Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Bleeping Playtopus driving me nuts - please help!


  • This topic is locked This topic is locked
30 replies to this topic

#1 Zona_Cat

Zona_Cat

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:45 PM

Posted 22 February 2013 - 04:09 PM

About a month ago I went to a questionable website to watch a hockey game, and since then I have been constantly bombarded by weird pop-ups that appear to be related to whatever website I am currently on, but are actually coming from Playtopus. There are also hyperlinks attached to random words in the text on most websites - also powered by Playtopus.

 

So, a couple weeks ago I went to BleepingComputer and saw that someone else posted a very similar experience.  I tried to follow along and take the same steps they did to get rid of Playtopus, but I'm still infected.  I downloaded and ran MalwareBytes, adwcleaner, Roguekiller, SpyHunter, BlitzBank, and unfortunately Combofix (sorry, didn't see all the warnings about Combofix until after I ran it, not sure what that did).  MalwareBytes and I think BlitzBank found some Playtopus germs, but there are still some evil tentacles somewhere because all the ads keep popping up.

 

I am running Kaspersky, but - despite being the only one that is not freeware - it has found nothing.  Any help is greatly appreciated!

 

Thanks,

- Zona Cat

 

============================================================================

 

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 8.0.6001.19154
Run by EOLUser at 14:06:47 on 2013-02-22
Microsoft® Windows Vista™ Business   6.0.6002.2.1252.1.1033.18.3542.2060 [GMT -7:00]
.
AV: Kaspersky Anti-Virus *Enabled/Updated* {C3113FBF-4BCB-4461-D78D-6EDFEC9593E5}
SP: Kaspersky Anti-Virus *Enabled/Updated* {7870DE5B-6DF1-4BEF-ED3D-55AD9712D958}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Program Files\Fingerprint Sensor\AtService.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\ActivIdentity\ActivClient\accoca.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Windows\system32\AEADISRV.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\ActivIdentity\ActivClient\acevents.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe
C:\Program Files\Common Files\InterVideo\RegMgr\iviRegMgr.exe
C:\Program Files\Intel\AMT\LMS.exe
C:\Program Files\PDF Complete\pdfsvc.exe
C:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe
C:\Program Files\Common Files\Intel\Privacy Icon\UNS\UNS.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Windows\Explorer.EXE
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\ActivIdentity\ActivClient\accrdsub.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\PIXELA\ImageMixer 3 SE Ver.6\Transfer Utility\CameraMonitor.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\klwtblfs.exe
C:\Program Files\ActivIdentity\ActivClient\acevents.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Content Blocker Plugin: {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - c:\program files\kaspersky lab\kaspersky anti-virus 2013\ieext\contentblocker\ie_content_blocker_plugin.dll
BHO: Virtual Keyboard Plugin: {73455575-E40C-433C-9784-C78DC7761455} - c:\program files\kaspersky lab\kaspersky anti-virus 2013\ieext\virtualkeyboard\ie_virtual_keyboard_plugin.dll
BHO: SSVHelper Class: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre1.6.0_07\bin\ssv.dll
BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - c:\program files\google\googletoolbarnotifier\5.7.8313.1002\swg.dll
BHO: URL Advisor Plugin: {E33CF602-D945-461A-83F0-819F76A199F8} - c:\program files\kaspersky lab\kaspersky anti-virus 2013\ieext\urladvisor\klwtbbho.dll
TB: Google Toolbar: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [picon] "c:\program files\common files\intel\privacy icon\PrivacyIconClient.exe" -startup
mRun: [PDF Complete] c:\program files\pdf complete\pdfsty.exe
mRun: [accrdsub] "c:\program files\actividentity\activclient\accrdsub.exe"
mRun: [SetRefresh] c:\program files\hp\setrefresh\SetRefresh.exe
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [AVP] "c:\program files\kaspersky lab\kaspersky anti-virus 2013\avp.exe"
mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\imagem~1.lnk - c:\program files\pixela\imagemixer 3 se ver.6\transfer utility\CameraMonitor.exe
uPolicies-Explorer: NoDrives = dword:0
mPolicies-Explorer: BindDirectlyToPropertySetStorage = dword:0
mPolicies-Explorer: NoDrives = dword:0
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_6CE5017F567343CA.dll/cmsidewiki.html
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_07\bin\ssv.dll
IE: {0C4CC089-D306-440D-9772-464E226F6539} - {0BA14598-4178-4CE5-B1F1-B5C6408A3F2E} - c:\program files\kaspersky lab\kaspersky anti-virus 2013\ieext\virtualkeyboard\ie_virtual_keyboard_plugin.dll
IE: {CCF151D8-D089-449F-A5A4-D9909053F20F} - {CCF151D8-D089-449F-A5A4-D9909053F20F} - c:\program files\kaspersky lab\kaspersky anti-virus 2013\ieext\urladvisor\klwtbbho.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
TCP: NameServer = 68.105.28.11 68.105.29.11 68.105.28.12
TCP: Interfaces\{76122C9D-7096-46C7-A5ED-4B9A2E647B0F} : DHCPNameServer = 68.105.28.11 68.105.29.11 68.105.28.12
Notify: igfxcui - igfxdev.dll
LSA: Security Packages =  kerberos msv1_0 schannel wdigest tspkg
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "c:\program files\google\chrome\application\25.0.1364.97\installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
.
============= SERVICES / DRIVERS ===============
.
R0 RapportKELL;RapportKELL;c:\windows\system32\drivers\RapportKELL.sys [2013-2-6 65848]
R1 KLIM6;Kaspersky Anti-Virus NDIS 6 Filter;c:\windows\system32\drivers\klim6.sys [2012-8-2 24408]
R1 kltdi;kltdi;c:\windows\system32\drivers\kltdi.sys [2012-6-8 43608]
R1 kneps;kneps;c:\windows\system32\drivers\kneps.sys [2012-8-13 144344]
R1 RapportCerberus_43926;RapportCerberus_43926;c:\programdata\trusteer\rapport\store\exts\rapportcerberus\43926\RapportCerberus32_43926.sys [2012-10-31 272216]
R1 RapportEI;RapportEI;c:\program files\trusteer\rapport\bin\RapportEI.sys [2013-2-6 71480]
R1 RapportPG;RapportPG;c:\program files\trusteer\rapport\bin\RapportPG.sys [2013-2-6 166840]
R2 accoca;ActivClient Middleware Service;c:\program files\actividentity\activclient\accoca.exe [2007-11-27 185896]
R2 ATService;AuthenTec Fingerprint Service;c:\program files\fingerprint sensor\AtService.exe [2008-10-3 1185016]
R2 AVP;Kaspersky Anti-Virus Service;c:\program files\kaspersky lab\kaspersky anti-virus 2013\avp.exe [2012-8-17 356376]
R2 pdfcDispatcher;PDF Document Manager;c:\program files\pdf complete\pdfsvc.exe [2011-12-8 635416]
R2 RapportMgmtService;Rapport Management Service;c:\program files\trusteer\rapport\bin\RapportMgmtService.exe [2013-2-6 976728]
R2 regi;regi;c:\windows\system32\drivers\regi.sys [2007-4-17 11032]
R2 UNS;Intel® Active Management Technology User Notification Service;c:\program files\common files\intel\privacy icon\uns\UNS.exe [2011-12-8 2054680]
R3 e1kexpress;Intel® PRO/1000 PCI Express Network Connection Driver K;c:\windows\system32\drivers\e1k6032.sys [2011-12-8 171104]
R3 klkbdflt;Kaspersky Lab KLKBDFLT;c:\windows\system32\drivers\klkbdflt.sys [2012-5-25 25944]
R3 klmouflt;Kaspersky Lab KLMOUFLT;c:\windows\system32\drivers\klmouflt.sys [2012-7-25 25944]
R3 RapportIaso;RapportIaso;c:\programdata\trusteer\rapport\store\exts\rapportms\baseline\RapportIaso.sys [2012-8-10 21520]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2008-1-20 179712]
.
=============== File Associations ===============
.
FileExt: .txt: Applications\wordpad.exe="c:\program files\windows nt\accessories\WORDPAD.EXE" "%1" [UserChoice]
.
=============== Created Last 30 ================
.
2013-02-22 20:19:45    --------    d-sh--w-    C:\$RECYCLE.BIN
2013-02-10 18:32:46    --------    d-----w-    c:\users\eoluser\appdata\local\temp
2013-02-10 18:26:04    98816    ----a-w-    c:\windows\sed.exe
2013-02-10 18:26:04    256000    ----a-w-    c:\windows\PEV.exe
2013-02-10 18:26:04    208896    ----a-w-    c:\windows\MBR.exe
2013-02-10 18:24:26    5030592    ------r-    C:\ComboFix.exe
2013-02-10 18:20:42    --------    d-sh--w-    c:\windows\system32\AI_RecycleBin
2013-02-10 18:20:41    --------    d-----w-    c:\programdata\W3i
2013-02-10 18:20:41    --------    d-----w-    c:\program files\W3i
2013-02-10 18:20:33    --------    d-----w-    c:\users\eoluser\appdata\roaming\DefaultTab
2013-02-10 18:18:59    --------    d-----w-    c:\programdata\APN
2013-02-10 18:18:44    1667264    ----a-w-    C:\7zip_installer_d793193.exe
2013-02-09 00:44:28    1153912    ----a-w-    C:\BlitzBlank.exe
2013-02-09 00:43:52    782336    ----a-w-    C:\RogueKiller.exe
2013-02-09 00:43:26    582209    ----a-w-    C:\adwcleaner.exe
2013-02-09 00:42:45    881914    ----a-w-    C:\SecurityCheck.exe
2013-02-08 23:14:56    2213976    ----a-w-    C:\tdsskiller.exe
2013-02-08 23:12:54    1752992    ----a-w-    C:\rkill.exe
2013-02-08 23:00:01    726464    ----a-w-    C:\SpyHunter-Installer.exe
2013-02-07 04:34:33    --------    d-----w-    c:\users\eoluser\appdata\roaming\SpeedyPC Software
2013-02-07 04:34:33    --------    d-----w-    c:\users\eoluser\appdata\roaming\DriverCure
2013-02-07 04:34:20    --------    d-----w-    c:\programdata\SpeedyPC Software
2013-02-07 04:33:46    4928240    ----a-w-    C:\SpeedyPC Pro Installer.exe
2013-02-07 04:33:05    1205    ----a-w-    C:\FixNCR.reg
2013-02-06 14:59:20    65848    ----a-w-    c:\windows\system32\drivers\RapportKELL.sys
2013-02-06 05:43:12    --------    d-----w-    c:\users\eoluser\appdata\roaming\Malwarebytes
2013-02-06 05:43:01    --------    d-----w-    c:\programdata\Malwarebytes
2013-02-06 05:43:00    21104    ----a-w-    c:\windows\system32\drivers\mbam.sys
2013-02-06 05:43:00    --------    d-----w-    c:\program files\Malwarebytes' Anti-Malware
2013-02-06 05:41:49    10156344    ----a-w-    C:\mbam-setup-1.70.0.1100.exe
2013-02-06 04:16:09    --------    d-----w-    c:\windows\ERUNT
2013-02-06 04:16:02    --------    d-----w-    C:\JRT
2013-02-06 04:15:40    547275    ----a-w-    C:\JRT.exe
2013-02-06 04:13:34    --------    d-----w-    c:\users\eoluser\appdata\roaming\AnySend
2013-02-06 04:13:29    --------    d-----w-    c:\programdata\AnySend
2013-02-06 04:13:22    --------    d-----w-    c:\users\eoluser\appdata\roaming\Any Send Packages
2013-02-06 04:12:48    --------    d-----w-    c:\users\eoluser\appdata\roaming\DSite
2013-02-06 04:11:18    663824    ----a-w-    C:\AnySendSetup.exe
2013-01-28 02:26:18    --------    d-----w-    C:\Taxes
2013-01-28 00:59:44    --------    d-----w-    c:\users\eoluser\appdata\local\Playtopus
2013-01-28 00:51:47    --------    d-----w-    C:\Mplayer
.
==================== Find3M  ====================
.
2012-12-29 22:17:02    404640    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
.
============= FINISH: 14:07:00.64 ===============


