Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Ransomware transitioned to White Screen


  • This topic is locked This topic is locked
42 replies to this topic

#1 Tomster2

Tomster2

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:04:59 AM

Posted 25 March 2013 - 01:45 PM

Windows 7 Pro x64, Dell M4600 Laptop, GFI Vipre Anti-Virus, Windows Firewall

 

User called saying their computer screen had a message saying the PC was locked and would only be unlocked by paying for a unlock code. They knew this was not ligit, and asked for help.

 

I told them to shut down the machine and take if off the network.

 

When I got the machine, if I booted without a connection to a router ie. patch cord unplugged it went from the login screen to a white screen which I could not get around. Alt-F4 did nothing.

 

When I booted with internet access (back at my office I unplugged everything from my switch except my firewall and then plugged in this PC.... ) It went from the login screen to the desktop for a minute or so... then to the white screen.

 

The white screen was discouraging as I was hoping to at least see which varient of Ransomware this nasty thing was.

 

In either case Safe Mode was not accessible.

 

In checking various posts on ransom ware mention was made of various files being in certain locations.  So I removed the hard drive, connected it to an isolated PC, and was able to browse the drive.

 

I checked the desktop... there were no files with names that suggested how to unlock.

I checked the system folder to look for a *.sss file that would contain the names of files that were encrypted. Nothing with the suggested name or extension.

I tried to access my documents for the user... and that folder threw an Access Denied message. Meanwhile - My photos, my music etc were accessible.

 

I have been doing computer support for many years, and I confess I do not have any idea of how to proceed on this one.  The main goal would be to be able to recover the "My documents" data for the last month. (We have a Ghost image from approximately 30 days ago.) which I would restore no matter how well we are able to recover the machine - as unless someone is confident enough to advise otherwise, it would still be suspect.

 

Appreciate any suggestions.

 

Tomster2



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:59 AM

Posted 25 March 2013 - 07:17 PM


Hello Tomster2

Welcome to The Forums!!

Around here they call me Gringo and I'll be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
  • To enter System Recovery Options by using Windows installation disc:
    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.
    On the System Recovery Options menu you will get the following options:

      • Startup Repair
        System Restore
        Windows Complete PC Restore
        Windows Memory Diagnostic Tool
        Command Prompt
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst64.exe or e:\frst.exe and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • First Press the Scan button.
    • It will make a log (FRST.txt)
    • Second Type the following in the edit box after "Search:". services.exe
    • Click the Search button
    • It will make a log (Search.txt)
    I want you to poste Both the FRST.txt report and the Search.txt into your reply to me

    Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Tomster2

Tomster2
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:04:59 AM

Posted 26 March 2013 - 11:26 AM

Good to have you on board. This one has me baffled. Here are both scan results:

Frst64 scan:

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 13-03-2013 (ATTENTION: FRST version is 13 days old)
Ran by SYSTEM at 26-03-2013 10:56:24
Running from F:\
Windows 7 Professional (X64) OS Language: English(US)
The current controlset is ControlSet002

