Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Department of Justice virus (MoneyPak Scam)


  • This topic is locked This topic is locked
20 replies to this topic

#1 dalley

dalley

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:09:54 AM

Posted 18 March 2013 - 01:05 AM

I seem to have been infected with this Malware. So far I have tried booting in safe mode with networking and command prompt and neither has worked. I keep getting the lockout screen after I log into Windows. Any help would be appreciated as I really cannot do anything with my Desktop PC. I am running Windows 7 and use the MS Security Essentials in addition to the MalwareBytes Anti Malware program.

 

Thanks in advance!



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:54 PM

Posted 18 March 2013 - 01:40 AM


Hello dalley

Welcome to The Forums!!

Around here they call me Gringo and I'll be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
  • To enter System Recovery Options by using Windows installation disc:
    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.
    On the System Recovery Options menu you will get the following options:

      • Startup Repair
        System Restore
        Windows Complete PC Restore
        Windows Memory Diagnostic Tool
        Command Prompt
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst64.exe or e:\frst.exe and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • First Press the Scan button.
    • It will make a log (FRST.txt)
    • Second Type the following in the edit box after "Search:". services.exe
    • Click the Search button
    • It will make a log (Search.txt)
    I want you to poste Both the FRST.txt report and the Search.txt into your reply to me

    Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 dalley

dalley
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:09:54 AM

Posted 18 March 2013 - 02:14 AM

FRST:

 

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 13-03-2013
Ran by SYSTEM at 17-03-2013 23:59:37
Running from G:\
Windows 7 Professional   (X86) OS Language: English(US)
The current controlset is ControlSet001

==================== Registry (Whitelisted) ===================

HKLM\...\Run: [AMD AVT] Cmd.exe /c start "AMD Accelerated Video Transcoding device initialization" /min "C:\Program Files\AMD AVT\bin\kdbsync.exe" aml [10752 2012-02-20] ()
HKLM\...\Run: [MSC] "c:\Program Files\Microsoft Security Client\msseces.exe" -hide -runkey [947152 2013-01-27] (Microsoft Corporation)
HKLM\...\Run: [LogMeIn GUI] "C:\Program Files\LogMeIn\x86\LogMeInSystray.exe" [x]
HKLM\...\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [946352 2012-12-02] (Adobe Systems Incorporated)
HKLM\...\Run: [MigAutoPlay] "C:\ProgramData\MigAutoPlay.exe" [56600 2013-03-16] ()
HKLM\...\Winlogon: [Shell] C:\ProgramData\MigAutoPlay.exe [x ] ()
Tcpip\Parameters: [DhcpNameServer] 192.168.0.1 205.171.2.25

==================== Services (Whitelisted) ===================

3 Macromedia Licensing Service; "C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe" [68096 2011-01-25] ()
2 MsMpSvc; "c:\Program Files\Microsoft Security Client\MsMpEng.exe" [x]
3 NisSrv; "c:\Program Files\Microsoft Security Client\NisSrv.exe" [x]

==================== Drivers (Whitelisted) ====================

3 hypkern; C:\Windows\System32\drivers\hypkern.sys [164864 2010-11-30] ()
0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [195296 2013-01-20] (Microsoft Corporation)
3 MTsensor; C:\Windows\System32\DRIVERS\ASACPI.sys [5810 2004-08-13] ()
3 NuidFltr; C:\Windows\System32\DRIVERS\NuidFltr.sys [21520 2010-06-29] (Microsoft Corporation)
2 LMIInfo; \??\C:\Program Files\LogMeIn\x86\RaInfo.sys [x]
4 LMIRfsClientNP;  [x]