 

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:45 PM

Posted 22 February 2013 - 05:03 PM


Hello Zona_Cat

Welcome to The Forums!!

Around here they call me Gringo and I'll be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.




These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-
  • Download Security Check by screen317 from here.
    • Save it to your Desktop.
    • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
-AdwCleaner-
  • Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the content of that logfile with your next answer.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.
--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller or from here
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+
  • Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Zona_Cat

Zona_Cat
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:45 PM

Posted 22 February 2013 - 05:54 PM

Thanks for the quick response Gringo.  I can see we're making progress already... forgot to mention that there was also an unwanted search tab installed in my Firefox window, and it's gone now.

 

Here is the logfile from Security Check:

 

 Results of screen317's Security Check version 0.99.59  
 Windows Vista Service Pack 2 x86 (UAC is enabled)  
 Internet Explorer 8 Out of date!
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled!  
Kaspersky Anti-Virus   
 Antivirus up to date!   
`````````Anti-malware/Other Utilities Check:`````````
 Malwarebytes Anti-Malware version 1.70.0.1100  
 Java™ 6 Update 7  
 Java version out of Date!
 Adobe Flash Player 10 Flash Player out of Date!
  Adobe Flash Player     10.3.183.18 Flash Player out of Date!  
 Adobe Reader 10.1.5 Adobe Reader out of Date!  
 Mozilla Firefox 18.0.2 Firefox out of Date!  
 Google Chrome 24.0.1312.57  
 Google Chrome 25.0.1364.97  
````````Process Check: objlist.exe by Laurent````````  
 Kaspersky Lab Kaspersky Anti-Virus 2013 avp.exe  
 Kaspersky Lab Kaspersky Anti-Virus 2013 klwtblfs.exe  
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 0 %
````````````````````End of Log``````````````````````
 

__________________________________________________________

 

Here is the logfile from AdwCleaner:

 

# AdwCleaner v2.112 - Logfile created 02/22/2013 at 15:36:35
# Updated 10/02/2013 by Xplode
# Operating system : Windows Vista ™ Business Service Pack 2 (32 bits)
# User : EOLUser - EOL
# Boot Mode : Normal
# Running from : C:\Users\EOLUser\Desktop\adwcleaner0.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****

File Deleted : C:\Users\EOLUser\AppData\Roaming\Mozilla\Firefox\Profiles\23kpv4rl.default\extensions\addon@defaulttab.com.xpi
File Deleted : C:\Users\EOLUser\AppData\Roaming\Mozilla\Firefox\Profiles\23kpv4rl.default\searchplugins\search-here.xml
Folder Deleted : C:\ProgramData\APN
Folder Deleted : C:\Users\EOLUser\AppData\Roaming\DefaultTab

***** [Registry] *****

Key Deleted : HKCU\Software\Default Tab
Key Deleted : HKLM\Software\Default Tab

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.19154

[OK] Registry is clean.

-\\ Mozilla Firefox v18.0.2 (en-US)

File : C:\Users\EOLUser\AppData\Roaming\Mozilla\Firefox\Profiles\23kpv4rl.default\prefs.js

C:\Users\EOLUser\AppData\Roaming\Mozilla\Firefox\Profiles\23kpv4rl.default\user.js ... Deleted !

[OK] File is clean.

File : C:\Users\Biancaa\AppData\Roaming\Mozilla\Firefox\Profiles\0exmtcil.default\prefs.js

[OK] File is clean.

-\\ Google Chrome v25.0.1364.97

File : C:\Users\EOLUser\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

File : C:\Users\Biancaa\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [2734 octets] - [08/02/2013 17:45:31]
AdwCleaner[R2].txt - [2794 octets] - [08/02/2013 17:46:15]
AdwCleaner[S1].txt - [2890 octets] - [08/02/2013 17:46:28]
AdwCleaner[S2].txt - [1753 octets] - [22/02/2013 15:36:35]

########## EOF - C:\AdwCleaner[S2].txt - [1813 octets] ##########
 

______________________________________________________________

 

And here is the logfile from RogueKiller:

 

RogueKiller V8.5.1 [Feb 21 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version
Started in : Normal mode
User : EOLUser [Admin rights]
Mode : Remove -- Date : 02/22/2013 15:43:45
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 1 ¤¤¤
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1       localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: ST9250410AS +++++
--- User ---
[MBR] 2110748632eb25ccd641d65614d4f277
[BSP] b83ad53ed499c49cdc148de0a07ed560 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 236444 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 484239360 | Size: 2029 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[2]_D_02222013_02d1543.txt >>
RKreport[1]_S_02222013_02d1542.txt ; RKreport[2]_D_02222013_02d1543.txt



Thanks!

-Zona Cat



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:45 PM

Posted 22 February 2013 - 09:16 PM


Hello Zona Cat

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

  • Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 Zona_Cat

Zona_Cat
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:45 PM

Posted 23 February 2013 - 10:38 AM

Gringo,

 

I downloaded and ran the Combofix, and it looked like it ran fine. One weird thing happened when I did - not sure if this is relevant or not. When I went to disable Kaspersky, it said there were 5 open network connections open that I would be closing (I have exactly one computer hooked up to my router).  Then, when I ran Combofix immediately 6 windows popped up saying ieexplorer.exe had stopped working and if I wanted to stop it - I never use Internet Explorer and wasn't at the time. Not sure what is up with all that, but here's the Combofix log:

 

ComboFix 13-02-22.01 - EOLUser 02/22/2013  19:23:04.3.2 - x86
Microsoft® Windows Vista™ Business   6.0.6002.2.1252.1.1033.18.3542.2309 [GMT -7:00]
Running from: c:\users\EOLUser\Desktop\ComboFix.exe
AV: Kaspersky Anti-Virus *Disabled/Updated* {C3113FBF-4BCB-4461-D78D-6EDFEC9593E5}
SP: Kaspersky Anti-Virus *Disabled/Updated* {7870DE5B-6DF1-4BEF-ED3D-55AD9712D958}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2013-01-23 to 2013-02-23  )))))))))))))))))))))))))))))))
.
.
2013-02-23 02:28 . 2013-02-23 02:28    --------    d-----w-    c:\users\Default\AppData\Local\temp
2013-02-23 02:28 . 2013-02-23 02:28    --------    d-----w-    c:\users\Biancaa\AppData\Local\temp
2013-02-22 22:35 . 2013-02-22 22:48    --------    d-----w-    C:\Gringo
2013-02-10 18:32 . 2013-02-23 02:28    --------    d-----w-    c:\users\EOLUser\AppData\Local\temp
2013-02-10 18:20 . 2013-02-10 18:20    --------    d-sh--w-    c:\windows\system32\AI_RecycleBin
2013-02-10 18:20 . 2013-02-10 18:20    --------    d-----w-    c:\programdata\W3i
2013-02-10 18:20 . 2013-02-10 18:20    --------    d-----w-    c:\program files\W3i
2013-02-10 18:18 . 2013-02-10 18:18    1667264    ----a-w-    C:\7zip_installer_d793193.exe
2013-02-09 00:44 . 2013-02-09 00:44    1153912    ----a-w-    C:\BlitzBlank.exe
2013-02-09 00:43 . 2013-02-09 00:43    782336    ----a-w-    C:\RogueKiller.exe
2013-02-09 00:43 . 2013-02-09 00:43    582209    ----a-w-    C:\adwcleaner.exe
2013-02-09 00:42 . 2013-02-09 00:42    881914    ----a-w-    C:\SecurityCheck.exe
2013-02-08 23:14 . 2013-02-08 23:14    2213976    ----a-w-    C:\tdsskiller.exe
2013-02-08 23:12 . 2013-02-08 23:13    1752992    ----a-w-    C:\rkill.exe
2013-02-08 23:00 . 2013-02-08 23:00    726464    ----a-w-    C:\SpyHunter-Installer.exe
2013-02-07 04:34 . 2013-02-07 04:34    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\SpeedyPC Software
2013-02-07 04:34 . 2013-02-07 04:34    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\DriverCure
2013-02-07 04:34 . 2013-02-08 23:02    --------    d-----w-    c:\programdata\SpeedyPC Software
2013-02-07 04:33 . 2013-02-08 22:59    4928240    ----a-w-    C:\SpeedyPC Pro Installer.exe
2013-02-07 04:33 . 2013-02-08 22:59    1205    ----a-w-    C:\FixNCR.reg
2013-02-06 14:59 . 2013-02-06 14:59    65848    ----a-w-    c:\windows\system32\drivers\RapportKELL.sys
2013-02-06 05:43 . 2013-02-06 05:43    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\Malwarebytes
2013-02-06 05:43 . 2013-02-06 05:43    --------    d-----w-    c:\programdata\Malwarebytes