==================== Registry (Whitelisted) ===================

HKLM\...\Run: [Apoint] C:\Program Files\DellTPad\Apoint.exe [608112 2011-04-05] (Alps Electric Co., Ltd.)
HKLM\...\Run: [SysTrayApp] C:\Program Files\IDT\WDM\sttray64.exe [525312 2011-01-06] (IDT, Inc.)
HKLM\...\Run: [IntelPROSet] "C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe" /tf Intel PROSet/Wireless [1934608 2010-12-23] (Intel® Corporation)
HKLM\...\Run: [IntelWirelessWiMAX] "C:\Program Files\Intel\WiMAX\Bin\WiMAXCU.exe" /tasktray /nosplash [1605632 2010-11-14] (Intel® Corporation)
HKLM\...\Run: [TdmNotify] C:\Program Files\Dell\Dell Data Protection\Access\Advanced\Wave\Trusted Drive Manager\TdmNotify.exe [257392 2011-05-27] (Wave Systems Corp.)
HKLM\...\Run: [FreeFallProtection] C:\Program Files (x86)\STMicroelectronics\AccelerometerP11\FF_Protection.exe [686704 2011-07-25] ()
HKLM\...\Run: [itype] "c:\Program Files\Microsoft IntelliType Pro\itype.exe" [1873256 2011-08-10] (Microsoft Corporation)
HKLM\...\Run: [IntelliPoint] "c:\Program Files\Microsoft IntelliPoint\ipoint.exe" [2417032 2011-08-01] (Microsoft Corporation)
HKLM\...\Run: [NVHotkey] rundll32.exe C:\Windows\system32\nvHotkey.dll,Start [312936 2011-06-05] (NVIDIA Corporation)
HKLM\...\Run: [EvtMgr6] C:\Program Files\Logitech\SetPointP\SetPoint.exe /launchGaming [1744152 2011-10-07] (Logitech, Inc.)
HKLM\...\Run: [LogiScrollApp] C:\Program Files\Logitech\FlowScroll\KhalScroll.exe [166680 2012-02-08] (Logitech, Inc.)
HKLM\...\Run: [Plantronics MyHeadset Updater] C:\Program Files\Plantronics\MyHeadsetUpdater\MyHeadsetUpdater.exe [70656 2012-10-12] (Plantronics)
HKLM-x32\...\Run: [IAStorIcon] C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe [283160 2010-11-05] (Intel Corporation)
HKLM-x32\...\Run: [IMSS] "C:\Program Files (x86)\Intel\Intel® Management Engine Components\IMSS\PIconStartup.exe" [112408 2011-08-08] (Intel Corporation)
HKLM-x32\...\Run: [RemoteControl9] "C:\Program Files (x86)\CyberLink\PowerDVD9\PDVD9Serv.exe" [87336 2009-07-06] (CyberLink Corp.)
HKLM-x32\...\Run: [PDVD9LanguageShortcut] "C:\Program Files (x86)\CyberLink\PowerDVD9\Language\Language.exe" [50472 2010-04-29] (CyberLink Corp.)
HKLM-x32\...\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [946352 2012-12-02] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [] [x]
HKLM-x32\...\Run: [Adobe Acrobat Speed Launcher] "C:\Program Files (x86)\Adobe\Acrobat 10.0\Acrobat\Acrobat_sl.exe" [39136 2012-12-18] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [Acrobat Assistant 8.0] "C:\Program Files (x86)\Adobe\Acrobat 10.0\Acrobat\Acrotray.exe" [825560 2012-12-18] (Adobe Systems Inc.)
HKLM-x32\...\Run: [RoxWatchTray] "C:\Program Files (x86)\Common Files\Roxio Shared\OEM\12.0\SharedCOM\RoxWatchTray12OEM.exe" [240112 2010-11-25] (Sonic Solutions)
HKLM-x32\...\Run: [Desktop Disc Tool] "C:\Program Files (x86)\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe" [514544 2010-11-17] ()
HKLM-x32\...\Run: [Norton Ghost 15.0] "C:\Program Files (x86)\Norton Ghost\Agent\VProTray.exe" [2598760 2010-03-03] (Symantec Corporation)
HKLM-x32\...\Run: [BrMfcWnd] C:\Program Files (x86)\Brother\Brmfcmon\BrMfcWnd.exe /AUTORUN [1159168 2009-05-26] (Brother Industries, Ltd.)
HKLM-x32\...\Run: [ControlCenter3] C:\Program Files (x86)\Brother\ControlCenter3\brctrcen.exe /autorun [114688 2008-12-24] (Brother Industries, Ltd.)
HKLM-x32\...\Run: [NUSB3MON] "C:\Program Files (x86)\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe" [113288 2010-11-17] (Renesas Electronics Corporation)
HKLM-x32\...\Run: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [59280 2012-10-11] (Apple Inc.)
HKLM-x32\...\Run: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime [421888 2012-10-25] (Apple Inc.)
HKLM-x32\...\Run: [SBAMTray] "C:\Program Files (x86)\GFI Software\GFIAgent\SBAMTray.exe" [3226504 2012-10-16] (GFI Software)
HKLM-x32\...\Run: [KiesTrayAgent] C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe [310128 2013-02-13] (Samsung Electronics Co., Ltd.)
HKU\administrator\...\Run: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [39408 2012-08-07] (Google Inc.)
HKU\joe\...\Run: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [39408 2012-08-07] (Google Inc.)
