin.dll
2013-01-28 23:34 . 2013-01-29 00:38 -------- d-----w- c:\programdata\Search-NewTab
2013-01-28 23:34 . 2013-01-28 23:34 -------- d-----w- c:\programdata\ClickIT
2013-01-25 01:08 . 2013-01-25 01:09 -------- d-----w- c:\programdata\34BE82C4-E596-4e99-A191-52C6199EBF69
2013-01-25 01:08 . 2013-01-25 01:09 -------- d-----w- c:\program files\iTunes
2013-01-25 01:08 . 2013-01-25 01:09 -------- d-----w- c:\program files (x86)\iTunes
2013-01-25 01:08 . 2013-01-25 01:08 -------- d-----w- c:\program files\iPod
2013-01-19 05:10 . 2013-01-19 05:10 96224 ----a-w- c:\program files (x86)\Mozilla Firefox\webapprt-stub.exe
2013-01-19 05:10 . 2013-01-19 05:10 73696 ----a-w- c:\program files (x86)\Mozilla Firefox\breakpadinjector.dll
2013-01-19 05:10 . 2013-01-19 05:10 157272 ----a-w- c:\program files (x86)\Mozilla Firefox\webapp-uninstaller.exe
2013-01-13 02:54 . 2013-01-13 02:54 -------- d-----w- c:\users\Terry\AppData\Local\Respironics
2013-01-13 02:53 . 2013-01-13 02:53 -------- d-----w- c:\program files (x86)\Respironics
2013-01-13 00:24 . 2013-01-13 00:24 -------- d-----w- c:\programdata\ResMed
2013-01-13 00:23 . 2013-01-14 18:15 -------- d-----w- c:\program files (x86)\ResMed
2013-01-13 00:19 . 2013-01-13 00:19 -------- d-----w- c:\programdata\{740DA5E1-87B3-47BF-9A61-33426D495341}
2013-01-12 19:51 . 2012-08-09 01:50 43680 ----a-r- c:\windows\system32\drivers\SymIMV.sys
2013-01-11 20:02 . 2013-01-11 22:22 -------- d-----w- C:\sleepdata
2013-01-11 19:48 . 2013-01-11 19:48 177312 ----a-w- c:\windows\system32\drivers\SYMEVENT64x86.SYS
2013-01-11 19:48 . 2013-01-11 19:48 -------- d-----w- c:\program files\Symantec
2013-01-11 19:48 . 2013-01-11 19:48 -------- d-----w- c:\program files\Common Files\Symantec Shared
2013-01-11 19:46 . 2013-01-12 22:46 -------- d-----w- c:\windows\system32\drivers\N360x64
2013-01-11 19:46 . 2013-01-11 19:46 -------- d-----w- c:\program files (x86)\Norton Security Suite
2013-01-11 19:45 . 2013-01-11 19:45 -------- d-----w- c:\program files (x86)\NortonInstaller
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-01-09 00:57 . 2012-04-15 02:25 697864 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2013-01-09 00:57 . 2011-07-09 01:16 74248 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2012-12-15 00:49 . 2012-08-17 18:19 24176 ----a-w- c:\windows\system32\drivers\mbam.sys
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-11-18 39408]
.
c:\users\Terry\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
Impulse Now.lnk - c:\program files (x86)\Stardock\Impulse\Now\ImpulseNow.exe [N/A]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Billminder.lnk - c:\quickenw\BILLMIND.EXE [2009-11-16 30208]
Microsoft Office.lnk - c:\program files (x86)\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]
Quicken Startup.lnk - c:\quickenw\QWDLLS.EXE [2009-11-16 27136]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]
"LoadAppInit_DLLs"=1 (0x1)
.
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R2 gupdate1ca716e711884f0;Google Update Service (gupdate1ca716e711884f0);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2009-11-30 133104]
R2 MBAMScheduler;MBAMScheduler;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe [2012-12-15 398184]
R2 MBAMService;MBAMService;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2012-12-15 682344]
R3 dc3d;MS Hardware Device Detection Driver;c:\windows\system32\DRIVERS\dc3d.sys [2010-07-02 51600]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2012-12-15 24176]
R3 PCDSRVC{F36B3A4C-F95654BD-06000000}_0;PCDSRVC{F36B3A4C-F95654BD-06000000}_0 - PCDR Kernel Mode Service Helper Driver;c:\program files\pc-doctor for windows\pcdsrvc_x64.pkms [2009-06-10 23536]
R3 Point64;Microsoft IntelliPoint Filter Driver;c:\windows\system32\DRIVERS\point64.sys [2010-07-21 45456]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-20 59392]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [2012-04-25 52736]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2010-05-13 1255736]
S0 SymDS;Symantec Data Store;c:\windows\system32\drivers\N360x64\1402000.013\SYMDS64.SYS [2012-10-04 493216]
S0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\N360x64\1402000.013\SYMEFA64.SYS [2012-10-04 1133216]
S1 A2DDA;A2 Direct Disk Access Support Driver;c:\users\Terry\Downloads\EmsisoftEmergencyKit\Run\a2ddax64.sys [2012-08-14 23208]
