Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

HijackThis Log: Please help Diagnose


  • This topic is locked This topic is locked
13 replies to this topic

#1 Jamiee9488

Jamiee9488

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia
  • Local time:01:47 AM

Posted 13 February 2013 - 09:35 AM

Mod Edit: moved to Appropriate forum ~~ boopme
 
 
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 8:58:41 AM, on 2/13/2013
Platform: Windows Vista SP2 (WinNT 6.00.1906)
MSIE: Internet Explorer v9.00 (9.00.8112.16464)
Boot mode: Normal
 
Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Uniblue\SpeedUpMyPC\spmonitor.exe
C:\Program Files\Uniblue\SpeedUpMyPC\sump.exe
C:\Program Files\Sony\Wireless Switch Setting Utility\Switcher.exe
C:\Program Files\Sony\ISB Utility\ISBMgr.exe
C:\Program Files\Apoint\Apoint.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe
C:\Program Files\Apoint\ApMsgFwd.exe
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe
C:\Program Files\Sony\VAIO Update\VAIOUpdt.exe
C:\Program Files\Uniblue\SystemTweaker\systemtweaker.exe
C:\Program Files\Sony\VAIO Care\listener.exe
C:\Program Files\Sony\VAIO Care\VCsystray.exe
C:\Windows\Explorer.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe
C:\Windows\system32\NOTEPAD.EXE
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
 
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.sony.com/vaiopeople
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr9/*http://www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = 
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = 
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = 
F2 - REG:system.ini: Shell=
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Java™ Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [ISBMgr.exe] "C:\Program Files\Sony\ISB Utility\ISBMgr.exe"
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [MSC] "c:\Program Files\Microsoft Security Client\msseces.exe" -hide -runkey
O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"
O4 - HKCU\..\Run: [HP Deskjet 3050A J611 series (NET)] "C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe" -deviceID "CN18A4419H05PJ:NW" -scfn "HP Deskjet 3050A J611 series (NET)" -AutoStart 1
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O4 - Global Startup: AutorunsDisabled
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O17 - HKLM\System\CCS\Services\Tcpip\..\{42387E21-2D4D-4D18-B004-2D78DD79C6BF}: NameServer = 71.2.28.14,208.33.159.39
O20 - AppInit_DLLs: C:\PROGRA~1\WI9130~1\Datamngr\datamngr.dll C:\PROGRA~1\WI9130~1\Datamngr\IEBHO.dll 
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: FBDiskOptimizer - FixBee., (www.fixbee.com) - C:\Program Files\FixBee\FBDefragSrv.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: MSCSPTISRV - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\MSCSPTISRV.exe
O23 - Service: PACSPTISVR - Unknown owner - C:\Program Files\Common Files\Sony Shared\AVLib\PACSPTISVR.exe
O23 - Service: VAIO Care Performance Service (SampleCollector) - Sony Corporation - C:\Program Files\Sony\VAIO Care\VCPerfService.exe
O23 - Service: Sony SPTI Service (SPTISRV) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\AVLib\SPTISRV.exe
O23 - Service: VAIO Entertainment TV Device Arbitration Service - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCs\VzHardwareResourceManager\VzHardwareResourceManager.exe
O23 - Service: VAIO Event Service - Sony Corporation - C:\Program Files\Sony\VAIO Event Service\VESMgr.exe
O23 - Service: VAIO Media Integrated Server (VAIOMediaPlatform-IntegratedServer-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\VMISrv.exe
O23 - Service: VAIO Media Integrated Server (HTTP) (VAIOMediaPlatform-IntegratedServer-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
O23 - Service: VAIO Media Integrated Server (UPnP) (VAIOMediaPlatform-IntegratedServer-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
O23 - Service: VAIO Media Gateway Server (VAIOMediaPlatform-Mobile-Gateway) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\VmGateway.exe
O23 - Service: VAIO Media Content Collection (VAIOMediaPlatform-UCLS-AppServer) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\UCLS.exe
O23 - Service: VAIO Media Content Collection (HTTP) (VAIOMediaPlatform-UCLS-HTTP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
O23 - Service: VAIO Media Content Collection (UPnP) (VAIOMediaPlatform-UCLS-UPnP) - Sony Corporation - C:\Program Files\Sony\VAIO Media Integrated Server\Platform\UPnPFramework.exe
O23 - Service: VAIO Entertainment UPnP Client Adapter (Vcsw) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VCSW\VCSW.exe
O23 - Service: VUAgent - Sony Corporation - C:\Program Files\Sony\VAIO Update\VUAgent.exe
O23 - Service: VAIO Entertainment Database Service (VzCdbSvc) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzCdbSvc.exe
O23 - Service: VAIO Entertainment File Import Service (VzFw) - Sony Corporation - C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzFw.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe
 
--
End of file - 8870 bytes

Edited by boopme, 13 February 2013 - 10:44 AM.


BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:01:47 AM

Posted 13 February 2013 - 01:21 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

Please take note:
  • If you have since resolved the original problem you were having, we would appreciate you letting us know.
  • If you are unable to create a log because your computer cannot start up successfully please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • If you are unable to perform the steps we have recommended please try one more time and if unsuccessful alert us of such and we will design an alternate means of obtaining the necessary information.
  • If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • Upon completing the steps below another staff member will review your topic an do their best to resolve your issues.
  • If you have already posted a DDS log, please do so again, as your situation may have changed.
  • Use the 'Add Reply' and add the new log to this thread.
  • We need to see some information about what is happening in your machine. Please perform the following scan again:
    • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
    • Double click on the DDS icon, allow it to run.
    • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
    • Notepad will open with the results.
    • Follow the instructions that pop up for posting the results.
    • Close the program window, and delete the program from your desktop.
    Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

    Information on A/V control HERE


    We also need a new log from the GMER anti-rootkit Scanner.



    Please first disable any CD emulation programs using the steps found in this topic:

    Why we request you disable CD Emulation when receiving Malware Removal Advice

    Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

    How to create a GMER log

    Note:
    If you are unable to run a Gmer scan due the fact you are running a 64bit machine please run the following tool and post its log.

    Please download aswMBR ( 511KB ) to your desktop.
    • Double click the aswMBR.exe icon to run it
    • Click the Scan button to start the scan
    • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.
    Thanks and again sorry for the delay.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 Jamiee9488

Jamiee9488
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia
  • Local time:01:47 AM

Posted 14 February 2013 - 03:03 PM

I am trying to figure out why my computer has such slow start up and shutdown times it is very frustrating.

I do not have the original windows CD/DVD

My system is Vista Home Premium 32 bit

Below is my current DDS,and GMER log

 