HKU\joe\...\Run: [HP Officejet Pro 8500 A910 (NET)] "C:\Program Files\HP\HP Officejet Pro 8500 A910\Bin\ScanToPCActivationApp.exe" -deviceID "CN12CCM132:NW" -scfn "HP Officejet Pro 8500 A910 (NET)" -AutoStart 1 [2573416 2012-10-17] (Hewlett-Packard Co.)
HKU\joe\...\Run: [KiesPreload] C:\Program Files (x86)\Samsung\Kies\Kies.exe /preload [1509232 2013-02-13] (Samsung)
HKU\joe\...\Run: [KiesAirMessage] C:\Program Files (x86)\Samsung\Kies\KiesAirMessage.exe -startup [578560 2013-02-06] (Samsung Electronics)
HKU\joe\...\Run: [] C:\Program Files (x86)\Samsung\Kies\External\FirmwareUpdate\KiesPDLR.exe [844144 2013-02-13] (Samsung)
HKU\joe\...\CurrentVersion\Windows: [Load] C:\Users\joe\LOCALS~1\Temp\mszfyexr.scr
HKU\joe\...\Winlogon: [Shell] C:\Users\joe\AppData\Roaming\id.cff,explorer.exe
Winlogon\Notify\GoToAssist: C:\Program Files (x86)\Citrix\GoToAssist\822\G2AWinLogon_x64.dll (Citrix Online, a division of Citrix Systems, Inc.)
Winlogon\Notify\LBTWlgn: c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll (Logitech, Inc.)
Winlogon\Notify\spba: C:\Program Files\Common Files\SPBA\homefus2.dll (UPEK Inc.)
AppInit_DLLs: C:\Windows\system32\nvinitx.dll
Lsa: [Authentication Packages] msv1_0 wvauth
Startup: C:\ProgramData\Start Menu\Programs\Startup\Bluetooth.lnk
ShortcutTarget: Bluetooth.lnk -> C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe (Broadcom Corporation.)
Startup: C:\ProgramData\Start Menu\Programs\Startup\Dell System Manager.lnk
ShortcutTarget: Dell System Manager.lnk -> C:\Program Files\Dell\Dell System Manager\DCPSysMgr.exe (Dell Inc.)
Startup: C:\ProgramData\Start Menu\Programs\Startup\MobileGo Service.lnk
ShortcutTarget: MobileGo Service.lnk -> C:\Program Files (x86)\Wondershare\MobileGo\MobileGoService.exe (No File)
Startup: C:\Users\joe\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MobileGo Service.lnk
ShortcutTarget: MobileGo Service.lnk -> C:\Program Files (x86)\Wondershare\MobileGo\MobileGoService.exe (No File)
Startup: C:\Users\joe\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneNote 2010 Screen Clipper and Launcher.lnk
ShortcutTarget: OneNote 2010 Screen Clipper and Launcher.lnk -> C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE (Microsoft Corporation)
Startup: C:\Users\joe\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PdaNet Desktop.lnk
ShortcutTarget: PdaNet Desktop.lnk -> C:\Program Files (x86)\PdaNet for Android\PdaNetPC.exe ()

==================== Services (Whitelisted) ===================

2 Autodesk Content Service; "C:\Program Files (x86)\Autodesk\Content Service\Connect.Service.ContentService.exe" [18656 2011-02-02] ()
3 LiveUpdate; "C:\PROGRA~2\Symantec\LIVEUP~1\LUCOMS~1.EXE" [2999664 2007-09-12] (Symantec Corporation)
2 Norton Ghost; C:\Program Files (x86)\Norton Ghost\Agent\VProSvc.exe [4590432 2010-03-03] (Symantec Corporation)
2 NovacomD; C:\Program Files\Palm, Inc\novacomd\amd64\novacomd.exe [71168 2011-03-15] (Palm)
2 O2SDIOAssist; C:\Windows\SysWOW64\srvany.exe [8192 2003-04-18] ()
2 PassThru Service; C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe [167424 2012-12-07] ()
2 SBAMSvc; "C:\Program Files (x86)\GFI Software\GFIAgent\SBAMSvc.exe" [3675976 2012-10-16] (GFI Software)
2 SBPIMSvc; "C:\Program Files (x86)\GFI Software\GFIAgent\SBPIMSvc.exe" [175496 2012-10-16] (GFI Software)
3 Symantec SymSnap VSS Provider; C:\Windows\system32\dllhost.exe /Processid:{142CC62B-140C-4F3E-B015-349BD496D138} [9728 2009-07-13] (Microsoft Corporation)
3 Symantec SymSnap VSS Provider; C:\Windows\SysWow64\dllhost.exe /Processid:{142CC62B-140C-4F3E-B015-349BD496D138} [7168 2009-07-13] (Microsoft Corporation)
3 SymSnapService; "C:\Program Files (x86)\Norton Ghost\Shared\Drivers\SymSnapServicex64.exe" [2963960 2010-02-10] (Symantec)
2 tcsd_win32.exe; "C:\Program Files (x86)\NTRU Cryptosystems\NTRU TCG Software Stack\bin\tcsd_win32.exe" [1633280 2011-02-17] ()
2 Wave Authentication Manager Service; C:\Program Files\Dell\Dell Data Protection\Access\Advanced\Wave\Authentication Manager\WaveAMService.exe [1600000 2011-07-01] (Wave Systems Corp.)
2 ZcfgSvc7; C:\Program Files\Intel\WiFi\bin\ZCfgSvc7.exe [992256 2010-12-23] (Intel® Corporation)

