Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with ZeroAccess Rootkit (consrv.dll)


  • This topic is locked This topic is locked
22 replies to this topic

#1 Tensokuu

Tensokuu

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:49 PM

Posted 15 March 2013 - 11:10 PM

See this thread for the previous logs and information, as requested by Broni: http://www.bleepingcomputer.com/forums/t/488711/headache-of-the-day-consrvdll/

 

Requoting what I wrote in the other thread:

 

Some quick background here: Girlfriend buys McAfee and installs it on her Compaq laptop (Windows 7 Home Premium - also holy crap I'm not sure it's ever been updated; know what I'm doing once this is fixed). McAfee screams infection, removes it, Windows then refuses to boot on reboot.. She does a system restore, gets a refund from McAfee, downloads Avast! and the entire process repeats. Then she hands it to me and asks me to fix it. Easy enough, I figured. We're now at a restore point without antivirus, so I install Spybot, AdAware, and Malwarebytes. I run Malwarebytes, get one infection. Clear it with the tool. Run Spybot, remove the 35 spyware infections it finds. Run AdAware and it dings on 2216 infected files. Welp. It's a few different Trojans and some nonsense (stuff Bing installs, etc) which I remove. Reboot. Boot loop.

 

Okay.

 

Boot into Safe Mode, run Malwarebytes, remove Trojan. Reboot. Clean. Boot into Safe Mode, run Spybot, reboot, clean. Safe Mode, AdAware, reboot, clean. Uninstall everything, install Avast, update, scan -- DING. consrv.dll is picked up and instantly quarantined. Do a little googling, find out that it has a tripwire that when you go to remove it, it causes a boot loop -- attempted to find an easy way to fix it (didn't want to post here and bug people if I didn't have to). Downloaded and ran Kaspersky Free Security Tools 2011 -- it found the infection, attempted to remove it -- boot loop. So now I'm back to where I started, frazzled.

 

The tl;dr of it: Girlfriend got a laptop from her brother that I have since found has never been updated and seems to have a a rootkit issue. It's flagged as consrv.dll -- if you remove this with an antivirus program, it initiates a code tripwire and sticks Windows in a boot loop. I've tried to remove it using Malwarebytes, Avast, AdAware, Kaspersky, no dice -- even if it claims it removes when still in Windows, the moment you reboot the system cannot load Windows and you're forced to system restore back to a point where the infection still sits.

 

I really appreciate the help you guys are willing to give, and the time you are putting in. Thank you very much in advance for helping me fix this issue.

DDS (Ver_2012-11-20.01) - NTFS_AMD64
Internet Explorer: 9.0.8112.16421
Run by Trevor at 11:56:28 on 2013-03-15
Microsoft Windows 7 Home Premium 6.1.7600.0.1252.1.1033.18.1787.712 [GMT -4:00]
.
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\system32\atiesrxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\atieclxx.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\WLANExt.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\Realtek\Audio\HDA\AERTSr64.exe
C:\Program Files (x86)\CinemaNow\CinemaNow Media Manager\CinemanowSvc.exe
C:\Windows\System32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe
C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Realtek\Audio\HDA\RtkNGUI64.exe
C:\Program Files\Microsoft IntelliPoint\ipoint.exe
C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Program Files (x86)\Hewlett-Packard\HP Health Check\hphc_service.exe
C:\Program Files\Realtek\RtVOsd\RtVOsdService.exe
C:\Program Files\Realtek\RtVOsd\RtVOsd.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Windows\servicing\TrustedInstaller.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\System32\cscript.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.bing.com/?PC=BNHP
uURLSearchHooks: {9427041a-a8dc-4d06-9a68-93873486e957} - <orphaned>
uURLSearchHooks: {81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - <orphaned>
uURLSearchHooks: {90eee664-34b1-422a-a782-779af65cdf6d} - <orphaned>
mURLSearchHooks: XfireXO Toolbar: {5e5ab302-7f65-44cd-8211-c1d4caaccea3} - C:\Program Files (x86)\XfireXO\tbXfir.dll
mWinlogon: Userinit = userinit.exe,
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - <orphaned>
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO: Conduit Engine: {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files (x86)\ConduitEngine\ConduitEngine.dll
BHO: XfireXO Toolbar: {5e5ab302-7f65-44cd-8211-c1d4caaccea3} - C:\Program Files (x86)\XfireXO\tbXfir.dll
BHO: {9D425283-D487-4337-BAB6-AB8354A81457} - <orphaned>
BHO: Java(tm) Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} -
TB: Conduit Engine: {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files (x86)\ConduitEngine\ConduitEngine.dll
TB: XfireXO Toolbar: {5E5AB302-7F65-44CD-8211-C1D4CAACCEA3} - C:\Program Files (x86)\XfireXO\tbXfir.dll
TB: XfireXO Toolbar: {5e5ab302-7f65-44cd-8211-c1d4caaccea3} - C:\Program Files (x86)\XfireXO\tbXfir.dll
TB: Conduit Engine: {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files (x86)\ConduitEngine\ConduitEngine.dll
mRun: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
mRunOnce: [Z1] cmd /c "C:\Users\Trevor\Downloads\mbar-1.01.0.1021\mbar\mbar.exe" /cleanup /s
mPolicies-Explorer: NoActiveDesktop = dword:1
mPolicies-Explorer: NoActiveDesktopChanges = dword:1
mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableUIADesktopToggle = dword:0
LSP: mswsock.dll
DPF: {99CAAA27-FA0C-4FA4-B88A-4AB1CC7A17FE} - hxxp://www.netgame.com/mplugin/mglaunch_USAv1005.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: NameServer = 192.168.1.1
TCP: Interfaces\{0D04A0FC-3742-4DD7-99AD-8C633B5A0934} : DHCPNameServer = 40.7.1.100
TCP: Interfaces\{E219AC5B-3B8E-4613-AA67-12CC165A62F1} : DHCPNameServer = 192.168.1.1
TCP: Interfaces\{E219AC5B-3B8E-4613-AA67-12CC165A62F1}\2375942554339373 : DHCPNameServer = 192.168.1.254
TCP: Interfaces\{E219AC5B-3B8E-4613-AA67-12CC165A62F1}\75F47512530303933353 : DHCPNameServer = 64.233.217.2 64.233.217.3
TCP: Interfaces\{E219AC5B-3B8E-4613-AA67-12CC165A62F1}\75F47512638313438303 : DHCPNameServer = 64.233.217.2 64.233.217.3
TCP: Interfaces\{E219AC5B-3B8E-4613-AA67-12CC165A62F1}\76F6C696F6E63776F6C696F6E637 : DHCPNameServer = 192.168.1.1
TCP: Interfaces\{E219AC5B-3B8E-4613-AA67-12CC165A62F1}\84F4D454D283131383 : DHCPNameServer = 75.75.76.76 75.75.75.75
TCP: Interfaces\{E219AC5B-3B8E-4613-AA67-12CC165A62F1}\8726F68702C6966756 : DHCPNameServer = 64.233.217.2 64.233.217.3
SSODL: WebCheck - <orphaned>
SubSystems: Windows = basesrv,1 winsrv:UserServerDllInitialization,3 consrv:ConServerDllInitialization,2 sxssrv,4
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "C:\Program Files (x86)\Google\Chrome\Application\25.0.1364.97\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
x64-BHO: Java(tm) Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
x64-Run: [SynTPEnh] C:\Program Files (x86)\Synaptics\SynTP\SynTPEnh.exe
x64-Run: [RTHDVCPL] C:\Program Files\Realtek\Audio\HDA\RtkNGUI64.exe -s
x64-Run: [IntelliPoint] "c:\Program Files\Microsoft IntelliPoint\ipoint.exe"
x64-DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
x64-DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
x64-DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
x64-SSODL: WebCheck - <orphaned>
.
============= SERVICES / DRIVERS ===============
.
R2 AERTFilters;Andrea RT Filters Service;C:\Program Files\Realtek\Audio\HDA\AERTSr64.exe [2010-11-9 98208]
R2 AMD External Events Utility;AMD External Events Utility;C:\Windows\System32\atiesrxx.exe [2010-11-9 202752]
R2 CinemaNow Service;CinemaNow Service;C:\Program Files (x86)\CinemaNow\CinemaNow Media Manager\CinemaNowSvc.exe [2010-5-21 140272]
R2 HPDrvMntSvc.exe;HP Quick Synchronization Service;C:\Program Files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe [2011-2-4 92216]
R2 HPWMISVC;HPWMISVC;C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe [2010-11-9 26680]
R2 RtVOsdService;RtVOsdService Installer;C:\Program Files\Realtek\RtVOsd\RtVOsdService.exe [2010-6-24 315392]
R3 RTL8167;Realtek 8167 NT Driver;C:\Windows\System32\drivers\Rt64win7.sys [2010-11-9 347680]
R3 usbfilter;AMD USB Filter Driver;C:\Windows\System32\drivers\usbfilter.sys [2010-11-9 38456]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-3-18 138576]
S2 HP Wireless Assistant Service;HP Wireless Assistant Service;C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWA_Service.exe [2010-6-18 103992]
S3 ManyCam;ManyCam Virtual Webcam, WDM Video Capture Driver;C:\Windows\System32\drivers\ManyCam_x64.sys [2008-3-13 27136]
S3 netw5v64;Intel(R) Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;C:\Windows\System32\drivers\netw5v64.sys [2009-6-10 5434368]
S3 npggsvc;nProtect GameGuard Service;C:\Windows\System32\GameMon.des -service --> C:\Windows\System32\GameMon.des -service [?]
S3 SrvHsfHDA;SrvHsfHDA;C:\Windows\System32\drivers\VSTAZL6.SYS [2009-7-13 292864]
S3 SrvHsfV92;SrvHsfV92;C:\Windows\System32\drivers\VSTDPV6.SYS [2009-7-13 1485312]
S3 SrvHsfWinac;SrvHsfWinac;C:\Windows\System32\drivers\VSTCNXT6.SYS [2009-7-13 740864]
S3 USBAAPL64;Apple Mobile USB Driver;C:\Windows\System32\drivers\usbaapl64.sys [2011-5-10 51712]
S3 WatAdminSvc;Windows Activation Technologies Service;C:\Windows\System32\Wat\WatAdminSvc.exe [2010-12-26 1255736]
S3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;C:\Windows\System32\drivers\yk62x64.sys [2009-6-10 389120]
.
=============== Created Last 30 ================
.
2013-03-15 13:15:03    --------    d-----w-    C:\Windows\pss
2013-03-15 12:37:13    --------    d-----w-    C:\ProgramData\Kaspersky Lab
2013-03-15 11:01:32    --------    d-----w-    C:\Users\Trevor\AppData\Roaming\LavasoftStatistics
2013-03-15 10:55:21    --------    d-----w-    C:\ProgramData\blekko toolbars
2013-03-15 10:55:17    --------    d-----w-    C:\Program Files (x86)\adawaretb
2013-03-15 10:55:16    --------    d-----w-    C:\Program Files (x86)\Toolbar Cleaner
2013-03-15 06:23:12    --------    d-----w-    C:\Users\Trevor\AppData\Roaming\Ad-Aware Antivirus
2013-03-15 06:23:12    --------    d-----w-    C:\ProgramData\Ad-Aware Antivirus
2013-03-15 04:46:07    --------    d-----w-    C:\ProgramData\Spybot - Search & Destroy
2013-03-15 04:44:39    --------    d-----w-    C:\Program Files (x86)\Ad-Aware Antivirus
2013-03-15 04:44:05    --------    d-----w-    C:\Users\Trevor\AppData\Local\Programs
2013-03-12 00:13:57    --------    d-----w-    C:\Program Files\AVAST Software
2013-03-12 00:12:28    --------    d-----w-    C:\ProgramData\AVAST Software
2013-03-09 21:02:55    --------    d-----w-    C:\Users\Trevor\AppData\Local\Microsoft Games
2013-03-08 22:36:51    --------    d-----w-    C:\Program Files (x86)\McAfee Online Backup
2013-03-08 22:35:07    --------    d-----w-    C:\Program Files\Common Files\McAfee
2013-03-08 22:34:44    --------    d-----w-    C:\Program Files\McAfee.com
2013-03-08 22:34:41    --------    d-----w-    C:\Program Files\McAfee
2013-03-08 22:34:39    --------    d-----w-    C:\Program Files (x86)\McAfee
2013-02-27 06:16:50    --------    d-----w-    C:\Program Files (x86)\McAfee Security Scan
2013-02-15 22:31:23    186432    ----a-w-    C:\Program Files (x86)\Internet Explorer\Plugins\nppdf32.dll
.
==================== Find3M ====================
.
2013-03-15 14:08:46    693976    ----a-w-    C:\Windows\SysWow64\FlashPlayerApp.exe
2013-03-15 14:08:45    73432    ----a-w-    C:\Windows\SysWow64\FlashPlayerCPLApp.cpl
2012-12-31 18:56:22    1146984    ----a-w-    C:\Windows\System32\RTSnMg64.cpl
2012-12-31 18:56:21    2048104    ----a-w-    C:\Windows\System32\RtPgEx64.dll
2012-12-31 18:56:20    332392    ----a-w-    C:\Windows\System32\RtlCPAPI64.dll
2012-12-31 18:56:17    2494056    ----a-w-    C:\Windows\System32\drivers\RTKVHD64.sys
2012-12-31 18:56:15    80488    ----a-w-    C:\Windows\System32\RCoInst64.dll
2012-12-31 18:56:15    569960    ----a-w-    C:\Windows\System32\RtkApi64.dll
2012-12-31 18:56:15    2625640    ----a-w-    C:\Windows\System32\RtkAPO64.dll
2012-12-31 18:56:15    149608    ----a-w-    C:\Windows\System32\RtkCfg64.dll
2012-12-31 18:56:15    1215592    ----a-w-    C:\Windows\System32\RTCOM64.dll
2012-12-31 18:55:59    200800    ----a-w-    C:\Windows\System32\AERTAC64.dll
2012-12-31 18:55:54    1251944    ----a-w-    C:\Windows\RtlExUpd.dll
2012-12-31 18:44:19    400168    ----a-w-    C:\Windows\System32\SynCOM.dll
2012-12-31 18:44:19    271144    ----a-w-    C:\Windows\System32\SynCtrl.dll
2012-12-31 18:44:19    215336    ----a-w-    C:\Windows\System32\SynTPAPI.dll
2012-12-31 18:44:19    214312    ----a-w-    C:\Windows\SysWow64\SynCtrl.dll
2012-12-31 18:44:19    173352    ----a-w-    C:\Windows\SysWow64\SynCOM.dll
2012-12-31 18:44:19    147752    ----a-w-    C:\Windows\System32\SynTPCo4.dll
2012-12-31 18:44:19    1390640    ----a-w-    C:\Windows\System32\drivers\SynTP.sys
2012-12-31 18:44:19    107816    ----a-w-    C:\Windows\SysWow64\SynTPCOM.dll
.
============= FINISH: 11:57:27.50 ===============
 