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2013-03-17 23:59 - 2013-03-17 23:59 - 00000000 ____D C:\FRST
2013-03-16 13:36 - 2013-03-16 13:36 - 936809874 ____A C:\Windows\MEMORY.DMP
2013-03-16 13:18 - 2013-03-16 13:18 - 02250054 ____A C:\ProgramData\1.bmp
2013-03-16 13:10 - 2013-03-16 13:10 - 00023779 ____A C:\Users\Edward\Desktop\hs_err_pid3656.log
2013-03-16 13:09 - 2013-03-16 13:09 - 00023842 ____A C:\Users\Edward\Desktop\hs_err_pid6112.log
2013-03-16 13:08 - 2013-03-16 13:08 - 00056600 ____A C:\ProgramData\MigAutoPlay.exe
2013-03-13 02:00 - 2013-02-01 20:09 - 12321792 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.dll
2013-03-13 02:00 - 2013-02-01 19:42 - 09738240 ____A (Microsoft Corporation) C:\Windows\System32\ieframe.dll
2013-03-13 02:00 - 2013-02-01 19:38 - 01800704 ____A (Microsoft Corporation) C:\Windows\System32\jscript9.dll
2013-03-13 02:00 - 2013-02-01 19:31 - 01103872 ____A (Microsoft Corporation) C:\Windows\System32\urlmon.dll
2013-03-13 02:00 - 2013-02-01 19:30 - 01427968 ____A (Microsoft Corporation) C:\Windows\System32\inetcpl.cpl
2013-03-13 02:00 - 2013-02-01 19:30 - 01129472 ____A (Microsoft Corporation) C:\Windows\System32\wininet.dll
2013-03-13 02:00 - 2013-02-01 19:29 - 00231936 ____A (Microsoft Corporation) C:\Windows\System32\url.dll
2013-03-13 02:00 - 2013-02-01 19:27 - 00065024 ____A (Microsoft Corporation) C:\Windows\System32\jsproxy.dll
2013-03-13 02:00 - 2013-02-01 19:26 - 00717824 ____A (Microsoft Corporation) C:\Windows\System32\jscript.dll
2013-03-13 02:00 - 2013-02-01 19:26 - 00420864 ____A (Microsoft Corporation) C:\Windows\System32\vbscript.dll
2013-03-13 02:00 - 2013-02-01 19:26 - 00142848 ____A (Microsoft Corporation) C:\Windows\System32\ieUnatt.exe
2013-03-13 02:00 - 2013-02-01 19:25 - 00607744 ____A (Microsoft Corporation) C:\Windows\System32\msfeeds.dll
2013-03-13 02:00 - 2013-02-01 19:23 - 02382848 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.tlb
2013-03-13 02:00 - 2013-02-01 19:23 - 01796096 ____A (Microsoft Corporation) C:\Windows\System32\iertutil.dll
2013-03-13 02:00 - 2013-02-01 19:23 - 00073216 ____A (Microsoft Corporation) C:\Windows\System32\mshtmled.dll
2013-03-13 02:00 - 2013-02-01 19:20 - 00176640 ____A (Microsoft Corporation) C:\Windows\System32\ieui.dll
2013-03-07 14:32 - 2013-03-07 14:32 - 07409595 ____A C:\Users\Edward\Desktop\soundfontsbstereopiano_m.zip
2013-03-07 14:31 - 2013-03-07 14:31 - 04351489 ____A C:\Users\Edward\Desktop\soundfontsbstereopiano_pc.zip
2013-03-07 14:31 - 2013-03-07 14:31 - 00000136 ____A C:\Windows\GLFDF02.tmp
2013-03-07 13:42 - 2013-03-07 13:42 - 00537174 ____A C:\Users\Edward\Desktop\Image1.bmp
2013-03-07 13:40 - 2013-03-07 13:40 - 00000136 ____A C:\Windows\GLF5F2.tmp
2013-03-06 03:22 - 2013-03-06 03:26 - 02409519 ____A C:\Users\Edward\spd5.pspimage
2013-03-06 03:14 - 2013-03-06 03:20 - 01241898 ____A C:\Users\Edward\spd4.pspimage
2013-03-06 03:04 - 2013-03-06 03:08 - 00904330 ____A C:\Users\Edward\spd3.pspimage
2013-03-06 02:58 - 2013-03-06 02:58 - 00755934 ____A C:\Users\Edward\spd2.pspimage
2013-03-06 02:51 - 2013-03-06 02:51 - 00716867 ____A C:\Users\Edward\spd1.pspimage
2013-03-06 02:43 - 2013-03-07 13:44 - 00215040 __ASH C:\Users\Edward\Desktop\Thumbs.db
2013-03-06 02:43 - 2013-03-06 02:43 - 00045389 ____A C:\Users\Edward\Documents\pspbrwse.jbf
2013-03-06 02:40 - 2013-03-06 02:40 - 00186485 ____A C:\Users\Edward\jeanne.pspimage
2013-03-05 02:47 - 2013-03-05 02:47 - 00000136 ____A C:\Windows\GLF42A1.tmp
2013-03-02 15:30 - 2013-03-02 15:30 - 00000136 ____A C:\Windows\GLFBA5C.tmp
2013-03-02 15:14 - 2013-03-02 15:14 - 00000136 ____A C:\Windows\GLF27DD.tmp
2013-02-26 03:08 - 2013-02-26 03:08 - 00000136 ____A C:\Windows\GLF409.tmp
2013-02-22 15:44 - 2013-02-22 15:44 - 00000000 ____D C:\Audio
2013-02-22 15:42 - 2013-02-22 15:42 - 00000136 ____A C:\Windows\GLF852C.tmp
2013-02-22 15:41 - 2013-02-22 15:41 - 00000136 ____A C:\Windows\GLF849F.tmp
2013-02-22 15:40 - 2013-03-17 21:29 - 00000280 ____A C:\Windows\setupact.log
2013-02-22 15:40 - 2013-02-22 15:40 - 00000000 ____A C:\Windows\setuperr.log
2013-02-22 15:39 - 2013-02-22 15:39 - 00000009 ____A C:\Users\Edward\Desktop\425319851.txt
2013-02-22 15:37 - 2013-02-22 15:37 - 00000136 ____A C:\Windows\GLF3520.tmp
2013-02-22 15:35 - 2013-02-22 15:35 - 00000136 ____A C:\Windows\GLF46BC.tmp
2013-02-22 15:34 - 2013-02-22 15:34 - 00000136 ____A C:\Windows\GLFB1AE.tmp
2013-02-22 15:34 - 2004-03-09 00:00 - 00132880 ____A (Microsoft Corporation) C:\Windows\System32\MSINET.OCX
2013-02-22 15:33 - 2013-02-22 15:33 - 00000162 ____A C:\Windows\liveup.ini
2013-02-22 15:33 - 2013-02-22 15:33 - 00000000 ____D C:\Program Files\LiveUpdate
2013-02-22 15:33 - 2002-03-14 05:57 - 00245760 ___RA C:\Windows\System32\LSMgr.dll