==================== Drivers (Whitelisted) =====================

3 GenericMount; C:\Windows\System32\Drivers\GenericMount.sys [66608 2010-02-12] (Symantec Corporation)
3 libusb0; C:\Windows\System32\Drivers\libusb0.sys [43456 2011-09-22] (http://libusb-win32.sourceforge.net)
0 SmartDefragDriver; C:\Windows\System32\Drivers\SmartDefragDriver.sys [17720 2010-11-26] ()
3 swmsflt; C:\Windows\System32\Drivers\swmsflt.sys [47104 2009-10-20] ()
3 SWNC5E00; C:\Windows\System32\Drivers\SWNC5E00.sys [285696 2009-08-04] (Sierra Wireless Inc.)
0 symsnap; C:\Windows\System32\Drivers\symsnap.sys [170032 2010-02-10] (StorageCraft)
3 VProEventMonitor; C:\Windows\System32\Drivers\VProEventMonitor.sys [20528 2009-09-21] (Symantec Corporation)
2 Horner APG: Cscape update permissions manager. 8349.; C:\Users\joe\AppData\Local\Temp\MSIE13.tmp -PermissionManagerRun [x]
2 V2iMount; [x]

==================== NetSvcs (Whitelisted) ====================


==================== One Month Created Files and Folders ========

2013-03-22 08:34 - 2013-03-22 08:34 - 00000000 ____D C:\ProgramData\ipqb
2013-03-22 07:43 - 2013-03-22 07:43 - 08026561 ____A C:\Users\joe\Desktop\Cal_Fannie_cracker_2.zip
2013-03-22 07:43 - 2013-03-22 07:43 - 07062945 ____A C:\Users\joe\Desktop\Cal_Fannie_cracker_120_1.zip
2013-03-22 06:44 - 2013-03-22 06:44 - 00000000 ____D C:\Users\Public\Documents\CrashDump
2013-03-21 08:53 - 2013-03-21 08:53 - 00069120 ____A C:\Users\joe\Documents\Copy of Clydes Donuts Sheeter and Die Cutter Machine.xls
2013-03-21 08:12 - 2013-03-21 08:12 - 00000691 ____A C:\Users\joe\Desktop\office docs - Shortcut.lnk
2013-03-15 07:59 - 2013-02-01 23:31 - 17815040 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.dll
2013-03-15 07:59 - 2013-02-01 22:58 - 10925568 ____A (Microsoft Corporation) C:\Windows\System32\ieframe.dll
2013-03-15 07:59 - 2013-02-01 22:57 - 02312704 ____A (Microsoft Corporation) C:\Windows\System32\jscript9.dll
2013-03-15 07:59 - 2013-02-01 22:48 - 01346048 ____A (Microsoft Corporation) C:\Windows\System32\urlmon.dll
2013-03-15 07:59 - 2013-02-01 22:47 - 01494528 ____A (Microsoft Corporation) C:\Windows\System32\inetcpl.cpl
2013-03-15 07:59 - 2013-02-01 22:47 - 01392128 ____A (Microsoft Corporation) C:\Windows\System32\wininet.dll
2013-03-15 07:59 - 2013-02-01 22:46 - 00237056 ____A (Microsoft Corporation) C:\Windows\System32\url.dll
2013-03-15 07:59 - 2013-02-01 22:43 - 00085504 ____A (Microsoft Corporation) C:\Windows\System32\jsproxy.dll
2013-03-15 07:59 - 2013-02-01 22:42 - 00816640 ____A (Microsoft Corporation) C:\Windows\System32\jscript.dll
2013-03-15 07:59 - 2013-02-01 22:42 - 00173056 ____A (Microsoft Corporation) C:\Windows\System32\ieUnatt.exe
2013-03-15 07:59 - 2013-02-01 22:41 - 00599040 ____A (Microsoft Corporation) C:\Windows\System32\vbscript.dll
2013-03-15 07:59 - 2013-02-01 22:40 - 00729088 ____A (Microsoft Corporation) C:\Windows\System32\msfeeds.dll
2013-03-15 07:59 - 2013-02-01 22:39 - 02147840 ____A (Microsoft Corporation) C:\Windows\System32\iertutil.dll
2013-03-15 07:59 - 2013-02-01 22:38 - 02382848 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.tlb
2013-03-15 07:59 - 2013-02-01 22:38 - 00096768 ____A (Microsoft Corporation) C:\Windows\System32\mshtmled.dll
2013-03-15 07:59 - 2013-02-01 22:34 - 00248320 ____A (Microsoft Corporation) C:\Windows\System32\ieui.dll
2013-03-15 07:59 - 2013-02-01 20:09 - 12321792 ____A (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2013-03-15 07:59 - 2013-02-01 19:42 - 09738240 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2013-03-15 07:59 - 2013-02-01 19:38 - 01800704 ____A (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2013-03-15 07:59 - 2013-02-01 19:31 - 01103872 ____A (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2013-03-15 07:59 - 2013-02-01 19:30 - 01427968 ____A (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2013-03-15 07:59 - 2013-02-01 19:30 - 01129472 ____A (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2013-03-15 07:59 - 2013-02-01 19:29 - 00231936 ____A (Microsoft Corporation) C:\Windows\SysWOW64\url.dll
2013-03-15 07:59 - 2013-02-01 19:27 - 00065024 ____A (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2013-03-15 07:59 - 2013-02-01 19:26 - 00717824 ____A (Microsoft Corporation) C:\Windows\SysWOW64\jscript.dll
2013-03-15 07:59 - 2013-02-01 19:26 - 00420864 ____A (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll
2013-03-15 07:59 - 2013-02-01 19:26 - 00142848 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2013-03-15 07:59 - 2013-02-01 19:25 - 00607744 ____A (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2013-03-15 07:59 - 2013-02-01 19:23 - 02382848 ____A (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2013-03-15 07:59 - 2013-02-01 19:23 - 01796096 ____A (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2013-03-15 07:59 - 2013-02-01 19:23 - 00073216 ____A (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll
2013-03-15 07:59 - 2013-02-01 19:20 - 00176640 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2013-03-08 07:31 - 2013-03-08 07:31 - 00169345 ____A C:\Users\joe\Downloads\PdaNet.apk
2013-03-07 11:41 - 2013-03-07 11:41 - 00000000 ____D C:\Users\joe\Desktop\Clydes Donuts
2013-03-07 11:37 - 2013-03-07 11:41 - 00000000 ____D C:\Users\Public\Documents\PhotoEditor
2013-03-07 11:37 - 2013-03-07 11:37 - 00001167 ____A C:\Users\joe\Desktop\PhotoEditor.lnk
2013-03-07 11:37 - 2013-03-07 11:37 - 00000000 ____D C:\Users\Public\Documents\PhotoEditor_Log
2013-03-07 08:33 - 2013-03-07 09:52 - 00099644 ____A C:\Users\joe\Documents\Wrigley Corp Metal Extras.dwg
2013-03-07 07:46 - 2013-03-07 07:48 - 00095356 ____A C:\Users\joe\Documents\Wrigly Plastic Extras Corprate.dwg
2013-03-06 06:16 - 2013-03-06 06:16 - 00002665 ____A C:\Users\Public\Desktop\Tech Toolkit.lnk
2013-03-06 06:16 - 2013-03-06 06:16 - 00000000 ____D C:\Program Files (x86)\8020 Inc
2013-03-05 07:10 - 2013-03-05 07:10 - 00045568 ____A C:\Users\joe\Documents\Wrigly Corp Conveyor.xls
2013-03-01 13:04 - 2013-03-01 13:04 - 00022517 ____A C:\Users\joe\Desktop\Clydes Doughnut 14.xls
2013-03-01 12:25 - 2013-03-01 12:27 - 00022260 ____A C:\Users\joe\Desktop\Clydes Doughnut.xls
2013-03-01 12:11 - 2013-03-01 12:27 - 00022200 ____A C:\Users\joe\Desktop\Joes Servo.mba
2013-02-28 06:33 - 2013-01-13 13:17 - 00009728 ___AH (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 13:17 - 00002560 ___AH (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-downlevel-normaliz-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 13:16 - 00010752 ___AH (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 13:12 - 00003584 ___AH (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
2013-02-28 06:33 - 2013-01-13 13:11 - 00005632 ___AH (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