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:49 PM

Posted 15 March 2013 - 11:21 PM


Hello Tensokuu

Welcome to The Forums!!

Around here they call me Gringo and I'll be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.




These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-
  • Download Security Check by screen317 from here.
    • Save it to your Desktop.
    • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
-AdwCleaner-
  • Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the content of that logfile with your next answer.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.
--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller or from here
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Tensokuu

Tensokuu
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:49 PM

Posted 15 March 2013 - 11:39 PM

Hello Gringo! Thanks for taking the time to assist me. 

 

As a note, RogueKiller stated that it was ZeroAccess and to finish the delete it would need to reboot. In doing so, I became stuck in a boot loop again. Windows was forced to system restore to get me back into the system itself. Might mean needing to rerun some of the diagnostic stuff again because it'll end up restoring to a point before any work was done.  :(

 

SecurityCheck and AdwCleaner ran without a problem though. Here are their logs:

 

 

 

 Results of screen317's Security Check version 0.99.61  
 Windows 7  x64 (UAC is enabled)  
 Internet Explorer 9  
``````````````Antivirus/Firewall Check:`````````````` 
 Windows Security Center service is not running! This report may not be accurate! 
 WMI entry may not exist for antivirus; attempting automatic update. 
`````````Anti-malware/Other Utilities Check:````````` 
 Malwarebytes Anti-Malware version 1.70.0.1100  
 Adobe Flash Player 10 Flash Player out of Date! 
 Adobe Reader 10.1.6 Adobe Reader out of Date!  
 Google Chrome 24.0.1312.57  
 Google Chrome 25.0.1364.172  
 Google Chrome 25.0.1364.97  
````````Process Check: objlist.exe by Laurent````````  
`````````````````System Health check````````````````` 
 Total Fragmentation on Drive C: 10% 
````````````````````End of Log`````````````````````` 
 
 

# AdwCleaner v2.114 - Logfile created 03/15/2013 at 12:27:39
# Updated 05/03/2013 by Xplode
# Operating system : Windows 7 Home Premium  (64 bits)
# User : Trevor - TREVOR-HP
# Boot Mode : Normal
# Running from : C:\Users\Trevor\Downloads\adwcleaner.exe
# Option [Delete]
 
 
***** [Services] *****
 
 
***** [Files / Folders] *****
 
File Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\eBay.lnk
File Deleted : C:\Users\Public\Desktop\eBay.lnk
File Deleted : C:\Users\Trevor\AppData\Local\Temp\Searchqu.ini
File Deleted : C:\Users\Trevor\AppData\Local\Temp\searchqutoolbar-manifest.xml
File Deleted : C:\Users\Trevor\AppData\Local\Temp\SetupDataMngr_Searchqu.exe
Folder Deleted : C:\Program Files (x86)\adawaretb
Folder Deleted : C:\Program Files (x86)\ConduitEngine
Folder Deleted : C:\Program Files (x86)\Free Offers from Freeze.com
Folder Deleted : C:\Program Files (x86)\Ilivid
Folder Deleted : C:\Program Files (x86)\Search Toolbar
Folder Deleted : C:\Program Files (x86)\XfireXO
Folder Deleted : C:\ProgramData\blekko toolbars
Folder Deleted : C:\ProgramData\Trymedia
Folder Deleted : C:\Users\Trevor\AppData\Local\Conduit
Folder Deleted : C:\Users\Trevor\AppData\Local\Ilivid Player
Folder Deleted : C:\Users\Trevor\AppData\Local\Temp\AskSearch
Folder Deleted : C:\Users\Trevor\AppData\LocalLow\adawaretb
Folder Deleted : C:\Users\Trevor\AppData\LocalLow\Conduit
Folder Deleted : C:\Users\Trevor\AppData\LocalLow\ConduitEngine
Folder Deleted : C:\Users\Trevor\AppData\LocalLow\PriceGong
Folder Deleted : C:\Users\Trevor\AppData\LocalLow\searchquband
Folder Deleted : C:\Users\Trevor\AppData\LocalLow\ShoppingReport2
Folder Deleted : C:\Users\Trevor\AppData\LocalLow\Toolbar4
Folder Deleted : C:\Users\Trevor\AppData\LocalLow\XfireXO
Folder Deleted : C:\Users\Trevor\AppData\Roaming\PriceGong
 
***** [Registry] *****
 
Key Deleted : HKCU\Software\AppDataLow\Software\conduitEngine
Key Deleted : HKCU\Software\AppDataLow\Software\ConduitSearchScopes
Key Deleted : HKCU\Software\AppDataLow\Software\Freecause
Key Deleted : HKCU\Software\AppDataLow\Software\PriceGong
Key Deleted : HKCU\Software\AppDataLow\Software\searchqutoolbar
Key Deleted : HKCU\Software\AppDataLow\Software\ShoppingReport2
Key Deleted : HKCU\Software\AppDataLow\Software\Toolbar
Key Deleted : HKCU\Software\AppDataLow\Software\XfireXO
Key Deleted : HKCU\Software\AppDataLow\Toolbar
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\DataMngr
Key Deleted : HKCU\Software\GamePlayLabs
Key Deleted : HKCU\Software\IM
Key Deleted : HKCU\Software\ImInstaller
Key Deleted : HKCU\Software\InstallCore
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{30F9B915-B755-4826-820B-08FBA6BD249D}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{5E5AB302-7F65-44CD-8211-C1D4CAACCEA3}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{9D977E5E-6951-46DD-8D21-44FA6059B6B3}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{30F9B915-B755-4826-820B-08FBA6BD249D}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5E5AB302-7F65-44CD-8211-C1D4CAACCEA3}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}
Key Deleted : HKCU\Software\PriceGong
Key Deleted : HKCU\Software\Softonic
Key Deleted : HKCU\Software\Zugo
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{CFF4DB9B-135F-47C0-9269-B4C6572FD61A}
Key Deleted : HKLM\Software\Bandoo
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{1301A8A5-3DFB-4731-A162-B357D00C9644}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\BandooCore.EXE
Key Deleted : HKLM\SOFTWARE\Classes\Applications\ilividsetupv1.exe
Key Deleted : HKLM\SOFTWARE\Classes\BandooCore.BandooCore
Key Deleted : HKLM\SOFTWARE\Classes\BandooCore.BandooCore.1
Key Deleted : HKLM\SOFTWARE\Classes\BandooCore.ResourcesMngr
Key Deleted : HKLM\SOFTWARE\Classes\BandooCore.ResourcesMngr.1
Key Deleted : HKLM\SOFTWARE\Classes\BandooCore.SettingsMngr
Key Deleted : HKLM\SOFTWARE\Classes\BandooCore.SettingsMngr.1
Key Deleted : HKLM\SOFTWARE\Classes\BandooCore.StatisticMngr
Key Deleted : HKLM\SOFTWARE\Classes\BandooCore.StatisticMngr.1
Key Deleted : HKLM\SOFTWARE\Classes\Conduit.Engine
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT2304157
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT2856425
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT2878731
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT3008668
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{8F5F1CB6-EA9E-40AF-A5CA-C7FD63CC1971}
Key Deleted : HKLM\Software\Conduit
Key Deleted : HKLM\Software\conduitEngine
Key Deleted : HKLM\Software\Freeze.com
Key Deleted : HKLM\Software\ImInstaller
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\iLividSetupV1_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\iLividSetupV1_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\SearchquMediaBar_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\SearchquMediaBar_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\SetupDataMngr_Searchqu_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\SetupDataMngr_Searchqu_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{8ECC4CCE-31DF-4518-82E9-D5B471F01A6B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{27F69C85-64E1-43CE-98B5-3C9F22FB408E}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{30F9B915-B755-4826-820B-08FBA6BD249D}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{5E5AB302-7F65-44CD-8211-C1D4CAACCEA3}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{80922EE0-8A76-46AE-95D5-BD3C3FE0708D}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{8ECC4CCE-31DF-4518-82E9-D5B471F01A6B}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{99079A25-328F-4BD4-BE04-00955ACAA0A7}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{9D977E5E-6951-46DD-8D21-44FA6059B6B3}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{B543EF05-9758-464E-9F37-4C28525B4A4C}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{BB76A90B-2B4C-4378-8506-9A2B6E16943C}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{C3AB94A4-BFD0-4BBA-A331-DE504F07D2DB}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{FE9271F2-6EFD-44B0-A826-84C829536E93}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{06DE5702-44CF-4B79-B4EF-3DDF653358F5}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{477F210A-2A86-4666-9C4B-1189634D2C84}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{A1F1ECD3-4806-44C6-A869-F0DADF11C57C}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{FF871E51-2655-4D06-AED5-745962A96B32}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\ocphobfcfafpclibolpjdafgaffkaoci
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{424624F4-C5DD-4E1D-BDD0-1E9C9B7799CC}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{628F3201-34D0-49C0-BB9A-82A26AEFB291}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7F000001-DB8E-F89C-2FEC-49BF726F8C12}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{83D566CA-07A7-4EE9-BCF5-FF267F21D506}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9C8A3CA5-889E-4554-BEEC-EC0876E4E96A}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D9869FF4-CDA8-4266-8C1A-348B401339F0}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F9189560-573A-4FDE-B055-AE7B0F4CF080}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{30F9B915-B755-4826-820B-08FBA6BD249D}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5E5AB302-7F65-44CD-8211-C1D4CAACCEA3}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9D425283-D487-4337-BAB6-AB8354A81457}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\conduitEngine
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\XfireXO Toolbar
Key Deleted : HKLM\Software\XfireXO