2013-02-06 05:43 . 2013-02-06 05:43    --------    d-----w-    c:\program files\Malwarebytes' Anti-Malware
2013-02-06 05:43 . 2012-12-14 23:49    21104    ----a-w-    c:\windows\system32\drivers\mbam.sys
2013-02-06 05:41 . 2013-02-06 05:42    10156344    ----a-w-    C:\mbam-setup-1.70.0.1100.exe
2013-02-06 04:16 . 2013-02-06 04:16    --------    d-----w-    c:\windows\ERUNT
2013-02-06 04:16 . 2013-02-06 04:37    --------    d-----w-    C:\JRT
2013-02-06 04:13 . 2013-02-06 04:13    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\AnySend
2013-02-06 04:13 . 2013-02-06 04:32    --------    d-----w-    c:\programdata\AnySend
2013-02-06 04:13 . 2013-02-06 04:13    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\Any Send Packages
2013-02-06 04:12 . 2013-02-06 04:12    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\DSite
2013-02-06 04:11 . 2013-02-06 04:11    663824    ----a-w-    C:\AnySendSetup.exe
2013-01-28 02:26 . 2013-02-10 22:36    --------    d-----w-    C:\Taxes
2013-01-28 00:59 . 2013-02-06 06:29    --------    d-----w-    c:\users\EOLUser\AppData\Local\Playtopus
2013-01-28 00:51 . 2013-01-28 00:51    --------    d-----w-    C:\Mplayer
2013-01-28 00:11 . 2013-01-28 00:11    --------    d-----w-    c:\users\Biancaa\AppData\Local\Mozilla
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-12-29 22:17 . 2012-12-29 22:17    404640    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-02-06 03:57 . 2013-02-06 03:57    262552    ----a-w-    c:\program files\mozilla firefox\components\browsercomps.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2012-06-29 39408]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-10-16 150040]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-10-16 178712]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-10-16 154136]
"picon"="c:\program files\Common Files\Intel\Privacy Icon\PrivacyIconClient.exe" [2008-07-19 773144]
"PDF Complete"="c:\program files\PDF Complete\pdfsty.exe" [2009-06-18 563736]
"accrdsub"="c:\program files\ActivIdentity\ActivClient\accrdsub.exe" [2007-11-28 298536]
"SetRefresh"="c:\program files\HP\SetRefresh\SetRefresh.exe" [2003-11-20 525824]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2008-04-04 1314816]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-03 946352]
"AVP"="c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe" [2012-11-16 356376]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-11-28 59280]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2012-12-12 152544]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
ImageMixer 3 SE Camera Monitor Ver.6.lnk - c:\program files\PIXELA\ImageMixer 3 SE Ver.6\Transfer Utility\CameraMonitor.exe [2012-11-16 537968]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-1025673710-853254951-3513216836-1000]
"EnableNotificationsRef"=dword:00000002
.
S2 accoca;ActivClient Middleware Service;c:\program files\ActivIdentity\ActivClient\accoca.exe [x]
.
.
--- Other Services/Drivers In Memory ---
.
*Deregistered* - TrueSight
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork    REG_MULTI_SZ       PLA DPS BFE mpssvc
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-02-22 03:59    1629648    ----a-w-    c:\program files\Google\Chrome\Application\25.0.1364.97\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-02-22 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-06-29 20:23]
.
2013-02-23 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-06-29 20:23]
.
2013-02-22 c:\windows\Tasks\User_Feed_Synchronization-{AC37537A-D8FA-4D79-B021-A8022FBACA77}.job
- c:\windows\system32\msfeedssync.exe [2011-12-08 21:29]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_6CE5017F567343CA.dll/cmsidewiki.html
TCP: DhcpNameServer = 68.105.28.11 68.105.29.11 68.105.28.12
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-02-22 19:28
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ...
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\pdfcDispatcher]
"ImagePath"="c:\program files\PDF Complete\pdfsvc.exe /startedbyscm:66B66708-40E2BE4D-pdfcService"
.
Completion time: 2013-02-22  19:29:04
ComboFix-quarantined-files.txt  2013-02-23 02:29
ComboFix2.txt  2013-02-22 20:20
ComboFix3.txt  2013-02-10 18:34
.
Pre-Run: 178,270,461,952 bytes free
Post-Run: 178,248,056,832 bytes free
.
- - End Of File - - D5B130D773DE799297B4CC8331044E89
 

 

It looks like I am still infected - still getting Playtopus pop-ups and the random hyperlinks embedded in text.

 

- Zona Cat



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:45 PM

Posted 23 February 2013 - 11:48 AM


Hello Zona_Cat

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:
 ClearJavaCache:: 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 Zona_Cat

Zona_Cat
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:45 PM

Posted 23 February 2013 - 03:29 PM

Gringo,

Looks like I'm still infected - still getting pop-ups and random hyperlinks.

I ran Combofix with the script dragged into it, and here is the log file:

 

 

 

ComboFix 13-02-22.01 - EOLUser 02/23/2013  12:03:34.4.2 - x86
Microsoft® Windows Vista™ Business   6.0.6002.2.1252.1.1033.18.3542.2287 [GMT -7:00]
Running from: c:\users\EOLUser\Desktop\ComboFix.exe
Command switches used :: c:\users\EOLUser\Desktop\CFScript.txt
AV: Kaspersky Anti-Virus *Disabled/Updated* {C3113FBF-4BCB-4461-D78D-6EDFEC9593E5}
SP: Kaspersky Anti-Virus *Disabled/Updated* {7870DE5B-6DF1-4BEF-ED3D-55AD9712D958}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2013-01-23 to 2013-02-23  )))))))))))))))))))))))))))))))
.
.
2013-02-23 19:09 . 2013-02-23 19:09    --------    d-----w-    c:\users\Default\AppData\Local\temp
2013-02-23 19:09 . 2013-02-23 19:09    --------    d-----w-    c:\users\Biancaa\AppData\Local\temp
2013-02-23 06:52 . 2013-02-23 06:52    --------    d-----w-    c:\program files\Common Files\Windows Live
2013-02-22 22:35 . 2013-02-23 02:29    --------    d-----w-    C:\Gringo
2013-02-10 18:32 . 2013-02-23 19:09    --------    d-----w-    c:\users\EOLUser\AppData\Local\temp
2013-02-10 18:20 . 2013-02-10 18:20    --------    d-sh--w-    c:\windows\system32\AI_RecycleBin
2013-02-10 18:20 . 2013-02-10 18:20    --------    d-----w-    c:\programdata\W3i
2013-02-10 18:20 . 2013-02-10 18:20    --------    d-----w-    c:\program files\W3i
2013-02-10 18:18 . 2013-02-10 18:18    1667264    ----a-w-    C:\7zip_installer_d793193.exe
2013-02-09 00:44 . 2013-02-09 00:44    1153912    ----a-w-    C:\BlitzBlank.exe
2013-02-09 00:43 . 2013-02-09 00:43    782336    ----a-w-    C:\RogueKiller.exe
2013-02-09 00:43 . 2013-02-09 00:43    582209    ----a-w-    C:\adwcleaner.exe
2013-02-09 00:42 . 2013-02-09 00:42    881914    ----a-w-    C:\SecurityCheck.exe
2013-02-08 23:14 . 2013-02-08 23:14    2213976    ----a-w-    C:\tdsskiller.exe
2013-02-08 23:12 . 2013-02-08 23:13    1752992    ----a-w-    C:\rkill.exe
2013-02-08 23:00 . 2013-02-08 23:00    726464    ----a-w-    C:\SpyHunter-Installer.exe
2013-02-07 04:34 . 2013-02-07 04:34    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\SpeedyPC Software
2013-02-07 04:34 . 2013-02-07 04:34    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\DriverCure
2013-02-07 04:34 . 2013-02-08 23:02    --------    d-----w-    c:\programdata\SpeedyPC Software
2013-02-07 04:33 . 2013-02-08 22:59    4928240    ----a-w-    C:\SpeedyPC Pro Installer.exe
2013-02-07 04:33 . 2013-02-08 22:59    1205    ----a-w-    C:\FixNCR.reg
2013-02-06 14:59 . 2013-02-06 14:59    65848    ----a-w-    c:\windows\system32\drivers\RapportKELL.sys
2013-02-06 05:43 . 2013-02-06 05:43    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\Malwarebytes
2013-02-06 05:43 . 2013-02-06 05:43    --------    d-----w-    c:\programdata\Malwarebytes
2013-02-06 05:43 . 2013-02-06 05:43    --------    d-----w-    c:\program files\Malwarebytes' Anti-Malware
2013-02-06 05:43 . 2012-12-14 23:49    21104    ----a-w-    c:\windows\system32\drivers\mbam.sys
2013-02-06 05:41 . 2013-02-06 05:42    10156344    ----a-w-    C:\mbam-setup-1.70.0.1100.exe
2013-02-06 04:16 . 2013-02-06 04:16    --------    d-----w-    c:\windows\ERUNT
2013-02-06 04:16 . 2013-02-06 04:37    --------    d-----w-    C:\JRT
2013-02-06 04:13 . 2013-02-06 04:13    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\AnySend