DDS (Ver_2012-11-20.01) - NTFS_x86 
Internet Explorer: 9.0.8112.16464  BrowserJavaVersion: 10.13.2
Run by Jamie at 14:48:11 on 2013-02-14
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.2037.926 [GMT -5:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {B140BF4E-23BB-4198-90AB-A51A4C60A69C}
SP: Microsoft Security Essentials *Enabled/Updated* {0A215EAA-0581-4E16-AA1B-9E6837E7EC21}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
c:\Program Files\Microsoft Security Client\MsMpEng.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\System32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Windows\system32\dllhost.exe
C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Sony\VAIO Event Service\VESMgr.exe
C:\Windows\system32\Dwm.exe
C:\Program Files\Uniblue\SpeedUpMyPC\spmonitor.exe
C:\Program Files\Sony\VAIO Media Integrated Server\UCLS.exe
C:\Windows\Explorer.EXE
C:\Program Files\Uniblue\SpeedUpMyPC\sump.exe
C:\Program Files\Sony\VAIO Event Service\VESMgrSub.exe
C:\Windows\System32\vds.exe
C:\Windows\system32\igfxext.exe
C:\Program Files\Sony\Wireless Switch Setting Utility\Switcher.exe
C:\Windows\system32\igfxsrvc.exe
C:\Windows\System32\WUDFHost.exe
C:\Program Files\Sony\VAIO Media Integrated Server\Platform\SV_Httpd.exe
C:\Program Files\Sony\ISB Utility\ISBMgr.exe
C:\Program Files\Apoint\Apoint.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe
C:\Program Files\Apoint\ApMsgFwd.exe
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\Sony\VAIO Power Management\SPMgr.exe
C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Uniblue\SystemTweaker\systemtweaker.exe
C:\Windows\system32\wbem\wmiprvse.exe
c:\Program Files\Microsoft Security Client\NisSrv.exe
C:\Program Files\Sony\VAIO Update\VAIOUpdt.exe
C:\Program Files\Sony\VAIO Update\VUAgent.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\Sony\VAIO Care\VCPerfService.exe
C:\Program Files\Sony\VAIO Care\listener.exe
C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VCSW\VCSW.exe
C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzCdbSvc.exe
C:\Program Files\Common Files\Sony Shared\VAIO Entertainment Platform\VzCdb\VzFw.exe
C:\Program Files\Sony\VAIO Care\VCsystray.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k wcssvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\svchost.exe -k SDRSVC
C:\Windows\system32\svchost.exe -k imgsvc
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://blekkosearch.mystart.com/blekkotb_soc/?source=86adbc52&toolbarid=blekkotb_soc&u=D77A44526604F78E09FD044FCC0D23CA&tbp=homepage&v=2_0
uDefault_Page_URL = hxxp://www.sony.com/vaiopeople
mStart Page = hxxp://www.yahoo.com/
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr9/*http://www.yahoo.com/ext/search/search.html
mSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr9/*http://www.yahoo.com
mDefault_Page_URL = hxxp://www.yahoo.com/
mDefault_Search_URL = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
dURLSearchHooks: {A3BC75A2-1F87-4686-AA43-5347D756017C} - <orphaned>
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
uRun: [HP Deskjet 3050A J611 series (NET)] "c:\program files\hp\hp deskjet 3050a j611 series\bin\ScanToPCActivationApp.exe" -deviceID "CN18A4419H05PJ:NW" -scfn "HP Deskjet 3050A J611 series (NET)" -AutoStart 1
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [ISBMgr.exe] "c:\program files\sony\isb utility\ISBMgr.exe"
mRun: [Apoint] c:\program files\apoint\Apoint.exe
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\autoru~1\mysoft~1.lnk - c:\program files\common files\mysoftware\Newsflsh.exe
uPolicies-Explorer: NoDriveTypeAutoRun = dword:145
mPolicies-Explorer: BindDirectlyToPropertySetStorage = dword:0
mPolicies-System: EnableLUA = dword:0
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: E&xport to Microsoft Excel - c:\progra~1\micros~4\office11\EXCEL.EXE/3000
DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - hxxp://ak.exe.imgfarm.com/images/nocache/funwebproducts/ei-4/MyFunCardsInitialSetup1.0.1.1.cab
TCP: NameServer = 192.168.0.1 71.2.28.14
TCP: Interfaces\{42387E21-2D4D-4D18-B004-2D78DD79C6BF} : NameServer = 71.2.28.14,208.33.159.39
TCP: Interfaces\{42387E21-2D4D-4D18-B004-2D78DD79C6BF} : DHCPNameServer = 192.168.0.1 71.2.28.14
Notify: igfxcui - igfxdev.dll
Notify: VESWinlogon - VESWinlogon.dll
AppInit_DLLs= c:\progra~1\wi9130~1\datamngr\datamngr.dll c:\progra~1\wi9130~1\datamngr\IEBHO.dll 
LSA: Security Packages =  kerberos msv1_0 schannel wdigest tspkg
.
============= SERVICES / DRIVERS ===============
.
R0 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2012-8-30 193552]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-9-24 21504]
R2 MSSQL$VAIO_VEDB;SQL Server (VAIO_VEDB);c:\program files\microsoft sql server\mssql.1\mssql\binn\sqlservr.exe [2010-12-10 29293408]
R2 NisDrv;Microsoft Network Inspection System;c:\windows\system32\drivers\NisDrvWFP.sys [2012-3-20 99272]
R2 VAIOMediaPlatform-UCLS-AppServer;VAIO Media Content Collection;c:\program files\sony\vaio media integrated server\UCLS.exe [2007-5-8 745472]
R2 VAIOMediaPlatform-UCLS-HTTP;VAIO Media Content Collection (HTTP);c:\program files\sony\vaio media integrated server\platform\SV_Httpd.exe [2007-5-8 397312]
R3 NisSrv;Microsoft Network Inspection;c:\program files\microsoft security client\NisSrv.exe [2012-9-12 287824]
R3 ti21sony;ti21sony;c:\windows\system32\drivers\ti21sony.sys [2007-4-23 812544]
R3 VUAgent;VUAgent;c:\program files\sony\vaio update\VUAgent.exe [2013-2-7 957056]
RUnknown SampleCollector;SampleCollector; [x]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S3 FBDiskOptimizer;FBDiskOptimizer;c:\program files\fixbee\FBDefragSrv.exe [2012-2-24 608568]
S3 MatSvc;Microsoft Automated Troubleshooting Service;c:\program files\microsoft fix it center\Matsvc.exe [2011-6-13 267568]
S3 motccgp;Motorola USB Composite Device Driver;c:\windows\system32\drivers\motccgp.sys [2008-8-21 18688]
S3 motccgpfl;MotCcgpFlService;c:\windows\system32\drivers\motccgpfl.sys [2008-8-21 8320]
S3 motport;Motorola USB Diagnostic Port;c:\windows\system32\drivers\motport.sys [2007-6-18 23680]
S3 VAIOMediaPlatform-UCLS-UPnP;VAIO Media Content Collection (UPnP);c:\program files\sony\vaio media integrated server\platform\UPnPFramework.exe [2007-5-8 1089536]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
.
=============== File Associations ===============
.
FileExt: .txt: Applications\wmplayer.exe="c:\program files\windows media player\wmplayer.exe" /Play "%L"  [UserChoice] [default=Play]
ShellExec: VCExporterLaunch.exe: open="c:\program files\sony\vaio vp utilities\VCELaunch.exe" "%1"
.
=============== Created Last 30 ================
.
2013-02-14 19:29:57    6991832    ----a-w-    c:\programdata\microsoft\microsoft antimalware\definition updates\{01f5a56f-7f81-4ce5-88c5-e7bbda8ae877}\mpengine.dll
2013-02-13 13:33:30    388096    ----a-r-    c:\users\jamie.ours\appdata\roaming\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2013-02-13 08:06:50    768000    ----a-w-    c:\program files\common files\microsoft shared\vgx\VGX.dll
2013-02-13 03:16:32    --------    d-----w-    c:\program files\Trend Micro
2013-02-13 02:57:24    --------    d-----w-    c:\program files\CCleaner
2013-02-13 01:45:39    6991832    ------w-    c:\programdata\microsoft\microsoft antimalware\definition updates\backup\mpengine.dll
2013-02-13 01:34:22    2048512    ----a-w-    c:\windows\system32\win32k.sys
2013-02-13 01:29:20    1314816    ----a-w-    c:\windows\system32\quartz.dll
2013-02-13 01:29:05    914792    ----a-w-    c:\windows\system32\drivers\tcpip.sys
2013-02-13 01:29:05    31232    ----a-w-    c:\windows\system32\drivers\tcpipreg.sys
2013-02-13 01:28:58    3550072    ----a-w-    c:\windows\system32\ntoskrnl.exe
2013-02-13 01:28:57    3602808    ----a-w-    c:\windows\system32\ntkrnlpa.exe
2013-02-13 01:27:42    94112    ----a-w-    c:\windows\system32\WindowsAccessBridge.dll
.
==================== Find3M  ====================
.
2013-02-13 03:53:04    74096    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-02-13 03:53:04    697712    ----a-w-    c:\windows\system32\FlashPlayerApp.exe
2013-02-13 01:27:25    861088    ----a-w-    c:\windows\system32\npDeployJava1.dll
2013-02-13 01:27:24    782240    ----a-w-    c:\windows\system32\deployJava1.dll
2013-01-30 10:53:21    232336    ------w-    c:\windows\system32\MpSigStub.exe
2013-01-08 22:11:21    1800704    ----a-w-    c:\windows\system32\jscript9.dll
2013-01-08 22:03:20    1129472    ----a-w-    c:\windows\system32\wininet.dll
2013-01-08 22:03:12    1427968    ----a-w-    c:\windows\system32\inetcpl.cpl