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{06DE5702-44CF-4B79-B4EF-3DDF653358F5}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{0EB3F101-224A-4B2B-9E5B-DF720857529C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{477F210A-2A86-4666-9C4B-1189634D2C84}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A1F1ECD3-4806-44C6-A869-F0DADF11C57C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{FF871E51-2655-4D06-AED5-745962A96B32}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{424624F4-C5DD-4E1D-BDD0-1E9C9B7799CC}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7F000001-DB8E-F89C-2FEC-49BF726F8C12}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9C8A3CA5-889E-4554-BEEC-EC0876E4E96A}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F9189560-573A-4FDE-B055-AE7B0F4CF080}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{30F9B915-B755-4826-820B-08FBA6BD249D}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{5E5AB302-7F65-44CD-8211-C1D4CAACCEA3}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{98279C38-DE4B-4BCF-93C9-8EC26069D6F4}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{9D425283-D487-4337-BAB6-AB8354A81457}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks [{5E5AB302-7F65-44CD-8211-C1D4CAACCEA3}]
Value Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar [{30F9B915-B755-4826-820B-08FBA6BD249D}]
Value Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar [{5E5AB302-7F65-44CD-8211-C1D4CAACCEA3}]
Value Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar [{9D425283-D487-4337-BAB6-AB8354A81457}]
Value Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar [10]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [10]
 
***** [Internet Browsers] *****
 
-\\ Internet Explorer v9.0.8112.16421
 
Replaced : [HKCU\Software\Microsoft\Internet Explorer\Main - Start Page Restore] = hxxp://search.conduit.com?SearchSource=10&ctid=CT2856425 --> hxxp://www.google.com
 
-\\ Google Chrome v25.0.1364.97
 
File : C:\Users\Trevor\AppData\Local\Google\Chrome\User Data\Default\Preferences
 
[OK] File is clean.
 
*************************
 
AdwCleaner[S1].txt - [12128 octets] - [15/03/2013 12:27:39]
 
########## EOF - C:\AdwCleaner[S1].txt - [12189 octets] ##########


#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:49 PM

Posted 16 March 2013 - 12:16 AM


Hello Tensokuu

download Farbar Recovery Scan Tool x64 and save it to a flash drive.

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
  • To enter System Recovery Options by using Windows installation disc:
    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.
    On the System Recovery Options menu you will get the following options:

      • Startup Repair
        System Restore
        Windows Complete PC Restore
        Windows Memory Diagnostic Tool
        Command Prompt
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst64.exe and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • First Press the Scan button.
    • It will make a log (FRST.txt)
    • Second Type the following in the edit box after "Search:". services.exe
    • Click the Search button
    • It will make a log (Search.txt)
    I want you to poste Both the FRST.txt report and the Search.txt into your reply to me

    Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 Tensokuu

Tensokuu
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:49 PM

Posted 16 March 2013 - 03:42 AM

Good morning, Gringo! I've done as you've asked and here are the logs:

 

 

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 13-03-2013
Ran by SYSTEM at 15-03-2013 16:32:19
Running from H:\
Windows 7 Home Premium   (X64) OS Language: English(US) 
The current controlset is ControlSet001
 
==================== Registry (Whitelisted) ===================
 
HKLM\...\Run: [SynTPEnh] %ProgramFiles%\Synaptics\SynTP\SynTPEnh.exe [2281256 2012-12-31] (Synaptics Incorporated)
HKLM\...\Run: [RTHDVCPL] C:\Program Files\Realtek\Audio\HDA\RtkNGUI64.exe -s [6489704 2012-12-31] (Realtek Semiconductor)
HKLM\...\Run: [HPWirelessAssistant] C:\Program Files\Hewlett-Packard\HP Wireless Assistant\DelayedAppStarter.exe 120 C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWA_Main.exe /hidden [363064 2010-06-18] (Hewlett-Packard Company)
HKLM\...\Run: [IntelliPoint] "c:\Program Files\Microsoft IntelliPoint\ipoint.exe" [2327952 2010-07-21] (Microsoft Corporation)
HKLM-x32\...\Run: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun [98304 2010-06-17] (Advanced Micro Devices, Inc.)
HKLM-x32\...\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [946352 2012-12-02] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [HP Quick Launch] C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe [586296 2010-11-09] (Hewlett-Packard Development Company, L.P.)
HKU\Default\...\Run: [HPAdvisorDock] C:\Program Files (x86)\Hewlett-Packard\HP Advisor\DOCK\HPAdvisorDock.exe [1712184 2010-02-09] ()
HKU\Default User\...\Run: [HPAdvisorDock] C:\Program Files (x86)\Hewlett-Packard\HP Advisor\DOCK\HPAdvisorDock.exe [1712184 2010-02-09] ()
HKU\Guest\...\Run: [HPAdvisorDock] C:\Program Files (x86)\Hewlett-Packard\HP Advisor\Dock\HPAdvisorDock.exe [1712184 2010-02-09] ()
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1
AppInit_DLLs:   
SubSystems: [Windows] ATTENTION! ====> ZeroAccess
Startup: C:\ProgramData\Start Menu\Programs\Startup\desktop(17).ini ()
Startup: C:\Users\Trevor\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Product Registration.lnk
ShortcutTarget: Product Registration.lnk ->  (No File)
 
==================== Services (Whitelisted) ===================
 
 
==================== Drivers (Whitelisted) =====================
 
3 BrSerIf; C:\Windows\System32\Drivers\BrSerIf.sys [97280 2006-12-12] (Brother Industries Ltd.)
0 gfibto; C:\Windows\System32\Drivers\gfibto.sys [14456 2013-03-15] (GFI Software)
3 dump_wmimmc; \??\C:\ijji\ENGLISH\u_sf\GameGuard\dump_wmimmc.sys [x]
3 NPPTNT2; \??\C:\Windows\system32\npptNT2.sys [x]
3 X6va003; \??\C:\Users\Trevor\AppData\Local\Temp\0036EC9.tmp [x]
 
==================== NetSvcs (Whitelisted) ====================
 
 
==================== One Month Created Files and Folders ========
 
2013-03-15 16:32 - 2013-03-15 16:32 - 00000000 ____D C:\FRST
2013-03-15 08:33 - 2013-03-15 08:33 - 00002091 ____A C:\Users\Trevor\Desktop\RKreport[2]_D_03152013_02d1233.txt
2013-03-15 08:32 - 2013-03-15 08:32 - 00002008 ____A C:\Users\Trevor\Desktop\RKreport[1]_S_03152013_02d1232.txt
2013-03-15 08:31 - 2013-03-15 12:41 - 00000000 ____D C:\Users\Trevor\Desktop\RK_Quarantine
2013-03-15 08:29 - 2013-03-15 08:29 - 00012231 ____A C:\Users\Trevor\Desktop\AdwCleaner[S1].txt
2013-03-15 08:27 - 2013-03-15 08:27 - 00012231 ____A C:\AdwCleaner[S1].txt
2013-03-15 08:27 - 2013-03-15 08:27 - 00001144 ____A C:\Users\Trevor\Desktop\checkup.txt
2013-03-15 07:57 - 2013-03-15 07:57 - 00013602 ____A C:\Users\Trevor\Desktop\attach.txt
2013-03-15 07:57 - 2013-03-15 07:57 - 00012448 ____A C:\Users\Trevor\Desktop\dds.txt
2013-03-15 06:32 - 2013-03-15 06:32 - 00000000 ____D C:\Users\Trevor\Downloads\mbar-1.01.0.1021
2013-03-15 06:19 - 2013-03-15 06:19 - 00026900 ____A C:\Users\Trevor\Desktop\ToolBox.txt
2013-03-15 06:18 - 2013-03-15 06:19 - 00026900 ____A C:\Users\Trevor\Downloads\Result.txt
2013-03-15 06:17 - 2013-03-15 06:17 - 00004037 ____A C:\Users\Trevor\Desktop\FSS.txt
2013-03-15 06:16 - 2013-03-15 06:17 - 00004037 ____A C:\Users\Trevor\Downloads\FSS.txt
2013-03-15 06:15 - 2013-03-15 06:15 - 00001226 ____A C:\Users\Trevor\Desktop\SecurityCheckup.txt
2013-03-15 06:10 - 2013-03-15 06:10 - 13786977 ____A C:\Users\Trevor\Downloads\mbar-1.01.0.1021.zip
2013-03-15 05:15 - 2013-03-15 05:15 - 00000000 ____D C:\Windows\pss
2013-03-15 04:37 - 2013-03-15 04:37 - 00000000 ____D C:\ProgramData\Kaspersky Lab
2013-03-15 03:40 - 2013-03-15 03:42 - 111691960 ____A C:\Users\Trevor\Downloads\avast_free_antivirus_setup (1).exe
2013-03-15 03:30 - 2013-03-15 03:30 - 00000124 ____A C:\Windows\wininit.ini
2013-03-15 03:01 - 2013-03-15 03:01 - 00000000 ____D C:\Users\Trevor\AppData\Roaming\LavasoftStatistics
2013-03-15 02:55 - 2013-03-15 12:41 - 00000000 ____D C:\ProgramData\Downloaded Installations
2013-03-15 02:55 - 2013-03-15 12:41 - 00000000 ____D C:\Program Files (x86)\Toolbar Cleaner
2013-03-15 02:55 - 2013-03-15 12:41 - 00000000 ____D C:\Program Files (x86)\adawaretb
2013-03-15 02:53 - 2013-03-15 02:53 - 05574792 ____A (Lavasoft Limited) C:\Users\Trevor\Downloads\Adaware_Installer.exe
2013-03-15 02:53 - 2013-03-15 02:53 - 00014456 ____A (GFI Software) C:\Windows\System32\Drivers\gfibto.sys
2013-03-14 22:23 - 2013-03-15 03:00 - 00000000 ____D C:\Users\Trevor\AppData\Roaming\Ad-Aware Antivirus
2013-03-14 22:23 - 2013-03-14 22:23 - 00000000 ____D C:\ProgramData\Ad-Aware Antivirus
2013-03-14 20:46 - 2013-03-15 12:41 - 00000000 ____D C:\Program Files (x86)\Spybot - Search & Destroy
2013-03-14 20:46 - 2013-03-15 03:48 - 00000000 ____D C:\ProgramData\Spybot - Search & Destroy
2013-03-14 20:44 - 2013-03-15 12:40 - 00000000 ____D C:\Program Files (x86)\Ad-Aware Antivirus
2013-03-14 20:44 - 2013-03-14 20:44 - 00000000 ____D C:\ProgramData\Lavasoft
2013-03-11 16:16 - 2013-03-11 16:16 - 00000000 ____D C:\Users\Trevor\AppData\LocalGoogle
2013-03-11 16:13 - 2013-03-15 03:54 - 00000000 ____D C:\Program Files\AVAST Software
2013-03-11 16:12 - 2013-03-15 03:54 - 00000000 ____D C:\ProgramData\AVAST Software
2013-03-11 16:11 - 2013-03-11 16:12 - 111691960 ____A C:\Users\Trevor\Downloads\avast_free_antivirus_setup.exe
2013-03-09 13:02 - 2013-03-15 12:40 - 00000000 ____D C:\Users\Trevor\AppData\Local\Microsoft Games
2013-03-08 14:41 - 2013-03-08 21:37 - 00262144 ____A C:\Windows\System32\config\ELAM
2013-03-08 14:36 - 2013-03-09 01:17 - 00000000 ____D C:\Program Files (x86)\McAfee Online Backup
2013-03-08 14:35 - 2013-03-09 01:17 - 00000000 ____D C:\Program Files\Common Files\McAfee
2013-03-08 14:34 - 2013-03-09 01:17 - 00000000 ____D C:\Program Files\McAfee
2013-03-08 14:34 - 2013-03-09 01:17 - 00000000 ____D C:\Program Files (x86)\McAfee
2013-03-08 14:34 - 2013-03-08 14:34 - 00000000 ____D C:\Program Files\McAfee.com