2013-02-06 04:13 . 2013-02-06 04:32    --------    d-----w-    c:\programdata\AnySend
2013-02-06 04:13 . 2013-02-06 04:13    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\Any Send Packages
2013-02-06 04:12 . 2013-02-06 04:12    --------    d-----w-    c:\users\EOLUser\AppData\Roaming\DSite
2013-02-06 04:11 . 2013-02-06 04:11    663824    ----a-w-    C:\AnySendSetup.exe
2013-01-28 02:26 . 2013-02-10 22:36    --------    d-----w-    C:\Taxes
2013-01-28 00:59 . 2013-02-06 06:29    --------    d-----w-    c:\users\EOLUser\AppData\Local\Playtopus
2013-01-28 00:51 . 2013-01-28 00:51    --------    d-----w-    C:\Mplayer
2013-01-28 00:11 . 2013-01-28 00:11    --------    d-----w-    c:\users\Biancaa\AppData\Local\Mozilla
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-12-29 22:17 . 2012-12-29 22:17    404640    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-02-06 03:57 . 2013-02-06 03:57    262552    ----a-w-    c:\program files\mozilla firefox\components\browsercomps.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2012-06-29 39408]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-10-16 150040]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-10-16 178712]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-10-16 154136]
"picon"="c:\program files\Common Files\Intel\Privacy Icon\PrivacyIconClient.exe" [2008-07-19 773144]
"PDF Complete"="c:\program files\PDF Complete\pdfsty.exe" [2009-06-18 563736]
"accrdsub"="c:\program files\ActivIdentity\ActivClient\accrdsub.exe" [2007-11-28 298536]
"SetRefresh"="c:\program files\HP\SetRefresh\SetRefresh.exe" [2003-11-20 525824]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2008-04-04 1314816]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-03 946352]
"AVP"="c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe" [2012-11-16 356376]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-11-28 59280]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2012-12-12 152544]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
ImageMixer 3 SE Camera Monitor Ver.6.lnk - c:\program files\PIXELA\ImageMixer 3 SE Ver.6\Transfer Utility\CameraMonitor.exe [2012-11-16 537968]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-1025673710-853254951-3513216836-1000]
"EnableNotificationsRef"=dword:00000002
.
S2 accoca;ActivClient Middleware Service;c:\program files\ActivIdentity\ActivClient\accoca.exe [x]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - RAPPORTIASO
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork    REG_MULTI_SZ       PLA DPS BFE mpssvc
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-02-22 03:59    1629648    ----a-w-    c:\program files\Google\Chrome\Application\25.0.1364.97\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-02-23 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-06-29 20:23]
.
2013-02-23 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-06-29 20:23]
.
2013-02-23 c:\windows\Tasks\User_Feed_Synchronization-{AC37537A-D8FA-4D79-B021-A8022FBACA77}.job
- c:\windows\system32\msfeedssync.exe [2011-12-08 21:29]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_6CE5017F567343CA.dll/cmsidewiki.html
TCP: DhcpNameServer = 68.105.28.11 68.105.29.11 68.105.28.12
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-02-23 12:09
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ...
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\pdfcDispatcher]
"ImagePath"="c:\program files\PDF Complete\pdfsvc.exe /startedbyscm:66B66708-40E2BE4D-pdfcService"
.
Completion time: 2013-02-23  12:10:10
ComboFix-quarantined-files.txt  2013-02-23 19:10
ComboFix2.txt  2013-02-23 02:29
ComboFix3.txt  2013-02-22 20:20
ComboFix4.txt  2013-02-10 18:34
.
Pre-Run: 178,473,054,208 bytes free
Post-Run: 178,467,962,880 bytes free
.
- - End Of File - - 90134F9F1AEDB107F79F92B9FFCDA9DC
 



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:45 PM

Posted 23 February 2013 - 03:32 PM


Hello Zona_Cat

Lets get a deeper look into the system and lets see if something shows up.

Download and run OTL

Download OTL by Old Timer and save it to your Desktop.
  • Double click on OTL.exe to run it.
  • Under Output, ensure that Minimal Output is selected.
  • Under Extra Registry section, select Use SafeList.
  • Click the Scan All Users checkbox.
  • Click on Run Scan at the top left hand corner.
  • When done, two Notepad files will open.
    • OTL.txt <-- Will be opened and the that I need posted back here
    • Extra.txt <-- Will be minimized - save this one on your desktop in case I ask for it later
  • Please post the contents of OTL.txt in your next reply.
  • Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 Zona_Cat

Zona_Cat
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:45 PM

Posted 23 February 2013 - 05:23 PM

Here you go Gringo - OTL.txt below:

 

OTL logfile created on: 2/23/2013 3:13:38 PM - Run 1
OTL by OldTimer - Version 3.2.69.0     Folder = C:\Users\EOLUser\Desktop
Windows Vista Business Edition Service Pack 2 (Version = 6.0.6002) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.19154)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy
 
3.46 Gb Total Physical Memory | 2.35 Gb Available Physical Memory | 67.92% Memory free
7.13 Gb Paging File | 5.62 Gb Available in Paging File | 78.86% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]
 
%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files
Drive C: | 230.90 Gb Total Space | 166.26 Gb Free Space | 72.00% Space Free | Partition Type: NTFS
Drive D: | 1.98 Gb Total Space | 1.77 Gb Free Space | 89.31% Space Free | Partition Type: NTFS
Drive F: | 490.64 Mb Total Space | 0.00 Mb Free Space | 0.00% Space Free | Partition Type: CDFS
 
Computer Name: EOL | User Name: EOLUser | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days
 
========== Processes (SafeList) ==========
 
PRC - C:\Users\EOLUser\Desktop\OTL.exe (OldTimer Tools)
PRC - C:\Program Files\Trusteer\Rapport\bin\RapportService.exe (Trusteer Ltd.)
PRC - C:\Program Files\Trusteer\Rapport\bin\RapportMgmtService.exe (Trusteer Ltd.)
PRC - C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe (Adobe Systems Incorporated)
PRC - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe (Kaspersky Lab ZAO)
PRC - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\klwtblfs.exe (Kaspersky Lab ZAO)
PRC - C:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe (Protexis Inc.)
PRC - C:\Program Files\PDF Complete\pdfsvc.exe (PDF Complete Inc)
PRC - C:\Windows\explorer.exe (Microsoft Corporation)
PRC - C:\Program Files\Fingerprint Sensor\AtService.exe (AuthenTec, Inc.)
PRC - C:\Program Files\Common Files\Intel\Privacy Icon\UNS\UNS.exe (Intel Corporation)
PRC - C:\Program Files\Intel\AMT\LMS.exe (Intel Corporation)
PRC - C:\Windows\System32\AEADISRV.EXE (Andrea Electronics Corporation)
PRC - C:\Program Files\ActivIdentity\ActivClient\accoca.exe (ActivIdentity)
PRC - C:\Program Files\ActivIdentity\ActivClient\acevents.exe (ActivIdentity)
PRC - C:\Program Files\ActivIdentity\ActivClient\accrdsub.exe (ActivIdentity)
PRC - C:\Program Files\Common Files\InterVideo\RegMgr\iviRegMgr.exe (InterVideo)
 
 
========== Modules (No Company Name) ==========
 
MOD - C:\Program Files\Common Files\Apple\Apple Application Support\zlib1.dll ()
MOD - C:\Program Files\Common Files\Apple\Apple Application Support\libxml2.dll ()
MOD - C:\Program Files\Trusteer\Rapport\bin\js32.dll ()
MOD - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\dblite.dll ()
MOD - C:\ProgramData\Trusteer\Rapport\store\exts\RapportMS\baseline\RapportMS.dll ()
MOD - C:\Windows\System32\aicext.dll ()
 
 
========== Services (SafeList) ==========
 
SRV - (RapportMgmtService) -- C:\Program Files\Trusteer\Rapport\bin\RapportMgmtService.exe (Trusteer Ltd.)
SRV - (MozillaMaintenance) -- C:\Program Files\Mozilla Maintenance Service\maintenanceservice.exe (Mozilla Foundation)
SRV - (AdobeARMservice) -- C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe (Adobe Systems Incorporated)
SRV - (AVP) -- C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe (Kaspersky Lab ZAO)
SRV - (PSI_SVC_2) -- C:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe (Protexis Inc.)
SRV - (pdfcDispatcher) -- C:\Program Files\PDF Complete\pdfsvc.exe (PDF Complete Inc)
SRV - (ATService) -- C:\Program Files\Fingerprint Sensor\AtService.exe (AuthenTec, Inc.)