2013-01-08 21:59:02    142848    ----a-w-    c:\windows\system32\ieUnatt.exe
2013-01-08 21:58:29    420864    ----a-w-    c:\windows\system32\vbscript.dll
2013-01-08 21:56:23    2382848    ----a-w-    c:\windows\system32\mshtml.tlb
2012-12-16 13:12:54    34304    ----a-w-    c:\windows\system32\atmlib.dll
2012-12-16 10:50:29    293376    ----a-w-    c:\windows\system32\atmfd.dll
2012-11-20 04:22:50    204288    ----a-w-    c:\windows\system32\ncrypt.dll
.
============= FINISH: 14:48:41.54 ===============
.
UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT
.
DDS (Ver_2012-11-20.01)
.
Microsoft® Windows Vista™ Home Premium 
Boot Device: \Device\HarddiskVolume2
Install Date: 6/10/2007 12:26:40 PM
System Uptime: 2/14/2013 2:17:00 PM (0 hours ago)
.
Motherboard: Sony Corporation |  | VAIO
Processor: Genuine Intel® CPU           T2060  @ 1.60GHz | N/A | 1600/133mhz
.
==== Disk Partitions =========================
.
C: is FIXED (NTFS) - 105 GiB total, 48.115 GiB free.
D: is Removable
E: is Removable
F: is CDROM ()
.
==== Disabled Device Manager Items =============
.
==== System Restore Points ===================
.
RP1454: 2/13/2013 1:39:44 AM - Uniblue SystemTweaker installation
RP1455: 2/13/2013 3:00:20 AM - Windows Update
.
==== Installed Programs ======================
.
Adobe Flash Player 11 ActiveX
Adobe Reader X (10.1.5)
Alps Pointing-device for VAIO
Apple Application Support
Apple Mobile Device Support
Apple Software Update
AVG 2011
AVG 2012
Bonjour
CCleaner
Coupon Printer for Windows
Express Zip
FixBee Disk Optimizer
FrostWire 5.5.1
Google Chrome
HiJackThis
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
HP Deskjet 3050A J611 series Basic Device Software
HP Deskjet 3050A J611 series Help
HP Deskjet 3050A J611 series Product Improvement Study
HP Photo Creations
HP Update
HPDiagnosticAlert
HPDiagnosticCoreDll
HyperCD
Intel® Graphics Media Accelerator Driver
iTunes
Java 7 Update 13
Java Auto Updater
LAN-Express AS IEEE 802.11 Wireless LAN
Microsoft .NET Framework 1.1
Microsoft .NET Framework 1.1 Security Update (KB2656353)
Microsoft .NET Framework 1.1 Security Update (KB979906)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 4 Client Profile
Microsoft .NET Framework 4 Extended
Microsoft Application Error Reporting
Microsoft Fix it Center
Microsoft Office Live Add-in 1.4
Microsoft Security Client
Microsoft Security Essentials
Microsoft Silverlight
Microsoft SQL Server 2005
Microsoft SQL Server 2005 Express Edition (VAIO_VEDB)
Microsoft SQL Server Native Client
Microsoft SQL Server Setup Support Files (English)
Microsoft SQL Server VSS Writer
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161
Microsoft Works
MP3 Rocket
MSXML 4.0 SP2 (KB936181)
MSXML 4.0 SP2 (KB941833)
MSXML 4.0 SP2 (KB954430)
MSXML 4.0 SP2 (KB973688)
OGA Notifier 2.0.0048.0
OpenMG Secure Module 4.7.00
PDF Viewer 0.1
QuickBooks Product Listing Service
Realtek High Definition Audio Driver
Resumes
RTC Client API v1.2
Security Update for Microsoft .NET Framework 3.5 SP1 (KB2604111)
Security Update for Microsoft .NET Framework 3.5 SP1 (KB2657424)
Security Update for Microsoft .NET Framework 3.5 SP1 (KB2736416)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2446708)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2478663)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2518870)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2539636)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2572078)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2604121)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2633870)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656351)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368v2)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656405)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2686827)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2729449)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2736428)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2737019)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2742595)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2789642)
Security Update for Microsoft .NET Framework 4 Extended (KB2487367)
Security Update for Microsoft .NET Framework 4 Extended (KB2656351)
Security Update for Microsoft .NET Framework 4 Extended (KB2736428)
Security Update for Microsoft .NET Framework 4 Extended (KB2742595)
Setting Utility Series
Simple Start Entice
Sony Utilities DLL
Sony Video Shared Library
SpeedUpMyPC
SupportSoft Assisted Service
System Requirements Lab
SystemTweaker
The Weather Channel App
Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
Update for Microsoft .NET Framework 4 Client Profile (KB2468871)
Update for Microsoft .NET Framework 4 Client Profile (KB2533523)
Update for Microsoft .NET Framework 4 Client Profile (KB2600217)
Update for Microsoft .NET Framework 4 Extended (KB2468871)
Update for Microsoft .NET Framework 4 Extended (KB2533523)
Update for Microsoft .NET Framework 4 Extended (KB2600217)
VAIO Azure Float Wallpaper
VAIO Care
VAIO Care Update
VAIO Content Importer  VAIO Content Exporter
VAIO Content Importer / VAIO Content Exporter
VAIO Entertainment Platform
VAIO Event Service
VAIO Floral Dusk Wallpaper
VAIO Help And Support
VAIO Media
VAIO Media 6.0
VAIO Media AC3 Decoder 1.0
VAIO Media Content Collection 6.0
VAIO Media Integrated Server 6.2
VAIO Media Redistribution 6.0
VAIO Media Registration Tool
VAIO Media Registration Tool 6.0
VAIO OOBE
VAIO Photo 2007
VAIO Power Management
VAIO Service Utility
VAIO Survey
VAIO Teal Whisper Wallpaper
VAIO Update
VU5x86
Windows Installer Clean Up
Wireless Switch Setting Utility
.
==== Event Viewer Messages From Past Week ========
.
2/7/2013 4:43:28 PM, Error: Microsoft-Windows-Dhcp-Client [1002]  - The IP address lease 192.168.0.8 for the Network Card with network address 00197E40FAA7 has been denied by the DHCP server 192.168.0.1 (The DHCP Server sent a DHCPNACK message).
2/7/2013 4:42:12 PM, Error: Microsoft Antimalware [2001]  - Microsoft Antimalware has encountered an error trying to update signatures.      New Signature Version:       Previous Signature Version: 1.143.1411.0      Update Source: Microsoft Update Server      Update Stage: Search      Source Path: http://www.microsoft.com      Signature Type: AntiVirus      Update Type: Full      User: NT AUTHORITY\SYSTEM      Current Engine Version:       Previous Engine Version: 1.1.9103.0      Error code: 0x8024402c      Error description: An unexpected problem occurred while checking for updates. For information on installing or troubleshooting updates, see Help and Support. 
2/14/2013 2:21:16 PM, Error: Service Control Manager [7003]  - The Net.Msmq Listener Adapter service depends the following service: msmq. This service might not be installed.
2/14/2013 2:19:13 PM, Error: Service Control Manager [7022]  - The Diagnostic System Host service hung on starting.
2/14/2013 2:19:11 PM, Error: Service Control Manager [7022]  - The Diagnostic Service Host service hung on starting.
2/14/2013 2:18:33 PM, Error: Microsoft-Windows-DistributedCOM [10016]  - The application-specific permission settings do not grant Local Launch permission for the COM Server application with CLSID  {C97FCC79-E628-407D-AE68-A06AD6D8B4D1}  to the user NT AUTHORITY\SYSTEM SID (S-1-5-18) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.
2/14/2013 2:17:49 PM, Error: Service Control Manager [7000]  - The Parallel port driver service failed to start due to the following error:  The service cannot be started, either because it is disabled or because it has no enabled devices associated with it.
2/14/2013 2:17:31 PM, Error: Microsoft-Windows-TaskScheduler [412]  - Task Scheduler service failed to launch tasks triggered by computer startup. Additional Data: Error Value: 2147549183. User Action: restart task scheduler service.
2/13/2013 3:06:16 AM, Error: Service Control Manager [7034]  - The FBDiskOptimizer service terminated unexpectedly.  It has done this 1 time(s).
2/12/2013 10:48:10 PM, Error: Microsoft-Windows-Kernel-General [5]  - {Registry Hive Recovered} Registry hive (file): '\??\C:\Users\Jamie.OURS\AppData\Local\Microsoft\Windows\UsrClass.dat' was corrupted and it has been recovered. Some data might have been lost.
.
==== End Of File ===========================
GMER 2.1.18952 - http://www.gmer.net
Rootkit scan 2013-02-14 15:45:47
Windows 6.0.6002 Service Pack 2 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP1T0L0-1 FUJITSU_MHW2120BH rev.00000012 111.79GB
Running: opker4w1.exe; Driver: C:\Users\JAMIE~1.OUR\AppData\Local\Temp\uwlcipoc.sys
 