2013-02-27 20:13 - 2013-03-15 12:40 - 00000000 ____D C:\Program Files (x86)\Java
2013-02-26 22:16 - 2013-03-15 05:20 - 00000000 ____D C:\Program Files (x86)\McAfee Security Scan
2013-02-26 22:16 - 2013-03-09 01:17 - 00000000 ____D C:\ProgramData\McAfee
 
==================== One Month Modified Files and Folders =======
 
2013-03-15 12:58 - 2011-06-15 13:22 - 00000000 ____D C:\ProgramData\Recovery
2013-03-15 12:41 - 2013-03-15 08:31 - 00000000 ____D C:\Users\Trevor\Desktop\RK_Quarantine
2013-03-15 12:41 - 2013-03-15 05:15 - 00000000 ____D C:\Windows\pss
2013-03-15 12:41 - 2013-03-15 02:55 - 00000000 ____D C:\ProgramData\Downloaded Installations
2013-03-15 12:41 - 2013-03-15 02:55 - 00000000 ____D C:\Program Files (x86)\Toolbar Cleaner
2013-03-15 12:41 - 2013-03-15 02:55 - 00000000 ____D C:\Program Files (x86)\adawaretb
2013-03-15 12:41 - 2013-03-14 20:46 - 00000000 ____D C:\Program Files (x86)\Spybot - Search & Destroy
2013-03-15 12:41 - 2012-12-19 21:29 - 00000000 ____D C:\Windows\System32\Macromed
2013-03-15 12:41 - 2012-12-09 16:20 - 00000000 ____D C:\Users\Trevor\AppData\Roaming\Malwarebytes
2013-03-15 12:41 - 2012-12-09 16:19 - 00000000 ____D C:\Program Files (x86)\Malwarebytes' Anti-Malware
2013-03-15 12:41 - 2011-11-19 18:07 - 00000000 ____D C:\Program Files (x86)\ConduitEngine
2013-03-15 12:41 - 2011-07-17 12:29 - 00000000 ____D C:\Program Files (x86)\iLivid
2013-03-15 12:41 - 2011-03-07 18:12 - 00000000 ____D C:\Program Files (x86)\Search Toolbar
2013-03-15 12:41 - 2011-02-13 13:52 - 00000000 ____D C:\Program Files (x86)\XfireXO
2013-03-15 12:41 - 2011-02-07 05:13 - 00000000 ____D C:\users\Guest
2013-03-15 12:41 - 2010-11-09 01:02 - 00000000 ____D C:\ProgramData\CinemaNow
2013-03-15 12:41 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\registration
2013-03-15 12:41 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\AppCompat
2013-03-15 12:40 - 2013-03-14 20:44 - 00000000 ____D C:\Program Files (x86)\Ad-Aware Antivirus
2013-03-15 12:40 - 2013-03-09 13:02 - 00000000 ____D C:\Users\Trevor\AppData\Local\Microsoft Games
2013-03-15 12:40 - 2013-02-27 20:13 - 00000000 ____D C:\Program Files (x86)\Java
2013-03-15 12:40 - 2011-04-12 16:14 - 00000000 ____D C:\Users\Trevor\AppData\Local\Google
2013-03-15 12:40 - 2011-04-12 16:14 - 00000000 ____D C:\Program Files (x86)\Google
2013-03-15 12:40 - 2011-01-01 14:17 - 00000000 ____D C:\Program Files (x86)\FilmFanaticEI
2013-03-15 12:28 - 2010-11-09 00:49 - 01413265 ____A C:\Windows\WindowsUpdate.log
2013-03-15 12:19 - 2011-12-02 07:35 - 00000352 ____A C:\Windows\Tasks\At34.job
2013-03-15 12:19 - 2011-12-02 07:35 - 00000350 ____A C:\Windows\Tasks\At33.job
2013-03-15 11:58 - 2011-04-12 16:15 - 00000898 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2013-03-15 11:37 - 2012-12-19 21:29 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-03-15 11:19 - 2011-12-02 07:35 - 00000352 ____A C:\Windows\Tasks\At32.job
2013-03-15 11:19 - 2011-12-02 07:35 - 00000350 ____A C:\Windows\Tasks\At31.job
2013-03-15 10:19 - 2011-12-02 07:35 - 00000352 ____A C:\Windows\Tasks\At30.job
2013-03-15 10:19 - 2011-12-02 07:35 - 00000350 ____A C:\Windows\Tasks\At29.job
2013-03-15 09:37 - 2012-12-19 21:29 - 00693976 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2013-03-15 09:37 - 2011-08-14 11:03 - 00073432 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2013-03-15 09:19 - 2011-12-02 07:35 - 00000352 ____A C:\Windows\Tasks\At28.job
2013-03-15 09:19 - 2011-12-02 07:35 - 00000350 ____A C:\Windows\Tasks\At27.job
2013-03-15 09:06 - 2009-07-13 20:45 - 00023248 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-03-15 09:06 - 2009-07-13 20:45 - 00023248 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-03-15 09:04 - 2009-07-13 21:13 - 00726316 ____A C:\Windows\System32\PerfStringBackup.INI
2013-03-15 08:59 - 2012-12-09 16:19 - 00000000 ____D C:\ProgramData\Malwarebytes
2013-03-15 08:59 - 2011-10-25 15:16 - 00000412 ____A C:\Windows\Tasks\PC Optimizer Pro64 startups.job
2013-03-15 08:59 - 2011-04-12 16:15 - 00000894 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2013-03-15 08:59 - 2010-12-25 06:46 - 00000000 ____D C:\users\Trevor
2013-03-15 08:59 - 2009-07-13 21:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-03-15 08:59 - 2009-07-13 20:51 - 00105808 ____A C:\Windows\setupact.log
2013-03-15 08:33 - 2013-03-15 08:33 - 00002091 ____A C:\Users\Trevor\Desktop\RKreport[2]_D_03152013_02d1233.txt
2013-03-15 08:32 - 2013-03-15 08:32 - 00002008 ____A C:\Users\Trevor\Desktop\RKreport[1]_S_03152013_02d1232.txt
2013-03-15 08:29 - 2013-03-15 08:29 - 00012231 ____A C:\Users\Trevor\Desktop\AdwCleaner[S1].txt
2013-03-15 08:27 - 2013-03-15 08:27 - 00012231 ____A C:\AdwCleaner[S1].txt
2013-03-15 08:27 - 2013-03-15 08:27 - 00001144 ____A C:\Users\Trevor\Desktop\checkup.txt
2013-03-15 07:57 - 2013-03-15 07:57 - 00013602 ____A C:\Users\Trevor\Desktop\attach.txt
2013-03-15 07:57 - 2013-03-15 07:57 - 00012448 ____A C:\Users\Trevor\Desktop\dds.txt
2013-03-15 06:32 - 2013-03-15 06:32 - 00000000 ____D C:\Users\Trevor\Downloads\mbar-1.01.0.1021
2013-03-15 06:19 - 2013-03-15 06:19 - 00026900 ____A C:\Users\Trevor\Desktop\ToolBox.txt
2013-03-15 06:19 - 2013-03-15 06:18 - 00026900 ____A C:\Users\Trevor\Downloads\Result.txt
2013-03-15 06:17 - 2013-03-15 06:17 - 00004037 ____A C:\Users\Trevor\Desktop\FSS.txt
2013-03-15 06:17 - 2013-03-15 06:16 - 00004037 ____A C:\Users\Trevor\Downloads\FSS.txt
2013-03-15 06:15 - 2013-03-15 06:15 - 00001226 ____A C:\Users\Trevor\Desktop\SecurityCheckup.txt
2013-03-15 06:10 - 2013-03-15 06:10 - 13786977 ____A C:\Users\Trevor\Downloads\mbar-1.01.0.1021.zip
2013-03-15 05:20 - 2013-02-26 22:16 - 00000000 ____D C:\Program Files (x86)\McAfee Security Scan
2013-03-15 04:37 - 2013-03-15 04:37 - 00000000 ____D C:\ProgramData\Kaspersky Lab
2013-03-15 03:54 - 2013-03-11 16:13 - 00000000 ____D C:\Program Files\AVAST Software
2013-03-15 03:54 - 2013-03-11 16:12 - 00000000 ____D C:\ProgramData\AVAST Software
2013-03-15 03:48 - 2013-03-14 20:46 - 00000000 ____D C:\ProgramData\Spybot - Search & Destroy
2013-03-15 03:42 - 2013-03-15 03:40 - 111691960 ____A C:\Users\Trevor\Downloads\avast_free_antivirus_setup (1).exe
2013-03-15 03:37 - 2010-12-25 14:41 - 00674192 ____A C:\Windows\PFRO.log
2013-03-15 03:30 - 2013-03-15 03:30 - 00000124 ____A C:\Windows\wininit.ini
2013-03-15 03:01 - 2013-03-15 03:01 - 00000000 ____D C:\Users\Trevor\AppData\Roaming\LavasoftStatistics
2013-03-15 03:00 - 2013-03-14 22:23 - 00000000 ____D C:\Users\Trevor\AppData\Roaming\Ad-Aware Antivirus
2013-03-15 02:53 - 2013-03-15 02:53 - 05574792 ____A (Lavasoft Limited) C:\Users\Trevor\Downloads\Adaware_Installer.exe
2013-03-15 02:53 - 2013-03-15 02:53 - 00014456 ____A (GFI Software) C:\Windows\System32\Drivers\gfibto.sys
2013-03-14 22:23 - 2013-03-14 22:23 - 00000000 ____D C:\ProgramData\Ad-Aware Antivirus
2013-03-14 20:44 - 2013-03-14 20:44 - 00000000 ____D C:\ProgramData\Lavasoft
2013-03-11 16:16 - 2013-03-11 16:16 - 00000000 ____D C:\Users\Trevor\AppData\LocalGoogle
2013-03-11 16:12 - 2013-03-11 16:11 - 111691960 ____A C:\Users\Trevor\Downloads\avast_free_antivirus_setup.exe
2013-03-09 16:24 - 2011-12-02 07:35 - 00000352 ____A C:\Windows\Tasks\At40.job
2013-03-09 16:24 - 2011-12-02 07:35 - 00000352 ____A C:\Windows\Tasks\At38.job
2013-03-09 16:24 - 2011-12-02 07:35 - 00000352 ____A C:\Windows\Tasks\At36.job
2013-03-09 16:24 - 2011-12-02 07:35 - 00000350 ____A C:\Windows\Tasks\At39.job
2013-03-09 16:24 - 2011-12-02 07:35 - 00000350 ____A C:\Windows\Tasks\At37.job
2013-03-09 16:24 - 2011-12-02 07:35 - 00000350 ____A C:\Windows\Tasks\At35.job
2013-03-09 04:19 - 2011-12-02 07:34 - 00000352 ____A C:\Windows\Tasks\At16.job
2013-03-09 04:19 - 2011-12-02 07:34 - 00000350 ____A C:\Windows\Tasks\At15.job
2013-03-09 03:19 - 2011-12-02 07:34 - 00000352 ____A C:\Windows\Tasks\At14.job
2013-03-09 03:19 - 2011-12-02 07:34 - 00000350 ____A C:\Windows\Tasks\At13.job
2013-03-09 02:19 - 2011-12-02 07:34 - 00000352 ____A C:\Windows\Tasks\At12.job
2013-03-09 02:19 - 2011-12-02 07:34 - 00000350 ____A C:\Windows\Tasks\At11.job
2013-03-09 01:19 - 2011-12-02 07:34 - 00000352 ____A C:\Windows\Tasks\At10.job
2013-03-09 01:19 - 2011-12-02 07:34 - 00000350 ____A C:\Windows\Tasks\At9.job
2013-03-09 01:17 - 2013-03-08 14:36 - 00000000 ____D C:\Program Files (x86)\McAfee Online Backup
2013-03-09 01:17 - 2013-03-08 14:35 - 00000000 ____D C:\Program Files\Common Files\McAfee
2013-03-09 01:17 - 2013-03-08 14:34 - 00000000 ____D C:\Program Files\McAfee
2013-03-09 01:17 - 2013-03-08 14:34 - 00000000 ____D C:\Program Files (x86)\McAfee
2013-03-09 01:17 - 2013-02-26 22:16 - 00000000 ____D C:\ProgramData\McAfee
2013-03-09 00:19 - 2011-12-02 07:34 - 00000352 ____A C:\Windows\Tasks\At8.job
2013-03-09 00:19 - 2011-12-02 07:34 - 00000350 ____A C:\Windows\Tasks\At7.job
2013-03-08 23:19 - 2011-12-02 07:34 - 00000352 ____A C:\Windows\Tasks\At6.job
2013-03-08 23:19 - 2011-12-02 07:34 - 00000350 ____A C:\Windows\Tasks\At5.job
2013-03-08 22:32 - 2010-12-26 14:07 - 00000052 ____A C:\Windows\SysWOW64\DOErrors.log
2013-03-08 22:19 - 2011-12-02 07:34 - 00000352 ____A C:\Windows\Tasks\At4.job
2013-03-08 22:19 - 2011-12-02 07:34 - 00000350 ____A C:\Windows\Tasks\At3.job
2013-03-08 21:37 - 2013-03-08 14:41 - 00262144 ____A C:\Windows\System32\config\ELAM
2013-03-08 14:34 - 2013-03-08 14:34 - 00000000 ____D C:\Program Files\McAfee.com
2013-02-26 22:17 - 2010-07-10 18:57 - 00000000 ____D C:\ProgramData\Adobe
2013-02-25 21:19 - 2011-12-02 07:34 - 00000352 ____A C:\Windows\Tasks\At2.job
2013-02-25 21:19 - 2011-12-02 07:34 - 00000350 ____A C:\Windows\Tasks\At1.job
2013-02-23 21:10 - 2012-12-24 08:38 - 00000336 ____A C:\Windows\Tasks\HPCeeScheduleForTrevor.job
2013-02-14 19:19 - 2011-12-02 07:35 - 00000352 ____A C:\Windows\Tasks\At46.job
2013-02-14 19:19 - 2011-12-02 07:35 - 00000350 ____A C:\Windows\Tasks\At45.job
 
 
ZeroAccess:
C:\Windows\assembly\temp
C:\Windows\assembly\temp\@
C:\Windows\assembly\temp\U
 
ZeroAccess:
c:\Windows\System32\consrv.dll
 
ZeroAccess:
C:\Windows\assembly\GAC_32\Desktop.ini
 
ZeroAccess:
C:\Windows\assembly\GAC_64\Desktop.ini
 
==================== Known DLLs (Whitelisted) =================
 
 
==================== Bamital & volsnap Check =================
 
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit
 
==================== EXE ASSOCIATION =====================
 
HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK
 
==================== Restore Points  =========================
 
Restore point made on: 2012-12-28 17:40:47
Restore point made on: 2012-12-31 10:35:05
Restore point made on: 2012-12-31 10:40:14
Restore point made on: 2012-12-31 10:41:15
Restore point made on: 2012-12-31 10:51:59
Restore point made on: 2012-12-31 11:13:53
Restore point made on: 2013-01-25 22:26:21
Restore point made on: 2013-01-25 22:30:36
Restore point made on: 2013-01-25 22:35:07
Restore point made on: 2013-02-24 23:57:52
Restore point made on: 2013-02-27 20:12:08
Restore point made on: 2013-02-27 20:13:07
Restore point made on: 2013-03-08 14:39:09
Restore point made on: 2013-03-11 16:13:51
Restore point made on: 2013-03-15 03:54:35
 
==================== Memory info =========================== 
 
Percentage of memory in use: 33%
Total physical RAM: 1786.9 MB
Available physical RAM: 1196.59 MB
Total Pagefile: 1786.9 MB
Available Pagefile: 1180.26 MB
Total Virtual: 8192 MB
Available Virtual: 8191.9 MB
 
==================== Partitions =============================
 
1 Drive c: () (Fixed) (Total:215.36 GB) (Free:154.45 GB) NTFS ==>[System with boot components (obtained from reading drive)]
2 Drive e: (RECOVERY) (Fixed) (Total:17.22 GB) (Free:2.49 GB) NTFS ==>[System with boot components (obtained from reading drive)]
3 Drive f: (HP_TOOLS) (Fixed) (Total:0.1 GB) (Free:0.09 GB) FAT32
5 Drive h: () (Removable) (Total:0.94 GB) (Free:0.93 GB) FAT
6 Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
7 Drive y: (SYSTEM) (Fixed) (Total:0.19 GB) (Free:0.16 GB) NTFS ==>[System with boot components (obtained from reading drive)]
 
  Disk ###  Status         Size     Free     Dyn  Gpt
  --------  -------------  -------  -------  ---  ---
  Disk 0    Online          232 GB      0 B         
  Disk 1    Online          964 MB      0 B         
 
Partitions of Disk 0:
===============
 
Disk ID: 4BE9BCC0
 
  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    Primary            199 MB  1024 KB
  Partition 2    Primary            215 GB   200 MB
  Partition 3    Primary             17 GB   215 GB
  Partition 4    Primary            103 MB   232 GB
 
==================================================================================
 
Disk: 0
Partition 1
Type  : 07
Hidden: No
Active: Yes
 
  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 1     Y   SYSTEM       NTFS   Partition    199 MB  Healthy            
 
=========================================================
 
Disk: 0
Partition 2
Type  : 07
Hidden: No
Active: No
 
  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 2     C                NTFS   Partition    215 GB  Healthy            
 
=========================================================
 
Disk: 0
Partition 3
Type  : 07
Hidden: No
Active: No
 
  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 3     E   RECOVERY     NTFS   Partition     17 GB  Healthy            
 
=========================================================
 
Disk: 0
Partition 4
Type  : 0C
Hidden: No
Active: No
 
  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 4     F   HP_TOOLS     FAT32  Partition    103 MB  Healthy            
 
=========================================================
 
Partitions of Disk 1:
===============
 
Disk ID: 00000001
 
  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
* Partition 1    Primary            964 MB      0 B
 
==================================================================================
 
Disk: 1
There is no partition selected.
 
There is no partition selected.
Please select a partition and try again.
 
=========================================================
============================== MBR Partition Table ==================
 
==============================
Partitions of Disk 0:
===============
Disk ID: 4BE9BCC0
 
Partition 1:
=========
Hex: 80202100077E25190008000000380600
Active: YES
Type: 07 (NTFS)
Size: 199 MB
 
Partition 2:
=========
Hex: 007E261907FEFFFF0040060000A8EB1A
Active: NO
Type: 07 (NTFS)
Size: 215 GB
 
Partition 3:
=========
Hex: 00FEFFFF07FEFFFF00E8F11A00302702
Active: NO
Type: 07 (NTFS)
Size: 17 GB
 
Partition 4:
=========
Hex: 00FEFFFF0CFEFFFF0018191D70390300
Active: NO
Type: 0C
Size: 103 MB
 
==============================
Partitions of Disk 1:
===============
Disk ID: 69737369
 
Partition 1:
=========
Hex: FF0D0A4469736B206572726F72FF0D0A
Active: NO
Type: 69
Size: 80 GB
 
Partition 2:
=========
Hex: 507265737320616E79206B657920746F
Active: NO
Type: 73
Size: 892 GB
 
Partition 3:
=========
Hex: 20726573746172740D0A000000000000
Active: NO
Type: 74
Size: 0 byte
 
Partition 4:
=========
Hex: 00000000000000000000000000ACBFCC
Active: NO
Type: 00
Size: -440245157888 byte
 
 
Last Boot: 2013-03-15 07:31
 
==================== End Of Log =============================
 
 
 
Farbar Recovery Scan Tool (x64) Version: 13-03-2013
Ran by SYSTEM at 2013-03-15 16:35:33
Running from H:\
 
================== Search: "services.exe" ===================
 
C:\Windows\winsxs\amd64_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.1.7600.16385_none_2b54b20ee6fa07b1\services.exe
[2009-07-13 15:19] - [2009-07-13 17:39] - 0328704 ____A (Microsoft Corporation) 24ACB7E5BE595468E3B9AA488B9B4FCB
 
C:\Windows\system64\services.exe
[2009-07-13 15:19] - [2009-07-13 17:39] - 0328704 ____A (Microsoft Corporation) 24ACB7E5BE595468E3B9AA488B9B4FCB
 
C:\Windows\System32\services.exe
[2009-07-13 15:19] - [2009-07-13 17:39] - 0328704 ____A (Microsoft Corporation) 24ACB7E5BE595468E3B9AA488B9B4FCB
 
====== End Of Search ======


#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:49 PM

Posted 16 March 2013 - 04:01 AM



Hello XXX



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt
 
SubSystems: [Windows] ATTENTION! ====> ZeroAccess 
CMD: Del /q C:\Windows\Tasks\At*.job
C:\Windows\assembly\temp
c:\Windows\System32\consrv.dll 
C:\Windows\assembly\GAC_32\Desktop.ini 
C:\Windows\assembly\GAC_64\Desktop.ini 


NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 Tensokuu

Tensokuu
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:49 PM

Posted 16 March 2013 - 12:20 PM

Greetings, Gringo! Doing as you requested, I've run the file and booted into Normal. It booted in, which is a good thing! Looks like we're getting somewhere!

 

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 13-03-2013
Ran by SYSTEM at 2013-03-16 01:15:53 Run:1
Running from H:\
 
==============================================
 
HKEY_LOCAL_MACHINE\System\ControlSet001\Control\Session Manager\SubSystems\\Windows Value was restored successfully .
 
=========  Del /q C:\Windows\Tasks\At*.job =========
 
 
========= End of CMD: =========
 
C:\Windows\assembly\temp moved successfully.
c:\Windows\System32\consrv.dll  moved successfully.
C:\Windows\assembly\GAC_32\Desktop.ini  moved successfully.
C:\Windows\assembly\GAC_64\Desktop.ini  moved successfully.
 
==== End of Fixlog ====


#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:49 PM

Posted 16 March 2013 - 12:59 PM


Hello Tensokuu


These are the programs I would like you to run next, if you have any problems with these just skip it and move on to the next one.


-AdwCleaner-
  • Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the content of that logfile with your next answer.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.
--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller or from here
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+
  • Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 Tensokuu

Tensokuu
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:49 PM

Posted 16 March 2013 - 01:35 PM

Hello again, Gringo! I'm starting to see a light at the end of the tunnel. Here are the logs:

 

 

# AdwCleaner v2.114 - Logfile created 03/16/2013 at 02:27:13
# Updated 05/03/2013 by Xplode
# Operating system : Windows 7 Home Premium  (64 bits)
# User : Trevor - TREVOR-HP
# Boot Mode : Normal
# Running from : C:\Users\Trevor\Desktop\adwcleaner.exe
# Option [Delete]
 
 
***** [Services] *****
 
 
***** [Files / Folders] *****
 
 
***** [Registry] *****
 
 
***** [Internet Browsers] *****
 
-\\ Internet Explorer v9.0.8112.16421
 
[OK] Registry is clean.
 
-\\ Google Chrome v25.0.1364.172
 
File : C:\Users\Trevor\AppData\Local\Google\Chrome\User Data\Default\Preferences
 
[OK] File is clean.
 
*************************
 
AdwCleaner[S2].txt - [647 octets] - [16/03/2013 02:27:13]
 
########## EOF - C:\AdwCleaner[S2].txt - [706 octets] ##########
 
 
RogueKiller V8.5.3 [Mar 16 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
 
Operating System : Windows 7 (6.1.7600 ) 64 bits version
Started in : Normal mode
User : Trevor [Admin rights]
Mode : Remove -- Date : 03/16/2013 02:33:31
| ARK || FAK || MBR |
 
¤¤¤ Bad processes : 0 ¤¤¤
 
¤¤¤ Registry Entries : 5 ¤¤¤
[TASK][ROGUE ST] 0 : c:\program files (x86)\internet explorer\iexplore.exe  -> DELETED
[TASK][ROGUE ST] 4823 : wscript.exe C:\Users\Trevor\AppData\Local\Temp\launchie.vbs //B -> DELETED
[STARTUP][SUSP PATH] Product Registration.lnk @Trevor : C:\Users\Trevor\AppData\Local\Temp\{C29E703E-B433-43BB-8743-D4C3103F6360}\{99ED6D18-AF6B-4443-31C2-AAC299D5D048}\ATR1.exe [x] -> DELETED
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
 
¤¤¤ Particular Files / Folders: ¤¤¤
 
¤¤¤ Driver : [NOT LOADED] ¤¤¤
 
¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts
 
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 1000gratisproben.com
127.0.0.1 1001namen.com
127.0.0.1 www.1001namen.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100888290cs.com
127.0.0.1 www.100sexlinks.com
127.0.0.1 100sexlinks.com