SRV - (UNS) -- C:\Program Files\Common Files\Intel\Privacy Icon\UNS\UNS.exe (Intel Corporation)
SRV - (LMS) -- C:\Program Files\Intel\AMT\LMS.exe (Intel Corporation)
SRV - (AEADIFilters) -- C:\Windows\System32\AEADISRV.EXE (Andrea Electronics Corporation)
SRV - (WinDefend) -- C:\Program Files\Windows Defender\MpSvc.dll (Microsoft Corporation)
SRV - (accoca) -- C:\Program Files\ActivIdentity\ActivClient\accoca.exe (ActivIdentity)
SRV - (IviRegMgr) -- C:\Program Files\Common Files\InterVideo\RegMgr\iviRegMgr.exe (InterVideo)
 
 
========== Driver Services (SafeList) ==========
 
DRV - (NwlnkFwd) -- system32\DRIVERS\nwlnkfwd.sys File not found
DRV - (NwlnkFlt) -- system32\DRIVERS\nwlnkflt.sys File not found
DRV - (mbr) -- C:\ComboFix\mbr.sys File not found
DRV - (IpInIp) -- system32\DRIVERS\ipinip.sys File not found
DRV - (catchme) -- C:\Users\EOLUser\AppData\Local\Temp\catchme.sys File not found
DRV - (RapportEI) -- C:\Program Files\Trusteer\Rapport\bin\RapportEI.sys (Trusteer Ltd.)
DRV - (RapportPG) -- C:\Program Files\Trusteer\Rapport\bin\RapportPG.sys (Trusteer Ltd.)
DRV - (RapportKELL) -- C:\Windows\System32\drivers\RapportKELL.sys (Trusteer Ltd.)
DRV - (KLIF) -- C:\Windows\System32\drivers\klif.sys (Kaspersky Lab)
DRV - (kltdi) -- C:\Windows\System32\drivers\kltdi.sys (Kaspersky Lab)
DRV - (RapportCerberus_43926) -- C:\ProgramData\Trusteer\Rapport\store\exts\RapportCerberus\43926\RapportCerberus32_43926.sys ()
DRV - (klmouflt) -- C:\Windows\System32\drivers\klmouflt.sys (Kaspersky Lab)
DRV - (klkbdflt) -- C:\Windows\System32\drivers\klkbdflt.sys (Kaspersky Lab)
DRV - (kneps) -- C:\Windows\System32\drivers\kneps.sys (Kaspersky Lab)
DRV - (RapportIaso) -- c:\ProgramData\Trusteer\Rapport\store\exts\RapportMS\baseline\RapportIaso.sys (Trusteer Ltd.)
DRV - (KLIM6) -- C:\Windows\System32\drivers\klim6.sys (Kaspersky Lab ZAO)
DRV - (kl1) -- C:\Windows\System32\drivers\kl1.sys (Kaspersky Lab ZAO)
DRV - (e1kexpress) -- C:\Windows\System32\drivers\e1k6032.sys (Intel Corporation)
DRV - (HECI) -- C:\Windows\System32\drivers\HECI.sys (Intel Corporation)
DRV - (TPM) -- C:\Windows\System32\drivers\tpm.sys (Microsoft Corporation)
DRV - (regi) -- C:\Windows\System32\drivers\regi.sys (InterVideo)
 
 
========== Standard Registry (SafeList) ==========
 
 
========== Internet Explorer ==========
 
IE - HKLM\..\SearchScopes,DefaultScope =
IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search
IE - HKLM\..\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}: "URL" = http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7
 
 
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
IE - HKU\S-1-5-19\..\SearchScopes,defaultscope =
 
IE - HKU\S-1-5-20\..\SearchScopes,defaultscope =
 
IE - HKU\S-1-5-21-1025673710-853254951-3513216836-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com/
IE - HKU\S-1-5-21-1025673710-853254951-3513216836-1000\..\SearchScopes,DefaultScope = {6A1806CD-94D4-4689-BA73-E35EA1EA9990}
IE - HKU\S-1-5-21-1025673710-853254951-3513216836-1000\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC
IE - HKU\S-1-5-21-1025673710-853254951-3513216836-1000\..\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}: "URL" = http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7&rlz=1I7ADFA_enUS490
IE - HKU\S-1-5-21-1025673710-853254951-3513216836-1000\..\SearchScopes\{D4787486-14FF-458D-B589-1CDDC8CA4D86}: "URL" = http://www.mysearchresults.com/search?&c=2652&t=03&q={searchTerms}
IE - HKU\S-1-5-21-1025673710-853254951-3513216836-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
========== FireFox ==========
 
FF - prefs.js..browser.search.defaultenginename: "Yahoo"
FF - prefs.js..browser.search.order.1: "Yahoo"
FF - prefs.js..browser.search.order.2: ""
FF - prefs.js..browser.search.param.yahoo-fr: "w3i&type=W3i_DS,157,0_0,Search,20130207,19626,0,64,6923"
FF - prefs.js..browser.search.selectedEngine: "Yahoo"
FF - prefs.js..browser.search.useDBForOrder: true
FF - prefs.js..browser.startup.homepage: "http://www.google.com/"
FF - prefs.js..extensions.enabledAddons: url_advisor%40kaspersky.com:13.0.1.4250
FF - prefs.js..extensions.enabledAddons: content_blocker%40kaspersky.com:13.0.1.4250
FF - prefs.js..extensions.enabledAddons: links%40playtopus.com:1.0.0
FF - prefs.js..extensions.enabledAddons: %7B972ce4c6-7e08-4474-a285-3208198ce6fd%7D:18.0.2
FF - prefs.js..extensions.netassistant.keyword.url: "http://syndaneta.net/?Programid=132&Elementname=Keyword&Applicationid={57799C68-4B8F-449E-AE16-46422418CBC7}&Version=3.6.5&Vintage=20130207&Defaultbrowserid=64&Productid=2875&Vendorid=6923&Offerid=19628&searchterm="
FF - prefs.js..keyword.URL: "http://search.yahoo.com/search?ei=UTF-8&fr=w3i&type=W3i_DS,157,0_0,Search,20130207,19626,0,64,6923&p="
FF - user.js - File not found
 
FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\system32\Macromed\Flash\NPSWF32.dll ()
FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=:  File not found
FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=1.0: C:\Program Files\iTunes\Mozilla Plugins\npitunes.dll ()
FF - HKLM\Software\MozillaPlugins\@canon.com/MycameraPlugin: C:\Program Files\Canon\ZoomBrowser EX\Program\NPCIG.dll (CANON INC.)
FF - HKLM\Software\MozillaPlugins\@microsoft.com/WPF,version=3.5: c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=3: C:\Program Files\Google\Update\1.3.21.135\npGoogleUpdate3.dll (Google Inc.)
FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=9: C:\Program Files\Google\Update\1.3.21.135\npGoogleUpdate3.dll (Google Inc.)
FF - HKLM\Software\MozillaPlugins\Adobe Reader: C:\Program Files\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
 
FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\url_advisor@kaspersky.com: C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\FFExt\url_advisor@kaspersky.com [2012/12/20 11:26:12 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\virtual_keyboard@kaspersky.com: C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\FFExt\virtual_keyboard@kaspersky.com [2012/12/20 11:26:12 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\content_blocker@kaspersky.com: C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\FFExt\content_blocker@kaspersky.com [2012/12/20 11:26:12 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 18.0.2\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2013/02/05 20:57:50 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 18.0.2\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins
FF - HKEY_CURRENT_USER\software\mozilla\Mozilla Firefox 18.0.2\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2013/02/05 20:57:50 | 000,000,000 | ---D | M]
FF - HKEY_CURRENT_USER\software\mozilla\Mozilla Firefox 18.0.2\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins
 
[2013/01/27 17:59:50 | 000,000,000 | ---D | M] (No name found) -- C:\Users\EOLUser\AppData\Roaming\Mozilla\Extensions
[2013/02/22 15:36:51 | 000,000,000 | ---D | M] (No name found) -- C:\Users\EOLUser\AppData\Roaming\Mozilla\Firefox\Profiles\23kpv4rl.default\extensions
[2013/01/27 17:59:51 | 000,000,000 | ---D | M] (Playtopus) -- C:\Users\EOLUser\AppData\Roaming\Mozilla\Firefox\Profiles\23kpv4rl.default\extensions\links@playtopus.com
[2013/02/05 20:57:45 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files\Mozilla Firefox\extensions
[2013/02/05 20:57:45 | 000,000,000 | ---D | M] (Kaspersky URL Advisor) -- C:\Program Files\Mozilla Firefox\extensions\linkfilter@kaspersky.ru
[2012/12/20 11:26:12 | 000,000,000 | ---D | M] (Content Blocker) -- C:\PROGRAM FILES\KASPERSKY LAB\KASPERSKY ANTI-VIRUS 2013\FFEXT\CONTENT_BLOCKER@KASPERSKY.COM
[2012/12/20 11:26:12 | 000,000,000 | ---D | M] (Kaspersky URL Advisor) -- C:\PROGRAM FILES\KASPERSKY LAB\KASPERSKY ANTI-VIRUS 2013\FFEXT\URL_ADVISOR@KASPERSKY.COM
[2013/02/05 20:57:50 | 000,262,552 | ---- | M] (Mozilla Foundation) -- C:\Program Files\mozilla firefox\components\browsercomps.dll
[2012/09/09 09:11:56 | 000,002,465 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\bing.xml
[2012/10/27 21:20:14 | 000,002,058 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\twitter.xml
 
========== Chrome  ==========
 
CHR - default_search_provider: Google (Enabled)