==================== One Month Modified Files and Folders ========

2013-03-17 21:29 - 2013-02-22 15:40 - 00000280 ____A C:\Windows\setupact.log
2013-03-17 21:29 - 2009-07-13 20:53 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-03-17 05:07 - 2011-01-24 04:50 - 01531410 ____A C:\Windows\WindowsUpdate.log
2013-03-16 13:37 - 2012-08-21 01:42 - 00000000 ____D C:\Windows\Minidump
2013-03-16 13:36 - 2013-03-16 13:36 - 936809874 ____A C:\Windows\MEMORY.DMP
2013-03-16 13:18 - 2013-03-16 13:18 - 02250054 ____A C:\ProgramData\1.bmp
2013-03-16 13:10 - 2013-03-16 13:10 - 00023779 ____A C:\Users\Edward\Desktop\hs_err_pid3656.log
2013-03-16 13:10 - 2012-04-25 02:04 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-03-16 13:09 - 2013-03-16 13:09 - 00023842 ____A C:\Users\Edward\Desktop\hs_err_pid6112.log
2013-03-16 13:08 - 2013-03-16 13:08 - 00056600 ____A C:\ProgramData\MigAutoPlay.exe
2013-03-16 01:01 - 2011-01-26 03:35 - 00000000 ____D C:\Users\Edward\Documents\Outlook
2013-03-14 03:57 - 2011-04-15 02:16 - 00000000 ____D C:\Users\Edward\AppData\Roaming\RomeCasino
2013-03-13 04:10 - 2012-04-25 02:04 - 00693976 ____A (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerApp.exe
2013-03-13 04:10 - 2012-01-05 01:36 - 00073432 ____A (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerCPLApp.cpl
2013-03-13 02:27 - 2009-07-13 20:34 - 00015040 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-03-13 02:27 - 2009-07-13 20:34 - 00015040 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-03-13 02:19 - 2012-08-25 14:35 - 00016020 ____A C:\Windows\PFRO.log
2013-03-13 02:19 - 2011-01-27 00:49 - 00000000 ____D C:\Program Files\Microsoft Silverlight
2013-03-13 02:01 - 2011-01-25 01:25 - 00000000 ____D C:\ProgramData\Microsoft Help
2013-03-13 02:01 - 2011-01-24 11:03 - 69796088 ____A (Microsoft Corporation) C:\Windows\System32\MRT.exe
2013-03-07 14:32 - 2013-03-07 14:32 - 07409595 ____A C:\Users\Edward\Desktop\soundfontsbstereopiano_m.zip
2013-03-07 14:31 - 2013-03-07 14:31 - 04351489 ____A C:\Users\Edward\Desktop\soundfontsbstereopiano_pc.zip
2013-03-07 14:31 - 2013-03-07 14:31 - 00000136 ____A C:\Windows\GLFDF02.tmp
2013-03-07 14:31 - 2007-08-07 17:59 - 04357903 ____A C:\Users\Edward\Desktop\SoundfontSBStereoPiano.exe
2013-03-07 13:44 - 2013-03-06 02:43 - 00215040 __ASH C:\Users\Edward\Desktop\Thumbs.db
2013-03-07 13:42 - 2013-03-07 13:42 - 00537174 ____A C:\Users\Edward\Desktop\Image1.bmp
2013-03-07 13:41 - 2011-01-25 01:55 - 00000000 ____D C:\Users\Edward\Documents\My PSP Files
2013-03-07 13:40 - 2013-03-07 13:40 - 00000136 ____A C:\Windows\GLF5F2.tmp
2013-03-07 13:20 - 2011-01-24 03:55 - 00000000 ____D C:\users\Edward
2013-03-06 03:27 - 2012-09-17 03:09 - 00180770 ____A C:\Users\Edward\Desktop\pspbrwse.jbf
2013-03-06 03:26 - 2013-03-06 03:22 - 02409519 ____A C:\Users\Edward\spd5.pspimage
2013-03-06 03:20 - 2013-03-06 03:14 - 01241898 ____A C:\Users\Edward\spd4.pspimage
2013-03-06 03:08 - 2013-03-06 03:04 - 00904330 ____A C:\Users\Edward\spd3.pspimage
2013-03-06 02:58 - 2013-03-06 02:58 - 00755934 ____A C:\Users\Edward\spd2.pspimage
2013-03-06 02:51 - 2013-03-06 02:51 - 00716867 ____A C:\Users\Edward\spd1.pspimage
2013-03-06 02:43 - 2013-03-06 02:43 - 00045389 ____A C:\Users\Edward\Documents\pspbrwse.jbf
2013-03-06 02:40 - 2013-03-06 02:40 - 00186485 ____A C:\Users\Edward\jeanne.pspimage
2013-03-05 02:47 - 2013-03-05 02:47 - 00000136 ____A C:\Windows\GLF42A1.tmp
2013-03-05 02:01 - 2011-01-29 15:24 - 00001945 ____A C:\Windows\epplauncher.mif
2013-03-05 02:00 - 2012-08-24 14:56 - 00000000 ____D C:\Program Files\Microsoft Security Client