 
---- Kernel code sections - GMER 2.1 ----
 
PAGE   spsys.sys!?SPVersion@@3PADA + 1ABF                                                                                                             A805603F 110 Bytes  [8B, FF, 55, 8B, EC, 8B, 45, ...]
PAGE   spsys.sys!?SPVersion@@3PADA + 1B2F                                                                                                             A80560AF 1 Byte  [16]
PAGE   spsys.sys!?SPVersion@@3PADA + 1B2F                                                                                                             A80560AF 128 Bytes  [16, 3B, C8, 75, E2, B0, 01, ...]
PAGE   spsys.sys!?SPVersion@@3PADA + 1BB0                                                                                                             A8056130 6 Bytes  [0E, 83, 78, 14, 01, 75]
PAGE   spsys.sys!?SPVersion@@3PADA + 1BB7                                                                                                             A8056137 2298 Bytes  [83, 78, 18, 37, 75, 02, B3, ...]
PAGE   ...                                                                                                                                            
?      C:\Users\JAMIE~1.OUR\AppData\Local\Temp\mbr.sys                                                                                                The filename, directory name, or volume label syntax is incorrect. !
 
---- User code sections - GMER 2.1 ----
 
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtCreateFile + 6                                        77DB424A 4 Bytes  [28, D4, 63, 00] {SUB AH, DL; ARPL [EAX], AX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtCreateFile + B                                        77DB424F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtMapViewOfSection + 6                                  77DB499A 4 Bytes  [28, D7, 63, 00] {SUB BH, DL; ARPL [EAX], AX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtMapViewOfSection + B                                  77DB499F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenFile + 6                                          77DB4A2A 4 Bytes  [68, D4, 63, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenFile + B                                          77DB4A2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenProcess + 6                                       77DB4AAA 4 Bytes  [A8, D5, 63, 00] {TEST AL, 0xd5; ARPL [EAX], AX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenProcess + B                                       77DB4AAF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenProcessToken + B                                  77DB4ABF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenProcessTokenEx + 6                                77DB4ACA 4 Bytes  [A8, D6, 63, 00] {TEST AL, 0xd6; ARPL [EAX], AX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenProcessTokenEx + B                                77DB4ACF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenThread + 6                                        77DB4B1A 4 Bytes  [68, D5, 63, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenThread + B                                        77DB4B1F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenThreadToken + 6                                   77DB4B2A 4 Bytes  [68, D6, 63, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenThreadToken + B                                   77DB4B2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtOpenThreadTokenEx + B                                 77DB4B3F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtQueryAttributesFile + 6                               77DB4BCA 4 Bytes  [A8, D4, 63, 00] {TEST AL, 0xd4; ARPL [EAX], AX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtQueryAttributesFile + B                               77DB4BCF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtQueryFullAttributesFile + B                           77DB4C7F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtSetInformationFile + 6                                77DB515A 4 Bytes  [28, D5, 63, 00] {SUB CH, DL; ARPL [EAX], AX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtSetInformationFile + B                                77DB515F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtSetInformationThread + 6                              77DB51AA 4 Bytes  [28, D6, 63, 00] {SUB DH, DL; ARPL [EAX], AX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtSetInformationThread + B                              77DB51AF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtUnmapViewOfSection + 6                                77DB544A 4 Bytes  [68, D7, 63, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] ntdll.dll!NtUnmapViewOfSection + B                                77DB544F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtCreateFile + 6                                        77DB424A 4 Bytes  [28, 64, E8, 00] {SUB [EAX+EBP*8+0x0], AH}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtCreateFile + B                                        77DB424F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtMapViewOfSection + 6                                  77DB499A 4 Bytes  [28, 67, E8, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtMapViewOfSection + B                                  77DB499F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenFile + 6                                          77DB4A2A 4 Bytes  [68, 64, E8, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenFile + B                                          77DB4A2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenProcess + 6                                       77DB4AAA 4 Bytes  [A8, 65, E8, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenProcess + B                                       77DB4AAF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenProcessToken + B                                  77DB4ABF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenProcessTokenEx + 6                                77DB4ACA 4 Bytes  [A8, 66, E8, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenProcessTokenEx + B                                77DB4ACF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenThread + 6                                        77DB4B1A 4 Bytes  [68, 65, E8, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenThread + B                                        77DB4B1F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenThreadToken + 6                                   77DB4B2A 4 Bytes  [68, 66, E8, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenThreadToken + B                                   77DB4B2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtOpenThreadTokenEx + B                                 77DB4B3F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtQueryAttributesFile + 6                               77DB4BCA 4 Bytes  [A8, 64, E8, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtQueryAttributesFile + B                               77DB4BCF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtQueryFullAttributesFile + B                           77DB4C7F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtSetInformationFile + 6                                77DB515A 4 Bytes  [28, 65, E8, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtSetInformationFile + B                                77DB515F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtSetInformationThread + 6                              77DB51AA 4 Bytes  [28, 66, E8, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtSetInformationThread + B                              77DB51AF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtUnmapViewOfSection + 6                                77DB544A 4 Bytes  [68, 67, E8, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] ntdll.dll!NtUnmapViewOfSection + B                                77DB544F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtCreateFile + 6                                        77DB424A 4 Bytes  [28, F4, 11, 00] {SUB AH, DH; ADC [EAX], EAX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtCreateFile + B                                        77DB424F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtMapViewOfSection + 6                                  77DB499A 4 Bytes  [28, F7, 11, 00] {SUB BH, DH; ADC [EAX], EAX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtMapViewOfSection + B                                  77DB499F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenFile + 6                                          77DB4A2A 4 Bytes  [68, F4, 11, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenFile + B                                          77DB4A2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenProcess + 6                                       77DB4AAA 4 Bytes  [A8, F5, 11, 00] {TEST AL, 0xf5; ADC [EAX], EAX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenProcess + B                                       77DB4AAF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenProcessToken + B                                  77DB4ABF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenProcessTokenEx + 6                                77DB4ACA 4 Bytes  [A8, F6, 11, 00] {TEST AL, 0xf6; ADC [EAX], EAX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenProcessTokenEx + B                                77DB4ACF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenThread + 6                                        77DB4B1A 4 Bytes  [68, F5, 11, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenThread + B                                        77DB4B1F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenThreadToken + 6                                   77DB4B2A 4 Bytes  [68, F6, 11, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenThreadToken + B                                   77DB4B2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtOpenThreadTokenEx + B                                 77DB4B3F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtQueryAttributesFile + 6                               77DB4BCA 4 Bytes  [A8, F4, 11, 00] {TEST AL, 0xf4; ADC [EAX], EAX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtQueryAttributesFile + B                               77DB4BCF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtQueryFullAttributesFile + B                           77DB4C7F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtSetInformationFile + 6                                77DB515A 4 Bytes  [28, F5, 11, 00] {SUB CH, DH; ADC [EAX], EAX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtSetInformationFile + B                                77DB515F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtSetInformationThread + 6                              77DB51AA 4 Bytes  [28, F6, 11, 00] {SUB DH, DH; ADC [EAX], EAX}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtSetInformationThread + B                              77DB51AF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtUnmapViewOfSection + 6                                77DB544A 4 Bytes  [68, F7, 11, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] ntdll.dll!NtUnmapViewOfSection + B                                77DB544F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtCreateFile + 6                                        77DB424A 4 Bytes  [28, 60, 41, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtCreateFile + B                                        77DB424F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtMapViewOfSection + 6                                  77DB499A 4 Bytes  [28, 63, 41, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtMapViewOfSection + B                                  77DB499F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenFile + 6                                          77DB4A2A 4 Bytes  [68, 60, 41, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenFile + B                                          77DB4A2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenProcess + 6                                       77DB4AAA 4 Bytes  [A8, 61, 41, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenProcess + B                                       77DB4AAF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenProcessToken + B                                  77DB4ABF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenProcessTokenEx + 6                                77DB4ACA 4 Bytes  [A8, 62, 41, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenProcessTokenEx + B                                77DB4ACF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenThread + 6                                        77DB4B1A 4 Bytes  [68, 61, 41, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenThread + B                                        77DB4B1F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenThreadToken + 6                                   77DB4B2A 4 Bytes  [68, 62, 41, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenThreadToken + B                                   77DB4B2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtOpenThreadTokenEx + B                                 77DB4B3F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtQueryAttributesFile + 6                               77DB4BCA 4 Bytes  [A8, 60, 41, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtQueryAttributesFile + B                               77DB4BCF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtQueryFullAttributesFile + B                           77DB4C7F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtSetInformationFile + 6                                77DB515A 4 Bytes  [28, 61, 41, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtSetInformationFile + B                                77DB515F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtSetInformationThread + 6                              77DB51AA 4 Bytes  [28, 62, 41, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtSetInformationThread + B                              77DB51AF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtUnmapViewOfSection + 6                                77DB544A 4 Bytes  [68, 63, 41, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] ntdll.dll!NtUnmapViewOfSection + B                                77DB544F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtCreateFile + 6                                        77DB424A 4 Bytes  [28, 34, 8F, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtCreateFile + B                                        77DB424F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtMapViewOfSection + 6                                  77DB499A 4 Bytes  [28, 37, 8F, 00] {SUB [EDI], DH; POP DWORD [EAX]}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtMapViewOfSection + B                                  77DB499F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenFile + 6                                          77DB4A2A 4 Bytes  [68, 34, 8F, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenFile + B                                          77DB4A2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenProcess + 6                                       77DB4AAA 4 Bytes  [A8, 35, 8F, 00] {TEST AL, 0x35; POP DWORD [EAX]}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenProcess + B                                       77DB4AAF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenProcessToken + B                                  77DB4ABF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenProcessTokenEx + 6                                77DB4ACA 4 Bytes  [A8, 36, 8F, 00] {TEST AL, 0x36; POP DWORD [EAX]}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenProcessTokenEx + B                                77DB4ACF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenThread + 6                                        77DB4B1A 4 Bytes  [68, 35, 8F, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenThread + B                                        77DB4B1F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenThreadToken + 6                                   77DB4B2A 4 Bytes  [68, 36, 8F, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenThreadToken + B                                   77DB4B2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtOpenThreadTokenEx + B                                 77DB4B3F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtQueryAttributesFile + 6                               77DB4BCA 4 Bytes  [A8, 34, 8F, 00] {TEST AL, 0x34; POP DWORD [EAX]}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtQueryAttributesFile + B                               77DB4BCF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtQueryFullAttributesFile + B                           77DB4C7F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtSetInformationFile + 6                                77DB515A 4 Bytes  [28, 35, 8F, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtSetInformationFile + B                                77DB515F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtSetInformationThread + 6                              77DB51AA 4 Bytes  [28, 36, 8F, 00] {SUB [ESI], DH; POP DWORD [EAX]}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtSetInformationThread + B                              77DB51AF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtUnmapViewOfSection + 6                                77DB544A 4 Bytes  [68, 37, 8F, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] ntdll.dll!NtUnmapViewOfSection + B                                77DB544F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtCreateFile + 6                                        77DB424A 4 Bytes  [28, B0, 8C, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtCreateFile + B                                        77DB424F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtMapViewOfSection + 6                                  77DB499A 4 Bytes  [28, B3, 8C, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtMapViewOfSection + B                                  77DB499F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenFile + 6                                          77DB4A2A 4 Bytes  [68, B0, 8C, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenFile + B                                          77DB4A2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenProcess + 6                                       77DB4AAA 4 Bytes  [A8, B1, 8C, 00] {TEST AL, 0xb1; MOV [EAX], ES}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenProcess + B                                       77DB4AAF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenProcessToken + B                                  77DB4ABF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenProcessTokenEx + 6                                77DB4ACA 4 Bytes  [A8, B2, 8C, 00] {TEST AL, 0xb2; MOV [EAX], ES}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenProcessTokenEx + B                                77DB4ACF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenThread + 6                                        77DB4B1A 4 Bytes  [68, B1, 8C, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenThread + B                                        77DB4B1F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenThreadToken + 6                                   77DB4B2A 4 Bytes  [68, B2, 8C, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenThreadToken + B                                   77DB4B2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtOpenThreadTokenEx + B                                 77DB4B3F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtQueryAttributesFile + 6                               77DB4BCA 4 Bytes  [A8, B0, 8C, 00] {TEST AL, 0xb0; MOV [EAX], ES}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtQueryAttributesFile + B                               77DB4BCF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtQueryFullAttributesFile + B                           77DB4C7F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtSetInformationFile + 6                                77DB515A 4 Bytes  [28, B1, 8C, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtSetInformationFile + B                                77DB515F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtSetInformationThread + 6                              77DB51AA 4 Bytes  [28, B2, 8C, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtSetInformationThread + B                              77DB51AF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtUnmapViewOfSection + 6                                77DB544A 4 Bytes  [68, B3, 8C, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] ntdll.dll!NtUnmapViewOfSection + B                                77DB544F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtCreateFile + 6                                        77DB424A 4 Bytes  [28, 00, EF, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtCreateFile + B                                        77DB424F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtMapViewOfSection + 6                                  77DB499A 1 Byte  [28]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtMapViewOfSection + 6                                  77DB499A 4 Bytes  [28, 03, EF, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtMapViewOfSection + B                                  77DB499F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenFile + 6                                          77DB4A2A 4 Bytes  [68, 00, EF, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenFile + B                                          77DB4A2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenProcess + 6                                       77DB4AAA 4 Bytes  [A8, 01, EF, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenProcess + B                                       77DB4AAF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenProcessToken + B                                  77DB4ABF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenProcessTokenEx + 6                                77DB4ACA 4 Bytes  [A8, 02, EF, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenProcessTokenEx + B                                77DB4ACF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenThread + 6                                        77DB4B1A 4 Bytes  [68, 01, EF, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenThread + B                                        77DB4B1F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenThreadToken + 6                                   77DB4B2A 4 Bytes  [68, 02, EF, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenThreadToken + B                                   77DB4B2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtOpenThreadTokenEx + B                                 77DB4B3F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtQueryAttributesFile + 6                               77DB4BCA 4 Bytes  [A8, 00, EF, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtQueryAttributesFile + B                               77DB4BCF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtQueryFullAttributesFile + B                           77DB4C7F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtSetInformationFile + 6                                77DB515A 4 Bytes  [28, 01, EF, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtSetInformationFile + B                                77DB515F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtSetInformationThread + 6                              77DB51AA 4 Bytes  [28, 02, EF, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtSetInformationThread + B                              77DB51AF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtUnmapViewOfSection + 6                                77DB544A 1 Byte  [68]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtUnmapViewOfSection + 6                                77DB544A 4 Bytes  [68, 03, EF, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] ntdll.dll!NtUnmapViewOfSection + B                                77DB544F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtCreateFile + 6                                        77DB424A 4 Bytes  [28, 04, 17, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtCreateFile + B                                        77DB424F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtMapViewOfSection + 6                                  77DB499A 4 Bytes  [28, 07, 17, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtMapViewOfSection + B                                  77DB499F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenFile + 6                                          77DB4A2A 4 Bytes  [68, 04, 17, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenFile + B                                          77DB4A2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenProcess + 6                                       77DB4AAA 4 Bytes  [A8, 05, 17, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenProcess + B                                       77DB4AAF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenProcessToken + B                                  77DB4ABF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenProcessTokenEx + 6                                77DB4ACA 4 Bytes  [A8, 06, 17, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenProcessTokenEx + B                                77DB4ACF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenThread + 6                                        77DB4B1A 4 Bytes  [68, 05, 17, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenThread + B                                        77DB4B1F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenThreadToken + 6                                   77DB4B2A 4 Bytes  [68, 06, 17, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenThreadToken + B                                   77DB4B2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtOpenThreadTokenEx + B                                 77DB4B3F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtQueryAttributesFile + 6                               77DB4BCA 4 Bytes  [A8, 04, 17, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtQueryAttributesFile + B                               77DB4BCF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtQueryFullAttributesFile + B                           77DB4C7F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtSetInformationFile + 6                                77DB515A 4 Bytes  [28, 05, 17, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtSetInformationFile + B                                77DB515F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtSetInformationThread + 6                              77DB51AA 4 Bytes  [28, 06, 17, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtSetInformationThread + B                              77DB51AF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtUnmapViewOfSection + 6                                77DB544A 4 Bytes  [68, 07, 17, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] ntdll.dll!NtUnmapViewOfSection + B                                77DB544F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtCreateFile + 6                                        77DB424A 4 Bytes  [28, 4C, 43, 00] {SUB [EBX+EAX*2+0x0], CL}
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtCreateFile + B                                        77DB424F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtMapViewOfSection + 6                                  77DB499A 4 Bytes  [28, 4F, 43, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtMapViewOfSection + B                                  77DB499F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenFile + 6                                          77DB4A2A 4 Bytes  [68, 4C, 43, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenFile + B                                          77DB4A2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenProcess + 6                                       77DB4AAA 4 Bytes  [A8, 4D, 43, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenProcess + B                                       77DB4AAF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenProcessToken + B                                  77DB4ABF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenProcessTokenEx + 6                                77DB4ACA 4 Bytes  [A8, 4E, 43, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenProcessTokenEx + B                                77DB4ACF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenThread + 6                                        77DB4B1A 4 Bytes  [68, 4D, 43, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenThread + B                                        77DB4B1F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenThreadToken + 6                                   77DB4B2A 4 Bytes  [68, 4E, 43, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenThreadToken + B                                   77DB4B2F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtOpenThreadTokenEx + B                                 77DB4B3F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtQueryAttributesFile + 6                               77DB4BCA 4 Bytes  [A8, 4C, 43, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtQueryAttributesFile + B                               77DB4BCF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtQueryFullAttributesFile + B                           77DB4C7F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtSetInformationFile + 6                                77DB515A 4 Bytes  [28, 4D, 43, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtSetInformationFile + B                                77DB515F 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtSetInformationThread + 6                              77DB51AA 4 Bytes  [28, 4E, 43, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtSetInformationThread + B                              77DB51AF 1 Byte  [E2]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtUnmapViewOfSection + 6                                77DB544A 4 Bytes  [68, 4F, 43, 00]
.text  C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] ntdll.dll!NtUnmapViewOfSection + B                                77DB544F 1 Byte  [E2]
 