CHR - default_search_provider: search_url = {google:baseURL}search?q={searchTerms}&{google:RLZ}{google:acceptedSuggestion}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:searchClient}{google:sourceId}{google:instantExtendedEnabledParameter}ie={inputEncoding}
CHR - default_search_provider: suggest_url = {google:baseSuggestURL}search?{google:searchFieldtrialParameter}client=chrome&q={searchTerms}&{google:cursorPosition}sugkey={google:suggestAPIKeyParameter}
CHR - plugin: Shockwave Flash (Enabled) = C:\Program Files\Google\Chrome\Application\25.0.1364.97\PepperFlash\pepflashplayer.dll
CHR - plugin: Chrome Remote Desktop Viewer (Enabled) = internal-remoting-viewer
CHR - plugin: Native Client (Enabled) = C:\Program Files\Google\Chrome\Application\25.0.1364.97\ppGoogleNaClPluginChrome.dll
CHR - plugin: Chrome PDF Viewer (Enabled) = C:\Program Files\Google\Chrome\Application\25.0.1364.97\pdf.dll
CHR - plugin: Adobe Acrobat (Enabled) = C:\Program Files\Adobe\Reader 10.0\Reader\Browser\nppdf32.dll
CHR - plugin: NPCIG.dll (Enabled) = C:\Program Files\Canon\ZoomBrowser EX\Program\NPCIG.dll
CHR - plugin: Google Update (Enabled) = C:\Program Files\Google\Update\1.3.21.135\npGoogleUpdate3.dll
CHR - plugin: iTunes Application Detector (Enabled) = C:\Program Files\iTunes\Mozilla Plugins\npitunes.dll
CHR - plugin: Shockwave Flash (Enabled) = C:\Windows\system32\Macromed\Flash\NPSWF32.dll
CHR - plugin: Windows Presentation Foundation (Enabled) = c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll
CHR - Extension: Kaspersky URL Advisor = C:\Users\EOLUser\AppData\Local\Google\Chrome\User Data\Default\Extensions\dchlnpcodkpfdpacogkljefecpegganj\13.0.1.4190_0\
CHR - Extension: Virtual Keyboard = C:\Users\EOLUser\AppData\Local\Google\Chrome\User Data\Default\Extensions\jagncdcchgajhfhijbbhecadmaiegcmh\13.0.1.4190_0\
 
O1 HOSTS File: ([2013/02/10 11:33:11 | 000,000,027 | ---- | M]) - C:\Windows\System32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1       localhost
O2 - BHO: (Content Blocker Plugin) - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\IEExt\ContentBlocker\ie_content_blocker_plugin.dll (Kaspersky Lab ZAO)
O2 - BHO: (Virtual Keyboard Plugin) - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO)
O2 - BHO: (SSVHelper Class) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll (Sun Microsystems, Inc.)
O2 - BHO: (Google Toolbar Notifier BHO) - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.7.8313.1002\swg.dll (Google Inc.)
O2 - BHO: (URL Advisor Plugin) - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO)
O4 - HKLM..\Run: [accrdsub] C:\Program Files\ActivIdentity\ActivClient\accrdsub.exe (ActivIdentity)
O4 - HKLM..\Run: [APSDaemon] C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe (Apple Inc.)
O4 - HKLM..\Run: [AVP] C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe (Kaspersky Lab ZAO)
O4 - HKLM..\Run: [PDF Complete] C:\Program Files\PDF Complete\pdfsty.exe (PDF Complete Inc)
O4 - HKLM..\Run: [picon] C:\Program Files\Common Files\Intel\Privacy Icon\PrivacyIconClient.exe (Intel Corporation)
O4 - HKLM..\Run: [SetRefresh] C:\Program Files\HP\SetRefresh\SetRefresh.exe (Hewlett-Packard Company)
O4 - HKU\S-1-5-19..\Run: [WindowsWelcomeCenter] C:\Windows\System32\oobefldr.dll (Microsoft Corporation)
O4 - HKU\S-1-5-20..\Run: [WindowsWelcomeCenter] C:\Windows\System32\oobefldr.dll (Microsoft Corporation)
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Low Rights present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O7 - HKU\.DEFAULT\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-18\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-19\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-20\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-21-1025673710-853254951-3513216836-1000\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKU\S-1-5-21-1025673710-853254951-3513216836-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_6CE5017F567343CA.dll/cmsidewiki.html File not found
O9 - Extra 'Tools' menuitem : Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\npjpi160_07.dll (Sun Microsystems, Inc.)
O9 - Extra Button: Virtual Keyboard - {0C4CC089-D306-440D-9772-464E226F6539} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO)
O9 - Extra Button: URLs check - {CCF151D8-D089-449F-A5A4-D9909053F20F} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab (Java Plug-in 1.6.0_07)
O16 - DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab (Java Plug-in 1.6.0_07)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab (Java Plug-in 1.6.0_07)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 68.105.28.11 68.105.29.11 68.105.28.12
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{76122C9D-7096-46C7-A5ED-4B9A2E647B0F}: DhcpNameServer = 68.105.28.11 68.105.29.11 68.105.28.12
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\Windows\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\Windows\system32\userinit.exe) - C:\Windows\System32\userinit.exe (Microsoft Corporation)
O24 - Desktop WallPaper: C:\Windows\Web\Wallpaper\Wallpaper1_1024x768.jpg
O24 - Desktop BackupWallPaper: C:\Windows\Web\Wallpaper\Wallpaper1_1024x768.jpg
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2006/09/18 14:43:36 | 000,000,024 | ---- | M] () - C:\autoexec.bat -- [ NTFS ]
O32 - AutoRun File - [2007/12/01 16:53:06 | 000,000,048 | R--- | M] () - F:\Autorun.inf -- [ CDFS ]
O34 - HKLM BootExecute: (autocheck autochk *)
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = ComFile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*
O38 - SubSystems\\Windows: (ServerDll=winsrv:UserServerDllInitialization,3)
O38 - SubSystems\\Windows: (ServerDll=winsrv:ConServerDllInitialization,2)
 
========== Files/Folders - Created Within 30 Days ==========
 
[2013/02/23 14:24:53 | 000,602,112 | ---- | C] (OldTimer Tools) -- C:\Users\EOLUser\Desktop\OTL.exe
[2013/02/23 12:10:11 | 000,000,000 | ---D | C] -- C:\Windows\temp
[2013/02/23 12:09:45 | 000,000,000 | -HSD | C] -- C:\$RECYCLE.BIN
[2013/02/23 00:01:29 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Local\{6DBBC89D-DC44-489A-8052-8B474C70673D}
[2013/02/23 00:00:39 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Local\{453AD9AB-297D-4A8D-980D-9C74F73D876F}
[2013/02/22 23:57:40 | 005,487,016 | ---- | C] (Microsoft Corporation) -- C:\Users\EOLUser\Desktop\Windows8-UpgradeAssistant.exe
[2013/02/22 23:52:57 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\Windows Live
[2013/02/22 23:52:36 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Local\{CF5409CF-21AF-4E48-9D80-6C18DD11F29E}
[2013/02/22 23:49:10 | 001,287,528 | ---- | C] (Microsoft Corporation) -- C:\Users\EOLUser\Desktop\Moviemaker.exe
[2013/02/22 19:20:41 | 005,034,222 | R--- | C] (Swearware) -- C:\Users\EOLUser\Desktop\ComboFix.exe
[2013/02/22 15:35:41 | 000,000,000 | ---D | C] -- C:\Gringo
[2013/02/22 12:55:37 | 000,688,992 | R--- | C] (Swearware) -- C:\Users\EOLUser\Desktop\dds.com
[2013/02/10 11:32:46 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Local\temp
[2013/02/10 11:26:04 | 000,518,144 | ---- | C] (SteelWerX) -- C:\Windows\SWREG.exe
[2013/02/10 11:26:04 | 000,406,528 | ---- | C] (SteelWerX) -- C:\Windows\SWSC.exe
[2013/02/10 11:26:04 | 000,060,416 | ---- | C] (NirSoft) -- C:\Windows\NIRCMD.exe
[2013/02/10 11:25:58 | 000,000,000 | ---D | C] -- C:\Qoobox
[2013/02/10 11:25:43 | 000,000,000 | ---D | C] -- C:\Windows\erdnt
[2013/02/10 11:24:26 | 005,030,592 | R--- | C] (Swearware) -- C:\ComboFix.exe
[2013/02/10 11:20:42 | 000,000,000 | -HSD | C] -- C:\Windows\System32\AI_RecycleBin
[2013/02/10 11:20:41 | 000,000,000 | ---D | C] -- C:\ProgramData\W3i
[2013/02/10 11:20:41 | 000,000,000 | ---D | C] -- C:\Program Files\W3i
[2013/02/10 11:20:41 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Uninstall Helper
[2013/02/10 11:18:44 | 001,667,264 | ---- | C] (W3i, LLC) -- C:\7zip_installer_d793193.exe
[2013/02/08 17:48:29 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\Desktop\RK_Quarantine
[2013/02/08 17:44:28 | 001,153,912 | ---- | C] (Emsi Software GmbH) -- C:\BlitzBlank.exe
[2013/02/08 16:14:56 | 002,213,976 | ---- | C] (Kaspersky Lab ZAO) -- C:\tdsskiller.exe
[2013/02/08 16:12:54 | 001,752,992 | ---- | C] (Bleeping Computer, LLC) -- C:\rkill.exe
[2013/02/08 16:00:01 | 000,726,464 | ---- | C] (Enigma Software Group USA, LLC.) -- C:\SpyHunter-Installer.exe