2013-02-28 06:33 - 2013-01-13 13:11 - 00005632 ___AH (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-downlevel-ole32-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 13:11 - 00004096 ___AH (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-downlevel-user32-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 13:11 - 00003072 ___AH (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-downlevel-version-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 13:11 - 00003072 ___AH (Microsoft Corporation) C:\Windows\SysWOW64\api-ms-win-downlevel-shell32-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 12:35 - 00010752 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-downlevel-advapi32-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 12:35 - 00009728 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-downlevel-shlwapi-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 12:35 - 00002560 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-downlevel-normaliz-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 12:32 - 00003584 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-downlevel-advapi32-l2-1-0.dll
2013-02-28 06:33 - 2013-01-13 12:31 - 01247744 ____A (Microsoft Corporation) C:\Windows\SysWOW64\DWrite.dll
2013-02-28 06:33 - 2013-01-13 12:31 - 00005632 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-downlevel-shlwapi-l2-1-0.dll
2013-02-28 06:33 - 2013-01-13 12:31 - 00005632 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-downlevel-ole32-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 12:31 - 00004096 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-downlevel-user32-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 12:31 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-downlevel-version-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 12:31 - 00003072 ___AH (Microsoft Corporation) C:\Windows\System32\api-ms-win-downlevel-shell32-l1-1-0.dll
2013-02-28 06:33 - 2013-01-13 12:22 - 01988096 ____A (Microsoft Corporation) C:\Windows\SysWOW64\d3d10warp.dll
2013-02-28 06:33 - 2013-01-13 12:20 - 00293376 ____A (Microsoft Corporation) C:\Windows\SysWOW64\dxgi.dll
2013-02-28 06:33 - 2013-01-13 12:09 - 00249856 ____A (Microsoft Corporation) C:\Windows\SysWOW64\d3d10_1core.dll
2013-02-28 06:33 - 2013-01-13 12:08 - 01504768 ____A (Microsoft Corporation) C:\Windows\SysWOW64\d3d11.dll
2013-02-28 06:33 - 2013-01-13 12:08 - 00220160 ____A (Microsoft Corporation) C:\Windows\SysWOW64\d3d10core.dll
2013-02-28 06:33 - 2013-01-13 11:59 - 01643520 ____A (Microsoft Corporation) C:\Windows\System32\DWrite.dll
2013-02-28 06:33 - 2013-01-13 11:58 - 01175552 ____A (Microsoft Corporation) C:\Windows\System32\FntCache.dll
2013-02-28 06:33 - 2013-01-13 11:54 - 00604160 ____A (Microsoft Corporation) C:\Windows\SysWOW64\d3d10level9.dll
2013-02-28 06:33 - 2013-01-13 11:53 - 00207872 ____A (Microsoft Corporation) C:\Windows\SysWOW64\WindowsCodecsExt.dll
2013-02-28 06:33 - 2013-01-13 11:53 - 00187392 ____A (Microsoft Corporation) C:\Windows\SysWOW64\UIAnimation.dll
2013-02-28 06:33 - 2013-01-13 11:51 - 02565120 ____A (Microsoft Corporation) C:\Windows\System32\d3d10warp.dll
2013-02-28 06:33 - 2013-01-13 11:49 - 00363008 ____A (Microsoft Corporation) C:\Windows\System32\dxgi.dll
2013-02-28 06:33 - 2013-01-13 11:48 - 00161792 ____A (Microsoft Corporation) C:\Windows\SysWOW64\d3d10_1.dll
2013-02-28 06:33 - 2013-01-13 11:46 - 01080832 ____A (Microsoft Corporation) C:\Windows\SysWOW64\d3d10.dll
2013-02-28 06:33 - 2013-01-13 11:43 - 01230336 ____A (Microsoft Corporation) C:\Windows\SysWOW64\WindowsCodecs.dll
2013-02-28 06:33 - 2013-01-13 11:38 - 01887232 ____A (Microsoft Corporation) C:\Windows\System32\d3d11.dll
2013-02-28 06:33 - 2013-01-13 11:38 - 00333312 ____A (Microsoft Corporation) C:\Windows\System32\d3d10_1core.dll
2013-02-28 06:33 - 2013-01-13 11:38 - 00296960 ____A (Microsoft Corporation) C:\Windows\System32\d3d10core.dll
2013-02-28 06:33 - 2013-01-13 11:37 - 03419136 ____A (Microsoft Corporation) C:\Windows\SysWOW64\d2d1.dll
2013-02-28 06:33 - 2013-01-13 11:25 - 00245248 ____A (Microsoft Corporation) C:\Windows\System32\WindowsCodecsExt.dll
2013-02-28 06:33 - 2013-01-13 11:24 - 00648192 ____A (Microsoft Corporation) C:\Windows\System32\d3d10level9.dll
2013-02-28 06:33 - 2013-01-13 11:24 - 00221184 ____A (Microsoft Corporation) C:\Windows\System32\UIAnimation.dll
2013-02-28 06:33 - 2013-01-13 11:20 - 01238528 ____A (Microsoft Corporation) C:\Windows\System32\d3d10.dll
2013-02-28 06:33 - 2013-01-13 11:20 - 00194560 ____A (Microsoft Corporation) C:\Windows\System32\d3d10_1.dll
2013-02-28 06:33 - 2013-01-13 11:15 - 01424384 ____A (Microsoft Corporation) C:\Windows\System32\WindowsCodecs.dll
2013-02-28 06:33 - 2013-01-13 11:10 - 03928064 ____A (Microsoft Corporation) C:\Windows\System32\d2d1.dll
2013-02-28 06:33 - 2013-01-13 11:02 - 00417792 ____A (Microsoft Corporation) C:\Windows\SysWOW64\WMPhoto.dll
2013-02-28 06:33 - 2013-01-13 10:34 - 00364544 ____A (Microsoft Corporation) C:\Windows\SysWOW64\XpsGdiConverter.dll
2013-02-28 06:33 - 2013-01-13 10:32 - 00465920 ____A (Microsoft Corporation) C:\Windows\System32\WMPhoto.dll
2013-02-28 06:33 - 2013-01-13 10:09 - 00522752 ____A (Microsoft Corporation) C:\Windows\System32\XpsGdiConverter.dll
2013-02-28 06:33 - 2013-01-13 09:26 - 01158144 ____A (Microsoft Corporation) C:\Windows\SysWOW64\XpsPrint.dll
2013-02-28 06:33 - 2013-01-13 09:05 - 01682432 ____A (Microsoft Corporation) C:\Windows\System32\XpsPrint.dll
2013-02-28 06:33 - 2013-01-03 22:11 - 02776576 ____A (Microsoft Corporation) C:\Windows\System32\msmpeg2vdec.dll
2013-02-28 06:33 - 2013-01-03 22:11 - 02284544 ____A (Microsoft Corporation) C:\Windows\SysWOW64\msmpeg2vdec.dll
2013-02-27 07:47 - 2013-02-27 09:51 - 01625747 ____A C:\Users\joe\Desktop\Medela_Vision_test.job
2013-02-26 10:46 - 2013-02-26 10:46 - 00000000 ____D C:\Users\joe\Desktop\Vision Test
2013-02-26 10:33 - 2013-02-26 10:33 - 00118788 ____N C:\Users\joe\Desktop\Medela_Cognex_RR Floody.job
2013-02-26 06:37 - 2013-02-26 06:37 - 00001994 ____A C:\Users\Public\Desktop\Samsung Kies.lnk
2013-02-26 06:37 - 2013-02-26 06:37 - 00000000 ____D C:\Users\Public\Documents\NativeFus_Log
2013-02-26 06:37 - 2013-02-26 06:37 - 00000000 ____D C:\Users\joe\Documents\samsung
2013-02-26 06:37 - 2013-02-26 06:37 - 00000000 ____D C:\Users\joe\AppData\Local\Samsung
2013-02-26 06:31 - 2013-02-26 06:31 - 00000000 ____D C:\Program Files (x86)\MyFree Codec
2013-02-26 06:28 - 2013-02-05 15:52 - 00821824 ____A (Devguru Co., Ltd.) C:\Windows\SysWOW64\dgderapi.dll
2013-02-26 06:27 - 2013-03-07 11:37 - 00000000 ____D C:\Program Files (x86)\Samsung
2013-02-26 06:20 - 2013-02-26 06:21 - 68912208 ____A (Samsung Electronics Co., Ltd. ) C:\Users\joe\Downloads\KiesSetup.exe
2013-02-26 05:44 - 2013-02-26 05:44 - 211815105 ____A C:\Users\joe\Downloads\motionanalyzer-7.zip