S1 BHDrvx64;BHDrvx64;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\BASHDefs\20130116.013\BHDrvx64.sys [2013-01-16 1388120]
S1 ccSet_N360;Norton Security Suite Settings Manager;c:\windows\system32\drivers\N360x64\1402000.013\ccSetx64.sys [2012-10-04 168096]
S1 IDSVia64;IDSVia64;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\IPSDefs\20130130.001\IDSvia64.sys [2013-01-11 513184]
S1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\N360x64\1402000.013\Ironx64.SYS [2012-07-28 224416]
S1 SymNetS;Symantec Network Security WFP Driver;c:\windows\System32\Drivers\N360x64\1402000.013\SYMNETS.SYS [2012-07-23 432800]
S2 HPDrvMntSvc.exe;HP Quick Synchronization Service;c:\program files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe [2010-10-15 92216]
S2 IntuitUpdateServiceV4;Intuit Update Service v4;c:\program files (x86)\Common Files\Intuit\Update Service v4\IntuitUpdateService.exe [2011-08-26 13672]
S2 N360;Norton Security Suite;c:\program files (x86)\Norton Security Suite\Engine\20.2.0.19\ccSvcHst.exe [2012-10-11 143928]
S2 RealNetworks Downloader Resolver Service;RealNetworks Downloader Resolver Service;c:\program files (x86)\RealNetworks\RealDownloader\rndlresolversvc.exe [2012-11-30 38608]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files (x86)\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2013-01-11 138912]
.
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-01-24 01:20 1607120 ----a-w- c:\program files (x86)\Google\Chrome\Application\24.0.1312.56\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-02-01 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-15 00:57]
.
2013-02-01 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2009-11-30 03:37]
.
2013-02-01 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2009-11-30 03:37]
.
2013-01-29 c:\windows\Tasks\HPCeeScheduleForTerry.job
- c:\program files (x86)\Hewlett-Packard\HP Ceement\HPCEE.exe [2009-10-07 12:22]
.
2013-01-31 c:\windows\Tasks\PCDRScheduledMaintenance.job
- c:\program files\PC-Doctor for Windows\pcdr5cuiw32.exe [2009-06-10 11:04]
.
.
--------- X64 Entries -----------
.
.
------- Supplementary Scan -------
.
uStart Page = file:///C:/Users/Terry/OldDrive/Inetpub/HomePageFiles/indexmine.htm
uLocal Page = c:\windows\system32\blank.htm
mDefault_Page_URL = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_US&c=94&bd=Pavilion&pf=cndt
mStart Page = hxxp://www.google.com
mLocal Page = c:\windows\SysWOW64\blank.htm
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~2\MICROS~2\Office12\EXCEL.EXE/3000
Trusted Zone: intuit.com\ttlc
TCP: DhcpNameServer = 75.75.75.75 75.75.76.76
FF - ProfilePath - c:\users\Terry\AppData\Roaming\Mozilla\Firefox\Profiles\ejysji0z.default\
.
- - - - ORPHANS REMOVED - - - -
.
Wow6432Node-HKLM-Run-<NO NAME> - (no file)
SafeBoot-59109913.sys
SafeBoot-mcmscsvc
SafeBoot-MCODS
AddRemove-{08DB3902-2CE0-474D-BCE3-0177766CE9F1} - c:\program files (x86)\InstallShield Installation Information\{08DB3902-2CE0-474D-BCE3-0177766CE9F1}\setup.exe
AddRemove-{09FF4DB8-7DE9-4D47-B7DB-915DB7D9A8CA} - c:\programdata\{3C0AACBF-B491-4BE5-BAF9-AA46E0629E42}\bm_installer.exe
.
.
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\services\N360]
"ImagePath"="\"c:\program files (x86)\Norton Security Suite\Engine\20.2.0.19\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files (x86)\Norton Security Suite\Engine\20.2.0.19\diMaster.dll\" /prefetch:1"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\services\PCDSRVC{F36B3A4C-F95654BD-06000000}_0]
"ImagePath"="\??\c:\program files\pc-doctor for windows\pcdsrvc_x64.pkms"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_5_502_146_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_5_502_146_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_5_502_146_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_5_502_146_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_146.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_146.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_146.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_146.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2013-01-31 21:47:27
ComboFix-quarantined-files.txt 2013-02-01 05:47
.
Pre-Run: 516,521,852,928 bytes free
Post-Run: 517,349,957,632 bytes free
.
- - End Of File - - 99942485E2B37B0C20245C6E9383F23C