2013-03-02 15:30 - 2013-03-02 15:30 - 00000136 ____A C:\Windows\GLFBA5C.tmp
2013-03-02 15:14 - 2013-03-02 15:14 - 00000136 ____A C:\Windows\GLF27DD.tmp
2013-02-26 03:08 - 2013-02-26 03:08 - 00000136 ____A C:\Windows\GLF409.tmp
2013-02-22 15:45 - 2012-11-17 00:08 - 00000016 ____A C:\Windows\System32\msvcsv60.dll
2013-02-22 15:45 - 2011-02-02 02:56 - 00000016 ____A C:\Windows\System32\w3data.vss
2013-02-22 15:45 - 2011-02-02 02:56 - 00000016 ____A C:\Windows\msocreg32.dat
2013-02-22 15:44 - 2013-02-22 15:44 - 00000000 ____D C:\Audio
2013-02-22 15:42 - 2013-02-22 15:42 - 00000136 ____A C:\Windows\GLF852C.tmp
2013-02-22 15:41 - 2013-02-22 15:41 - 00000136 ____A C:\Windows\GLF849F.tmp
2013-02-22 15:40 - 2013-02-22 15:40 - 00000000 ____A C:\Windows\setuperr.log
2013-02-22 15:39 - 2013-02-22 15:39 - 00000009 ____A C:\Users\Edward\Desktop\425319851.txt
2013-02-22 15:37 - 2013-02-22 15:37 - 00000136 ____A C:\Windows\GLF3520.tmp
2013-02-22 15:35 - 2013-02-22 15:35 - 00000136 ____A C:\Windows\GLF46BC.tmp
2013-02-22 15:34 - 2013-02-22 15:34 - 00000136 ____A C:\Windows\GLFB1AE.tmp
2013-02-22 15:33 - 2013-02-22 15:33 - 00000162 ____A C:\Windows\liveup.ini
2013-02-22 15:33 - 2013-02-22 15:33 - 00000000 ____D C:\Program Files\LiveUpdate
2013-02-22 15:33 - 2011-01-25 01:27 - 00000000 ___HD C:\Program Files\InstallShield Installation Information
2013-02-21 21:23 - 2011-01-26 03:28 - 00000000 ____D C:\Users\Edward\Documents\Excel
2013-02-21 20:22 - 2011-01-25 01:35 - 00000000 ____D C:\Users\Edward\AppData\Roaming\Echo PCI Console
2013-02-20 15:06 - 2012-08-19 12:42 - 00000000 ____D C:\Program Files\Malwarebytes' Anti-Malware
2013-02-20 15:04 - 2012-08-19 12:42 - 00001074 ____A C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2013-02-20 15:03 - 2011-01-26 03:29 - 00000000 ____D C:\Users\Edward\Documents\My eBooks


==================== Known DLLs (Whitelisted) =================


==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => MD5 is legit
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points  =========================

Restore point made on: 2013-02-03 05:02:31
Restore point made on: 2013-02-06 17:23:34
Restore point made on: 2013-02-10 23:09:01
Restore point made on: 2013-02-13 02:00:22
Restore point made on: 2013-02-16 02:33:50
Restore point made on: 2013-02-20 02:34:28
Restore point made on: 2013-02-23 15:51:41
Restore point made on: 2013-02-27 15:51:07
Restore point made on: 2013-03-03 05:21:32
Restore point made on: 2013-03-05 02:00:16
Restore point made on: 2013-03-08 02:11:29
Restore point made on: 2013-03-12 02:11:54
Restore point made on: 2013-03-13 02:00:17
Restore point made on: 2013-03-16 02:30:17

==================== Memory info ===========================

Percentage of memory in use: 12%
Total physical RAM: 4095.12 MB
Available physical RAM: 3577.79 MB
Total Pagefile: 4093.39 MB
Available Pagefile: 3579.61 MB
Total Virtual: 2047.88 MB
Available Virtual: 1950.3 MB

==================== Partitions =============================

2 Drive c: (Dalley1) (Fixed) (Total:279.36 GB) (Free:164.46 GB) NTFS
3 Drive d: (Dalley2) (Fixed) (Total:74.53 GB) (Free:35.38 GB) NTFS
5 Drive g: () (Removable) (Total:7.47 GB) (Free:7.47 GB) FAT32
6 Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
7 Drive y: (System Reserved) (Fixed) (Total:0.1 GB) (Free:0.07 GB) NTFS ==>[System with boot components (obtained from reading drive)]

  Disk ###  Status         Size     Free     Dyn  Gpt
  --------  -------------  -------  -------  ---  ---
  Disk 0    Online          279 GB      0 B        
  Disk 1    Online           74 GB  1024 KB        
  Disk 2    Online         7657 MB      0 B        