[...]
 
 
¤¤¤ MBR Check: ¤¤¤
 
+++++ PhysicalDrive0: WDC WD25 00BEVT-60A23T0 SATA Disk Device +++++
--- User ---
[MBR] 16e2d66bec32eb89fe8c129beefc9791
[BSP] a3822365e81e0f01494ed47717fee0b3 : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 199 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 220533 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 452061184 | Size: 17638 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 488183808 | Size: 103 Mo
User = LL1 ... OK!
User = LL2 ... OK!
 
Finished : << RKreport[2]_D_03162013_02d0233.txt >>
RKreport[1]_S_03162013_02d0231.txt ; RKreport[2]_D_03162013_02d0233.txt


#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:49 PM

Posted 16 March 2013 - 01:57 PM


Hello Tensokuu

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

  • Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 Tensokuu

Tensokuu
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:49 PM

Posted 16 March 2013 - 02:27 PM

Hello Gringo!

 

As I haven't any other programs or antivirus, I can't tell if everything's clear yet, but Windows is booting without issues after running every tool you've given me so that's great progress. Here's the log from Combofix!

 

 

 

ComboFix 13-03-16.02 - Trevor 03/16/2013   3:06.1.1 - x64
Microsoft Windows 7 Home Premium   6.1.7600.0.1252.1.1033.18.1787.1003 [GMT -4:00]
Running from: c:\users\Trevor\Desktop\ComboFix.exe
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\program files (x86)\FilmFanaticEI
c:\program files (x86)\FilmFanaticEI\Installr\1.bin\NPpaEISb.dll
c:\program files (x86)\FilmFanaticEI\Installr\1.bin\paEIPlug.dll
c:\programdata\844770q4m270v780q620g8kgq8c1
c:\users\Guest\Desktop\EZ-Tracks.com.lnk
c:\users\Trevor\AppData\Roaming\Microsoft\Windows\Recent\hu12.jpg-o=11.url
c:\windows\wininit.ini
.
.
(((((((((((((((((((((((((   Files Created from 2013-02-16 to 2013-03-16  )))))))))))))))))))))))))))))))
.
.
2013-03-16 07:17 . 2013-03-16 07:17 69000 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{4B10318F-6825-4D7E-9421-F1654387003D}\offreg.dll
2013-03-16 00:32 . 2013-03-16 00:32 -------- d-----w- C:\FRST
2013-03-15 12:37 . 2013-03-15 12:37 -------- d-----w- c:\programdata\Kaspersky Lab
2013-03-15 11:01 . 2013-03-15 11:01 -------- d-----w- c:\users\Trevor\AppData\Roaming\LavasoftStatistics
2013-03-15 10:55 . 2013-03-15 20:41 -------- d-----w- c:\programdata\Downloaded Installations
2013-03-15 10:55 . 2013-03-15 20:41 -------- d-----w- c:\program files (x86)\Toolbar Cleaner
2013-03-15 10:53 . 2013-03-15 10:53 14456 ----a-w- c:\windows\system32\drivers\gfibto.sys
2013-03-15 06:23 . 2013-03-15 11:00 -------- d-----w- c:\users\Trevor\AppData\Roaming\Ad-Aware Antivirus
2013-03-15 06:23 . 2013-03-15 06:23 -------- d-----w- c:\programdata\Ad-Aware Antivirus
2013-03-15 04:46 . 2013-03-15 20:41 -------- d-----w- c:\program files (x86)\Spybot - Search & Destroy
2013-03-15 04:46 . 2013-03-15 11:48 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2013-03-15 04:44 . 2013-03-15 04:44 -------- d-----w- c:\programdata\Lavasoft
2013-03-15 04:44 . 2013-03-15 20:40 -------- d-----w- c:\program files (x86)\Ad-Aware Antivirus
2013-03-15 04:44 . 2013-03-15 04:44 -------- d-----w- c:\users\Trevor\AppData\Local\Programs
2013-03-12 00:13 . 2013-03-15 11:54 -------- d-----w- c:\program files\AVAST Software
2013-03-12 00:12 . 2013-03-15 11:54 -------- d-----w- c:\programdata\AVAST Software
2013-03-09 21:02 . 2013-03-15 20:40 -------- d-----w- c:\users\Trevor\AppData\Local\Microsoft Games
2013-03-08 22:36 . 2013-03-09 09:17 -------- d-----w- c:\program files (x86)\McAfee Online Backup
2013-03-08 22:35 . 2013-03-09 09:17 -------- d-----w- c:\program files\Common Files\McAfee
2013-03-08 22:34 . 2013-03-09 09:17 -------- d-----w- c:\program files\McAfee
2013-03-08 22:34 . 2013-03-09 09:17 -------- d-----w- c:\program files (x86)\McAfee
2013-02-28 04:13 . 2013-02-28 04:13 -------- d-----w- c:\program files (x86)\Common Files\Java
2013-02-28 04:13 . 2013-03-15 20:40 -------- d-----w- c:\program files (x86)\Java
2013-02-27 06:16 . 2013-03-09 09:17 -------- d-----w- c:\programdata\McAfee
2013-02-27 06:16 . 2013-03-15 13:20 -------- d-----w- c:\program files (x86)\McAfee Security Scan
2013-02-15 22:31 . 2013-02-15 22:31 186432 ----a-w- c:\program files (x86)\Internet Explorer\Plugins\nppdf32.dll
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-03-15 17:37 . 2012-12-20 05:29 693976 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2013-03-15 17:37 . 2011-08-14 19:03 73432 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2012-12-31 18:56 . 2012-12-31 18:58 1146984 ----a-w- c:\windows\system32\RTSnMg64.cpl
2012-12-31 18:56 . 2012-12-31 18:58 2048104 ----a-w- c:\windows\system32\RtPgEx64.dll
2012-12-31 18:56 . 2012-12-31 18:58 332392 ----a-w- c:\windows\system32\RtlCPAPI64.dll
2012-12-31 18:56 . 2012-12-31 18:58 2494056 ----a-w- c:\windows\system32\drivers\RTKVHD64.sys
2012-12-31 18:56 . 2012-12-31 18:58 569960 ----a-w- c:\windows\system32\RtkApi64.dll
2012-12-31 18:56 . 2012-12-31 18:58 2625640 ----a-w- c:\windows\system32\RtkAPO64.dll
2012-12-31 18:56 . 2012-12-31 18:58 149608 ----a-w- c:\windows\system32\RtkCfg64.dll
2012-12-31 18:56 . 2012-12-31 18:58 80488 ----a-w- c:\windows\system32\RCoInst64.dll
2012-12-31 18:56 . 2012-12-31 18:58 1215592 ----a-w- c:\windows\system32\RTCOM64.dll
2012-12-31 18:55 . 2012-12-31 18:57 200800 ----a-w- c:\windows\system32\AERTAC64.dll
2012-12-31 18:55 . 2010-11-09 08:49 1251944 ----a-w- c:\windows\RtlExUpd.dll
2012-12-31 18:44 . 2012-12-31 18:44 215336 ----a-w- c:\windows\system32\SynTPAPI.dll
2012-12-31 18:44 . 2012-12-31 18:44 147752 ----a-w- c:\windows\system32\SynTPCo4.dll
2012-12-31 18:44 . 2012-12-31 18:44 1390640 ----a-w- c:\windows\system32\drivers\SynTP.sys
2012-12-31 18:44 . 2012-12-31 18:44 107816 ----a-w- c:\windows\SysWow64\SynTPCOM.dll
2012-12-31 18:44 . 2012-12-31 18:44 400168 ----a-w- c:\windows\system32\SynCOM.dll
2012-12-31 18:44 . 2012-12-31 18:44 271144 ----a-w- c:\windows\system32\SynCtrl.dll
2012-12-31 18:44 . 2012-12-31 18:44 214312 ----a-w- c:\windows\SysWow64\SynCtrl.dll
2012-12-31 18:44 . 2012-12-31 18:44 173352 ----a-w- c:\windows\SysWow64\SynCOM.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-06-17 98304]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-03 946352]
"HP Quick Launch"="c:\program files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe" [2010-11-09 586296]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
desktop(17).ini [2009-7-14 174]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]
"LoadAppInit_DLLs"=1 (0x1)
.
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R2 HP Wireless Assistant Service;HP Wireless Assistant Service;c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWA_Service.exe [2010-06-18 103992]
R2 RtVOsdService;RtVOsdService Installer;c:\program files\Realtek\RtVOsd\RtVOsdService.exe [2010-06-24 315392]
R3 dc3d;MS Hardware Device Detection Driver;c:\windows\system32\DRIVERS\dc3d.sys [2010-07-01 51600]
R3 dump_wmimmc;dump_wmimmc;c:\ijji\ENGLISH\u_sf\GameGuard\dump_wmimmc.sys [x]
R3 ManyCam;ManyCam Virtual Webcam, WDM Video Capture Driver;c:\windows\system32\DRIVERS\ManyCam_x64.sys [2008-03-13 27136]
R3 netw5v64;Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;c:\windows\system32\DRIVERS\netw5v64.sys [2009-06-10 5434368]
R3 npggsvc;nProtect GameGuard Service;c:\windows\system32\GameMon.des [x]
R3 Point64;Microsoft IntelliPoint Filter Driver;c:\windows\system32\DRIVERS\point64.sys [2010-07-21 45456]
R3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\DRIVERS\VSTAZL6.SYS [2009-06-10 292864]
R3 SrvHsfV92;SrvHsfV92;c:\windows\system32\DRIVERS\VSTDPV6.SYS [2009-06-10 1485312]
R3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\DRIVERS\VSTCNXT6.SYS [2009-06-10 740864]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [2011-05-10 51712]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2010-12-26 1255736]
R3 X6va003;X6va003;c:\users\Trevor\AppData\Local\Temp\0036EC9.tmp [x]
R3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x64.sys [2009-06-10 389120]
S0 gfibto;gfibto;c:\windows\system32\drivers\gfibto.sys [2013-03-15 14456]
S2 AERTFilters;Andrea RT Filters Service;c:\program files\Realtek\Audio\HDA\AERTSr64.exe [2009-11-18 98208]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [2010-06-17 202752]
S2 CinemaNow Service;CinemaNow Service;c:\program files (x86)\CinemaNow\CinemaNow Media Manager\CinemanowSvc.exe [2010-05-21 140272]
S2 HPDrvMntSvc.exe;HP Quick Synchronization Service;c:\program files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe [2011-02-04 92216]
S2 HPWMISVC;HPWMISVC;c:\program files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe [2010-11-09 26680]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [2010-03-23 347680]
S3 usbfilter;AMD USB Filter Driver;c:\windows\system32\DRIVERS\usbfilter.sys [2009-12-22 38456]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-03-15 17:58 1629648 ----a-w- c:\program files (x86)\Google\Chrome\Application\25.0.1364.172\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-03-16 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-12-20 17:37]
.
2013-03-16 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-04-13 00:14]
.
2013-03-16 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-04-13 00:14]
.
2013-02-24 c:\windows\Tasks\HPCeeScheduleForTrevor.job
- c:\program files (x86)\Hewlett-Packard\HP Ceement\HPCEE.exe [2010-01-05 10:53]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDVCPL"="c:\program files\Realtek\Audio\HDA\RtkNGUI64.exe" [2012-12-31 6489704]
"HPWirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\DelayedAppStarter.exe" [2010-06-18 8192]
"IntelliPoint"="c:\program files\Microsoft IntelliPoint\ipoint.exe" [2010-07-21 2327952]
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.bing.com/?PC=BNHP
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\SysWOW64\blank.htm