#10 TerryAK

TerryAK
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:34 AM

Posted 01 February 2013 - 01:10 AM

combofix did not restart my computer which I guess indicates that it didn't find malware? I am still being re-directed but now the url is working like it should.

http://www.google.com/webhp?sourceid=navclient&ie=UTF-8&rlz=1T4RNTN_enUS354US354

What a nasty infection.

#11 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:04:34 AM

Posted 01 February 2013 - 02:25 AM

Hello,


Where is it redirecting you to?

1.
Please run this Microsoft Fixit
http://support.microsoft.com/kb/923737


2.
Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
    Posted Image
  • Put a checkmark beside loaded modules.
    Posted Image
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
    Posted Image
  • Click the Start Scan button.
    Posted Image
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
    Posted Image
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Posted Image
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

3.
Please download GMER from one of the following locations and save it to your desktop:

  • Main Mirror which will download a randomly named file
  • Zipped Mirror - Unzip the file to its own folder such as C:\gmer
  • Disconnect from the Internet and close all running programs
  • Temporarily disable any real-time active protection
  • It is very important you do not use your computer while GMER is running
  • Double-click on the randomly named GMER Posted Image icon
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan
  • If you receive a warning about rootkit activity and are asked to fully scan your system click NO
  • Please check in the Quick scan box
  • Please uncheck the following:
    • IAT/EAT
    • Show All <<< Important
    Posted Image
  • Click Scan
  • If you see a rootkit warning window click OK
  • When the scan is finished, Save the results to your desktop as gmer.log
  • Click Copy then paste the results in your reply
  • Exit GMER and be sure to re-enable your Antivirus, Firewall and any other security programs you had disabled
Note:
  • If you encounter any problems, try running GMER in Safe Mode
  • If GMER crashes or keeps resulting in a Blue Screen of Death, uncheck Devices on the right side before scanning


4.
  • 1. Please download OTL from one of the following mirrors:
  • This is THE Mirror
    2. Save it to your desktop.
    3. Double click on the Posted Image icon on your desktop.
    4. Under the Custom Scan box paste this in
    c:\windows\*. /SL
    c:\windows\*. /RP 
    netsvcs
    activex
    drivers32
    %ALLUSERSPROFILE%\Application Data\*.
    %ALLUSERSPROFILE%\Application Data\*.exe /s
    %APPDATA%\*.
    %APPDATA%\*.exe /s
    %SYSTEMDRIVE%\*.exe
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\Tasks\*.job /lockedfiles
    %systemroot%\system32\drivers\*.sys /lockedfiles
    %systemroot%\System32\config\*.sav 
    %systemroot%\system32\drivers\*.sys /90
    5. Push the Quick Scan button.
    6. Two reports will open, copy and paste them in a reply here:
  • OTL.txt <-- Will be opened
  • Extra.txt <-- Will be minimized





Things to include in your next reply::
TDssKiller log
Gmer log
OTL.txt
Still redirecting?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#12 TerryAK

TerryAK
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:01:34 AM

Posted 01 February 2013 - 12:53 PM

All seems fine now.

I am disabled and on a fixed income but I was at least able to give a small donation. You were awesome and I very much appreciate all your help.

#13 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:04:34 AM

Posted 01 February 2013 - 01:17 PM

Hello, TerryAK .
Congratulations! You now appear clean! :cool:


1.
Uninstall Combofix
  • Make sure that Combofix.exe that you downloaded is on your Desktop but Do not run it!
    o *If it is not on your Desktop, the below will not work.
  • Click on Posted Image then Run....
  • Now copy & paste the green bolded text in the run-box and click OK.

    ComboFix /Uninstall

    Posted Image

    <Notice the space between the "x" and "/".> <--- It needs to be there
    Windows Vista users: Press the Windows Key + R to bring the Run... Command and then from there you can add in the Combofix /Uninstall

  • Please advise if this step is missed for any reason as it performs some important actions:
    "This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.
    It also makes a clean Restore Point and flashes all the old restore points in order to prevent possible reinfection from an old one through system restore".

2.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Uninstall.
  • Confirm with yes.





Are things running okay? Do you have any more questions?