Partitions of Disk 0:
===============

Disk ID: 1C7F239E

  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    Primary            100 MB  1024 KB
  Partition 2    Primary            279 GB   101 MB

=========================================================

Disk: 0
Partition 1
Type  : 07
Hidden: No
Active: Yes

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 1     Y   System Rese  NTFS   Partition    100 MB  Healthy           

=========================================================

Disk: 0
Partition 2
Type  : 07
Hidden: No
Active: No

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 2     C   Dalley1      NTFS   Partition    279 GB  Healthy           

=========================================================

Partitions of Disk 1:
===============

Disk ID: FDE0FDE0

  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    Primary             74 GB    31 KB

=========================================================

Disk: 1
Partition 1
Type  : 07
Hidden: No
Active: Yes

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 3     D   Dalley2      NTFS   Partition     74 GB  Healthy           

=========================================================

Partitions of Disk 2:
===============

Disk ID: E1FBE1FB

  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    Primary           7655 MB    22 KB

=========================================================

Disk: 2
Partition 1
Type  : 0B
Hidden: No
Active: No

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 4     G                FAT32  Removable   7655 MB  Healthy           

=========================================================
============================== MBR Partition Table ==================

==============================
Partitions of Disk 0:
===============
Disk ID: 1C7F239E

Partition 1:
=========
Hex: 8020210007DF130C0008000000200300
Active: YES
Type: 07 (NTFS)
Size: 100 MB

Partition 2:
=========
Hex: 00DF140C07FEFFFF002803000090EB22
Active: NO
Type: 07 (NTFS)
Size: 279 GB

==============================
Partitions of Disk 1:
===============
Disk ID: FDE0FDE0

Partition 1:
=========
Hex: 8001010007FEFFFF3F00000082E45009
Active: YES
Type: 07 (NTFS)
Size: 75 GB

==============================
Partitions of Disk 2:
===============
Disk ID: E1FBE1FB

Partition 1:
=========
Hex: 00002D000BFEFFCF2C000000A43FEF00
Active: NO
Type: 0B
Size: 7 GB


Last Boot: 2013-03-14 23:21

==================== End Of Log ============================

 

SEARCH:

 

Farbar Recovery Scan Tool (x86) Version: 13-03-2013
Ran by SYSTEM at 2013-03-18 00:11:19
Running from G:\

================== Search: "services.exe" ===================

C:\Windows\winsxs\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.1.7600.16385_none_cf36168b2e9c967b\services.exe
[2009-07-13 15:11] - [2009-07-13 17:14] - 0259072 ____A (Microsoft Corporation) 5F1B6A9C35D3D5CA72D6D6FDEF9747D6

C:\Windows\System32\services.exe
[2009-07-13 15:11] - [2009-07-13 17:14] - 0259072 ____A (Microsoft Corporation) 5F1B6A9C35D3D5CA72D6D6FDEF9747D6

C:\Windows\erdnt\cache\services.exe
[2012-08-23 18:29] - [2009-07-13 17:14] - 0259072 ____A (Microsoft Corporation) 5F1B6A9C35D3D5CA72D6D6FDEF9747D6

=== End Of Search ===



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:54 PM

Posted 18 March 2013 - 02:40 AM



Hello dalley



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt
 
HKLM\...\Run: [MigAutoPlay] "C:\ProgramData\MigAutoPlay.exe" [56600 2013-03-16] ()
HKLM\...\Winlogon: [Shell] C:\ProgramData\MigAutoPlay.exe [x ] ()
C:\ProgramData\1.bmp
C:\Users\Edward\Desktop\hs_err_pid3656.log
C:\Users\Edward\Desktop\hs_err_pid6112.log
C:\ProgramData\MigAutoPlay.exe
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 dalley

dalley
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:09:54 AM

Posted 18 March 2013 - 02:52 AM

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 13-03-2013
Ran by SYSTEM at 2013-03-18 00:45:49 Run:1
Running from G:\

==============================================

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\MigAutoPlay Value deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell Value was restored successfully .
C:\ProgramData\1.bmp moved successfully.
C:\Users\Edward\Desktop\hs_err_pid3656.log moved successfully.
C:\Users\Edward\Desktop\hs_err_pid6112.log moved successfully.
C:\ProgramData\MigAutoPlay.exe moved successfully.

==== End of Fixlog ====

 

 

I just booted Windows normally ... all looks good so far



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:54 PM

Posted 18 March 2013 - 03:30 AM


Hello dalley


These are the programs I would like you to run next, if you have any problems with these just skip it and move on to the next one.


-AdwCleaner-
  • Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the content of that logfile with your next answer.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.
--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller or from here
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 dalley

dalley
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:09:54 AM

Posted 18 March 2013 - 03:44 AM

# AdwCleaner v2.115 - Logfile created 03/18/2013 at 01:35:45
# Updated 17/03/2013 by Xplode
# Operating system : Windows 7 Professional Service Pack 1 (32 bits)
# User : Edward - EDWARD-PC
# Boot Mode : Normal
# Running from : C:\Users\Edward\Desktop\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****

File Deleted : C:\user.js
Folder Deleted : C:\Program Files\Conduit
Folder Deleted : C:\ProgramData\Babylon
Folder Deleted : C:\ProgramData\Tarma Installer
Folder Deleted : C:\ProgramData\Trymedia
Folder Deleted : C:\Users\Edward\AppData\Local\Babylon
Folder Deleted : C:\Users\Edward\AppData\Local\Conduit
Folder Deleted : C:\Users\Edward\AppData\LocalLow\BabylonToolbar
Folder Deleted : C:\Users\Edward\AppData\LocalLow\Conduit
Folder Deleted : C:\Users\Edward\AppData\LocalLow\PriceGong
Folder Deleted : C:\Users\Edward\AppData\Roaming\Babylon

***** [Registry] *****

Key Deleted : HKCU\Software\AppDataLow\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\PriceGong
Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar
Key Deleted : HKCU\Software\Ask&Record
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\IGearSettings
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}
Key Deleted : HKLM\Software\Babylon
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\escort.DLL
Key Deleted : HKLM\SOFTWARE\Classes\bbylntlbr.bbylntlbrHlpr
Key Deleted : HKLM\SOFTWARE\Classes\bbylntlbr.bbylntlbrHlpr.1
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{80922EE0-8A76-46AE-95D5-BD3C3FE0708D}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E46C8196-B634-44A1-AF6E-957C64278AB1}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT1060933
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
Key Deleted : HKLM\Software\Conduit
Key Deleted : HKLM\Software\Freeze.com
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\ConduitInstaller_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\ConduitInstaller_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16470

[OK] Registry is clean.