---- User IAT/EAT - GMER 2.1 ----
 
IAT    C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[3036] @ C:\Windows\system32\RPCRT4.dll [KERNEL32.dll!CreateNamedPipeW]  00640010
IAT    C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4500] @ C:\Windows\system32\RPCRT4.dll [KERNEL32.dll!CreateNamedPipeW]  00E90010
IAT    C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4532] @ C:\Windows\system32\RPCRT4.dll [KERNEL32.dll!CreateNamedPipeW]  00130010
IAT    C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[4552] @ C:\Windows\system32\RPCRT4.dll [KERNEL32.dll!CreateNamedPipeW]  00430010
IAT    C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5684] @ C:\Windows\system32\RPCRT4.dll [KERNEL32.dll!CreateNamedPipeW]  00900010
IAT    C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5760] @ C:\Windows\system32\RPCRT4.dll [KERNEL32.dll!CreateNamedPipeW]  008E0010
IAT    C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5900] @ C:\Windows\system32\RPCRT4.dll [KERNEL32.dll!CreateNamedPipeW]  00F10010
IAT    C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[5984] @ C:\Windows\system32\RPCRT4.dll [KERNEL32.dll!CreateNamedPipeW]  00190010
IAT    C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\Application\chrome.exe[6060] @ C:\Windows\system32\RPCRT4.dll [KERNEL32.dll!CreateNamedPipeW]  00450010
 
---- EOF - GMER 2.1 ----
 

Edited by Jamiee9488, 14 February 2013 - 03:48 PM.


#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:01:47 AM

Posted 15 February 2013 - 12:59 PM

1.
Download AdwCleaner
  • Double click on AdwCleaner.exe to run the tool.
    ***Note: Windows Vista and Windows 7 users:
    Right click in the adwCleaner.exe and select
    Run%20as%20admin.png
  • Click the Delete button.
  • A logfile will automatically open after the scan has finished.
  • Please post the content of that logfile in your next reply.
  • Or you can find the logfile at C:\AdwCleaner[R1].txt.
  • 2.
    Please download Malwarebytes Anti-Malware
and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
  • Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
    • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
      For instructions with screenshots, please refer to this Guide.
    • When the installation begins, follow the prompts and do not make any changes to default settings.
    • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
    • If an update is found, the program will automatically update itself. Press the OK button and continue.
    • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
    • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
    • Click on the Scan button.
    • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
    • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
    • Make sure that everything is checked and then click Remove Selected.
    • When removal is completed, a log report will open in Notepad.
    • The log is automatically saved and can be viewed by clicking the Logs tab.
    • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
    • Exit Malwarebytes when done.
    Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.


    Things to include in your next reply::
    AdwCleaner log
    MBAM log
    How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 Jamiee9488

Jamiee9488
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia
  • Local time:01:47 AM

Posted 15 February 2013 - 07:14 PM

# AdwCleaner v2.112 - Logfile created 02/15/2013 at 17:49:41
# Updated 10/02/2013 by Xplode
# Operating system : Windows Vista ™ Home Premium Service Pack 2 (32 bits)
# User : Jamie - JAMIEEDMONDS
# Boot Mode : Normal
# Running from : C:\Users\Jamie.OURS\Downloads\adwcleaner0.exe
# Option [Search]
 
 
***** [Services] *****
 
 
***** [Files / Folders] *****
 
File Found : C:\user.js
Folder Found : C:\Program Files\Common Files\spigot
Folder Found : C:\ProgramData\AGI
Folder Found : C:\ProgramData\boost_interprocess
Folder Found : C:\ProgramData\Tarma Installer
Folder Found : C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\User Data\Default\Extensions\jcdgjdiieiljkfkdcloehkohchhpekkn
Folder Found : C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\User Data\Default\Extensions\lemilgpbnfoecfjhpfchannnnkeefjmj
 