==================== One Month Modified Files and Folders =======

2013-03-26 10:56 - 2013-03-26 10:56 - 00000000 ____D C:\FRST
2013-03-26 07:46 - 2009-07-13 20:51 - 00138009 ____A C:\Windows\setupact.log
2013-03-26 07:44 - 2009-07-13 21:13 - 00835988 ____A C:\Windows\System32\PerfStringBackup.INI
2013-03-26 07:24 - 2009-07-13 20:45 - 00021312 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-03-26 07:24 - 2009-07-13 20:45 - 00021312 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-03-26 07:20 - 2011-09-29 14:57 - 01337652 ____A C:\Windows\WindowsUpdate.log
2013-03-26 07:16 - 2011-09-29 14:55 - 00000000 ____D C:\ProgramData\NVIDIA
2013-03-26 07:16 - 2009-07-13 21:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-03-26 07:15 - 2010-11-20 19:47 - 00110314 ____A C:\Windows\PFRO.log
2013-03-25 09:57 - 2011-09-29 13:45 - 00000000 ____D C:\ProgramData\Sonic
2013-03-25 09:56 - 2012-08-07 10:04 - 00000888 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2013-03-25 09:50 - 2012-08-07 10:04 - 00000892 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2013-03-25 09:02 - 2011-10-14 10:13 - 00000000 ____D C:\Download
2013-03-25 05:17 - 2011-10-24 06:31 - 00000000 ____D C:\users\joe
2013-03-22 10:13 - 2011-10-24 06:27 - 00000128 ____A C:\Windows\System32\config\netlogon.ftl
2013-03-22 08:54 - 2012-04-09 04:18 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-03-22 08:34 - 2013-03-22 08:34 - 00000000 ____D C:\ProgramData\ipqb
2013-03-22 08:20 - 2011-10-24 10:54 - 00000000 ____D C:\Users\joe\Documents\Excel Docs
2013-03-22 07:43 - 2013-03-22 07:43 - 08026561 ____A C:\Users\joe\Desktop\Cal_Fannie_cracker_2.zip
2013-03-22 07:43 - 2013-03-22 07:43 - 07062945 ____A C:\Users\joe\Desktop\Cal_Fannie_cracker_120_1.zip
2013-03-22 07:42 - 2012-12-08 06:05 - 00000000 ____D C:\Users\joe\Desktop\Evo SD CARD
2013-03-22 06:55 - 2012-12-03 11:33 - 00000000 ____D C:\Users\joe\Desktop\New folder
2013-03-22 06:44 - 2013-03-22 06:44 - 00000000 ____D C:\Users\Public\Documents\CrashDump
2013-03-22 04:45 - 2011-10-27 07:14 - 00000000 ____D C:\Users\joe\Documents\Outlook Files
2013-03-21 08:53 - 2013-03-21 08:53 - 00069120 ____A C:\Users\joe\Documents\Copy of Clydes Donuts Sheeter and Die Cutter Machine.xls
2013-03-21 08:12 - 2013-03-21 08:12 - 00000691 ____A C:\Users\joe\Desktop\office docs - Shortcut.lnk
2013-03-18 08:07 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\registration
2013-03-15 09:59 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\rescache
2013-03-15 08:16 - 2011-12-14 06:39 - 00000000 ____D C:\Program Files\Microsoft Silverlight
2013-03-15 08:16 - 2011-12-14 06:39 - 00000000 ____D C:\Program Files (x86)\Microsoft Silverlight
2013-03-15 08:15 - 2012-08-03 07:44 - 00004096 __ASH C:\VSNAP.IDX
2013-03-15 08:07 - 2011-10-11 09:38 - 00000000 ____D C:\ProgramData\Microsoft Help
2013-03-15 08:03 - 2011-10-11 08:47 - 72013344 ____A (Microsoft Corporation) C:\Windows\System32\MRT.exe
2013-03-14 06:54 - 2012-04-09 04:18 - 00693976 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2013-03-14 06:54 - 2011-09-29 13:06 - 00073432 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2013-03-11 13:22 - 2012-11-09 06:27 - 00000000 ____D C:\Users\joe\Desktop\Kerry Ing
2013-03-08 07:31 - 2013-03-08 07:31 - 00169345 ____A C:\Users\joe\Downloads\PdaNet.apk
2013-03-07 11:41 - 2013-03-07 11:41 - 00000000 ____D C:\Users\joe\Desktop\Clydes Donuts
2013-03-07 11:41 - 2013-03-07 11:37 - 00000000 ____D C:\Users\Public\Documents\PhotoEditor
2013-03-07 11:41 - 2012-10-23 05:21 - 00000000 ____D C:\Users\joe\Desktop\Wrigly Corp
2013-03-07 11:37 - 2013-03-07 11:37 - 00001167 ____A C:\Users\joe\Desktop\PhotoEditor.lnk
2013-03-07 11:37 - 2013-03-07 11:37 - 00000000 ____D C:\Users\Public\Documents\PhotoEditor_Log
2013-03-07 11:37 - 2013-02-26 06:27 - 00000000 ____D C:\Program Files (x86)\Samsung
2013-03-07 09:52 - 2013-03-07 08:33 - 00099644 ____A C:\Users\joe\Documents\Wrigley Corp Metal Extras.dwg
2013-03-07 09:42 - 2013-01-17 11:42 - 00000000 ____D C:\Users\joe\Desktop\Wrigley Corprate Plastic
2013-03-07 08:36 - 2012-07-26 13:28 - 00044827 ____A C:\Users\joe\Documents\plot.log
2013-03-07 07:48 - 2013-03-07 07:46 - 00095356 ____A C:\Users\joe\Documents\Wrigly Plastic Extras Corprate.dwg
2013-03-07 07:48 - 2009-07-13 21:32 - 00000000 ____D C:\Windows\System32\FxsTmp
2013-03-06 06:16 - 2013-03-06 06:16 - 00002665 ____A C:\Users\Public\Desktop\Tech Toolkit.lnk
2013-03-06 06:16 - 2013-03-06 06:16 - 00000000 ____D C:\Program Files (x86)\8020 Inc
2013-03-06 06:16 - 2011-10-27 10:30 - 00000000 ____D C:\Users\joe\AppData\Local\Downloaded Installations
2013-03-05 07:10 - 2013-03-05 07:10 - 00045568 ____A C:\Users\joe\Documents\Wrigly Corp Conveyor.xls
2013-03-01 13:31 - 2013-02-11 12:29 - 00000000 ____D C:\Users\joe\Desktop\Filmquest
2013-03-01 13:16 - 2012-08-22 11:07 - 00000259 ____A C:\Windows\MotionAnalyzer.INI
2013-03-01 13:04 - 2013-03-01 13:04 - 00022517 ____A C:\Users\joe\Desktop\Clydes Doughnut 14.xls
2013-03-01 12:27 - 2013-03-01 12:25 - 00022260 ____A C:\Users\joe\Desktop\Clydes Doughnut.xls
2013-03-01 12:27 - 2013-03-01 12:11 - 00022200 ____A C:\Users\joe\Desktop\Joes Servo.mba
2013-03-01 12:00 - 2012-08-22 11:05 - 00000000 ____D C:\Program Files (x86)\MA User Marked Database
2013-02-28 12:09 - 2011-11-18 11:23 - 00000000 ____D C:\Users\joe\Documents\SelfMV
2013-02-28 08:01 - 2009-07-13 20:45 - 00563000 ____A C:\Windows\System32\FNTCACHE.DAT
2013-02-28 07:59 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\zh-HK
2013-02-28 07:59 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\tr-TR
2013-02-28 07:59 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\zh-HK
2013-02-28 07:59 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\tr-TR
2013-02-27 09:51 - 2013-02-27 07:47 - 01625747 ____A C:\Users\joe\Desktop\Medela_Vision_test.job
2013-02-26 10:46 - 2013-02-26 10:46 - 00000000 ____D C:\Users\joe\Desktop\Vision Test
2013-02-26 10:33 - 2013-02-26 10:33 - 00118788 ____N C:\Users\joe\Desktop\Medela_Cognex_RR Floody.job
2013-02-26 06:37 - 2013-02-26 06:37 - 00001994 ____A C:\Users\Public\Desktop\Samsung Kies.lnk
2013-02-26 06:37 - 2013-02-26 06:37 - 00000000 ____D C:\Users\Public\Documents\NativeFus_Log
2013-02-26 06:37 - 2013-02-26 06:37 - 00000000 ____D C:\Users\joe\Documents\samsung
2013-02-26 06:37 - 2013-02-26 06:37 - 00000000 ____D C:\Users\joe\AppData\Local\Samsung
2013-02-26 06:37 - 2011-10-24 06:32 - 00160920 ____A C:\Users\joe\AppData\Local\GDIPFONTCACHEV1.DAT
2013-02-26 06:31 - 2013-02-26 06:31 - 00000000 ____D C:\Program Files (x86)\MyFree Codec
2013-02-26 06:28 - 2011-11-10 12:38 - 00000000 ____D C:\ProgramData\Samsung
2013-02-26 06:28 - 2011-09-29 13:20 - 00000000 ___HD C:\Program Files (x86)\InstallShield Installation Information
2013-02-26 06:27 - 2011-02-10 06:33 - 00832458 ____A C:\Windows\SysWOW64\PerfStringBackup.INI
2013-02-26 06:21 - 2013-02-26 06:20 - 68912208 ____A (Samsung Electronics Co., Ltd. ) C:\Users\joe\Downloads\KiesSetup.exe
2013-02-26 06:16 - 2011-10-27 10:29 - 00000000 ____D C:\Program Files (x86)\HTC
2013-02-26 06:15 - 2012-06-25 04:53 - 00000005 ____A C:\Windows\SysWOW64\lMMLDeleteUserData42107612FX.tmp
2013-02-26 06:14 - 2011-09-29 13:16 - 00347978 ____A C:\Windows\DPINST.LOG
2013-02-26 05:47 - 2012-08-22 11:05 - 00001336 ____A C:\Windows\udat.INI
2013-02-26 05:47 - 2012-08-22 11:04 - 00000510 ____A C:\Windows\MA.INI
2013-02-26 05:46 - 2012-08-22 11:03 - 00000000 ____D C:\Program Files (x86)\Motion Analyzer
2013-02-26 05:45 - 2012-08-22 11:04 - 00001088 ____A C:\Users\Public\Desktop\Motion Analyzer.lnk
2013-02-26 05:44 - 2013-02-26 05:44 - 211815105 ____A C:\Users\joe\Downloads\motionanalyzer-7.zip