*************************

AdwCleaner[S1].txt - [3796 octets] - [18/03/2013 01:35:45]

########## EOF - C:\AdwCleaner[S1].txt - [3856 octets] ##########

 

RogueKiller V8.5.3 [Mar 16 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
Started in : Normal mode
User : Edward [Admin rights]
Mode : Remove -- Date : 03/18/2013 01:40:46
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 11 ¤¤¤
[TASK][ROGUE ST] 0 : c:\program files\internet explorer\iexplore.exe  -> DELETED
[TASK][ROGUE ST] 4780 : wscript.exe C:\Users\Edward\AppData\Local\Temp\launchie.vbs //B -> DELETED
[TASK][SUSP PATH] RunAsStdUser Task : "C:\Users\Edward\AppData\Local\hippogeekSA\bin\1.0.4.0\HippoGeekSA.exe"  [x] -> DELETED
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> REPLACED (2)
[HJ] HKLM\[...]\System : EnableLUA (0) -> REPLACED (1)
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> REPLACED (1)
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[SAFEBOOT] HKLM\[...]\ControlSet001\SafeBoot : AlternateShell (C:\ProgramData\MigAutoPlay.exe) -> REPLACED (cmd.exe)
[SAFEBOOT] HKLM\[...]\ControlSet002\SafeBoot : AlternateShell (C:\ProgramData\MigAutoPlay.exe) -> REPLACED (cmd.exe)

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1       localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: ST3300620AS ATA Device +++++
--- User ---
[MBR] c876f3da4d9a240da46189fa17b674f9
[BSP] 9d499497fa735aab3bb6b5b887d1d757 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 286066 Mo
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: WDC WD800JD-00HKA0 ATA Device +++++
--- User ---
[MBR] cf4e90096ec880bb012de16c73cc960d
[BSP] bb57ddfe3d4caebe72cfc7b865920d7f : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 76316 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[2]_D_03182013_02d0140.txt >>
RKreport[1]_S_03182013_02d0140.txt ; RKreport[2]_D_03182013_02d0140.txt



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:54 PM

Posted 18 March 2013 - 04:05 PM


Hello dalley

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

  • Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 dalley

dalley
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:09:54 AM

Posted 19 March 2013 - 05:43 AM

computer seems to be running ok ... here is the combofix log

 

ComboFix 13-03-19.01 - Edward 03/19/2013   3:35.3.4 - x86
Microsoft Windows 7 Professional   6.1.7601.1.1252.1.1033.18.3071.2108 [GMT -7:00]
Running from: c:\users\Edward\Downloads\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {3F839487-C7A2-C958-E30C-E2825BA31FB5}
SP: Microsoft Security Essentials *Disabled/Updated* {84E27563-E198-C6D6-D9BC-D9F020245508}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\msvcsv60.dll
.
.
(((((((((((((((((((((((((   Files Created from 2013-02-19 to 2013-03-19  )))))))))))))))))))))))))))))))
.
.
2013-03-19 08:48 . 2013-02-08 00:45 6954968 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{8C23076D-A0F2-49BA-81E0-BE47EB20540B}\mpengine.dll
2013-03-18 07:59 . 2013-03-18 07:59 -------- d-----w- C:\FRST
2013-03-18 07:55 . 2013-02-08 00:45 6954968 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2013-03-12 10:12 . 2012-11-28 10:35 740840 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{3D00AD54-C01D-4F19-8C5F-258A5AEB4D04}\gapaengine.dll
2013-03-07 22:31 . 2013-03-07 22:31 136 ----a-w- c:\windows\GLFDF02.tmp
2013-03-07 21:40 . 2013-03-07 21:40 136 ----a-w- c:\windows\GLF5F2.tmp
2013-03-05 10:47 . 2013-03-05 10:47 136 ----a-w- c:\windows\GLF42A1.tmp
2013-03-02 23:30 . 2013-03-02 23:30 136 ----a-w- c:\windows\GLFBA5C.tmp
2013-03-02 23:14 . 2013-03-02 23:14 136 ----a-w- c:\windows\GLF27DD.tmp
2013-02-26 11:08 . 2013-02-26 11:08 136 ----a-w- c:\windows\GLF409.tmp
2013-02-22 23:44 . 2013-02-22 23:44 -------- d-----w- C:\Audio
2013-02-22 23:42 . 2013-02-22 23:42 136 ----a-w- c:\windows\GLF852C.tmp
2013-02-22 23:41 . 2013-02-22 23:41 136 ----a-w- c:\windows\GLF849F.tmp
2013-02-22 23:37 . 2013-02-22 23:37 136 ----a-w- c:\windows\GLF3520.tmp
2013-02-22 23:35 . 2013-02-22 23:35 136 ----a-w- c:\windows\GLF46BC.tmp
2013-02-22 23:34 . 2013-02-22 23:34 136 ----a-w- c:\windows\GLFB1AE.tmp
2013-02-22 23:34 . 2004-03-09 08:00 132880 ----a-w- c:\windows\system32\MSINET.OCX
2013-02-22 23:33 . 2013-02-22 23:33 -------- d-----w- c:\program files\LiveUpdate
2013-02-22 23:33 . 2002-03-14 13:57 245760 ----a-r- c:\windows\system32\LSMgr.dll
2013-02-20 23:04 . 2013-02-20 23:04 -------- d-----w- c:\users\Edward\AppData\Local\Programs
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-03-13 12:10 . 2012-04-25 10:04 693976 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-03-13 12:10 . 2012-01-05 09:36 73432 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-01-30 10:53 . 2011-01-24 12:16 232336 ------w- c:\windows\system32\MpSigStub.exe
2013-01-20 22:59 . 2013-01-20 22:59 195296 ----a-w- c:\windows\system32\drivers\MpFilter.sys
2013-01-20 22:59 . 2012-03-21 03:44 100328 ----a-w- c:\windows\system32\drivers\NisDrvWFP.sys
2013-01-05 05:00 . 2013-02-12 22:52 3967848 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-01-05 05:00 . 2013-02-12 22:52 3913064 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-01-04 04:50 . 2013-02-12 22:52 169984 ----a-w- c:\windows\system32\winsrv.dll
2013-01-04 03:00 . 2013-02-12 22:53 2347008 ----a-w- c:\windows\system32\win32k.sys
2013-01-03 05:05 . 2013-02-12 22:52 1293672 ----a-w- c:\windows\system32\drivers\tcpip.sys
2013-01-03 05:04 . 2013-02-12 22:52 187752 ----a-w- c:\windows\system32\drivers\FWPKCLNT.SYS
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AMD AVT"="start AMD Accelerated Video Transcoding device initialization" [X]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2013-01-27 947152]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-03 946352]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2012-12-03 07:35 946352 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2012-12-18 14:28 38112 ----a-w- c:\program files\Adobe\Reader 10.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}]
2007-06-01 17:21 153136 ----a-w- c:\program files\Common Files\Ahead\Lib\NMBgMonitor.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2007-03-01 22:57 153136 ----a-w- c:\program files\Common Files\Ahead\Lib\NeroCheck.exe
.
R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\LogMeIn\x86\RaInfo.sys [x]
R3 HTCAND32;HTC Device Driver;c:\windows\system32\Drivers\ANDROIDUSB.sys [x]
R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [x]
R3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\NisSrv.exe [x]
R3 SandraAgentSrv;SiSoftware Deployment Agent Service;c:\program files\SiSoftware\SiSoftware Sandra Professional Business 2011\RpcAgentSrv.exe [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [x]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [x]
R3 WSDScan;WSD Scan Support via UMB;c:\windows\system32\DRIVERS\WSDScan.sys [x]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [x]
S3 AtcL001;NDIS Miniport Driver for Atheros L1 Gigabit Ethernet Controller;c:\windows\system32\DRIVERS\l160x86.sys [x]
S3 AtiHDAudioService;AMD Function Driver for HD Audio Service;c:\windows\system32\drivers\AtihdW73.sys [x]
S3 BENDER;Pinnacle DV/AV Capture;c:\windows\system32\drivers\bender.sys [x]
S3 dc3d;MS Hardware Device Detection Driver;c:\windows\system32\DRIVERS\dc3d.sys [x]
S3 Echo3G;Echo3G Service;c:\windows\system32\DRIVERS\echo3G.sys [x]
S3 hypaudio;hypaudio;c:\windows\system32\DRIVERS\hypaudio.sys [x]
S3 hypkern;hypkern;c:\windows\system32\drivers\hypkern.sys [x]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - TRUESIGHT
*Deregistered* - TrueSight
.
Contents of the 'Scheduled Tasks' folder
.
2013-03-19 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-25 12:10]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.0.1 205.171.2.25
.
- - - - ORPHANS REMOVED - - - -
.
HKLM-Run-LogMeIn GUI - c:\program files\LogMeIn\x86\LogMeInSystray.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2013-03-19  03:41:37
ComboFix-quarantined-files.txt  2013-03-19 10:41
.
Pre-Run: 177,294,831,616 bytes free
Post-Run: 177,203,752,960 bytes free
.
- - End Of File - - 8CFFBDEC7F2C83F2D69B77E8E1EFD739
 