***** [Registry] *****
 
Data Found : HKLM\..\Windows [AppInit_DLLs] = C:\PROGRA~1\WI9130~1\Datamngr\datamngr.dll
Data Found : HKLM\..\Windows [AppInit_DLLs] = C:\PROGRA~1\WI9130~1\Datamngr\IEBHO.dll
Key Found : HKCU\Software\APN PIP
Key Found : HKCU\Software\AppDataLow\Software\Crossrider
Key Found : HKCU\Software\AppDataLow\Software\Freecause
Key Found : HKCU\Software\AppDataLow\Software\searchqutoolbar
Key Found : HKCU\Software\Conduit
Key Found : HKCU\Software\DataMngr
Key Found : HKCU\Software\Default Tab
Key Found : HKCU\Software\Google\Chrome\Extensions\lemilgpbnfoecfjhpfchannnnkeefjmj
Key Found : HKCU\Software\IGearSettings
Key Found : HKCU\Software\ilivid
Key Found : HKCU\Software\Iminent
Key Found : HKCU\Software\InstallCore
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{3BD44F0E-0596-4008-AEE0-45D47E3A8F0E}
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2102}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{79A765E1-C399-405B-85AF-466F52E918B0}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Anti-phishing Domain Advisor
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Windows Searchqu Toolbar
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{97F2FF5B-260C-4CCF-834A-2DDA4E29E39E}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{9D717F81-9148-4F12-8568-69135F087DB0}
Key Found : HKCU\Software\Softonic
Key Found : HKLM\Software\AVG Security Toolbar
Key Found : HKLM\Software\Babylon
Key Found : HKLM\SOFTWARE\Classes\AppID\{AC662AF2-4601-4A68-84DF-A3FE83F1A5F9}
Key Found : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB}
Key Found : HKLM\SOFTWARE\Classes\AppID\{D97A8234-F2A2-4AD4-91D5-FECDB2C553AF}
Key Found : HKLM\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}
Key Found : HKLM\SOFTWARE\Classes\AppID\BrowserConnection.dll
Key Found : HKLM\SOFTWARE\Classes\AppID\DNSBHO.dll
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1
Key Found : HKLM\SOFTWARE\Classes\BrowserConnection.Loader
Key Found : HKLM\SOFTWARE\Classes\BrowserConnection.Loader.1
Key Found : HKLM\SOFTWARE\Classes\CLSID\{02054E11-5113-4BE3-8153-AA8DFB5D3761}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{147A976F-EEE1-4377-8EA7-4716E4CDD239}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{80922EE0-8A76-46AE-95D5-BD3C3FE0708D}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{9D717F81-9148-4F12-8568-69135F087DB0}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{A40DC6C5-79D0-4CA8-A185-8FF989AF1115}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{CC1AC828-BB47-4361-AFB5-96EEE259DD87}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{CC5AD34C-6F10-4CB3-B74A-C2DD4D5060A3}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{E46C8196-B634-44A1-AF6E-957C64278AB1}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{FEFD3AF5-A346-4451-AA23-A3AD54915515}
Key Found : HKLM\SOFTWARE\Classes\DnsBHO.BHO
Key Found : HKLM\SOFTWARE\Classes\DnsBHO.BHO.1
Key Found : HKLM\SOFTWARE\Classes\Interface\{021B4049-F57D-4565-A693-FD3B04786BFA}
Key Found : HKLM\SOFTWARE\Classes\Interface\{0362AA09-808D-48E9-B360-FB51A8CBCE09}
Key Found : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Found : HKLM\SOFTWARE\Classes\Interface\{06844020-CD0B-3D3D-A7FE-371153013E49}
Key Found : HKLM\SOFTWARE\Classes\Interface\{0ADC01BB-303B-3F8E-93DA-12C140E85460}
Key Found : HKLM\SOFTWARE\Classes\Interface\{10D3722F-23E6-3901-B6C1-FF6567121920}
Key Found : HKLM\SOFTWARE\Classes\Interface\{1675E62B-F911-3B7B-A046-EB57261212F3}
Key Found : HKLM\SOFTWARE\Classes\Interface\{192929F2-9273-3894-91B0-F54671C4C861}
Key Found : HKLM\SOFTWARE\Classes\Interface\{1B730ACF-26A3-447B-9994-14AEE0EB72CC}
Key Found : HKLM\SOFTWARE\Classes\Interface\{2932897E-3036-43D9-8A64-B06447992065}
Key Found : HKLM\SOFTWARE\Classes\Interface\{2DE92D29-A042-3C37-BFF8-07C7D8893EFA}
Key Found : HKLM\SOFTWARE\Classes\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}
Key Found : HKLM\SOFTWARE\Classes\Interface\{32B80AD6-1214-45F4-994E-78A5D482C000}
Key Found : HKLM\SOFTWARE\Classes\Interface\{3A8E103F-B2B7-3BEF-B3B0-88E29B2420E4}
Key Found : HKLM\SOFTWARE\Classes\Interface\{44B619BC-3D2B-4990-AA4F-9AA366921792}
Key Found : HKLM\SOFTWARE\Classes\Interface\{478CE5D3-D38E-3FFE-8DBE-8C4A0F1C4D8D}
Key Found : HKLM\SOFTWARE\Classes\Interface\{48B7DA4E-69ED-39E3-BAD5-3E3EFF22CFB0}
Key Found : HKLM\SOFTWARE\Classes\Interface\{5982F405-44E4-3BBB-BAC4-CF8141CBBC5C}
Key Found : HKLM\SOFTWARE\Classes\Interface\{5D8C3CC3-3C05-38A1-B244-924A23115FE9}
Key Found : HKLM\SOFTWARE\Classes\Interface\{641593AF-D9FD-30F7-B783-36E16F7A2E08}
Key Found : HKLM\SOFTWARE\Classes\Interface\{711FC48A-1356-3932-94D8-A8B733DBC7E4}
Key Found : HKLM\SOFTWARE\Classes\Interface\{72227B7F-1F02-3560-95F5-592E68BACC0C}
Key Found : HKLM\SOFTWARE\Classes\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}
Key Found : HKLM\SOFTWARE\Classes\Interface\{7B5E8CE3-4722-4C0E-A236-A6FF731BEF37}
Key Found : HKLM\SOFTWARE\Classes\Interface\{890D4F59-5ED0-3CB4-8E0E-74A5A86E7ED0}
Key Found : HKLM\SOFTWARE\Classes\Interface\{8C68913C-AC3C-4494-8B9C-984D87C85003}
Key Found : HKLM\SOFTWARE\Classes\Interface\{8D019513-083F-4AA5-933F-7D43A6DA82C4}
Key Found : HKLM\SOFTWARE\Classes\Interface\{923F6FB8-A390-370E-A0D2-DD505432481D}
Key Found : HKLM\SOFTWARE\Classes\Interface\{9BBB26EF-B178-35D6-9D3D-B485F4279FE5}
Key Found : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Key Found : HKLM\SOFTWARE\Classes\Interface\{A62DDBE0-8D2A-339A-B089-8CBCC5CD322A}
Key Found : HKLM\SOFTWARE\Classes\Interface\{A82AD04D-0B8E-3A49-947B-6A69A8A9C96D}
Key Found : HKLM\SOFTWARE\Classes\Interface\{ADEB3CC9-A05D-4FCC-BD09-9025456AA3EA}
Key Found : HKLM\SOFTWARE\Classes\Interface\{B06D4521-D09C-3F41-8E39-9D784CCA2A75}
Key Found : HKLM\SOFTWARE\Classes\Interface\{C06DAD42-6F39-4CE1-83CC-9A8B9105E556}
Key Found : HKLM\SOFTWARE\Classes\Interface\{C2E799D0-43A5-3477-8A98-FC5F3677F35C}
Key Found : HKLM\SOFTWARE\Classes\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}
Key Found : HKLM\SOFTWARE\Classes\Interface\{D16107CD-2AD5-46A8-BA59-303B7C32C500}
Key Found : HKLM\SOFTWARE\Classes\Interface\{D25B101F-8188-3B43-9D85-201F372BC205}
Key Found : HKLM\SOFTWARE\Classes\Interface\{D2BA7595-5E44-3F1E-880F-03B3139FA5ED}
Key Found : HKLM\SOFTWARE\Classes\Interface\{D35F5C81-17D9-3E1C-A1FC-4472542E1D25}
Key Found : HKLM\SOFTWARE\Classes\Interface\{D8FA96CA-B250-312C-AF34-4FF1DD72589D}
Key Found : HKLM\SOFTWARE\Classes\Interface\{DAFC1E63-3359-416D-9BC2-E7DCA6F7B0F3}
Key Found : HKLM\SOFTWARE\Classes\Interface\{DC5E5C44-80FD-3697-9E65-9F286D92F3E7}
Key Found : HKLM\SOFTWARE\Classes\Interface\{E1B4C9DE-D741-385F-981E-6745FACE6F01}
Key Found : HKLM\SOFTWARE\Classes\Interface\{E3ED53C5-7AD5-4DF5-9734-AFB6E7E5D9DB}
Key Found : HKLM\SOFTWARE\Classes\Interface\{E7B623F5-9715-3F9F-A671-D1485A39F8A2}
Key Found : HKLM\SOFTWARE\Classes\Interface\{ED916A7B-7C68-3198-B87D-2DABC30A5587}
Key Found : HKLM\SOFTWARE\Classes\Interface\{EFA1BDB2-BB3D-3D9A-8EB5-D0D22E0F64F4}
Key Found : HKLM\SOFTWARE\Classes\Interface\{F4CBF4DD-F8FE-35BA-BB7E-68304DAAB70B}
Key Found : HKLM\SOFTWARE\Classes\Interface\{FC32005D-E27C-32E0-ADFA-152F598B75E7}
Key Found : HKLM\SOFTWARE\Classes\Prod.cap
Key Found : HKLM\SOFTWARE\Classes\SearchQUIEHelper.DNSGuard
Key Found : HKLM\SOFTWARE\Classes\SearchQUIEHelper.DNSGuard.1
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{2BF2028E-3F3C-4C05-AB45-B2F1DCFE0759}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{5B4144E1-B61D-495A-9A50-CD1A95D86D15}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{6A4BCABA-C437-4C76-A54E-AF31B8A76CB9}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{841D5A49-E48D-413C-9C28-EB3D9081D705}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{DB538320-D3C5-433C-BCA9-C4081A054FCF}
Key Found : HKLM\Software\Conduit
Key Found : HKLM\Software\DataMngr
Key Found : HKLM\Software\Default Tab
Key Found : HKLM\Software\Description
Key Found : HKLM\Software\Freeze.com
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\fdloijijlkoblmigdofommgnheckmaki
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\jcdgjdiieiljkfkdcloehkohchhpekkn
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\jmfkcklnlgedgbglfkkgedjfmejoahla
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\lemilgpbnfoecfjhpfchannnnkeefjmj
Key Found : HKLM\Software\Iminent
Key Found : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Found : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{65BCD620-07DD-012F-819F-073CF1B8F7C6}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68B81CCD-A80C-4060-8947-5AE69ED01199}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E6B969FB-6D33-48D2-9061-8BBD4899EB08}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256A51-B582-467E-B8D4-7786EDA79AE0}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2102}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Key Found : HKLM\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Found : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0238BBE24EA3A70408B81E4BB89C15E5
Key Found : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\063A857434EDED11A893800002C0A966
Key Found : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29799DE249E7DBC459FC6C8F07EB8375
Key Found : HKLM\Software\PIP
Key Found : HKLM\Software\Tarma Installer
Key Found : HKU\S-1-5-21-321920003-2470283383-3655613267-1007\Software\Microsoft\Internet Explorer\SearchScopes\{3BD44F0E-0596-4008-AEE0-45D47E3A8F0E}
Key Found : HKU\S-1-5-21-321920003-2470283383-3655613267-1007\Software\Microsoft\Internet Explorer\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Found : HKU\S-1-5-21-321920003-2470283383-3655613267-1007\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2102}
Value Found : HKCU\Software\Microsoft\Internet Explorer\New Windows\Allow [*.crossrider.com]
Value Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow [*.crossrider.com]
Value Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [10]
 