==================== Known DLLs (Whitelisted) =================


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points =========================

Restore point made on: 2013-03-25 10:21:07

==================== Memory info ===========================

Percentage of memory in use: 13%
Total physical RAM: 8072.9 MB
Available physical RAM: 7015.35 MB
Total Pagefile: 8071.05 MB
Available Pagefile: 7014.96 MB
Total Virtual: 8192 MB
Available Virtual: 8191.9 MB

==================== Partitions =============================

1 Drive c: (OS) (Fixed) (Total:297.3 GB) (Free:54.09 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
2 Drive d: (RECOVERY) (Fixed) (Total:0.73 GB) (Free:0.51 GB) NTFS ==>[System with boot components (obtained from reading drive)]
3 Drive e: (WIN_7_PROFESSIONAL) (CDROM) (Total:5.75 GB) (Free:0 GB) UDF
4 Drive f: (KINGSTON) (Removable) (Total:14.53 GB) (Free:14.4 GB) FAT32
5 Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS

Disk ### Status Size Free Dyn Gpt
-------- ------------- ------- ------- --- ---
Disk 0 Online 298 GB 0 B
Disk 1 Online 14 GB 0 B

Partitions of Disk 0:
===============

Disk ID: C9F0A54A

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 OEM 39 MB 31 KB
Partition 2 Primary 752 MB 40 MB
Partition 3 Primary 297 GB 792 MB
Partition 4 Primary 10 MB 298 GB

==================================================================================

Disk: 0
Partition 1
Type : DE
Hidden: Yes
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 4 FAT Partition 39 MB Healthy Hidden

=========================================================

Disk: 0
Partition 2
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 1 D RECOVERY NTFS Partition 752 MB Healthy

=========================================================

Disk: 0
Partition 3
Type : 07
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 2 C OS NTFS Partition 297 GB Healthy

=========================================================

Disk: 0
Partition 4
Type : 17 (Suspicious Type)
Hidden: Yes
Active: No

There is no volume associated with this partition.

=========================================================

Partitions of Disk 1:
===============

Disk ID: C3072E18

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 14 GB 4032 KB

==================================================================================

Disk: 1
Partition 1
Type : 0C
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 3 F KINGSTON FAT32 Removable 14 GB Healthy

=========================================================
============================== MBR Partition Table ==================

==============================
Partitions of Disk 0:
===============
Disk ID: C9F0A54A

Partition 1:
=========
Hex: 00010100DEFE3F043F00000086390100
Active: NO
Type: DE
Size: 39 MB

Partition 2:
=========
Hex: 0019150507F612640040010000801700
Active: NO
Type: 07 (NTFS)
Size: 752 MB

Partition 3:
=========
Hex: 80F6136407FEFFFF00C01800B0B22925
Active: YES
Type: 07 (NTFS)
Size: 297 GB

Partition 4:
=========
Hex: 00FEFFFF17FEFFFF0078422500500000
Active: NO
Type: 17
Size: 10 MB
ATTENTION ===> Suspicious partition bootkit on partition 4

==============================
Partitions of Disk 1:
===============
Disk ID: C3072E18

Partition 1:
=========
Hex: 800001010C73B4C2801F000080FBD001
Active: YES
Type: 0C
Size: 15 GB


Last Boot: 2013-03-25 10:13

==================== End Of Log =============================


Services scan:

Farbar Recovery Scan Tool (x64) Version: 13-03-2013
Ran by SYSTEM at 2013-03-26 11:18:09
Running from F:\

================== Search: "services.exe" ===================

C:\Windows\winsxs\amd64_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.1.7600.16385_none_2b54b20ee6fa07b1\services.exe
[2009-07-13 15:19] - [2009-07-13 17:39] - 0328704 ____A (Microsoft Corporation) 24ACB7E5BE595468E3B9AA488B9B4FCB

C:\Windows\System32\services.exe
[2009-07-13 15:19] - [2009-07-13 17:39] - 0328704 ____A (Microsoft Corporation) 24ACB7E5BE595468E3B9AA488B9B4FCB

====== End Of Search ======

#4 Tomster2

Tomster2
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:04:59 AM

Posted 26 March 2013 - 11:31 AM

I wanted to make sure immediate was checked in the "follow this topic" option... but I had to unfollow first to see that setting. It was, and is set to immediate, and set back to follow.

#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:59 AM

Posted 26 March 2013 - 11:55 AM



Hello Tomster2



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt
 
HKU\joe\...\CurrentVersion\Windows: [Load] C:\Users\joe\LOCALS~1\Temp\mszfyexr.scr
HKU\joe\...\Winlogon: [Shell] C:\Users\joe\AppData\Roaming\id.cff,explorer.exe
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 Tomster2

Tomster2
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:04:59 AM

Posted 26 March 2013 - 01:27 PM

Fixlog.txt reports:

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 13-03-2013
Ran by SYSTEM at 2013-03-26 13:19:01 Run:1
Running from F:\

==============================================

HKEY_USERS\joe\Software\Microsoft\Windows NT\CurrentVersion\Windows\\Load Value not found.
HKEY_USERS\joe\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell Value deleted successfully.

==== End of Fixlog ====


The machine got to the login screen... and booted to the desktop. I have waited about five minutes now... and no white screen... So so far, so good.

What next?

#7 Tomster2

Tomster2
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:04:59 AM

Posted 26 March 2013 - 01:35 PM

Additional info... I can now browse the My Documents folder

One oddity is that when I open Windows Explorer... I see the normal folder structure, but as I scan down I see in order

normal folders
Additional drives (DVD and mapped drives)
Network
Then...
Control Panel
Recycle Bin
Then several folders that look like they belong in My Docs or elsewhere. Are these the files that were possibly encrypted by this nasty and then just restored directly to the root c:\

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:59 AM

Posted 26 March 2013 - 01:37 PM


Hello Tomster2


These are the programs I would like you to run next, if you have any problems with these just skip it and move on to the next one.