#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:54 PM

Posted 19 March 2013 - 07:43 AM


Hello dalley

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:
 ClearJavaCache:: 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 dalley

dalley
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:09:54 AM

Posted 19 March 2013 - 03:31 PM

ComboFix 13-03-19.01 - Edward 03/19/2013  13:23:37.4.4 - x86
Microsoft Windows 7 Professional   6.1.7601.1.1252.1.1033.18.3071.1836 [GMT -7:00]
Running from: c:\users\Edward\Desktop\ComboFix.exe
Command switches used :: c:\users\Edward\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {3F839487-C7A2-C958-E30C-E2825BA31FB5}
SP: Microsoft Security Essentials *Disabled/Updated* {84E27563-E198-C6D6-D9BC-D9F020245508}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Edward\SoundfontSBStereoPiano.exe
.
.
(((((((((((((((((((((((((   Files Created from 2013-02-19 to 2013-03-19  )))))))))))))))))))))))))))))))
.
.
2013-03-19 20:28 . 2013-03-19 20:28 -------- d-----w- c:\users\Edward\AppData\Local\temp
2013-03-19 20:28 . 2013-03-19 20:28 -------- d-----w- c:\users\Public\AppData\Local\temp
2013-03-19 20:28 . 2013-03-19 20:28 -------- d-----w- c:\users\Default\AppData\Local\temp
2013-03-19 11:49 . 2013-03-19 11:49 60872 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{3BB4F84F-E725-4E51-B8DA-92C709F7E8CB}\offreg.dll
2013-03-19 11:49 . 2013-03-19 11:49 29904 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{3BB4F84F-E725-4E51-B8DA-92C709F7E8CB}\MpKsl3207c861.sys
2013-03-19 11:05 . 2013-03-19 11:05 9728 ---ha-w- c:\windows\system32\api-ms-win-downlevel-shlwapi-l1-1-0.dll
2013-03-19 11:03 . 2013-02-12 03:32 15872 ----a-w- c:\windows\system32\drivers\usb8023.sys
2013-03-19 10:54 . 2013-02-08 00:45 6954968 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{3BB4F84F-E725-4E51-B8DA-92C709F7E8CB}\mpengine.dll
2013-03-18 07:59 . 2013-03-18 07:59 -------- d-----w- C:\FRST
2013-03-18 07:55 . 2013-02-08 00:45 6954968 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2013-03-12 10:12 . 2012-11-28 10:35 740840 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{3D00AD54-C01D-4F19-8C5F-258A5AEB4D04}\gapaengine.dll
2013-03-07 22:31 . 2013-03-07 22:31 136 ----a-w- c:\windows\GLFDF02.tmp
2013-03-07 21:40 . 2013-03-07 21:40 136 ----a-w- c:\windows\GLF5F2.tmp
2013-03-05 10:47 . 2013-03-05 10:47 136 ----a-w- c:\windows\GLF42A1.tmp
2013-03-02 23:30 . 2013-03-02 23:30 136 ----a-w- c:\windows\GLFBA5C.tmp
2013-03-02 23:14 . 2013-03-02 23:14 136 ----a-w- c:\windows\GLF27DD.tmp
2013-02-26 11:08 . 2013-02-26 11:08 136 ----a-w- c:\windows\GLF409.tmp
2013-02-22 23:44 . 2013-02-22 23:44 -------- d-----w- C:\Audio
2013-02-22 23:42 . 2013-02-22 23:42 136 ----a-w- c:\windows\GLF852C.tmp
2013-02-22 23:41 . 2013-02-22 23:41 136 ----a-w- c:\windows\GLF849F.tmp
2013-02-22 23:37 . 2013-02-22 23:37 136 ----a-w- c:\windows\GLF3520.tmp
2013-02-22 23:35 . 2013-02-22 23:35 136 ----a-w- c:\windows\GLF46BC.tmp
2013-02-22 23:34 . 2013-02-22 23:34 136 ----a-w- c:\windows\GLFB1AE.tmp
2013-02-22 23:34 . 2004-03-09 08:00 132880 ----a-w- c:\windows\system32\MSINET.OCX
2013-02-22 23:33 . 2013-02-22 23:33 -------- d-----w- c:\program files\LiveUpdate
2013-02-22 23:33 . 2002-03-14 13:57 245760 ----a-r- c:\windows\system32\LSMgr.dll
2013-02-20 23:04 . 2013-02-20 23:04 -------- d-----w- c:\users\Edward\AppData\Local\Programs
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-03-13 12:10 . 2012-04-25 10:04 693976 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-03-13 12:10 . 2012-01-05 09:36 73432 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-01-30 10:53 . 2011-01-24 12:16 232336 ------w- c:\windows\system32\MpSigStub.exe
2013-01-20 22:59 . 2013-01-20 22:59 195296 ----a-w- c:\windows\system32\drivers\MpFilter.sys
2013-01-20 22:59 . 2012-03-21 03:44 100328 ----a-w- c:\windows\system32\drivers\NisDrvWFP.sys
2013-01-05 05:00 . 2013-02-12 22:52 3967848 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-01-05 05:00 . 2013-02-12 22:52 3913064 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-01-04 04:50 . 2013-02-12 22:52 169984 ----a-w- c:\windows\system32\winsrv.dll
2013-01-04 03:00 . 2013-02-12 22:53 2347008 ----a-w- c:\windows\system32\win32k.sys
2013-01-03 05:05 . 2013-02-12 22:52 1293672 ----a-w- c:\windows\system32\drivers\tcpip.sys
2013-01-03 05:04 . 2013-02-12 22:52 187752 ----a-w- c:\windows\system32\drivers\FWPKCLNT.SYS
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AMD AVT"="start AMD Accelerated Video Transcoding device initialization" [X]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2013-01-27 947152]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-03 946352]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 0 (0x0)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2012-12-03 07:35 946352 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2012-12-18 14:28 38112 ----a-w- c:\program files\Adobe\Reader 10.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}]
2007-06-01 17:21 153136 ----a-w- c:\program files\Common Files\Ahead\Lib\NMBgMonitor.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2007-03-01 22:57 153136 ----a-w- c:\program files\Common Files\Ahead\Lib\NeroCheck.exe
.
R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\LogMeIn\x86\RaInfo.sys [x]
R3 HTCAND32;HTC Device Driver;c:\windows\system32\Drivers\ANDROIDUSB.sys [x]
R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [x]
R3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\NisSrv.exe [x]
R3 SandraAgentSrv;SiSoftware Deployment Agent Service;c:\program files\SiSoftware\SiSoftware Sandra Professional Business 2011\RpcAgentSrv.exe [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [x]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [x]
R3 WSDScan;WSD Scan Support via UMB;c:\windows\system32\DRIVERS\WSDScan.sys [x]
S1 MpKsl3207c861;MpKsl3207c861;c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{3BB4F84F-E725-4E51-B8DA-92C709F7E8CB}\MpKsl3207c861.sys [x]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [x]
S3 AtcL001;NDIS Miniport Driver for Atheros L1 Gigabit Ethernet Controller;c:\windows\system32\DRIVERS\l160x86.sys [x]
S3 AtiHDAudioService;AMD Function Driver for HD Audio Service;c:\windows\system32\drivers\AtihdW73.sys [x]
S3 BENDER;Pinnacle DV/AV Capture;c:\windows\system32\drivers\bender.sys [x]
S3 dc3d;MS Hardware Device Detection Driver;c:\windows\system32\DRIVERS\dc3d.sys [x]
S3 Echo3G;Echo3G Service;c:\windows\system32\DRIVERS\echo3G.sys [x]
S3 hypaudio;hypaudio;c:\windows\system32\DRIVERS\hypaudio.sys [x]
S3 hypkern;hypkern;c:\windows\system32\drivers\hypkern.sys [x]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - MPKSL3207C861
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ    SSDPSRV upnphost SCardSvr TBS fdrespub AppIDSvc QWAVE wcncsvc Mcx2Svc SensrSvc
.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost  - LocalService
FontCache
.
.
Contents of the 'Scheduled Tasks' folder
.
2013-03-19 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-25 12:10]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.0.1 205.171.2.25
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2013-03-19  13:30:13
ComboFix-quarantined-files.txt  2013-03-19 20:30
ComboFix2.txt  2013-03-19 10:41
.
Pre-Run: 177,074,466,816 bytes free
Post-Run: 176,678,838,272 bytes free
.
- - End Of File - - 575985CCD2ECB462B605274EB3ECA16B
 