System Still Slow?
You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.
If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

We Need to Clean Up Our Mess
  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.

One of the most common questions found when cleaning malware is "how did my machine get infected?"

There are a variety of reasons, but the most common ones are that you are not practicing Safe Internet, you are not running the proper security software or that your computer's security settings are set too low.

Below I have outlined a series of categories that outline how you can increase the security of your computer to help reduce the chance of being infected again in the future.

Do not use P2P programs
Peer-to-peer or file-sharing programs (such as uTorrent, Limewire and Bitorrent) are probably the primary route of infection nowadays. These programs allow file sharing between users as the name(s) suggest. It is almost impossible to know whether the file you’re downloading through P2P programs is safe.

It is therefore possible to be infected by downloading infected files via peer-to-peer programs and so I recommend that you do not use these programs. Should you wish to use them, they must be used with extreme care. Some further reading on this subject, along with included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

In addition, P2P programs facilitate cyber crime and help distribute pirated software, movies and other illegal material.

Practice Safe Internet
Another one of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.

Below are a list of simple precautions to take to keep your computer clean and running securely:
  • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
  • If you receive an attachment and it ends with a .exe, .com, .bat, or .pif do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.
  • If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know who is themselves infected with malware which is trying to infect everyone in their address book. A key thing to look out for here is: does the email sound as though it’s from the person you know? Often, the email may simply have a web link or a “Run this file to make your PC run fast” message in it.
  • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of pop-ups, or Foistware, you should read this article: Foistware, And how to avoid it.
    There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. Removal instructions for a lot of these "rogues" can be found here.
  • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you, or will download a file to your PC without your knowledge. You can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake. DO NOT click on these windows, instead close them by finding the open window on your http://en.wikipedia.org/wiki/Taskbar#Screenshots '>Taskbar, right click and chose close.
  • Do not visit pornographic websites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do, as this can often form part of their funding.
  • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link you should message back to the person asking if it is legit.
  • Stay away from Warez and Crack sites! As with Peer-2-Peer programs, in addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections.
  • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download files from a site, and are not sure if they are legitimate, you can use tools such as BitDefender Traffic Light, Norton Safe Web, or McAfee SiteAdvisor to look up info on the site and stay protected against malicious sites. Please be sure to only choose and install one of those tool bars.
  • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.
    Sometimes even legitimate programs will try to bundle extra, unwanted, software with the program you want - this is done to raise money for the program. Be sure to untick any boxes which may indicate that other programs will be downloaded.

Keep Windows up-to-date
Microsoft continually releases security and stability updates for its supported operating systems and you should always apply these to help keep your PC secure.

  • Windows XP users
    You should visit Windows Update to check for the latest updates to your system. The latest service pack (SP3) can be obtained directly from Microsoft here.
  • Windows Vista users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP2) can be obtained directly from Microsoft here.
  • Windows 7 users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP1) can be obtained directly from Microsoft here


Keep your browser secure
Most modern browsers have come on in leaps and bounds with their inbuilt, default security. The best way to keep your browser secure nowadays is simply to keep it up-to-date.

The latest versions of the three common browsers can be found below:

Use an AntiVirus Software
It is very important that your computer has an up-to-date anti-virus software on it which has a real-time agent running. This alone can save you a lot of trouble with malware in the future.
See this link for a listing of some online & their stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources, a couple of free Anti-Virus programs you may be interested in are Microsoft Security Essentials and Avast.

It is imperative that you update your Antivirus software at least once a week (even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.

Use a Firewall
I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly.

All versions of Windows starting from XP have an in-built firewall. With Windows XP this firewall will protect you from incoming traffic (i.e. hackers). Starting with Windows Vista, the firewall was beefed up to also protect you against outgoing traffic (i.e. malicious programs installed on your machine should be blocked from sending data, such as your bank details and passwords, out).

In addition, if you connect to the internet via a router, this will normally have a firewall in-built.

Some people will recommend installing a different firewall (instead of the Windows’ built one), this is personal choice, but the message is to definitely have one! For a tutorial on Firewalls and a listing of some available ones see this link: Understanding and Using Firewalls

Install an Anti-Malware program
Recommended, and free, Anti-Malware programs are Malwarebytes Anti-Malware and SuperAntiSpyware.

You should regularly (perhaps once a week) scan your computer with an Anti-Malware program just as you would with an antivirus software.

Make sure your applications have all of their updates
It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is very important to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities (such as Adobe Reader and Java). You can check these by visiting Secunia Software Inspector.

Follow this list and your potential for being infected again will reduce dramatically.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#14 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:04:34 AM

Posted 04 February 2013 - 06:35 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users