-AdwCleaner-
  • Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the content of that logfile with your next answer.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.
--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+
  • Gringo





I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 Tomster2

Tomster2
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:04:59 AM

Posted 26 March 2013 - 02:06 PM

Additional info:  After looking at screen shots of various ransomware varients, the user believes the screen they saw was URAUSYFBI 

Recall that by the time I got the machine, all we were getting was a white screen.

 

Requested Logs follow:

 

AdwCleaner Log:

 

# AdwCleaner v2.115 - Logfile created 03/26/2013 at 13:53:07
# Updated 17/03/2013 by Xplode
# Operating system : Windows 7 Professional Service Pack 1 (64 bits)
# User : joe - 8SSLMQ1-JS
# Boot Mode : Normal
# Running from : C:\Users\joe\Desktop\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****

Folder Deleted : C:\Program Files (x86)\Viewpoint
Folder Deleted : C:\ProgramData\Viewpoint

***** [Registry] *****

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{9DBB28C1-1925-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\Software\MetaStream
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@viewpoint.com/VMP
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ViewpointMediaPlayer
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16470

[OK] Registry is clean.

-\\ Mozilla Firefox v [Unable to get version]

File : C:\Users\joe\AppData\Roaming\Mozilla\Firefox\Profiles\mfkw6yf1.default\prefs.js

[OK] File is clean.

File : C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\871594qz.default\prefs.js

[OK] File is clean.

-\\ Google Chrome v25.0.1364.172

File : C:\Users\joe\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [2662 octets] - [26/03/2013 13:48:26]
AdwCleaner[R2].txt - [2722 octets] - [26/03/2013 13:52:49]
AdwCleaner[S1].txt - [2695 octets] - [26/03/2013 13:53:07]

########## EOF - C:\AdwCleaner[S1].txt - [2755 octets] ##########

 

Roguekiller64 Log:

 

RogueKiller V8.5.4 _x64_ [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : joe [Admin rights]
Mode : Remove -- Date : 03/26/2013 14:01:28
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 8 ¤¤¤
[SHELL][SUSP PATH] HKCU\[...]\Windows : Load (C:\Users\joe\Local Settings\Temp\mszfyexr.scr) [x] -> DELETED
[HJ] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> REPLACED (2)
[HJ] HKLM\[...]\System : EnableLUA (0) -> REPLACED (1)
[HJ DESK] HKCU\[...]\ClassicStartMenu : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\ClassicStartMenu : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

 

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: ST9320423AS +++++
--- User ---
[MBR] dbe246e2a8617df4feb35b2c4b711948
[BSP] 8b5fab2d46e47c376e6dc01733401545 : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] DELL-UTIL (0xde) [VISIBLE] Offset (sectors): 63 | Size: 39 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 81920 | Size: 752 Mo
2 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 1622016 | Size: 304438 Mo
3 - [XXXXXX] NTFS (0x17) [HIDDEN!] Offset (sectors): 625113088 | Size: 10 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[2]_D_03262013_02d1401.txt >>
RKreport[1]_S_03262013_02d1400.txt ; RKreport[2]_D_03262013_02d1401.txt


 



#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:59 AM

Posted 26 March 2013 - 02:31 PM



Hello Tomster2


I would like you to try and run these next.

TDSSKiller

Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

    Note** this report can be very long - so if the website gives you an error saying it is to long you may attache it

    If the forum still complains about it being to long send me everything that is at the end of the report after where it says

    ==================
    Scan finished
    ==================
  • and I will see if I want to see the whole report

    Malwarebytes Anti-Rootkit

    1.Download Malwarebytes Anti-Rootkit
    2.Unzip the contents to a folder in a convenient location.
    3.Open the folder where the contents were unzipped and run mbar.exe
    4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
    5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.
    6.Wait while the system shuts down and the cleanup process is performed.
    7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
    8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:
    • •Internet access
      •Windows Update
      •Windows Firewall
    9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.
    10.Verify that your system is now functioning normally.

    If you have any problems running either one come back and let me know

    please reply with the reports from TDSSKiller and MBAR

    Gringo







I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 Tomster2

Tomster2
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:04:59 AM

Posted 26 March 2013 - 05:18 PM

OK, pasting the tdds log in the reply, crashed the reply.

Trying attaching it on this one.



#12 Tomster2

Tomster2
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:04:59 AM

Posted 26 March 2013 - 05:21 PM

here are the mbam logs:

 

First scan found (1), rebooted, second scan clean.  Both reports follow. 

 

After the TDSS scans and the mbam scans I checked the following functions:

 

Internet: OK

Windows Update: Able to check for updates fine

Windows Firewall: On and settings accessible.

 

***********************************************************************

MBAM log1:

 

Malwarebytes Anti-Rootkit BETA 1.01.0.1021
www.malwarebytes.org

Database version: v2013.03.26.13

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
joe :: 8SSLMQ1-JS [administrator]

3/26/2013 3:56:35 PM
mbar-log-2013-03-26 (15-56-35).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM | P2P
Scan options disabled:
Objects scanned: 41373
Time elapsed: 42 minute(s), 6 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 1
c:\Users\joe\AppData\Roaming\id.cff (Trojan.Ransom) -> Delete on reboot.

(end)

 

MBAM log 2:

Malwarebytes Anti-Rootkit BETA 1.01.0.1021
www.malwarebytes.org

Database version: v2013.03.26.14

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
joe :: 8SSLMQ1-JS [administrator]

3/26/2013 4:49:29 PM
mbar-log-2013-03-26 (16-49-29).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM | P2P
Scan options disabled:
Objects scanned: 41372
Time elapsed: 41 minute(s), 21 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)



#13 Tomster2

Tomster2
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:04:59 AM

Posted 26 March 2013 - 05:22 PM

 After you review the logs, let me know what is next.

 

Many thanks, looking very good so far.



#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:59 AM

Posted 26 March 2013 - 09:45 PM

I would like you to rerun RogueKiller for me please
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 Tomster2

Tomster2
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:04:59 AM

Posted 27 March 2013 - 08:19 AM

Rogue Killer log:

RogueKiller V8.5.4 _x64_ [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : joe [Admin rights]
Mode : Remove -- Date : 03/27/2013 08:12:08
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts



¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: ST9320423AS +++++
--- User ---
[MBR] dbe246e2a8617df4feb35b2c4b711948
[BSP] 8b5fab2d46e47c376e6dc01733401545 : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] DELL-UTIL (0xde) [VISIBLE] Offset (sectors): 63 | Size: 39 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 81920 | Size: 752 Mo
2 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 1622016 | Size: 304438 Mo
3 - [XXXXXX] NTFS (0x17) [HIDDEN!] Offset (sectors): 625113088 | Size: 10 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[4]_D_03272013_02d0812.txt >>
RKreport[1]_S_03262013_02d1400.txt ; RKreport[2]_D_03262013_02d1401.txt ; RKreport[3]_S_03272013_02d0707.txt ; RKreport[4]_D_03272013_02d0812.txt




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users