[2013/02/06 21:34:33 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Roaming\SpeedyPC Software
[2013/02/06 21:34:33 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Roaming\DriverCure
[2013/02/06 21:34:20 | 000,000,000 | ---D | C] -- C:\ProgramData\SpeedyPC Software
[2013/02/06 21:33:46 | 004,928,240 | ---- | C] (SpeedyPC Software) -- C:\SpeedyPC Pro Installer.exe
[2013/02/06 07:59:20 | 000,065,848 | ---- | C] (Trusteer Ltd.) -- C:\Windows\System32\drivers\RapportKELL.sys
[2013/02/05 22:43:12 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Roaming\Malwarebytes
[2013/02/05 22:43:01 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes' Anti-Malware
[2013/02/05 22:43:01 | 000,000,000 | ---D | C] -- C:\ProgramData\Malwarebytes
[2013/02/05 22:43:00 | 000,021,104 | ---- | C] (Malwarebytes Corporation) -- C:\Windows\System32\drivers\mbam.sys
[2013/02/05 22:43:00 | 000,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[2013/02/05 22:41:49 | 010,156,344 | ---- | C] (Malwarebytes Corporation                                    ) -- C:\mbam-setup-1.70.0.1100.exe
[2013/02/05 21:16:09 | 000,000,000 | ---D | C] -- C:\Windows\ERUNT
[2013/02/05 21:16:02 | 000,000,000 | ---D | C] -- C:\JRT
[2013/02/05 21:15:40 | 000,547,275 | ---- | C] (Oleg N. Scherbakov) -- C:\JRT.exe
[2013/02/05 21:13:34 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Roaming\AnySend
[2013/02/05 21:13:29 | 000,000,000 | ---D | C] -- C:\ProgramData\AnySend
[2013/02/05 21:13:22 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Roaming\Any Send Packages
[2013/02/05 21:12:48 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Roaming\DSite
[2013/02/05 20:57:45 | 000,000,000 | ---D | C] -- C:\Program Files\Mozilla Firefox
[2013/01/27 19:26:18 | 000,000,000 | ---D | C] -- C:\Taxes
[2013/01/27 17:59:49 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Playtopus
[2013/01/27 17:59:44 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Local\Playtopus
[2013/01/27 17:51:47 | 000,000,000 | ---D | C] -- C:\Mplayer
 
========== Files - Modified Within 30 Days ==========
 
[2013/02/23 14:59:00 | 000,000,888 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineUA.job
[2013/02/23 14:24:53 | 000,602,112 | ---- | M] (OldTimer Tools) -- C:\Users\EOLUser\Desktop\OTL.exe
[2013/02/23 13:32:48 | 000,003,616 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
[2013/02/23 13:32:48 | 000,003,616 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
[2013/02/23 09:38:51 | 000,000,532 | ---- | M] () -- C:\Users\EOLUser\Desktop\draft.rtf
[2013/02/23 04:30:53 | 000,067,584 | --S- | M] () -- C:\Windows\bootstat.dat
[2013/02/22 23:57:41 | 005,487,016 | ---- | M] (Microsoft Corporation) -- C:\Users\EOLUser\Desktop\Windows8-UpgradeAssistant.exe
[2013/02/22 23:49:13 | 001,287,528 | ---- | M] (Microsoft Corporation) -- C:\Users\EOLUser\Desktop\Moviemaker.exe
[2013/02/22 22:37:37 | 000,000,422 | -H-- | M] () -- C:\Windows\tasks\User_Feed_Synchronization-{AC37537A-D8FA-4D79-B021-A8022FBACA77}.job
[2013/02/22 22:03:05 | 000,000,884 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineCore.job
[2013/02/22 19:39:23 | 000,595,446 | ---- | M] () -- C:\Windows\System32\perfh009.dat
[2013/02/22 19:39:23 | 000,101,144 | ---- | M] () -- C:\Windows\System32\perfc009.dat
[2013/02/22 19:32:45 | 3713,310,720 | -HS- | M] () -- C:\hiberfil.sys
[2013/02/22 19:21:02 | 005,034,222 | R--- | M] (Swearware) -- C:\Users\EOLUser\Desktop\ComboFix.exe
[2013/02/22 15:30:51 | 000,799,232 | ---- | M] () -- C:\Users\EOLUser\Desktop\RogueKiller.exe
[2013/02/22 15:30:22 | 000,587,671 | ---- | M] () -- C:\Users\EOLUser\Desktop\adwcleaner0.exe
[2013/02/22 15:29:32 | 000,881,935 | ---- | M] () -- C:\Users\EOLUser\Desktop\SecurityCheck.exe
[2013/02/22 12:55:41 | 000,688,992 | R--- | M] (Swearware) -- C:\Users\EOLUser\Desktop\dds.com
[2013/02/22 12:54:10 | 000,000,034 | ---- | M] () -- C:\Users\EOLUser\AppData\Roaming\mbam.context.scan
[2013/02/10 11:33:11 | 000,000,027 | ---- | M] () -- C:\Windows\System32\drivers\etc\hosts
[2013/02/10 11:26:03 | 000,002,458 | ---- | M] () -- C:\Users\EOLUser\Desktop\Document4.rtf
[2013/02/10 11:24:55 | 005,030,592 | R--- | M] (Swearware) -- C:\ComboFix.exe
[2013/02/10 11:18:44 | 001,667,264 | ---- | M] (W3i, LLC) -- C:\7zip_installer_d793193.exe
[2013/02/08 17:44:30 | 001,153,912 | ---- | M] (Emsi Software GmbH) -- C:\BlitzBlank.exe
[2013/02/08 17:43:59 | 000,782,336 | ---- | M] () -- C:\RogueKiller.exe
[2013/02/08 17:43:30 | 000,582,209 | ---- | M] () -- C:\adwcleaner.exe
[2013/02/08 17:42:51 | 000,881,914 | ---- | M] () -- C:\SecurityCheck.exe
[2013/02/08 16:14:56 | 002,213,976 | ---- | M] (Kaspersky Lab ZAO) -- C:\tdsskiller.exe
[2013/02/08 16:13:04 | 001,752,992 | ---- | M] (Bleeping Computer, LLC) -- C:\rkill.exe
[2013/02/08 16:05:01 | 000,002,521 | ---- | M] () -- C:\Users\EOLUser\Desktop\Document.rtf
[2013/02/08 16:00:02 | 000,726,464 | ---- | M] (Enigma Software Group USA, LLC.) -- C:\SpyHunter-Installer.exe
[2013/02/08 15:59:58 | 004,928,240 | ---- | M] (SpeedyPC Software) -- C:\SpeedyPC Pro Installer.exe
[2013/02/08 15:59:27 | 000,001,205 | ---- | M] () -- C:\FixNCR.reg
[2013/02/06 07:59:20 | 000,065,848 | ---- | M] (Trusteer Ltd.) -- C:\Windows\System32\drivers\RapportKELL.sys
[2013/02/05 22:42:26 | 010,156,344 | ---- | M] (Malwarebytes Corporation                                    ) -- C:\mbam-setup-1.70.0.1100.exe
[2013/02/05 21:15:46 | 000,547,275 | ---- | M] (Oleg N. Scherbakov) -- C:\JRT.exe
[2013/02/05 21:11:18 | 000,663,824 | ---- | M] () -- C:\AnySendSetup.exe
[2013/02/04 21:01:36 | 003,067,634 | ---- | M] () -- C:\Users\EOLUser\Documents\GhettoBelligerent.rtf
[2013/02/03 22:38:00 | 015,660,038 | ---- | M] () -- C:\Users\EOLUser\Documents\Henhouse.rtf
[2013/01/27 17:41:33 | 000,000,543 | ---- | M] () -- C:\Windows\System32\mapisvc.inf
 
========== Files Created - No Company Name ==========
 
[2013/02/23 09:38:51 | 000,000,532 | ---- | C] () -- C:\Users\EOLUser\Desktop\draft.rtf
[2013/02/22 15:30:47 | 000,799,232 | ---- | C] () -- C:\Users\EOLUser\Desktop\RogueKiller.exe
[2013/02/22 15:30:21 | 000,587,671 | ---- | C] () -- C:\Users\EOLUser\Desktop\adwcleaner0.exe
[2013/02/22 15:29:30 | 000,881,935 | ---- | C] () -- C:\Users\EOLUser\Desktop\SecurityCheck.exe
[2013/02/22 12:54:10 | 000,000,034 | ---- | C] () -- C:\Users\EOLUser\AppData\Roaming\mbam.context.scan
[2013/02/10 11:26:04 | 000,256,000 | ---- | C] () -- C:\Windows\PEV.exe
[2013/02/10 11:26:04 | 000,208,896 | ---- | C] () -- C:\Windows\MBR.exe
[2013/02/10 11:26:04 | 000,098,816 | ---- | C] () -- C:\Windows\sed.exe
[2013/02/10 11:26:04 | 000,080,412 | ---- | C] () -- C:\Windows\grep.exe
[2013/02/10 11:26:04 | 000,068,096 | ---- | C] () -- C:\Windows\zip.exe
[2013/02/10 11:26:03 | 000,002,458 | ---- | C] () -- C:\Users\EOLUser\Desktop\Document4.rtf
[2013/02/08 17:43:52 | 000,782,336 | ---- | C] () -- C:\RogueKiller.exe
[2013/02/08 17:43:26 | 000,582,209 | ---- | C] () -- C:\adwcleaner.exe
[2013/02/08 17:42:45 | 000,881,914 | ---- | C] () -- C:\SecurityCheck.exe
[2013/02/08 17:07:02 | 3713,310,720 | -HS- | C] () -- C:\hiberfil.sys
[2013/02/08 16:05:01 | 000,002,521 | ---- | C] () -- C:\Users\EOLUser\Desktop\Document.rtf
[2013/02/06 21:33:05 | 000,001,205 | ---- | C] () -- C:\FixNCR.reg
[2013/02/05 21:11:18 | 000,663,824 | ---- | C] () -- C:\AnySendSetup.exe
[2013/02/04 21:01:36 | 003,067,634 | ---- | C] () -- C:\Users\EOLUser\Documents\GhettoBelligerent.rtf
[2013/02/03 22:38:00 | 015,660,038 | ---- | C] () -- C:\Users\EOLUser\Documents\Henhouse.rtf
[2012/12/24 17:44:02 | 000,000,680 | ---- | C] () -- C:\Users\EOLUser\AppData\Local\d3d9caps.dat
[2011/12/08 10:11:58 | 000,018,904 | ---- | C] () -- C:\Windows\System32\StructuredQuerySchemaTrivial.bin
[2011/12/08 10:10:55 | 002,026,604 | ---- | C] () -- C:\Windows\System32\igkrng500.bin
[2011/12/08 10:10:55 | 000,445,796 | ---- | C] () -- C:\Windows\System32\igcompkrng500.bin
[2011/12/08 10:10:55 | 000,147,456 | ---- | C] () -- C:\Windows\System32\igfxCoIn_v1554.dll
[2011/12/08 10:10:55 | 000,147,172 | ---- | C] () -- C:\Windows\System32\igfcg550.bin
[2011/12/08 10:06:36 | 000,107,612 | ---- | C] () -- C:\Windows\System32\StructuredQuerySchema.bin
[2011/12/08 10:06:35 | 000,117,248 | ---- | C] () -- C:\Windows\System32\EhStorAuthn.dll