TCP: DhcpNameServer = 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
URLSearchHooks-{9427041a-a8dc-4d06-9a68-93873486e957} - (no file)
URLSearchHooks-{81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - (no file)
URLSearchHooks-{90eee664-34b1-422a-a782-779af65cdf6d} - (no file)
WebBrowser-{060A0A36-13DC-407D-B055-5A9ACCD8E083} - (no file)
WebBrowser-{9427041A-A8DC-4D06-9A68-93873486E957} - (no file)
HKLM-Run-SynTPEnh - c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe
AddRemove-{E92D47A1-D27D-430A-8368-0BAFD956507D} - c:\program files (x86)\InstallShield Installation Information\{E92D47A1-D27D-430A-8368-0BAFD956507D}\setup.exe
.
.
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\services\npggsvc]
"ImagePath"="c:\windows\system32\GameMon.des -service"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\services\X6va003]
"ImagePath"="\??\c:\users\Trevor\AppData\Local\Temp\0036EC9.tmp"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
------------------------ Other Running Processes ------------------------
.
c:\program files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
c:\program files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe
.
**************************************************************************
.
Completion time: 2013-03-16  03:23:48 - machine was rebooted
ComboFix-quarantined-files.txt  2013-03-16 07:23
.
Pre-Run: 165,771,636,736 bytes free
Post-Run: 180,068,823,040 bytes free
.
- - End Of File - - 0925134C2B6E156C4DC9C8B37E91581B


#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:49 PM

Posted 16 March 2013 - 02:40 PM


Hello Tensokuu


What antivirus are you thinking about putting back on.

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:
 ClearJavaCache:: 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 Tensokuu

Tensokuu
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:49 PM

Posted 16 March 2013 - 03:04 PM

Antivirus will be Avast! -- It's my AV of choice and I've had it catch things nothing else has. Things I need to address from this point would be updating Windows to current, and making sure her Flash/etc are all up to date to plug loopholes.

 

System seems to be running without any hiccups. There's still part of me that fears the moment I turn on an AV that it's going to flag something we missed and this'll all start again (but that's just me being paranoid).

 

Log below!

 

ComboFix 13-03-16.02 - Trevor 03/16/2013   3:49.2.1 - x64
Microsoft Windows 7 Home Premium   6.1.7600.0.1252.1.1033.18.1787.962 [GMT -4:00]
Running from: c:\users\Trevor\Desktop\ComboFix.exe
Command switches used :: c:\users\Trevor\Desktop\CFScript.txt
SP: Windows Defender *Enabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2013-02-16 to 2013-03-16  )))))))))))))))))))))))))))))))
.
.
2013-03-16 07:17 . 2013-03-16 07:17 69000 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{4B10318F-6825-4D7E-9421-F1654387003D}\offreg.dll
2013-03-16 00:32 . 2013-03-16 00:32 -------- d-----w- C:\FRST
2013-03-15 12:37 . 2013-03-15 12:37 -------- d-----w- c:\programdata\Kaspersky Lab
2013-03-15 11:01 . 2013-03-15 11:01 -------- d-----w- c:\users\Trevor\AppData\Roaming\LavasoftStatistics
2013-03-15 10:55 . 2013-03-15 20:41 -------- d-----w- c:\programdata\Downloaded Installations
2013-03-15 10:55 . 2013-03-15 20:41 -------- d-----w- c:\program files (x86)\Toolbar Cleaner
2013-03-15 10:53 . 2013-03-15 10:53 14456 ----a-w- c:\windows\system32\drivers\gfibto.sys
2013-03-15 06:23 . 2013-03-15 11:00 -------- d-----w- c:\users\Trevor\AppData\Roaming\Ad-Aware Antivirus
2013-03-15 06:23 . 2013-03-15 06:23 -------- d-----w- c:\programdata\Ad-Aware Antivirus
2013-03-15 04:46 . 2013-03-15 20:41 -------- d-----w- c:\program files (x86)\Spybot - Search & Destroy
2013-03-15 04:46 . 2013-03-15 11:48 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2013-03-15 04:44 . 2013-03-15 04:44 -------- d-----w- c:\programdata\Lavasoft
2013-03-15 04:44 . 2013-03-15 20:40 -------- d-----w- c:\program files (x86)\Ad-Aware Antivirus
2013-03-15 04:44 . 2013-03-15 04:44 -------- d-----w- c:\users\Trevor\AppData\Local\Programs
2013-03-12 00:13 . 2013-03-15 11:54 -------- d-----w- c:\program files\AVAST Software
2013-03-12 00:12 . 2013-03-15 11:54 -------- d-----w- c:\programdata\AVAST Software
2013-03-09 21:02 . 2013-03-15 20:40 -------- d-----w- c:\users\Trevor\AppData\Local\Microsoft Games
2013-03-08 22:36 . 2013-03-09 09:17 -------- d-----w- c:\program files (x86)\McAfee Online Backup
2013-03-08 22:35 . 2013-03-09 09:17 -------- d-----w- c:\program files\Common Files\McAfee
2013-03-08 22:34 . 2013-03-09 09:17 -------- d-----w- c:\program files\McAfee
2013-03-08 22:34 . 2013-03-09 09:17 -------- d-----w- c:\program files (x86)\McAfee
2013-02-28 04:13 . 2013-02-28 04:13 -------- d-----w- c:\program files (x86)\Common Files\Java
2013-02-28 04:13 . 2013-03-15 20:40 -------- d-----w- c:\program files (x86)\Java
2013-02-27 06:16 . 2013-03-09 09:17 -------- d-----w- c:\programdata\McAfee
2013-02-27 06:16 . 2013-03-15 13:20 -------- d-----w- c:\program files (x86)\McAfee Security Scan
2013-02-15 22:31 . 2013-02-15 22:31 186432 ----a-w- c:\program files (x86)\Internet Explorer\Plugins\nppdf32.dll
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-03-15 17:37 . 2012-12-20 05:29 693976 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2013-03-15 17:37 . 2011-08-14 19:03 73432 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2012-12-31 18:56 . 2012-12-31 18:58 1146984 ----a-w- c:\windows\system32\RTSnMg64.cpl
2012-12-31 18:56 . 2012-12-31 18:58 2048104 ----a-w- c:\windows\system32\RtPgEx64.dll
2012-12-31 18:56 . 2012-12-31 18:58 332392 ----a-w- c:\windows\system32\RtlCPAPI64.dll
2012-12-31 18:56 . 2012-12-31 18:58 2494056 ----a-w- c:\windows\system32\drivers\RTKVHD64.sys
2012-12-31 18:56 . 2012-12-31 18:58 569960 ----a-w- c:\windows\system32\RtkApi64.dll
2012-12-31 18:56 . 2012-12-31 18:58 2625640 ----a-w- c:\windows\system32\RtkAPO64.dll
2012-12-31 18:56 . 2012-12-31 18:58 149608 ----a-w- c:\windows\system32\RtkCfg64.dll
2012-12-31 18:56 . 2012-12-31 18:58 80488 ----a-w- c:\windows\system32\RCoInst64.dll
2012-12-31 18:56 . 2012-12-31 18:58 1215592 ----a-w- c:\windows\system32\RTCOM64.dll
2012-12-31 18:55 . 2012-12-31 18:57 200800 ----a-w- c:\windows\system32\AERTAC64.dll
2012-12-31 18:55 . 2010-11-09 08:49 1251944 ----a-w- c:\windows\RtlExUpd.dll
2012-12-31 18:44 . 2012-12-31 18:44 215336 ----a-w- c:\windows\system32\SynTPAPI.dll
2012-12-31 18:44 . 2012-12-31 18:44 147752 ----a-w- c:\windows\system32\SynTPCo4.dll
2012-12-31 18:44 . 2012-12-31 18:44 1390640 ----a-w- c:\windows\system32\drivers\SynTP.sys
2012-12-31 18:44 . 2012-12-31 18:44 107816 ----a-w- c:\windows\SysWow64\SynTPCOM.dll
2012-12-31 18:44 . 2012-12-31 18:44 400168 ----a-w- c:\windows\system32\SynCOM.dll
2012-12-31 18:44 . 2012-12-31 18:44 271144 ----a-w- c:\windows\system32\SynCtrl.dll
2012-12-31 18:44 . 2012-12-31 18:44 214312 ----a-w- c:\windows\SysWow64\SynCtrl.dll
2012-12-31 18:44 . 2012-12-31 18:44 173352 ----a-w- c:\windows\SysWow64\SynCOM.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-06-17 98304]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-03 946352]
"HP Quick Launch"="c:\program files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe" [2010-11-09 586296]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
desktop(17).ini [2009-7-14 174]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]
"LoadAppInit_DLLs"=1 (0x1)
.
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R2 HP Wireless Assistant Service;HP Wireless Assistant Service;c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWA_Service.exe [2010-06-18 103992]
R2 RtVOsdService;RtVOsdService Installer;c:\program files\Realtek\RtVOsd\RtVOsdService.exe [2010-06-24 315392]
R3 dc3d;MS Hardware Device Detection Driver;c:\windows\system32\DRIVERS\dc3d.sys [2010-07-01 51600]
R3 dump_wmimmc;dump_wmimmc;c:\ijji\ENGLISH\u_sf\GameGuard\dump_wmimmc.sys [x]
R3 ManyCam;ManyCam Virtual Webcam, WDM Video Capture Driver;c:\windows\system32\DRIVERS\ManyCam_x64.sys [2008-03-13 27136]
R3 netw5v64;Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;c:\windows\system32\DRIVERS\netw5v64.sys [2009-06-10 5434368]
R3 npggsvc;nProtect GameGuard Service;c:\windows\system32\GameMon.des [x]
R3 Point64;Microsoft IntelliPoint Filter Driver;c:\windows\system32\DRIVERS\point64.sys [2010-07-21 45456]
R3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\DRIVERS\VSTAZL6.SYS [2009-06-10 292864]
R3 SrvHsfV92;SrvHsfV92;c:\windows\system32\DRIVERS\VSTDPV6.SYS [2009-06-10 1485312]
R3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\DRIVERS\VSTCNXT6.SYS [2009-06-10 740864]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [2011-05-10 51712]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2010-12-26 1255736]
R3 X6va003;X6va003;c:\users\Trevor\AppData\Local\Temp\0036EC9.tmp [x]
R3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x64.sys [2009-06-10 389120]
S0 gfibto;gfibto;c:\windows\system32\drivers\gfibto.sys [2013-03-15 14456]
S2 AERTFilters;Andrea RT Filters Service;c:\program files\Realtek\Audio\HDA\AERTSr64.exe [2009-11-18 98208]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [2010-06-17 202752]
S2 CinemaNow Service;CinemaNow Service;c:\program files (x86)\CinemaNow\CinemaNow Media Manager\CinemanowSvc.exe [2010-05-21 140272]
S2 HPDrvMntSvc.exe;HP Quick Synchronization Service;c:\program files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe [2011-02-04 92216]
S2 HPWMISVC;HPWMISVC;c:\program files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe [2010-11-09 26680]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [2010-03-23 347680]
S3 usbfilter;AMD USB Filter Driver;c:\windows\system32\DRIVERS\usbfilter.sys [2009-12-22 38456]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-03-15 17:58 1629648 ----a-w- c:\program files (x86)\Google\Chrome\Application\25.0.1364.172\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-03-16 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-12-20 17:37]