***** [Internet Browsers] *****
 
-\\ Internet Explorer v9.0.8112.16464
 
[HKCU\Software\Microsoft\Internet Explorer\Main - Start Page] = hxxp://blekkosearch.mystart.com/blekkotb_soc/?source=86adbc52&toolbarid=blekkotb_soc&u=D77A44526604F78E09FD044FCC0D23CA&tbp=homepage&v=2_0
 
-\\ Google Chrome v23.0.1271.95
 
*************************
 
AdwCleaner[R1].txt - [13391 octets] - [15/02/2013 17:49:41]
 
########## EOF - C:\AdwCleaner[R1].txt - [13452 octets] ##########
 
 
Malwarebytes Anti-Malware (Trial) 1.70.0.1100
www.malwarebytes.org
 
Database version: v2013.02.15.09
 
Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
Jamie :: JAMIEEDMONDS [administrator]
 
Protection: Disabled
 
2/15/2013 6:39:43 PM
mbam-log-2013-02-15 (18-39-43).txt
 
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 216011
Time elapsed: 13 minute(s), 16 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 4
HKCR\CLSID\{7d9e1adc-7db1-4eaf-b6c7-7e062074e6be} (PUP.BlekkoSearchBar) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{7D9E1ADC-7DB1-4EAF-B6C7-7E062074E6BE} (PUP.BlekkoSearchBar) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{7D9E1ADC-7DB1-4EAF-B6C7-7E062074E6BE} (PUP.BlekkoSearchBar) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{11111111-1111-1111-1111-110011221158} (Adware.GamePlayLab) -> Quarantined and deleted successfully.
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 4
C:\Users\Jamie.OURS\AppData\LocalLow\Funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.
C:\Users\Jamie.OURS\AppData\LocalLow\Funmoods\Funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.
C:\Users\Jamie.OURS\AppData\LocalLow\Funmoods\Funmoods\us (PUP.FunMoods) -> Quarantined and deleted successfully.
C:\Users\Jamie.OURS\AppData\LocalLow\Funmoods\Funmoods\us\20101003 (PUP.FunMoods) -> Quarantined and deleted successfully.
 
Files Detected: 7
C:\Users\Jamie.OURS\Downloads\PDFConverterSetup (1).exe (Adware.Agent) -> Quarantined and deleted successfully.
C:\Users\Jamie.OURS\Downloads\PDFCreatorSetup (1).exe (Adware.Agent) -> Quarantined and deleted successfully.
C:\Users\Jamie.OURS\Downloads\PDFCreator_Setup.exe (PUP.Bundle.Installer.OI) -> Quarantined and deleted successfully.
C:\Users\Jamie.OURS\Downloads\setup (1).exe (Adware.Bundler) -> Quarantined and deleted successfully.
C:\Users\Jamie.OURS\Local Settings\TempDIR\BetterInstaller.exe (PUP.BundleInstaller.Somoto) -> Quarantined and deleted successfully.
C:\Users\Jamie.OURS\AppData\LocalLow\Funmoods\Funmoods\us\20101003\kywrds.tat (PUP.FunMoods) -> Quarantined and deleted successfully.
C:\Users\Jamie.OURS\AppData\LocalLow\Funmoods\Funmoods\us\20101003\kywrds.ttr (PUP.FunMoods) -> Quarantined and deleted successfully.
 
(end)
 
Computer is running better but i still think the boot speed could be faster.
I would like to thank you for taking the time to help me with this issue.


#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:01:47 AM

Posted 15 February 2013 - 11:53 PM

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • You will be prompted to restart your computer. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 Jamiee9488

Jamiee9488
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia
  • Local time:01:47 AM

Posted 16 February 2013 - 01:26 AM

# AdwCleaner v2.112 - Logfile created 02/16/2013 at 01:15:20
# Updated 10/02/2013 by Xplode
# Operating system : Windows Vista ™ Home Premium Service Pack 2 (32 bits)
# User : Jamie - JAMIEEDMONDS
# Boot Mode : Normal
# Running from : C:\Users\Jamie.OURS\Downloads\adwcleaner0.exe
# Option [Delete]
 
 
***** [Services] *****
 
 
***** [Files / Folders] *****
 
File Deleted : C:\user.js
Folder Deleted : C:\ProgramData\Tarma Installer
Folder Deleted : C:\Users\Jamie.OURS\AppData\Local\Google\Chrome\User Data\Default\Extensions\jcdgjdiieiljkfkdcloehkohchhpekkn
 
***** [Registry] *****
 
Data Deleted : HKLM\..\Windows [AppInit_DLLs] = C:\PROGRA~1\WI9130~1\Datamngr\datamngr.dll
Data Deleted : HKLM\..\Windows [AppInit_DLLs] = C:\PROGRA~1\WI9130~1\Datamngr\IEBHO.dll
Key Deleted : HKCU\Software\APN PIP
Key Deleted : HKCU\Software\AppDataLow\Software\Crossrider
Key Deleted : HKCU\Software\AppDataLow\Software\Freecause
Key Deleted : HKCU\Software\AppDataLow\Software\searchqutoolbar
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\DataMngr
Key Deleted : HKCU\Software\Default Tab
Key Deleted : HKCU\Software\IGearSettings
Key Deleted : HKCU\Software\ilivid
Key Deleted : HKCU\Software\Iminent
Key Deleted : HKCU\Software\InstallCore
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{3BD44F0E-0596-4008-AEE0-45D47E3A8F0E}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2102}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{79A765E1-C399-405B-85AF-466F52E918B0}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Anti-phishing Domain Advisor
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Windows Searchqu Toolbar
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{97F2FF5B-260C-4CCF-834A-2DDA4E29E39E}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{9D717F81-9148-4F12-8568-69135F087DB0}
Key Deleted : HKCU\Software\Softonic
Key Deleted : HKLM\Software\AVG Security Toolbar
Key Deleted : HKLM\Software\Babylon
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{AC662AF2-4601-4A68-84DF-A3FE83F1A5F9}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{D97A8234-F2A2-4AD4-91D5-FECDB2C553AF}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\BrowserConnection.dll
Key Deleted : HKLM\SOFTWARE\Classes\AppID\DNSBHO.dll
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1
Key Deleted : HKLM\SOFTWARE\Classes\BrowserConnection.Loader
Key Deleted : HKLM\SOFTWARE\Classes\BrowserConnection.Loader.1
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{02054E11-5113-4BE3-8153-AA8DFB5D3761}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{147A976F-EEE1-4377-8EA7-4716E4CDD239}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{80922EE0-8A76-46AE-95D5-BD3C3FE0708D}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9D717F81-9148-4F12-8568-69135F087DB0}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{A40DC6C5-79D0-4CA8-A185-8FF989AF1115}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{CC1AC828-BB47-4361-AFB5-96EEE259DD87}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{CC5AD34C-6F10-4CB3-B74A-C2DD4D5060A3}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E46C8196-B634-44A1-AF6E-957C64278AB1}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FEFD3AF5-A346-4451-AA23-A3AD54915515}
Key Deleted : HKLM\SOFTWARE\Classes\DnsBHO.BHO
Key Deleted : HKLM\SOFTWARE\Classes\DnsBHO.BHO.1
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{021B4049-F57D-4565-A693-FD3B04786BFA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{0362AA09-808D-48E9-B360-FB51A8CBCE09}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{06844020-CD0B-3D3D-A7FE-371153013E49}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{0ADC01BB-303B-3F8E-93DA-12C140E85460}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{10D3722F-23E6-3901-B6C1-FF6567121920}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{1675E62B-F911-3B7B-A046-EB57261212F3}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{192929F2-9273-3894-91B0-F54671C4C861}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{1B730ACF-26A3-447B-9994-14AEE0EB72CC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2932897E-3036-43D9-8A64-B06447992065}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2DE92D29-A042-3C37-BFF8-07C7D8893EFA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{32B80AD6-1214-45F4-994E-78A5D482C000}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3A8E103F-B2B7-3BEF-B3B0-88E29B2420E4}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{44B619BC-3D2B-4990-AA4F-9AA366921792}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{478CE5D3-D38E-3FFE-8DBE-8C4A0F1C4D8D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{48B7DA4E-69ED-39E3-BAD5-3E3EFF22CFB0}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{5982F405-44E4-3BBB-BAC4-CF8141CBBC5C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{5D8C3CC3-3C05-38A1-B244-924A23115FE9}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{641593AF-D9FD-30F7-B783-36E16F7A2E08}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{711FC48A-1356-3932-94D8-A8B733DBC7E4}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{72227B7F-1F02-3560-95F5-592E68BACC0C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{7B5E8CE3-4722-4C0E-A236-A6FF731BEF37}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{890D4F59-5ED0-3CB4-8E0E-74A5A86E7ED0}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{8C68913C-AC3C-4494-8B9C-984D87C85003}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{8D019513-083F-4AA5-933F-7D43A6DA82C4}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{923F6FB8-A390-370E-A0D2-DD505432481D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9BBB26EF-B178-35D6-9D3D-B485F4279FE5}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A62DDBE0-8D2A-339A-B089-8CBCC5CD322A}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A82AD04D-0B8E-3A49-947B-6A69A8A9C96D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{ADEB3CC9-A05D-4FCC-BD09-9025456AA3EA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{B06D4521-D09C-3F41-8E39-9D784CCA2A75}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C06DAD42-6F39-4CE1-83CC-9A8B9105E556}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C2E799D0-43A5-3477-8A98-FC5F3677F35C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D16107CD-2AD5-46A8-BA59-303B7C32C500}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D25B101F-8188-3B43-9D85-201F372BC205}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D2BA7595-5E44-3F1E-880F-03B3139FA5ED}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D35F5C81-17D9-3E1C-A1FC-4472542E1D25}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D8FA96CA-B250-312C-AF34-4FF1DD72589D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{DAFC1E63-3359-416D-9BC2-E7DCA6F7B0F3}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{DC5E5C44-80FD-3697-9E65-9F286D92F3E7}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E1B4C9DE-D741-385F-981E-6745FACE6F01}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E3ED53C5-7AD5-4DF5-9734-AFB6E7E5D9DB}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E7B623F5-9715-3F9F-A671-D1485A39F8A2}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{ED916A7B-7C68-3198-B87D-2DABC30A5587}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{EFA1BDB2-BB3D-3D9A-8EB5-D0D22E0F64F4}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{F4CBF4DD-F8FE-35BA-BB7E-68304DAAB70B}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{FC32005D-E27C-32E0-ADFA-152F598B75E7}
Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap
Key Deleted : HKLM\SOFTWARE\Classes\SearchQUIEHelper.DNSGuard
Key Deleted : HKLM\SOFTWARE\Classes\SearchQUIEHelper.DNSGuard.1
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{2BF2028E-3F3C-4C05-AB45-B2F1DCFE0759}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{5B4144E1-B61D-495A-9A50-CD1A95D86D15}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{6A4BCABA-C437-4C76-A54E-AF31B8A76CB9}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{841D5A49-E48D-413C-9C28-EB3D9081D705}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{DB538320-D3C5-433C-BCA9-C4081A054FCF}
Key Deleted : HKLM\Software\Conduit
Key Deleted : HKLM\Software\DataMngr
Key Deleted : HKLM\Software\Default Tab
Key Deleted : HKLM\Software\Description
Key Deleted : HKLM\Software\Freeze.com
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\jcdgjdiieiljkfkdcloehkohchhpekkn
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\jmfkcklnlgedgbglfkkgedjfmejoahla
Key Deleted : HKLM\Software\Iminent
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68B81CCD-A80C-4060-8947-5AE69ED01199}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E6B969FB-6D33-48D2-9061-8BBD4899EB08}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2102}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0238BBE24EA3A70408B81E4BB89C15E5
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\063A857434EDED11A893800002C0A966
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29799DE249E7DBC459FC6C8F07EB8375
Key Deleted : HKLM\Software\PIP
Key Deleted : HKLM\Software\Tarma Installer
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\New Windows\Allow [*.crossrider.com]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow [*.crossrider.com]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [10]
 