#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:54 PM

Posted 19 March 2013 - 05:55 PM

Hello dalley

I would like to see a report that combofix makes.

extra combofix report
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box
    C:\Qoobox\Add-Remove Programs.txt
    
    • click ok
  • copy and paste the report into this topic for me to review

    Gringo



Edited by gringo_pr, 19 March 2013 - 05:56 PM.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 dalley

dalley
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:09:54 AM

Posted 20 March 2013 - 05:23 AM

 Update for Microsoft Office 2007 (KB2508958)
Adobe AIR
Adobe Flash Player 11 ActiveX
Adobe Reader X (10.1.6)
Amazon MP3 Downloader 1.0.10
AMD Accelerated Video Transcoding
AMD APP SDK Runtime
AMD Catalyst Install Manager
AMD Drag and Drop Transcoding
AMD Media Foundation Decoders
AmpegSVX
Antares Auto-Tune 3 DirectX
Antares Hyperprism v1.5.6 DX
Applian FLV and Media Player 3.1.1.12
ATI AVIVO Codecs
AVI Player
Canon MP560 series MP Drivers
Catalyst Control Center
Catalyst Control Center - Branding
Catalyst Control Center Graphics Previews Common
Catalyst Control Center InstallProxy
Catalyst Control Center Localization All
ccc-utility
CCC Help Chinese Standard
CCC Help Chinese Traditional
CCC Help Czech
CCC Help Danish
CCC Help Dutch
CCC Help English
CCC Help Finnish
CCC Help French
CCC Help German
CCC Help Greek
CCC Help Hungarian
CCC Help Italian
CCC Help Japanese
CCC Help Korean
CCC Help Norwegian
CCC Help Polish
CCC Help Portuguese
CCC Help Russian
CCC Help Spanish
CCC Help Swedish
CCC Help Thai
CCC Help Turkish
Echo3G PCI
EZdrummer
EZXNashville
EZXVintage
HydraVision
Jasc Paint Shop Pro 9
Java 7 Update 6
Java Auto Updater
LiveSynth Pro DXi
Macromedia Dreamweaver MX 2004
Macromedia Extension Manager
Malwarebytes Anti-Malware version 1.70.0.1100
Microsoft .NET Framework 4 Client Profile
Microsoft Application Error Reporting
Microsoft Office 2007 Service Pack 3 (SP3)
Microsoft Office Access MUI (English) 2007
Microsoft Office Access Setup Metadata MUI (English) 2007
Microsoft Office Excel MUI (English) 2007
Microsoft Office File Validation Add-In
Microsoft Office Outlook MUI (English) 2007
Microsoft Office PowerPoint MUI (English) 2007
Microsoft Office Professional 2007
Microsoft Office Proof (English) 2007
Microsoft Office Proof (French) 2007
Microsoft Office Proof (Spanish) 2007
Microsoft Office Proofing (English) 2007
Microsoft Office Proofing Tools 2007 Service Pack 3 (SP3)
Microsoft Office Publisher MUI (English) 2007
Microsoft Office Shared MUI (English) 2007
Microsoft Office Shared Setup Metadata MUI (English) 2007
Microsoft Office Word MUI (English) 2007
Microsoft Outlook Personal Folders Backup
Microsoft Security Client
Microsoft Security Essentials
Microsoft Silverlight
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable - KB2467174 - x86 9.0.30729.5570
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.30319
MSXML 4.0 SP2 (KB954430)
MSXML 4.0 SP2 (KB973688)
MSXML 4.0 SP2 Parser and SDK
MSXML 4.0 SP3 Parser
MSXML 4.0 SP3 Parser (KB2758694)
Nero 7 Essentials
neroxml
Rock Songs
Security Update for Microsoft .NET Framework 4 Client Profile (KB2446708)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2478663)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2518870)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2539636)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2572078)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2604121)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2633870)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656351)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368v2)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656405)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2686827)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2729449)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2737019)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2742595)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2789642)
Security Update for Microsoft Office 2007 suites (KB2596615) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596672) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596744) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596754) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596785) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596792) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596871) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2597969) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2687311) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2687441) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2687499) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2760416) 32-Bit Edition
Security Update for Microsoft Office Excel 2007 (KB2687307) 32-Bit Edition
Security Update for Microsoft Office InfoPath 2007 (KB2687440) 32-Bit Edition
Security Update for Microsoft Office PowerPoint 2007 (KB2596764) 32-Bit Edition
Security Update for Microsoft Office PowerPoint 2007 (KB2596912) 32-Bit Edition
Security Update for Microsoft Office Publisher 2007 (KB2596705) 32-Bit Edition
Security Update for Microsoft Office Word 2007 (KB2760421) 32-Bit Edition
SereneScreen Marine Aquarium 3
SiSoftware Sandra Professional Business 2011
SONAR 8.5 Studio
UAD Powered Plug-Ins
Update for 2007 Microsoft Office System (KB967642)
Update for Microsoft Office 2007 Help for Common Features (KB963673)
Update for Microsoft Office 2007 suites (KB2596620) 32-Bit Edition
Update for Microsoft Office 2007 suites (KB2596660) 32-Bit Edition
Update for Microsoft Office 2007 suites (KB2596802) 32-Bit Edition
Update for Microsoft Office 2007 suites (KB2596848) 32-Bit Edition
Update for Microsoft Office 2007 suites (KB2767916) 32-Bit Edition
Update for Microsoft Office Access 2007 Help (KB963663)
Update for Microsoft Office Excel 2007 Help (KB963678)
Update for Microsoft Office Outlook 2007 (KB2687404) 32-Bit Edition
Update for Microsoft Office Outlook 2007 Help (KB963677)
Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2768024) 32-Bit Edition
Update for Microsoft Office Powerpoint 2007 Help (KB963669)
Update for Microsoft Office Publisher 2007 Help (KB963667)
Update for Microsoft Office Script Editor Help (KB963671)
Update for Microsoft Office Word 2007 Help (KB963665)
Waves Mercury Complete VST DX RTAS v1.01
WinX DVD Ripper 5.5.5
Yahoo! Detect
 



#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:54 PM

Posted 20 March 2013 - 05:30 AM


Hello

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (Revo does allot better of a job)
  • Programs to remove

    • Adobe Reader X (10.1.6)
      Java 7 Update 6


  • Please download and install Revo Uninstaller Free
  • Double click Revo Uninstaller to run it.
  • From the list of programs double click on The Program to remove
  • When prompted if you want to uninstall click Yes.
  • Be sure the Moderate option is selected then click Next.
  • The program will run, If prompted again click Yes
  • when the built-in uninstaller is finished click on Next.
  • Once the program has searched for leftovers click Next.
  • Check/tick the bolded items only on the list then click Delete
  • when prompted click on Yes and then on next.
  • put a check on any folders that are found and select delete
  • when prompted select yes then on next
  • Once done click Finish.
  • .



    Update Adobe reader
    • Recently there have been vulnerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

      You can download it from http://www.adobe.com/products/acrobat/readstep2.html
      After installing the latest Adobe Reader, uninstall all previous versions.
      If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.
      • If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

        Note: When installing FoxitReader, be careful not to install anything to do with AskBar.

    Clean Out Temp Files
    • This small application you may want to keep and use once a week to keep the computer clean.

      Download CCleaner from here http://www.ccleaner.com/
      • Run the installer to install the application.
      • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
      • Run CCleaner. (make sure under Windows tab all the boxes of Internet Explorer and Windows explorer are checked. Under System check Empty Recycle Bin and Temporary Files. Under Application tab all the boxes should be checked).
      • Click Run Cleaner.
      • Close CCleaner.
: Malwarebytes' Anti-Malware :


I see You have MBAM installed on the computer - that is great!! it is a very good program! I would like you to run a quick scan for me now
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
  • Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
    Click OK to either and let MBAM proceed with the disinfection process.
    If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


    Download HijackThis
    • Go Here to download HijackThis program
    • Save HijackThis to your desktop.
    • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
    • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
    • copy and paste hijackthis report into the topic
    "information and logs"
    • In your next post I need the following
      • Log From MBAM
      • report from Hijackthis
      • let me know of any problems you may have had
      • How is the computer doing now?
    Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 dalley

dalley
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:09:54 AM

Posted 20 March 2013 - 06:05 AM

everything seems ok, here are the logs:

 

Malwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org

Database version: v2013.03.18.05

Windows 7 Service Pack 1 x86 NTFS
Internet Explorer 10.0.9200.16521
Edward :: EDWARD-PC [administrator]

3/20/2013 3:41:09 AM
mbam-log-2013-03-20 (03-41-09).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 199549
Time elapsed: 4 minute(s), 26 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

 

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 4:04:27 AM, on 3/20/2013
Platform: Windows 7 SP1 (WinNT 6.00.3505)
MSIE: Internet Explorer v10.0 (10.00.9200.16521)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
C:\Windows\system32\SearchFilterHost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Users\Edward\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/p/?LinkId=255141
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: (no name) -  - (no file)
O4 - HKLM\..\Run: [AMD AVT] Cmd.exe /c start "AMD Accelerated Video Transcoding device initialization" /min "C:\Program Files\AMD AVT\bin\kdbsync.exe" aml
O4 - HKLM\..\Run: [MSC] "c:\Program Files\Microsoft Security Client\msseces.exe" -hide -runkey
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - http://download.eset.com/special/eos/OnlineScanner.cab
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: AMD External Events Utility - AMD - C:\Windows\system32\atiesrxx.exe
O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: SiSoftware Deployment Agent Service (SandraAgentSrv) - SiSoftware - C:\Program Files\SiSoftware\SiSoftware Sandra Professional Business 2011\RpcAgentSrv.exe

--
End of file - 2779 bytes






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users