[2011/12/08 10:05:43 | 000,062,976 | ---- | C] () -- C:\Windows\System32\PrintBrmUi.exe
 
========== ZeroAccess Check ==========
 
[2006/11/02 05:54:18 | 000,000,227 | RHS- | M] () -- C:\Windows\assembly\Desktop.ini
 
[HKEY_CURRENT_USER\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32]
 
[HKEY_CURRENT_USER\Software\Classes\clsid\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InProcServer32]
 
[HKEY_LOCAL_MACHINE\Software\Classes\clsid\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InProcServer32]
"" = %SystemRoot%\system32\shell32.dll -- [2011/01/21 09:35:22 | 011,586,048 | ---- | M] (Microsoft Corporation)
"ThreadingModel" = Apartment
 
[HKEY_LOCAL_MACHINE\Software\Classes\clsid\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InProcServer32]
"" = %systemroot%\system32\wbem\fastprox.dll -- [2009/04/10 23:28:19 | 000,614,912 | ---- | M] (Microsoft Corporation)
"ThreadingModel" = Free
 
[HKEY_LOCAL_MACHINE\Software\Classes\clsid\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32]
"" = %systemroot%\system32\wbem\wbemess.dll -- [2009/04/10 23:28:25 | 000,347,648 | ---- | M] (Microsoft Corporation)
"ThreadingModel" = Both

< End of report >
 



#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:45 PM

Posted 24 February 2013 - 02:21 PM


Hello Zona_Cat

I would like you to run this custom script for me now and when it is complete please give me the report and a status update for the computer.

Run OTL Script
  • Double-click OTL.exe to start the program.
  • Copy and Paste the following code into the customFix.png text box.
    :OTL
    FF - user.js - File not found
    FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=:  File not found
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_6CE5017F567343CA.dll/cmsidewiki.html File not found
    IE - HKU\S-1-5-21-1025673710-853254951-3513216836-1000\..\SearchScopes\{D4787486-14FF-458D-B589-1CDDC8CA4D86}: "URL" = http://www.mysearchresults.com/search?&c=2652&t=03&q={searchTerms}
    [2013/02/06 21:34:33 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Roaming\SpeedyPC Software
    [2013/02/06 21:34:33 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Roaming\DriverCure
    [2013/02/06 21:34:20 | 000,000,000 | ---D | C] -- C:\ProgramData\SpeedyPC Software
    [2013/02/06 21:33:46 | 004,928,240 | ---- | C] (SpeedyPC Software) -- C:\SpeedyPC Pro Installer.exe
    [2013/01/27 17:59:49 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Playtopus
    [2013/01/27 17:59:44 | 000,000,000 | ---D | C] -- C:\Users\EOLUser\AppData\Local\Playtopus
    :Files
    ipconfig /flushdns /c
    
    :Commands
    [PURITY]
    [emptyjava]
    [EMPTYFLASH]
    [reboot]
    
  • Then click the Run Fix button at the top.
  • Click btnOK.png.
  • OTL may ask to reboot the machine. Please do so if asked.
  • The report should appear in Notepad after the reboot.Copy and Paste that report in your next reply.

    Note** if the report does not popup after the computer reboots you can find it here in this folder - C:\_OTL\MovedFiles

    It will be named - mmddyyyy_hhmmss.log

    Where mmddyyyy_hhmmss - are numbers representing the date and time the fix was run.


  • Let me know How things are doing

    Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 Zona_Cat

Zona_Cat
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:45 PM

Posted 24 February 2013 - 02:45 PM

Appreciate the custom work Gringo.  Unfortunately I'm still getting the Playtopus garbage pop-ups and hyperlinks.  Here is the new output from OTL:

 

 

 

========== OTL ==========
Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@Apple.com/iTunes,version=\ deleted successfully.
Registry key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Google Sidewiki...\ deleted successfully.
Registry key HKEY_USERS\S-1-5-21-1025673710-853254951-3513216836-1000\Software\Microsoft\Internet Explorer\SearchScopes\{D4787486-14FF-458D-B589-1CDDC8CA4D86}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D4787486-14FF-458D-B589-1CDDC8CA4D86}\ not found.
C:\Users\EOLUser\AppData\Roaming\SpeedyPC Software\SpeedyPC Pro folder moved successfully.
C:\Users\EOLUser\AppData\Roaming\SpeedyPC Software folder moved successfully.
C:\Users\EOLUser\AppData\Roaming\DriverCure folder moved successfully.
C:\ProgramData\SpeedyPC Software\SpeedyPC Pro folder moved successfully.
C:\ProgramData\SpeedyPC Software folder moved successfully.
C:\SpeedyPC Pro Installer.exe moved successfully.
C:\Users\EOLUser\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Playtopus folder moved successfully.
C:\Users\EOLUser\AppData\Local\Playtopus folder moved successfully.
========== FILES ==========
< ipconfig /flushdns /c >
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
C:\Users\EOLUser\Desktop\cmd.bat deleted successfully.
C:\Users\EOLUser\Desktop\cmd.txt deleted successfully.
========== COMMANDS ==========
 
[EMPTYJAVA]
 
User: All Users
 
User: Biancaa
 
User: Dave
 
User: Default
 
User: Default User
 
User: EOLUser
->Java cache emptied: 0 bytes
 
User: Public
 
Total Java Files Cleaned = 0.00 mb
 
 
[EMPTYFLASH]
 
User: All Users
 
User: Biancaa
->Flash cache emptied: 1162 bytes
 
User: Dave
 
User: Default
 
User: Default User
 
User: EOLUser
->Flash cache emptied: 48411 bytes
 
User: Public
 
Total Flash Files Cleaned = 0.00 mb
 
 
OTL by OldTimer - Version 3.2.69.0 log created on 02242013_123304
 



#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:45 PM

Posted 24 February 2013 - 02:50 PM

did the computer restart?

have you installed any new software recently?


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 Zona_Cat

Zona_Cat
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:45 PM

Posted 24 February 2013 - 03:11 PM

Yes, the computer did restart, but the logfile did not pop-up - I pulled it from that location you pointed to.

 

My daughter downloaded some Microsoft MovieMaker software Friday night, but when she went to install it a window popped up saying she needed to install a Windows Platform Update - but she didn't because I told her not to because of this whole Playtopus situation. So, I think the answer is no, I didn't install new software - but pretty close.



#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:45 PM

Posted 24 February 2013 - 03:24 PM

thisisujrt.gif Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 Zona_Cat

Zona_Cat
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:08:45 PM

Posted 24 February 2013 - 09:35 PM

Gringo, Here is the output of the JRT:

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 4.6.5 (02.18.2013:1)
OS: Windows Vista ™ Business x86
Ran by EOLUser on Sun 02/24/2013 at 19:29:53.05
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values

Successfully repaired: [Registry Value] hkey_current_user\software\microsoft\internet explorer\searchscopes\\DefaultScope
Successfully repaired: [Registry Value] hkey_local_machine\software\microsoft\internet explorer\searchscopes\\DefaultScope
Successfully repaired: [Registry Value] hkey_users\.default\software\microsoft\internet explorer\searchscopes\\DefaultScope
Successfully repaired: [Registry Value] hkey_users\s-1-5-18\software\microsoft\internet explorer\searchscopes\\DefaultScope
Successfully repaired: [Registry Value] hkey_users\s-1-5-19\software\microsoft\internet explorer\searchscopes\\DefaultScope
Successfully repaired: [Registry Value] hkey_users\s-1-5-20\software\microsoft\internet explorer\searchscopes\\DefaultScope
Successfully repaired: [Registry Value] hkey_users\S-1-5-21-1025673710-853254951-3513216836-1000\software\microsoft\internet explorer\searchscopes\\DefaultScope



~~~ Registry Keys

Successfully deleted: [Registry Key] hkey_current_user\software\microsoft\internet explorer\searchscopes\{6a1806cd-94d4-4689-ba73-e35ea1ea9990}
Successfully deleted: [Registry Key] hkey_local_machine\software\microsoft\internet explorer\searchscopes\{6a1806cd-94d4-4689-ba73-e35ea1ea9990}



~~~ Files



~~~ Folders

Successfully deleted: [Folder] "C:\ProgramData\w3i"
Successfully deleted: [Folder] "C:\Program Files\w3i"
Successfully deleted: [Folder] "C:\Windows\system32\ai_recyclebin"



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sun 02/24/2013 at 19:33:00.45
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users