***** [Internet Browsers] *****
 
-\\ Internet Explorer v9.0.8112.16457
 
Replaced : [HKCU\Software\Microsoft\Internet Explorer\Main - Start Page] = hxxp://blekkosearch.mystart.com/blekkotb_soc/?source=86adbc52&toolbarid=blekkotb_soc&u=D77A44526604F78E09FD044FCC0D23CA&tbp=homepage&v=2_0 --> hxxp://www.google.com
 
-\\ Google Chrome v24.0.1312.57
 
*************************
 
AdwCleaner[S1].txt - [12515 octets] - [16/02/2013 01:15:20]
 
########## EOF - C:\AdwCleaner[S1].txt - [12576 octets] ##########


#8 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:01:47 AM

Posted 16 February 2013 - 09:56 AM

How is your machine running now?


" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#9 Jamiee9488

Jamiee9488
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia
  • Local time:01:47 AM

Posted 16 February 2013 - 10:34 AM

Computer is now faster than it has ever been.

Again i want to thank you for all your help getting my computer running like i knew it should.

This is an awesome website i will recommend it to everyone i know.



#10 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:01:47 AM

Posted 19 February 2013 - 10:35 PM

Please run MalwareBytes again and post its log.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#11 Jamiee9488

Jamiee9488
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia
  • Local time:01:47 AM

Posted 22 February 2013 - 12:00 AM

Malwarebytes Anti-Malware (Trial) 1.70.0.1100
www.malwarebytes.org
 
Database version: v2013.02.16.01
 
Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
Jamie :: JAMIEEDMONDS [administrator]
 
Protection: Disabled
 
2/21/2013 11:49:18 PM
mbam-log-2013-02-21 (23-49-18).txt
 
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 214895
Time elapsed: 10 minute(s), 5 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
(end)


#12 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:01:47 AM

Posted 24 February 2013 - 06:03 PM

Hello, Jamiee9488.
Congratulations! You now appear clean! specool.gif
  • Double click on adwcleaner.exe to run the tool.
  • Click on Uninstall.
  • Confirm with yes.
  • Are things running okay? Do you have any more questions?

    System Still Slow?
    You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.
    If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

    We Need to Clean Up Our Mess
    • Download OTC by OldTimer and save it to your desktop.
    • Double click OTC_Icon.jpg icon to start the program. If you are using Vista, please right-click and choose run as administrator
    • Then Click the big CleanUp.jpg button.
    • You will get a prompt saying "Being Cleanup Process". Please select Yes.
    • Restart your computer when prompted.
    Now you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been backed up, renamed and saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

    The easiest and safest way to do this is:
    • Go to Start > Programs > Accessories > System Tools and click "System Restore".
    • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
  • Vista and Windows 7 users can refer to these links: Create a New Restore Point in Vista or Windows 7 and Disk Cleanup in Vista.




    One of the most common questions found when cleaning malware is "how did my machine get infected?"

    There are a variety of reasons, but the most common ones are that you are not practicing Safe Internet, you are not running the proper security software or that your computer's security settings are set too low.

    Below I have outlined a series of categories that outline how you can increase the security of your computer to help reduce the chance of being infected again in the future.

    Do not use P2P programsPeer-to-peer or file-sharing programs (such as uTorrent, Limewire and Bitorrent) are probably the primary route of infection nowadays. These programs allow file sharing between users as the name(s) suggest. It is almost impossible to know whether the file you’re downloading through P2P programs is safe.

    It is therefore possible to be infected by downloading infected files via peer-to-peer programs and so I recommend that you do not use these programs. Should you wish to use them, they must be used with extreme care. Some further reading on this subject, along with included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

    In addition, P2P programs facilitate cyber crime and help distribute pirated software, movies and other illegal material.

    Practice Safe Internet
    Another one of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.

    Below are a list of simple precautions to take to keep your computer clean and running securely:
    • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
    • If you receive an attachment and it ends with a .exe, .com, .bat, or .pif do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.
    • If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know who is themselves infected with malware which is trying to infect everyone in their address book. A key thing to look out for here is: does the email sound as though it’s from the person you know? Often, the email may simply have a web link or a “Run this file to make your PC run fast” message in it.
    • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of pop-ups, or Foistware, you should read this article: Foistware, And how to avoid it.
      There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. Removal instructions for a lot of these "rogues" can be found here.
    • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you, or will download a file to your PC without your knowledge. You can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake. DO NOT click on these windows, instead close them by finding the open window on your Taskbar, right click and chose close.
    • Do not visit pornographic websites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do, as this can often form part of their funding.
    • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link you should message back to the person asking if it is legit.
    • Stay away from Warez and Crack sites! As with Peer-2-Peer programs, in addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections.
    • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download files from a site, and are not sure if they are legitimate, you can use tools such as BitDefender Traffic Light, Norton Safe Web, or McAfee SiteAdvisor to look up info on the site and stay protected against malicious sites. Please be sure to only choose and install one of those tool bars.
    • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.
      Sometimes even legitimate programs will try to bundle extra, unwanted, software with the program you want - this is done to raise money for the program. Be sure to untick any boxes which may indicate that other programs will be downloaded.
    • Keep Windows up-to-date
    Microsoft continually releases security and stability updates for its supported operating systems and you should always apply these to help keep your PC secure.
    • Windows XP users
      You should visit Windows Update to check for the latest updates to your system. The latest service pack (SP3) can be obtained directly from Microsoft here.
    • Windows Vista users
      You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP2) can be obtained directly from Microsoft here.
    • Windows 7 users
      You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP1) can be obtained directly from Microsoft here
    • Keep your browser secure
      Most modern browsers have come on in leaps and bounds with their inbuilt, default security. The best way to keep your browser secure nowadays is simply to keep it up-to-date.

      The latest versions of the three common browsers can be found below:Use an AntiVirus Software
      It is very important that your computer has an up-to-date anti-virus software on it which has a real-time agent running. This alone can save you a lot of trouble with malware in the future.
      See this link for a listing of some online & their stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources, a couple of free Anti-Virus programs you may be interested in are Microsoft Security Essentials and Avast.

      It is imperative that you update your Antivirus software at least once a week (even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.

      Use a Firewall
      I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly.

      All versions of Windows starting from XP have an in-built firewall. With Windows XP this firewall will protect you from incoming traffic (i.e. hackers). Starting with Windows Vista, the firewall was beefed up to also protect you against outgoing traffic (i.e. malicious programs installed on your machine should be blocked from sending data, such as your bank details and passwords, out).

      In addition, if you connect to the internet via a router, this will normally have a firewall in-built.

      Some people will recommend installing a different firewall (instead of the Windows’ built one), this is personal choice, but the message is to definitely have one! For a tutorial on Firewalls and a listing of some available ones see this link: Understanding and Using Firewalls

      Install an Anti-Malware program
      Recommended, and free, Anti-Malware programs are Malwarebytes Anti-Malware and SuperAntiSpyware.

      You should regularly (perhaps once a week) scan your computer with an Anti-Malware program just as you would with an antivirus software.

      Make sure your applications have all of their updates
      It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is very important to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities (such as Adobe Reader and Java). You can check these by visiting Secunia Software Inspector.

      Follow this list and your potential for being infected again will reduce dramatically.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#13 Jamiee9488

Jamiee9488
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia
  • Local time:01:47 AM

Posted 25 February 2013 - 01:02 AM

Thanks for all the helpful information on this topic.

My computer is now the best it has ever been.

All the helpful links and detailed step by step instructions were very helpful and resolved my problem.



#14 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:01:47 AM

Posted 25 February 2013 - 01:06 AM

This thread will now be closed since the issue seems to be resolved.

If you need this topic reopened, please send me a PM and I will reopen it for you.

If you should have a new issue, please start a new topic.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users