.
2013-03-16 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-04-13 00:14]
.
2013-03-16 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-04-13 00:14]
.
2013-02-24 c:\windows\Tasks\HPCeeScheduleForTrevor.job
- c:\program files (x86)\Hewlett-Packard\HP Ceement\HPCEE.exe [2010-01-05 10:53]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe" [BU]
"RTHDVCPL"="c:\program files\Realtek\Audio\HDA\RtkNGUI64.exe" [2012-12-31 6489704]
"HPWirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\DelayedAppStarter.exe" [2010-06-18 8192]
"IntelliPoint"="c:\program files\Microsoft IntelliPoint\ipoint.exe" [2010-07-21 2327952]
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.bing.com/?PC=BNHP
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\SysWOW64\blank.htm
TCP: DhcpNameServer = 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
WebBrowser-{060A0A36-13DC-407D-B055-5A9ACCD8E083} - (no file)
AddRemove-{E92D47A1-D27D-430A-8368-0BAFD956507D} - c:\program files (x86)\InstallShield Installation Information\{E92D47A1-D27D-430A-8368-0BAFD956507D}\setup.exe
.
.
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\services\npggsvc]
"ImagePath"="c:\windows\system32\GameMon.des -service"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\services\X6va003]
"ImagePath"="\??\c:\users\Trevor\AppData\Local\Temp\0036EC9.tmp"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2013-03-16  04:01:10
ComboFix-quarantined-files.txt  2013-03-16 08:01
ComboFix2.txt  2013-03-16 07:23
.
Pre-Run: 180,196,044,800 bytes free
Post-Run: 179,833,442,304 bytes free
.
- - End Of File - - 7E1F208323E052EE7F4EEC271D1B7858


#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:49 PM

Posted 16 March 2013 - 03:32 PM

now is a great time to install avast and let me know when it is ready



Hello

These logs are looking allot better. now is a great time to install avast and let me know when it is ready.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (Revo does allot better of a job)
  • Programs to remove

    • Adobe Reader X (10.1.6)
      Conduit Engine
      Java™ 6 Update 20 (64-bit)


  • Please download and install Revo Uninstaller Free
  • Double click Revo Uninstaller to run it.
  • From the list of programs double click on The Program to remove
  • When prompted if you want to uninstall click Yes.
  • Be sure the Moderate option is selected then click Next.
  • The program will run, If prompted again click Yes
  • when the built-in uninstaller is finished click on Next.
  • Once the program has searched for leftovers click Next.
  • Check/tick the bolded items only on the list then click Delete
  • when prompted click on Yes and then on next.
  • put a check on any folders that are found and select delete
  • when prompted select yes then on next
  • Once done click Finish.
  • .



    Update Adobe reader
    • Recently there have been vulnerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

      You can download it from http://www.adobe.com/products/acrobat/readstep2.html
      After installing the latest Adobe Reader, uninstall all previous versions.
      If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.
      • If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

        Note: When installing FoxitReader, be careful not to install anything to do with AskBar.

    Clean Out Temp Files
    • This small application you may want to keep and use once a week to keep the computer clean.

      Download CCleaner from here http://www.ccleaner.com/
      • Run the installer to install the application.
      • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
      • Run CCleaner. (make sure under Windows tab all the boxes of Internet Explorer and Windows explorer are checked. Under System check Empty Recycle Bin and Temporary Files. Under Application tab all the boxes should be checked).
      • Click Run Cleaner.
      • Close CCleaner.
: Malwarebytes' Anti-Malware :


I see You have MBAM installed on the computer - that is great!! it is a very good program! I would like you to run a quick scan for me now
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
  • Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
    Click OK to either and let MBAM proceed with the disinfection process.
    If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


    Download HijackThis
    • Go Here to download HijackThis program
    • Save HijackThis to your desktop.
    • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
    • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
    • copy and paste hijackthis report into the topic
    "information and logs"
    • In your next post I need the following
      • Log From MBAM
      • report from Hijackthis
      • let me know of any problems you may have had
      • How is the computer doing now?
    Gringo





I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 Tensokuu

Tensokuu
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:49 PM

Posted 16 March 2013 - 05:15 PM

Hello again, Gringo!

 

Conduit Engine wasn't in the uninstall list so it may have been purged in our previous attempts. Everything else is gone now.

 

Adobe uninstalled / reinstalled with the new updated version. Java was uninstalled. CC Cleaner has been run and cleaned. MBAM came back clean as you'll see below, and here's the log for Hijack This as well.

 

Avast is now installed and protecting the machine too.

 

Again, thank you for EVERYTHING you've done to help me since last night. I consider myself pretty computer savvy and I knew I was in over my head.

 

However, it appears that Avast has found something on its install quick scan that we have not accounted for:

 

= AVAST =

Threat Detected!

C:\FRST\Quarantine\consrv.dll   |  HIGH SEVERITY | Threat: Win64:Sirefef-C [Drp]

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FZG8CKJ5\all[1].htm  | HIGH SEVERITY | Threat: JS:ScriptIP-inf [Trj]

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIXMVQOA\83_133_124_250[1].htm | HIGH SEVERITY | Threat: HTML:Iframe-inf

C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0PS72R2M\justforwomen_mypodstudios_com[1].htm | HIGH SEVERITY | Threat: JS:ScriptIP-inf [Trj]

 

I'm not even sure why the Temporary Internet Files ones are still there because I used CC Cleaner and they should have been removed. The consrv.dll was moved in an earlier step into that quarantine file, yes?

 

 

 

 

Malwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org
 
Database version: v2013.03.16.11
 
Windows 7 x64 NTFS
Internet Explorer 9.0.8112.16421
Trevor :: TREVOR-HP [administrator]
 
3/16/2013 5:21:47 AM
mbam-log-2013-03-16 (05-21-47).txt
 
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 562734
Time elapsed: 3 minute(s), 21 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
(end)
 
 
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 5:26:09 AM, on 3/16/2013
Platform: Windows 7  (WinNT 6.00.3504)
MSIE: Internet Explorer v9.00 (9.00.8112.16421)
Boot mode: Normal
 
Running processes:
C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe
C:\Users\Trevor\Desktop\HijackThis.exe
 
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.bing.com/?PC=BNHP
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://g.msn.com/CQNOT/1
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=56626&homepage=http://g.msn.com/CQNOT/1
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = 
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = 
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = 
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll (file missing)
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [HP Quick Launch] C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\RunOnce: [Malwarebytes Anti-Malware] C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
O4 - Global Startup: desktop(17).ini
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O16 - DPF: {99CAAA27-FA0C-4FA4-B88A-4AB1CC7A17FE} (MGLaunch_v1004 Class) - http://www.netgame.com/mplugin/mglaunch_USAv1005.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: Andrea RT Filters Service (AERTFilters) - Andrea Electronics Corporation - C:\Program Files\Realtek\Audio\HDA\AERTSr64.exe
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
O23 - Service: AMD External Events Utility - Unknown owner - C:\Windows\system32\atiesrxx.exe (file missing)
O23 - Service: CinemaNow Service - CinemaNow, Inc. - C:\Program Files (x86)\CinemaNow\CinemaNow Media Manager\CinemanowSvc.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing)
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files (x86)\HP Games\HP Game Console\GameConsoleService.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: HP Health Check Service - Hewlett-Packard Company - C:\Program Files (x86)\Hewlett-Packard\HP Health Check\hphc_service.exe
O23 - Service: HP Wireless Assistant Service - Hewlett-Packard Company - C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWA_Service.exe
O23 - Service: HP Quick Synchronization Service (HPDrvMntSvc.exe) - Hewlett-Packard Company - C:\Program Files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe
O23 - Service: HP Software Framework Service (hpqwmiex) - Hewlett-Packard Company - C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe
O23 - Service: HPWMISVC - Hewlett-Packard Development Company, L.P. - C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\Windows\system32\GameMon.des.exe (file missing)
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: RtVOsdService Installer (RtVOsdService) - Realtek Semiconductor Corp. - C:\Program Files\Realtek\RtVOsd\RtVOsdService.exe
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\Wat\WatUX.exe,-601 (WatAdminSvc) - Unknown owner - C:\Windows\system32\Wat\WatAdminSvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
 
--
End of file - 7001 bytes
 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users